IOC Report
HPichHAekHXL0i2.exe

FilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
HPichHAekHXL0i2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HPichHAekHXL0i2.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp35E8.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ylDfXNTY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ylDfXNTY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ylDfXNTY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1pxgkqf4.d4d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etywfchn.21m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5x25icv.m0p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_id0fmhcs.uhc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iecfnc55.kug.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pfjzjfyf.52t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scmtohhx.irs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysk4i2oq.mq1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp44CD.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HPichHAekHXL0i2.exe
"C:\Users\user\Desktop\HPichHAekHXL0i2.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HPichHAekHXL0i2.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ylDfXNTY.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ylDfXNTY" /XML "C:\Users\user\AppData\Local\Temp\tmp35E8.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Users\user\AppData\Roaming\ylDfXNTY.exe
C:\Users\user\AppData\Roaming\ylDfXNTY.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ylDfXNTY" /XML "C:\Users\user\AppData\Local\Temp\tmp44CD.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20and%20Time:%2028/03/2025%20/%2016:26:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216041%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org
unknown
http://r11.o.lencr.org0#
unknown
https://api.telegram.org/bot
unknown
https://duckduckgo.com/chrome_newtabv20-
unknown
https://www.office.com/lB
unknown
http://r11.i.lencr.org/09
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=en4
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://mail.steadfastlogistics.in
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://www.ecosia.org/newtab/v20
unknown
http://checkip.dyndns.org/
132.226.8.169
https://www.office.com/4
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20and%20Time:%2028/03/2025%20/%2014:27:57%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216041%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20a
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.32.1
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.steadfastlogistics.in
69.49.232.23
malicious
reallyfreegeoip.org
104.21.32.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.8.169
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
69.49.232.23
mail.steadfastlogistics.in
United States
malicious
132.226.8.169
checkip.dyndns.com
United States
149.154.167.220
api.telegram.org
United Kingdom
104.21.32.1
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
6E01000
trusted library allocation
page read and write
malicious
402C000
trusted library allocation
page read and write
malicious
403000
remote allocation
page execute and read and write
malicious
438B000
trusted library allocation
page read and write
malicious
6D91000
trusted library allocation
page read and write
malicious
4FBF000
trusted library allocation
page read and write
91F1000
trusted library allocation
page read and write
54C5000
heap
page read and write
5260000
trusted library section
page readonly
5005000
trusted library allocation
page read and write
8EFD000
stack
page read and write
4D07000
heap
page read and write
87A000
stack
page read and write
50E0000
trusted library allocation
page read and write
6EC2000
trusted library allocation
page read and write
6F45000
trusted library allocation
page read and write
6FC7000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
4D00000
heap
page read and write
950000
heap
page read and write
A895000
trusted library allocation
page read and write
6FB4000
trusted library allocation
page read and write
1220000
trusted library allocation
page execute and read and write
6E78000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
80B4000
trusted library allocation
page read and write
D84000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
6F0D000
trusted library allocation
page read and write
8165000
trusted library allocation
page read and write
70BF000
trusted library allocation
page read and write
4D35000
heap
page read and write
5615000
heap
page read and write
A62000
heap
page read and write
5240000
trusted library allocation
page read and write
A1BE000
stack
page read and write
6F1C000
trusted library allocation
page read and write
7E6E000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
80D5000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
4FD2000
trusted library allocation
page read and write
56F0000
trusted library allocation
page execute and read and write
55DB000
heap
page read and write
5AB0000
heap
page read and write
4D25000
heap
page read and write
972E000
stack
page read and write
117F000
stack
page read and write
4C60000
heap
page readonly
2863000
trusted library allocation
page read and write
27B0000
heap
page read and write
7A2E000
stack
page read and write
E10000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
A920000
trusted library allocation
page read and write
2C40000
heap
page read and write
97C4000
trusted library allocation
page read and write
B7EE000
stack
page read and write
DB2000
trusted library allocation
page read and write
705A000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
6EBD000
trusted library allocation
page read and write
70F2000
trusted library allocation
page read and write
8D0000
heap
page read and write
4C72000
trusted library allocation
page read and write
6B2E000
stack
page read and write
9E7E000
stack
page read and write
2A9B000
heap
page read and write
4D13000
trusted library allocation
page execute and read and write
6DFE000
stack
page read and write
70C4000
trusted library allocation
page read and write
7DFF000
trusted library allocation
page read and write
4D30000
heap
page read and write
7137000
trusted library allocation
page read and write
B6CD000
stack
page read and write
7022000
trusted library allocation
page read and write
A5FF000
stack
page read and write
6F58000
trusted library allocation
page read and write
7132000
trusted library allocation
page read and write
A760000
trusted library allocation
page read and write
6C28000
trusted library allocation
page read and write
7163000
trusted library allocation
page read and write
6EEA000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
6F4B000
trusted library allocation
page read and write
55EB000
heap
page read and write
5CEE000
stack
page read and write
8011000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
6E52000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
7F17000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
6E9E000
trusted library allocation
page read and write
8081000
trusted library allocation
page read and write
BDAE000
stack
page read and write
924E000
trusted library allocation
page read and write
6FBA000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
71BD000
stack
page read and write
E20000
heap
page read and write
5330000
trusted library allocation
page execute and read and write
5110000
heap
page read and write
AE0E000
stack
page read and write
807D000
trusted library allocation
page read and write
A360000
heap
page read and write
6B6C000
stack
page read and write
6EA1000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
70BD000
trusted library allocation
page read and write
6E7C000
trusted library allocation
page read and write
A34F000
heap
page read and write
5052000
trusted library allocation
page read and write
1240000
heap
page read and write
4FC1000
trusted library allocation
page read and write
6CBE000
stack
page read and write
D60000
heap
page read and write
91F6000
trusted library allocation
page read and write
A910000
trusted library allocation
page read and write
50ED000
trusted library allocation
page execute and read and write
6DEF000
trusted library allocation
page read and write
79AE000
stack
page read and write
5350000
trusted library allocation
page read and write
DF0000
trusted library allocation
page execute and read and write
DB7000
trusted library allocation
page execute and read and write
A05F000
stack
page read and write
711E000
trusted library allocation
page read and write
B36E000
stack
page read and write
A8B7000
trusted library allocation
page read and write
5062000
trusted library allocation
page read and write
50A0000
heap
page read and write
7E6C000
trusted library allocation
page read and write
6F83000
trusted library allocation
page read and write
7DB9000
trusted library allocation
page read and write
6F89000
trusted library allocation
page read and write
94E0000
heap
page execute and read and write
B70E000
stack
page read and write
5A21000
heap
page read and write
955D000
trusted library allocation
page read and write
8189000
trusted library allocation
page read and write
8235000
trusted library allocation
page read and write
A61E000
stack
page read and write
7047000
trusted library allocation
page read and write
9F5E000
stack
page read and write
5106000
trusted library allocation
page execute and read and write
5080000
heap
page read and write
A5BE000
stack
page read and write
976E000
stack
page read and write
708A000
trusted library allocation
page read and write
955000
heap
page read and write
6F83000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
6F18000
trusted library allocation
page read and write
A7DE000
stack
page read and write
98A0000
trusted library allocation
page read and write
1188000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
52B0000
heap
page read and write
526E000
trusted library section
page readonly
B52D000
stack
page read and write
50B7000
heap
page read and write
6E7A000
trusted library allocation
page read and write
A910000
heap
page read and write
2BCF000
unkown
page read and write
8017000
trusted library allocation
page read and write
5DEE000
stack
page read and write
5040000
heap
page read and write
7128000
trusted library allocation
page read and write
716E000
trusted library allocation
page read and write
9246000
trusted library allocation
page read and write
4D38000
heap
page read and write
4FA0000
trusted library allocation
page read and write
6F27000
trusted library allocation
page read and write
50FD000
trusted library allocation
page execute and read and write
DD0000
trusted library allocation
page read and write
809000
stack
page read and write
6F84000
heap
page read and write
6F4D000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
6F96000
trusted library allocation
page read and write
9570000
heap
page execute and read and write
4D78000
heap
page read and write
818B000
trusted library allocation
page read and write
5067000
trusted library allocation
page execute and read and write
7191000
trusted library allocation
page read and write
5171000
heap
page read and write
957000
stack
page read and write
4D00000
heap
page read and write
B1EB000
stack
page read and write
DF2000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
8116000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
4B5C000
stack
page read and write
A840000
trusted library allocation
page execute and read and write
A890000
trusted library allocation
page execute and read and write
D8D000
trusted library allocation
page execute and read and write
70CD000
trusted library allocation
page read and write
6DFA000
trusted library allocation
page read and write
4CB0000
heap
page read and write
5260000
trusted library allocation
page read and write
50C5000
heap
page read and write
7018000
trusted library allocation
page read and write
7054000
trusted library allocation
page read and write
7121000
trusted library allocation
page read and write
A57F000
stack
page read and write
7125000
trusted library allocation
page read and write
761E000
stack
page read and write
80E7000
trusted library allocation
page read and write
D9E000
stack
page read and write
6E4E000
trusted library allocation
page read and write
29CA000
stack
page read and write
6FFF000
trusted library allocation
page read and write
E28000
heap
page read and write
A53000
heap
page read and write
A49D000
stack
page read and write
6EA5000
trusted library allocation
page read and write
6F22000
trusted library allocation
page read and write
8121000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
DE0000
trusted library allocation
page read and write
A2A000
heap
page read and write
DA0000
trusted library allocation
page read and write
DC4000
trusted library allocation
page read and write
127A000
heap
page read and write
5140000
heap
page read and write
E95000
heap
page read and write
70F0000
trusted library allocation
page read and write
A940000
heap
page read and write
707D000
trusted library allocation
page read and write
70ED000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
70B2000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
A8E5000
trusted library allocation
page read and write
ABCE000
stack
page read and write
504D000
trusted library allocation
page execute and read and write
B720000
trusted library allocation
page read and write
7099000
trusted library allocation
page read and write
4C95000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
2C4F000
stack
page read and write
6D80000
heap
page execute and read and write
D80000
trusted library allocation
page read and write
70FE000
stack
page read and write
A5F000
heap
page read and write
91D6000
trusted library allocation
page read and write
B76E000
stack
page read and write
6D66000
trusted library allocation
page read and write
8E8E000
stack
page read and write
924B000
trusted library allocation
page read and write
97C6000
trusted library allocation
page read and write
7E01000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
2C10000
heap
page read and write
B26F000
stack
page read and write
DF7000
trusted library allocation
page execute and read and write
2B1E000
stack
page read and write
5010000
trusted library allocation
page read and write
80DB000
trusted library allocation
page read and write
5A0000
heap
page read and write
70C7000
trusted library allocation
page read and write
81E3000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
A7B0000
trusted library allocation
page execute and read and write
8C0000
heap
page read and write
5354000
trusted library allocation
page read and write
7E84000
trusted library allocation
page read and write
50AB000
stack
page read and write
A3FD000
stack
page read and write
9240000
trusted library allocation
page read and write
6E3A000
trusted library allocation
page read and write
7002000
trusted library allocation
page read and write
8078000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7172000
trusted library allocation
page read and write
5370000
heap
page read and write
8139000
trusted library allocation
page read and write
A326000
heap
page read and write
80E1000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
E20000
heap
page read and write
7072000
trusted library allocation
page read and write
A826000
trusted library allocation
page read and write
9560000
trusted library allocation
page execute and read and write
280F000
trusted library allocation
page read and write
A8B0000
trusted library allocation
page read and write
1270000
heap
page read and write
5360000
heap
page read and write
2871000
trusted library allocation
page read and write
5088000
heap
page read and write
E47000
heap
page read and write
A750000
trusted library allocation
page execute and read and write
A824000
trusted library allocation
page read and write
7087000
trusted library allocation
page read and write
A820000
trusted library allocation
page read and write
7FCE000
trusted library allocation
page read and write
712A000
trusted library allocation
page read and write
52A0000
heap
page read and write
2DB0000
heap
page read and write
A780000
trusted library allocation
page read and write
6ECE000
stack
page read and write
2B21000
trusted library allocation
page read and write
4DEA000
heap
page read and write
5065000
trusted library allocation
page execute and read and write
6CBF000
trusted library allocation
page read and write
750000
unkown
page readonly
7F21000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
6FB8000
trusted library allocation
page read and write
A900000
trusted library allocation
page read and write
A2F4000
heap
page read and write
4FA4000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
A880000
trusted library allocation
page read and write
7E2D000
trusted library allocation
page read and write
6F49000
trusted library allocation
page read and write
7FCA000
trusted library allocation
page read and write
6E6A000
trusted library allocation
page read and write
7F33000
trusted library allocation
page read and write
92DD000
stack
page read and write
AACE000
stack
page read and write
A47E000
stack
page read and write
4FB8000
trusted library allocation
page read and write
4D2A000
heap
page read and write
AD80000
heap
page read and write
6AC7000
trusted library allocation
page execute and read and write
ACD0000
heap
page read and write
6AE0000
trusted library allocation
page read and write
9890000
trusted library allocation
page execute and read and write
80A7000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
6BB0000
heap
page read and write
6E36000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
D9D000
trusted library allocation
page execute and read and write
83D000
stack
page read and write
5070000
heap
page read and write
9390000
trusted library allocation
page read and write
6E3E000
trusted library allocation
page read and write
7004000
trusted library allocation
page read and write
28C6000
trusted library allocation
page read and write
80FD000
trusted library allocation
page read and write
70E8000
trusted library allocation
page read and write
6AC5000
trusted library allocation
page execute and read and write
8072000
trusted library allocation
page read and write
516D000
heap
page read and write
7EC3000
trusted library allocation
page read and write
701D000
trusted library allocation
page read and write
B56D000
stack
page read and write
4C66000
trusted library allocation
page read and write
987E000
stack
page read and write
9544000
trusted library allocation
page read and write
4D00000
heap
page read and write
7F01000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
70F7000
trusted library allocation
page read and write
DC3000
trusted library allocation
page execute and read and write
E2A000
heap
page read and write
B92E000
stack
page read and write
A6DE000
stack
page read and write
6FBC000
trusted library allocation
page read and write
59C3000
heap
page read and write
7095000
trusted library allocation
page read and write
DA2000
trusted library allocation
page read and write
5DF0000
heap
page read and write
A7F0000
trusted library allocation
page execute and read and write
B8EE000
stack
page read and write
50E4000
trusted library allocation
page read and write
7F9F000
trusted library allocation
page read and write
9266000
trusted library allocation
page read and write
2718000
trusted library allocation
page read and write
6CC8000
trusted library allocation
page read and write
4C6D000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
563A000
heap
page read and write
4C61000
trusted library allocation
page read and write
3FE9000
trusted library allocation
page read and write
5BA0000
heap
page read and write
A907000
trusted library allocation
page read and write
A770000
trusted library allocation
page execute and read and write
6F8B000
trusted library allocation
page read and write
6EB9000
trusted library allocation
page read and write
546B000
stack
page read and write
6F70000
heap
page read and write
91DE000
trusted library allocation
page read and write
7165000
trusted library allocation
page read and write
A4DE000
stack
page read and write
6FC2000
trusted library allocation
page read and write
55D0000
heap
page read and write
6D70000
trusted library allocation
page read and write
B62E000
stack
page read and write
506B000
trusted library allocation
page execute and read and write
A17D000
stack
page read and write
933D000
stack
page read and write
A7C0000
trusted library allocation
page execute and read and write
590000
heap
page read and write
5340000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
94DD000
stack
page read and write
5250000
trusted library allocation
page read and write
5A33000
heap
page read and write
4FE0000
trusted library allocation
page read and write
6E0D000
trusted library allocation
page read and write
DDD000
trusted library allocation
page execute and read and write
5270000
trusted library allocation
page execute and read and write
80C9000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
926D000
trusted library allocation
page read and write
1070000
heap
page read and write
BCAC000
stack
page read and write
52E0000
heap
page execute and read and write
5040000
trusted library allocation
page read and write
7F91000
trusted library allocation
page read and write
DE2000
trusted library allocation
page read and write
A970000
heap
page read and write
80F3000
trusted library allocation
page read and write
806B000
trusted library allocation
page read and write
5480000
trusted library section
page readonly
A07F000
stack
page read and write
6CD0000
trusted library allocation
page execute and read and write
7FA7000
trusted library allocation
page read and write
AE2000
heap
page read and write
8039000
trusted library allocation
page read and write
4FCD000
trusted library allocation
page read and write
A8A6000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
70FD000
trusted library allocation
page read and write
929D000
stack
page read and write
4D1D000
trusted library allocation
page execute and read and write
81CA000
trusted library allocation
page read and write
6B70000
trusted library allocation
page execute and read and write
6E42000
trusted library allocation
page read and write
8066000
trusted library allocation
page read and write
52CE000
stack
page read and write
983E000
stack
page read and write
97CA000
trusted library allocation
page read and write
1230000
heap
page read and write
A800000
trusted library allocation
page execute and read and write
59A0000
heap
page read and write
4DBD000
heap
page read and write
70FB000
trusted library allocation
page read and write
6E09000
trusted library allocation
page read and write
9261000
trusted library allocation
page read and write
A74D000
trusted library allocation
page read and write
7F5F000
trusted library allocation
page read and write
704D000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
6E74000
trusted library allocation
page read and write
599E000
stack
page read and write
6E46000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
DFB000
trusted library allocation
page execute and read and write
BEAE000
stack
page read and write
91E000
unkown
page read and write
54C0000
heap
page read and write
954A000
trusted library allocation
page read and write
6E5E000
trusted library allocation
page read and write
949E000
stack
page read and write
2D8B000
heap
page read and write
4F20000
heap
page execute and read and write
105E000
stack
page read and write
4C44000
trusted library allocation
page read and write
89A000
stack
page read and write
50E3000
trusted library allocation
page execute and read and write
5F5000
heap
page read and write
5632000
heap
page read and write
8F7000
stack
page read and write
47FB000
stack
page read and write
80B2000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
9546000
trusted library allocation
page read and write
8083000
trusted library allocation
page read and write
505A000
trusted library allocation
page execute and read and write
6FF2000
trusted library allocation
page read and write
D5E000
stack
page read and write
803D000
trusted library allocation
page read and write
2D70000
heap
page read and write
A10000
trusted library allocation
page read and write
6E05000
trusted library allocation
page read and write
A330000
heap
page read and write
7E29000
trusted library allocation
page read and write
6E32000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
80CF000
trusted library allocation
page read and write
6F87000
trusted library allocation
page read and write
6BB0000
heap
page read and write
A8D4000
trusted library allocation
page read and write
A3CF000
heap
page read and write
8B0000
heap
page read and write
B66E000
stack
page read and write
7160000
trusted library allocation
page read and write
A8E0000
trusted library allocation
page execute and read and write
A0E000
stack
page read and write
6BC4000
heap
page read and write
DA6000
trusted library allocation
page execute and read and write
A790000
trusted library allocation
page execute and read and write
4D20000
heap
page read and write
5000000
trusted library allocation
page read and write
F1A000
heap
page read and write
6B80000
heap
page read and write
700A000
trusted library allocation
page read and write
D10000
heap
page read and write
925A000
trusted library allocation
page read and write
9F7F000
stack
page read and write
70AE000
trusted library allocation
page read and write
B2EC000
stack
page read and write
A884000
trusted library allocation
page read and write
D83000
trusted library allocation
page execute and read and write
F11000
heap
page read and write
56D0000
trusted library allocation
page execute and read and write
92F0000
heap
page read and write
A2BE000
stack
page read and write
4D10000
trusted library allocation
page execute and read and write
5490000
heap
page read and write
5056000
trusted library allocation
page execute and read and write
97AE000
stack
page read and write
70B5000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
59F9000
heap
page read and write
6DE2000
trusted library allocation
page read and write
80F6000
trusted library allocation
page read and write
48FD000
stack
page read and write
771E000
stack
page read and write
270E000
stack
page read and write
5040000
trusted library allocation
page read and write
91DB000
trusted library allocation
page read and write
A322000
heap
page read and write
6CB0000
trusted library allocation
page read and write
97BF000
stack
page read and write
5E00000
heap
page read and write
E14000
trusted library allocation
page read and write
6EAD000
trusted library allocation
page read and write
A8E2000
trusted library allocation
page read and write
5D0000
heap
page read and write
A73F000
stack
page read and write
DAA000
trusted library allocation
page execute and read and write
E63000
heap
page read and write
4C5D000
stack
page read and write
8059000
trusted library allocation
page read and write
A8D0000
trusted library allocation
page read and write
70BA000
trusted library allocation
page read and write
713E000
stack
page read and write
59B0000
heap
page read and write
A2E000
heap
page read and write
A7E0000
trusted library allocation
page execute and read and write
8086000
trusted library allocation
page read and write
DCD000
trusted library allocation
page execute and read and write
7026000
trusted library allocation
page read and write
B770000
trusted library allocation
page read and write
7E9D000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
A2C0000
heap
page read and write
50C0000
heap
page read and write
A65E000
stack
page read and write
4FBE000
trusted library allocation
page read and write
50B0000
heap
page read and write
DC0000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
280A000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
A35E000
stack
page read and write
DB0000
trusted library allocation
page read and write
59BF000
heap
page read and write
752000
unkown
page readonly
5AA0000
heap
page read and write
AF0E000
stack
page read and write
ACCD000
stack
page read and write
524E000
stack
page read and write
C1F000
stack
page read and write
92F3000
heap
page read and write
7FE9000
trusted library allocation
page read and write
716A000
trusted library allocation
page read and write
6E52000
trusted library allocation
page read and write
A810000
trusted library allocation
page execute and read and write
7090000
trusted library allocation
page read and write
7014000
trusted library allocation
page read and write
2EBF000
unkown
page read and write
7FFF000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
2D80000
heap
page read and write
A69E000
stack
page read and write
4CF0000
heap
page readonly
97B0000
trusted library allocation
page read and write
7550000
trusted library section
page read and write
5092000
trusted library allocation
page read and write
E2E000
heap
page read and write
700F000
trusted library allocation
page read and write
510A000
trusted library allocation
page execute and read and write
70B7000
trusted library allocation
page read and write
59D3000
heap
page read and write
81F8000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
79EE000
stack
page read and write
820B000
trusted library allocation
page read and write
B570000
heap
page read and write
9210000
heap
page read and write
B46F000
stack
page read and write
6BA0000
trusted library allocation
page read and write
A8F0000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
A820000
trusted library allocation
page read and write
A748000
trusted library allocation
page read and write
9213000
heap
page read and write
6E4A000
trusted library allocation
page read and write
A63E000
stack
page read and write
6EB5000
trusted library allocation
page read and write
C5E000
stack
page read and write
937E000
stack
page read and write
5100000
heap
page read and write
A890000
trusted library allocation
page read and write
5370000
trusted library section
page read and write
907000
stack
page read and write
4C5E000
trusted library allocation
page read and write
A43E000
stack
page read and write
2D60000
heap
page read and write
6ACB000
trusted library allocation
page execute and read and write
4CD0000
trusted library allocation
page read and write
AF4E000
stack
page read and write
9440000
heap
page read and write
6EA9000
trusted library allocation
page read and write
5A0F000
heap
page read and write
2C0E000
stack
page read and write
2D5E000
unkown
page read and write
A2F1000
heap
page read and write
4D14000
trusted library allocation
page read and write
8099000
trusted library allocation
page read and write
80BD000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
997000
stack
page read and write
6EB1000
trusted library allocation
page read and write
7077000
trusted library allocation
page read and write
5143000
heap
page read and write
4D22000
trusted library allocation
page read and write
B04E000
stack
page read and write
4C50000
heap
page read and write
5138000
heap
page read and write
A8E0000
trusted library allocation
page read and write
A51E000
stack
page read and write
796E000
stack
page read and write
715B000
trusted library allocation
page read and write
91EA000
trusted library allocation
page read and write
BA2E000
stack
page read and write
520E000
stack
page read and write
A8A0000
trusted library allocation
page read and write
5F0000
heap
page read and write
1060000
heap
page execute and read and write
DE6000
trusted library allocation
page execute and read and write
A8C0000
trusted library allocation
page read and write
94D000
stack
page read and write
8060000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
260E000
stack
page read and write
27C1000
trusted library allocation
page read and write
6F13000
trusted library allocation
page read and write
70B6000
trusted library allocation
page read and write
B2F0000
heap
page read and write
C00000
heap
page read and write
4C90000
trusted library allocation
page read and write
980000
heap
page read and write
D93000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
9360000
heap
page read and write
E65000
heap
page read and write
A7A0000
trusted library allocation
page execute and read and write
81C6000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
6F91000
trusted library allocation
page read and write
CE0000
heap
page read and write
6F53000
trusted library allocation
page read and write
530C000
stack
page read and write
6DCE000
stack
page read and write
91EE000
trusted library allocation
page read and write
812C000
trusted library allocation
page read and write
DBB000
trusted library allocation
page execute and read and write
DEA000
trusted library allocation
page execute and read and write
101E000
stack
page read and write
4D33000
heap
page read and write
8108000
trusted library allocation
page read and write
7F38000
trusted library allocation
page read and write
8239000
trusted library allocation
page read and write
A830000
trusted library allocation
page read and write
D15000
heap
page read and write
9550000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
52A000
stack
page read and write
4C80000
trusted library allocation
page read and write
6D64000
trusted library allocation
page read and write
85A000
stack
page read and write
2A90000
heap
page read and write
55CD000
stack
page read and write
806E000
trusted library allocation
page read and write
6CF0000
heap
page execute and read and write
4CAE000
stack
page read and write
7DFD000
trusted library allocation
page read and write
808E000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
A25D000
stack
page read and write
5310000
heap
page read and write
A9CE000
stack
page read and write
E16000
trusted library allocation
page read and write
A740000
trusted library allocation
page read and write
BBAB000
stack
page read and write
4C4B000
trusted library allocation
page read and write
7E14000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
800F000
trusted library allocation
page read and write
527E000
stack
page read and write
5E27000
heap
page read and write
DE0000
heap
page execute and read and write
7043000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
6AC2000
trusted library allocation
page read and write
717E000
stack
page read and write
7EA7000
trusted library allocation
page read and write
DD3000
trusted library allocation
page read and write
A746000
trusted library allocation
page read and write
7D91000
trusted library allocation
page read and write
7E91000
trusted library allocation
page read and write
91FD000
trusted library allocation
page read and write
55ED000
heap
page read and write
D5E000
stack
page read and write
A930000
trusted library allocation
page execute and read and write
50B5000
heap
page read and write
There are 724 hidden memdumps, click here to show them.