IOC Report
Vessel Details.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
Vessel Details.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Vessel Details.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpFFFF.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BacUEoDscugyny.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BacUEoDscugyny.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x8ece147f, page size 16384, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BacUEoDscugyny.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ekhkj04.xjg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4f0ynrhd.n0p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpyigkpa.0vo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ieasai3f.4gs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEF3.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Vessel Details.exe
"C:\Users\user\Desktop\Vessel Details.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\BacUEoDscugyny.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BacUEoDscugyny" /XML "C:\Users\user\AppData\Local\Temp\tmpFFFF.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\BacUEoDscugyny.exe
C:\Users\user\AppData\Roaming\BacUEoDscugyny.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BacUEoDscugyny" /XML "C:\Users\user\AppData\Local\Temp\tmpEF3.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://mail.asiapcm.org
unknown
http://checkip.dyndns.org/
132.226.247.73
https://g.live.com/odclientsettings/Prod-C:
unknown
http://checkip.dyndns.org/q
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://crl.ver)
unknown
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.80.1
http://checkip.dyndns.org
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.asiapcm.org
173.254.28.210
malicious
reallyfreegeoip.org
104.21.80.1
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
173.254.28.210
mail.asiapcm.org
United States
malicious
104.21.80.1
reallyfreegeoip.org
United States
127.0.0.1
unknown
unknown
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2D67000
trusted library allocation
page read and write
malicious
3559000
trusted library allocation
page read and write
malicious
28A1000
trusted library allocation
page read and write
malicious
2AD1000
trusted library allocation
page read and write
malicious
3A19000
trusted library allocation
page read and write
malicious
2A6E000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2C9F000
trusted library allocation
page read and write
malicious
2B35000
trusted library allocation
page read and write
malicious
2C63000
trusted library allocation
page read and write
237FFAA6000
heap
page read and write
D10000
trusted library allocation
page read and write
AD2000
trusted library allocation
page read and write
AA5000
trusted library allocation
page execute and read and write
22E3000
trusted library allocation
page read and write
B04C000
stack
page read and write
2B8F000
trusted library allocation
page read and write
7230000
trusted library section
page read and write
5C6E000
stack
page read and write
9D0000
heap
page read and write
AF0000
trusted library allocation
page read and write
237FFA8A000
heap
page read and write
10D0000
trusted library allocation
page read and write
580D000
heap
page read and write
62C0000
trusted library allocation
page execute and read and write
5120000
heap
page read and write
29E8000
trusted library allocation
page read and write
24C0000
heap
page execute and read and write
6450000
trusted library allocation
page execute and read and write
49FD000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
E5E000
stack
page read and write
CC0000
heap
page read and write
2920000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page read and write
2C2C000
trusted library allocation
page read and write
238053C0000
trusted library allocation
page read and write
B4E000
heap
page read and write
5650000
trusted library allocation
page read and write
22F0000
trusted library allocation
page read and write
23805100000
heap
page read and write
3B3A000
trusted library allocation
page read and write
23804DE0000
trusted library allocation
page read and write
237FFA79000
heap
page read and write
AE2000
trusted library allocation
page read and write
29A0000
heap
page read and write
62B0000
trusted library allocation
page execute and read and write
421000
remote allocation
page execute and read and write
538A000
trusted library allocation
page read and write
6310000
heap
page read and write
BD0000
heap
page read and write
7A3000
heap
page read and write
82F000
heap
page read and write
51C0000
heap
page read and write
22F6000
trusted library allocation
page execute and read and write
27BE000
stack
page read and write
A1E000
stack
page read and write
23804F40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
357F000
stack
page read and write
462000
unkown
page readonly
29B1000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
6EFAFAB000
stack
page read and write
49EE000
trusted library allocation
page read and write
60EE000
stack
page read and write
618E000
stack
page read and write
2B2B000
trusted library allocation
page read and write
BABE000
stack
page read and write
49F1000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
4B40000
heap
page read and write
2953000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
72A0000
trusted library allocation
page execute and read and write
237FFA6F000
heap
page read and write
A8D000
trusted library allocation
page execute and read and write
5A6C000
heap
page read and write
23804F80000
remote allocation
page read and write
2C1C000
trusted library allocation
page read and write
AF4B000
stack
page read and write
E1E000
stack
page read and write
2C48000
trusted library allocation
page read and write
72EE000
stack
page read and write
22E0000
trusted library allocation
page read and write
22D3000
trusted library allocation
page execute and read and write
23804EB0000
trusted library allocation
page read and write
80C000
heap
page read and write
2960000
trusted library allocation
page read and write
50A0000
heap
page read and write
4FF4000
heap
page read and write
628E000
stack
page read and write
99F000
stack
page read and write
CF7000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
B97C000
stack
page read and write
23800000000
heap
page read and write
4E1E000
stack
page read and write
2AE3000
trusted library allocation
page read and write
237FFA9C000
heap
page read and write
422000
remote allocation
page execute and read and write
29EC000
trusted library allocation
page read and write
5180000
trusted library section
page read and write
2DCB000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
54AF000
stack
page read and write
4A20000
trusted library allocation
page read and write
23806000000
heap
page read and write
6EFB47E000
unkown
page readonly
29E4000
trusted library allocation
page read and write
B18F000
stack
page read and write
C39000
heap
page read and write
2BD0000
trusted library allocation
page read and write
B18E000
stack
page read and write
2380011A000
heap
page read and write
AEB000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page execute and read and write
6BA000
stack
page read and write
50D0000
trusted library allocation
page execute and read and write
29A7000
trusted library allocation
page read and write
58B0000
heap
page read and write
36D6000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
BA7000
heap
page read and write
767E000
stack
page read and write
23800104000
heap
page read and write
5EEE000
stack
page read and write
5470000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
4E5E000
trusted library section
page readonly
546E000
stack
page read and write
B1CE000
stack
page read and write
A92000
trusted library allocation
page read and write
23804ED0000
trusted library allocation
page read and write
EAE000
trusted library allocation
page read and write
76BE000
stack
page read and write
517E000
stack
page read and write
5640000
trusted library allocation
page read and write
5A50000
heap
page read and write
6CBE000
stack
page read and write
294A000
trusted library allocation
page read and write
6EFD67E000
unkown
page readonly
4F3C000
stack
page read and write
621A000
trusted library allocation
page read and write
5FE000
stack
page read and write
CBD000
trusted library allocation
page execute and read and write
23805480000
trusted library allocation
page read and write
237FFAAF000
heap
page read and write
55EE000
stack
page read and write
5836000
heap
page read and write
22D0000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
582C000
heap
page read and write
34F1000
trusted library allocation
page read and write
237FFB13000
heap
page read and write
2BDC000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
B30000
trusted library allocation
page execute and read and write
AA7000
trusted library allocation
page execute and read and write
6480000
trusted library allocation
page execute and read and write
23804DD0000
trusted library allocation
page read and write
A73000
trusted library allocation
page execute and read and write
4D30000
heap
page read and write
DF0000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
630E000
stack
page read and write
2380502C000
heap
page read and write
29A3000
trusted library allocation
page read and write
600E000
stack
page read and write
23804E20000
trusted library allocation
page read and write
32CA000
heap
page read and write
51D0000
heap
page read and write
8F7000
stack
page read and write
CDD000
trusted library allocation
page execute and read and write
61EF000
stack
page read and write
23804D60000
trusted library allocation
page read and write
6EFC77C000
stack
page read and write
4D3E000
stack
page read and write
CB3000
trusted library allocation
page execute and read and write
23804EB0000
trusted library allocation
page read and write
237FFA5C000
heap
page read and write
61F8000
trusted library allocation
page read and write
238050C3000
heap
page read and write
468C000
stack
page read and write
5F2E000
stack
page read and write
2D0F000
trusted library allocation
page read and write
393C000
trusted library allocation
page read and write
5AB5000
heap
page read and write
23800D21000
trusted library allocation
page read and write
2302000
trusted library allocation
page read and write
AB3000
trusted library allocation
page execute and read and write
2A09000
trusted library allocation
page read and write
5098000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
644E000
stack
page read and write
328E000
unkown
page read and write
6A00000
heap
page read and write
2A51000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
2980000
heap
page read and write
C55000
heap
page read and write
4AC2000
trusted library allocation
page read and write
4DD0000
heap
page execute and read and write
2B99000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
B2D0000
trusted library allocation
page read and write
6520000
heap
page execute and read and write
2AFB000
trusted library allocation
page read and write
D98000
heap
page read and write
AE0000
heap
page read and write
237FF900000
heap
page read and write
AF7000
stack
page read and write
2B8D000
trusted library allocation
page read and write
23804F20000
trusted library allocation
page read and write
B28D000
stack
page read and write
2A1E000
stack
page read and write
C3C000
heap
page read and write
2C24000
trusted library allocation
page read and write
23804EE0000
trusted library allocation
page read and write
614F000
stack
page read and write
2B2F000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
5D6F000
stack
page read and write
237FFA91000
heap
page read and write
4A40000
trusted library allocation
page read and write
D84000
trusted library allocation
page read and write
6EFB87E000
unkown
page readonly
23805000000
heap
page read and write
6220000
trusted library allocation
page read and write
2380505E000
heap
page read and write
2D28000
trusted library allocation
page read and write
AEA000
heap
page read and write
57C1000
heap
page read and write
460000
unkown
page readonly
61F0000
trusted library allocation
page read and write
CFB000
trusted library allocation
page execute and read and write
6071000
heap
page read and write
23804F30000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
23804EC0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
2B29000
trusted library allocation
page read and write
3671000
trusted library allocation
page read and write
298E000
stack
page read and write
AA6D000
stack
page read and write
B5CE000
stack
page read and write
5370000
trusted library allocation
page read and write
F8E000
stack
page read and write
2890000
heap
page read and write
28E0000
trusted library allocation
page read and write
D90000
heap
page read and write
EA6000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page execute and read and write
2BD4000
trusted library allocation
page read and write
532E000
stack
page read and write
2BC7000
trusted library allocation
page read and write
EBA000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
238050FA000
heap
page read and write
B10000
heap
page read and write
100A000
heap
page read and write
108F000
stack
page read and write
360C000
trusted library allocation
page read and write
602E000
stack
page read and write
38C9000
trusted library allocation
page read and write
237FFA2B000
heap
page read and write
2C7F000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
3B55000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
2A5B000
trusted library allocation
page read and write
294E000
trusted library allocation
page read and write
237FFAAA000
heap
page read and write
FDE000
trusted library allocation
page read and write
C7E000
stack
page read and write
2A71000
trusted library allocation
page read and write
CE2000
trusted library allocation
page read and write
4EC0000
heap
page read and write
2380501F000
heap
page read and write
3AF9000
trusted library allocation
page read and write
EBE000
trusted library allocation
page read and write
B48E000
stack
page read and write
50A3000
heap
page read and write
24D0000
trusted library allocation
page read and write
237FFA13000
heap
page read and write
C05000
heap
page read and write
49D0000
trusted library allocation
page read and write
237FFAFE000
heap
page read and write
58C0000
heap
page read and write
FE1000
trusted library allocation
page read and write
22D4000
trusted library allocation
page read and write
AA70000
heap
page read and write
2AD8000
trusted library allocation
page read and write
237FFB06000
heap
page read and write
53A3000
heap
page execute and read and write
2C20000
trusted library allocation
page read and write
237FFA74000
heap
page read and write
5A68000
heap
page read and write
2E28000
trusted library allocation
page read and write
6C50000
heap
page read and write
AE0000
trusted library allocation
page read and write
57B3000
heap
page read and write
5384000
trusted library allocation
page read and write
B60E000
stack
page read and write
2940000
trusted library allocation
page read and write
49D4000
trusted library allocation
page read and write
6EFB67E000
unkown
page readonly
2BD8000
trusted library allocation
page read and write
ADEE000
stack
page read and write
6EFB577000
stack
page read and write
5B50000
heap
page read and write
23805086000
heap
page read and write
57C5000
heap
page read and write
2B79000
trusted library allocation
page read and write
23804E10000
trusted library allocation
page read and write
51D5000
heap
page read and write
52DD000
stack
page read and write
2A5E000
stack
page read and write
AB4000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
5380000
trusted library allocation
page execute and read and write
AD6000
trusted library allocation
page execute and read and write
B87000
heap
page read and write
FCB000
trusted library allocation
page read and write
237FFB17000
heap
page read and write
A9A000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
AD0000
trusted library allocation
page read and write
23804F30000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
1000000
heap
page read and write
50FD000
stack
page read and write
6E52000
trusted library allocation
page read and write
53A0000
heap
page execute and read and write
4F0000
unkown
page readonly
23804F80000
remote allocation
page read and write
50E0000
heap
page execute and read and write
AC3000
trusted library allocation
page read and write
61F6000
trusted library allocation
page read and write
3620000
heap
page read and write
23800113000
heap
page read and write
2DD4000
trusted library allocation
page read and write
B82000
heap
page read and write
750000
heap
page read and write
5630000
trusted library allocation
page execute and read and write
4A16000
trusted library allocation
page read and write
4A35000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
373C000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
6300000
heap
page execute and read and write
57F3000
heap
page read and write
5F0E000
stack
page read and write
795000
heap
page read and write
542E000
stack
page read and write
6EFC07E000
unkown
page readonly
32C0000
heap
page read and write
76E000
heap
page read and write
DDE000
stack
page read and write
2A32000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
10CE000
stack
page read and write
AC0000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
B00000
heap
page read and write
230B000
trusted library allocation
page execute and read and write
8C7E000
stack
page read and write
9C5000
heap
page read and write
2E9000
stack
page read and write
6210000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
237FFF90000
trusted library allocation
page read and write
3AD1000
trusted library allocation
page read and write
4B30000
heap
page read and write
2956000
trusted library allocation
page read and write
2970000
trusted library allocation
page execute and read and write
E7D000
heap
page read and write
900000
heap
page read and write
5090000
trusted library allocation
page read and write
6EFD5FE000
stack
page read and write
2910000
heap
page read and write
AE7000
trusted library allocation
page execute and read and write
237FFA00000
heap
page read and write
A70000
trusted library allocation
page read and write
23804DE1000
trusted library allocation
page read and write
5A74000
heap
page read and write
57C9000
heap
page read and write
4DB8000
trusted library allocation
page read and write
EC1000
trusted library allocation
page read and write
6066000
heap
page read and write
5DCB000
heap
page read and write
51A0000
trusted library allocation
page read and write
2380011A000
heap
page read and write
29CF000
unkown
page read and write
23804ED0000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
809000
heap
page read and write
536E000
stack
page read and write
2C83000
trusted library allocation
page read and write
23800002000
heap
page read and write
25E7000
trusted library allocation
page read and write
BCA000
heap
page read and write
237FFA0B000
heap
page read and write
4DB0000
trusted library allocation
page read and write
23804E24000
trusted library allocation
page read and write
94E000
stack
page read and write
3B5E000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
6F1E000
stack
page read and write
2A76000
trusted library allocation
page read and write
237FFAA8000
heap
page read and write
F28000
trusted library allocation
page read and write
A86E000
stack
page read and write
2DDE000
trusted library allocation
page read and write
5B88000
heap
page read and write
4AD0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
B8D000
stack
page read and write
29D0000
heap
page read and write
3924000
trusted library allocation
page read and write
768000
heap
page read and write
5020000
heap
page execute and read and write
4E60000
heap
page read and write
288E000
unkown
page read and write
CE0000
trusted library allocation
page read and write
23805065000
heap
page read and write
29E0000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
353E000
stack
page read and write
B70E000
stack
page read and write
2307000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
8C3F000
stack
page read and write
10E0000
heap
page read and write
B4E000
stack
page read and write
27E0000
heap
page execute and read and write
24E0000
heap
page read and write
DC6000
heap
page read and write
5D70000
heap
page read and write
ADE000
stack
page read and write
23804DC0000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
5F0000
heap
page read and write
23804DE2000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
237FFB02000
heap
page read and write
39B1000
trusted library allocation
page read and write
62F0000
heap
page read and write
5A9A000
heap
page read and write
A80000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
BAD0000
trusted library allocation
page read and write
B84000
heap
page read and write
A7D000
trusted library allocation
page execute and read and write
2A30000
trusted library allocation
page read and write
238050A4000
heap
page read and write
23805058000
heap
page read and write
4ADA000
trusted library allocation
page read and write
5B60000
heap
page read and write
CD0000
trusted library allocation
page read and write
6470000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
B9BE000
stack
page read and write
51B0000
trusted library section
page readonly
E00000
trusted library allocation
page read and write
ADA000
trusted library allocation
page execute and read and write
57B0000
heap
page read and write
E05000
trusted library allocation
page read and write
89E000
stack
page read and write
FE6000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
AA2000
trusted library allocation
page read and write
D7F000
trusted library allocation
page read and write
5EAD000
stack
page read and write
4E50000
trusted library section
page readonly
E1C000
heap
page read and write
5370000
trusted library allocation
page execute and read and write
24B0000
trusted library allocation
page execute and read and write
38A1000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
634E000
stack
page read and write
6510000
heap
page read and write
C3E000
stack
page read and write
4AA0000
heap
page read and write
740000
heap
page read and write
6200000
trusted library allocation
page execute and read and write
763E000
stack
page read and write
3B6A000
trusted library allocation
page read and write
2B40000
heap
page read and write
23804EE0000
trusted library allocation
page read and write
23804E10000
trusted library allocation
page read and write
CF5000
trusted library allocation
page execute and read and write
6EFBA7E000
unkown
page readonly
2A17000
trusted library allocation
page read and write
2380504E000
heap
page read and write
246E000
stack
page read and write
650000
heap
page read and write
4B20000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
76A000
stack
page read and write
2DB2000
trusted library allocation
page read and write
2770000
heap
page read and write
2968000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
237FFAAF000
heap
page read and write
2897000
heap
page read and write
23804D50000
trusted library allocation
page read and write
AD0000
trusted library allocation
page execute and read and write
2890000
heap
page read and write
B08E000
stack
page read and write
3E7000
stack
page read and write
393A000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
49DB000
trusted library allocation
page read and write
5B0000
heap
page read and write
F1F000
stack
page read and write
EF0000
trusted library allocation
page read and write
98E000
stack
page read and write
61FB000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
4AAD000
stack
page read and write
FED000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
4ED0000
heap
page read and write
CF2000
trusted library allocation
page read and write
62CE000
stack
page read and write
6B7E000
stack
page read and write
CEA000
trusted library allocation
page execute and read and write
2E26000
trusted library allocation
page read and write
6010000
heap
page read and write
AF4000
trusted library allocation
page read and write
23805069000
heap
page read and write
AAB000
trusted library allocation
page execute and read and write
2AED000
trusted library allocation
page read and write
4BCE000
stack
page read and write
A60000
trusted library allocation
page read and write
6A31000
heap
page read and write
5C2E000
stack
page read and write
4A10000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
237FFA41000
heap
page read and write
23800640000
trusted library allocation
page read and write
A96000
trusted library allocation
page execute and read and write
EAB000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
EC6000
trusted library allocation
page read and write
B290000
heap
page read and write
2320000
trusted library allocation
page read and write
CE6000
trusted library allocation
page execute and read and write
238050CC000
heap
page read and write
237FFA8C000
heap
page read and write
23800015000
heap
page read and write
601E000
heap
page read and write
5398000
trusted library allocation
page read and write
720000
heap
page read and write
2FDA000
stack
page read and write
238050F7000
heap
page read and write
236E000
stack
page read and write
5A4E000
stack
page read and write
2966000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
237FFA77000
heap
page read and write
6EFB979000
stack
page read and write
237FFABA000
heap
page read and write
4B00000
trusted library allocation
page execute and read and write
DDC000
stack
page read and write
E4B000
heap
page read and write
CB0000
trusted library allocation
page read and write
B40000
heap
page read and write
23805041000
heap
page read and write
A45000
heap
page read and write
6230000
trusted library allocation
page execute and read and write
238050FE000
heap
page read and write
33E0000
heap
page read and write
7D0000
heap
page read and write
4FB0000
trusted library allocation
page execute and read and write
4B43000
heap
page read and write
23804E13000
trusted library allocation
page read and write
237FFAFE000
heap
page read and write
2A4D000
trusted library allocation
page read and write
50CE000
stack
page read and write
238050F1000
heap
page read and write
787000
heap
page read and write
2577000
trusted library allocation
page read and write
2AA7000
trusted library allocation
page read and write
237FFAA2000
heap
page read and write
54A000
stack
page read and write
2AFF000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
2AC0000
heap
page execute and read and write
4A02000
trusted library allocation
page read and write
6EFB77E000
stack
page read and write
237FFAAA000
heap
page read and write
F10000
heap
page read and write
2C18000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
D9F000
stack
page read and write
CB4000
trusted library allocation
page read and write
2380510A000
heap
page read and write
4D1B000
stack
page read and write
29F8000
trusted library allocation
page read and write
23804DE0000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
A96E000
stack
page read and write
4F4E000
stack
page read and write
34F9000
trusted library allocation
page read and write
4FF0000
heap
page read and write
2D0A000
trusted library allocation
page read and write
D86000
trusted library allocation
page read and write
22DD000
trusted library allocation
page execute and read and write
D7E000
stack
page read and write
2E32000
trusted library allocation
page read and write
238050E4000
heap
page read and write
57AE000
stack
page read and write
2932000
trusted library allocation
page read and write
23804F80000
remote allocation
page read and write
34FF000
unkown
page read and write
6240000
trusted library allocation
page read and write
237FF800000
heap
page read and write
C8B000
heap
page read and write
AA0000
trusted library allocation
page read and write
238050C5000
heap
page read and write
6081000
heap
page read and write
6EFC87E000
unkown
page readonly
23804E00000
trusted library allocation
page read and write
D3E000
stack
page read and write
2AF6000
trusted library allocation
page read and write
BF0000
heap
page read and write
50B0000
heap
page read and write
50E3000
heap
page execute and read and write
4A14000
trusted library allocation
page read and write
5DD6000
heap
page read and write
6EFBF7B000
stack
page read and write
24AB000
stack
page read and write
BF5000
heap
page read and write
499E000
stack
page read and write
238050D6000
heap
page read and write
4DBF000
trusted library allocation
page read and write
23804F10000
trusted library allocation
page read and write
5A64000
heap
page read and write
AB0000
trusted library allocation
page read and write
ACD000
trusted library allocation
page execute and read and write
660000
heap
page read and write
23800102000
heap
page read and write
28AE000
stack
page read and write
B74000
heap
page read and write
5A76000
heap
page read and write
23805102000
heap
page read and write
29A0000
heap
page read and write
2ADD000
trusted library allocation
page read and write
49F6000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
22ED000
trusted library allocation
page execute and read and write
A76F000
stack
page read and write
23800390000
trusted library allocation
page read and write
ACEE000
stack
page read and write
D5E000
stack
page read and write
6079000
heap
page read and write
BD8000
heap
page read and write
423000
remote allocation
page execute and read and write
237FF820000
heap
page read and write
23800900000
trusted library allocation
page read and write
ED2000
trusted library allocation
page read and write
6F9D000
stack
page read and write
9C0000
heap
page read and write
4EC3000
heap
page read and write
22F2000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
6C7F000
stack
page read and write
4CE0000
heap
page read and write
58A000
stack
page read and write
76FE000
stack
page read and write
A74000
trusted library allocation
page read and write
23800D50000
trusted library allocation
page read and write
2A7D000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
44F8000
trusted library allocation
page read and write
7E0000
heap
page read and write
2300000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
9DE000
stack
page read and write
7A0000
heap
page read and write
3290000
heap
page read and write
4AC0000
trusted library allocation
page read and write
24F1000
trusted library allocation
page read and write
4F50000
heap
page read and write
2996000
trusted library allocation
page read and write
238050FC000
heap
page read and write
B4A000
heap
page read and write
2A9F000
trusted library allocation
page read and write
B4CD000
stack
page read and write
8F7000
stack
page read and write
294B000
trusted library allocation
page read and write
23800100000
heap
page read and write
22FA000
trusted library allocation
page execute and read and write
760000
heap
page read and write
8B3F000
stack
page read and write
2983000
heap
page read and write
69B0000
heap
page read and write
DE0000
trusted library allocation
page read and write
E10000
heap
page read and write
2C55000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
B87C000
stack
page read and write
665000
heap
page read and write
538E000
trusted library allocation
page read and write
D90000
heap
page execute and read and write
2570000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
6EFB37E000
stack
page read and write
ACAE000
stack
page read and write
73EE000
stack
page read and write
2C14000
trusted library allocation
page read and write
ABAD000
stack
page read and write
547E000
trusted library allocation
page read and write
DBA000
heap
page read and write
562E000
stack
page read and write
237FFB02000
heap
page read and write
ECD000
trusted library allocation
page read and write
67D000
stack
page read and write
6490000
trusted library allocation
page execute and read and write
23804ED0000
trusted library allocation
page read and write
B2CF000
stack
page read and write
2BE8000
trusted library allocation
page read and write
3240000
heap
page read and write
6F5E000
stack
page read and write
2F9D000
stack
page read and write
There are 734 hidden memdumps, click here to show them.