IOC Report
PO#98540-00.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
PO#98540-00.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#98540-00.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpF9AE.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ACLAoT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xddc40bd1, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ACLAoT.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bzqc1rx0.idf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cotqcywx.mge.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dbohxke5.1qo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pk3wtbaw.yla.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sdi05r4g.zhp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tbqodxfc.o2y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvjqci1v.5kt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zc3jvgt4.gyj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp73A.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\ACLAoT.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO#98540-00.exe
"C:\Users\user\Desktop\PO#98540-00.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO#98540-00.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ACLAoT.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ACLAoT" /XML "C:\Users\user\AppData\Local\Temp\tmpF9AE.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\ACLAoT.exe
C:\Users\user\AppData\Roaming\ACLAoT.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ACLAoT" /XML "C:\Users\user\AppData\Local\Temp\tmp73A.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:642294%0D%0ADate%20a
unknown
https://www.office.com/X
unknown
http://mail.dhakahome.com
unknown
http://r10.i.lencr.org/0r
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:642294%0D%0ADate%20and%20Time:%2028/03/2025%20/%2019:56:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20642294%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://ac.ecosia.org?q=
unknown
http://c.pki.goog/r/r4.crl
142.250.81.227
http://r10.o.lencr.org0#
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:642294%0D%0ADate%20and%20Time:%2028/03/2025%20/%2019:56:24%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20642294%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=en4
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://www.ecosia.org/newtab/v20
unknown
http://checkip.dyndns.org/
132.226.247.73
https://www.office.com/4
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://c.pki.goog/r/gsr1.crl
142.250.81.227
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.64.1
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://chrome.google.com/webstore?hl=enX
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.dhakahome.com
132.148.178.5
malicious
reallyfreegeoip.org
104.21.64.1
api.telegram.org
149.154.167.220
pki-goog.l.google.com
142.250.81.227
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown
c.pki.goog
unknown

IPs

IP
Domain
Country
Malicious
132.148.178.5
mail.dhakahome.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
104.21.64.1
reallyfreegeoip.org
United States
127.0.0.1
unknown
unknown
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2CA1000
trusted library allocation
page read and write
malicious
2A61000
trusted library allocation
page read and write
malicious
41A8000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
3F19000
trusted library allocation
page read and write
malicious
66D0000
trusted library allocation
page execute and read and write
3AC8000
trusted library allocation
page read and write
243A000
stack
page read and write
511B000
trusted library allocation
page read and write
6680000
trusted library allocation
page execute and read and write
26FA000
trusted library allocation
page read and write
3F0000
unkown
page readonly
196BEBA0000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
290E000
stack
page read and write
3E53000
trusted library allocation
page read and write
649E000
stack
page read and write
2A98000
trusted library allocation
page read and write
730000
heap
page read and write
ACAE000
stack
page read and write
4A68000
trusted library allocation
page read and write
C4E000
stack
page read and write
2D49000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
B3FE000
stack
page read and write
952277E000
unkown
page readonly
2C16000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
B1CD000
stack
page read and write
196BEC10000
trusted library allocation
page read and write
9522879000
stack
page read and write
2CFD000
trusted library allocation
page read and write
3D0C000
trusted library allocation
page read and write
F7C000
heap
page read and write
25B0000
heap
page read and write
2A20000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
2B0C000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
6840000
heap
page read and write
3F80000
trusted library allocation
page read and write
D85000
heap
page read and write
4F70000
heap
page execute and read and write
4BCA000
trusted library allocation
page read and write
5020000
heap
page read and write
4FE4000
trusted library allocation
page read and write
538E000
stack
page read and write
6BE0000
heap
page read and write
621B000
heap
page read and write
2D55000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
95223FE000
stack
page read and write
4F80000
heap
page read and write
3CEC000
trusted library allocation
page read and write
51D4000
heap
page read and write
2F54000
trusted library allocation
page read and write
2A22000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
4F0E000
stack
page read and write
D80000
heap
page read and write
9521B7E000
unkown
page readonly
EC6000
heap
page read and write
6238000
heap
page read and write
50E0000
heap
page read and write
431000
remote allocation
page execute and read and write
66B0000
trusted library allocation
page execute and read and write
27A5000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
AB70000
heap
page read and write
DAA000
trusted library allocation
page execute and read and write
AAB000
trusted library allocation
page execute and read and write
196BF04C000
heap
page read and write
4FBA000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
A96000
trusted library allocation
page execute and read and write
AA7000
trusted library allocation
page execute and read and write
27A3000
trusted library allocation
page read and write
9522B7E000
unkown
page readonly
196B9A2B000
heap
page read and write
5EEE000
stack
page read and write
196BA11A000
heap
page read and write
5122000
trusted library allocation
page read and write
196B9A73000
heap
page read and write
6770000
trusted library allocation
page execute and read and write
F01000
heap
page read and write
42A000
remote allocation
page execute and read and write
4B0E000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
9522E7B000
stack
page read and write
90A000
trusted library allocation
page execute and read and write
DFB000
stack
page read and write
2778000
trusted library allocation
page read and write
B60E000
stack
page read and write
8FD000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
3C86000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
952197E000
unkown
page readonly
A8D000
trusted library allocation
page execute and read and write
622B000
heap
page read and write
3D73000
trusted library allocation
page read and write
5260000
trusted library section
page readonly
196BF08C000
heap
page read and write
4F4E000
trusted library section
page readonly
BBE000
stack
page read and write
2DAA000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
B80000
heap
page read and write
3B26000
trusted library allocation
page read and write
25AE000
unkown
page read and write
6B50000
heap
page read and write
3D3E000
trusted library allocation
page read and write
F4A000
heap
page read and write
C3E000
heap
page read and write
F35000
heap
page read and write
47AC000
stack
page read and write
D37000
stack
page read and write
952177E000
unkown
page readonly
1060000
heap
page read and write
DA6000
trusted library allocation
page execute and read and write
196BEE20000
trusted library allocation
page read and write
3C70000
trusted library allocation
page read and write
196B9A22000
heap
page read and write
2876000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
95221FE000
stack
page read and write
2FF3000
trusted library allocation
page read and write
5950000
heap
page read and write
95234FE000
stack
page read and write
ABCE000
stack
page read and write
196B9810000
heap
page read and write
4B22000
trusted library allocation
page read and write
28CA000
stack
page read and write
67F5000
trusted library allocation
page read and write
666A000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
442000
remote allocation
page execute and read and write
E77000
heap
page read and write
E20000
heap
page read and write
6790000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
64FE000
stack
page read and write
9DF000
heap
page read and write
B70000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
409000
remote allocation
page execute and read and write
3D67000
trusted library allocation
page read and write
196B9A79000
heap
page read and write
1050000
trusted library allocation
page read and write
284C000
stack
page read and write
2DA7000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
AE0000
trusted library allocation
page execute and read and write
4AF0000
trusted library allocation
page read and write
6D1E000
stack
page read and write
2E29000
trusted library allocation
page read and write
196BEE10000
trusted library allocation
page read and write
3ACB000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
9521A7C000
stack
page read and write
2A40000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
8E4000
trusted library allocation
page read and write
3D92000
trusted library allocation
page read and write
2A25000
trusted library allocation
page execute and read and write
26B1000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
631D000
stack
page read and write
3D01000
trusted library allocation
page read and write
6F7000
stack
page read and write
36B9000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
FCA000
heap
page read and write
42B000
remote allocation
page execute and read and write
B00000
trusted library allocation
page read and write
3D5E000
trusted library allocation
page read and write
513D000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
6219000
heap
page read and write
407000
remote allocation
page execute and read and write
42E000
remote allocation
page execute and read and write
5B0000
heap
page read and write
D70000
heap
page read and write
196BA7F0000
trusted library section
page readonly
67E7000
trusted library allocation
page read and write
71CD000
stack
page read and write
2C18000
trusted library allocation
page read and write
597A000
heap
page read and write
6678000
trusted library allocation
page read and write
D83000
trusted library allocation
page execute and read and write
900000
trusted library allocation
page read and write
196B9A13000
heap
page read and write
2ADB000
trusted library allocation
page read and write
61E0000
heap
page read and write
A74000
trusted library allocation
page read and write
974000
heap
page read and write
36B1000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
9521FFE000
stack
page read and write
F33000
heap
page read and write
5A2A000
heap
page read and write
5150000
trusted library allocation
page read and write
4A3C000
stack
page read and write
2F21000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
2BBB000
heap
page read and write
2B6C000
trusted library allocation
page read and write
667E000
stack
page read and write
2D88000
trusted library allocation
page read and write
3CA1000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
6710000
trusted library allocation
page execute and read and write
403000
remote allocation
page execute and read and write
BA7000
heap
page read and write
2E52000
trusted library allocation
page read and write
196BA800000
trusted library section
page readonly
4DB0000
heap
page read and write
582E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
51C0000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
2910000
heap
page execute and read and write
43F000
remote allocation
page execute and read and write
5080000
trusted library section
page read and write
B2CE000
stack
page read and write
D90000
heap
page read and write
196BA000000
heap
page read and write
73C46000
unkown
page readonly
B75000
trusted library allocation
page read and write
E6A000
heap
page read and write
2DB1000
trusted library allocation
page read and write
B30C000
stack
page read and write
D84000
trusted library allocation
page read and write
196B9AFD000
heap
page read and write
952157E000
unkown
page readonly
66B0000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
ACD0000
heap
page read and write
67A0000
trusted library allocation
page execute and read and write
3941000
trusted library allocation
page read and write
28D0000
trusted library allocation
page execute and read and write
50CD000
stack
page read and write
3CC9000
trusted library allocation
page read and write
196B9B13000
heap
page read and write
7B0000
heap
page read and write
A7CE000
stack
page read and write
73C4F000
unkown
page readonly
3B2F000
trusted library allocation
page read and write
A20000
heap
page read and write
4FBE000
trusted library allocation
page read and write
AE2E000
stack
page read and write
2D13000
trusted library allocation
page read and write
710E000
stack
page read and write
196BA7D0000
trusted library section
page readonly
4DAB000
stack
page read and write
2C1A000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
6BF4000
heap
page read and write
B50E000
stack
page read and write
2EAD000
trusted library allocation
page read and write
410000
remote allocation
page execute and read and write
29E0000
trusted library allocation
page read and write
3D0A000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page execute and read and write
2B18000
trusted library allocation
page read and write
196BA810000
trusted library section
page readonly
3D14000
trusted library allocation
page read and write
66AD000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
196BAB61000
trusted library allocation
page read and write
BC0000
heap
page read and write
635E000
stack
page read and write
AA2000
trusted library allocation
page read and write
4BB2000
trusted library allocation
page read and write
A90E000
stack
page read and write
428000
remote allocation
page execute and read and write
2CDF000
trusted library allocation
page read and write
8ED000
trusted library allocation
page execute and read and write
2D59000
trusted library allocation
page read and write
653E000
stack
page read and write
2FF7000
trusted library allocation
page read and write
6218000
heap
page read and write
2F11000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
3F2000
unkown
page readonly
657E000
stack
page read and write
4B3C000
stack
page read and write
61DE000
stack
page read and write
3B1D000
trusted library allocation
page read and write
6720000
trusted library allocation
page execute and read and write
6E1F000
stack
page read and write
4CC8000
trusted library allocation
page read and write
3D5E000
trusted library allocation
page read and write
714F000
stack
page read and write
196BF100000
heap
page read and write
3DC4000
trusted library allocation
page read and write
6CD0000
heap
page read and write
6221000
heap
page read and write
A9CE000
stack
page read and write
60DE000
stack
page read and write
2C68000
trusted library allocation
page read and write
2A37000
trusted library allocation
page read and write
BE0000
heap
page read and write
113E000
stack
page read and write
298A000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
2640000
heap
page read and write
4F40000
trusted library section
page readonly
2B3F000
stack
page read and write
4CE3000
heap
page read and write
DB5000
trusted library allocation
page execute and read and write
AD0000
trusted library allocation
page read and write
73C4D000
unkown
page read and write
55DE000
stack
page read and write
5270000
heap
page read and write
50F0000
heap
page read and write
2AD7000
trusted library allocation
page read and write
196BEF30000
trusted library allocation
page read and write
196B9B02000
heap
page read and write
C50000
heap
page read and write
5110000
trusted library allocation
page read and write
952207E000
unkown
page readonly
B8A000
heap
page read and write
2B08000
trusted library allocation
page read and write
196BA100000
heap
page read and write
196BEE30000
trusted library allocation
page read and write
6CF0000
trusted library section
page read and write
952227E000
unkown
page readonly
2EA2000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
196BAB90000
trusted library allocation
page read and write
196BF10A000
heap
page read and write
3B64000
trusted library allocation
page read and write
714E000
stack
page read and write
196BEF50000
trusted library allocation
page read and write
E75000
heap
page read and write
A60000
trusted library allocation
page read and write
B2BF000
stack
page read and write
59A9000
heap
page read and write
ADEE000
stack
page read and write
2600000
heap
page read and write
196B9A94000
heap
page read and write
27BF000
stack
page read and write
59E0000
heap
page read and write
67E0000
trusted library allocation
page read and write
3AE0000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
2AFE000
stack
page read and write
196BA11A000
heap
page read and write
196BA7C0000
trusted library section
page readonly
51D0000
heap
page read and write
28FA000
trusted library allocation
page read and write
5AF0000
heap
page read and write
2D7B000
trusted library allocation
page read and write
C39000
stack
page read and write
AB0000
heap
page read and write
562D000
stack
page read and write
196BEEC0000
trusted library allocation
page read and write
1040000
trusted library allocation
page execute and read and write
C05000
trusted library allocation
page read and write
66F0000
trusted library allocation
page execute and read and write
4FCD000
trusted library allocation
page read and write
4FE6000
trusted library allocation
page read and write
9521477000
stack
page read and write
288D000
stack
page read and write
DBB000
trusted library allocation
page execute and read and write
2D61000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
2CCF000
trusted library allocation
page read and write
AF4D000
stack
page read and write
9521EFE000
stack
page read and write
42C000
remote allocation
page execute and read and write
196BF0F5000
heap
page read and write
1AD000
stack
page read and write
67B6000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
196BEF90000
remote allocation
page read and write
952257E000
stack
page read and write
196BEE49000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
2930000
heap
page read and write
667D000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
196BA301000
trusted library allocation
page read and write
50F3000
heap
page read and write
952267E000
unkown
page readonly
8F3000
trusted library allocation
page read and write
F46000
heap
page read and write
4CC0000
trusted library allocation
page read and write
3ED9000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
60EE000
stack
page read and write
5100000
trusted library allocation
page read and write
196BEF90000
remote allocation
page read and write
6DDE000
stack
page read and write
9E8000
heap
page read and write
2490000
heap
page read and write
B60000
trusted library allocation
page execute and read and write
196BF0C0000
heap
page read and write
51A0000
trusted library allocation
page execute and read and write
D1E000
stack
page read and write
5A0A000
heap
page read and write
196BEEC0000
trusted library allocation
page read and write
3DA2000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
6700000
trusted library allocation
page execute and read and write
4E73000
heap
page read and write
DA2000
trusted library allocation
page read and write
66E0000
trusted library allocation
page execute and read and write
443000
remote allocation
page execute and read and write
28E0000
trusted library allocation
page read and write
196B9A8F000
heap
page read and write
61F0000
heap
page read and write
2ABD000
trusted library allocation
page read and write
A9A000
trusted library allocation
page execute and read and write
420000
remote allocation
page execute and read and write
2A27000
trusted library allocation
page execute and read and write
5250000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
3A89000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
6696000
trusted library allocation
page read and write
6EDF000
stack
page read and write
3F55000
trusted library allocation
page read and write
77D000
stack
page read and write
5978000
heap
page read and write
196B9AA0000
heap
page read and write
912000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
3B36000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
73C4D000
unkown
page read and write
66A0000
trusted library allocation
page read and write
A92000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
4C3E000
stack
page read and write
6226000
heap
page read and write
8E3000
trusted library allocation
page execute and read and write
D28000
trusted library allocation
page read and write
4C90000
trusted library allocation
page execute and read and write
EC3000
heap
page read and write
C10000
heap
page read and write
196BF0FB000
heap
page read and write
9521D7E000
unkown
page readonly
196BA015000
heap
page read and write
6817000
trusted library allocation
page read and write
6666000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
196BEF20000
trusted library allocation
page read and write
196B9910000
heap
page read and write
AE80000
trusted library allocation
page read and write
3D77000
trusted library allocation
page read and write
565E000
stack
page read and write
2D12000
trusted library allocation
page read and write
B3E000
stack
page read and write
54DE000
stack
page read and write
E1E000
stack
page read and write
94E000
heap
page read and write
B10000
heap
page execute and read and write
4B16000
trusted library allocation
page read and write
3D47000
trusted library allocation
page read and write
59F0000
heap
page read and write
196BEDF1000
trusted library allocation
page read and write
196B9A5B000
heap
page read and write
2E25000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
3F42000
trusted library allocation
page read and write
7B5000
heap
page read and write
2A8F000
unkown
page read and write
287D000
trusted library allocation
page read and write
57EE000
stack
page read and write
F9F000
stack
page read and write
2BB0000
heap
page read and write
9522D7E000
unkown
page readonly
EAE000
heap
page read and write
655E000
stack
page read and write
3BE0000
trusted library allocation
page read and write
2F5A000
trusted library allocation
page read and write
5170000
heap
page read and write
3F9F000
trusted library allocation
page read and write
2920000
trusted library allocation
page execute and read and write
3EC7000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
3D42000
trusted library allocation
page read and write
6B64000
heap
page read and write
67E4000
trusted library allocation
page read and write
196BA113000
heap
page read and write
3F2D000
trusted library allocation
page read and write
A73000
trusted library allocation
page execute and read and write
95226FE000
stack
page read and write
952237E000
unkown
page readonly
B04E000
stack
page read and write
EBA000
heap
page read and write
2E34000
trusted library allocation
page read and write
B1BD000
stack
page read and write
4CCF000
trusted library allocation
page read and write
3B06000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
561E000
stack
page read and write
4FE0000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
5F9D000
stack
page read and write
A80000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
632D000
stack
page read and write
D7E000
stack
page read and write
2AD3000
trusted library allocation
page read and write
2B6C000
stack
page read and write
196BF02B000
heap
page read and write
29F0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
FC0000
heap
page read and write
5420000
trusted library allocation
page read and write
6694000
trusted library allocation
page read and write
196BF0D0000
heap
page read and write
2AB0000
heap
page read and write
196BF0D6000
heap
page read and write
196BEC00000
trusted library allocation
page read and write
29F3000
trusted library allocation
page execute and read and write
29FD000
trusted library allocation
page execute and read and write
2CD5000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
43D000
remote allocation
page execute and read and write
BF0000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
BD6000
trusted library allocation
page read and write
3949000
trusted library allocation
page read and write
B17C000
stack
page read and write
97F000
heap
page read and write
91B000
trusted library allocation
page execute and read and write
5283000
heap
page read and write
BB5000
heap
page read and write
27B6000
trusted library allocation
page read and write
59BD000
heap
page read and write
64BE000
stack
page read and write
2FE4000
trusted library allocation
page read and write
981000
heap
page read and write
196BA002000
heap
page read and write
EF5000
heap
page read and write
2B1C000
trusted library allocation
page read and write
720000
heap
page read and write
3EB1000
trusted library allocation
page read and write
5285000
heap
page read and write
4B60000
trusted library allocation
page read and write
E00000
heap
page read and write
FCE000
stack
page read and write
B5E000
stack
page read and write
3BA000
stack
page read and write
196BA650000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
C00000
heap
page read and write
2FBD000
trusted library allocation
page read and write
6870000
heap
page read and write
952297E000
unkown
page readonly
56A0000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
A7D000
trusted library allocation
page execute and read and write
196BEE34000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
4B1D000
trusted library allocation
page read and write
E98000
heap
page read and write
196B9FA0000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
952167E000
stack
page read and write
A8CE000
stack
page read and write
524D000
stack
page read and write
BC2000
heap
page read and write
264B000
heap
page read and write
4BC0000
trusted library allocation
page read and write
AE90000
trusted library allocation
page read and write
CA5000
heap
page read and write
2A4E000
unkown
page read and write
2800000
heap
page read and write
2F2A000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
596C000
heap
page read and write
2D18000
trusted library allocation
page read and write
40E000
remote allocation
page execute and read and write
621F000
heap
page read and write
5154000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
507D000
stack
page read and write
665E000
stack
page read and write
4AFB000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page execute and read and write
4FC6000
trusted library allocation
page read and write
196BEDF0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
2B80000
trusted library allocation
page execute and read and write
196B9B29000
heap
page read and write
4CE0000
heap
page read and write
6C50000
heap
page read and write
2D45000
trusted library allocation
page read and write
9520E9B000
stack
page read and write
5136000
trusted library allocation
page read and write
2A90000
heap
page read and write
A0D000
heap
page read and write
EF9000
heap
page read and write
2D41000
trusted library allocation
page read and write
B40000
heap
page read and write
430000
remote allocation
page execute and read and write
AACF000
stack
page read and write
2B20000
trusted library allocation
page read and write
53A000
stack
page read and write
A90000
trusted library allocation
page read and write
51A0000
heap
page read and write
440000
remote allocation
page execute and read and write
2F2F000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
2FC2000
trusted library allocation
page read and write
429000
remote allocation
page execute and read and write
A70000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
2941000
trusted library allocation
page read and write
196B9A7B000
heap
page read and write
42F000
remote allocation
page execute and read and write
9522C7E000
stack
page read and write
5280000
heap
page read and write
5A60000
heap
page read and write
5E5F000
stack
page read and write
9521C7B000
stack
page read and write
B8E000
heap
page read and write
ACCD000
stack
page read and write
CA0000
heap
page read and write
6830000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
196BF064000
heap
page read and write
6756000
trusted library allocation
page read and write
285B000
trusted library allocation
page read and write
9522F7E000
unkown
page readonly
196BF0BE000
heap
page read and write
196BEF40000
trusted library allocation
page read and write
E48000
heap
page read and write
5FE000
stack
page read and write
73C30000
unkown
page readonly
3D32000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
94A000
heap
page read and write
5410000
trusted library allocation
page read and write
AA4D000
stack
page read and write
F3A000
heap
page read and write
196B9A43000
heap
page read and write
55EF000
stack
page read and write
5D5E000
stack
page read and write
4B90000
heap
page read and write
2E66000
trusted library allocation
page read and write
408000
remote allocation
page execute and read and write
899000
stack
page read and write
67D0000
trusted library allocation
page read and write
196BF03F000
heap
page read and write
2FE9000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
26AE000
stack
page read and write
A83000
trusted library allocation
page read and write
196BA7E0000
trusted library section
page readonly
997000
stack
page read and write
5AE0000
heap
page read and write
66E0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
196B9830000
heap
page read and write
196B9A00000
heap
page read and write
2A2B000
trusted library allocation
page execute and read and write
669A000
trusted library allocation
page read and write
4FC1000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
2B90000
heap
page read and write
2F67000
trusted library allocation
page read and write
E0A000
heap
page read and write
66F0000
trusted library allocation
page execute and read and write
4D60000
heap
page read and write
2890000
trusted library allocation
page read and write
609D000
stack
page read and write
5A08000
heap
page read and write
6664000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
9521DFE000
stack
page read and write
AB5000
heap
page read and write
59F4000
heap
page read and write
9521F7E000
unkown
page readonly
3E37000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
196BED10000
trusted library allocation
page read and write
518F000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
3C3E000
trusted library allocation
page read and write
512E000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
2D17000
trusted library allocation
page read and write
196BEDF0000
trusted library allocation
page read and write
196BEE20000
trusted library allocation
page read and write
196BF057000
heap
page read and write
2B6A000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
AB4D000
stack
page read and write
4169000
trusted library allocation
page read and write
4FAE000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
576D000
stack
page read and write
9522A7B000
stack
page read and write
2FB4000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
2A8E000
stack
page read and write
B07C000
stack
page read and write
196BF10C000
heap
page read and write
61EF000
stack
page read and write
718E000
stack
page read and write
E90000
heap
page read and write
2E2F000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
9521E7E000
unkown
page readonly
28E2000
trusted library allocation
page read and write
196BEE30000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
196B9AB7000
heap
page read and write
2A1A000
trusted library allocation
page execute and read and write
3A61000
trusted library allocation
page read and write
2D69000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
25FF000
unkown
page read and write
4D9E000
stack
page read and write
196BA102000
heap
page read and write
73C31000
unkown
page execute read
569D000
stack
page read and write
D8D000
trusted library allocation
page execute and read and write
4B11000
trusted library allocation
page read and write
704E000
stack
page read and write
2930000
heap
page read and write
AE6E000
stack
page read and write
3F83000
trusted library allocation
page read and write
B70000
heap
page execute and read and write
2C9E000
stack
page read and write
95222FE000
stack
page read and write
8F7000
stack
page read and write
952357E000
unkown
page readonly
66A0000
trusted library allocation
page execute and read and write
67C5000
trusted library allocation
page read and write
196BF05D000
heap
page read and write
196B9A8B000
heap
page read and write
906000
trusted library allocation
page execute and read and write
28C0000
heap
page read and write
196BF0C4000
heap
page read and write
B2FE000
stack
page read and write
3DDA000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
5A50000
heap
page read and write
196BEF40000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
4CB0000
trusted library allocation
page read and write
3E21000
trusted library allocation
page read and write
1010000
heap
page read and write
196BF102000
heap
page read and write
E9E000
stack
page read and write
67F2000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
277E000
stack
page read and write
5A3B000
heap
page read and write
63BE000
stack
page read and write
3E7F000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
54A0000
heap
page execute and read and write
4F50000
heap
page read and write
67F0000
trusted library allocation
page read and write
4005000
trusted library allocation
page read and write
196B9A8D000
heap
page read and write
6780000
trusted library allocation
page read and write
636E000
stack
page read and write
DB2000
trusted library allocation
page read and write
AA0E000
stack
page read and write
E40000
heap
page read and write
54ED000
stack
page read and write
196C0000000
heap
page read and write
A0E000
stack
page read and write
622F000
heap
page read and write
4E6B000
stack
page read and write
902000
trusted library allocation
page read and write
50FD000
stack
page read and write
2F17000
trusted library allocation
page read and write
3B60000
trusted library allocation
page read and write
6840000
trusted library allocation
page execute and read and write
40F000
remote allocation
page execute and read and write
5190000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
D9D000
trusted library allocation
page execute and read and write
2D50000
heap
page read and write
196BEB90000
trusted library allocation
page read and write
441000
remote allocation
page execute and read and write
9DD000
heap
page read and write
2B14000
trusted library allocation
page read and write
196BEF90000
remote allocation
page read and write
4E70000
heap
page read and write
50A0000
heap
page read and write
E60000
heap
page read and write
5A0000
heap
page read and write
6810000
trusted library allocation
page execute and read and write
2CF1000
trusted library allocation
page read and write
BD4000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page execute and read and write
952247E000
unkown
page readonly
2A16000
trusted library allocation
page execute and read and write
4B30000
trusted library allocation
page read and write
5F5E000
stack
page read and write
6676000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
E30000
heap
page read and write
F7F000
stack
page read and write
952187C000
stack
page read and write
5000000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
3D70000
trusted library allocation
page read and write
8CE000
stack
page read and write
B40C000
stack
page read and write
59A6000
heap
page read and write
196BEED0000
trusted library allocation
page read and write
3D21000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
4DC0000
heap
page execute and read and write
3C12000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
917000
trusted library allocation
page execute and read and write
3DA5000
trusted library allocation
page read and write
594F000
stack
page read and write
5280000
heap
page read and write
2E61000
trusted library allocation
page read and write
512A000
trusted library allocation
page read and write
940000
heap
page read and write
434000
remote allocation
page execute and read and write
196BF0EE000
heap
page read and write
4AF4000
trusted library allocation
page read and write
572F000
stack
page read and write
507E000
stack
page read and write
2A46000
trusted library allocation
page read and write
4FD2000
trusted library allocation
page read and write
DB7000
trusted library allocation
page execute and read and write
196BF000000
heap
page read and write
639E000
stack
page read and write
AEEE000
stack
page read and write
286E000
trusted library allocation
page read and write
2B70000
heap
page execute and read and write
6810000
trusted library allocation
page read and write
196BF01E000
heap
page read and write
196B9FB0000
trusted library section
page read and write
ADAE000
stack
page read and write
There are 859 hidden memdumps, click here to show them.