IOC Report
aS4XS9m23e.exe

loading gif

Files

File Path
Type
Category
Malicious
aS4XS9m23e.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aS4XS9m23e.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpA2E9.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mjCLFIohWTlhgd.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5325vrta.dls.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5an3ohja.njz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aw052apz.m01.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bwizdmk5.ipf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_en5v3mtm.0xm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gabhgbw5.lit.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mnuh5v4c.0n1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nfz5r1my.oiy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB4FA.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\aS4XS9m23e.exe
"C:\Users\user\Desktop\aS4XS9m23e.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\aS4XS9m23e.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mjCLFIohWTlhgd" /XML "C:\Users\user\AppData\Local\Temp\tmpA2E9.tmp"
malicious
C:\Users\user\Desktop\aS4XS9m23e.exe
"C:\Users\user\Desktop\aS4XS9m23e.exe"
malicious
C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe
C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mjCLFIohWTlhgd" /XML "C:\Users\user\AppData\Local\Temp\tmpB4FA.tmp"
malicious
C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe
"C:\Users\user\AppData\Roaming\mjCLFIohWTlhgd.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
85.209.133.187:1912
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.209.133.187
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3834000
trusted library allocation
page read and write
malicious
4194000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3868000
trusted library allocation
page read and write
malicious
3DF9000
trusted library allocation
page read and write
malicious
41DF000
trusted library allocation
page read and write
malicious
38B3000
trusted library allocation
page read and write
malicious
B5CE000
stack
page read and write
5FF0000
trusted library allocation
page read and write
6D7000
heap
page read and write
2C00000
heap
page read and write
BD2E000
stack
page read and write
9F0000
heap
page read and write
2C8E000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
11DE000
stack
page read and write
51AA000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
645D000
heap
page read and write
268E000
stack
page read and write
6BB2000
trusted library allocation
page read and write
892E000
stack
page read and write
21D2000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
2E32000
trusted library allocation
page read and write
76EF000
stack
page read and write
151A000
trusted library allocation
page execute and read and write
4EE0000
trusted library allocation
page read and write
75A000
heap
page read and write
BF70000
heap
page read and write
4F20000
trusted library section
page read and write
7420000
trusted library allocation
page read and write
6409000
heap
page read and write
3DA1000
trusted library allocation
page read and write
63B3000
heap
page read and write
400000
remote allocation
page execute and read and write
4E14000
trusted library allocation
page read and write
605E000
heap
page read and write
331A000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
2EA0000
heap
page read and write
7D50000
trusted library section
page read and write
B70E000
stack
page read and write
75FE000
stack
page read and write
4ED0000
trusted library allocation
page execute and read and write
329C000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
55FE000
stack
page read and write
2250000
trusted library allocation
page execute and read and write
F70000
trusted library allocation
page read and write
3DAD000
trusted library allocation
page read and write
54BE000
stack
page read and write
E7A000
heap
page read and write
5D80000
trusted library allocation
page execute and read and write
331E000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
66EC000
stack
page read and write
249E000
trusted library allocation
page read and write
935000
heap
page read and write
C6F000
stack
page read and write
4D00000
heap
page read and write
B20000
heap
page read and write
6400000
heap
page read and write
B4CF000
stack
page read and write
569B000
trusted library allocation
page read and write
50AB000
stack
page read and write
1557000
heap
page read and write
27D0000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
7430000
heap
page read and write
6E6E000
stack
page read and write
587E000
stack
page read and write
7A15000
trusted library allocation
page read and write
103A000
heap
page read and write
6D60000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
E25000
heap
page read and write
6E2E000
stack
page read and write
65AC000
stack
page read and write
721E000
stack
page read and write
5E70000
trusted library allocation
page execute and read and write
6C80000
trusted library allocation
page read and write
6061000
heap
page read and write
6FBB000
heap
page read and write
606A000
heap
page read and write
2CB0000
trusted library allocation
page read and write
948000
heap
page read and write
668000
heap
page read and write
325E000
trusted library allocation
page read and write
746E000
stack
page read and write
6E5D000
stack
page read and write
6380000
trusted library allocation
page read and write
63F8000
heap
page read and write
2C91000
trusted library allocation
page read and write
9B0000
heap
page read and write
3149000
trusted library allocation
page read and write
21A0000
trusted library allocation
page read and write
E37000
trusted library allocation
page execute and read and write
983000
heap
page read and write
2CD1000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
2DE0000
heap
page execute and read and write
2D3E000
stack
page read and write
675F000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
3CDF000
trusted library allocation
page read and write
21C0000
trusted library allocation
page read and write
27CC000
stack
page read and write
110D000
heap
page read and write
2EC6000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4980000
heap
page execute and read and write
4DFD000
trusted library allocation
page read and write
62AD000
stack
page read and write
2890000
heap
page read and write
5710000
trusted library allocation
page read and write
624C000
stack
page read and write
978000
heap
page read and write
563E000
stack
page read and write
68A000
heap
page read and write
5651000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
72CE000
stack
page read and write
282F000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
6471000
heap
page read and write
1048000
heap
page read and write
6E1E000
stack
page read and write
F80000
trusted library allocation
page read and write
3F5D000
trusted library allocation
page read and write
34FD000
trusted library allocation
page read and write
724F000
stack
page read and write
5720000
trusted library allocation
page read and write
F6E000
stack
page read and write
5182000
trusted library allocation
page read and write
23E1000
trusted library allocation
page read and write
4DF1000
trusted library allocation
page read and write
649C000
heap
page read and write
25E0000
heap
page read and write
5160000
heap
page read and write
F8A000
trusted library allocation
page execute and read and write
406C000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
4209000
trusted library allocation
page read and write
5C9000
stack
page read and write
563E000
stack
page read and write
290F000
unkown
page read and write
2E8F000
trusted library allocation
page read and write
5D6F000
stack
page read and write
6312000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page execute and read and write
65ED000
stack
page read and write
71E6000
heap
page read and write
14F4000
trusted library allocation
page read and write
741B000
stack
page read and write
128A000
heap
page read and write
520000
heap
page read and write
63B0000
heap
page read and write
437000
remote allocation
page execute and read and write
566E000
trusted library allocation
page read and write
E6E000
stack
page read and write
11B0000
heap
page read and write
6740000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
6749000
trusted library allocation
page read and write
60EF000
heap
page read and write
7EE0000
heap
page read and write
13D0000
heap
page read and write
2E40000
trusted library allocation
page read and write
47FF000
trusted library allocation
page read and write
58D6000
trusted library allocation
page read and write
2940000
heap
page read and write
332E000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4CD0000
heap
page read and write
3220000
trusted library allocation
page read and write
9F2000
heap
page read and write
4351000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
54A0000
heap
page read and write
3E5D000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
531E000
stack
page read and write
422A000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
7600000
trusted library allocation
page execute and read and write
6710000
trusted library allocation
page read and write
2C74000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
9C4000
heap
page read and write
541D000
trusted library allocation
page read and write
E14000
trusted library allocation
page read and write
FCA000
heap
page read and write
642D000
heap
page read and write
56FE000
stack
page read and write
E10000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
3DEE000
trusted library allocation
page read and write
6021000
heap
page read and write
10DD000
stack
page read and write
4A3B000
stack
page read and write
F92000
trusted library allocation
page read and write
600000
heap
page read and write
5360000
trusted library allocation
page read and write
6AAC000
stack
page read and write
640F000
heap
page read and write
F82000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
BAAE000
stack
page read and write
4920000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
2E84000
trusted library allocation
page read and write
4F30000
trusted library allocation
page execute and read and write
4E70000
heap
page read and write
6745000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
BBEE000
stack
page read and write
49B2000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
7F860000
trusted library allocation
page execute and read and write
4990000
heap
page read and write
E00000
trusted library allocation
page read and write
E20000
heap
page read and write
6BB5000
trusted library allocation
page read and write
112000
unkown
page readonly
6431000
heap
page read and write
3141000
trusted library allocation
page read and write
6EFE000
stack
page read and write
2E1F000
trusted library allocation
page read and write
3814000
trusted library allocation
page read and write
2620000
heap
page read and write
6770000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
457C000
stack
page read and write
4DEE000
trusted library allocation
page read and write
6D7A000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
51A8000
trusted library allocation
page read and write
DB7000
stack
page read and write
A2F000
heap
page read and write
30F8000
trusted library allocation
page read and write
2C00000
heap
page read and write
5D70000
trusted library allocation
page read and write
2A38000
trusted library allocation
page read and write
636A000
trusted library allocation
page read and write
7CCD000
stack
page read and write
21D6000
trusted library allocation
page execute and read and write
31A1000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
6758000
trusted library allocation
page read and write
765B000
stack
page read and write
413D000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
24DD000
stack
page read and write
127C000
stack
page read and write
E13000
trusted library allocation
page execute and read and write
52000
unkown
page readonly
60A4000
heap
page read and write
2FB1000
trusted library allocation
page read and write
23D0000
heap
page read and write
2D48000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
21C3000
trusted library allocation
page read and write
37F9000
trusted library allocation
page read and write
236F000
stack
page read and write
8D06000
heap
page read and write
6717000
trusted library allocation
page read and write
13CE000
stack
page read and write
4810000
trusted library allocation
page execute and read and write
DF0000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
3215000
trusted library allocation
page read and write
6FB1000
heap
page read and write
50B0000
heap
page read and write
6F60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7170000
heap
page read and write
52B0000
heap
page read and write
E22000
trusted library allocation
page read and write
E60000
trusted library allocation
page execute and read and write
1038000
heap
page read and write
85EE000
stack
page read and write
47F0000
trusted library allocation
page read and write
8020000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
50C0000
heap
page execute and read and write
6D50000
trusted library allocation
page execute and read and write
23B0000
trusted library allocation
page read and write
567A000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
5190000
trusted library allocation
page execute and read and write
1512000
trusted library allocation
page read and write
14FD000
trusted library allocation
page execute and read and write
A3E000
heap
page read and write
40FF000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
38FE000
trusted library allocation
page read and write
723A000
heap
page read and write
F7D000
trusted library allocation
page execute and read and write
6742000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
1120000
heap
page read and write
2C0A000
heap
page read and write
4E16000
trusted library allocation
page read and write
636F000
trusted library allocation
page read and write
7DCD000
stack
page read and write
281F000
trusted library allocation
page read and write
6FA5000
heap
page read and write
724D000
heap
page read and write
882E000
stack
page read and write
5AD0000
trusted library allocation
page execute and read and write
3C72000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
6FD1000
heap
page read and write
31AF000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
985000
heap
page read and write
2C9D000
trusted library allocation
page read and write
B768000
heap
page read and write
60F7000
heap
page read and write
4E60000
trusted library allocation
page read and write
B60E000
stack
page read and write
490F000
trusted library allocation
page read and write
6067000
heap
page read and write
7CA1000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
E04000
trusted library allocation
page read and write
3FD1000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
E26000
trusted library allocation
page execute and read and write
6EBE000
stack
page read and write
FD6000
heap
page read and write
B776000
heap
page read and write
564B000
trusted library allocation
page read and write
123E000
stack
page read and write
29AE000
unkown
page read and write
2F4D000
trusted library allocation
page read and write
7F03000
heap
page read and write
7F8A0000
trusted library allocation
page execute and read and write
5671000
trusted library allocation
page read and write
58E2000
trusted library allocation
page read and write
728E000
stack
page read and write
2E81000
trusted library allocation
page read and write
278E000
stack
page read and write
7F950000
trusted library allocation
page execute and read and write
6C2E000
stack
page read and write
1527000
trusted library allocation
page execute and read and write
608C000
heap
page read and write
B30D000
stack
page read and write
2E70000
trusted library allocation
page read and write
731F000
stack
page read and write
569E000
trusted library allocation
page read and write
5730000
heap
page execute and read and write
E1D000
trusted library allocation
page execute and read and write
6C70000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
106A000
heap
page read and write
5F90000
trusted library allocation
page read and write
697000
heap
page read and write
5A60000
trusted library allocation
page read and write
27E0000
heap
page read and write
E3B000
trusted library allocation
page execute and read and write
7450000
heap
page read and write
322E000
trusted library allocation
page read and write
2260000
heap
page execute and read and write
34EA000
trusted library allocation
page read and write
2E2B000
stack
page read and write
54F0000
trusted library allocation
page read and write
155E000
heap
page read and write
6774000
trusted library allocation
page read and write
64E000
stack
page read and write
2A30000
heap
page read and write
51A5000
trusted library allocation
page read and write
E70000
heap
page read and write
1510000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
2E80000
trusted library allocation
page read and write
6437000
heap
page read and write
5B4E000
stack
page read and write
26C7000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
CAE000
stack
page read and write
5A70000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
48C4000
trusted library allocation
page read and write
63F5000
heap
page read and write
FA0000
heap
page read and write
54FE000
stack
page read and write
3447000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
2AD0000
heap
page read and write
6427000
heap
page read and write
21EB000
trusted library allocation
page execute and read and write
4E0D000
stack
page read and write
3261000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
89C6000
heap
page read and write
2E13000
trusted library allocation
page read and write
5370000
heap
page execute and read and write
1E5000
heap
page read and write
70DE000
stack
page read and write
4561000
trusted library allocation
page read and write
1525000
trusted library allocation
page execute and read and write
4E73000
heap
page read and write
9FA000
heap
page read and write
7660000
trusted library allocation
page read and write
6000000
heap
page read and write
6F90000
trusted library allocation
page read and write
43E8000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
150D000
trusted library allocation
page execute and read and write
676A000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
4E2F000
trusted library allocation
page read and write
4E02000
trusted library allocation
page read and write
4071000
trusted library allocation
page read and write
2BD0000
heap
page read and write
1500000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
2FAF000
stack
page read and write
6056000
heap
page read and write
48E1000
trusted library allocation
page read and write
6F5E000
stack
page read and write
2A7E000
stack
page read and write
320A000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
6F50000
trusted library allocation
page execute and read and write
251A000
stack
page read and write
89B0000
heap
page read and write
4F7000
stack
page read and write
6D70000
trusted library allocation
page read and write
71FA000
heap
page read and write
2E08000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
71DE000
stack
page read and write
21E2000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
23AB000
stack
page read and write
6BAD000
stack
page read and write
6368000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
6D5000
heap
page read and write
616C000
stack
page read and write
6075000
heap
page read and write
324D000
trusted library allocation
page read and write
2580000
heap
page read and write
745E000
stack
page read and write
2A30000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
1AA000
stack
page read and write
96A000
stack
page read and write
5511000
trusted library allocation
page read and write
721B000
heap
page read and write
6359000
trusted library allocation
page read and write
498C000
stack
page read and write
5E30000
trusted library allocation
page execute and read and write
2E90000
trusted library allocation
page read and write
60C0000
heap
page read and write
6790000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page execute and read and write
1287000
heap
page read and write
608A000
heap
page read and write
3316000
trusted library allocation
page read and write
6375000
trusted library allocation
page read and write
6200000
trusted library allocation
page execute and read and write
5DE0000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
4993000
heap
page read and write
DF0000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
701E000
heap
page read and write
4CDE000
stack
page read and write
31FB000
trusted library allocation
page read and write
2ABF000
stack
page read and write
2FE9000
trusted library allocation
page read and write
5170000
heap
page read and write
6260000
trusted library allocation
page execute and read and write
6FC8000
heap
page read and write
9D0000
heap
page read and write
5700000
trusted library allocation
page read and write
BF6C000
stack
page read and write
2C50000
trusted library allocation
page read and write
962000
heap
page read and write
21B4000
trusted library allocation
page read and write
6059000
heap
page read and write
4F40000
trusted library allocation
page execute and read and write
2C55000
trusted library allocation
page read and write
7F710000
trusted library allocation
page execute and read and write
25DE000
unkown
page read and write
2AB2000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
B2CE000
stack
page read and write
B7A1000
heap
page read and write
116E000
stack
page read and write
31D0000
trusted library allocation
page read and write
6765000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
25ED000
stack
page read and write
3CF1000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
26DB000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
128E000
heap
page read and write
2BF0000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
53BE000
stack
page read and write
48ED000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
1550000
heap
page read and write
6C90000
trusted library allocation
page execute and read and write
61C0000
trusted library allocation
page execute and read and write
10F6000
heap
page read and write
34D8000
trusted library allocation
page read and write
517B000
stack
page read and write
F97000
trusted library allocation
page execute and read and write
4910000
trusted library allocation
page read and write
3E1F000
trusted library allocation
page read and write
607B000
heap
page read and write
109E000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4CE0000
trusted library section
page read and write
8CF0000
heap
page read and write
6310000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
48DE000
trusted library allocation
page read and write
3DA8000
trusted library allocation
page read and write
21E7000
trusted library allocation
page execute and read and write
5523000
heap
page read and write
4DCC000
stack
page read and write
BE2F000
stack
page read and write
2E6E000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
6384000
trusted library allocation
page read and write
107C000
heap
page read and write
5920000
heap
page read and write
F86000
trusted library allocation
page execute and read and write
2EF9000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
71DB000
heap
page read and write
89E000
stack
page read and write
330E000
trusted library allocation
page read and write
3473000
trusted library allocation
page read and write
60B2000
heap
page read and write
3FB1000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page execute and read and write
5294000
heap
page read and write
326B000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
A40000
heap
page read and write
2C60000
heap
page read and write
5290000
heap
page read and write
2C96000
trusted library allocation
page read and write
1018000
heap
page read and write
4E35000
trusted library allocation
page read and write
4DF6000
trusted library allocation
page read and write
7028000
heap
page read and write
7004000
heap
page read and write
313B000
trusted library allocation
page read and write
249B000
trusted library allocation
page read and write
316A000
trusted library allocation
page read and write
7AAD000
stack
page read and write
5E60000
trusted library allocation
page read and write
11AE000
stack
page read and write
3197000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
43BB000
trusted library allocation
page read and write
6120000
trusted library allocation
page execute and read and write
5910000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
6F9D000
trusted library allocation
page read and write
75A0000
heap
page read and write
8F7000
stack
page read and write
2C7B000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
48F2000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
3DB4000
trusted library allocation
page read and write
6F44000
trusted library allocation
page read and write
411E000
trusted library allocation
page read and write
14DF000
stack
page read and write
6320000
trusted library allocation
page execute and read and write
7F19000
heap
page read and write
BBAE000
stack
page read and write
DDE000
stack
page read and write
749C000
stack
page read and write
9DB000
heap
page read and write
31BA000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
71D1000
heap
page read and write
2ED5000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
3D0E000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
606F000
heap
page read and write
637A000
trusted library allocation
page read and write
34E4000
trusted library allocation
page read and write
7670000
heap
page read and write
58C0000
trusted library allocation
page read and write
676F000
trusted library allocation
page read and write
7245000
heap
page read and write
F9B000
trusted library allocation
page execute and read and write
E2A000
trusted library allocation
page execute and read and write
2FB3000
trusted library allocation
page read and write
3FBF000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
4B90000
heap
page read and write
6110000
trusted library allocation
page read and write
6A4000
heap
page read and write
6446000
heap
page read and write
5A4E000
stack
page read and write
7DE0000
heap
page read and write
618F000
stack
page read and write
E00000
heap
page read and write
2FFF000
trusted library allocation
page read and write
660000
heap
page read and write
6033000
heap
page read and write
21B0000
trusted library allocation
page read and write
63C6000
heap
page read and write
6280000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page execute and read and write
67A0000
trusted library allocation
page execute and read and write
3253000
trusted library allocation
page read and write
63B7000
heap
page read and write
2404000
trusted library allocation
page read and write
75ED000
stack
page read and write
2CC0000
heap
page execute and read and write
553E000
stack
page read and write
BA6F000
stack
page read and write
F95000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
6C6E000
stack
page read and write
5900000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
6785000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
4448000
trusted library allocation
page read and write
3CC0000
trusted library allocation
page read and write
4B80000
heap
page read and write
2C63000
heap
page read and write
B760000
heap
page read and write
407C000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
21B3000
trusted library allocation
page execute and read and write
2640000
heap
page execute and read and write
BCEE000
stack
page read and write
3419000
trusted library allocation
page read and write
BE6C000
stack
page read and write
B6E000
stack
page read and write
3DC6000
trusted library allocation
page read and write
49C0000
trusted library allocation
page execute and read and write
85F000
stack
page read and write
570E000
trusted library allocation
page read and write
34F2000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
4915000
trusted library allocation
page read and write
9E0000
heap
page read and write
3124000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
10EE000
heap
page read and write
2E68000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
641D000
heap
page read and write
6CA0000
trusted library allocation
page read and write
48CB000
trusted library allocation
page read and write
94E000
heap
page read and write
432000
remote allocation
page execute and read and write
60DB000
heap
page read and write
5516000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
1522000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
47F5000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
99E000
stack
page read and write
CD0000
heap
page read and write
320D000
trusted library allocation
page read and write
58BE000
stack
page read and write
930000
heap
page read and write
2BDE000
stack
page read and write
1516000
trusted library allocation
page execute and read and write
E50000
trusted library allocation
page read and write
650000
heap
page read and write
29F0000
heap
page read and write
2E30000
trusted library allocation
page execute and read and write
60D2000
heap
page read and write
637F000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
44D5000
trusted library allocation
page read and write
72D0000
heap
page read and write
611A000
trusted library allocation
page read and write
541E000
stack
page read and write
5A2F000
stack
page read and write
2831000
trusted library allocation
page read and write
432E000
trusted library allocation
page read and write
6F92000
heap
page read and write
6C84000
trusted library allocation
page read and write
21BD000
trusted library allocation
page execute and read and write
CBA000
stack
page read and write
71FF000
heap
page read and write
2E2B000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
1E0000
heap
page read and write
48C0000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
735E000
stack
page read and write
6090000
heap
page read and write
B96E000
stack
page read and write
25F0000
heap
page read and write
E1D000
trusted library allocation
page execute and read and write
896E000
stack
page read and write
2FE7000
trusted library allocation
page read and write
583F000
stack
page read and write
3195000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
1010000
heap
page read and write
33E9000
trusted library allocation
page read and write
62EE000
stack
page read and write
527D000
stack
page read and write
350B000
trusted library allocation
page read and write
FBE000
heap
page read and write
6355000
trusted library allocation
page read and write
FA8000
heap
page read and write
21CD000
trusted library allocation
page execute and read and write
21DA000
trusted library allocation
page execute and read and write
71EC000
heap
page read and write
61F0000
trusted library allocation
page execute and read and write
2C34000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
50000
unkown
page readonly
5FC0000
trusted library allocation
page execute and read and write
58F1000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
4D05000
heap
page read and write
7A30000
trusted library allocation
page execute and read and write
4F0F000
stack
page read and write
2E50000
heap
page read and write
5662000
trusted library allocation
page read and write
294B000
heap
page read and write
423D000
trusted library allocation
page read and write
626C000
stack
page read and write
5E40000
trusted library allocation
page execute and read and write
29EF000
unkown
page read and write
2590000
heap
page read and write
671A000
trusted library allocation
page read and write
48E6000
trusted library allocation
page read and write
940000
heap
page read and write
14E0000
trusted library allocation
page read and write
66E000
heap
page read and write
6095000
heap
page read and write
14F3000
trusted library allocation
page execute and read and write
60C6000
heap
page read and write
5422000
trusted library allocation
page read and write
6352000
trusted library allocation
page read and write
245A000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
CF7000
stack
page read and write
8A6E000
stack
page read and write
6044000
heap
page read and write
5695000
trusted library allocation
page read and write
84EE000
stack
page read and write
64A4000
heap
page read and write
1280000
heap
page read and write
11F0000
heap
page read and write
11F5000
heap
page read and write
722C000
heap
page read and write
6CF0000
trusted library allocation
page execute and read and write
2C30000
trusted library allocation
page read and write
283A000
stack
page read and write
5350000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
759C000
stack
page read and write
2A7E000
stack
page read and write
71B2000
heap
page read and write
56A0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
6441000
heap
page read and write
5A50000
trusted library allocation
page read and write
60F2000
heap
page read and write
49A0000
heap
page read and write
6CEE000
stack
page read and write
E03000
trusted library allocation
page execute and read and write
49D0000
trusted library allocation
page read and write
3332000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
71C1000
heap
page read and write
2ABF000
stack
page read and write
6F50000
heap
page read and write
4E20000
trusted library allocation
page read and write
601D000
heap
page read and write
6190000
trusted library allocation
page execute and read and write
5520000
heap
page read and write
152B000
trusted library allocation
page execute and read and write
6FF0000
heap
page read and write
429B000
trusted library allocation
page read and write
E32000
trusted library allocation
page read and write
E13000
trusted library allocation
page read and write
4EB0000
heap
page read and write
74C0000
heap
page read and write
63DE000
heap
page read and write
3481000
trusted library allocation
page read and write
224E000
stack
page read and write
49B0000
trusted library allocation
page read and write
486E000
stack
page read and write
There are 832 hidden memdumps, click here to show them.