IOC Report
3140, EUR.exe

loading gif

Files

File Path
Type
Category
Malicious
3140, EUR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3140, EUR.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpE737.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lkuPOyvaWlIu.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21y1z2oz.3h0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hpwuiogt.yij.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0yqbczp.qe4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mswb0zbg.qqo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n004ova5.pic.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q2vtgbrs.lki.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sh1a2noa.sdj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u4ps0e4k.ji4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4A2.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3140, EUR.exe
"C:\Users\user\Desktop\3140, EUR.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3140, EUR.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmpE737.tmp"
malicious
C:\Users\user\Desktop\3140, EUR.exe
"C:\Users\user\Desktop\3140, EUR.exe"
malicious
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lkuPOyvaWlIu" /XML "C:\Users\user\AppData\Local\Temp\tmp4A2.tmp"
malicious
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
malicious
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
malicious
C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe
"C:\Users\user\AppData\Roaming\lkuPOyvaWlIu.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2010:09:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://www.office.com/lB
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://www.goodfont.co.kr
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://checkip.dyndns.org/
132.226.8.169
http://quicklyserv.com
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20a
unknown
http://www.carterandcone.coml
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724536%0D%0ADate%20and%20Time:%2001/10/2024%20/%2015:48:32%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724536%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
quicklyserv.com
45.143.99.52
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
45.143.99.52
quicklyserv.com
Turkey
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3140, EUR_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lkuPOyvaWlIu_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3011000
trusted library allocation
page read and write
malicious
318E000
trusted library allocation
page read and write
malicious
4062000
trusted library allocation
page read and write
malicious
447D000
trusted library allocation
page read and write
malicious
337F000
trusted library allocation
page read and write
malicious
42E2000
trusted library allocation
page read and write
malicious
3201000
trusted library allocation
page read and write
malicious
434000
remote allocation
page execute and read and write
malicious
6EB6000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
BFB000
heap
page read and write
34CC000
trusted library allocation
page read and write
760F000
stack
page read and write
4229000
trusted library allocation
page read and write
6E87000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
AA6000
trusted library allocation
page read and write
4372000
trusted library allocation
page read and write
4362000
trusted library allocation
page read and write
5D20000
heap
page read and write
3035000
trusted library allocation
page execute and read and write
7A5C000
stack
page read and write
26BE000
stack
page read and write
4407000
trusted library allocation
page read and write
40E5000
trusted library allocation
page read and write
1541000
heap
page read and write
5D00000
heap
page read and write
41D000
remote allocation
page execute and read and write
6946000
heap
page read and write
4368000
trusted library allocation
page read and write
BBA000
trusted library allocation
page execute and read and write
42E3000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
E6E000
stack
page read and write
4460000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
4303000
trusted library allocation
page read and write
1350000
heap
page read and write
4239000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
431000
remote allocation
page execute and read and write
432000
remote allocation
page execute and read and write
D00000
trusted library allocation
page read and write
107E000
stack
page read and write
33F2000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
29CB000
trusted library allocation
page read and write
55A000
stack
page read and write
1436000
heap
page read and write
40CA000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
40B000
remote allocation
page execute and read and write
32AA000
trusted library allocation
page read and write
7CBE000
stack
page read and write
4547000
trusted library allocation
page read and write
502E000
stack
page read and write
33DF000
trusted library allocation
page read and write
10B0000
heap
page read and write
56F0000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
186D000
trusted library allocation
page execute and read and write
30CA000
trusted library allocation
page read and write
36E8000
trusted library allocation
page read and write
692E000
stack
page read and write
AC7000
trusted library allocation
page execute and read and write
158E000
stack
page read and write
11D0000
heap
page read and write
E70000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
6E60000
trusted library allocation
page execute and read and write
6CAE000
stack
page read and write
31EE000
trusted library allocation
page read and write
7625000
trusted library allocation
page read and write
D3F000
heap
page read and write
5694000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
4F80000
trusted library allocation
page read and write
ABA000
trusted library allocation
page execute and read and write
BC0000
trusted library allocation
page read and write
6E62000
trusted library allocation
page read and write
CB3000
heap
page read and write
12F0000
heap
page read and write
16E0000
trusted library allocation
page execute and read and write
41A3000
trusted library allocation
page read and write
5C7D000
stack
page read and write
33B4000
trusted library allocation
page read and write
93E000
stack
page read and write
1378000
heap
page read and write
28AF000
trusted library allocation
page read and write
4223000
trusted library allocation
page read and write
5750000
heap
page read and write
2900000
trusted library allocation
page read and write
B70000
heap
page read and write
6FF0000
trusted library allocation
page execute and read and write
1850000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
B00000
heap
page read and write
8F0000
heap
page read and write
505E000
stack
page read and write
B08000
heap
page read and write
421000
remote allocation
page execute and read and write
73EE000
stack
page read and write
6BDD000
stack
page read and write
2D5A000
trusted library allocation
page execute and read and write
3275000
trusted library allocation
page read and write
6BEE000
stack
page read and write
15C0000
heap
page read and write
70A0000
heap
page read and write
33E6000
trusted library allocation
page read and write
4392000
trusted library allocation
page read and write
B28000
heap
page read and write
3117000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
7CF000
unkown
page read and write
5740000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
4039000
trusted library allocation
page read and write
7640000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
16D0000
trusted library allocation
page read and write
D4C000
heap
page read and write
29B0000
heap
page execute and read and write
4FB2000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
4472000
trusted library allocation
page read and write
4495000
trusted library allocation
page read and write
AB2000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
4078000
trusted library allocation
page read and write
4343000
trusted library allocation
page read and write
4011000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page execute and read and write
4480000
trusted library allocation
page read and write
6F20000
trusted library allocation
page execute and read and write
44CE000
trusted library allocation
page read and write
D86E000
stack
page read and write
B1D000
stack
page read and write
4AEC000
stack
page read and write
2D40000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
B35000
heap
page read and write
7070000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
B9D000
trusted library allocation
page execute and read and write
1876000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
3050000
trusted library allocation
page read and write
2E0C000
stack
page read and write
7421000
heap
page read and write
5A04000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
9B3000
trusted library allocation
page execute and read and write
5A06000
trusted library allocation
page read and write
57DD000
stack
page read and write
3809000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
D66C000
stack
page read and write
4487000
trusted library allocation
page read and write
433000
remote allocation
page execute and read and write
548E000
stack
page read and write
3578000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
5726000
trusted library allocation
page read and write
6AAE000
stack
page read and write
7600000
trusted library section
page read and write
31F2000
trusted library allocation
page read and write
3200000
heap
page read and write
412000
remote allocation
page execute and read and write
6F40000
trusted library allocation
page execute and read and write
4FE0000
heap
page execute and read and write
4F2B000
trusted library allocation
page read and write
6E1E000
heap
page read and write
5D30000
heap
page read and write
27E0000
heap
page read and write
36B9000
trusted library allocation
page read and write
455F000
trusted library allocation
page read and write
BD6000
heap
page read and write
6EE2000
trusted library allocation
page read and write
550E000
stack
page read and write
42CE000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
1450000
heap
page read and write
536F000
stack
page read and write
BB0000
trusted library allocation
page read and write
50B0000
trusted library section
page readonly
3801000
trusted library allocation
page read and write
4557000
trusted library allocation
page read and write
BCB000
trusted library allocation
page execute and read and write
43A6000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
995E000
trusted library allocation
page read and write
42E1000
trusted library allocation
page read and write
6F1E000
stack
page read and write
10B7000
heap
page read and write
5570000
heap
page read and write
3037000
trusted library allocation
page execute and read and write
7010000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
BB9000
heap
page read and write
3517000
trusted library allocation
page read and write
32B6000
trusted library allocation
page read and write
AB6000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
6B1E000
heap
page read and write
8F8000
stack
page read and write
4485000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
7850000
trusted library allocation
page execute and read and write
402000
unkown
page readonly
C97000
heap
page read and write
66EE000
stack
page read and write
4E84000
heap
page read and write
6AA0000
heap
page read and write
3077000
trusted library allocation
page read and write
7340000
heap
page execute and read and write
43E3000
trusted library allocation
page read and write
32BA000
trusted library allocation
page read and write
7A1E000
stack
page read and write
2E20000
trusted library allocation
page read and write
44E9000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
6B15000
heap
page read and write
4101000
trusted library allocation
page read and write
4587000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
D76C000
stack
page read and write
3081000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
380D000
trusted library allocation
page read and write
33E5000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
41BB000
trusted library allocation
page read and write
4144000
trusted library allocation
page read and write
29A0000
heap
page read and write
4493000
trusted library allocation
page read and write
3530000
heap
page read and write
3090000
heap
page read and write
30E0000
heap
page read and write
4370000
trusted library allocation
page read and write
6E10000
heap
page read and write
BAD000
trusted library allocation
page execute and read and write
448C000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page execute and read and write
570B000
trusted library allocation
page read and write
5CB000
heap
page read and write
6F20000
trusted library allocation
page execute and read and write
1469000
heap
page read and write
539E000
stack
page read and write
413B000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
E5E000
stack
page read and write
453C000
trusted library allocation
page read and write
7030000
trusted library allocation
page execute and read and write
4F4D000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
E70000
heap
page read and write
4551000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5C0000
heap
page read and write
73B0000
trusted library allocation
page read and write
1177000
stack
page read and write
5A0A000
trusted library allocation
page read and write
432A000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
CFE000
heap
page read and write
AC2000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
32D0000
heap
page read and write
6DB0000
trusted library allocation
page execute and read and write
6AB1000
heap
page read and write
84F000
stack
page read and write
7630000
trusted library allocation
page execute and read and write
F7F000
stack
page read and write
571E000
trusted library allocation
page read and write
D10000
heap
page read and write
E98000
heap
page read and write
41F4000
trusted library allocation
page read and write
13A6000
heap
page read and write
5744000
trusted library allocation
page read and write
456A000
trusted library allocation
page read and write
412B000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
4FCE000
stack
page read and write
411E000
trusted library allocation
page read and write
BC7000
trusted library allocation
page execute and read and write
2E40000
heap
page read and write
4353000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
2E10000
trusted library allocation
page execute and read and write
AA9000
trusted library allocation
page read and write
30DE000
unkown
page read and write
522F000
stack
page read and write
6F80000
trusted library allocation
page execute and read and write
7435000
heap
page read and write
2D65000
trusted library allocation
page execute and read and write
5503000
heap
page read and write
28BD000
stack
page read and write
6E1E000
stack
page read and write
570E000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
1590000
heap
page read and write
9A0000
trusted library allocation
page read and write
5A20000
heap
page read and write
1370000
heap
page read and write
5746000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
67EE000
stack
page read and write
69A4000
heap
page read and write
321F000
trusted library allocation
page read and write
530F000
stack
page read and write
4491000
trusted library allocation
page read and write
349E000
trusted library allocation
page read and write
185D000
trusted library allocation
page execute and read and write
365D000
trusted library allocation
page read and write
43B3000
trusted library allocation
page read and write
437B000
trusted library allocation
page read and write
C8F000
heap
page read and write
12EE000
stack
page read and write
4FB0000
trusted library allocation
page read and write
526E000
stack
page read and write
2DED000
stack
page read and write
D3DE000
stack
page read and write
32BE000
trusted library allocation
page read and write
7007000
trusted library allocation
page read and write
B20000
heap
page read and write
3266000
trusted library allocation
page read and write
430D000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
420B000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
4DDF000
stack
page read and write
C2E000
stack
page read and write
3419000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
699B000
heap
page read and write
16CF000
stack
page read and write
1375000
heap
page read and write
2D67000
trusted library allocation
page execute and read and write
9BD000
trusted library allocation
page execute and read and write
3470000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
E1F000
stack
page read and write
54B6000
trusted library allocation
page read and write
5D9E000
stack
page read and write
D060000
trusted library allocation
page execute and read and write
700A000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
26C0000
heap
page execute and read and write
42ED000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
6930000
heap
page read and write
42EF000
trusted library allocation
page read and write
BA6000
trusted library allocation
page read and write
75FE000
stack
page read and write
BB6000
trusted library allocation
page execute and read and write
B94000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
4FE3000
heap
page execute and read and write
9B0000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
267C000
stack
page read and write
2D33000
trusted library allocation
page execute and read and write
B0E000
heap
page read and write
43EF000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
97D000
stack
page read and write
4BA000
stack
page read and write
767E000
stack
page read and write
682E000
stack
page read and write
40CE000
trusted library allocation
page read and write
1487000
heap
page read and write
4FF0000
trusted library allocation
page execute and read and write
7DBE000
stack
page read and write
32A6000
trusted library allocation
page read and write
D0EE000
stack
page read and write
2E50000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
7240000
heap
page read and write
1370000
heap
page read and write
1337000
stack
page read and write
6EE0000
trusted library allocation
page read and write
4554000
trusted library allocation
page read and write
43F8000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
41C6000
trusted library allocation
page read and write
768E000
stack
page read and write
2D20000
trusted library allocation
page read and write
27CE000
stack
page read and write
6AEE000
stack
page read and write
6DF0000
trusted library allocation
page execute and read and write
39FD000
trusted library allocation
page read and write
1853000
trusted library allocation
page execute and read and write
7400000
heap
page read and write
50B4000
trusted library section
page readonly
566D000
stack
page read and write
5D35000
heap
page read and write
44D1000
trusted library allocation
page read and write
40CC000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
56E0000
trusted library allocation
page execute and read and write
2F00000
heap
page execute and read and write
29D0000
trusted library allocation
page read and write
4396000
trusted library allocation
page read and write
1360000
heap
page read and write
54AE000
stack
page read and write
434A000
trusted library allocation
page read and write
4542000
trusted library allocation
page read and write
4E80000
heap
page read and write
30C2000
trusted library allocation
page read and write
4218000
trusted library allocation
page read and write
41C4000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
6F60000
trusted library allocation
page execute and read and write
411000
remote allocation
page execute and read and write
4292000
trusted library allocation
page read and write
CA5000
heap
page read and write
73F1000
heap
page read and write
4E50000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
6C1E000
stack
page read and write
C6B000
stack
page read and write
5500000
heap
page read and write
2D4D000
trusted library allocation
page execute and read and write
7390000
trusted library allocation
page read and write
45A4000
trusted library allocation
page read and write
156E000
stack
page read and write
4F60000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
53AE000
stack
page read and write
4F20000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
6A6D000
stack
page read and write
4FD0000
heap
page execute and read and write
51D0000
heap
page execute and read and write
6B12000
heap
page read and write
420000
remote allocation
page execute and read and write
6F45000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
4585000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
16F0000
trusted library allocation
page read and write
7075000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
442000
remote allocation
page execute and read and write
44F4000
trusted library allocation
page read and write
519B000
stack
page read and write
33B6000
trusted library allocation
page read and write
33ED000
trusted library allocation
page read and write
9C0000
heap
page read and write
51B0000
heap
page read and write
5200000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
42FA000
trusted library allocation
page read and write
778E000
stack
page read and write
5DA8000
trusted library allocation
page read and write
1840000
trusted library allocation
page read and write
75D0000
heap
page read and write
2E58000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
4FD3000
heap
page execute and read and write
2D62000
trusted library allocation
page read and write
9FD0000
trusted library section
page read and write
4333000
trusted library allocation
page read and write
6C6F000
stack
page read and write
4154000
trusted library allocation
page read and write
5A10000
heap
page execute and read and write
42E8000
trusted library allocation
page read and write
1239000
stack
page read and write
35A5000
trusted library allocation
page read and write
42D5000
trusted library allocation
page read and write
400000
unkown
page readonly
3601000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
4479000
trusted library allocation
page read and write
5A8E000
stack
page read and write
2EF0000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
724E000
heap
page read and write
33B2000
trusted library allocation
page read and write
D39E000
stack
page read and write
5DA0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
4162000
trusted library allocation
page read and write
5E0000
heap
page read and write
57F0000
heap
page read and write
D4DF000
stack
page read and write
319E000
trusted library allocation
page read and write
35D3000
trusted library allocation
page read and write
31F0000
heap
page read and write
B44000
heap
page read and write
73C0000
heap
page read and write
6F40000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page execute and read and write
777E000
stack
page read and write
432D000
trusted library allocation
page read and write
457F000
trusted library allocation
page read and write
5080000
trusted library section
page readonly
4808000
trusted library allocation
page read and write
5D10000
heap
page read and write
6A9F000
stack
page read and write
409000
remote allocation
page execute and read and write
31C1000
trusted library allocation
page read and write
1330000
heap
page read and write
443000
remote allocation
page execute and read and write
32DB000
heap
page read and write
31EE000
stack
page read and write
445C000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page execute and read and write
415A000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
CFE000
stack
page read and write
4F70000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
5DA6000
trusted library allocation
page read and write
CB1000
heap
page read and write
107A000
stack
page read and write
741E000
heap
page read and write
44B1000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
51A0000
heap
page read and write
43AA000
trusted library allocation
page read and write
417000
remote allocation
page execute and read and write
2AC0000
trusted library allocation
page read and write
5014000
heap
page read and write
4351000
trusted library allocation
page read and write
56E000
unkown
page read and write
4390000
trusted library allocation
page read and write
6EE5000
trusted library allocation
page read and write
6C5E000
stack
page read and write
571A000
trusted library allocation
page read and write
31FF000
unkown
page read and write
510E000
stack
page read and write
2AAB000
trusted library allocation
page read and write
570000
heap
page read and write
509E000
stack
page read and write
C70000
heap
page read and write
300E000
stack
page read and write
27F0000
heap
page read and write
54EB000
stack
page read and write
459C000
trusted library allocation
page read and write
7B70000
trusted library allocation
page execute and read and write
325B000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
787E000
stack
page read and write
3A39000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
7024000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
4536000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
4F3A000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
1880000
heap
page read and write
BE0000
trusted library allocation
page read and write
80E000
stack
page read and write
7B80000
heap
page read and write
3279000
trusted library allocation
page read and write
34E8000
trusted library allocation
page read and write
40DF000
trusted library allocation
page read and write
69BA000
heap
page read and write
5208000
trusted library allocation
page read and write
6B30000
heap
page read and write
580000
heap
page read and write
151B000
heap
page read and write
42E2000
trusted library allocation
page read and write
74FE000
stack
page read and write
2909000
trusted library allocation
page read and write
335D000
trusted library allocation
page read and write
5D40000
heap
page read and write
7620000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
43AD000
trusted library allocation
page read and write
7410000
heap
page read and write
42E0000
trusted library allocation
page read and write
1860000
trusted library allocation
page read and write
1854000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
29C9000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
AC5000
trusted library allocation
page execute and read and write
4200000
trusted library allocation
page read and write
5200000
heap
page read and write
1872000
trusted library allocation
page read and write
4578000
trusted library allocation
page read and write
1300000
heap
page read and write
30AE000
trusted library allocation
page read and write
5B0000
heap
page read and write
C7E000
heap
page read and write
338F000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
5C4D000
stack
page read and write
4394000
trusted library allocation
page read and write
BA9000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
4583000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
434D000
trusted library allocation
page read and write
16D9000
trusted library allocation
page read and write
5D87000
heap
page read and write
4FA6000
trusted library allocation
page read and write
743B000
heap
page read and write
5580000
heap
page read and write
4FC5000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
BC5000
trusted library allocation
page execute and read and write
32A2000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
5040000
trusted library allocation
page execute and read and write
4389000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
7B5C000
stack
page read and write
5CCE000
stack
page read and write
43B5000
trusted library allocation
page read and write
699E000
stack
page read and write
1399000
heap
page read and write
427000
remote allocation
page execute and read and write
1810000
heap
page read and write
33AE000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
540E000
stack
page read and write
5590000
trusted library allocation
page read and write
4595000
trusted library allocation
page read and write
6F19000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
5010000
heap
page read and write
4F3E000
trusted library allocation
page read and write
499C000
stack
page read and write
85A000
stack
page read and write
5D05000
heap
page read and write
2D30000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
560E000
stack
page read and write
30F4000
trusted library allocation
page read and write
42DC000
trusted library allocation
page read and write
B75000
heap
page read and write
303B000
trusted library allocation
page execute and read and write
413E000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
7017000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
187A000
trusted library allocation
page execute and read and write
5CF0000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
40A000
remote allocation
page execute and read and write
403000
remote allocation
page execute and read and write
47D000
stack
page read and write
5712000
trusted library allocation
page read and write
429000
remote allocation
page execute and read and write
4305000
trusted library allocation
page read and write
520000
heap
page read and write
1080000
trusted library allocation
page execute and read and write
12F5000
heap
page read and write
57F3000
heap
page read and write
43B5000
trusted library allocation
page read and write
40ED000
trusted library allocation
page read and write
56A0000
heap
page execute and read and write
957000
stack
page read and write
55C0000
trusted library allocation
page read and write
9B0000
heap
page read and write
4502000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
9B4000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
6C2E000
stack
page read and write
4347000
trusted library allocation
page read and write
40F9000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
5050000
heap
page read and write
AF0000
trusted library allocation
page execute and read and write
2D52000
trusted library allocation
page read and write
30DC000
stack
page read and write
6D5E000
stack
page read and write
43D000
remote allocation
page execute and read and write
BE5000
heap
page read and write
2D34000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
5D5F000
stack
page read and write
C7A000
heap
page read and write
695E000
stack
page read and write
5760000
trusted library allocation
page read and write
ADE000
stack
page read and write
4462000
trusted library allocation
page read and write
6DAE000
stack
page read and write
32F6000
trusted library allocation
page read and write
30E0000
heap
page execute and read and write
29E0000
heap
page read and write
AAD000
trusted library allocation
page execute and read and write
4365000
trusted library allocation
page read and write
E90000
heap
page read and write
44F2000
trusted library allocation
page read and write
4358000
trusted library allocation
page read and write
B93000
trusted library allocation
page execute and read and write
354A000
trusted library allocation
page read and write
1496000
heap
page read and write
BC2000
trusted library allocation
page read and write
D1DE000
stack
page read and write
29F1000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
42B8000
trusted library allocation
page read and write
9C5000
heap
page read and write
2D56000
trusted library allocation
page execute and read and write
5BA0000
trusted library allocation
page execute and read and write
415000
remote allocation
page execute and read and write
324F000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
44BF000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
B89000
heap
page read and write
2DCE000
stack
page read and write
6DDE000
stack
page read and write
42F1000
trusted library allocation
page read and write
6F60000
heap
page read and write
4F75000
trusted library allocation
page read and write
ACB000
trusted library allocation
page execute and read and write
5DAD000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
40F5000
trusted library allocation
page read and write
5D50000
heap
page read and write
33E3000
trusted library allocation
page read and write
309E000
stack
page read and write
3269000
trusted library allocation
page read and write
D50000
heap
page read and write
147A000
heap
page read and write
6D9E000
stack
page read and write
569A000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
5C0000
heap
page read and write
6EF0000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
1570000
heap
page read and write
572D000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
42BE000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
3039000
stack
page read and write
145C000
heap
page read and write
2A4B000
trusted library allocation
page read and write
There are 779 hidden memdumps, click here to show them.