IOC Report
Purchase Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\ankomstperrons.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\Freakouts.mis
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\Kavalerens188.equ
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\Motoriseringer.Rig
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\Overhates.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\Protaspis.sol
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\Trktjers204.Ton
Matlab v4 mat-file (little endian) \344, numeric, rows 131584, columns 52942
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\barbecue.ste
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\paradiset.cho
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\professionalizing\saddleback.jer
Matlab v4 mat-file (little endian) , numeric, rows 20224, columns 0
dropped
C:\Users\user\AppData\Local\Temp\nsg3131.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsj39BE.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nso3940.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsr40E3.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsr4CAD.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsu52C9.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsz476C.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\forvredet.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order.exe
"C:\Users\user\Desktop\Purchase Order.exe"
malicious
C:\Users\user\Desktop\Purchase Order.exe
"C:\Users\user\Desktop\Purchase Order.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:210979%0D%0ADate%20and%20Time:%2021/10/2024%20/%2017:55:09%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20210979%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://84.38.129.16/efxSlCP242.binJ
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:210979%0D%0ADate%20a
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://84.38.129.16/efxSlCP242.bin
84.38.129.16
https://reallyfreegeoip.org/xml/155.94.241.186$
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.130.0
http://nsis.sf.net/NSIS_Error
unknown
https://www.office.com/p
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://84.38.129.16/efxSlCP242.binn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/155.94.241.186
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.130.0
checkip.dyndns.com
United States
84.38.129.16
unknown
Latvia

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\opilionina\expectedly\forfjumret
jockeyer
HKEY_CURRENT_USER\snowbird\Uninstall\waleskringle\Torsionsaffjedringernes
upwax
HKEY_CURRENT_USER\maaren\opfrsel\forspent
Rekrutteringers105
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
36831000
trusted library allocation
page read and write
malicious
5F62000
direct allocation
page execute and read and write
malicious
36580000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36AF8000
trusted library allocation
page read and write
9162000
direct allocation
page execute and read and write
39C90000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
369DB000
trusted library allocation
page read and write
19A000
stack
page read and write
39C90000
trusted library allocation
page read and write
36A9D000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39EA0000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
2434000
heap
page read and write
367D0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3654E000
trusted library allocation
page read and write
400000
unkown
page readonly
36800000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
734000
heap
page read and write
39AA0000
trusted library allocation
page read and write
398DF000
stack
page read and write
367A0000
trusted library allocation
page read and write
6F4000
heap
page read and write
7362000
direct allocation
page execute and read and write
39D00000
trusted library allocation
page read and write
36915000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
368D7000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
37B4C000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39D9E000
stack
page read and write
39D00000
trusted library allocation
page read and write
39E9F000
stack
page read and write
39D00000
trusted library allocation
page read and write
7DB0000
direct allocation
page read and write
6217000
heap
page read and write
3687A000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
10E000
stack
page read and write
3621F000
stack
page read and write
36800000
trusted library allocation
page read and write
36898000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
6217000
heap
page read and write
368DF000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36561000
trusted library allocation
page read and write
3979F000
stack
page read and write
36800000
trusted library allocation
page read and write
409000
unkown
page write copy
37937000
trusted library allocation
page read and write
3638D000
stack
page read and write
39522000
heap
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36546000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
35B2000
remote allocation
page execute and read and write
8080000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
401000
unkown
page execute read
39AA0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
7EF0000
heap
page read and write
409000
unkown
page write copy
39D30000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
364E0000
direct allocation
page read and write
394E0000
heap
page read and write
10003000
unkown
page readonly
2239000
heap
page read and write
39D00000
trusted library allocation
page read and write
36801000
trusted library allocation
page read and write
500000
direct allocation
page read and write
3999E000
stack
page read and write
39EA0000
trusted library allocation
page read and write
3789C000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
39F70000
trusted library allocation
page read and write
37A49000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
3692F000
trusted library allocation
page read and write
39CF0000
trusted library allocation
page read and write
39F67000
trusted library allocation
page read and write
6B8000
heap
page read and write
36800000
remote allocation
page read and write
400000
unkown
page readonly
62F0000
heap
page read and write
368EB000
trusted library allocation
page read and write
36A0C000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
39FA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
447000
unkown
page readonly
18C000
stack
page read and write
36801000
trusted library allocation
page read and write
37B76000
trusted library allocation
page read and write
6354000
heap
page read and write
54A0000
direct allocation
page execute and read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
393DF000
stack
page read and write
39D00000
trusted library allocation
page read and write
36A17000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
367FD000
stack
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
39EA0000
trusted library allocation
page execute and read and write
390A1000
heap
page read and write
39D00000
trusted library allocation
page read and write
7B0000
heap
page read and write
36800000
trusted library allocation
page read and write
39CA0000
trusted library allocation
page execute and read and write
37ADC000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
2BB2000
remote allocation
page execute and read and write
368E7000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
6A0000
heap
page read and write
CB000
trusted library allocation
page execute and read and write
39FA0000
trusted library allocation
page read and write
369D3000
trusted library allocation
page read and write
39AB0000
trusted library allocation
page execute and read and write
39FA0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
36A08000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
3631F000
stack
page read and write
367C0000
trusted library allocation
page read and write
425000
unkown
page read and write
39C90000
trusted library allocation
page read and write
4D0000
direct allocation
page read and write
37983000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36AA0000
trusted library allocation
page read and write
39574000
heap
page read and write
389CE000
stack
page read and write
39EB0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
39D10000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39A9F000
stack
page read and write
39D00000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
39F70000
trusted library allocation
page read and write
39CE0000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39D40000
trusted library allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
6F8000
heap
page read and write
80D0000
heap
page read and write
36B04000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39575000
heap
page read and write
397DE000
stack
page read and write
6318000
heap
page read and write
39D00000
trusted library allocation
page read and write
5DB2000
remote allocation
page execute and read and write
39F70000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
7DC0000
direct allocation
page read and write
367B6000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
378BA000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
38830000
trusted library allocation
page read and write
39F80000
trusted library allocation
page execute and read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
37844000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36566000
trusted library allocation
page read and write
3654B000
trusted library allocation
page read and write
368DB000
trusted library allocation
page read and write
3961E000
stack
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36A77000
trusted library allocation
page read and write
39AAD000
trusted library allocation
page read and write
680000
heap
page read and write
36800000
trusted library allocation
page read and write
3390000
direct allocation
page read and write
3788E000
trusted library allocation
page read and write
37BD8000
trusted library allocation
page read and write
39F80000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
7E60000
direct allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
37895000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39CD0000
trusted library allocation
page read and write
38AC0000
trusted library allocation
page read and write
10000000
unkown
page readonly
390A1000
heap
page read and write
401000
unkown
page execute read
39AA0000
trusted library allocation
page read and write
407000
unkown
page readonly
2420000
direct allocation
page read and write
409000
unkown
page read and write
37A1E000
trusted library allocation
page read and write
400000
unkown
page readonly
BA000
trusted library allocation
page execute and read and write
39F70000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36330000
heap
page read and write
7E10000
direct allocation
page read and write
3656D000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
63D2000
heap
page read and write
39D00000
trusted library allocation
page read and write
620E000
stack
page read and write
37851000
trusted library allocation
page read and write
394DE000
stack
page read and write
140000
heap
page read and write
36800000
trusted library allocation
page read and write
36810000
heap
page execute and read and write
17B2000
remote allocation
page execute and read and write
39D00000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
39F70000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
49B2000
remote allocation
page execute and read and write
36800000
trusted library allocation
page read and write
37BC8000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
21B2000
remote allocation
page execute and read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
38AD0000
trusted library allocation
page read and write
6B0000
heap
page read and write
36697000
stack
page read and write
39AA0000
trusted library allocation
page read and write
37BBC000
trusted library allocation
page read and write
39CB0000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
753000
heap
page read and write
39D30000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
3991E000
stack
page read and write
2235000
heap
page read and write
233F000
stack
page read and write
53B2000
remote allocation
page execute and read and write
36800000
trusted library allocation
page read and write
37C48000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
378A6000
trusted library allocation
page read and write
447000
unkown
page readonly
447000
unkown
page readonly
409000
unkown
page write copy
367A0000
trusted library allocation
page read and write
378B4000
trusted library allocation
page read and write
287F000
stack
page read and write
37A4D000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
remote allocation
page read and write
39D00000
trusted library allocation
page read and write
2220000
heap
page read and write
39CA0000
trusted library allocation
page read and write
37831000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
7E30000
direct allocation
page read and write
39D00000
trusted library allocation
page read and write
2230000
heap
page read and write
39EB0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
369D9000
trusted library allocation
page read and write
37A7E000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39F80000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
407000
unkown
page readonly
38AAE000
stack
page read and write
39C90000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
39C90000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
2880000
heap
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D30000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
7EBE000
stack
page read and write
36800000
trusted library allocation
page read and write
369E1000
trusted library allocation
page read and write
390A0000
heap
page read and write
6180000
heap
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36572000
trusted library allocation
page read and write
401000
unkown
page execute read
445000
unkown
page read and write
36800000
trusted library allocation
page read and write
394E8000
heap
page read and write
36800000
trusted library allocation
page read and write
3655A000
trusted library allocation
page read and write
378AB000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39FB0000
trusted library allocation
page read and write
37963000
trusted library allocation
page read and write
4E0000
direct allocation
page read and write
36800000
trusted library allocation
page read and write
368A4000
trusted library allocation
page read and write
3696C000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39EA0000
trusted library allocation
page read and write
378B1000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36AF5000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
4C0000
direct allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39D20000
trusted library allocation
page execute and read and write
39F80000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
remote allocation
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
807E000
stack
page read and write
39AA0000
trusted library allocation
page read and write
39FC0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
41BB000
stack
page read and write
39D00000
trusted library allocation
page read and write
36AFE000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
7DD0000
direct allocation
page read and write
37999000
trusted library allocation
page read and write
36AAB000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
3FB2000
remote allocation
page execute and read and write
37B96000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
6210000
heap
page read and write
3655E000
trusted library allocation
page read and write
660F000
stack
page read and write
39D00000
trusted library allocation
page read and write
39CE0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39FB0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
80CE000
stack
page read and write
3784B000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36A0A000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
369E6000
trusted library allocation
page read and write
37AF3000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
38AC0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
37BCD000
trusted library allocation
page read and write
3611B000
stack
page read and write
36800000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
378AF000
trusted library allocation
page read and write
39D10000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
400000
unkown
page readonly
110000
trusted library allocation
page execute and read and write
39AA0000
trusted library allocation
page read and write
39CD0000
trusted library allocation
page read and write
3696E000
trusted library allocation
page read and write
546000
heap
page read and write
39CB0000
trusted library allocation
page read and write
401000
unkown
page execute read
367B0000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
219E000
stack
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
98000
stack
page read and write
36A12000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
37A0E000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
368A8000
trusted library allocation
page read and write
70B000
heap
page read and write
38ADA000
trusted library allocation
page read and write
37C32000
trusted library allocation
page read and write
421000
unkown
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
38AE0000
heap
page read and write
3679F000
stack
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
7DE0000
direct allocation
page read and write
36800000
trusted library allocation
page read and write
37B24000
trusted library allocation
page read and write
490000
heap
page read and write
37B7A000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D30000
trusted library allocation
page execute and read and write
36AD3000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39CB0000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
36800000
trusted library allocation
page read and write
378A2000
trusted library allocation
page read and write
37BAB000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39D10000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
368E3000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
367C0000
trusted library allocation
page read and write
4F0000
direct allocation
page read and write
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
7E50000
direct allocation
page read and write
510000
direct allocation
page read and write
36800000
trusted library allocation
page read and write
3688A000
trusted library allocation
page read and write
6371000
heap
page read and write
39D00000
trusted library allocation
page read and write
38AD0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39F80000
trusted library allocation
page read and write
36AFA000
trusted library allocation
page read and write
8C0000
direct allocation
page read and write
37859000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36A04000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
37BE6000
trusted library allocation
page read and write
39CA0000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
37C12000
trusted library allocation
page read and write
37BC3000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
36820000
heap
page execute and read and write
37B39000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
364F0000
direct allocation
page read and write
39D00000
trusted library allocation
page read and write
36AE5000
trusted library allocation
page read and write
39FA0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
4A0000
direct allocation
page read and write
36800000
trusted library allocation
page read and write
39589000
heap
page read and write
39C90000
trusted library allocation
page read and write
39F60000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
3653A000
stack
page read and write
298C000
heap
page read and write
36540000
trusted library allocation
page read and write
39F70000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
407000
unkown
page readonly
39D00000
trusted library allocation
page read and write
407000
unkown
page readonly
368A0000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
37A80000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
8762000
direct allocation
page execute and read and write
36800000
trusted library allocation
page read and write
3975D000
stack
page read and write
39EB0000
trusted library allocation
page read and write
429000
unkown
page read and write
36ACE000
trusted library allocation
page read and write
39CC0000
trusted library allocation
page read and write
39EB0000
trusted library allocation
page read and write
7D62000
direct allocation
page execute and read and write
540000
heap
page read and write
520000
heap
page read and write
36800000
trusted library allocation
page read and write
37A68000
trusted library allocation
page read and write
6962000
direct allocation
page execute and read and write
7E40000
direct allocation
page read and write
C5000
trusted library allocation
page execute and read and write
10005000
unkown
page readonly
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3971F000
stack
page read and write
6215000
heap
page read and write
39D00000
trusted library allocation
page read and write
9B62000
direct allocation
page execute and read and write
367B0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36AA2000
trusted library allocation
page read and write
39EC0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
6EF000
heap
page read and write
38AD6000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39F80000
trusted library allocation
page read and write
40BC000
stack
page read and write
36895000
trusted library allocation
page read and write
369D7000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
36800000
trusted library allocation
page read and write
2380000
heap
page read and write
7E20000
direct allocation
page read and write
37B02000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
4B0000
direct allocation
page read and write
36B00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36C3C000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
38AD0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
36A97000
trusted library allocation
page read and write
7E00000
direct allocation
page read and write
39D30000
trusted library allocation
page read and write
39CBF000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
2430000
heap
page read and write
36800000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
39D10000
trusted library allocation
page execute and read and write
A0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
3648F000
stack
page read and write
39D00000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
3995F000
stack
page read and write
39D00000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
39F70000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39586000
heap
page read and write
37924000
trusted library allocation
page read and write
38AD4000
trusted library allocation
page read and write
16F0000
remote allocation
page execute and read and write
3790E000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
3690F000
trusted library allocation
page read and write
7DF0000
direct allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39C90000
trusted library allocation
page read and write
803D000
stack
page read and write
711000
heap
page read and write
36800000
trusted library allocation
page read and write
39FD0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
39FC0000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
6398000
heap
page read and write
39D50000
trusted library allocation
page read and write
447000
unkown
page readonly
39C90000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
63D2000
heap
page read and write
39EB0000
trusted library allocation
page read and write
67E000
stack
page read and write
36580000
trusted library allocation
page read and write
10001000
unkown
page execute read
39D00000
trusted library allocation
page read and write
36AF2000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
29FB000
heap
page read and write
37A0C000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
379F6000
trusted library allocation
page read and write
38AB0000
trusted library allocation
page read and write
39CC0000
trusted library allocation
page read and write
5562000
direct allocation
page execute and read and write
36800000
trusted library allocation
page read and write
7FFF000
stack
page read and write
6310000
heap
page read and write
B0000
trusted library allocation
page read and write
36AA6000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
39D00000
trusted library allocation
page read and write
638B000
heap
page read and write
367B0000
trusted library allocation
page read and write
3783F000
trusted library allocation
page read and write
36590000
heap
page read and write
39F90000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
38838000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
There are 710 hidden memdumps, click here to show them.