IOC Report
g1TLK7mbZD.img

loading gif

Files

File Path
Type
Category
Malicious
g1TLK7mbZD.img
UDF filesystem data (version 1.5) 'DOCUMENTS'
initial sample
malicious
\Device\CdRom0\9236-pagaconferma-jpg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lju2uzly.zzm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvrkm1qx.d3m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psyybgkk.e0r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3sb3z55.j0i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\turbinate
data
dropped
C:\Users\user\Desktop\tmp.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath (gc C:\Windows\path.txt) > tmp.log 2>&1
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ex bypass -command Mount-DiskImage -ImagePath (gc C:\Windows\path.txt)
malicious
\Device\CdRom0\9236-pagaconferma-jpg.exe
"D:\9236-pagaconferma-jpg.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"D:\9236-pagaconferma-jpg.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\drivers\udfs.sys

URLs

Name
IP
Malicious
https://reallyfreegeoip.org/xml/154.16.192.225
104.21.67.152
malicious
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:364339%0D%0ADate%20and%20Time:%2024/10/2024%20/%2020:04:04%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20364339%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
malicious
http://checkip.dyndns.org/
158.101.44.242
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.google.com/chrome/next-steps.html?brand=CHWL&statcb=0&installdataindex=empty&defaultbrow
unknown
https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.autoitscript.com/site/autoit/downloads/https://www.autoitscript.com/site/autoit/download
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://eicar.org/
unknown
https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
unknown
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
https://www.google.com/https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-n
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://sdlc-esd.oracle.com/ESD6/JSCDL/jdk/8u301-b09/d3c52aa6bfa54d3ca74e617f18309292/JavaSetup8u301
unknown
https://www.eicar.org/download-anti-malware-testfile/:
unknown
https://packetstormsecurity.com/https://packetstormsecurity.com/files/download/22459/BIOS320.EXEhttp
unknown
https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B9AB9339B
unknown
https://cdn.stubdownloader.services.mozilla.com/builds/firefox-latest-ssl/en-GB/win64/b5110ff5d41570
unknown
http://checkip.dyndns.org/q
unknown
https://secure.eicar.org/eicar.com;
unknown
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245029_d3c52aa6bfa54d3ca74e617f18309292K
unknown
https://duckduckgo.com/chrome_newtab0
unknown
https://secure.eicar.org/eicar.com.txtD
unknown
https://stubdownloader.services.mozilla.com/?attribution_code=c291cmNlPXd3dy5nb29nbGUuY29tJm1lZGl1bT
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://secure.eicar.org/eicar.com
unknown
https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.exe
unknown
https://packetstormsecurity.com/files/download/22459/BIOS320.EXE
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://secure.eicar.org/eicar.com.txt/
unknown
https://www.google.com/search?q=eicar
unknown
https://secure.eicar.org/eicar.com/
unknown
https://secure.eicar.org/eicar.com.
unknown
http://aborters.duckdns.org:8081
unknown
https://www.autoitscript.com/site/autoit/downloads/
unknown
https://www.eicar.org/download-anti-malware-testfile/Download
unknown
https://www.eicar.org/download-anti-malware-testfile/
unknown
https://packetstormsecurity.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://www.eicar.org/
unknown
https://www.office.com/lB5r
unknown
https://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/154.16.192.225$
unknown
http://www.quovadis.bm0
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:364339%0D%0ADate%20a
unknown
https://www.autoitscript.com/files/autoit3/autoit-v3-setup.exeQ
unknown
https://packetstormsecurity.com/files/22459/BIOS320.EXE.html
unknown
https://www.eicar.org/https://eicar.org/https://www.eicar.org/download-anti-malware-testfile/https:/
unknown
https://www.google.com/
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://secure.eicar.org/eicar.com.txt
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.67.152
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.com
158.101.44.242
malicious
checkip.dyndns.org
unknown
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
104.21.67.152
reallyfreegeoip.org
United States
malicious
158.101.44.242
checkip.dyndns.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svchost_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5701000
trusted library allocation
page read and write
malicious
7F40000
trusted library section
page read and write
malicious
677D000
trusted library allocation
page read and write
malicious
3374000
heap
page read and write
malicious
7FE0000
trusted library section
page read and write
malicious
3259000
heap
page read and write
malicious
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
50B6000
trusted library allocation
page execute and read and write
50A0000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
516E000
stack
page read and write
92B0000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7D54000
heap
page read and write
5000000
heap
page read and write
94A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
32BF000
heap
page read and write
7D48000
heap
page read and write
327B000
heap
page read and write
400000
unkown
page readonly
59E6000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
3013000
heap
page read and write
80B0000
trusted library allocation
page read and write
7D40000
heap
page read and write
80B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
9F8000
heap
page read and write
8530000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
7DA4000
heap
page read and write
58AB000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
67A5000
trusted library allocation
page read and write
4BCD000
direct allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
1AE000
stack
page read and write
92B0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
35F0000
heap
page read and write
7D4F000
heap
page read and write
80C0000
trusted library allocation
page read and write
7D94000
heap
page read and write
6B0A000
trusted library allocation
page read and write
6931000
trusted library allocation
page read and write
6804000
trusted library allocation
page read and write
7D42000
heap
page read and write
92B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
8070000
trusted library allocation
page read and write
67FE000
trusted library allocation
page read and write
3268000
heap
page read and write
9570000
trusted library allocation
page read and write
4A7000
unkown
page read and write
5965000
trusted library allocation
page read and write
2DAE000
stack
page read and write
7D7B000
heap
page read and write
6701000
trusted library allocation
page read and write
4238000
heap
page read and write
5060000
trusted library section
page read and write
6957000
trusted library allocation
page read and write
7F3E000
stack
page read and write
80B0000
trusted library allocation
page read and write
6A26000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
8AF000
stack
page read and write
41E6000
heap
page read and write
3285000
heap
page read and write
4A23000
direct allocation
page read and write
92A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7D3F000
heap
page read and write
7FE0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
7FBD000
trusted library allocation
page read and write
3290000
heap
page read and write
9580000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4BC9000
direct allocation
page read and write
80B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
922E000
stack
page read and write
92B0000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
7D47000
heap
page read and write
57AE000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
7FAA000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
1ABE000
stack
page read and write
9230000
trusted library allocation
page read and write
30000
heap
page read and write
56FE000
stack
page read and write
4A23000
direct allocation
page read and write
332D000
heap
page read and write
7D85000
heap
page read and write
6B30000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
8FAF000
stack
page read and write
32F2000
heap
page read and write
6801000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
413F000
stack
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
33B0000
heap
page read and write
80B0000
remote allocation
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
490000
unkown
page write copy
9580000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page execute and read and write
323D000
heap
page read and write
92B0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
482000
unkown
page readonly
92A0000
trusted library allocation
page read and write
50A3000
trusted library allocation
page read and write
322D000
heap
page read and write
43EC000
heap
page read and write
32B9000
heap
page read and write
92B0000
trusted library allocation
page read and write
6BCA000
trusted library allocation
page read and write
43E6000
heap
page read and write
9CA000
heap
page read and write
50CB000
trusted library allocation
page execute and read and write
94A0000
trusted library allocation
page read and write
6B28000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
6B22000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
4AB000
unkown
page readonly
80B0000
trusted library allocation
page read and write
80B1000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
42B2000
heap
page read and write
7D78000
heap
page read and write
C79000
stack
page read and write
92B0000
trusted library allocation
page read and write
95A0000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
3271000
heap
page read and write
5969000
trusted library allocation
page read and write
7D4C000
heap
page read and write
42FC000
heap
page read and write
5A23000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4BCD000
direct allocation
page read and write
6B78000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
43E8000
heap
page execute and read and write
6B60000
trusted library allocation
page read and write
6853000
trusted library allocation
page read and write
7D4A000
heap
page read and write
80C0000
trusted library allocation
page read and write
7D94000
heap
page read and write
6AB8000
trusted library allocation
page read and write
7D71000
heap
page read and write
94A0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
42EE000
heap
page read and write
32F5000
heap
page read and write
8050000
trusted library allocation
page read and write
C10000
heap
page read and write
68B5000
trusted library allocation
page read and write
4BC9000
direct allocation
page read and write
80C0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
6969000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
687A000
trusted library allocation
page read and write
6949000
trusted library allocation
page read and write
7D78000
heap
page read and write
8050000
trusted library allocation
page read and write
328F000
heap
page read and write
9570000
trusted library allocation
page read and write
7D4B000
heap
page read and write
8530000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
3D3E000
stack
page read and write
3291000
heap
page read and write
92B0000
trusted library allocation
page read and write
35F4000
heap
page read and write
92A0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
6A33000
trusted library allocation
page read and write
929A000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
3000000
heap
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
1A7E000
stack
page read and write
50BA000
trusted library allocation
page execute and read and write
9294000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
94B0000
trusted library allocation
page execute and read and write
92A0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page execute and read and write
92B0000
trusted library allocation
page read and write
7D82000
heap
page read and write
92A0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
4741000
heap
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
9C0000
heap
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
15E000
stack
page read and write
7D96000
heap
page read and write
80B0000
remote allocation
page read and write
7D82000
heap
page read and write
5A32000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
2D40000
heap
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
6841000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7D71000
heap
page read and write
7D89000
heap
page read and write
7D94000
heap
page read and write
3013000
heap
page read and write
92D0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
32D0000
heap
page read and write
9490000
trusted library allocation
page execute and read and write
8060000
trusted library allocation
page read and write
4AB000
unkown
page readonly
92A0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B1000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
68AC000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7FAE000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
400000
system
page execute and read and write
92D0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
50C2000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
50B2000
trusted library allocation
page read and write
435000
system
page execute and read and write
6818000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
3212000
heap
page read and write
58BF000
trusted library allocation
page read and write
4140000
heap
page read and write
8530000
trusted library allocation
page execute and read and write
94A0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7D71000
heap
page read and write
3294000
heap
page read and write
2DEE000
stack
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7D50000
heap
page read and write
5A20000
trusted library allocation
page read and write
51C0000
heap
page execute and read and write
92A0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
42DC000
heap
page read and write
80B0000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
676F000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
41B3000
heap
page read and write
4900000
direct allocation
page read and write
7D31000
heap
page read and write
7D57000
heap
page read and write
7DA0000
heap
page read and write
8060000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7DA0000
heap
page read and write
8060000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
50C7000
trusted library allocation
page execute and read and write
9296000
trusted library allocation
page read and write
3254000
heap
page read and write
95B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
7D9A000
heap
page read and write
401000
unkown
page execute read
92D0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
696D000
trusted library allocation
page read and write
699F000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
4216000
heap
page read and write
509D000
trusted library allocation
page execute and read and write
4BCD000
direct allocation
page read and write
95B0000
heap
page read and write
8530000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
5093000
trusted library allocation
page execute and read and write
490000
unkown
page read and write
7D01000
heap
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
7D00000
heap
page read and write
5040000
heap
page read and write
92A0000
trusted library allocation
page read and write
67AC000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
67B7000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
6959000
trusted library allocation
page read and write
334C000
heap
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
6933000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
6B9A000
trusted library allocation
page read and write
5020000
heap
page read and write
1A00000
heap
page read and write
92D0000
trusted library allocation
page read and write
5971000
trusted library allocation
page read and write
7D9A000
heap
page read and write
E0000
heap
page read and write
7F90000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
3013000
heap
page read and write
83AF000
stack
page read and write
8030000
trusted library allocation
page read and write
160000
heap
page read and write
80B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
6999000
trusted library allocation
page read and write
6A3E000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
8B4000
stack
page read and write
8050000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
4BCD000
direct allocation
page read and write
3271000
heap
page read and write
683D000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
928E000
stack
page read and write
11BE000
stack
page read and write
68C7000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
7D82000
heap
page read and write
576A000
trusted library allocation
page read and write
36CF000
stack
page read and write
3220000
heap
page read and write
94A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
7D53000
heap
page read and write
41D4000
heap
page read and write
67B1000
trusted library allocation
page read and write
4249000
heap
page read and write
92B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
3243000
heap
page read and write
92B0000
trusted library allocation
page read and write
5201000
heap
page read and write
5401000
heap
page read and write
7D82000
heap
page read and write
2D00000
heap
page read and write
4900000
direct allocation
page read and write
4A23000
direct allocation
page read and write
58EC000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
5779000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7D78000
heap
page read and write
92B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
80B0000
remote allocation
page read and write
67A0000
trusted library allocation
page read and write
7D84000
heap
page read and write
8050000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
15FE000
stack
page read and write
80B0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
680D000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
32B1000
heap
page read and write
51AE000
stack
page read and write
580D000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
328F000
heap
page read and write
80B0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
41DD000
heap
page read and write
92A0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7D61000
heap
page read and write
92B0000
trusted library allocation
page read and write
41D1000
heap
page read and write
328D000
heap
page read and write
92D0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
19FF000
stack
page read and write
8530000
trusted library allocation
page read and write
9238000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
9231000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4382000
heap
page read and write
8050000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
7D46000
heap
page read and write
92A0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
41DF000
heap
page read and write
68A9000
trusted library allocation
page read and write
6757000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
686B000
trusted library allocation
page read and write
4BC9000
direct allocation
page read and write
80C0000
trusted library allocation
page read and write
5110000
heap
page execute and read and write
4A23000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
43E9000
heap
page read and write
6B6C000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
2D60000
heap
page readonly
8050000
trusted library allocation
page read and write
6BEA000
trusted library allocation
page read and write
9560000
trusted library allocation
page execute and read and write
8060000
trusted library allocation
page read and write
5094000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
3333000
heap
page read and write
42EE000
heap
page read and write
9580000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
328D000
heap
page read and write
94A0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
6AF8000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
6873000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7D78000
heap
page read and write
43E7000
heap
page read and write
92B0000
trusted library allocation
page read and write
8070000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
426000
system
page execute and read and write
6B32000
trusted library allocation
page read and write
5975000
trusted library allocation
page read and write
4BCD000
direct allocation
page read and write
4FE0000
heap
page read and write
6871000
trusted library allocation
page read and write
4341000
heap
page read and write
5501000
heap
page read and write
80C0000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
681F000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
32E4000
heap
page read and write
9480000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
7708000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7D90000
heap
page read and write
58F7000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
1B00000
heap
page read and write
5A2E000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
3002000
heap
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
6AF2000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
7C01000
heap
page execute and read and write
57B2000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
8EAD000
stack
page read and write
92A5000
trusted library allocation
page read and write
5070000
trusted library section
page read and write
9580000
trusted library allocation
page read and write
42D0000
heap
page read and write
8050000
trusted library allocation
page read and write
8040000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
7FB6000
trusted library allocation
page read and write
32B0000
heap
page read and write
947F000
stack
page read and write
4BC9000
direct allocation
page read and write
4AA0000
direct allocation
page read and write
8060000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
7E3E000
stack
page read and write
328D000
heap
page read and write
80B0000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
7D8E000
heap
page read and write
32F1000
heap
page read and write
7F9B000
trusted library allocation
page read and write
323F000
heap
page read and write
7D50000
heap
page read and write
6ABA000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
683B000
trusted library allocation
page read and write
4A23000
direct allocation
page read and write
92D0000
trusted library allocation
page execute and read and write
912E000
stack
page read and write
7D31000
heap
page read and write
482000
unkown
page readonly
9590000
trusted library allocation
page execute and read and write
58B5000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
789E000
stack
page read and write
6B9E000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
4340000
heap
page read and write
6BE8000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
322B000
heap
page read and write
33F5000
heap
page read and write
80B0000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
59F4000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
6759000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
47F3000
heap
page read and write
6B2A000
trusted library allocation
page read and write
8066000
trusted library allocation
page read and write
2CD6000
stack
page read and write
92B0000
trusted library allocation
page read and write
6825000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
7D71000
heap
page read and write
6B7F000
trusted library allocation
page read and write
9480000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
50C5000
trusted library allocation
page execute and read and write
35CE000
stack
page read and write
4BC9000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
7F9E000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
68CD000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4BCD000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
7D47000
heap
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
328C000
heap
page read and write
7D82000
heap
page read and write
327F000
heap
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
9A01000
heap
page read and write
80B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
90EF000
stack
page read and write
5301000
heap
page read and write
7D12000
heap
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
7FB1000
trusted library allocation
page read and write
8FEE000
stack
page read and write
41E3000
heap
page read and write
92A0000
trusted library allocation
page read and write
4A23000
direct allocation
page read and write
80B0000
trusted library allocation
page read and write
3291000
heap
page read and write
58B1000
trusted library allocation
page read and write
50F0000
heap
page read and write
3401000
heap
page read and write
92B0000
trusted library allocation
page read and write
9480000
trusted library allocation
page execute and read and write
94A0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
92B0000
trusted library allocation
page read and write
3200000
heap
page read and write
92B0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
326A000
heap
page read and write
50B0000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
41C9000
heap
page read and write
92DF000
trusted library allocation
page read and write
9CD000
heap
page read and write
9500000
trusted library allocation
page read and write
6AF4000
trusted library allocation
page read and write
5977000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
400000
unkown
page readonly
4BC9000
direct allocation
page read and write
9580000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
4341000
heap
page read and write
89F000
stack
page read and write
59ED000
trusted library allocation
page read and write
7D7B000
heap
page read and write
8050000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
50AD000
trusted library allocation
page execute and read and write
9A000
stack
page read and write
7D85000
heap
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
8050000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
7D71000
heap
page read and write
80B0000
trusted library allocation
page read and write
7F96000
trusted library allocation
page read and write
679D000
trusted library allocation
page read and write
401000
unkown
page execute read
80AE000
stack
page read and write
57AA000
trusted library allocation
page read and write
6A44000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
15BF000
stack
page read and write
5775000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
577D000
trusted library allocation
page read and write
33F0000
heap
page read and write
80B0000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
92B0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
There are 816 hidden memdumps, click here to show them.