IOC Report
Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpC1CB.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\QeSBxb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\QeSBxb.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QeSBxb.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cpy1nvyv.adq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jm1pc1mb.ejw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3ucg1e3.5ka.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zan2lbe3.044.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD080.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QeSBxb.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QeSBxb" /XML "C:\Users\user\AppData\Local\Temp\tmpC1CB.tmp"
malicious
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe"
malicious
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exe"
malicious
C:\Users\user\AppData\Roaming\QeSBxb.exe
C:\Users\user\AppData\Roaming\QeSBxb.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QeSBxb" /XML "C:\Users\user\AppData\Local\Temp\tmpD080.tmp"
malicious
C:\Users\user\AppData\Roaming\QeSBxb.exe
"C:\Users\user\AppData\Roaming\QeSBxb.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20and%20Time:%2025/10/2024%20/%2018:18:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20377142%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
132.226.247.73
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20a
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/173.254.250.81$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:377142%0D%0ADate%20and%20Time:%2025/10/2024%20/%2019:57:31%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20377142%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/173.254.250.81
188.114.97.3
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\QeSBxb_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E51000
trusted library allocation
page read and write
malicious
3191000
trusted library allocation
page read and write
malicious
4755000
trusted library allocation
page read and write
malicious
4AF4000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
3EF7000
trusted library allocation
page read and write
4386000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
6C9E000
stack
page read and write
3200000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
645E000
stack
page read and write
1480000
heap
page read and write
2FCE000
trusted library allocation
page read and write
2E3D000
stack
page read and write
FF2000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
3200000
heap
page read and write
6B00000
trusted library allocation
page read and write
B5CE000
stack
page read and write
413000
remote allocation
page execute and read and write
4579000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
4219000
trusted library allocation
page read and write
4530000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
14C4000
trusted library allocation
page read and write
4535000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
F58D000
stack
page read and write
6F30000
heap
page read and write
3ED3000
trusted library allocation
page read and write
14F2000
trusted library allocation
page read and write
AEE7000
trusted library allocation
page read and write
6920000
heap
page read and write
4EFC000
stack
page read and write
57B0000
heap
page read and write
DDAB000
stack
page read and write
995D000
stack
page read and write
13B0000
heap
page read and write
1356000
stack
page read and write
57A0000
trusted library allocation
page read and write
6A9F000
stack
page read and write
1480000
heap
page read and write
1259000
stack
page read and write
14C0000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
420A000
trusted library allocation
page read and write
F80E000
stack
page read and write
5372000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
57C0000
heap
page read and write
98FE000
stack
page read and write
42C000
remote allocation
page execute and read and write
2F0E000
trusted library allocation
page read and write
69A9000
heap
page read and write
343A000
trusted library allocation
page read and write
A2F000
unkown
page read and write
314B000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
30A2000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
105B000
heap
page read and write
69B2000
heap
page read and write
59B5000
heap
page read and write
5970000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
4217000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
174E000
stack
page read and write
434000
remote allocation
page execute and read and write
2EBE000
stack
page read and write
100B000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
42E000
remote allocation
page execute and read and write
114A000
heap
page read and write
53C0000
heap
page read and write
5761000
trusted library allocation
page read and write
41C4000
trusted library allocation
page read and write
15FD000
heap
page read and write
F54D000
stack
page read and write
FD4000
trusted library allocation
page read and write
580000
heap
page read and write
BA7000
stack
page read and write
15D7000
heap
page read and write
42F000
remote allocation
page execute and read and write
72A0000
heap
page read and write
848E000
stack
page read and write
401E000
trusted library allocation
page read and write
1187000
stack
page read and write
3042000
trusted library allocation
page read and write
15A6000
trusted library allocation
page execute and read and write
2EC0000
trusted library allocation
page read and write
333F000
trusted library allocation
page read and write
5AC0000
heap
page execute and read and write
454D000
trusted library allocation
page read and write
3376000
trusted library allocation
page read and write
69BA000
trusted library allocation
page read and write
59B0000
heap
page read and write
14A0000
trusted library allocation
page read and write
14BB000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
435E000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
31F6000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page execute and read and write
2DA0000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
923A000
heap
page read and write
465F000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
112E000
stack
page read and write
1633000
heap
page read and write
310A000
trusted library allocation
page read and write
3033000
trusted library allocation
page read and write
8DFE000
stack
page read and write
2F59000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
41F5000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
9237000
heap
page read and write
12BE000
stack
page read and write
14B6000
trusted library allocation
page read and write
1520000
trusted library allocation
page execute and read and write
3150000
trusted library allocation
page read and write
41F0000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
5960000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
4624000
trusted library allocation
page read and write
4268000
trusted library allocation
page read and write
6A5D000
stack
page read and write
6F20000
trusted library allocation
page execute and read and write
322E000
trusted library allocation
page read and write
15EF000
heap
page read and write
F90F000
stack
page read and write
6597000
heap
page read and write
5696000
trusted library allocation
page read and write
5AA0000
heap
page read and write
130E000
stack
page read and write
57C0000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
14D6000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
576D000
trusted library allocation
page read and write
8F3F000
stack
page read and write
8CD0000
trusted library allocation
page execute and read and write
6C1E000
stack
page read and write
59A0000
trusted library allocation
page read and write
3E79000
trusted library allocation
page read and write
1370000
heap
page read and write
5780000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
F37000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
5CC0000
heap
page read and write
5860000
trusted library allocation
page read and write
30C8000
trusted library allocation
page read and write
15E4000
heap
page read and write
8800000
trusted library allocation
page read and write
1089000
stack
page read and write
3EB6000
trusted library allocation
page read and write
6968000
heap
page read and write
B4CD000
stack
page read and write
55DE000
trusted library allocation
page read and write
57F3000
heap
page read and write
8E3F000
stack
page read and write
1181000
heap
page read and write
428C000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
141D000
stack
page read and write
18BB000
trusted library allocation
page execute and read and write
DCCF000
stack
page read and write
16DF000
stack
page read and write
C380000
trusted library section
page read and write
14CD000
trusted library allocation
page execute and read and write
91D4000
heap
page read and write
3004000
trusted library allocation
page read and write
6FB0000
heap
page read and write
4104000
trusted library allocation
page read and write
6B07000
trusted library allocation
page read and write
1550000
heap
page read and write
575E000
trusted library allocation
page read and write
1584000
trusted library allocation
page read and write
14F0000
heap
page read and write
FED000
trusted library allocation
page execute and read and write
97BE000
stack
page read and write
349A000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
439000
remote allocation
page execute and read and write
91C0000
heap
page read and write
14E2000
trusted library allocation
page read and write
E3A000
stack
page read and write
5F0000
heap
page read and write
2EB6000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
568E000
stack
page read and write
2D3D000
stack
page read and write
658F000
heap
page read and write
2F10000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
11C3000
heap
page read and write
3EDC000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
9ED000
stack
page read and write
5D0000
heap
page read and write
5CE000
unkown
page read and write
2D9E000
stack
page read and write
5BC5000
heap
page read and write
666D000
stack
page read and write
5366000
trusted library allocation
page read and write
178E000
stack
page read and write
56AD000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
946E000
stack
page read and write
6B60000
trusted library allocation
page execute and read and write
43A000
remote allocation
page execute and read and write
6D9E000
stack
page read and write
14E0000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
5744000
trusted library allocation
page read and write
2C80000
heap
page read and write
436000
remote allocation
page execute and read and write
2FB0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
3220000
trusted library allocation
page read and write
15BE000
heap
page read and write
6AA0000
trusted library allocation
page read and write
426F000
trusted library allocation
page read and write
6530000
heap
page read and write
57E0000
trusted library allocation
page read and write
DACD000
stack
page read and write
598C000
trusted library allocation
page read and write
448B000
trusted library allocation
page read and write
1005000
trusted library allocation
page execute and read and write
5370000
trusted library allocation
page read and write
14F7000
trusted library allocation
page execute and read and write
344A000
trusted library allocation
page read and write
4469000
trusted library allocation
page read and write
44A1000
trusted library allocation
page read and write
4524000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
3ED9000
trusted library allocation
page read and write
F68E000
stack
page read and write
3496000
trusted library allocation
page read and write
14E2000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
30C2000
trusted library allocation
page read and write
5C60000
trusted library allocation
page execute and read and write
3148000
trusted library allocation
page read and write
18E7000
heap
page read and write
6A20000
trusted library allocation
page execute and read and write
120B000
heap
page read and write
42CC000
trusted library allocation
page read and write
51A000
stack
page read and write
967F000
stack
page read and write
3383000
trusted library allocation
page read and write
5268000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
1397000
trusted library allocation
page execute and read and write
3156000
trusted library allocation
page read and write
14E6000
trusted library allocation
page execute and read and write
83FE000
stack
page read and write
3494000
trusted library allocation
page read and write
6EC7000
trusted library allocation
page read and write
681E000
stack
page read and write
4203000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
6A30000
trusted library allocation
page execute and read and write
87F0000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
1068000
heap
page read and write
3EE1000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
320B000
stack
page read and write
18D0000
trusted library allocation
page read and write
42F4000
trusted library allocation
page read and write
9900000
trusted library section
page read and write
2E3E000
unkown
page read and write
69E0000
trusted library allocation
page read and write
18B2000
trusted library allocation
page read and write
652F000
stack
page read and write
2F9B000
heap
page read and write
4129000
trusted library allocation
page read and write
166E000
heap
page read and write
2D90000
trusted library allocation
page execute and read and write
6E60000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
6B70000
heap
page read and write
30CE000
stack
page read and write
10F0000
heap
page read and write
3488000
trusted library allocation
page read and write
15B8000
heap
page read and write
17CC000
stack
page read and write
57F0000
heap
page read and write
2EC1000
trusted library allocation
page read and write
1002000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
2BE0000
heap
page read and write
35D2000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
DEAC000
stack
page read and write
1140000
heap
page read and write
6E6B000
trusted library allocation
page read and write
14F5000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page execute and read and write
5640000
heap
page execute and read and write
4301000
trusted library allocation
page read and write
56B0000
heap
page read and write
2F02000
trusted library allocation
page read and write
868E000
stack
page read and write
3490000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
56B3000
heap
page read and write
2EFF000
stack
page read and write
5A9F000
stack
page read and write
2FB8000
trusted library allocation
page read and write
B2A0000
heap
page read and write
14D0000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
4634000
trusted library allocation
page read and write
2CA0000
heap
page read and write
69CD000
trusted library allocation
page read and write
EF0000
unkown
page readonly
43B4000
trusted library allocation
page read and write
3080000
heap
page execute and read and write
41D9000
trusted library allocation
page read and write
3EBD000
trusted library allocation
page read and write
4276000
trusted library allocation
page read and write
E9E000
stack
page read and write
4191000
trusted library allocation
page read and write
3EC1000
trusted library allocation
page read and write
167E000
heap
page read and write
44EB000
trusted library allocation
page read and write
FBBD000
stack
page read and write
B63D000
stack
page read and write
642E000
stack
page read and write
2F0A000
trusted library allocation
page read and write
957E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
1580000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
1445000
heap
page read and write
2BB0000
heap
page read and write
1183000
heap
page read and write
8CFD000
stack
page read and write
18E0000
heap
page read and write
18B7000
trusted library allocation
page execute and read and write
42D000
remote allocation
page execute and read and write
5AB0000
trusted library allocation
page execute and read and write
1388000
trusted library allocation
page read and write
9060000
heap
page read and write
5694000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
3403000
trusted library allocation
page read and write
5950000
heap
page read and write
411A000
trusted library allocation
page read and write
2CEE000
stack
page read and write
354E000
trusted library allocation
page read and write
574B000
trusted library allocation
page read and write
3F4C000
trusted library allocation
page read and write
13B0000
heap
page read and write
32B9000
trusted library allocation
page read and write
55F0000
heap
page read and write
41A4000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
4540000
trusted library allocation
page read and write
1030000
heap
page read and write
5800000
trusted library allocation
page read and write
91A0000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
6C5E000
stack
page read and write
43D0000
trusted library allocation
page read and write
16A7000
heap
page read and write
936E000
stack
page read and write
30CD000
trusted library allocation
page read and write
2ACE000
stack
page read and write
3208000
trusted library allocation
page read and write
5A80000
trusted library section
page readonly
5772000
trusted library allocation
page read and write
452B000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
3409000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
1386000
trusted library allocation
page execute and read and write
4323000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
919D000
stack
page read and write
BF9E000
stack
page read and write
88A3000
heap
page read and write
302F000
trusted library allocation
page read and write
69B4000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
431F000
trusted library allocation
page read and write
6BDF000
stack
page read and write
3250000
heap
page read and write
4622000
trusted library allocation
page read and write
4161000
trusted library allocation
page read and write
6490000
heap
page read and write
2F35000
trusted library allocation
page read and write
2B0F000
stack
page read and write
41B1000
trusted library allocation
page read and write
8880000
heap
page read and write
4071000
trusted library allocation
page read and write
3352000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
1207000
heap
page read and write
87CE000
stack
page read and write
8CBE000
stack
page read and write
318E000
stack
page read and write
96BE000
stack
page read and write
2FFE000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
45AF000
trusted library allocation
page read and write
1800000
heap
page read and write
1588000
heap
page read and write
4599000
trusted library allocation
page read and write
14DD000
trusted library allocation
page execute and read and write
403000
remote allocation
page execute and read and write
6498000
heap
page read and write
53C3000
heap
page read and write
53F0000
trusted library allocation
page read and write
1038000
heap
page read and write
139B000
trusted library allocation
page execute and read and write
F6CE000
stack
page read and write
3343000
trusted library allocation
page read and write
2EBE000
stack
page read and write
3374000
trusted library allocation
page read and write
66EE000
stack
page read and write
1007000
trusted library allocation
page execute and read and write
3232000
trusted library allocation
page read and write
528E000
stack
page read and write
1672000
heap
page read and write
6DF0000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
68AE000
stack
page read and write
30D1000
trusted library allocation
page read and write
5443000
heap
page read and write
F7CE000
stack
page read and write
13D0000
heap
page read and write
122E000
stack
page read and write
1460000
heap
page execute and read and write
843E000
stack
page read and write
FA0000
heap
page read and write
1390000
trusted library allocation
page read and write
41EB000
trusted library allocation
page read and write
1174000
heap
page read and write
4504000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
41B9000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
8ACE000
stack
page read and write
4373000
trusted library allocation
page read and write
15AA000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
5740000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page execute and read and write
3EC8000
trusted library allocation
page read and write
8A7E000
stack
page read and write
8A8E000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
445A000
trusted library allocation
page read and write
41E4000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
18AF000
stack
page read and write
4511000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
5630000
heap
page execute and read and write
2EFE000
trusted library allocation
page read and write
3292000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
FD0000
heap
page read and write
3412000
trusted library allocation
page read and write
6594000
heap
page read and write
324E000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
55E0000
heap
page execute and read and write
65A1000
heap
page read and write
3236000
trusted library allocation
page read and write
69A4000
heap
page read and write
4221000
trusted library allocation
page read and write
155E000
stack
page read and write
3ECA000
trusted library allocation
page read and write
69C8000
trusted library allocation
page read and write
4519000
trusted library allocation
page read and write
3240000
heap
page execute and read and write
2EEE000
trusted library allocation
page read and write
2E40000
heap
page read and write
415000
remote allocation
page execute and read and write
2E7F000
unkown
page read and write
41D2000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
57A0000
trusted library section
page readonly
5BC0000
heap
page read and write
4074000
trusted library allocation
page read and write
147E000
stack
page read and write
1350000
heap
page read and write
14D1000
trusted library allocation
page read and write
14CE000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
119A000
heap
page read and write
4663000
trusted library allocation
page read and write
1470000
trusted library allocation
page execute and read and write
340D000
trusted library allocation
page read and write
133E000
stack
page read and write
E5E000
stack
page read and write
4033000
trusted library allocation
page read and write
97FE000
stack
page read and write
43E5000
trusted library allocation
page read and write
5760000
heap
page read and write
8810000
heap
page read and write
5602000
trusted library allocation
page read and write
5990000
trusted library allocation
page execute and read and write
3ED7000
trusted library allocation
page read and write
4F4E000
stack
page read and write
67EE000
stack
page read and write
6ADE000
stack
page read and write
10EE000
stack
page read and write
8CE0000
trusted library allocation
page read and write
460C000
trusted library allocation
page read and write
573E000
stack
page read and write
314E000
trusted library allocation
page read and write
2F90000
heap
page read and write
8B0D000
stack
page read and write
430000
remote allocation
page execute and read and write
AA9000
stack
page read and write
2FA0000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
69C6000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
15F1000
heap
page read and write
3ECE000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
FDD000
trusted library allocation
page execute and read and write
820000
heap
page read and write
31CE000
stack
page read and write
69F0000
trusted library allocation
page execute and read and write
43B0000
trusted library allocation
page read and write
5A90000
heap
page read and write
6A10000
trusted library allocation
page execute and read and write
A2A000
stack
page read and write
14B0000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
FA7C000
stack
page read and write
1235000
heap
page read and write
FB7C000
stack
page read and write
3FAB000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
1647000
heap
page read and write
4046000
trusted library allocation
page read and write
145C000
stack
page read and write
14DD000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
579D000
stack
page read and write
5B50000
trusted library allocation
page read and write
1203000
heap
page read and write
569B000
stack
page read and write
13B7000
heap
page read and write
14FB000
trusted library allocation
page execute and read and write
57D0000
heap
page read and write
3204000
trusted library allocation
page read and write
EC5000
heap
page read and write
5850000
trusted library allocation
page execute and read and write
348B000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
2EFA000
trusted library allocation
page read and write
41AB000
trusted library allocation
page read and write
11C6000
heap
page read and write
4FFC000
stack
page read and write
EF2000
unkown
page readonly
8D3E000
stack
page read and write
5384000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
166A000
heap
page read and write
421C000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
FD5000
heap
page read and write
420E000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
136D000
trusted library allocation
page execute and read and write
419F000
trusted library allocation
page read and write
15B0000
heap
page read and write
FD0000
trusted library allocation
page read and write
3FC1000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
7F850000
trusted library allocation
page execute and read and write
33E3000
trusted library allocation
page read and write
FF6000
trusted library allocation
page execute and read and write
4444000
trusted library allocation
page read and write
5880000
trusted library allocation
page execute and read and write
1392000
trusted library allocation
page read and write
5795000
trusted library allocation
page read and write
3E73000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
2AD0000
heap
page read and write
53B0000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
B8EE000
stack
page read and write
6B10000
trusted library allocation
page execute and read and write
7560000
heap
page read and write
5344000
trusted library allocation
page read and write
1544000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
6460000
heap
page read and write
44F7000
trusted library allocation
page read and write
14BE000
trusted library allocation
page read and write
691F000
stack
page read and write
1583000
trusted library allocation
page execute and read and write
C09D000
stack
page read and write
3F36000
trusted library allocation
page read and write
E10000
heap
page read and write
EC0000
heap
page read and write
FCBE000
stack
page read and write
2FA2000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
57E0000
heap
page read and write
3210000
trusted library allocation
page execute and read and write
B290000
heap
page read and write
1364000
trusted library allocation
page read and write
17E0000
heap
page read and write
4DD000
stack
page read and write
14CA000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
8E3E000
stack
page read and write
324A000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
111D000
heap
page read and write
8A80000
trusted library allocation
page read and write
134E000
stack
page read and write
429000
remote allocation
page execute and read and write
55FD000
trusted library allocation
page read and write
5290000
heap
page read and write
55F6000
trusted library allocation
page read and write
FD3000
trusted library allocation
page execute and read and write
2DA4000
trusted library allocation
page read and write
114E000
heap
page read and write
429F000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
3F8B000
trusted library allocation
page read and write
91D0000
heap
page read and write
4717000
trusted library allocation
page read and write
4261000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
314B000
trusted library allocation
page read and write
17AE000
stack
page read and write
3EC3000
trusted library allocation
page read and write
5840000
heap
page read and write
1363000
trusted library allocation
page execute and read and write
14F0000
trusted library allocation
page read and write
B48D000
stack
page read and write
1621000
heap
page read and write
5890000
trusted library allocation
page read and write
DBCE000
stack
page read and write
69C0000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
70F0000
heap
page read and write
9265000
heap
page read and write
42CB000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
4213000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
3F5F000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
66AE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
8B10000
trusted library allocation
page execute and read and write
69B6000
trusted library allocation
page read and write
40A5000
trusted library allocation
page read and write
69AE000
stack
page read and write
9470000
trusted library section
page read and write
53D0000
trusted library allocation
page read and write
14C3000
trusted library allocation
page execute and read and write
138A000
trusted library allocation
page execute and read and write
44FA000
trusted library allocation
page read and write
6470000
heap
page read and write
1590000
trusted library allocation
page read and write
41AB000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
55EA000
trusted library allocation
page read and write
42E2000
trusted library allocation
page read and write
2B90000
heap
page read and write
14B0000
trusted library allocation
page read and write
13C0000
heap
page read and write
1510000
trusted library allocation
page read and write
82B000
heap
page read and write
5C90000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
878E000
stack
page read and write
6E67000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
41FD000
trusted library allocation
page read and write
157B000
heap
page read and write
3261000
trusted library allocation
page read and write
858E000
stack
page read and write
4AB7000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
42E4000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
11FF000
heap
page read and write
6DE0000
trusted library allocation
page execute and read and write
1540000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
569A000
trusted library allocation
page read and write
5A7B000
stack
page read and write
41F6000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
402000
remote allocation
page execute and read and write
7682000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
FFA000
trusted library allocation
page execute and read and write
4200000
trusted library allocation
page read and write
126E000
stack
page read and write
5440000
heap
page read and write
5980000
trusted library allocation
page read and write
3EE0000
trusted library allocation
page read and write
53FC000
stack
page read and write
14EA000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
42EB000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
F44E000
stack
page read and write
7F4E0000
trusted library allocation
page execute and read and write
There are 754 hidden memdumps, click here to show them.