IOC Report
Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe

loading gif

Files

File Path
Type
Category
Malicious
Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpB8C6.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HJnkiZjAPsec.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cqcx0lfj.plp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfvikkux.lpe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wu4lludl.4lu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zygjjui0.t3g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCB45.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HJnkiZjAPsec" /XML "C:\Users\user\AppData\Local\Temp\tmpB8C6.tmp"
malicious
C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
"C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe"
malicious
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HJnkiZjAPsec" /XML "C:\Users\user\AppData\Local\Temp\tmpCB45.tmp"
malicious
C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe
"C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
https://www.office.com/lB
unknown
https://www.office.com/H
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://www.goodfont.co.kr
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://kafs.co.ug
unknown
http://varders.kozow.com:8081
unknown
http://www.sajatypeworks.com
unknown
http://mail.kafs.co.ug
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://checkip.dyndns.org/
193.122.130.0
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://reallyfreegeoip.org/xml/173.254.250.81$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:927537%0D%0ADate%20and%20Time:%2025/10/2024%20/%2019:19:15%0D%0ACountry%20Name:%20United%20States%0D%0A[%20927537%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://mail.kafs.co.ugd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://r11.i.lencr.org/0#
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://r11.o.lencr.org0#
unknown
https://chrome.google.com/webstore?hl=enH
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://aborters.duckdns.org:8081
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:927537%0D%0ADate%20and%20Time:%2025/10/2024%20/%2020:37:54%0D%0ACountry%20Name:%20United%20States%0D%0A[%20927537%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
http://www.fontbureau.com/designers/frere-user.html
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:927537%0D%0ADate%20a
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://kafs.co.ugd
unknown
https://reallyfreegeoip.org/xml/173.254.250.81
188.114.97.3
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kafs.co.ug
104.243.33.38
malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
mail.kafs.co.ug
unknown
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
104.243.33.38
kafs.co.ug
United States
malicious
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HJnkiZjAPsec_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
46A7000
trusted library allocation
page read and write
malicious
4A46000
trusted library allocation
page read and write
malicious
2BA1000
trusted library allocation
page read and write
malicious
2D01000
trusted library allocation
page read and write
malicious
432000
remote allocation
page execute and read and write
malicious
2E09000
trusted library allocation
page read and write
malicious
2CAB000
trusted library allocation
page read and write
malicious
29E0000
trusted library allocation
page execute and read and write
69FA000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
D98E000
stack
page read and write
1020000
heap
page read and write
10A1000
heap
page read and write
2C9E000
stack
page read and write
2DB8000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
406C000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
CF6000
stack
page read and write
3E1A000
trusted library allocation
page read and write
B3FE000
stack
page read and write
3FD2000
trusted library allocation
page read and write
6980000
trusted library allocation
page execute and read and write
3E8A000
trusted library allocation
page read and write
7C21000
trusted library allocation
page read and write
2D69000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
83FE000
stack
page read and write
13B3000
trusted library allocation
page execute and read and write
679E000
stack
page read and write
42E000
remote allocation
page execute and read and write
5940000
trusted library allocation
page execute and read and write
2C50000
heap
page read and write
5600000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
3E1C000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
1475000
trusted library allocation
page read and write
3E13000
trusted library allocation
page read and write
99E000
stack
page read and write
8D3E000
stack
page read and write
6910000
trusted library allocation
page execute and read and write
690D000
trusted library allocation
page read and write
B6AE000
stack
page read and write
3E34000
trusted library allocation
page read and write
3DCF000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
7ABE000
stack
page read and write
1150000
trusted library allocation
page read and write
18A7000
heap
page read and write
2A5E000
trusted library allocation
page read and write
1144000
trusted library allocation
page read and write
3F08000
trusted library allocation
page read and write
3210000
heap
page read and write
315B000
trusted library allocation
page read and write
7CD0000
heap
page read and write
41A000
remote allocation
page execute and read and write
2CBE000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
7030000
heap
page read and write
5273000
heap
page read and write
949E000
stack
page read and write
7BBF000
stack
page read and write
2DBC000
trusted library allocation
page read and write
820E000
stack
page read and write
F44E000
stack
page read and write
6980000
trusted library allocation
page execute and read and write
5210000
heap
page read and write
1280000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
7F8C0000
trusted library allocation
page execute and read and write
2BBE000
stack
page read and write
7BFE000
stack
page read and write
2C4F000
trusted library allocation
page read and write
69C0000
trusted library allocation
page execute and read and write
FAFD000
stack
page read and write
3176000
trusted library allocation
page read and write
3F36000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
2D40000
heap
page read and write
3085000
trusted library allocation
page read and write
C1C0000
trusted library allocation
page execute and read and write
3C76000
trusted library allocation
page read and write
43F000
remote allocation
page execute and read and write
57C0000
heap
page read and write
6A60000
trusted library allocation
page read and write
10A3000
heap
page read and write
F20E000
stack
page read and write
13A0000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
3060000
heap
page read and write
115D000
trusted library allocation
page execute and read and write
343E000
trusted library allocation
page read and write
10DF000
heap
page read and write
2A46000
trusted library allocation
page read and write
561E000
stack
page read and write
867E000
heap
page read and write
2D20000
heap
page read and write
12A0000
heap
page read and write
F59E000
stack
page read and write
3EB4000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
113B000
trusted library allocation
page execute and read and write
6970000
trusted library allocation
page execute and read and write
3CE4000
trusted library allocation
page read and write
D32000
unkown
page readonly
E60000
heap
page read and write
41B1000
trusted library allocation
page read and write
59A000
stack
page read and write
2C60000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
DFA000
heap
page read and write
2A52000
trusted library allocation
page read and write
13D2000
trusted library allocation
page read and write
628D000
heap
page read and write
6AD7000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
29DC000
stack
page read and write
3200000
trusted library allocation
page read and write
30B0000
heap
page read and write
5203000
heap
page read and write
85FE000
stack
page read and write
BBFD000
stack
page read and write
6960000
trusted library allocation
page execute and read and write
864D000
heap
page read and write
2C47000
trusted library allocation
page read and write
1317000
trusted library allocation
page execute and read and write
857E000
stack
page read and write
2D2E000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
2CAB000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
4049000
trusted library allocation
page read and write
5AD0000
heap
page read and write
54BD000
stack
page read and write
3DFD000
trusted library allocation
page read and write
2EEF000
trusted library allocation
page read and write
54B0000
heap
page read and write
1450000
heap
page read and write
6AB2000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
EF4000
heap
page read and write
636E000
stack
page read and write
68DE000
stack
page read and write
299E000
stack
page read and write
2950000
trusted library allocation
page read and write
112A000
trusted library allocation
page execute and read and write
FABF000
stack
page read and write
2CBA000
trusted library allocation
page read and write
63A5000
heap
page read and write
55EE000
stack
page read and write
661E000
stack
page read and write
786E000
stack
page read and write
1135000
trusted library allocation
page execute and read and write
13E2000
trusted library allocation
page read and write
3F73000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page execute and read and write
797E000
stack
page read and write
413000
remote allocation
page execute and read and write
5270000
heap
page read and write
3C8E000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
3D4B000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
6A63000
trusted library allocation
page read and write
442000
remote allocation
page execute and read and write
11DC000
stack
page read and write
1060000
heap
page read and write
3D29000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
431000
remote allocation
page execute and read and write
3CEB000
trusted library allocation
page read and write
5450000
heap
page read and write
4085000
trusted library allocation
page read and write
3EDD000
trusted library allocation
page read and write
7D05000
heap
page read and write
123D000
trusted library allocation
page execute and read and write
6930000
trusted library allocation
page read and write
320E000
stack
page read and write
3F19000
trusted library allocation
page read and write
3D0B000
trusted library allocation
page read and write
5670000
heap
page read and write
4097000
trusted library allocation
page read and write
1187000
stack
page read and write
4038000
trusted library allocation
page read and write
C120000
trusted library section
page read and write
2DA0000
trusted library allocation
page read and write
622E000
stack
page read and write
4A07000
trusted library allocation
page read and write
5770000
trusted library section
page readonly
2D76000
trusted library allocation
page read and write
439000
remote allocation
page execute and read and write
5630000
heap
page read and write
EC8000
heap
page read and write
2A6D000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
1577000
heap
page read and write
1479000
trusted library allocation
page read and write
3EF6000
trusted library allocation
page read and write
1480000
heap
page read and write
8910000
trusted library allocation
page execute and read and write
419000
remote allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
F5DE000
stack
page read and write
3D90000
trusted library allocation
page read and write
5640000
heap
page read and write
2A4B000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
3198000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
3E2C000
trusted library allocation
page read and write
126B000
trusted library allocation
page execute and read and write
3208000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
1137000
trusted library allocation
page execute and read and write
3E28000
trusted library allocation
page read and write
1233000
trusted library allocation
page execute and read and write
63A1000
heap
page read and write
2C40000
trusted library allocation
page read and write
D80000
heap
page read and write
C39000
stack
page read and write
631E000
stack
page read and write
3F94000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
6A70000
trusted library allocation
page execute and read and write
3DA8000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
427000
remote allocation
page execute and read and write
4BA8000
trusted library allocation
page read and write
95F000
unkown
page read and write
5350000
heap
page execute and read and write
2C16000
trusted library allocation
page read and write
2A66000
trusted library allocation
page read and write
F3A000
heap
page read and write
53E0000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
F9BE000
stack
page read and write
1375000
heap
page read and write
68FA000
trusted library allocation
page read and write
3DBF000
trusted library allocation
page read and write
D37000
stack
page read and write
2C53000
trusted library allocation
page read and write
3C59000
trusted library allocation
page read and write
4023000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
6320000
heap
page read and write
6AE0000
trusted library allocation
page read and write
6272000
heap
page read and write
3171000
trusted library allocation
page read and write
55D000
stack
page read and write
2EC3000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
D30000
unkown
page readonly
1220000
trusted library allocation
page execute and read and write
D70000
heap
page read and write
2D4B000
heap
page read and write
2CE0000
trusted library allocation
page read and write
FF0000
heap
page read and write
4044000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
D7E000
stack
page read and write
1130000
trusted library allocation
page read and write
57A5000
heap
page read and write
9280000
trusted library allocation
page read and write
130A000
trusted library allocation
page execute and read and write
438000
remote allocation
page execute and read and write
2B08000
trusted library allocation
page read and write
6930000
trusted library allocation
page execute and read and write
2EE9000
trusted library allocation
page read and write
F97C000
stack
page read and write
3E11000
trusted library allocation
page read and write
7CB0000
heap
page read and write
3F8E000
trusted library allocation
page read and write
6391000
heap
page read and write
57FE000
trusted library allocation
page read and write
EBC000
heap
page read and write
102A000
heap
page read and write
5160000
trusted library allocation
page read and write
BED0000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
3E2E000
trusted library allocation
page read and write
3E36000
trusted library allocation
page read and write
1100000
heap
page read and write
3065000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
3DD6000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
D95000
heap
page read and write
3F0C000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
2CAE000
stack
page read and write
85A0000
trusted library allocation
page execute and read and write
6940000
trusted library allocation
page read and write
6A36000
trusted library allocation
page read and write
64EE000
stack
page read and write
415000
remote allocation
page execute and read and write
43B000
remote allocation
page execute and read and write
8BFF000
stack
page read and write
5A5E000
stack
page read and write
7F110000
trusted library allocation
page execute and read and write
869E000
heap
page read and write
69B0000
trusted library allocation
page execute and read and write
3C6F000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
F10000
heap
page read and write
2AF0000
heap
page read and write
2E1D000
trusted library allocation
page read and write
7870000
trusted library section
page read and write
2DC0000
trusted library allocation
page read and write
DB6C000
stack
page read and write
3F63000
trusted library allocation
page read and write
6A14000
trusted library allocation
page read and write
655E000
stack
page read and write
64AE000
stack
page read and write
2F51000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
125A000
trusted library allocation
page execute and read and write
12D0000
heap
page read and write
6AE0000
heap
page read and write
3E03000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
3CCE000
trusted library allocation
page read and write
3F88000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
400000
remote allocation
page execute and read and write
10EE000
stack
page read and write
6B30000
heap
page read and write
63A9000
heap
page read and write
2C0B000
trusted library allocation
page read and write
3EC3000
trusted library allocation
page read and write
10EB000
heap
page read and write
3E0E000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
441000
remote allocation
page execute and read and write
68E0000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
92CE000
stack
page read and write
BAC0000
heap
page read and write
887F000
stack
page read and write
62B5000
heap
page read and write
5930000
heap
page execute and read and write
2A4E000
trusted library allocation
page read and write
4059000
trusted library allocation
page read and write
3DE4000
trusted library allocation
page read and write
3E60000
trusted library allocation
page read and write
43D000
remote allocation
page execute and read and write
6A80000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
17C8000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
3F00000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
6230000
heap
page read and write
2F7F000
trusted library allocation
page read and write
3C5D000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
5190000
trusted library allocation
page read and write
110D000
heap
page read and write
3DEE000
trusted library allocation
page read and write
69E0000
trusted library allocation
page execute and read and write
5AB0000
heap
page read and write
189C000
stack
page read and write
43E000
remote allocation
page execute and read and write
3150000
trusted library allocation
page read and write
5150000
heap
page read and write
3C82000
trusted library allocation
page read and write
2F4C000
trusted library allocation
page read and write
DD8000
heap
page read and write
559E000
stack
page read and write
FEE000
stack
page read and write
FBFE000
stack
page read and write
8610000
heap
page read and write
17BE000
stack
page read and write
1262000
trusted library allocation
page read and write
121E000
stack
page read and write
5460000
heap
page read and write
3F5D000
trusted library allocation
page read and write
88BD000
stack
page read and write
13CD000
trusted library allocation
page execute and read and write
30E0000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
E30000
heap
page read and write
800000
heap
page read and write
2D64000
trusted library allocation
page read and write
69D0000
trusted library allocation
page execute and read and write
8C3E000
stack
page read and write
2B00000
trusted library allocation
page read and write
67EE000
stack
page read and write
DC6C000
stack
page read and write
7CC8000
heap
page read and write
57EE000
stack
page read and write
3C7E000
trusted library allocation
page read and write
776E000
stack
page read and write
42A000
remote allocation
page execute and read and write
6A64000
trusted library allocation
page read and write
3D56000
trusted library allocation
page read and write
D88D000
stack
page read and write
3CAE000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
3E26000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
5620000
heap
page read and write
13BD000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page read and write
3FEA000
trusted library allocation
page read and write
440000
remote allocation
page execute and read and write
2DBD000
stack
page read and write
1306000
trusted library allocation
page read and write
843E000
stack
page read and write
1140000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
417000
remote allocation
page execute and read and write
114D000
trusted library allocation
page execute and read and write
3DEA000
trusted library allocation
page read and write
82FE000
stack
page read and write
3BC9000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
2A90000
heap
page read and write
1122000
trusted library allocation
page read and write
6A30000
trusted library allocation
page execute and read and write
3CD4000
trusted library allocation
page read and write
2CC1000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
316A000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
6906000
trusted library allocation
page read and write
671E000
stack
page read and write
645E000
stack
page read and write
9E0000
heap
page read and write
31CF000
unkown
page read and write
2DE6000
trusted library allocation
page read and write
103F000
heap
page read and write
2C2D000
trusted library allocation
page read and write
3E95000
trusted library allocation
page read and write
88FD000
stack
page read and write
D90000
heap
page read and write
621E000
stack
page read and write
5610000
trusted library allocation
page read and write
6DB0000
heap
page read and write
1440000
heap
page read and write
3EE4000
trusted library allocation
page read and write
2C21000
trusted library allocation
page read and write
1160000
heap
page read and write
E06000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1103000
trusted library allocation
page execute and read and write
DA8E000
stack
page read and write
1132000
trusted library allocation
page read and write
177F000
stack
page read and write
2A04000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
2D67000
trusted library allocation
page read and write
EC0000
heap
page read and write
5C40000
heap
page read and write
2A30000
heap
page execute and read and write
2D90000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
3FF5000
trusted library allocation
page read and write
167E000
stack
page read and write
4D3D000
stack
page read and write
5250000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
3E22000
trusted library allocation
page read and write
40A5000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
3FB2000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
6F20000
heap
page read and write
443000
remote allocation
page execute and read and write
68F6000
trusted library allocation
page read and write
3EE4000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
409E000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
6240000
heap
page read and write
3012000
trusted library allocation
page read and write
3E01000
trusted library allocation
page read and write
3EF2000
trusted library allocation
page read and write
853E000
stack
page read and write
13C0000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
8FA000
stack
page read and write
7352000
trusted library allocation
page read and write
6960000
trusted library allocation
page execute and read and write
2F7C000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
3CCC000
trusted library allocation
page read and write
2DB4000
trusted library allocation
page read and write
148E000
heap
page read and write
30AE000
unkown
page read and write
3F26000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
3E34000
trusted library allocation
page read and write
3EF8000
trusted library allocation
page read and write
DA0000
heap
page read and write
13B4000
trusted library allocation
page read and write
5680000
trusted library allocation
page execute and read and write
5440000
trusted library section
page readonly
3E47000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
5780000
heap
page read and write
4053000
trusted library allocation
page read and write
E65000
heap
page read and write
3EF0000
trusted library allocation
page read and write
1290000
trusted library allocation
page execute and read and write
14B4000
heap
page read and write
C60000
heap
page read and write
9270000
trusted library allocation
page execute and read and write
3F7A000
trusted library allocation
page read and write
659D000
stack
page read and write
F6DE000
stack
page read and write
3DB9000
trusted library allocation
page read and write
F49D000
stack
page read and write
119E000
stack
page read and write
31B1000
trusted library allocation
page read and write
2D5C000
heap
page read and write
57B0000
trusted library allocation
page read and write
1370000
heap
page read and write
4087000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
1256000
trusted library allocation
page execute and read and write
2A20000
trusted library allocation
page read and write
3CBC000
trusted library allocation
page read and write
69A0000
trusted library allocation
page execute and read and write
2EF4000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
3E52000
trusted library allocation
page read and write
12EE000
stack
page read and write
313B000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
41B000
remote allocation
page execute and read and write
57C3000
heap
page read and write
1260000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
3009000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
13EB000
trusted library allocation
page execute and read and write
3E93000
trusted library allocation
page read and write
50DD000
stack
page read and write
2DFC000
stack
page read and write
2DF9000
stack
page read and write
7CB4000
heap
page read and write
925F000
stack
page read and write
310D000
trusted library allocation
page read and write
1230000
heap
page read and write
869A000
heap
page read and write
695D000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
11F0000
heap
page read and write
3190000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
425000
remote allocation
page execute and read and write
12F0000
trusted library allocation
page read and write
9F0000
heap
page read and write
13DA000
trusted library allocation
page execute and read and write
5200000
heap
page read and write
54E0000
trusted library allocation
page read and write
F30D000
stack
page read and write
2CF0000
heap
page execute and read and write
6970000
trusted library allocation
page read and write
675E000
stack
page read and write
6944000
trusted library allocation
page read and write
2E9C000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
3F82000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
43A000
remote allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
4667000
trusted library allocation
page read and write
1267000
trusted library allocation
page execute and read and write
2A61000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
52AC000
stack
page read and write
322B000
heap
page read and write
662E000
stack
page read and write
10C5000
heap
page read and write
91E000
unkown
page read and write
1220000
trusted library allocation
page read and write
6950000
trusted library allocation
page execute and read and write
3037000
trusted library allocation
page read and write
403D000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
5444000
trusted library section
page readonly
3E18000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
102E000
heap
page read and write
5910000
trusted library allocation
page read and write
18A0000
heap
page read and write
3D84000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
8615000
heap
page read and write
3EB6000
trusted library allocation
page read and write
3EE8000
trusted library allocation
page read and write
2D59000
trusted library allocation
page read and write
152E000
heap
page read and write
1062000
heap
page read and write
F87B000
stack
page read and write
5625000
heap
page read and write
85B0000
trusted library allocation
page read and write
51A0000
heap
page execute and read and write
9DF000
stack
page read and write
543B000
stack
page read and write
BCFE000
stack
page read and write
14BF000
heap
page read and write
3C09000
trusted library allocation
page read and write
407A000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
335F000
stack
page read and write
5240000
heap
page read and write
402000
remote allocation
page execute and read and write
5200000
heap
page read and write
2C5B000
trusted library allocation
page read and write
3FF3000
trusted library allocation
page read and write
D80000
heap
page read and write
108A000
stack
page read and write
12A7000
heap
page read and write
57A0000
heap
page read and write
BE3D000
stack
page read and write
2C26000
trusted library allocation
page read and write
31A0000
heap
page execute and read and write
3E93000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
2B9E000
stack
page read and write
2F24000
trusted library allocation
page read and write
13E7000
trusted library allocation
page execute and read and write
5510000
heap
page execute and read and write
13D6000
trusted library allocation
page execute and read and write
9F7000
stack
page read and write
3F96000
trusted library allocation
page read and write
6B10000
trusted library allocation
page execute and read and write
316E000
trusted library allocation
page read and write
ACE6000
trusted library allocation
page read and write
5220000
trusted library allocation
page execute and read and write
3F92000
trusted library allocation
page read and write
3E44000
trusted library allocation
page read and write
3CD2000
trusted library allocation
page read and write
6A87000
trusted library allocation
page read and write
FAE000
stack
page read and write
6950000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
1252000
trusted library allocation
page read and write
612E000
stack
page read and write
5AA0000
trusted library allocation
page execute and read and write
3F61000
trusted library allocation
page read and write
7CF2000
heap
page read and write
135E000
stack
page read and write
2C1A000
trusted library allocation
page read and write
110D000
trusted library allocation
page execute and read and write
1054000
heap
page read and write
6946000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
2CA0000
trusted library allocation
page read and write
3FC0000
trusted library allocation
page read and write
3C5F000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
3F3D000
trusted library allocation
page read and write
694A000
trusted library allocation
page read and write
B28D000
stack
page read and write
4BA0000
trusted library allocation
page read and write
66EE000
stack
page read and write
58FB000
stack
page read and write
131B000
trusted library allocation
page execute and read and write
2EE7000
trusted library allocation
page read and write
8ABE000
stack
page read and write
1304000
trusted library allocation
page read and write
5155000
trusted library allocation
page read and write
7D4F000
heap
page read and write
111D000
trusted library allocation
page execute and read and write
3EAB000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
3D54000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
1306000
trusted library allocation
page execute and read and write
5640000
trusted library allocation
page read and write
34A0000
heap
page read and write
1315000
trusted library allocation
page execute and read and write
2BFC000
stack
page read and write
2C12000
trusted library allocation
page read and write
D50000
heap
page read and write
67DE000
stack
page read and write
3DBD000
trusted library allocation
page read and write
3ED7000
trusted library allocation
page read and write
5730000
trusted library allocation
page execute and read and write
14C1000
heap
page read and write
2FE9000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
5159000
trusted library allocation
page read and write
314E000
stack
page read and write
2E60000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
1302000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
652E000
stack
page read and write
3F45000
trusted library allocation
page read and write
F34D000
stack
page read and write
6328000
heap
page read and write
8AFE000
stack
page read and write
3094000
trusted library allocation
page read and write
3E72000
trusted library allocation
page read and write
F0E000
stack
page read and write
2D86000
trusted library allocation
page read and write
4056000
trusted library allocation
page read and write
3E2E000
trusted library allocation
page read and write
3BA1000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
7D03000
heap
page read and write
6A70000
trusted library allocation
page read and write
B090000
heap
page read and write
9EA000
stack
page read and write
3F86000
trusted library allocation
page read and write
7C00000
trusted library section
page read and write
1310000
heap
page read and write
3E4B000
trusted library allocation
page read and write
646E000
stack
page read and write
5AFE000
heap
page read and write
2C07000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
2ADE000
stack
page read and write
3F24000
trusted library allocation
page read and write
2E8D000
trusted library allocation
page read and write
1410000
trusted library allocation
page execute and read and write
3DE2000
trusted library allocation
page read and write
3E53000
trusted library allocation
page read and write
BD3D000
stack
page read and write
2EB8000
trusted library allocation
page read and write
7D2F000
heap
page read and write
1104000
trusted library allocation
page read and write
B38E000
stack
page read and write
1250000
trusted library allocation
page read and write
3E32000
trusted library allocation
page read and write
1234000
trusted library allocation
page read and write
3CF3000
trusted library allocation
page read and write
2CB2000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
1330000
heap
page read and write
65DF000
stack
page read and write
4081000
trusted library allocation
page read and write
3220000
heap
page read and write
2D72000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
7A7E000
stack
page read and write
3C8A000
trusted library allocation
page read and write
5790000
heap
page read and write
4061000
trusted library allocation
page read and write
6AB5000
trusted library allocation
page read and write
5AC0000
heap
page read and write
131E000
stack
page read and write
6900000
trusted library allocation
page read and write
3FD0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
1126000
trusted library allocation
page execute and read and write
3E70000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
DD0000
heap
page read and write
EAE000
stack
page read and write
DDE000
stack
page read and write
3E30000
trusted library allocation
page read and write
6908000
trusted library allocation
page read and write
3DDE000
trusted library allocation
page read and write
3DF0000
trusted library allocation
page read and write
3E32000
trusted library allocation
page read and write
1143000
trusted library allocation
page execute and read and write
5B10000
heap
page read and write
3D23000
trusted library allocation
page read and write
3C84000
trusted library allocation
page read and write
124D000
trusted library allocation
page execute and read and write
5243000
heap
page read and write
3D33000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
3C92000
trusted library allocation
page read and write
There are 807 hidden memdumps, click here to show them.