IOC Report
rShippingDocuments240384.exe

loading gif

Files

File Path
Type
Category
Malicious
rShippingDocuments240384.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rShippingDocuments240384.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1FC2.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\tdcorV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\tdcorV.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tdcorV.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1myx12ag.trk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2uc2muka.4ty.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wc4svgu.rji.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2yorotv0.xwp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dg5idzg5.erb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkgu4j4c.whd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvhb5fno.l5w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywurvwk4.dxa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp329E.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rShippingDocuments240384.exe
"C:\Users\user\Desktop\rShippingDocuments240384.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rShippingDocuments240384.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tdcorV.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tdcorV" /XML "C:\Users\user\AppData\Local\Temp\tmp1FC2.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\tdcorV.exe
C:\Users\user\AppData\Roaming\tdcorV.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tdcorV" /XML "C:\Users\user\AppData\Local\Temp\tmp329E.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2029/10/2024%20/%2021:03:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://certs.starfieldtech.com/repository/0
unknown
http://certificates.starfieldtech.com/repository/0
unknown
http://certs.starfieldtech.com/repository/1402
unknown
http://crl.starfieldtech.com/sfroot-g2.crl0L
unknown
https://reallyfreegeoip.org/xml/173.254.250.72$
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://www.office.com/lB
unknown
https://reallyfreegeoip.org/xml/173.254.250.72
188.114.97.3
http://ocsp.starfieldtech.com/08
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
http://ocsp.starfieldtech.com/0;
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://ocsp.starfieldtech.com/0F
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
132.226.247.73
http://51.38.247.67:8081/_send_.php?L
unknown
http://crl.starfieldtech.com/sfig2s1-677.crl0c
unknown
http://anotherarmy.dns.army:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20a
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2029/10/2024%20/%2020:43:52%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org
unknown
http://mail.bulatpharmaceutical.com
unknown
http://crl.starfieldtech.com/sfroot.crl0L
unknown
http://certificates.starfieldtech.com/repository/sfig2.crt0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
mail.bulatpharmaceutical.com
166.62.28.124
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
166.62.28.124
mail.bulatpharmaceutical.com
United States
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D01000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
4B07000
trusted library allocation
page read and write
malicious
4388000
trusted library allocation
page read and write
malicious
30C1000
trusted library allocation
page read and write
malicious
323F000
trusted library allocation
page read and write
malicious
2E0B000
trusted library allocation
page read and write
malicious
6A65000
trusted library allocation
page read and write
44E2000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
2F90000
heap
page read and write
C1B0000
heap
page read and write
5D70000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
3277000
trusted library allocation
page read and write
180B000
trusted library allocation
page execute and read and write
4567000
trusted library allocation
page read and write
894E000
stack
page read and write
1230000
heap
page read and write
108F000
stack
page read and write
EC8E000
stack
page read and write
650D000
heap
page read and write
3FDC000
trusted library allocation
page read and write
72BE000
stack
page read and write
17E0000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
436000
remote allocation
page execute and read and write
53DF000
stack
page read and write
FEFE000
stack
page read and write
F80000
trusted library allocation
page read and write
4E4E000
trusted library allocation
page read and write
2EE2000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
6557000
heap
page read and write
2ED0000
trusted library allocation
page read and write
F9BE000
stack
page read and write
3177000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
4180000
trusted library allocation
page read and write
B49D000
stack
page read and write
32B3000
trusted library allocation
page read and write
F4F000
stack
page read and write
1340000
trusted library allocation
page read and write
663E000
stack
page read and write
4195000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page execute and read and write
E3E000
stack
page read and write
33B1000
trusted library allocation
page read and write
B45E000
stack
page read and write
4271000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
5286000
trusted library allocation
page read and write
4123000
trusted library allocation
page read and write
480000
heap
page read and write
15AF000
heap
page read and write
358E000
trusted library allocation
page read and write
5281000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
5960000
heap
page execute and read and write
5250000
heap
page read and write
4E51000
trusted library allocation
page read and write
5860000
heap
page execute and read and write
5C0E000
stack
page read and write
EB0C000
stack
page read and write
5DA0000
heap
page read and write
1330000
heap
page read and write
57DD000
trusted library allocation
page read and write
406D000
trusted library allocation
page read and write
263E000
stack
page read and write
6DB0000
trusted library allocation
page execute and read and write
B220000
heap
page read and write
162B000
heap
page read and write
799D000
heap
page read and write
17ED000
trusted library allocation
page execute and read and write
4E95000
trusted library allocation
page read and write
2C10000
heap
page read and write
654E000
heap
page read and write
32AE000
trusted library allocation
page read and write
1353000
trusted library allocation
page execute and read and write
1654000
heap
page read and write
1AC0000
heap
page read and write
25FE000
stack
page read and write
73BE000
stack
page read and write
2DAF000
trusted library allocation
page read and write
2ADC000
stack
page read and write
4DDC000
stack
page read and write
1F0000
heap
page read and write
4EDD000
stack
page read and write
2ED2000
trusted library allocation
page read and write
6713000
heap
page read and write
2EC0000
trusted library allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
40A3000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
2AE0000
heap
page execute and read and write
6CA0000
trusted library allocation
page read and write
1064000
heap
page read and write
40ED000
trusted library allocation
page read and write
5CF5000
heap
page read and write
6CF0000
trusted library allocation
page execute and read and write
3333000
trusted library allocation
page read and write
5640000
heap
page read and write
6A90000
heap
page read and write
1890000
heap
page read and write
25FF000
unkown
page read and write
55BB000
trusted library allocation
page read and write
6711000
heap
page read and write
2FF1000
trusted library allocation
page read and write
5DC0000
heap
page read and write
199E000
stack
page read and write
3173000
trusted library allocation
page read and write
7033000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
58EE000
stack
page read and write
4E62000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
4EFE000
stack
page read and write
5DB5000
heap
page read and write
440000
remote allocation
page execute and read and write
11D5000
heap
page read and write
527A000
trusted library allocation
page read and write
884D000
stack
page read and write
41D2000
trusted library allocation
page read and write
525E000
stack
page read and write
1340000
heap
page read and write
FDFF000
stack
page read and write
4136000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
79A7000
heap
page read and write
33C1000
trusted library allocation
page read and write
5DB0000
heap
page read and write
5840000
trusted library allocation
page read and write
309E000
stack
page read and write
6720000
heap
page read and write
57E2000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
790000
heap
page read and write
5560000
trusted library section
page readonly
71EF000
heap
page read and write
2EA0000
trusted library allocation
page read and write
5E3C000
stack
page read and write
2F54000
trusted library allocation
page read and write
15A0000
heap
page read and write
14A0000
heap
page read and write
2BB0000
heap
page read and write
7C10000
trusted library allocation
page execute and read and write
673E000
stack
page read and write
2DA7000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
52DE000
stack
page read and write
686E000
stack
page read and write
83E0000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
56AE000
stack
page read and write
431000
remote allocation
page execute and read and write
6A14000
trusted library allocation
page read and write
554B000
stack
page read and write
5D6E000
trusted library allocation
page read and write
534B000
stack
page read and write
C0E000
heap
page read and write
4463000
trusted library allocation
page read and write
480000
heap
page read and write
57B0000
trusted library allocation
page read and write
136D000
trusted library allocation
page execute and read and write
2EC3000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
79BD000
heap
page read and write
F7E000
stack
page read and write
43A000
remote allocation
page execute and read and write
69B0000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
410D000
trusted library allocation
page read and write
F80000
heap
page read and write
2DE6000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
11A7000
stack
page read and write
4303000
trusted library allocation
page read and write
1116000
heap
page read and write
7D7F000
stack
page read and write
4456000
trusted library allocation
page read and write
1A9E000
stack
page read and write
445D000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
42E7000
trusted library allocation
page read and write
3AF9000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
6950000
trusted library allocation
page execute and read and write
C4AD000
stack
page read and write
3D22000
trusted library allocation
page read and write
5790000
trusted library allocation
page execute and read and write
3374000
trusted library allocation
page read and write
50A0000
heap
page read and write
715E000
stack
page read and write
315F000
trusted library allocation
page read and write
47E000
unkown
page read and write
57DE000
stack
page read and write
96F0000
trusted library allocation
page read and write
1410000
heap
page read and write
283E000
stack
page read and write
5D0E000
stack
page read and write
E60000
heap
page read and write
5815000
trusted library allocation
page read and write
3FCD000
trusted library allocation
page read and write
66E6000
heap
page read and write
FAFC000
stack
page read and write
32A8000
trusted library allocation
page read and write
3508000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
6D67000
trusted library allocation
page read and write
14A5000
heap
page read and write
3D70000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
870E000
stack
page read and write
2EDA000
trusted library allocation
page execute and read and write
105C000
stack
page read and write
4E90000
trusted library allocation
page read and write
5EBF000
stack
page read and write
3F27000
trusted library allocation
page read and write
15AE000
heap
page read and write
7C20000
trusted library allocation
page read and write
43B000
remote allocation
page execute and read and write
9ABE000
stack
page read and write
1800000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
13C0000
heap
page read and write
2EF4000
trusted library allocation
page read and write
6DC4000
trusted library allocation
page read and write
E40000
heap
page read and write
2EE7000
trusted library allocation
page read and write
1420000
heap
page read and write
439C000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
1014000
unkown
page readonly
2F7C000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
2930000
heap
page read and write
B60C000
stack
page read and write
138B000
trusted library allocation
page execute and read and write
1820000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
6724000
heap
page read and write
43D000
unkown
page read and write
426000
remote allocation
page execute and read and write
4467000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
4128000
trusted library allocation
page read and write
5266000
trusted library allocation
page read and write
880D000
stack
page read and write
7030000
trusted library allocation
page read and write
63BE000
stack
page read and write
5550000
heap
page read and write
696E000
stack
page read and write
5D00000
heap
page read and write
5253000
heap
page read and write
50C0000
trusted library allocation
page execute and read and write
2FBA000
trusted library allocation
page read and write
4085000
trusted library allocation
page read and write
7FE000
stack
page read and write
FB2000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
5ACE000
stack
page read and write
6C86000
trusted library allocation
page read and write
5D40000
trusted library allocation
page execute and read and write
68FE000
stack
page read and write
1580000
trusted library allocation
page read and write
40B3000
trusted library allocation
page read and write
86C7000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
17F2000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
ED8E000
stack
page read and write
10AA000
stack
page read and write
69C0000
trusted library allocation
page read and write
79AF000
heap
page read and write
6730000
heap
page read and write
FA6000
trusted library allocation
page execute and read and write
505E000
stack
page read and write
4234000
trusted library allocation
page read and write
65AE000
stack
page read and write
3380000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
6AB0000
heap
page read and write
2EE9000
trusted library allocation
page read and write
443000
remote allocation
page execute and read and write
2EB8000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
11C5000
heap
page read and write
F70000
trusted library allocation
page read and write
6B6E000
stack
page read and write
6930000
trusted library allocation
page execute and read and write
7100000
trusted library allocation
page read and write
2BFE000
stack
page read and write
135D000
trusted library allocation
page execute and read and write
F83000
trusted library allocation
page execute and read and write
671D000
stack
page read and write
15E8000
heap
page read and write
3E12000
trusted library allocation
page read and write
3342000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
15D6000
heap
page read and write
5570000
heap
page read and write
2EEB000
trusted library allocation
page execute and read and write
983D000
stack
page read and write
3D94000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
316F000
trusted library allocation
page read and write
10E0000
heap
page read and write
FA2000
trusted library allocation
page read and write
4E74000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
CDA000
heap
page read and write
1802000
trusted library allocation
page read and write
4130000
trusted library allocation
page read and write
1372000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
44CC000
trusted library allocation
page read and write
333C000
trusted library allocation
page read and write
2D69000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page execute and read and write
2940000
heap
page read and write
579E000
stack
page read and write
4078000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
6900000
trusted library allocation
page execute and read and write
47E000
unkown
page read and write
F9D000
trusted library allocation
page execute and read and write
64BF000
stack
page read and write
1840000
heap
page read and write
2690000
heap
page read and write
1370000
trusted library allocation
page read and write
64C0000
heap
page read and write
43D3000
trusted library allocation
page read and write
40DB000
trusted library allocation
page read and write
6C6E000
stack
page read and write
428000
remote allocation
page execute and read and write
2830000
heap
page read and write
B35D000
stack
page read and write
2EE1000
trusted library allocation
page read and write
7C7E000
stack
page read and write
422000
remote allocation
page execute and read and write
3271000
trusted library allocation
page read and write
1380000
heap
page read and write
5DD0000
trusted library allocation
page execute and read and write
55B6000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
575E000
stack
page read and write
5D10000
trusted library allocation
page execute and read and write
682E000
stack
page read and write
40A8000
trusted library allocation
page read and write
FBB000
trusted library allocation
page execute and read and write
3275000
trusted library allocation
page read and write
65FE000
stack
page read and write
96F8000
trusted library allocation
page read and write
8AF0000
trusted library allocation
page execute and read and write
40E9000
trusted library allocation
page read and write
4554000
trusted library allocation
page read and write
99BE000
stack
page read and write
7930000
heap
page read and write
17FA000
trusted library allocation
page execute and read and write
7820000
heap
page read and write
4FD3000
heap
page read and write
F8D000
trusted library allocation
page execute and read and write
300D000
trusted library allocation
page read and write
3EE6000
trusted library allocation
page read and write
55C2000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
2898000
heap
page read and write
33C4000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
33BE000
trusted library allocation
page read and write
3D7D000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
5BAF000
stack
page read and write
42E3000
trusted library allocation
page read and write
4291000
trusted library allocation
page read and write
1830000
heap
page execute and read and write
444000
remote allocation
page execute and read and write
9840000
trusted library allocation
page execute and read and write
973E000
stack
page read and write
C00000
heap
page read and write
718A000
heap
page read and write
795D000
heap
page read and write
3D8A000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
132E000
stack
page read and write
EAA000
stack
page read and write
7110000
trusted library allocation
page execute and read and write
290E000
stack
page read and write
FAA000
trusted library allocation
page execute and read and write
5292000
trusted library allocation
page read and write
7A6E000
stack
page read and write
8C1F000
stack
page read and write
152A000
heap
page read and write
4FD0000
heap
page read and write
2EE0000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
4592000
trusted library allocation
page read and write
2890000
heap
page read and write
3EF9000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
1210000
heap
page read and write
188E000
stack
page read and write
67BE000
stack
page read and write
5278000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
5BCF000
stack
page read and write
2CFE000
stack
page read and write
44AC000
trusted library allocation
page read and write
406B000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
4444000
trusted library allocation
page read and write
4149000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
3339000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
C51E000
stack
page read and write
AF7000
stack
page read and write
5910000
heap
page read and write
69D7000
trusted library allocation
page read and write
15A8000
heap
page read and write
2B84000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
5220000
trusted library allocation
page read and write
1360000
heap
page read and write
1500000
heap
page read and write
101E000
stack
page read and write
7160000
trusted library allocation
page read and write
6E50000
heap
page read and write
6D80000
trusted library allocation
page read and write
5CF0000
heap
page read and write
677E000
stack
page read and write
427000
remote allocation
page execute and read and write
50C0000
trusted library allocation
page read and write
453F000
trusted library allocation
page read and write
42BB000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
17F6000
trusted library allocation
page execute and read and write
10E8000
heap
page read and write
7DFD000
stack
page read and write
312A000
trusted library allocation
page read and write
41D2000
trusted library allocation
page read and write
7FA00000
trusted library allocation
page execute and read and write
4E80000
trusted library allocation
page read and write
4014000
trusted library allocation
page read and write
EC4E000
stack
page read and write
6A70000
trusted library allocation
page read and write
F84000
trusted library allocation
page read and write
41D6000
trusted library allocation
page read and write
675C000
heap
page read and write
1807000
trusted library allocation
page execute and read and write
79C7000
heap
page read and write
6C8D000
trusted library allocation
page read and write
3D86000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page execute and read and write
6920000
trusted library allocation
page execute and read and write
3E5E000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
66AE000
stack
page read and write
38D000
stack
page read and write
2EB3000
trusted library allocation
page execute and read and write
18A000
stack
page read and write
7DBD000
stack
page read and write
10D0000
heap
page read and write
4E5D000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
4146000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
C34000
heap
page read and write
69D0000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
2B90000
heap
page execute and read and write
3313000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page execute and read and write
1385000
heap
page read and write
442000
remote allocation
page execute and read and write
4E76000
trusted library allocation
page read and write
CB9000
heap
page read and write
7B70000
trusted library section
page read and write
2D7A000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
4AC9000
trusted library allocation
page read and write
64F3000
heap
page read and write
67ED000
stack
page read and write
58AE000
stack
page read and write
4016000
trusted library allocation
page read and write
8AEE000
stack
page read and write
54EE000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
6D6A000
trusted library allocation
page read and write
110A000
heap
page read and write
F9FC000
stack
page read and write
2DC2000
trusted library allocation
page read and write
52FD000
stack
page read and write
C0A000
heap
page read and write
11F0000
heap
page read and write
1590000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
526B000
trusted library allocation
page read and write
FB7000
trusted library allocation
page execute and read and write
3534000
trusted library allocation
page read and write
5BEE000
stack
page read and write
40E3000
trusted library allocation
page read and write
54CA000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
5580000
trusted library allocation
page execute and read and write
57D6000
trusted library allocation
page read and write
1683000
heap
page read and write
1662000
heap
page read and write
1538000
heap
page read and write
3007000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
7A0000
heap
page read and write
5DF0000
heap
page read and write
137A000
trusted library allocation
page execute and read and write
2F74000
trusted library allocation
page read and write
40D4000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
70A0000
heap
page read and write
3FB7000
trusted library allocation
page read and write
4154000
trusted library allocation
page read and write
7180000
heap
page read and write
4E3B000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
1380000
trusted library allocation
page read and write
988D000
stack
page read and write
433000
remote allocation
page execute and read and write
5BF0000
trusted library allocation
page read and write
43F000
remote allocation
page execute and read and write
6DD0000
trusted library allocation
page execute and read and write
C3AE000
stack
page read and write
2F00000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
5923000
heap
page read and write
501E000
stack
page read and write
FD0000
trusted library allocation
page read and write
F85000
heap
page read and write
6E8E000
heap
page read and write
3DE9000
trusted library allocation
page read and write
3E74000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
4437000
trusted library allocation
page read and write
1060000
heap
page read and write
DFE000
stack
page read and write
4349000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page execute and read and write
41FE000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
6C74000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page execute and read and write
43C000
remote allocation
page execute and read and write
4377000
trusted library allocation
page read and write
2910000
trusted library allocation
page execute and read and write
55F4000
trusted library allocation
page read and write
4473000
trusted library allocation
page read and write
3D29000
trusted library allocation
page read and write
594E000
stack
page read and write
719F000
heap
page read and write
528D000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
444B000
trusted library allocation
page read and write
6C88000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
3F43000
trusted library allocation
page read and write
4595000
trusted library allocation
page read and write
3F24000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
5600000
trusted library allocation
page read and write
441E000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
1385000
trusted library allocation
page execute and read and write
6E80000
heap
page read and write
17DD000
stack
page read and write
6754000
heap
page read and write
5D11000
heap
page read and write
7F680000
trusted library allocation
page execute and read and write
409E000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
5920000
heap
page read and write
F93000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
51DE000
stack
page read and write
71D3000
heap
page read and write
FB00000
heap
page read and write
5810000
trusted library allocation
page read and write
7B6F000
stack
page read and write
5CDD000
stack
page read and write
15C8000
heap
page read and write
1AA0000
heap
page read and write
17E3000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
BE0000
heap
page read and write
4E57000
trusted library allocation
page read and write
AFA000
stack
page read and write
1354000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
42B9000
trusted library allocation
page read and write
50C8000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
1387000
trusted library allocation
page execute and read and write
3B1B000
trusted library allocation
page read and write
F50000
unkown
page readonly
6C7A000
trusted library allocation
page read and write
FA7000
stack
page read and write
3132000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
6C76000
trusted library allocation
page read and write
71E5000
heap
page read and write
421E000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
67FE000
stack
page read and write
13CE000
stack
page read and write
54D0000
heap
page execute and read and write
3148000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page execute and read and write
55CA000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
B59E000
stack
page read and write
413D000
trusted library allocation
page read and write
41BF000
trusted library allocation
page read and write
98CE000
stack
page read and write
294A000
heap
page read and write
41A8000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
11D1000
heap
page read and write
2948000
trusted library allocation
page read and write
3DFF000
trusted library allocation
page read and write
10FE000
heap
page read and write
3D69000
trusted library allocation
page read and write
4318000
trusted library allocation
page read and write
425000
remote allocation
page execute and read and write
14F0000
heap
page read and write
2EA8000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
3FFB000
trusted library allocation
page read and write
287F000
stack
page read and write
326F000
trusted library allocation
page read and write
EA0E000
stack
page read and write
2ECD000
trusted library allocation
page execute and read and write
9650000
trusted library section
page read and write
71F6000
heap
page read and write
2EEF000
trusted library allocation
page read and write
7F22000
trusted library allocation
page read and write
7C30000
trusted library allocation
page execute and read and write
4279000
trusted library allocation
page read and write
3B3B000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
14D000
stack
page read and write
17F0000
trusted library allocation
page read and write
430000
heap
page read and write
72A000
stack
page read and write
414E000
trusted library allocation
page read and write
146D000
stack
page read and write
5D90000
trusted library section
page readonly
43D000
remote allocation
page execute and read and write
6910000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
50D0000
heap
page execute and read and write
55F6000
trusted library allocation
page read and write
6A62000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
526E000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
13B0000
trusted library allocation
page execute and read and write
6A00000
trusted library allocation
page execute and read and write
15EC000
heap
page read and write
32A4000
trusted library allocation
page read and write
42A6000
trusted library allocation
page read and write
544C000
stack
page read and write
4097000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
4140000
trusted library allocation
page read and write
2910000
heap
page read and write
2FAB000
trusted library allocation
page read and write
1594000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
3D77000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
2BA0000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
7B0000
heap
page read and write
54D0000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
179E000
stack
page read and write
7A5000
heap
page read and write
31A6000
trusted library allocation
page read and write
438D000
trusted library allocation
page read and write
BF7000
stack
page read and write
57F0000
trusted library allocation
page execute and read and write
5643000
heap
page read and write
2F4E000
stack
page read and write
33CC000
trusted library allocation
page read and write
674F000
heap
page read and write
432000
remote allocation
page execute and read and write
6D87000
trusted library allocation
page read and write
C42000
heap
page read and write
313A000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
408C000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
43BE000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
1508000
heap
page read and write
3E3E000
trusted library allocation
page read and write
2D67000
trusted library allocation
page read and write
2F8C000
stack
page read and write
30B0000
heap
page execute and read and write
2DB7000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
EB4D000
stack
page read and write
F52000
unkown
page readonly
6A36000
trusted library allocation
page read and write
442A000
trusted library allocation
page read and write
66B0000
heap
page read and write
31C9000
trusted library allocation
page read and write
1376000
trusted library allocation
page execute and read and write
6E15000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
2C86000
trusted library allocation
page read and write
414C000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
30A0000
trusted library allocation
page execute and read and write
5070000
heap
page read and write
1AC7000
heap
page read and write
54E0000
heap
page read and write
1593000
trusted library allocation
page execute and read and write
434000
remote allocation
page execute and read and write
6FF0000
trusted library allocation
page read and write
3CA000
stack
page read and write
5790000
heap
page read and write
57CE000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
There are 772 hidden memdumps, click here to show them.