IOC Report
#U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exe

loading gif

Files

File Path
Type
Category
Malicious
#U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Programbibliotekets\#U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Programbibliotekets\#U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3aifm5oe.3y4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_absp4bu5.fcj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lre33tyz.0jh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzwiu1un.rar.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Melodiseres\Banakite.Tor
data
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Programbibliotekets\termineret.for
data
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Ukristeligheden\Gtevielsen.Pro
ASCII text, with very long lines (4127), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Ukristeligheden\Thyrididae.cyl
data
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Ukristeligheden\nskvrdigste.had
data
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Ukristeligheden\pin.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 702x488, components 3
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exe
"C:\Users\user\Desktop\#U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle minimized "$Havegrund=Get-Content -Raw 'C:\Users\user\AppData\Roaming\argoters\Necrotizing\Ukristeligheden\Gtevielsen.Pro';$Enmotoret=$Havegrund.SubString(14070,3);.$Enmotoret($Havegrund)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://www.office.com/X
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
https://drive.google.com/d8
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.130.0
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20and%20Time:%2020/11/2024%20/%2016:33:48%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20704672%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://chrome.google.com/webstore?hl=enX
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:704672%0D%0ADate%20a
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
172.217.23.110
drive.usercontent.google.com
142.250.186.33
reallyfreegeoip.org
188.114.96.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
172.217.23.110
drive.google.com
United States
149.154.167.220
api.telegram.org
United Kingdom
188.114.96.3
reallyfreegeoip.org
European Union
193.122.130.0
checkip.dyndns.com
United States
142.250.186.33
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\skoddenes\Uninstall\polypodiaceous\Excretive140
Deputeretkamret
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
231A1000
trusted library allocation
page read and write
malicious
962C000
direct allocation
page execute and read and write
malicious
23044000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
22A9F000
stack
page read and write
233DB000
trusted library allocation
page read and write
2E16000
trusted library allocation
page execute and read and write
254C0000
trusted library allocation
page read and write
A02C000
direct allocation
page execute and read and write
25720000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
76C6000
heap
page read and write
254C0000
trusted library allocation
page read and write
23471000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
40B0000
remote allocation
page execute and read and write
2A6D000
trusted library allocation
page execute and read and write
559C000
remote allocation
page execute and read and write
23252000
trusted library allocation
page read and write
770F000
heap
page read and write
2550A000
heap
page read and write
25E60000
trusted library allocation
page read and write
2D49000
unkown
page read and write
23526000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
8AFE000
stack
page read and write
23184000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
22BC0000
trusted library allocation
page read and write
8C2C000
direct allocation
page execute and read and write
2439F000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
242EC000
trusted library allocation
page read and write
22630000
direct allocation
page read and write
7490000
heap
page readonly
254A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
22650000
direct allocation
page read and write
234F8000
trusted library allocation
page read and write
68FE000
stack
page read and write
2324A000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
230B6000
trusted library allocation
page read and write
70A8000
heap
page read and write
241FC000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
76BA000
heap
page read and write
22F7E000
stack
page read and write
2310D000
stack
page read and write
2A79000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7E00000
trusted library allocation
page execute and read and write
76C9000
heap
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7023000
heap
page read and write
440E000
stack
page read and write
23160000
trusted library allocation
page read and write
25DFE000
stack
page read and write
23170000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
2D28000
unkown
page read and write
22D30000
remote allocation
page read and write
230A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23246000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
76CB000
heap
page read and write
241BB000
trusted library allocation
page read and write
6990000
direct allocation
page read and write
254C0000
trusted library allocation
page read and write
2549E000
stack
page read and write
75DE000
stack
page read and write
23160000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
2553F000
heap
page read and write
25E60000
trusted library allocation
page read and write
23386000
trusted library allocation
page read and write
230C0000
heap
page read and write
7D04000
stack
page read and write
2A70000
trusted library allocation
page read and write
76CF000
heap
page read and write
7E30000
trusted library allocation
page read and write
400000
unkown
page readonly
446E000
stack
page read and write
2346D000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
7620000
direct allocation
page read and write
22EB0000
heap
page execute and read and write
25220000
trusted library allocation
page read and write
2341B000
trusted library allocation
page read and write
4E3000
heap
page read and write
23160000
trusted library allocation
page read and write
24448000
trusted library allocation
page read and write
2820000
direct allocation
page read and write
233D2000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
74D7000
heap
page read and write
23452000
trusted library allocation
page read and write
2810000
direct allocation
page read and write
2324E000
trusted library allocation
page read and write
43E000
unkown
page read and write
4C5000
heap
page read and write
230A0000
trusted library allocation
page read and write
2315F000
stack
page read and write
25720000
trusted library allocation
page execute and read and write
25220000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
2444D000
trusted library allocation
page read and write
8320000
trusted library allocation
page execute and read and write
44E000
unkown
page read and write
254C0000
trusted library allocation
page read and write
7530000
direct allocation
page read and write
25720000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
2860000
direct allocation
page read and write
25730000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
770A000
heap
page read and write
2AFE000
stack
page read and write
2B40000
heap
page readonly
23160000
trusted library allocation
page read and write
2424D000
trusted library allocation
page read and write
436000
unkown
page read and write
48DE000
trusted library allocation
page read and write
23210000
trusted library allocation
page read and write
22680000
direct allocation
page read and write
431000
unkown
page read and write
765A000
heap
page read and write
234FA000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
254D0000
heap
page execute and read and write
2A63000
trusted library allocation
page execute and read and write
254A0000
trusted library allocation
page read and write
2331D000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
2D3D000
unkown
page read and write
254C0000
trusted library allocation
page read and write
7540000
direct allocation
page read and write
25E60000
trusted library allocation
page read and write
76CB000
heap
page read and write
7708000
heap
page read and write
23160000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
22F3C000
stack
page read and write
74D7000
heap
page read and write
76C6000
heap
page read and write
7260000
trusted library allocation
page execute and read and write
23160000
trusted library allocation
page read and write
6B90000
heap
page read and write
23161000
trusted library allocation
page read and write
809E000
stack
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
22EFE000
stack
page read and write
7100000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
22FA8000
trusted library allocation
page read and write
25740000
trusted library allocation
page execute and read and write
254C0000
trusted library allocation
page read and write
23180000
trusted library allocation
page read and write
23180000
trusted library allocation
page read and write
2335B000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2428A000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
22EA0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23186000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page execute and read and write
25220000
trusted library allocation
page read and write
22610000
direct allocation
page read and write
23160000
trusted library allocation
page read and write
25720000
trusted library allocation
page read and write
2435E000
trusted library allocation
page read and write
231EA000
trusted library allocation
page read and write
25E3E000
stack
page read and write
233EE000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
2340F000
trusted library allocation
page read and write
737B000
stack
page read and write
2B90000
heap
page read and write
2A40000
trusted library section
page read and write
243EF000
trusted library allocation
page read and write
7F8E0000
trusted library allocation
page execute and read and write
23160000
trusted library allocation
page read and write
2D40000
unkown
page read and write
814A000
heap
page read and write
25740000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
5F9C000
remote allocation
page execute and read and write
23160000
trusted library allocation
page read and write
234A2000
trusted library allocation
page read and write
2320000
heap
page read and write
7724000
heap
page read and write
254A0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
51B6000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
2354000
heap
page read and write
23160000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
814D000
heap
page read and write
25220000
trusted library allocation
page read and write
233E5000
trusted library allocation
page read and write
2BED000
trusted library allocation
page execute and read and write
7E10000
heap
page read and write
7709000
heap
page read and write
23214000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
2331F000
trusted library allocation
page read and write
4B9C000
remote allocation
page execute and read and write
254C0000
trusted library allocation
page read and write
693D000
stack
page read and write
254C0000
trusted library allocation
page read and write
8B3C000
stack
page read and write
25E60000
trusted library allocation
page read and write
25D3E000
stack
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
25E40000
trusted library allocation
page execute and read and write
25740000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
244A8000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7650000
heap
page read and write
230B0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
40A000
unkown
page write copy
23415000
trusted library allocation
page read and write
23090000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
8B40000
direct allocation
page execute and read and write
23160000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
8360000
trusted library allocation
page execute and read and write
2346B000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
25E70000
trusted library allocation
page read and write
2345F000
trusted library allocation
page read and write
7145000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2A92000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
76A0000
heap
page read and write
254C0000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
28DD000
heap
page read and write
2D31000
unkown
page read and write
25740000
trusted library allocation
page read and write
241B4000
trusted library allocation
page read and write
2E25000
trusted library allocation
page execute and read and write
7E40000
trusted library allocation
page read and write
718E000
stack
page read and write
24571000
trusted library allocation
page read and write
6D4E000
stack
page read and write
2325A000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
73C71000
unkown
page execute read
2850000
direct allocation
page read and write
437C000
stack
page read and write
254C0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
22C8E000
stack
page read and write
451000
unkown
page readonly
254A0000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
2A30000
trusted library section
page read and write
2D3A000
unkown
page read and write
254A0000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
2B98000
heap
page read and write
4C9000
heap
page read and write
2AB0000
trusted library allocation
page read and write
4425000
heap
page execute and read and write
23160000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
22E57000
stack
page read and write
21D0000
heap
page read and write
22ADD000
stack
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2E27000
trusted library allocation
page execute and read and write
2BE0000
trusted library allocation
page read and write
68BB000
stack
page read and write
230A0000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
2522D000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
6E92000
heap
page read and write
254C0000
trusted library allocation
page read and write
2D2B000
unkown
page read and write
590000
heap
page read and write
2443F000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
8162000
heap
page read and write
2A8A000
trusted library allocation
page execute and read and write
230A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23348000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
8145000
heap
page read and write
701D000
heap
page read and write
234F0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
23190000
heap
page read and write
243D0000
trusted library allocation
page read and write
22D30000
remote allocation
page read and write
23160000
trusted library allocation
page read and write
24530000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23110000
heap
page read and write
254C0000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
2E30000
trusted library allocation
page execute and read and write
24272000
trusted library allocation
page read and write
2D2E000
unkown
page read and write
22C4F000
stack
page read and write
72F0000
trusted library allocation
page read and write
23180000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
401000
unkown
page execute read
5240000
trusted library allocation
page read and write
6D8E000
stack
page read and write
254C0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
82F000
stack
page read and write
254C0000
trusted library allocation
page read and write
770F000
heap
page read and write
254C0000
trusted library allocation
page read and write
759E000
unkown
page read and write
23160000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
825D000
heap
page read and write
22DC0000
direct allocation
page read and write
25720000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7550000
heap
page read and write
230B0000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
400000
unkown
page readonly
254A0000
trusted library allocation
page read and write
7D10000
heap
page read and write
25220000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
7DEE000
stack
page read and write
230A0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
2545E000
stack
page read and write
23160000
trusted library allocation
page read and write
2441B000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
22A5E000
stack
page read and write
2520000
heap
page read and write
23160000
trusted library allocation
page read and write
2840000
direct allocation
page read and write
254C0000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2334C000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
4537000
heap
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
252E0000
heap
page read and write
25220000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
2D25000
unkown
page read and write
6FA0000
heap
page execute and read and write
254A0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
7DAE000
stack
page read and write
51DD000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
231F6000
trusted library allocation
page read and write
25D7E000
stack
page read and write
7021000
heap
page read and write
2332A000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
6FF7000
heap
page read and write
2E00000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
22620000
direct allocation
page read and write
827C000
heap
page read and write
244A4000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
24349000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
254CF000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
24F0000
heap
page read and write
254C0000
trusted library allocation
page read and write
73C86000
unkown
page readonly
7F95000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
720E000
stack
page read and write
2451B000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page execute and read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2B70000
trusted library allocation
page execute and read and write
2318A000
trusted library allocation
page read and write
7081000
heap
page read and write
71CF000
stack
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
22640000
direct allocation
page read and write
25220000
trusted library allocation
page read and write
23462000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23256000
trusted library allocation
page read and write
76D2000
heap
page read and write
7097000
heap
page read and write
23160000
trusted library allocation
page read and write
724D000
stack
page read and write
23160000
trusted library allocation
page read and write
28B0000
heap
page read and write
2B3F000
stack
page read and write
7F8F8000
trusted library allocation
page execute and read and write
279F000
stack
page read and write
241A5000
trusted library allocation
page read and write
419C000
remote allocation
page execute and read and write
23160000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
293C000
heap
page read and write
254B0000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
25E70000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
6FC0000
heap
page read and write
230B0000
trusted library allocation
page read and write
23161000
trusted library allocation
page read and write
24492000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2439B000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
2310000
heap
page read and write
28B8000
heap
page read and write
254B0000
trusted library allocation
page read and write
25E80000
trusted library allocation
page execute and read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
22F86000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
58E7000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23421000
trusted library allocation
page read and write
7DF0000
heap
page read and write
23160000
trusted library allocation
page read and write
24371000
trusted library allocation
page read and write
73C70000
unkown
page readonly
254C0000
trusted library allocation
page read and write
8156000
heap
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23202000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
3EC000
stack
page read and write
5A2B000
trusted library allocation
page read and write
4530000
heap
page read and write
23160000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
233C7000
trusted library allocation
page read and write
241C9000
trusted library allocation
page read and write
241AF000
trusted library allocation
page read and write
22E1C000
stack
page read and write
23160000
trusted library allocation
page read and write
23503000
trusted library allocation
page read and write
22600000
direct allocation
page read and write
22DF000
stack
page read and write
24497000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
234FF000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
51B4000
trusted library allocation
page read and write
5236000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page execute and read and write
25740000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7036000
heap
page read and write
2B80000
trusted library allocation
page read and write
242B6000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
24A8000
stack
page read and write
2B58000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
4420000
heap
page execute and read and write
2350000
heap
page read and write
25E40000
trusted library allocation
page read and write
74D0000
heap
page read and write
8152000
heap
page read and write
243BB000
trusted library allocation
page read and write
22B9E000
stack
page read and write
408000
unkown
page readonly
72C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
8120000
heap
page read and write
2443C000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
22D6E000
stack
page read and write
76D1000
heap
page read and write
25220000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23350000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
2521E000
stack
page read and write
230A0000
trusted library allocation
page read and write
22DD0000
direct allocation
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
22F90000
heap
page read and write
254C0000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
23317000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
29B0000
direct allocation
page read and write
23160000
trusted library allocation
page read and write
254E0000
heap
page read and write
7330000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
51D3000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
22E9E000
stack
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
22B1C000
stack
page read and write
25220000
trusted library allocation
page read and write
213E000
stack
page read and write
6FE6000
heap
page read and write
51E7000
trusted library allocation
page read and write
2331B000
trusted library allocation
page read and write
2870000
direct allocation
page read and write
51C9000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
44EE000
stack
page read and write
230A0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25230000
trusted library allocation
page execute and read and write
23160000
trusted library allocation
page read and write
22CCF000
stack
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
7630000
direct allocation
page read and write
2448C000
trusted library allocation
page read and write
25730000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
650000
heap
page read and write
522C000
trusted library allocation
page read and write
451000
unkown
page readonly
44A0000
heap
page execute and read and write
2942000
heap
page read and write
76D1000
heap
page read and write
254C0000
trusted library allocation
page read and write
23075000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
22D30000
remote allocation
page read and write
254C0000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
69A0000
direct allocation
page read and write
254A0000
trusted library allocation
page read and write
8187000
heap
page read and write
49D6000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
217E000
stack
page read and write
254A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
7D20000
trusted library allocation
page execute and read and write
22660000
direct allocation
page read and write
B42C000
direct allocation
page execute and read and write
25740000
trusted library allocation
page read and write
22F80000
trusted library allocation
page read and write
2D46000
unkown
page read and write
7722000
heap
page read and write
699C000
remote allocation
page execute and read and write
25E80000
trusted library allocation
page read and write
5DE000
stack
page read and write
29F0000
direct allocation
page read and write
2830000
direct allocation
page read and write
20CF000
stack
page read and write
23160000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
42C000
unkown
page read and write
233CB000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
23080000
trusted library allocation
page read and write
5889000
trusted library allocation
page read and write
2334E000
trusted library allocation
page read and write
73C8F000
unkown
page readonly
24263000
trusted library allocation
page read and write
74D5000
heap
page read and write
233E9000
trusted library allocation
page read and write
812E000
heap
page read and write
28E9000
heap
page read and write
254C0000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
23417000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
2D34000
unkown
page read and write
23160000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
2D37000
unkown
page read and write
23160000
trusted library allocation
page read and write
2449E000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
230A0000
trusted library allocation
page read and write
74A0000
heap
page read and write
23160000
trusted library allocation
page read and write
761E000
stack
page read and write
254C0000
trusted library allocation
page read and write
4500000
heap
page read and write
8330000
trusted library allocation
page execute and read and write
2E20000
trusted library allocation
page read and write
7640000
direct allocation
page read and write
498000
heap
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
2A95000
trusted library allocation
page execute and read and write
2327F000
trusted library allocation
page read and write
251DE000
stack
page read and write
24543000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
82AD000
heap
page read and write
2880000
heap
page read and write
229E0000
heap
page read and write
2444B000
trusted library allocation
page read and write
25720000
trusted library allocation
page read and write
76C9000
heap
page read and write
490000
heap
page read and write
76D2000
heap
page read and write
63E000
stack
page read and write
25220000
trusted library allocation
page read and write
23170000
trusted library allocation
page read and write
7557000
heap
page read and write
25220000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
22670000
direct allocation
page read and write
242D6000
trusted library allocation
page read and write
2329D000
trusted library allocation
page read and write
241A1000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
2320C000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
25DBF000
stack
page read and write
43BE000
stack
page read and write
23467000
trusted library allocation
page read and write
2D43000
unkown
page read and write
73C8D000
unkown
page read and write
254C0000
trusted library allocation
page read and write
51BE000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
25730000
trusted library allocation
page execute and read and write
73B0000
heap
page read and write
254A0000
trusted library allocation
page read and write
770F000
heap
page read and write
8340000
trusted library allocation
page execute and read and write
254A0000
trusted library allocation
page read and write
25E70000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
2456D000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
23090000
trusted library allocation
page read and write
770F000
heap
page read and write
401000
unkown
page execute read
23325000
trusted library allocation
page read and write
19A000
stack
page read and write
22B5E000
stack
page read and write
23160000
trusted library allocation
page read and write
23285000
trusted library allocation
page read and write
805E000
stack
page read and write
254A0000
trusted library allocation
page read and write
21D5000
heap
page read and write
254A0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
752E000
unkown
page read and write
5E0000
heap
page read and write
25E60000
trusted library allocation
page read and write
254B0000
trusted library allocation
page execute and read and write
23465000
trusted library allocation
page read and write
252E1000
heap
page read and write
24445000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
234F5000
trusted library allocation
page read and write
4510000
heap
page read and write
81C0000
heap
page read and write
230A0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
98000
stack
page read and write
7718000
heap
page read and write
23160000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
24453000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
22C0E000
stack
page read and write
254C0000
trusted library allocation
page read and write
2541D000
stack
page read and write
254C0000
trusted library allocation
page read and write
40A000
unkown
page read and write
254C0000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
25220000
trusted library allocation
page read and write
252E1000
heap
page read and write
23170000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
241C1000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
AA2C000
direct allocation
page execute and read and write
80B0000
direct allocation
page execute and read and write
25220000
trusted library allocation
page read and write
20F0000
heap
page read and write
4DB000
heap
page read and write
70C7000
trusted library allocation
page read and write
254C0000
trusted library allocation
page read and write
23160000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
23356000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
22DAF000
stack
page read and write
408000
unkown
page readonly
244BE000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
4881000
trusted library allocation
page read and write
76CC000
heap
page read and write
23160000
trusted library allocation
page read and write
There are 839 hidden memdumps, click here to show them.