IOC Report
rDEKONT-1_16_2025__75kb__pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
rDEKONT-1_16_2025__75kb__pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rDEKONT-1_16_2025__75kb__pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpB0EF.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\teXfNv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\teXfNv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\teXfNv.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bqbi5kyb.0pr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_exfbnh2e.npc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fp5zlfjc.5xo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hjku2vpj.lau.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC16A.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rDEKONT-1_16_2025__75kb__pdf.exe
"C:\Users\user\Desktop\rDEKONT-1_16_2025__75kb__pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\teXfNv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\teXfNv" /XML "C:\Users\user\AppData\Local\Temp\tmpB0EF.tmp"
malicious
C:\Users\user\Desktop\rDEKONT-1_16_2025__75kb__pdf.exe
"C:\Users\user\Desktop\rDEKONT-1_16_2025__75kb__pdf.exe"
malicious
C:\Users\user\AppData\Roaming\teXfNv.exe
C:\Users\user\AppData\Roaming\teXfNv.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\teXfNv" /XML "C:\Users\user\AppData\Local\Temp\tmpC16A.tmp"
malicious
C:\Users\user\AppData\Roaming\teXfNv.exe
"C:\Users\user\AppData\Roaming\teXfNv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
https://reallyfreegeoip.org/xml/8.46.123.189
104.21.64.1
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://www.goodfont.co.kr
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://checkip.dyndns.org/
132.226.247.73
https://chrome.google.com/webstore?hl=enh
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:116938%0D%0ADate%20a
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://www.office.com/h
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:116938%0D%0ADate%20and%20Time:%2016/01/2025%20/%2012:17:29%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20116938%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
http://www.carterandcone.coml
unknown
https://chrome.google.com/webstore?hl=enlBkq
unknown
http://aborters.duckdns.org:8081
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:116938%0D%0ADate%20and%20Time:%2016/01/2025%20/%2013:16:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20116938%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://anotherarmy.dns.army:8081
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://reallyfreegeoip.org/xml/8.46.123.189$
unknown
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
https://www.office.com/lBkq
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.64.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
104.21.64.1
reallyfreegeoip.org
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDEKONT-1_16_2025__75kb__pdf_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\teXfNv_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4241000
trusted library allocation
page read and write
malicious
432000
remote allocation
page execute and read and write
malicious
2B41000
trusted library allocation
page read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
4969000
trusted library allocation
page read and write
malicious
3ADD000
trusted library allocation
page read and write
5010000
heap
page read and write
3DCA000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
4B6E000
stack
page read and write
67C6000
trusted library allocation
page read and write
F54000
heap
page read and write
5640000
trusted library allocation
page read and write
3CF6000
trusted library allocation
page read and write
A09B000
heap
page read and write
2D5C000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
68A0000
trusted library allocation
page execute and read and write
D05000
heap
page read and write
606E000
stack
page read and write
323A000
stack
page read and write
3DBD000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
6770000
trusted library allocation
page execute and read and write
3B69000
trusted library allocation
page read and write
602E000
stack
page read and write
652E000
stack
page read and write
3E9C000
trusted library allocation
page read and write
26BF000
stack
page read and write
1650000
trusted library allocation
page execute and read and write
3E8C000
trusted library allocation
page read and write
7C30000
heap
page read and write
112A000
trusted library allocation
page read and write
3E74000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
1630000
heap
page read and write
193E000
stack
page read and write
2DF6000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3B43000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
3E37000
trusted library allocation
page read and write
C3F0000
trusted library allocation
page read and write
E0E000
stack
page read and write
3B90000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
3C07000
trusted library allocation
page read and write
7FDE0000
trusted library allocation
page execute and read and write
2CF1000
trusted library allocation
page read and write
14B6000
trusted library allocation
page execute and read and write
13AC000
heap
page read and write
2760000
heap
page read and write
2C35000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
B6E000
stack
page read and write
2F24000
trusted library allocation
page read and write
10CC000
stack
page read and write
2BA8000
trusted library allocation
page read and write
67CD000
trusted library allocation
page read and write
E14000
trusted library allocation
page read and write
A0ED000
heap
page read and write
1074000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
3C76000
trusted library allocation
page read and write
50F0000
heap
page read and write
323F000
stack
page read and write
1150000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page execute and read and write
2AAE000
stack
page read and write
2C26000
trusted library allocation
page read and write
2AEC000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
3E14000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
1223E000
stack
page read and write
2AE2000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
550F000
stack
page read and write
889A000
heap
page read and write
8170000
trusted library allocation
page execute and read and write
642E000
stack
page read and write
6310000
heap
page read and write
3EBD000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
67A6000
trusted library allocation
page read and write
124BC000
stack
page read and write
F9E000
stack
page read and write
5880000
heap
page read and write
6744000
trusted library allocation
page read and write
442000
remote allocation
page execute and read and write
7B20000
trusted library allocation
page read and write
5860000
trusted library allocation
page execute and read and write
880F000
stack
page read and write
3DEE000
trusted library allocation
page read and write
7F70000
heap
page read and write
7C20000
heap
page read and write
5044000
heap
page read and write
1650000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
E13000
trusted library allocation
page execute and read and write
3263000
trusted library allocation
page read and write
3E16000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
1960000
trusted library allocation
page read and write
14CB000
trusted library allocation
page execute and read and write
8920000
trusted library allocation
page execute and read and write
3DD2000
trusted library allocation
page read and write
3CF8000
trusted library allocation
page read and write
8080000
trusted library section
page readonly
196A000
heap
page read and write
7F2B000
stack
page read and write
7AE0000
trusted library allocation
page read and write
652E000
stack
page read and write
8180000
trusted library allocation
page read and write
1960000
heap
page read and write
F83000
heap
page read and write
7F60000
heap
page read and write
D67000
heap
page read and write
D1A000
trusted library allocation
page read and write
2CF9000
trusted library allocation
page read and write
194E000
stack
page read and write
14BA000
trusted library allocation
page execute and read and write
120B000
heap
page read and write
1713000
heap
page read and write
810D000
stack
page read and write
5710000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
12F7000
stack
page read and write
E36000
trusted library allocation
page execute and read and write
DE9000
heap
page read and write
111B000
trusted library allocation
page read and write
3CD7000
trusted library allocation
page read and write
15F4000
trusted library allocation
page read and write
65FE000
stack
page read and write
3E9A000
trusted library allocation
page read and write
111E000
trusted library allocation
page read and write
33C0000
heap
page read and write
42B000
remote allocation
page execute and read and write
9E7F000
heap
page read and write
1612000
trusted library allocation
page read and write
3B58000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
519E000
stack
page read and write
A39000
stack
page read and write
67D0000
trusted library allocation
page execute and read and write
882F000
heap
page read and write
E47000
trusted library allocation
page execute and read and write
427000
remote allocation
page execute and read and write
312E000
trusted library allocation
page read and write
B70000
heap
page read and write
6780000
heap
page read and write
A092000
heap
page read and write
A53E000
stack
page read and write
D0D000
trusted library allocation
page execute and read and write
2BBA000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
3D06000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
1080000
heap
page read and write
9A92000
trusted library allocation
page read and write
440000
remote allocation
page execute and read and write
6760000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
3C34000
trusted library allocation
page read and write
8940000
heap
page read and write
C8E000
stack
page read and write
EC8000
heap
page read and write
2B9E000
trusted library allocation
page read and write
56F0000
trusted library allocation
page execute and read and write
3C01000
trusted library allocation
page read and write
3DD8000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
3BA2000
trusted library allocation
page read and write
E1D000
trusted library allocation
page execute and read and write
56B0000
trusted library allocation
page execute and read and write
13B4000
heap
page read and write
886E000
heap
page read and write
16DA000
heap
page read and write
887B000
heap
page read and write
8920000
heap
page read and write
3CFC000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
62C0000
heap
page read and write
5160000
heap
page read and write
6890000
trusted library allocation
page execute and read and write
12BE000
stack
page read and write
3C03000
trusted library allocation
page read and write
61BE000
stack
page read and write
56FE000
stack
page read and write
6A00000
heap
page read and write
9E70000
heap
page read and write
3E2E000
trusted library allocation
page read and write
2AB6000
trusted library allocation
page read and write
12DF000
heap
page read and write
67C8000
trusted library allocation
page read and write
1200000
heap
page read and write
3E7B000
trusted library allocation
page read and write
1600000
trusted library allocation
page execute and read and write
34A9000
trusted library allocation
page read and write
2FBC000
stack
page read and write
12F6000
heap
page read and write
D03000
trusted library allocation
page execute and read and write
3C1F000
trusted library allocation
page read and write
B840000
trusted library allocation
page execute and read and write
2C85000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
3DF6000
trusted library allocation
page read and write
D5A000
heap
page read and write
1660000
trusted library allocation
page read and write
CDE000
stack
page read and write
311B000
trusted library allocation
page read and write
5720000
heap
page read and write
3CFA000
trusted library allocation
page read and write
1622000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
2C59000
trusted library allocation
page read and write
1138000
trusted library allocation
page read and write
1950000
trusted library allocation
page read and write
7C30000
trusted library allocation
page execute and read and write
67AA000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3136000
trusted library allocation
page read and write
3E0B000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
D30000
unkown
page readonly
3D34000
trusted library allocation
page read and write
110F000
stack
page read and write
4965000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page execute and read and write
50B0000
trusted library allocation
page read and write
2AC2000
trusted library allocation
page read and write
5040000
heap
page read and write
4FBD000
stack
page read and write
3A99000
trusted library allocation
page read and write
8150000
trusted library allocation
page execute and read and write
3D28000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
E32000
trusted library allocation
page read and write
4A73000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
3E19000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
3D4C000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
55CD000
stack
page read and write
2CF5000
trusted library allocation
page read and write
62B0000
heap
page read and write
7DD0000
heap
page execute and read and write
B90000
heap
page read and write
2F0E000
trusted library allocation
page read and write
63EC000
stack
page read and write
2ACA000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
5DAE000
stack
page read and write
55D0000
trusted library allocation
page read and write
2FFE000
stack
page read and write
EB0000
trusted library allocation
page execute and read and write
4396000
trusted library allocation
page read and write
A0DD000
heap
page read and write
DE1000
heap
page read and write
807E000
stack
page read and write
161A000
trusted library allocation
page execute and read and write
108B000
heap
page read and write
6750000
trusted library allocation
page read and write
3460000
heap
page read and write
A05C000
heap
page read and write
14C7000
trusted library allocation
page execute and read and write
3E39000
trusted library allocation
page read and write
338E000
unkown
page read and write
1116000
trusted library allocation
page read and write
F7B000
heap
page read and write
5660000
trusted library allocation
page read and write
3C64000
trusted library allocation
page read and write
2ADC000
trusted library allocation
page read and write
D26000
trusted library allocation
page execute and read and write
3DCD000
trusted library allocation
page read and write
3C13000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
F32000
trusted library allocation
page read and write
CB0000
heap
page read and write
14E5000
heap
page read and write
1670000
heap
page read and write
EC0000
heap
page read and write
4A49000
trusted library allocation
page read and write
3D34000
trusted library allocation
page read and write
54FE000
stack
page read and write
571A000
trusted library allocation
page read and write
2FCD000
stack
page read and write
2F52000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
FD0000
heap
page read and write
9A60000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
65BE000
stack
page read and write
3039000
trusted library allocation
page read and write
663E000
stack
page read and write
8889000
heap
page read and write
15EE000
stack
page read and write
2B58000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
674A000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
443000
remote allocation
page execute and read and write
7BA000
stack
page read and write
1210000
heap
page read and write
3E88000
trusted library allocation
page read and write
1136000
trusted library allocation
page read and write
2DDF000
trusted library allocation
page read and write
3DE0000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
120BE000
stack
page read and write
D04000
trusted library allocation
page read and write
1131000
trusted library allocation
page read and write
3DB8000
trusted library allocation
page read and write
F87000
heap
page read and write
5840000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
3270000
heap
page read and write
1020000
heap
page read and write
8150000
trusted library section
page readonly
2E2D000
trusted library allocation
page read and write
814E000
stack
page read and write
3D44000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
36F0000
heap
page read and write
2ACE000
trusted library allocation
page read and write
2C53000
trusted library allocation
page read and write
F35000
trusted library allocation
page execute and read and write
7C70000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
29E000
unkown
page read and write
422000
remote allocation
page execute and read and write
3B64000
trusted library allocation
page read and write
A39E000
stack
page read and write
E10000
trusted library allocation
page read and write
4161000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
6937000
trusted library allocation
page read and write
632E000
heap
page read and write
2B15000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
8865000
heap
page read and write
17C3000
heap
page read and write
3D46000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page execute and read and write
3BFD000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
6359000
heap
page read and write
1070000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
17C1000
heap
page read and write
9A50000
heap
page read and write
3EC4000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
3DC6000
trusted library allocation
page read and write
8154000
trusted library section
page readonly
1336000
heap
page read and write
FF0000
trusted library allocation
page execute and read and write
1087000
heap
page read and write
A20E000
stack
page read and write
6780000
trusted library allocation
page execute and read and write
A06C000
heap
page read and write
1060000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
62BE000
stack
page read and write
52B0000
trusted library allocation
page read and write
3DC7000
trusted library allocation
page read and write
D30000
heap
page read and write
50B7000
trusted library allocation
page read and write
113D000
trusted library allocation
page read and write
2A40000
heap
page read and write
2DFA000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
2EB1000
trusted library allocation
page read and write
1235000
heap
page read and write
63EF000
stack
page read and write
7B10000
trusted library allocation
page execute and read and write
3D97000
trusted library allocation
page read and write
8140000
heap
page read and write
1970000
trusted library allocation
page read and write
3C78000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
3D67000
trusted library allocation
page read and write
3D26000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
6790000
heap
page read and write
2D53000
trusted library allocation
page read and write
1237E000
stack
page read and write
16D0000
heap
page read and write
1493000
trusted library allocation
page execute and read and write
263F000
unkown
page read and write
3C60000
trusted library allocation
page read and write
5723000
heap
page read and write
DD5000
heap
page read and write
88F0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3DB7000
trusted library allocation
page read and write
68D0000
trusted library allocation
page execute and read and write
9A70000
trusted library allocation
page read and write
3B52000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
3CEE000
trusted library allocation
page read and write
17BF000
heap
page read and write
1247F000
stack
page read and write
E2D000
trusted library allocation
page execute and read and write
6329000
heap
page read and write
3261000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
2A2F000
stack
page read and write
CF0000
trusted library allocation
page read and write
3A7B000
trusted library allocation
page read and write
12C0000
heap
page read and write
1705000
heap
page read and write
5665000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
17C5000
heap
page read and write
9E84000
heap
page read and write
5690000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
5CAE000
stack
page read and write
2E9C000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
14C2000
trusted library allocation
page read and write
558E000
stack
page read and write
14B0000
trusted library allocation
page read and write
16DE000
heap
page read and write
1490000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
62C0000
heap
page read and write
43F000
remote allocation
page execute and read and write
359F000
stack
page read and write
15FD000
trusted library allocation
page execute and read and write
1646000
trusted library allocation
page read and write
8960000
heap
page read and write
3BA8000
trusted library allocation
page read and write
199A000
heap
page read and write
429000
remote allocation
page execute and read and write
3C72000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
AF7000
stack
page read and write
1640000
trusted library allocation
page read and write
12E8000
heap
page read and write
8836000
heap
page read and write
3DFB000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
7E2C000
stack
page read and write
FA7000
stack
page read and write
2BF8000
trusted library allocation
page read and write
643E000
stack
page read and write
1160000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
F73000
heap
page read and write
177E000
stack
page read and write
2DE3000
trusted library allocation
page read and write
5B67000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
3C26000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
81A0000
trusted library allocation
page read and write
63FD000
stack
page read and write
68B0000
trusted library allocation
page execute and read and write
FC8000
trusted library allocation
page read and write
80A0000
trusted library section
page read and write
2EF7000
trusted library allocation
page read and write
55D7000
trusted library allocation
page read and write
3CE7000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
1170000
heap
page read and write
2B1D000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
E4B000
trusted library allocation
page execute and read and write
62AF000
stack
page read and write
2B29000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
3EC8000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
F37000
trusted library allocation
page execute and read and write
162B000
trusted library allocation
page execute and read and write
EF7000
heap
page read and write
3DA1000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
3000000
heap
page execute and read and write
616E000
stack
page read and write
2B91000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
1620000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
3E67000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
1450000
heap
page read and write
1670000
heap
page read and write
580B000
trusted library allocation
page read and write
642E000
stack
page read and write
2BEF000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
886E000
stack
page read and write
7A90000
trusted library allocation
page execute and read and write
43E000
remote allocation
page execute and read and write
3D02000
trusted library allocation
page read and write
B70000
heap
page read and write
120FE000
stack
page read and write
537C000
stack
page read and write
3BB8000
trusted library allocation
page read and write
5883000
heap
page read and write
2B7A000
trusted library allocation
page read and write
62EC000
stack
page read and write
E60000
trusted library allocation
page read and write
7DF0000
heap
page execute and read and write
6880000
trusted library allocation
page execute and read and write
6960000
trusted library allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
3CD7000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
7CA0000
heap
page read and write
3D0A000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
D32000
unkown
page readonly
230000
heap
page read and write
E13000
heap
page read and write
3DA7000
trusted library allocation
page read and write
3DD5000
trusted library allocation
page read and write
1230000
heap
page read and write
3D08000
trusted library allocation
page read and write
35B4000
trusted library allocation
page read and write
3BBF000
trusted library allocation
page read and write
A052000
heap
page read and write
2BE7000
trusted library allocation
page read and write
DEE000
heap
page read and write
57FE000
stack
page read and write
3CD5000
trusted library allocation
page read and write
8950000
heap
page read and write
2FAE000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
3CFA000
trusted library allocation
page read and write
2C2A000
trusted library allocation
page read and write
3EA4000
trusted library allocation
page read and write
2BDF000
trusted library allocation
page read and write
3C2A000
trusted library allocation
page read and write
E24000
heap
page read and write
3166000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
1627000
trusted library allocation
page execute and read and write
7E30000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
A0F2000
heap
page read and write
56E0000
heap
page read and write
7AC0000
trusted library allocation
page read and write
1303000
heap
page read and write
1622000
trusted library allocation
page read and write
137A000
heap
page read and write
EEA000
heap
page read and write
3E96000
trusted library allocation
page read and write
160D000
trusted library allocation
page execute and read and write
8931000
heap
page read and write
240000
heap
page read and write
8910000
heap
page read and write
883F000
heap
page read and write
2D8C000
trusted library allocation
page read and write
631C000
heap
page read and write
127E000
stack
page read and write
8867000
heap
page read and write
3ECA000
trusted library allocation
page read and write
3DCA000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
FA0000
heap
page execute and read and write
16C0000
heap
page execute and read and write
3C28000
trusted library allocation
page read and write
121FF000
stack
page read and write
2B31000
trusted library allocation
page read and write
55C0000
trusted library allocation
page execute and read and write
C90000
heap
page read and write
14E0000
heap
page read and write
7B00000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
2EC9000
trusted library allocation
page read and write
3DD6000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
1014000
trusted library allocation
page read and write
310E000
stack
page read and write
6334000
heap
page read and write
E45000
trusted library allocation
page execute and read and write
3CEF000
trusted library allocation
page read and write
7F6E000
stack
page read and write
62E2000
heap
page read and write
2D04000
trusted library allocation
page read and write
3B62000
trusted library allocation
page read and write
3EE9000
trusted library allocation
page read and write
125BC000
stack
page read and write
8820000
heap
page read and write
52C0000
heap
page execute and read and write
3DDA000
trusted library allocation
page read and write
2ABE000
trusted library allocation
page read and write
61AE000
stack
page read and write
7E70000
heap
page read and write
3B31000
trusted library allocation
page read and write
62AE000
stack
page read and write
1480000
trusted library allocation
page read and write
1494000
trusted library allocation
page read and write
3D5E000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
1207000
heap
page read and write
88F5000
trusted library allocation
page read and write
A29D000
stack
page read and write
2BE3000
trusted library allocation
page read and write
52FB000
stack
page read and write
B37000
stack
page read and write
2C26000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
346B000
heap
page read and write
3B41000
trusted library allocation
page read and write
1233F000
stack
page read and write
2C49000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page execute and read and write
6740000
trusted library allocation
page read and write
5F2E000
stack
page read and write
4A45000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
3DCC000
trusted library allocation
page read and write
EAE000
stack
page read and write
2D26000
trusted library allocation
page read and write
2B30000
heap
page read and write
BC0000
heap
page read and write
6313000
heap
page read and write
C890000
trusted library allocation
page read and write
582F000
stack
page read and write
428000
remote allocation
page execute and read and write
140E000
stack
page read and write
E14000
unkown
page readonly
F3B000
trusted library allocation
page execute and read and write
BC5000
heap
page read and write
431000
remote allocation
page execute and read and write
F59000
stack
page read and write
344E000
stack
page read and write
2DBD000
trusted library allocation
page read and write
12CA000
heap
page read and write
5C6E000
stack
page read and write
14B2000
trusted library allocation
page read and write
6324000
heap
page read and write
1600000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
267E000
stack
page read and write
15A0000
heap
page read and write
16BE000
stack
page read and write
430000
remote allocation
page execute and read and write
2BB2000
trusted library allocation
page read and write
FEC000
stack
page read and write
3C28000
trusted library allocation
page read and write
1CA000
stack
page read and write
1220000
heap
page read and write
CF0000
trusted library allocation
page read and write
66EF000
stack
page read and write
14AD000
trusted library allocation
page execute and read and write
2CEE000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
3B5E000
trusted library allocation
page read and write
7C5A000
trusted library allocation
page read and write
F77000
heap
page read and write
1644000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
3390000
heap
page read and write
A050000
trusted library section
page read and write
2C0A000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
67A4000
trusted library allocation
page read and write
7FAB0000
trusted library allocation
page execute and read and write
3131000
trusted library allocation
page read and write
15F3000
trusted library allocation
page execute and read and write
3C58000
trusted library allocation
page read and write
D00000
heap
page read and write
527B000
stack
page read and write
2CD6000
trusted library allocation
page read and write
3BA0000
trusted library allocation
page read and write
1616000
trusted library allocation
page execute and read and write
2C28000
trusted library allocation
page read and write
3A93000
trusted library allocation
page read and write
3C88000
trusted library allocation
page read and write
3C1A000
trusted library allocation
page read and write
8972000
heap
page read and write
2AD6000
trusted library allocation
page read and write
65EE000
stack
page read and write
2AD1000
trusted library allocation
page read and write
895D000
heap
page read and write
3B64000
trusted library allocation
page read and write
3DBE000
trusted library allocation
page read and write
18CF000
stack
page read and write
8945000
heap
page read and write
3EDA000
trusted library allocation
page read and write
1180000
heap
page read and write
6369000
heap
page read and write
276A000
heap
page read and write
3E12000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
18D0000
trusted library allocation
page execute and read and write
4C3D000
stack
page read and write
3C32000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
EA9000
stack
page read and write
2F6A000
trusted library allocation
page read and write
8090000
heap
page read and write
12CE000
heap
page read and write
A0F0000
trusted library allocation
page execute and read and write
3150000
heap
page read and write
1990000
heap
page read and write
2DDB000
trusted library allocation
page read and write
673E000
stack
page read and write
676D000
trusted library allocation
page read and write
144E000
stack
page read and write
6720000
heap
page read and write
52B0000
heap
page execute and read and write
693B000
trusted library allocation
page read and write
FAD000
heap
page read and write
18D000
stack
page read and write
3BC7000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
E3A000
trusted library allocation
page execute and read and write
2D21000
trusted library allocation
page read and write
112E000
trusted library allocation
page read and write
2AE4000
trusted library allocation
page read and write
4FED000
stack
page read and write
581E000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
2D8F000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
647E000
stack
page read and write
8095000
heap
page read and write
5014000
heap
page read and write
2BEB000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
3B66000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
8810000
heap
page read and write
4FAF000
stack
page read and write
7DC0000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
11E0000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
3EB0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
FC0000
heap
page read and write
3C70000
trusted library allocation
page read and write
B20000
heap
page read and write
5650000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
3BAD000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
8160000
heap
page read and write
250000
heap
page read and write
340F000
unkown
page read and write
149D000
trusted library allocation
page execute and read and write
6746000
trusted library allocation
page read and write
55F0000
trusted library allocation
page execute and read and write
1665000
trusted library allocation
page read and write
425000
remote allocation
page execute and read and write
6730000
heap
page read and write
1610000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
2C8E000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
657E000
stack
page read and write
3C97000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
158F000
stack
page read and write
2CFF000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
There are 789 hidden memdumps, click here to show them.