IOC Report
CamScanner.exe

loading gif

Files

File Path
Type
Category
Malicious
CamScanner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\kiCBVw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CamScanner.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kiCBVw.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2hcze4c0.drb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbgshq2.0u5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csfetsue.ni1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ephnm5gl.m4h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jpdx1ogc.cgq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_my2lztus.s4x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5efzxvx.lvf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5h0zoxh.a0d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp56D.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\kiCBVw.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CamScanner.exe
"C:\Users\user\Desktop\CamScanner.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CamScanner.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kiCBVw.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmpF4D3.tmp"
malicious
C:\Users\user\Desktop\CamScanner.exe
"C:\Users\user\Desktop\CamScanner.exe"
malicious
C:\Users\user\AppData\Roaming\kiCBVw.exe
C:\Users\user\AppData\Roaming\kiCBVw.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiCBVw" /XML "C:\Users\user\AppData\Local\Temp\tmp56D.tmp"
malicious
C:\Users\user\AppData\Roaming\kiCBVw.exe
"C:\Users\user\AppData\Roaming\kiCBVw.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://r3.o.lencr.org0
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://mail.speedwellabrasive.com
unknown
http://r3.i.lencr.org/09
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.speedwellabrasive.com
207.174.215.2
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
207.174.215.2
mail.speedwellabrasive.com
United States
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CamScanner_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\kiCBVw_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
314B000
trusted library allocation
page read and write
malicious
3D84000
trusted library allocation
page read and write
malicious
3956000
trusted library allocation
page read and write
malicious
52D0000
trusted library section
page read and write
malicious
2611000
trusted library allocation
page read and write
malicious
2B8B000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
2A41000
trusted library allocation
page read and write
malicious
46A0000
trusted library allocation
page read and write
malicious
9A0000
heap
page read and write
4C80000
trusted library section
page readonly
CC0000
heap
page read and write
52C5000
heap
page read and write
132E000
stack
page read and write
C9D000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
34D9000
trusted library allocation
page read and write
7969000
trusted library allocation
page read and write
70E2000
trusted library allocation
page read and write
508E000
trusted library allocation
page read and write
1440000
heap
page read and write
6F80000
heap
page read and write
CA6000
trusted library allocation
page execute and read and write
7186000
trusted library allocation
page read and write
72F9000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
3655000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
7170000
trusted library allocation
page execute and read and write
4EAD000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
759000
stack
page read and write
65BE000
stack
page read and write
77FA000
trusted library allocation
page read and write
105B000
trusted library allocation
page execute and read and write
95A000
heap
page read and write
50A1000
trusted library allocation
page read and write
63A000
stack
page read and write
DC3000
heap
page read and write
55F2000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
25CF000
stack
page read and write
72BE000
stack
page read and write
A67E000
stack
page read and write
2CD0000
trusted library allocation
page read and write
10CE000
stack
page read and write
7460000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
520E000
stack
page read and write
6FB0000
heap
page read and write
4EB0000
trusted library allocation
page read and write
2980000
heap
page read and write
3505000
trusted library allocation
page read and write
78F9000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
50EE000
stack
page read and write
701B000
stack
page read and write
7878000
trusted library allocation
page read and write
B53000
trusted library allocation
page execute and read and write
CAA000
trusted library allocation
page execute and read and write
74DE000
stack
page read and write
1400000
trusted library allocation
page read and write
7423000
trusted library allocation
page read and write
3C0F000
trusted library allocation
page read and write
163B000
trusted library allocation
page execute and read and write
7146000
trusted library allocation
page read and write
9E1D000
stack
page read and write
78B0000
trusted library allocation
page read and write
738B000
trusted library allocation
page read and write
5250000
heap
page read and write
316D000
unkown
page read and write
5612000
trusted library allocation
page read and write
71CF000
trusted library allocation
page read and write
4F10000
heap
page read and write
53E0000
heap
page read and write
FA9000
stack
page read and write
78EF000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
5160000
heap
page read and write
1600000
trusted library allocation
page read and write
782F000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
137E000
stack
page read and write
C70000
trusted library allocation
page read and write
7131000
trusted library allocation
page read and write
79CA000
trusted library allocation
page read and write
72FB000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
64C2000
heap
page read and write
509E000
trusted library allocation
page read and write
991000
heap
page read and write
31F0000
heap
page read and write
402000
remote allocation
page execute and read and write
74FF000
stack
page read and write
124B000
stack
page read and write
76D6000
trusted library allocation
page read and write
4FAE000
stack
page read and write
2600000
heap
page read and write
667F000
stack
page read and write
BB0000
heap
page read and write
58F0000
heap
page read and write
3C2F000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
4BB0000
heap
page execute and read and write
6CC0000
trusted library allocation
page execute and read and write
55FE000
stack
page read and write
70FB000
trusted library allocation
page read and write
8C14000
trusted library allocation
page read and write
35DB000
trusted library allocation
page read and write
7C01000
heap
page read and write
70CF000
trusted library allocation
page read and write
F5E000
stack
page read and write
2D25000
trusted library allocation
page read and write
7705000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
309C000
stack
page read and write
6DB0000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
7E45000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
8BE000
stack
page read and write
7890000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
53F0000
heap
page execute and read and write
4129000
trusted library allocation
page read and write
4E30000
heap
page read and write
1503000
heap
page read and write
5480000
trusted library allocation
page execute and read and write
72C5000
trusted library allocation
page read and write
A14A000
heap
page read and write
5B4C000
stack
page read and write
73F0000
heap
page read and write
6680000
heap
page read and write
6A68000
heap
page read and write
6A6A000
heap
page read and write
745C000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
900000
heap
page read and write
7833000
trusted library allocation
page read and write
B8B000
trusted library allocation
page execute and read and write
73D7000
trusted library allocation
page read and write
3C4F000
trusted library allocation
page read and write
D04000
heap
page read and write
7C0000
heap
page read and write
711C000
stack
page read and write
650B000
heap
page read and write
345E000
trusted library allocation
page read and write
67EE000
stack
page read and write
73A2000
trusted library allocation
page read and write
2480000
heap
page execute and read and write
F40000
heap
page read and write
8C0A000
trusted library allocation
page read and write
978000
heap
page read and write
73E0000
trusted library section
page read and write
4ED0000
trusted library allocation
page read and write
5900000
heap
page execute and read and write
DD9000
heap
page read and write
F50000
trusted library allocation
page execute and read and write
6FA8000
heap
page read and write
2BCC000
trusted library allocation
page read and write
781C000
trusted library allocation
page read and write
52C0000
heap
page read and write
2D8E000
stack
page read and write
3010000
trusted library allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
7345000
trusted library allocation
page read and write
1057000
trusted library allocation
page execute and read and write
2A04000
trusted library allocation
page read and write
5C4E000
stack
page read and write
7231000
trusted library allocation
page read and write
D89000
heap
page read and write
1050000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
70E4000
trusted library allocation
page read and write
50A6000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
15B0000
heap
page read and write
5290000
trusted library allocation
page read and write
785F000
trusted library allocation
page read and write
52F0000
heap
page read and write
3C6F000
trusted library allocation
page read and write
736E000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
73FD000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
7BC7000
heap
page read and write
7425000
trusted library allocation
page read and write
AA2E000
stack
page read and write
7244000
trusted library allocation
page read and write
773D000
trusted library allocation
page read and write
7958000
trusted library allocation
page read and write
7378000
trusted library allocation
page read and write
B7A000
trusted library allocation
page execute and read and write
26DC000
trusted library allocation
page read and write
7B7C000
stack
page read and write
31AD000
trusted library allocation
page read and write
2B3E000
stack
page read and write
767A000
trusted library allocation
page read and write
7E3B000
trusted library allocation
page read and write
B82000
trusted library allocation
page read and write
6D5E000
stack
page read and write
682C000
stack
page read and write
729D000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
7E27000
trusted library allocation
page read and write
7FB60000
trusted library allocation
page execute and read and write
8C1E000
trusted library allocation
page read and write
7982000
trusted library allocation
page read and write
7C49000
heap
page read and write
2D9F000
trusted library allocation
page read and write
3A49000
trusted library allocation
page read and write
29A0000
heap
page read and write
72E0000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
4B40000
heap
page read and write
4E80000
trusted library allocation
page read and write
1070000
heap
page read and write
78C6000
trusted library allocation
page read and write
4D3D000
stack
page read and write
CA2000
trusted library allocation
page read and write
7874000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
7667000
trusted library allocation
page read and write
72B2000
trusted library allocation
page read and write
29D0000
heap
page read and write
79C8000
trusted library allocation
page read and write
9C5000
heap
page read and write
7348000
trusted library allocation
page read and write
291D000
stack
page read and write
7500000
trusted library allocation
page read and write
788E000
trusted library allocation
page read and write
D84000
heap
page read and write
433000
remote allocation
page execute and read and write
7B83000
heap
page read and write
73DE000
stack
page read and write
50D0000
heap
page read and write
7BAD000
heap
page read and write
2A1E000
trusted library allocation
page read and write
5950000
heap
page read and write
2C11000
trusted library allocation
page read and write
4E60000
heap
page read and write
2A8A000
trusted library allocation
page read and write
CB7000
trusted library allocation
page execute and read and write
158B000
stack
page read and write
3370000
heap
page read and write
7C4C000
heap
page read and write
5D80000
heap
page read and write
6480000
heap
page read and write
418E000
trusted library allocation
page read and write
7242000
trusted library allocation
page read and write
7663000
trusted library allocation
page read and write
4EAB000
stack
page read and write
730F000
trusted library allocation
page read and write
7157000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
5C7E000
stack
page read and write
734A000
trusted library allocation
page read and write
7E36000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
CB2000
trusted library allocation
page read and write
7311000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
4101000
trusted library allocation
page read and write
738D000
trusted library allocation
page read and write
72FD000
trusted library allocation
page read and write
622000
unkown
page readonly
B76000
trusted library allocation
page execute and read and write
7331000
trusted library allocation
page read and write
3529000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
104A000
trusted library allocation
page execute and read and write
72F3000
trusted library allocation
page read and write
735D000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
B6D000
trusted library allocation
page execute and read and write
F60000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
1476000
heap
page read and write
47EC000
stack
page read and write
A2DE000
stack
page read and write
79DD000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
A7BF000
stack
page read and write
774E000
trusted library allocation
page read and write
1024000
trusted library allocation
page read and write
C83000
trusted library allocation
page execute and read and write
6525000
heap
page read and write
50E0000
heap
page read and write
3874000
trusted library allocation
page read and write
7831000
trusted library allocation
page read and write
73B3000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
7E1D000
trusted library allocation
page read and write
A09B000
stack
page read and write
CF4000
heap
page read and write
593E000
stack
page read and write
8BFB000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
7BF7000
heap
page read and write
3364000
trusted library allocation
page read and write
4E40000
heap
page read and write
4EC0000
trusted library allocation
page read and write
4C40000
heap
page read and write
9CEE000
stack
page read and write
6BE2000
trusted library allocation
page read and write
6A6E000
heap
page read and write
78CD000
trusted library allocation
page read and write
6AC0000
heap
page read and write
6A60000
heap
page read and write
730D000
trusted library allocation
page read and write
6B2E000
stack
page read and write
6A2C000
stack
page read and write
4E50000
trusted library allocation
page read and write
71E0000
trusted library allocation
page read and write
7170000
heap
page read and write
6AC6000
heap
page read and write
1077000
heap
page read and write
72E2000
trusted library allocation
page read and write
797C000
trusted library allocation
page read and write
50B2000
trusted library allocation
page read and write
6AE9000
trusted library allocation
page read and write
69BD000
stack
page read and write
78A7000
trusted library allocation
page read and write
31EE000
stack
page read and write
342C000
trusted library allocation
page read and write
784E000
trusted library allocation
page read and write
265A000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
77C9000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
4C50000
trusted library allocation
page execute and read and write
782D000
trusted library allocation
page read and write
7896000
trusted library allocation
page read and write
1278000
heap
page read and write
30A0000
trusted library allocation
page execute and read and write
722F000
trusted library allocation
page read and write
6FA2000
heap
page read and write
EBF000
stack
page read and write
4F50000
trusted library allocation
page execute and read and write
4670000
trusted library allocation
page execute and read and write
76FE000
trusted library allocation
page read and write
529E000
stack
page read and write
770000
heap
page read and write
2C01000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
6ABA000
heap
page read and write
66DD000
trusted library allocation
page read and write
589E000
stack
page read and write
60BF000
stack
page read and write
7993000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
77D8000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
4C66000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
7954000
trusted library allocation
page read and write
563E000
stack
page read and write
70EA000
trusted library allocation
page read and write
298E000
stack
page read and write
1210000
heap
page read and write
5240000
trusted library allocation
page read and write
711D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
70D1000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
175C000
stack
page read and write
A8EC000
stack
page read and write
6750000
trusted library allocation
page execute and read and write
7846000
trusted library allocation
page read and write
3050000
heap
page read and write
4C00000
trusted library allocation
page execute and read and write
71A8000
trusted library allocation
page read and write
15B7000
heap
page read and write
A13D000
stack
page read and write
790A000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
6A76000
heap
page read and write
B87000
trusted library allocation
page execute and read and write
7E22000
trusted library allocation
page read and write
637D000
stack
page read and write
1052000
trusted library allocation
page read and write
79B5000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
6488000
heap
page read and write
1335000
heap
page read and write
7389000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
8BF6000
trusted library allocation
page read and write
C25000
heap
page read and write
4B51000
trusted library allocation
page read and write
8D8E000
stack
page read and write
32C1000
trusted library allocation
page read and write
C93000
trusted library allocation
page read and write
993000
heap
page read and write
AB2E000
stack
page read and write
3420000
trusted library allocation
page read and write
7956000
trusted library allocation
page read and write
6CA000
unkown
page readonly
3200000
trusted library allocation
page read and write
7761000
trusted library allocation
page read and write
797A000
trusted library allocation
page read and write
1055000
trusted library allocation
page execute and read and write
30F0000
heap
page execute and read and write
79C6000
trusted library allocation
page read and write
7E31000
trusted library allocation
page read and write
1120000
heap
page read and write
4EA6000
trusted library allocation
page read and write
72FF000
trusted library allocation
page read and write
78AE000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
7229000
trusted library allocation
page read and write
8C0F000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
4B5D000
trusted library allocation
page read and write
8C37000
trusted library allocation
page read and write
6C00000
heap
page read and write
6AAC000
stack
page read and write
7150000
trusted library allocation
page execute and read and write
64FA000
heap
page read and write
35D3000
trusted library allocation
page read and write
71BE000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
7326000
trusted library allocation
page read and write
9B0000
heap
page read and write
1540000
heap
page read and write
585C000
stack
page read and write
3323000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
7BCE000
heap
page read and write
5108000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
7248000
trusted library allocation
page read and write
5254000
heap
page read and write
7E4A000
trusted library allocation
page read and write
70E6000
trusted library allocation
page read and write
7B88000
heap
page read and write
6ACE000
heap
page read and write
72A0000
heap
page read and write
870000
heap
page read and write
2DC0000
heap
page read and write
3D40000
trusted library allocation
page read and write
79DF000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
A142000
trusted library allocation
page read and write
4E9E000
trusted library allocation
page read and write
51FC000
stack
page read and write
2F30000
heap
page read and write
7A7C000
stack
page read and write
7582000
trusted library allocation
page read and write
A100000
heap
page read and write
8C28000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
7160000
heap
page read and write
7FD20000
trusted library allocation
page execute and read and write
875000
heap
page read and write
2470000
trusted library allocation
page execute and read and write
3703000
trusted library allocation
page read and write
7B80000
heap
page read and write
744B000
trusted library allocation
page read and write
71DE000
unkown
page read and write
657E000
heap
page read and write
57BC000
stack
page read and write
7313000
trusted library allocation
page read and write
41EE000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
620000
unkown
page readonly
717F000
trusted library allocation
page read and write
647D000
stack
page read and write
4B80000
trusted library allocation
page read and write
9D4000
heap
page read and write
7150000
trusted library allocation
page execute and read and write
5D7F000
stack
page read and write
3C1E000
trusted library allocation
page read and write
791F000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
352B000
trusted library allocation
page read and write
71B9000
trusted library allocation
page read and write
8C2D000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
71BE000
stack
page read and write
7120000
trusted library allocation
page read and write
715B000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
107F000
stack
page read and write
3581000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
7144000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
8BEA000
trusted library allocation
page read and write
A19C000
stack
page read and write
103D000
trusted library allocation
page execute and read and write
A340000
heap
page read and write
42B000
remote allocation
page execute and read and write
2B77000
trusted library allocation
page read and write
5D90000
heap
page read and write
1046000
trusted library allocation
page execute and read and write
3179000
trusted library allocation
page read and write
76EB000
trusted library allocation
page read and write
7436000
trusted library allocation
page read and write
6E8E000
heap
page read and write
6CA6000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
70BC000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
38F0000
trusted library allocation
page read and write
A110000
heap
page read and write
4270000
trusted library allocation
page read and write
A53F000
stack
page read and write
7727000
trusted library allocation
page read and write
102D000
trusted library allocation
page execute and read and write
7E4F000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
78DE000
trusted library allocation
page read and write
B5D000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page read and write
C20000
heap
page read and write
7716000
trusted library allocation
page read and write
5FBD000
stack
page read and write
7C08000
heap
page read and write
1620000
trusted library allocation
page read and write
787C000
trusted library allocation
page read and write
DDD000
heap
page read and write
46EC000
stack
page read and write
66BF000
stack
page read and write
3378000
heap
page read and write
8C32000
trusted library allocation
page read and write
B54000
trusted library allocation
page read and write
4F40000
heap
page read and write
426000
remote allocation
page execute and read and write
7E59000
trusted library allocation
page read and write
4B57000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
A57E000
stack
page read and write
775F000
trusted library allocation
page read and write
5B7E000
stack
page read and write
76C5000
trusted library allocation
page read and write
CF9000
stack
page read and write
4FA0000
trusted library allocation
page read and write
4E65000
heap
page read and write
6CD0000
trusted library allocation
page read and write
308F000
trusted library allocation
page read and write
B63000
trusted library allocation
page read and write
5DB4000
heap
page read and write
1250000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
30D4000
trusted library allocation
page read and write
1023000
trusted library allocation
page execute and read and write
2B83000
trusted library allocation
page read and write
D50000
heap
page read and write
7D0000
heap
page read and write
A140000
heap
page read and write
7872000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
7471000
trusted library allocation
page read and write
7449000
trusted library allocation
page read and write
7133000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
4B3C000
stack
page read and write
687C000
stack
page read and write
D58000
heap
page read and write
1430000
trusted library allocation
page read and write
9F1E000
stack
page read and write
7207000
trusted library allocation
page read and write
7159000
trusted library allocation
page read and write
4B44000
trusted library allocation
page read and write
7136000
trusted library allocation
page read and write
6A99000
heap
page read and write
30C0000
trusted library allocation
page read and write
76C3000
trusted library allocation
page read and write
7C0E000
heap
page read and write
2F00000
trusted library allocation
page read and write
6AA9000
heap
page read and write
2B7F000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
69E0000
heap
page read and write
42F000
remote allocation
page execute and read and write
2F50000
heap
page read and write
719D000
stack
page read and write
5490000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
73C4000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
C8D000
trusted library allocation
page execute and read and write
7E0E000
trusted library allocation
page read and write
338C000
trusted library allocation
page read and write
37EE000
trusted library allocation
page read and write
29EC000
stack
page read and write
769C000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
73D5000
trusted library allocation
page read and write
726A000
trusted library allocation
page read and write
6C4D000
trusted library allocation
page read and write
78B3000
trusted library allocation
page read and write
2A30000
heap
page read and write
1604000
trusted library allocation
page read and write
1637000
trusted library allocation
page execute and read and write
6CA0000
trusted library allocation
page read and write
6CD6000
trusted library allocation
page read and write
3611000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
29CE000
stack
page read and write
56CE000
stack
page read and write
78CB000
trusted library allocation
page read and write
6F7E000
stack
page read and write
2679000
trusted library allocation
page read and write
B72000
trusted library allocation
page read and write
5170000
heap
page read and write
72B4000
trusted library allocation
page read and write
8FE000
stack
page read and write
790E000
trusted library allocation
page read and write
508B000
trusted library allocation
page read and write
78F3000
trusted library allocation
page read and write
7E90000
heap
page read and write
7372000
trusted library allocation
page read and write
710C000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
7B9F000
heap
page read and write
737000
stack
page read and write
1330000
heap
page read and write
73FB000
trusted library allocation
page read and write
72CB000
trusted library allocation
page read and write
77C7000
trusted library allocation
page read and write
A41F000
stack
page read and write
6D10000
trusted library allocation
page execute and read and write
6730000
trusted library allocation
page read and write
716E000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
272E000
trusted library allocation
page read and write
524E000
stack
page read and write
985000
heap
page read and write
727B000
trusted library allocation
page read and write
1657000
heap
page read and write
6C40000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
FDB000
stack
page read and write
2EFF000
stack
page read and write
4F90000
trusted library allocation
page execute and read and write
6C2E000
stack
page read and write
35AB000
trusted library allocation
page read and write
146A000
heap
page read and write
6740000
trusted library allocation
page read and write
2F4E000
stack
page read and write
13BC000
unkown
page read and write
2FAB000
trusted library allocation
page read and write
6F5C000
stack
page read and write
68BE000
stack
page read and write
1622000
trusted library allocation
page read and write
76ED000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page execute and read and write
41AE000
trusted library allocation
page read and write
7894000
trusted library allocation
page read and write
84F7000
trusted library allocation
page read and write
D7A000
heap
page read and write
55FE000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
7E80000
heap
page read and write
7315000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
7786000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
A12E000
heap
page read and write
2DD1000
trusted library allocation
page read and write
57FD000
stack
page read and write
2E9E000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
A05E000
stack
page read and write
7BC4000
heap
page read and write
ED0000
trusted library allocation
page read and write
93A000
stack
page read and write
A176000
heap
page read and write
1042000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
6AB4000
heap
page read and write
7328000
trusted library allocation
page read and write
7738000
trusted library allocation
page read and write
8C05000
trusted library allocation
page read and write
66E7000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
78C4000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
35D9000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page read and write
F20000
heap
page read and write
341C000
trusted library allocation
page read and write
7376000
trusted library allocation
page read and write
3240000
heap
page read and write
7218000
trusted library allocation
page read and write
7775000
trusted library allocation
page read and write
7334000
trusted library allocation
page read and write
79CC000
trusted library allocation
page read and write
76D8000
trusted library allocation
page read and write
4650000
trusted library allocation
page read and write
1474000
heap
page read and write
15F0000
trusted library allocation
page read and write
323F000
stack
page read and write
53FD000
stack
page read and write
522E000
stack
page read and write
8C00000
trusted library allocation
page read and write
6E70000
heap
page read and write
53DE000
stack
page read and write
7412000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
8C41000
trusted library allocation
page read and write
28D8000
trusted library allocation
page read and write
6C43000
trusted library allocation
page read and write
EA9000
stack
page read and write
764E000
trusted library allocation
page read and write
D97000
heap
page read and write
A6BE000
stack
page read and write
7665000
trusted library allocation
page read and write
54A0000
trusted library section
page read and write
4B34000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
3330000
heap
page read and write
3101000
trusted library allocation
page read and write
D3E000
stack
page read and write
29A0000
heap
page execute and read and write
162A000
trusted library allocation
page execute and read and write
780B000
trusted library allocation
page read and write
656C000
heap
page read and write
464E000
stack
page read and write
69EC000
heap
page read and write
1040000
trusted library allocation
page read and write
C6E000
stack
page read and write
72D6000
heap
page read and write
787E000
trusted library allocation
page read and write
4F13000
heap
page read and write
9AED000
stack
page read and write
3A97000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7374000
trusted library allocation
page read and write
7E54000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
8BF1000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
79A4000
trusted library allocation
page read and write
7BEF000
heap
page read and write
71F6000
trusted library allocation
page read and write
24CE000
stack
page read and write
7130000
trusted library allocation
page read and write
2C0D000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
5714000
heap
page read and write
728C000
trusted library allocation
page read and write
29E0000
heap
page read and write
2AA9000
trusted library allocation
page read and write
72BC000
heap
page read and write
161D000
trusted library allocation
page execute and read and write
8BEC000
trusted library allocation
page read and write
6A22000
heap
page read and write
70BE000
stack
page read and write
69EC000
stack
page read and write
4B39000
trusted library allocation
page read and write
D56000
heap
page read and write
AF7000
stack
page read and write
4FEE000
stack
page read and write
25E4000
trusted library allocation
page read and write
7797000
trusted library allocation
page read and write
7447000
trusted library allocation
page read and write
F1E000
stack
page read and write
745E000
trusted library allocation
page read and write
CCE000
heap
page read and write
1632000
trusted library allocation
page read and write
6AD6000
heap
page read and write
432000
remote allocation
page execute and read and write
512E000
stack
page read and write
BC0000
heap
page read and write
2A06000
trusted library allocation
page read and write
797E000
trusted library allocation
page read and write
1603000
trusted library allocation
page execute and read and write
2D9D000
trusted library allocation
page read and write
3BCF000
trusted library allocation
page read and write
732F000
trusted library allocation
page read and write
CBB000
trusted library allocation
page execute and read and write
5940000
heap
page read and write
6BAB000
stack
page read and write
70E8000
trusted library allocation
page read and write
3AE5000
trusted library allocation
page read and write
1270000
heap
page read and write
7661000
trusted library allocation
page read and write
C84000
trusted library allocation
page read and write
7892000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
71F1000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
72AE000
trusted library allocation
page read and write
7259000
trusted library allocation
page read and write
77AE000
trusted library allocation
page read and write
78C9000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
1110000
trusted library allocation
page execute and read and write
6C00000
trusted library allocation
page execute and read and write
6736000
trusted library allocation
page read and write
734C000
trusted library allocation
page read and write
4E55000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
2D4F000
unkown
page read and write
7921000
trusted library allocation
page read and write
D01000
heap
page read and write
4BF0000
heap
page read and write
7E09000
trusted library allocation
page read and write
6ABE000
heap
page read and write
2E25000
trusted library allocation
page read and write
739E000
trusted library allocation
page read and write
5092000
trusted library allocation
page read and write
7E06000
trusted library allocation
page read and write
6C9D000
stack
page read and write
D86000
heap
page read and write
73E8000
trusted library allocation
page read and write
950000
heap
page read and write
2DEA000
stack
page read and write
6BE0000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
7401000
trusted library allocation
page read and write
787A000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
6830000
trusted library allocation
page execute and read and write
8C3C000
trusted library allocation
page read and write
4B75000
trusted library allocation
page read and write
1650000
heap
page read and write
7BA7000
heap
page read and write
7932000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
566C000
stack
page read and write
15C0000
heap
page read and write
33E6000
trusted library allocation
page read and write
6E80000
heap
page read and write
338A000
trusted library allocation
page read and write
1127000
heap
page read and write
2E6B000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
7E13000
trusted library allocation
page read and write
95E000
heap
page read and write
73F9000
trusted library allocation
page read and write
7B8A000
heap
page read and write
1626000
trusted library allocation
page execute and read and write
7943000
trusted library allocation
page read and write
672E000
stack
page read and write
583E000
stack
page read and write
25E6000
trusted library allocation
page read and write
4C93000
heap
page read and write
8C19000
trusted library allocation
page read and write
51CC000
stack
page read and write
9AF0000
heap
page read and write
6C48000
trusted library allocation
page read and write
6C57000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
64F0000
heap
page read and write
5710000
heap
page read and write
637E000
stack
page read and write
2DAD000
stack
page read and write
9F5E000
stack
page read and write
768B000
trusted library allocation
page read and write
528E000
stack
page read and write
3629000
trusted library allocation
page read and write
4B4E000
trusted library allocation
page read and write
6A6C000
heap
page read and write
25D0000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
72F5000
trusted library allocation
page read and write
6531000
heap
page read and write
39F4000
trusted library allocation
page read and write
77E9000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
9C0000
heap
page read and write
66E0000
trusted library allocation
page read and write
6BF0000
heap
page read and write
54FC000
stack
page read and write
3147000
trusted library allocation
page read and write
7861000
trusted library allocation
page read and write
4C90000
heap
page read and write
BB7000
heap
page read and write
305E000
stack
page read and write
7880000
trusted library allocation
page read and write
A33D000
stack
page read and write
4B48000
heap
page read and write
1635000
trusted library allocation
page execute and read and write
2D0E000
unkown
page read and write
5180000
heap
page execute and read and write
309A000
trusted library allocation
page read and write
4B49000
trusted library allocation
page read and write
7E18000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
A31E000
stack
page read and write
76DA000
trusted library allocation
page read and write
6A60000
heap
page read and write
3012000
trusted library allocation
page read and write
71E1000
trusted library allocation
page read and write
7E2C000
trusted library allocation
page read and write
41CE000
trusted library allocation
page read and write
A18E000
stack
page read and write
50AD000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
50C0000
heap
page read and write
110B000
stack
page read and write
790C000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
7835000
trusted library allocation
page read and write
724A000
trusted library allocation
page read and write
29F0000
trusted library allocation
page execute and read and write
78F5000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
31AE000
unkown
page read and write
8AE8000
trusted library allocation
page read and write
76B2000
trusted library allocation
page read and write
73FF000
trusted library allocation
page read and write
C0E000
stack
page read and write
769F000
trusted library allocation
page read and write
784C000
trusted library allocation
page read and write
58ED000
stack
page read and write
2F87000
trusted library allocation
page read and write
5720000
heap
page read and write
2ECD000
trusted library allocation
page read and write
77C3000
trusted library allocation
page read and write
13FC000
stack
page read and write
2A30000
heap
page execute and read and write
716C000
trusted library allocation
page read and write
A1DE000
stack
page read and write
3679000
trusted library allocation
page read and write
72CD000
trusted library allocation
page read and write
573E000
stack
page read and write
160D000
trusted library allocation
page execute and read and write
416E000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
72CF000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
77A8000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
7669000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
5150000
trusted library section
page readonly
5295000
trusted library allocation
page read and write
651A000
heap
page read and write
3434000
trusted library allocation
page read and write
4E84000
trusted library allocation
page read and write
78F7000
trusted library allocation
page read and write
70CD000
trusted library allocation
page read and write
2DCA000
heap
page read and write
6AAE000
heap
page read and write
4EC5000
trusted library allocation
page read and write
CCE000
stack
page read and write
850000
heap
page read and write
8C23000
trusted library allocation
page read and write
7B96000
heap
page read and write
35D1000
trusted library allocation
page read and write
6D9C000
stack
page read and write
7197000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
A9EC000
stack
page read and write
32A9000
trusted library allocation
page read and write
7B91000
heap
page read and write
295A000
stack
page read and write
77B2000
trusted library allocation
page read and write
B4E000
stack
page read and write
763D000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
CCA000
heap
page read and write
78F1000
trusted library allocation
page read and write
647D000
stack
page read and write
7C1E000
heap
page read and write
There are 983 hidden memdumps, click here to show them.