IOC Report
WBScrrCZSp.exe

loading gif

Files

File Path
Type
Category
Malicious
WBScrrCZSp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Po.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.jpg
PNG image data, 390 x 552, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dirnczsa.fw4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ga4hg5ja.1gw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xni2vbqn.xtl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysvtahyq.htz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp15D5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp15E6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp15F6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp15F7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp1608.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp1619.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp1629.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp163A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp164A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3A1C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3A1D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3A2E.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3A2F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3A30.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3A31.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4B94.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4BA5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4BB5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4BD6.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4BE6.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp71CC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp71DD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp71FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp71FE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp720F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp721F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA8E0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA8F1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA901.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA912.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA923.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA933.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA944.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA954.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDF98.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFA9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFB9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFCA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFDB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpDFEB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpDFFC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpDFFD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE00D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE00E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WBScrrCZSp.exe
"C:\Users\user\Desktop\WBScrrCZSp.exe"
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
"C:\Users\user\AppData\Local\Temp\RarSFX0\Po.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\Po.exe"
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
"C:\Users\user\AppData\Local\Temp\RarSFX0\Po.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://185.222.58.87:55615/
185.222.58.87
malicious
185.222.58.87:55615
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.222.58.87:55615t-
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://www.nasdaq.com/screening/companies-by-industry.aspx?exchange=NASDAQ&render=download
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://ichart.yahoo.com/table.csv?s=
unknown
http://185.222.58.87:5
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.222.58.87:55615
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://185.222.58.87:55615h
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.58.87
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Po_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4319000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4411000
trusted library allocation
page read and write
malicious
3190000
trusted library allocation
page read and write
malicious
71CE000
heap
page read and write
13A7000
trusted library allocation
page execute and read and write
2A22000
heap
page read and write
73A0000
trusted library allocation
page read and write
4E60000
heap
page read and write
3420000
trusted library allocation
page read and write
490E000
stack
page read and write
59C0000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
306E000
stack
page read and write
4437000
trusted library allocation
page read and write
28C2000
stack
page read and write
6968000
heap
page read and write
6B3A000
trusted library allocation
page read and write
5A4B000
stack
page read and write
7145000
heap
page read and write
516E000
stack
page read and write
5AA0000
trusted library allocation
page read and write
14C4000
heap
page read and write
4464000
trusted library allocation
page read and write
5820000
heap
page read and write
690B000
heap
page read and write
4E60000
trusted library allocation
page read and write
416A000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
143D000
trusted library allocation
page execute and read and write
2A27000
heap
page read and write
9420000
heap
page read and write
7D30000
trusted library allocation
page execute and read and write
6983000
heap
page read and write
7171000
heap
page read and write
1460000
heap
page read and write
7B000
unkown
page write copy
594E000
stack
page read and write
34B9000
trusted library allocation
page read and write
574F000
stack
page read and write
1373000
trusted library allocation
page execute and read and write
35DE000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
36C3000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
7A000
unkown
page read and write
5A78000
trusted library allocation
page read and write
2A16000
heap
page read and write
7370000
trusted library allocation
page read and write
73C0000
trusted library allocation
page execute and read and write
43D8000
trusted library allocation
page read and write
43F4000
trusted library allocation
page read and write
85CF000
stack
page read and write
59B0000
trusted library allocation
page read and write
1138000
stack
page read and write
2A6D000
heap
page read and write
5B50000
trusted library allocation
page execute and read and write
773E000
stack
page read and write
B5C9000
trusted library allocation
page read and write
7189000
heap
page read and write
29F6000
heap
page read and write
295E000
stack
page read and write
5B4E000
stack
page read and write
523D000
stack
page read and write
1484000
heap
page read and write
6B50000
trusted library allocation
page read and write
12B0000
heap
page read and write
75DF000
stack
page read and write
3271000
trusted library allocation
page read and write
43AC000
trusted library allocation
page read and write
4447000
trusted library allocation
page read and write
7960000
trusted library allocation
page execute and read and write
738D000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
733C000
trusted library allocation
page read and write
302E000
stack
page read and write
2F70000
heap
page read and write
5950000
trusted library allocation
page read and write
11000
unkown
page execute read
6B12000
trusted library allocation
page read and write
177A000
trusted library allocation
page execute and read and write
5290000
trusted library allocation
page read and write
17C7000
heap
page read and write
6BCD000
stack
page read and write
6B55000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
447A000
trusted library allocation
page read and write
13CE000
stack
page read and write
43F2000
trusted library allocation
page read and write
5F3E000
stack
page read and write
359D000
trusted library allocation
page read and write
1497000
heap
page read and write
141E000
stack
page read and write
43BB000
trusted library allocation
page read and write
7348000
trusted library allocation
page read and write
3080000
heap
page execute and read and write
3682000
trusted library allocation
page read and write
6890000
heap
page read and write
6B3F000
trusted library allocation
page read and write
68DD000
heap
page read and write
372D000
trusted library allocation
page read and write
43A8000
trusted library allocation
page read and write
5873000
heap
page read and write
3452000
trusted library allocation
page read and write
4401000
trusted library allocation
page read and write
170E000
stack
page read and write
6B2A000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
EE2000
unkown
page readonly
52EE000
stack
page read and write
1392000
trusted library allocation
page read and write
5C60000
heap
page read and write
5960000
trusted library allocation
page read and write
12AE000
stack
page read and write
4A0E000
stack
page read and write
2D8D000
stack
page read and write
42D0000
trusted library allocation
page read and write
2A04000
heap
page read and write
443A000
trusted library allocation
page read and write
352B000
trusted library allocation
page read and write
2F34000
heap
page read and write
6FEE000
stack
page read and write
4353000
trusted library allocation
page read and write
17A7000
heap
page read and write
5970000
trusted library allocation
page read and write
178B000
trusted library allocation
page execute and read and write
17AE000
heap
page read and write
AFDB000
stack
page read and write
4363000
trusted library allocation
page read and write
4158000
trusted library allocation
page read and write
10000
unkown
page readonly
29FA000
heap
page read and write
1380000
heap
page read and write
5800000
trusted library allocation
page execute and read and write
2C8E000
stack
page read and write
734E000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
763E000
stack
page read and write
1440000
heap
page read and write
1522000
heap
page read and write
5A10000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
435D000
trusted library allocation
page read and write
4B15000
trusted library allocation
page read and write
5B0D000
stack
page read and write
7FBF000
stack
page read and write
32F0000
trusted library allocation
page read and write
73EE000
heap
page read and write
560B000
trusted library allocation
page read and write
B0DC000
stack
page read and write
103B000
stack
page read and write
5A80000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
7362000
trusted library allocation
page read and write
11000
unkown
page execute read
3651000
trusted library allocation
page read and write
14FD000
heap
page read and write
7030000
heap
page read and write
31B2000
trusted library allocation
page read and write
299D000
stack
page read and write
144E000
heap
page read and write
5AB0000
trusted library allocation
page read and write
9790000
trusted library section
page read and write
717C000
heap
page read and write
3141000
trusted library allocation
page read and write
31CE000
stack
page read and write
34F0000
trusted library allocation
page read and write
4B20000
heap
page read and write
14F8000
heap
page read and write
3490000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
45000
unkown
page write copy
6FAF000
stack
page read and write
5A50000
trusted library allocation
page execute and read and write
321B000
trusted library allocation
page read and write
4E50000
heap
page read and write
1528000
heap
page read and write
12F7000
stack
page read and write
43B1000
trusted library allocation
page read and write
1374000
trusted library allocation
page read and write
7356000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
165E000
stack
page read and write
43AE000
trusted library allocation
page read and write
80BF000
stack
page read and write
4B63000
trusted library allocation
page read and write
3236000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
1448000
heap
page read and write
2900000
heap
page read and write
436B000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
4C34000
heap
page read and write
73B0000
trusted library allocation
page read and write
3231000
trusted library allocation
page read and write
7194000
heap
page read and write
5C5E000
stack
page read and write
6935000
heap
page read and write
179C000
stack
page read and write
7351000
trusted library allocation
page read and write
4330000
trusted library allocation
page read and write
5825000
heap
page read and write
29A0000
heap
page read and write
1370000
trusted library allocation
page read and write
43E9000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
718E000
heap
page read and write
AA2D000
stack
page read and write
434D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
43FC000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
5870000
heap
page read and write
14F3000
heap
page read and write
14B9000
heap
page read and write
7C20000
heap
page read and write
338D000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
4371000
trusted library allocation
page read and write
2F30000
heap
page read and write
733F000
trusted library allocation
page read and write
55BE000
stack
page read and write
34FA000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
750F000
stack
page read and write
7D60000
trusted library allocation
page execute and read and write
1430000
trusted library allocation
page read and write
1190000
heap
page read and write
1433000
trusted library allocation
page execute and read and write
7BCE000
stack
page read and write
6B10000
trusted library allocation
page read and write
4376000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
9443000
heap
page read and write
13A0000
trusted library allocation
page read and write
2A2D000
heap
page read and write
7D80000
trusted library allocation
page read and write
5DEE000
stack
page read and write
68D2000
heap
page read and write
5A00000
trusted library allocation
page read and write
532C000
stack
page read and write
540C000
stack
page read and write
414E000
trusted library allocation
page read and write
12FE000
stack
page read and write
1468000
heap
page read and write
4494000
trusted library allocation
page read and write
68AC000
heap
page read and write
29FA000
heap
page read and write
28ED000
stack
page read and write
5F60000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
2A6D000
heap
page read and write
6894000
heap
page read and write
73E0000
heap
page read and write
2A61000
heap
page read and write
688E000
stack
page read and write
5270000
trusted library section
page read and write
31B8000
trusted library allocation
page read and write
7130000
heap
page read and write
313E000
stack
page read and write
5622000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
1434000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
760C000
stack
page read and write
5A80000
heap
page execute and read and write
7D90000
heap
page read and write
5B8D000
stack
page read and write
FF9000
stack
page read and write
84CE000
stack
page read and write
5A70000
trusted library allocation
page read and write
71AB000
heap
page read and write
5A60000
trusted library allocation
page read and write
795B000
stack
page read and write
5790000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
678E000
stack
page read and write
7B000
unkown
page readonly
45000
unkown
page read and write
9479000
heap
page read and write
28FA000
stack
page read and write
320C000
stack
page read and write
3405000
trusted library allocation
page read and write
5C70000
heap
page read and write
3210000
trusted library allocation
page read and write
7D70000
trusted library allocation
page execute and read and write
7336000
trusted library allocation
page read and write
740E000
stack
page read and write
3496000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
6CC1000
trusted library allocation
page read and write
702E000
stack
page read and write
4369000
trusted library allocation
page read and write
5860000
heap
page read and write
595A000
trusted library allocation
page read and write
6CAE000
stack
page read and write
3610000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
694A000
heap
page read and write
29F1000
heap
page read and write
7344000
trusted library allocation
page read and write
7365000
trusted library allocation
page read and write
945F000
heap
page read and write
A86E000
stack
page read and write
6C0E000
stack
page read and write
7950000
trusted library section
page read and write
441E000
trusted library allocation
page read and write
AC2E000
stack
page read and write
7BD0000
trusted library allocation
page execute and read and write
7FD10000
trusted library allocation
page execute and read and write
B13E000
stack
page read and write
13AB000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
3A000
unkown
page readonly
6945000
heap
page read and write
5616000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
7DAA000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
79A0000
heap
page read and write
71B9000
heap
page read and write
14BF000
heap
page read and write
2F60000
heap
page read and write
4172000
trusted library allocation
page read and write
1370000
heap
page read and write
B23E000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
28D0000
stack
page read and write
3260000
heap
page read and write
5750000
trusted library allocation
page read and write
81BE000
stack
page read and write
526E000
stack
page read and write
1440000
heap
page read and write
5EFD000
stack
page read and write
3A000
unkown
page readonly
152B000
heap
page read and write
1772000
trusted library allocation
page read and write
43DF000
trusted library allocation
page read and write
43A3000
trusted library allocation
page read and write
2A61000
heap
page read and write
13B0000
heap
page read and write
1710000
trusted library allocation
page read and write
439F000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
5CA4000
heap
page read and write
2A01000
heap
page read and write
57E0000
trusted library allocation
page read and write
4442000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
4399000
trusted library allocation
page read and write
5850000
heap
page read and write
6B15000
trusted library allocation
page read and write
4482000
trusted library allocation
page read and write
5640000
heap
page execute and read and write
2A1E000
heap
page read and write
13A5000
trusted library allocation
page execute and read and write
43EE000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
5C80000
heap
page read and write
52D0000
trusted library allocation
page read and write
7164000
heap
page read and write
6B28000
trusted library allocation
page read and write
1320000
heap
page read and write
1386000
heap
page read and write
415D000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
4474000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
2910000
heap
page readonly
29E5000
heap
page read and write
11000
unkown
page execute read
17B0000
trusted library allocation
page execute and read and write
44A5000
trusted library allocation
page read and write
85D0000
trusted library allocation
page execute and read and write
AD2E000
stack
page read and write
1306000
heap
page read and write
668E000
stack
page read and write
5DAE000
stack
page read and write
30CE000
stack
page read and write
4D31000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
4D4A000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
2A2D000
heap
page read and write
735D000
trusted library allocation
page read and write
1782000
trusted library allocation
page read and write
7AE2000
trusted library allocation
page read and write
442B000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
6B19000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
5E2E000
stack
page read and write
442E000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
57D0000
heap
page read and write
7C10000
trusted library allocation
page read and write
5C4E000
stack
page read and write
322E000
trusted library allocation
page read and write
1477000
heap
page read and write
31CD000
trusted library allocation
page read and write
447D000
trusted library allocation
page read and write
25C0000
heap
page read and write
AA40000
heap
page read and write
6C60000
heap
page read and write
2A61000
heap
page read and write
347A000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
29E5000
heap
page read and write
3030000
heap
page execute and read and write
446A000
trusted library allocation
page read and write
14E4000
heap
page read and write
5631000
trusted library allocation
page read and write
17A0000
heap
page read and write
1300000
heap
page read and write
1360000
heap
page read and write
2A6D000
heap
page read and write
1468000
heap
page read and write
4480000
trusted library allocation
page read and write
79CD000
stack
page read and write
75E0000
trusted library section
page read and write
4366000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
AE6E000
stack
page read and write
7DA6000
heap
page read and write
4434000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
41AF000
trusted library allocation
page read and write
6B44000
trusted library allocation
page read and write
443C000
trusted library allocation
page read and write
4279000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
7334000
trusted library allocation
page read and write
29C0000
heap
page read and write
5280000
trusted library allocation
page execute and read and write
17A0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
1787000
trusted library allocation
page execute and read and write
5840000
trusted library section
page readonly
695C000
heap
page read and write
52DE000
trusted library allocation
page read and write
1720000
heap
page read and write
3443000
trusted library allocation
page read and write
7184000
heap
page read and write
10000
unkown
page readonly
5AC0000
trusted library allocation
page execute and read and write
6CD0000
trusted library allocation
page read and write
435A000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
6A00000
trusted library allocation
page execute and read and write
AD6E000
stack
page read and write
43E5000
trusted library allocation
page read and write
1713000
trusted library allocation
page read and write
17C0000
heap
page read and write
5760000
trusted library allocation
page read and write
4164000
trusted library allocation
page read and write
4152000
trusted library allocation
page read and write
2A00000
heap
page read and write
2586000
stack
page read and write
4392000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
2A2D000
heap
page read and write
69B0000
trusted library allocation
page execute and read and write
1481000
heap
page read and write
1420000
trusted library allocation
page execute and read and write
6C3E000
trusted library allocation
page read and write
43B7000
trusted library allocation
page read and write
4C30000
heap
page read and write
1780000
trusted library allocation
page read and write
6B2F000
trusted library allocation
page read and write
43F7000
trusted library allocation
page read and write
28E2000
stack
page read and write
29F2000
heap
page read and write
AA30000
heap
page read and write
69A2000
trusted library allocation
page read and write
6B0F000
stack
page read and write
7C000
unkown
page readonly
1390000
trusted library allocation
page read and write
1776000
trusted library allocation
page execute and read and write
693C000
heap
page read and write
55FD000
stack
page read and write
EE0000
unkown
page readonly
8480000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
176D000
stack
page read and write
5981000
trusted library allocation
page read and write
52AE000
stack
page read and write
69FE000
stack
page read and write
7380000
trusted library allocation
page read and write
715D000
heap
page read and write
32E4000
trusted library allocation
page read and write
1396000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
1360000
trusted library allocation
page read and write
59F0000
trusted library allocation
page execute and read and write
2A24000
heap
page read and write
7D50000
trusted library allocation
page read and write
2F78000
heap
page read and write
25C5000
heap
page read and write
4B000
unkown
page read and write
5A20000
trusted library allocation
page execute and read and write
6B52000
trusted library allocation
page read and write
A82E000
stack
page read and write
5600000
trusted library allocation
page read and write
28CC000
stack
page read and write
7980000
trusted library allocation
page execute and read and write
948B000
heap
page read and write
3736000
trusted library allocation
page read and write
4AC7000
trusted library allocation
page read and write
29E8000
heap
page read and write
36F5000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
175E000
stack
page read and write
F62000
unkown
page readonly
6B35000
trusted library allocation
page read and write
4271000
trusted library allocation
page read and write
29F0000
heap
page read and write
584E000
stack
page read and write
5C6E000
trusted library allocation
page read and write
7358000
trusted library allocation
page read and write
There are 521 hidden memdumps, click here to show them.