IOC Report
TT Invoice copy.exe

loading gif

Files

File Path
Type
Category
Malicious
TT Invoice copy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp3165.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\pUAQmWA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TT Invoice copy.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pUAQmWA.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ctszxgt.y0o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cdakaqju.ry5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iltncthy.5os.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ohqsmnpu.obt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhqmmrpm.zyl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vy1ivhay.5cf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x42210hw.nbv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtbwom4y.nds.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3E66.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\pUAQmWA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TT Invoice copy.exe
"C:\Users\user\Desktop\TT Invoice copy.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TT Invoice copy.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pUAQmWA.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pUAQmWA" /XML "C:\Users\user\AppData\Local\Temp\tmp3165.tmp"
malicious
C:\Users\user\Desktop\TT Invoice copy.exe
"C:\Users\user\Desktop\TT Invoice copy.exe"
malicious
C:\Users\user\AppData\Roaming\pUAQmWA.exe
C:\Users\user\AppData\Roaming\pUAQmWA.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pUAQmWA" /XML "C:\Users\user\AppData\Local\Temp\tmp3E66.tmp"
malicious
C:\Users\user\AppData\Roaming\pUAQmWA.exe
"C:\Users\user\AppData\Roaming\pUAQmWA.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://sectigo.com/CPS0
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://us2.smtp.mailhostbox.com
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://ip-api.com/line/?fields=hostingi
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://ip-api.com
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://ocsp.sectigo.com0A
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.198.143
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.91.198.143
us2.smtp.mailhostbox.com
United States
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TT Invoice copy_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pUAQmWA_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
36D1000
trusted library allocation
page read and write
malicious
2CB4000
trusted library allocation
page read and write
malicious
3301000
trusted library allocation
page read and write
malicious
3A10000
trusted library allocation
page read and write
malicious
3327000
trusted library allocation
page read and write
malicious
332000
unkown
page readonly
malicious
334B000
trusted library allocation
page read and write
malicious
431000
remote allocation
page execute and read and write
malicious
2CD9000
trusted library allocation
page read and write
malicious
2CFE000
trusted library allocation
page read and write
malicious
27DF000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
565D000
trusted library allocation
page read and write
6F60000
trusted library allocation
page execute and read and write
2797000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
49F4000
trusted library allocation
page read and write
26D9000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
915E000
stack
page read and write
27B7000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
2675000
trusted library allocation
page read and write
177C000
stack
page read and write
5830000
heap
page read and write
6D2E000
heap
page read and write
985D000
stack
page read and write
6F5E000
stack
page read and write
2689000
trusted library allocation
page read and write
6D36000
trusted library allocation
page read and write
54FE000
stack
page read and write
26EB000
trusted library allocation
page read and write
BA1E000
stack
page read and write
6610000
trusted library allocation
page read and write
ECE000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page read and write
E30000
trusted library allocation
page execute and read and write
2681000
trusted library allocation
page read and write
A40000
heap
page read and write
4E00000
trusted library allocation
page execute and read and write
712E000
stack
page read and write
38F3000
trusted library allocation
page read and write
6B5F000
stack
page read and write
280B000
trusted library allocation
page read and write
611E000
stack
page read and write
267F000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
6A4E000
stack
page read and write
2CA000
stack
page read and write
7BD000
stack
page read and write
27FB000
trusted library allocation
page read and write
EC3000
heap
page read and write
43E000
remote allocation
page execute and read and write
4AA0000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
563E000
stack
page read and write
297F000
stack
page read and write
26DB000
trusted library allocation
page read and write
2594000
trusted library allocation
page read and write
2978000
trusted library allocation
page read and write
64EE000
heap
page read and write
279F000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
270D000
trusted library allocation
page read and write
EF5000
trusted library allocation
page read and write
2809000
trusted library allocation
page read and write
49D1000
trusted library allocation
page read and write
9CDF000
stack
page read and write
2380000
heap
page read and write
2619000
trusted library allocation
page read and write
E9F000
heap
page read and write
A90000
heap
page execute and read and write
3198000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
27F5000
trusted library allocation
page read and write
64DD000
stack
page read and write
F6B000
trusted library allocation
page execute and read and write
9B9C000
stack
page read and write
27F9000
trusted library allocation
page read and write
CBE000
stack
page read and write
27E1000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
27A7000
trusted library allocation
page read and write
639F000
stack
page read and write
6D30000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
90E000
stack
page read and write
278D000
trusted library allocation
page read and write
697B000
trusted library allocation
page read and write
FCE000
stack
page read and write
16F0000
heap
page read and write
2769000
trusted library allocation
page read and write
1695000
trusted library allocation
page execute and read and write
5235000
heap
page read and write
94E000
stack
page read and write
67A000
stack
page read and write
2671000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
6AA3000
heap
page read and write
722E000
stack
page read and write
2725000
trusted library allocation
page read and write
268D000
trusted library allocation
page read and write
3180000
heap
page read and write
2A36000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
26C7000
trusted library allocation
page read and write
654C000
heap
page read and write
323E000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
650000
heap
page read and write
65F5000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
6C9000
heap
page read and write
5E10000
heap
page read and write
4FFE000
stack
page read and write
323B000
trusted library allocation
page read and write
931F000
stack
page read and write
EE2000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
67CE000
stack
page read and write
1780000
trusted library allocation
page read and write
272D000
trusted library allocation
page read and write
282B000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
53BF000
stack
page read and write
2783000
trusted library allocation
page read and write
2BF0000
heap
page execute and read and write
2691000
trusted library allocation
page read and write
890000
heap
page read and write
2701000
trusted library allocation
page read and write
6CE5000
trusted library allocation
page read and write
273D000
trusted library allocation
page read and write
270F000
trusted library allocation
page read and write
2A7B000
heap
page read and write
2645000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
49DD000
trusted library allocation
page read and write
955000
heap
page read and write
53FE000
stack
page read and write
5230000
heap
page read and write
4D7E000
stack
page read and write
2823000
trusted library allocation
page read and write
466C000
stack
page read and write
267B000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
4C60000
heap
page execute and read and write
6D0E000
stack
page read and write
279D000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
F56000
trusted library allocation
page execute and read and write
2813000
trusted library allocation
page read and write
4CC0000
heap
page execute and read and write
2A40000
trusted library allocation
page read and write
9D2000
trusted library allocation
page read and write
6E6E000
stack
page read and write
2767000
trusted library allocation
page read and write
570000
heap
page read and write
6CB0000
trusted library allocation
page read and write
44CE000
stack
page read and write
2BEF000
stack
page read and write
416000
remote allocation
page execute and read and write
5240000
trusted library section
page read and write
27E9000
trusted library allocation
page read and write
6A60000
heap
page read and write
26E5000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
610000
heap
page read and write
3C81000
trusted library allocation
page read and write
2745000
trusted library allocation
page read and write
F67000
trusted library allocation
page execute and read and write
27CD000
trusted library allocation
page read and write
F00000
heap
page read and write
99F000
stack
page read and write
5000000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page execute and read and write
CBA000
trusted library allocation
page execute and read and write
24E8000
trusted library allocation
page read and write
7FDE000
stack
page read and write
6BCE000
stack
page read and write
4A15000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
DFE000
stack
page read and write
B75000
heap
page read and write
27ED000
trusted library allocation
page read and write
590000
heap
page read and write
26F5000
trusted library allocation
page read and write
27D3000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
970000
heap
page read and write
625F000
stack
page read and write
64E0000
heap
page read and write
C9D000
trusted library allocation
page execute and read and write
5820000
heap
page read and write
24C6000
trusted library allocation
page read and write
E00000
heap
page read and write
7E0000
heap
page read and write
3256000
trusted library allocation
page read and write
2695000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
26D3000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
7030000
trusted library allocation
page read and write
4C20000
heap
page read and write
280F000
trusted library allocation
page read and write
E8A000
heap
page read and write
6D2D000
stack
page read and write
9A3000
trusted library allocation
page execute and read and write
271B000
trusted library allocation
page read and write
4DCB000
stack
page read and write
2831000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
DBF000
stack
page read and write
22E7000
trusted library allocation
page execute and read and write
5062000
heap
page read and write
2715000
trusted library allocation
page read and write
2BE0000
heap
page read and write
A3A000
stack
page read and write
9D7000
trusted library allocation
page execute and read and write
6CA0000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
415000
remote allocation
page execute and read and write
29EB000
trusted library allocation
page read and write
283F000
trusted library allocation
page read and write
F3D000
trusted library allocation
page execute and read and write
4EBC000
heap
page read and write
6870000
trusted library allocation
page execute and read and write
26F1000
trusted library allocation
page read and write
5BEE000
stack
page read and write
2795000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
9BDD000
stack
page read and write
16D0000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
6C8D000
stack
page read and write
2310000
trusted library allocation
page execute and read and write
26C5000
trusted library allocation
page read and write
CC7000
heap
page read and write
4BF0000
heap
page read and write
2785000
trusted library allocation
page read and write
B1CD000
stack
page read and write
6CA0000
heap
page read and write
2819000
trusted library allocation
page read and write
1010000
trusted library allocation
page execute and read and write
C94000
trusted library allocation
page read and write
4CB0000
heap
page read and write
2300000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
7C0000
heap
page read and write
271F000
trusted library allocation
page read and write
6EF000
unkown
page read and write
276B000
trusted library allocation
page read and write
5250000
trusted library section
page read and write
29FA000
trusted library allocation
page read and write
1682000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
27D9000
trusted library allocation
page read and write
5034000
heap
page read and write
2747000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
ACE000
heap
page read and write
2753000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
2693000
trusted library allocation
page read and write
433C000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
13A7000
heap
page read and write
2D06000
trusted library allocation
page read and write
ADF000
stack
page read and write
281D000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
272F000
trusted library allocation
page read and write
679F000
stack
page read and write
2799000
trusted library allocation
page read and write
5720000
heap
page read and write
980000
heap
page read and write
37D1000
trusted library allocation
page read and write
4E31000
trusted library allocation
page read and write
47A000
heap
page read and write
777000
stack
page read and write
1490000
heap
page read and write
9CE000
unkown
page read and write
32AC000
stack
page read and write
2BAE000
stack
page read and write
950000
heap
page read and write
CB0000
trusted library allocation
page read and write
829000
stack
page read and write
AA0000
heap
page read and write
27A1000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
E79000
heap
page read and write
2F70000
heap
page read and write
61E000
heap
page read and write
42F000
remote allocation
page execute and read and write
10D0000
heap
page read and write
9C2000
trusted library allocation
page read and write
315E000
stack
page read and write
22E0000
trusted library allocation
page read and write
3827000
trusted library allocation
page read and write
4C00000
heap
page read and write
268F000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
6E2000
heap
page read and write
49B4000
trusted library allocation
page read and write
6A6E000
heap
page read and write
278F000
trusted library allocation
page read and write
26AD000
trusted library allocation
page read and write
961D000
stack
page read and write
6616000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
27E7000
trusted library allocation
page read and write
6D20000
heap
page read and write
49E2000
trusted library allocation
page read and write
29FE000
trusted library allocation
page read and write
5660000
trusted library allocation
page execute and read and write
26FD000
trusted library allocation
page read and write
2673000
trusted library allocation
page read and write
270B000
trusted library allocation
page read and write
274F000
trusted library allocation
page read and write
2608000
trusted library allocation
page read and write
8C0000
heap
page read and write
2699000
trusted library allocation
page read and write
2749000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
1377000
heap
page read and write
49E0000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
52BC000
stack
page read and write
B58E000
stack
page read and write
5E0D000
stack
page read and write
32B0000
heap
page read and write
400000
remote allocation
page execute and read and write
61A000
heap
page read and write
E90000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
2491000
trusted library allocation
page read and write
A8C000
stack
page read and write
49CE000
trusted library allocation
page read and write
2759000
trusted library allocation
page read and write
911D000
stack
page read and write
2638000
trusted library allocation
page read and write
9DB000
trusted library allocation
page execute and read and write
6CC0000
trusted library allocation
page execute and read and write
9B0000
trusted library allocation
page read and write
7F1C0000
trusted library allocation
page execute and read and write
5CEF000
stack
page read and write
27B5000
trusted library allocation
page read and write
49F6000
trusted library allocation
page read and write
9CA000
trusted library allocation
page execute and read and write
13A4000
heap
page read and write
6CD0000
trusted library allocation
page read and write
5640000
heap
page read and write
4EA6000
heap
page read and write
2652000
trusted library allocation
page read and write
53CE000
stack
page read and write
B38000
stack
page read and write
F5A000
trusted library allocation
page execute and read and write
2CD7000
trusted library allocation
page read and write
6AE000
unkown
page read and write
5020000
heap
page read and write
277D000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
72FD000
stack
page read and write
3583000
trusted library allocation
page read and write
F80000
heap
page read and write
2793000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
ECE000
heap
page read and write
F50000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
941E000
stack
page read and write
6CE0000
trusted library allocation
page read and write
EBF000
heap
page read and write
263A000
trusted library allocation
page read and write
601D000
stack
page read and write
17B7000
heap
page read and write
4AD3000
heap
page read and write
27D5000
trusted library allocation
page read and write
6CA7000
trusted library allocation
page read and write
AF7000
heap
page read and write
27D1000
trusted library allocation
page read and write
CB5000
heap
page read and write
32C0000
heap
page execute and read and write
7ED000
stack
page read and write
26AF000
trusted library allocation
page read and write
B44E000
stack
page read and write
2703000
trusted library allocation
page read and write
22E2000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
5010000
trusted library allocation
page execute and read and write
41E000
remote allocation
page execute and read and write
690F000
stack
page read and write
F52000
trusted library allocation
page read and write
2623000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
2865000
trusted library allocation
page read and write
26C9000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
4B94000
trusted library section
page readonly
1CD000
stack
page read and write
6A50000
heap
page read and write
26C1000
trusted library allocation
page read and write
277F000
trusted library allocation
page read and write
4E58000
heap
page read and write
4A00000
trusted library allocation
page read and write
263F000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
26C3000
trusted library allocation
page read and write
268B000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
16C0000
trusted library allocation
page execute and read and write
1340000
heap
page read and write
22EB000
trusted library allocation
page execute and read and write
27C1000
trusted library allocation
page read and write
26D7000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
B90000
heap
page read and write
27AB000
trusted library allocation
page read and write
6524000
heap
page read and write
27EF000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
74E000
stack
page read and write
730000
heap
page read and write
2827000
trusted library allocation
page read and write
6CCF000
stack
page read and write
2C60000
trusted library allocation
page read and write
7F830000
trusted library allocation
page execute and read and write
4AD0000
heap
page read and write
42E000
remote allocation
page execute and read and write
4D80000
trusted library allocation
page read and write
1370000
heap
page read and write
2A06000
trusted library allocation
page read and write
2789000
trusted library allocation
page read and write
5D2E000
stack
page read and write
2959000
trusted library allocation
page read and write
264D000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
9620000
heap
page read and write
4CB5000
heap
page read and write
6D10000
heap
page read and write
333A000
trusted library allocation
page read and write
4CB0000
heap
page read and write
275F000
trusted library allocation
page read and write
4C70000
trusted library allocation
page execute and read and write
139A000
heap
page read and write
283D000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
7240000
heap
page read and write
2D0D000
trusted library allocation
page read and write
3C7000
stack
page read and write
2687000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
262B000
trusted library allocation
page read and write
17B0000
heap
page read and write
652000
heap
page read and write
AC0000
heap
page read and write
B8DC000
stack
page read and write
27DB000
trusted library allocation
page read and write
9D1E000
stack
page read and write
26B5000
trusted library allocation
page read and write
298D000
trusted library allocation
page read and write
680D000
stack
page read and write
26AB000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
2735000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
615D000
stack
page read and write
71BE000
stack
page read and write
4AAE000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
4E40000
heap
page read and write
1690000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
5038000
heap
page read and write
4D70000
trusted library section
page readonly
5860000
heap
page execute and read and write
9A4000
trusted library allocation
page read and write
2C70000
heap
page execute and read and write
16B0000
trusted library allocation
page read and write
26DF000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
6620000
trusted library allocation
page execute and read and write
B04000
heap
page read and write
2791000
trusted library allocation
page read and write
1484000
trusted library allocation
page read and write
43A000
stack
page read and write
504E000
stack
page read and write
2731000
trusted library allocation
page read and write
173E000
stack
page read and write
2755000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
26D1000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
1692000
trusted library allocation
page read and write
3CA9000
trusted library allocation
page read and write
F65000
trusted library allocation
page execute and read and write
13DC000
heap
page read and write
CAD000
trusted library allocation
page execute and read and write
26E1000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
267D000
trusted library allocation
page read and write
27A5000
trusted library allocation
page read and write
F1A000
stack
page read and write
1027000
heap
page read and write
B68E000
stack
page read and write
644000
heap
page read and write
B1D0000
heap
page read and write
580000
heap
page read and write
269D000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
F27000
heap
page read and write
6F70000
trusted library allocation
page read and write
6600000
heap
page read and write
ACA000
heap
page read and write
2697000
trusted library allocation
page read and write
3E0000
unkown
page readonly
2A01000
trusted library allocation
page read and write
B30E000
stack
page read and write
284F000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
ED6000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
674E000
heap
page read and write
4E20000
trusted library section
page read and write
6740000
heap
page read and write
4E5C000
heap
page read and write
26CF000
trusted library allocation
page read and write
4ECC000
heap
page read and write
29E0000
trusted library allocation
page read and write
9AD000
trusted library allocation
page execute and read and write
B02000
heap
page read and write
44E0000
trusted library allocation
page read and write
675E000
stack
page read and write
5710000
heap
page read and write
1680000
trusted library allocation
page read and write
2845000
trusted library allocation
page read and write
E34000
heap
page read and write
810000
heap
page read and write
1470000
trusted library allocation
page read and write
EDD000
trusted library allocation
page read and write
2BBC000
stack
page read and write
1686000
trusted library allocation
page execute and read and write
26B3000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
B91E000
stack
page read and write
4E50000
heap
page read and write
1038000
trusted library allocation
page read and write
1483000
trusted library allocation
page execute and read and write
2679000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
2641000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
2851000
trusted library allocation
page read and write
EA0000
heap
page read and write
6B8E000
stack
page read and write
5088000
heap
page read and write
9A9B000
stack
page read and write
6B3000
heap
page read and write
2596000
trusted library allocation
page read and write
6E5E000
stack
page read and write
80DF000
stack
page read and write
2861000
trusted library allocation
page read and write
64CE000
stack
page read and write
269B000
trusted library allocation
page read and write
507F000
heap
page read and write
6A52000
heap
page read and write
325D000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
F62000
trusted library allocation
page read and write
7260000
heap
page read and write
28D2000
trusted library allocation
page read and write
6AC4000
heap
page read and write
EB0000
trusted library allocation
page read and write
1697000
trusted library allocation
page execute and read and write
26FF000
trusted library allocation
page read and write
5BAE000
stack
page read and write
26ED000
trusted library allocation
page read and write
26CD000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
261D000
trusted library allocation
page read and write
4500000
trusted library allocation
page execute and read and write
584E000
stack
page read and write
995E000
stack
page read and write
249D000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
50C0000
heap
page read and write
9F0000
trusted library allocation
page read and write
981E000
stack
page read and write
2829000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
4B90000
trusted library section
page readonly
26A3000
trusted library allocation
page read and write
2853000
trusted library allocation
page read and write
285B000
trusted library allocation
page read and write
29BC000
stack
page read and write
418000
remote allocation
page execute and read and write
37D9000
trusted library allocation
page read and write
456B000
stack
page read and write
1406000
heap
page read and write
F4D000
trusted library allocation
page execute and read and write
3242000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
CB6000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
5260000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
2A70000
heap
page read and write
AFCF000
stack
page read and write
49BB000
trusted library allocation
page read and write
280D000
trusted library allocation
page read and write
269F000
trusted library allocation
page read and write
694E000
stack
page read and write
278B000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
63DD000
stack
page read and write
2C3E000
stack
page read and write
271D000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
770000
heap
page read and write
2787000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
272B000
trusted library allocation
page read and write
5650000
heap
page read and write
4DE0000
heap
page read and write
4EDD000
heap
page read and write
AECE000
stack
page read and write
2CFA000
trusted library allocation
page read and write
78F000
stack
page read and write
27B3000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
553E000
stack
page read and write
248F000
stack
page read and write
4BEC000
stack
page read and write
2685000
trusted library allocation
page read and write
3CED000
trusted library allocation
page read and write
26CB000
trusted library allocation
page read and write
5867000
heap
page read and write
2A34000
trusted library allocation
page read and write
2803000
trusted library allocation
page read and write
6942000
trusted library allocation
page read and write
2A20000
heap
page read and write
324E000
trusted library allocation
page read and write
2857000
trusted library allocation
page read and write
276D000
trusted library allocation
page read and write
27CB000
trusted library allocation
page read and write
168A000
trusted library allocation
page execute and read and write
2765000
trusted library allocation
page read and write
7300000
heap
page read and write
C93000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
368E000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
6A5E000
stack
page read and write
637000
heap
page read and write
521D000
stack
page read and write
37F9000
trusted library allocation
page read and write
1020000
heap
page read and write
26F7000
trusted library allocation
page read and write
EB4000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
12F8000
stack
page read and write
629D000
stack
page read and write
236E000
stack
page read and write
27CF000
trusted library allocation
page read and write
951E000
stack
page read and write
B57000
heap
page read and write
2320000
heap
page execute and read and write
6950000
trusted library allocation
page read and write
27CE000
stack
page read and write
E60000
trusted library allocation
page execute and read and write
7F430000
trusted library allocation
page execute and read and write
2835000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
26B7000
trusted library allocation
page read and write
2677000
trusted library allocation
page read and write
E36000
heap
page read and write
3251000
trusted library allocation
page read and write
2A5E000
unkown
page read and write
27FF000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
27BB000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
713E000
stack
page read and write
3353000
trusted library allocation
page read and write
39CE000
trusted library allocation
page read and write
470000
heap
page read and write
4A80000
heap
page read and write
CC0000
heap
page read and write
6FB0000
trusted library section
page read and write
4C50000
heap
page read and write
CB2000
trusted library allocation
page read and write
285F000
trusted library allocation
page read and write
274D000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
2839000
trusted library allocation
page read and write
5AAC000
stack
page read and write
2630000
trusted library allocation
page read and write
5071000
trusted library allocation
page read and write
4A90000
trusted library allocation
page execute and read and write
2655000
trusted library allocation
page read and write
2A23000
heap
page read and write
26B9000
trusted library allocation
page read and write
26FB000
trusted library allocation
page read and write
167D000
trusted library allocation
page execute and read and write
26BF000
trusted library allocation
page read and write
417000
remote allocation
page execute and read and write
E80000
trusted library allocation
page read and write
24E5000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
4BA0000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
5028000
heap
page read and write
F33000
trusted library allocation
page execute and read and write
1784000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
87CE000
stack
page read and write
E2A000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
2705000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
281B000
trusted library allocation
page read and write
B0CE000
stack
page read and write
4E60000
heap
page read and write
B40E000
stack
page read and write
EBB000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
2719000
trusted library allocation
page read and write
1432000
heap
page read and write
2859000
trusted library allocation
page read and write
9DE000
stack
page read and write
A3E000
stack
page read and write
2711000
trusted library allocation
page read and write
9C6000
trusted library allocation
page execute and read and write
2370000
trusted library allocation
page read and write
E08000
heap
page read and write
990000
trusted library allocation
page read and write
2733000
trusted library allocation
page read and write
42F9000
trusted library allocation
page read and write
1495000
heap
page read and write
2627000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
6B8E000
stack
page read and write
49D6000
trusted library allocation
page read and write
72BE000
stack
page read and write
261B000
trusted library allocation
page read and write
FD0000
heap
page read and write
2683000
trusted library allocation
page read and write
2A70000
heap
page read and write
2863000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
7F080000
trusted library allocation
page execute and read and write
26E9000
trusted library allocation
page read and write
ED1000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
330000
unkown
page readonly
2741000
trusted library allocation
page read and write
48CC000
stack
page read and write
F20000
trusted library allocation
page read and write
277B000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
6CBD000
trusted library allocation
page read and write
4E92000
heap
page read and write
2833000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
717E000
stack
page read and write
CB0000
heap
page read and write
2779000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
29EE000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
9E1F000
stack
page read and write
CA0000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
2757000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
2C81000
trusted library allocation
page read and write
9BD000
trusted library allocation
page execute and read and write
27A3000
trusted library allocation
page read and write
26DD000
trusted library allocation
page read and write
32B3000
heap
page read and write
27C7000
trusted library allocation
page read and write
26E7000
trusted library allocation
page read and write
740000
heap
page read and write
26BB000
trusted library allocation
page read and write
B54E000
stack
page read and write
4CB3000
heap
page read and write
2775000
trusted library allocation
page read and write
B7DC000
stack
page read and write
5030000
heap
page read and write
4DD0000
heap
page read and write
9C0000
trusted library allocation
page read and write
169B000
trusted library allocation
page execute and read and write
97EC000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
There are 834 hidden memdumps, click here to show them.