IOC Report
EGSh5caf8a.exe

loading gif

Files

File Path
Type
Category
Malicious
EGSh5caf8a.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EGSh5caf8a.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE:Zone.Identifier
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EGSh5caf8a.exe
"C:\Users\user\Desktop\EGSh5caf8a.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:38 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:38 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:39 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:40 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:41 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:42 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:43 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:43 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:44 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:45 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:46 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:47 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:48 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:48 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:49 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:50 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:51 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:52 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:53 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:53 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:54 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:55 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:56 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 11:57 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 12:01 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 12:07 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 12:13 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 12:17 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 12:21 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
"SCHtAsKs.EXe" /create /tn WindowsUpdates797722446 /tr "C:\Users\user\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 12:25 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 51 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://204.12.199.30:20991/async.txt
204.12.199.30
malicious
http://204.12.199.30:20991/hatthgola.vmp.dll
204.12.199.30
malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://sectigo.com/CPS0
unknown
http://schemas.m
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://204.12.199.30:20991/hatthgola.vmp.dllC:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://204.12.199.30:20991
unknown
http://schemas.microH
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
204.12.199.30
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EGSh5caf8a_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C4A000
trusted library allocation
page read and write
malicious
28DA000
trusted library allocation
page read and write
malicious
2B31000
trusted library allocation
page read and write
303D000
stack
page read and write
322E000
unkown
page read and write
29C0000
heap
page read and write
2AE8000
trusted library allocation
page read and write
2A0E000
stack
page read and write
2E68000
heap
page read and write
29BB000
heap
page read and write
2B8F000
stack
page read and write
A30000
trusted library allocation
page read and write
50B000
heap
page read and write
3C0000
heap
page read and write
5EEE000
stack
page read and write
AD5000
heap
page read and write
2E7A000
stack
page read and write
650000
heap
page read and write
2D72000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
4BE000
unkown
page read and write
738000
heap
page read and write
302E000
unkown
page read and write
2A7E000
stack
page read and write
29C0000
heap
page read and write
2EC0000
heap
page read and write
2950000
heap
page read and write
A66000
trusted library allocation
page execute and read and write
3070000
heap
page read and write
B59000
heap
page read and write
2930000
heap
page read and write
4ECD000
stack
page read and write
68E0000
trusted library section
page read and write
2A00000
heap
page read and write
2D8B000
heap
page read and write
29AE000
unkown
page read and write
A7B000
trusted library allocation
page execute and read and write
34E0000
heap
page read and write
5AA000
stack
page read and write
30C0000
heap
page read and write
2DB0000
heap
page read and write
800000
heap
page read and write
70F000
unkown
page read and write
307A000
stack
page read and write
29BE000
stack
page read and write
321F000
stack
page read and write
60E000
stack
page read and write
2B20000
trusted library allocation
page read and write
390000
heap
page read and write
295B000
trusted library allocation
page read and write
297E000
stack
page read and write
2D9E000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
61BE000
stack
page read and write
67A000
stack
page read and write
2FF8000
heap
page read and write
56D000
stack
page read and write
27A0000
heap
page read and write
2FA0000
heap
page read and write
2ED0000
heap
page read and write
78F000
stack
page read and write
2B59000
trusted library allocation
page read and write
69A000
stack
page read and write
607E000
stack
page read and write
59AE000
stack
page read and write
2B2B000
trusted library allocation
page read and write
43A000
stack
page read and write
2EAA000
stack
page read and write
4A0000
heap
page read and write
3130000
heap
page read and write
315F000
unkown
page read and write
2C90000
heap
page read and write
AAE000
heap
page read and write
472000
unkown
page readonly
2AD9000
trusted library allocation
page read and write
286D000
stack
page read and write
3200000
heap
page read and write
2B52000
trusted library allocation
page read and write
2940000
heap
page read and write
6DD000
stack
page read and write
35FF000
stack
page read and write
4F50000
trusted library allocation
page read and write
29BD000
trusted library allocation
page read and write
80E000
unkown
page read and write
1CD000
stack
page read and write
E08000
trusted library allocation
page read and write
CE0000
heap
page read and write
2E00000
heap
page read and write
2A3E000
stack
page read and write
2820000
trusted library allocation
page read and write
2D30000
heap
page read and write
3895000
trusted library allocation
page read and write
31DF000
stack
page read and write
70E000
unkown
page read and write
A77000
trusted library allocation
page execute and read and write
2FE0000
heap
page read and write
2959000
trusted library allocation
page read and write
2D80000
heap
page read and write
302B000
heap
page read and write
2B4E000
trusted library allocation
page read and write
2D0E000
stack
page read and write
2F5F000
unkown
page read and write
2994000
trusted library allocation
page read and write
310E000
unkown
page read and write
2C61000
trusted library allocation
page read and write
2D6A000
stack
page read and write
5E5000
heap
page read and write
2B4E000
stack
page read and write
C9F000
stack
page read and write
34BF000
stack
page read and write
B79000
heap
page read and write
2BED000
stack
page read and write
27D4000
trusted library allocation
page read and write
3B0000
heap
page read and write
2D2D000
stack
page read and write
810000
heap
page read and write
33A0000
heap
page read and write
3020000
heap
page read and write
3350000
heap
page read and write
2DFD000
trusted library allocation
page read and write
325D000
stack
page read and write
2D38000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
2F9E000
stack
page read and write
2D4E000
stack
page read and write
296A000
trusted library allocation
page read and write
3028000
heap
page read and write
29D0000
trusted library allocation
page read and write
29AE000
unkown
page read and write
2880000
heap
page execute and read and write
2C63000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
28EA000
stack
page read and write
2FDE000
unkown
page read and write
2D4E000
stack
page read and write
EDC000
stack
page read and write
A4D000
trusted library allocation
page execute and read and write
2930000
heap
page read and write
AED000
heap
page read and write
2D50000
heap
page read and write
59A000
stack
page read and write
55D000
stack
page read and write
5DE000
stack
page read and write
2987000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
2A1B000
heap
page read and write
810000
heap
page read and write
2CD000
stack
page read and write
70F000
unkown
page read and write
2D7B000
heap
page read and write
3010000
heap
page read and write
2C6B000
heap
page read and write
29D0000
heap
page read and write
2D57000
trusted library allocation
page read and write
51FD000
stack
page read and write
293A000
stack
page read and write
7D0000
heap
page read and write
31AE000
stack
page read and write
7CE000
unkown
page read and write
51C000
stack
page read and write
6EF4D000
unkown
page read and write
31C8000
heap
page read and write
2E01000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
357F000
unkown
page read and write
A43000
trusted library allocation
page execute and read and write
2805000
trusted library allocation
page read and write
30E0000
heap
page read and write
2974000
trusted library allocation
page read and write
31EF000
stack
page read and write
30DF000
stack
page read and write
2A4F000
stack
page read and write
295D000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
2953000
trusted library allocation
page read and write
3420000
heap
page read and write
29EF000
unkown
page read and write
2BDE000
unkown
page read and write
3030000
heap
page read and write
28B0000
heap
page read and write
3420000
heap
page read and write
43A000
stack
page read and write
2E1A000
trusted library allocation
page read and write
28AE000
stack
page read and write
2940000
heap
page read and write
EE7000
heap
page read and write
2B01000
trusted library allocation
page read and write
2B1A000
trusted library allocation
page read and write
57E000
unkown
page read and write
2955000
trusted library allocation
page read and write
2F20000
heap
page read and write
490000
heap
page read and write
A62000
trusted library allocation
page read and write
3020000
heap
page read and write
29BF000
stack
page read and write
507E000
stack
page read and write
470000
unkown
page readonly
2F10000
heap
page read and write
2B4C000
trusted library allocation
page read and write
29A0000
heap
page read and write
B54000
heap
page read and write
2972000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
29EE000
unkown
page read and write
2D85000
trusted library allocation
page read and write
6EF30000
unkown
page readonly
500000
heap
page read and write
2D3F000
trusted library allocation
page read and write
8F8000
stack
page read and write
2DD0000
heap
page read and write
663D000
stack
page read and write
297E000
unkown
page read and write
2E7A000
stack
page read and write
2D1F000
unkown
page read and write
29DF000
unkown
page read and write
631A000
heap
page read and write
2940000
heap
page read and write
B42000
heap
page read and write
2B67000
trusted library allocation
page read and write
4FF000
unkown
page read and write
7CF000
stack
page read and write
5E0000
heap
page read and write
2D3A000
trusted library allocation
page read and write
28EA000
stack
page read and write
2CE0000
heap
page read and write
30F0000
heap
page read and write
2E0B000
trusted library allocation
page read and write
2D7E000
unkown
page read and write
30D000
stack
page read and write
2ED0000
heap
page read and write
29BF000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
31BF000
stack
page read and write
299E000
unkown
page read and write
2AE4000
trusted library allocation
page read and write
2DC0000
heap
page read and write
34A0000
heap
page read and write
2BF0000
heap
page read and write
4FE000
unkown
page read and write
3400000
heap
page read and write
677D000
stack
page read and write
3B0000
heap
page read and write
2E05000
trusted library allocation
page read and write
2962000
trusted library allocation
page read and write
81E000
unkown
page read and write
2FEE000
unkown
page read and write
28EA000
stack
page read and write
63FE000
stack
page read and write
30C8000
heap
page read and write
2DBB000
heap
page read and write
2992000
trusted library allocation
page read and write
3B0000
heap
page read and write
2D6A000
trusted library allocation
page read and write
29FF000
unkown
page read and write
A40000
trusted library allocation
page read and write
AA0000
heap
page read and write
319E000
stack
page read and write
3200000
heap
page read and write
30A000
stack
page read and write
498E000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
6CB000
heap
page read and write
A72000
trusted library allocation
page read and write
2B30000
heap
page read and write
AE6000
heap
page read and write
34A000
stack
page read and write
297E000
unkown
page read and write
2E22000
trusted library allocation
page read and write
29DB000
heap
page read and write
2E6F000
stack
page read and write
29A6000
trusted library allocation
page read and write
63D000
stack
page read and write
2B8A000
stack
page read and write
DFF000
stack
page read and write
2D0E000
unkown
page read and write
6780000
heap
page read and write
2C3E000
stack
page read and write
30A0000
heap
page read and write
2B1C000
trusted library allocation
page read and write
29B0000
heap
page read and write
65D000
stack
page read and write
390000
heap
page read and write
2F9F000
unkown
page read and write
338E000
stack
page read and write
74E000
stack
page read and write
5FEE000
stack
page read and write
2B63000
trusted library allocation
page read and write
2ED000
stack
page read and write
29EA000
stack
page read and write
32F0000
heap
page read and write
6C0000
heap
page read and write
31BE000
stack
page read and write
2C5F000
stack
page read and write
293A000
stack
page read and write
317E000
stack
page read and write
290A000
stack
page read and write
2B70000
heap
page read and write
2A10000
heap
page read and write
A50000
trusted library allocation
page read and write
2FF0000
heap
page read and write
30BE000
stack
page read and write
3891000
trusted library allocation
page read and write
6302000
heap
page read and write
2EC0000
heap
page read and write
70F000
unkown
page read and write
6EF4F000
unkown
page readonly
2E00000
heap
page read and write
2E3A000
stack
page read and write
5EAE000
stack
page read and write
62C0000
heap
page read and write
2FDE000
stack
page read and write
2E07000
trusted library allocation
page read and write
36D0000
heap
page read and write
2B1E000
trusted library allocation
page read and write
303D000
stack
page read and write
810000
heap
page read and write
29CE000
trusted library allocation
page read and write
298D000
trusted library allocation
page read and write
2D60000
heap
page read and write
A44000
trusted library allocation
page read and write
2A0B000
heap
page read and write
2AEB000
trusted library allocation
page read and write
301F000
unkown
page read and write
2A10000
heap
page read and write
68DE000
stack
page read and write
2B4A000
trusted library allocation
page read and write
33CF000
stack
page read and write
667D000
stack
page read and write
30C0000
heap
page read and write
2ECB000
heap
page read and write
2EC0000
heap
page read and write
27C0000
trusted library allocation
page read and write
2E08000
heap
page read and write
2F7F000
stack
page read and write
3230000
heap
page read and write
28FD000
stack
page read and write
28FF000
stack
page read and write
CDE000
stack
page read and write
2ADC000
trusted library allocation
page read and write
34EB000
heap
page read and write
334F000
unkown
page read and write
78F000
stack
page read and write
2E3D000
stack
page read and write
312F000
unkown
page read and write
2DA2000
trusted library allocation
page read and write
307B000
heap
page read and write
2E00000
heap
page read and write
3FE000
unkown
page read and write
2AFD000
trusted library allocation
page read and write
CF0000
heap
page read and write
29A0000
heap
page read and write
2D70000
trusted library allocation
page read and write
2FC0000
heap
page read and write
29F0000
heap
page read and write
2B0C000
trusted library allocation
page read and write
ABF000
heap
page read and write
29F0000
heap
page read and write
3160000
heap
page read and write
2D9C000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
38F6000
trusted library allocation
page read and write
71A000
stack
page read and write
29E0000
heap
page read and write
1BD000
stack
page read and write
2E40000
heap
page read and write
2AE6000
trusted library allocation
page read and write
30E8000
heap
page read and write
2E24000
trusted library allocation
page read and write
3050000
heap
page read and write
28AF000
unkown
page read and write
6EF46000
unkown
page readonly
299E000
trusted library allocation
page read and write
303C000
heap
page read and write
2D83000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
28DB000
heap
page read and write
3D0000
heap
page read and write
28C6000
trusted library allocation
page read and write
5C0000
heap
page read and write
527E000
stack
page read and write
2DA0000
trusted library allocation
page read and write
32A000
stack
page read and write
62CC000
heap
page read and write
2D3C000
trusted library allocation
page read and write
AAA000
heap
page read and write
64FE000
stack
page read and write
28FD000
stack
page read and write
2B4D000
stack
page read and write
29B0000
heap
page read and write
2DBF000
trusted library allocation
page read and write
3108000
heap
page read and write
5DAD000
stack
page read and write
2D98000
trusted library allocation
page read and write
3430000
heap
page read and write
3410000
heap
page read and write
2F5E000
unkown
page read and write
3270000
heap
page read and write
2E3D000
stack
page read and write
32D0000
heap
page read and write
2942000
trusted library allocation
page read and write
530000
heap
page read and write
278F000
stack
page read and write
31F0000
heap
page read and write
4F3E000
stack
page read and write
2D6F000
stack
page read and write
1FA000
stack
page read and write
2930000
heap
page read and write
2976000
trusted library allocation
page read and write
2D00000
heap
page read and write
3A0000
heap
page read and write
2989000
trusted library allocation
page read and write
28AD000
stack
page read and write
32F8000
heap
page read and write
A5D000
trusted library allocation
page execute and read and write
A53000
trusted library allocation
page read and write
31FF000
stack
page read and write
28D0000
heap
page read and write
30D0000
heap
page read and write
74F000
unkown
page read and write
6EF31000
unkown
page execute read
35BE000
stack
page read and write
2E3D000
stack
page read and write
2910000
heap
page read and write
2B48000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
29FE000
unkown
page read and write
30E0000
heap
page read and write
29EE000
unkown
page read and write
2B06000
trusted library allocation
page read and write
32B0000
heap
page read and write
29C1000
trusted library allocation
page read and write
34C0000
heap
page read and write
2AFB000
trusted library allocation
page read and write
2960000
heap
page read and write
29D0000
heap
page read and write
2FEE000
unkown
page read and write
28AD000
stack
page read and write
5BF000
unkown
page read and write
3310000
heap
page read and write
296C000
trusted library allocation
page read and write
29C5000
trusted library allocation
page read and write
596E000
stack
page read and write
3060000
heap
page read and write
2B54000
trusted library allocation
page read and write
370000
heap
page read and write
3050000
heap
page read and write
297E000
unkown
page read and write
2D70000
heap
page read and write
2970000
trusted library allocation
page read and write
670000
heap
page read and write
2FBE000
stack
page read and write
2B65000
trusted library allocation
page read and write
317E000
unkown
page read and write
592D000
stack
page read and write
298B000
trusted library allocation
page read and write
820000
heap
page read and write
339E000
stack
page read and write
3050000
heap
page read and write
6790000
heap
page read and write
3410000
heap
page read and write
2F1E000
unkown
page read and write
341F000
stack
page read and write
29AD000
stack
page read and write
2D9A000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
339E000
stack
page read and write
67DE000
stack
page read and write
30FB000
heap
page read and write
2AC0000
heap
page read and write
2C50000
heap
page read and write
2B37000
trusted library allocation
page read and write
62BE000
stack
page read and write
5C6D000
stack
page read and write
2DC2000
trusted library allocation
page read and write
3340000
heap
page read and write
29B0000
heap
page read and write
309E000
stack
page read and write
1ED000
stack
page read and write
2DBD000
trusted library allocation
page read and write
CF7000
heap
page read and write
29B9000
trusted library allocation
page read and write
2960000
heap
page read and write
2D2E000
stack
page read and write
2E40000
heap
page read and write
28AD000
stack
page read and write
3020000
heap
page read and write
294F000
trusted library allocation
page read and write
2790000
trusted library allocation
page execute and read and write
2D9E000
stack
page read and write
2D9F000
stack
page read and write
2B5D000
stack
page read and write
2B40000
trusted library allocation
page read and write
31C0000
heap
page read and write
2E03000
trusted library allocation
page read and write
29FE000
stack
page read and write
2DA6000
trusted library allocation
page read and write
2AFF000
trusted library allocation
page read and write
728000
heap
page read and write
780000
heap
page read and write
2D34000
trusted library allocation
page read and write
523E000
stack
page read and write
5C2E000
stack
page read and write
720000
heap
page read and write
68F0000
trusted library allocation
page read and write
653E000
stack
page read and write
2E90000
heap
page read and write
29A8000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
78F000
stack
page read and write
2945000
trusted library allocation
page read and write
2DB9000
trusted library allocation
page read and write
2FE0000
heap
page read and write
650000
heap
page read and write
4CD0000
heap
page read and write
2B69000
trusted library allocation
page read and write
64E000
stack
page read and write
3FE000
unkown
page read and write
31C0000
heap
page read and write
2951000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
2E60000
heap
page read and write
78E000
stack
page read and write
38B9000
trusted library allocation
page read and write
470000
heap
page read and write
700000
heap
page read and write
2E3E000
unkown
page read and write
2D87000
trusted library allocation
page read and write
2E7A000
stack
page read and write
EE0000
heap
page read and write
323D000
stack
page read and write
2DE0000
heap
page read and write
2CD0000
heap
page read and write
617F000
stack
page read and write
28B0000
heap
page read and write
2DFF000
trusted library allocation
page read and write
460000
heap
page read and write
710000
heap
page read and write
331E000
unkown
page read and write
323B000
heap
page read and write
2F7F000
unkown
page read and write
2E20000
trusted library allocation
page read and write
2D80000
heap
page read and write
2891000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
82E000
unkown
page read and write
307A000
stack
page read and write
2AF9000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
36E0000
heap
page read and write
29A2000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
51BE000
stack
page read and write
2978000
trusted library allocation
page read and write
AE4000
heap
page read and write
335E000
unkown
page read and write
4F70000
heap
page execute and read and write
29AB000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
4B0000
heap
page read and write
2B9A000
stack
page read and write
2FFE000
stack
page read and write
330E000
unkown
page read and write
2B77000
heap
page read and write
65B000
heap
page read and write
33D0000
heap
page read and write
2E09000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
5D6F000
stack
page read and write
2C1E000
stack
page read and write
64F000
stack
page read and write
380000
heap
page read and write
29A4000
trusted library allocation
page read and write
580000
heap
page read and write
353E000
unkown
page read and write
5B2E000
stack
page read and write
327A000
stack
page read and write
2E0E000
stack
page read and write
2D68000
trusted library allocation
page read and write
74E000
stack
page read and write
2DA4000
trusted library allocation
page read and write
2F30000
heap
page read and write
A0E000
stack
page read and write
2DBF000
unkown
page read and write
2D55000
trusted library allocation
page read and write
2D5E000
stack
page read and write
590000
heap
page read and write
2B03000
trusted library allocation
page read and write
2EA0000
heap
page read and write
29F0000
heap
page read and write
2816000
trusted library allocation
page read and write
800000
heap
page read and write
68F5000
trusted library allocation
page read and write
326F000
unkown
page read and write
2D53000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
50BE000
stack
page read and write
29BF000
unkown
page read and write
297E000
unkown
page read and write
2E6D000
stack
page read and write
28CD000
stack
page read and write
2C60000
heap
page read and write
2E48000
heap
page read and write
329A000
stack
page read and write
500000
heap
page read and write
67B000
heap
page read and write
314F000
unkown
page read and write
820000
heap
page read and write
There are 602 hidden memdumps, click here to show them.