IOC Report
OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2sw244wu.hwi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yv0p3uq0.snl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv8FEB.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x63899351, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\wwygbptuchcdfblksmaltqitnujxaycgq
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe
"C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA.scr.exe' -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\wwygbptuchcdfblksmaltqitnujxaycgq"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\yyezc"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\yyezc"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\user\AppData\Local\Temp\isrjdappm"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
http://www.imvu.comr
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://contoso.com/License
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://www.google.com
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
http://c.pki.goog/r/r4.crl0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://i.pki.goog/r4.crt0
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://91.223.3.167
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
https://github.com/Pester/Pester
unknown
http://o.pki.goog/we20%
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://91.223.3.167/cir/Pvxorwu.wav
91.223.3.167
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://i.pki.goog/gsr1.crt0-
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
http://www.ebuddy.com
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
171.39.242.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
15.204.0.108
unknown
United States
malicious
91.223.3.167
unknown
Poland
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RRTJVV
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RRTJVV
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RRTJVV
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RRTJVV
UID
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OBLIG#U0100T#U0100 PRODUKTA SPECIFIK#U0100CIJA_RASMANCS
FileDirectory
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3D30000
trusted library allocation
page read and write
malicious
3E3B000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
3C31000
trusted library allocation
page read and write
malicious
AD7000
heap
page read and write
malicious
2C4E000
trusted library allocation
page read and write
malicious
6040000
trusted library section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12FB000
stack
page read and write
2EA4000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
B4C000
stack
page read and write
2FEC000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
2D7D000
trusted library allocation
page read and write
5EBE000
stack
page read and write
5F60000
trusted library section
page read and write
2E5C000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
31EC000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
7E30000
heap
page read and write
2A20000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
6C0000
heap
page read and write
2EBD000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
EA2000
heap
page read and write
3040000
heap
page read and write
6F90000
heap
page read and write
339F000
stack
page read and write
130D000
heap
page read and write
2F17000
trusted library allocation
page read and write
F90000
heap
page read and write
6FA5000
heap
page read and write
3095000
trusted library allocation
page read and write
F90000
heap
page read and write
2DC9000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
4470000
heap
page execute and read and write
6FE2000
heap
page read and write
970000
heap
page read and write
6DCE000
stack
page read and write
7CA0000
heap
page read and write
446E000
stack
page read and write
2B10000
heap
page read and write
334D000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
6AFF000
stack
page read and write
67FE000
stack
page read and write
E52000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
6E0E000
stack
page read and write
2FA1000
trusted library allocation
page read and write
13B0000
heap
page read and write
3137000
trusted library allocation
page read and write
2DA9000
trusted library allocation
page read and write
6FEF000
heap
page read and write
3336000
trusted library allocation
page read and write
5AAE000
stack
page read and write
7080000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
10D0000
heap
page read and write
2F34000
trusted library allocation
page read and write
69AE000
heap
page read and write
2E01000
trusted library allocation
page read and write
438E000
stack
page read and write
31B0000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
2E2F000
trusted library allocation
page read and write
2C70000
heap
page read and write
3126000
trusted library allocation
page read and write
332E000
trusted library allocation
page read and write
E6E000
heap
page read and write
72B0000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
6B7E000
stack
page read and write
2E39000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
6F98000
heap
page read and write
32CC000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
E33000
trusted library allocation
page execute and read and write
692E000
stack
page read and write
13B0000
heap
page read and write
975000
heap
page read and write
2F4B000
trusted library allocation
page read and write
13E0000
heap
page read and write
3334000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
3128000
trusted library allocation
page read and write
2A55000
trusted library allocation
page execute and read and write
13B8000
heap
page read and write
5C71000
trusted library allocation
page read and write
13CD000
heap
page read and write
2A30000
trusted library allocation
page read and write
319F000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
106B000
trusted library allocation
page execute and read and write
720D000
stack
page read and write
FC0000
heap
page read and write
2DDC000
trusted library allocation
page read and write
2F57000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
45E000
system
page execute and read and write
6A7A000
stack
page read and write
2EA6000
trusted library allocation
page read and write
31E8000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
32F4000
trusted library allocation
page read and write
7D3D000
stack
page read and write
2F4D000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
1062000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
F2C000
stack
page read and write
2F8C000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
719000
heap
page read and write
2D58000
heap
page read and write
3135000
trusted library allocation
page read and write
687E000
stack
page read and write
4390000
trusted library allocation
page read and write
3470000
heap
page read and write
3251000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
38C000
stack
page read and write
2E7D000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
2F6A000
trusted library allocation
page read and write
477000
remote allocation
page execute and read and write
707E000
stack
page read and write
3230000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
2B0E000
stack
page read and write
5AB0000
trusted library section
page read and write
93E000
stack
page read and write
31BB000
trusted library allocation
page read and write
7020000
trusted library allocation
page execute and read and write
319D000
trusted library allocation
page read and write
456000
system
page execute and read and write
361A000
heap
page read and write
7160000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
2EB3000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
67E0000
trusted library allocation
page execute and read and write
5C10000
trusted library allocation
page read and write
E4D000
trusted library allocation
page execute and read and write
E50000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
757000
heap
page read and write
2D5C000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
A8E000
stack
page read and write
300C000
trusted library allocation
page read and write
6C5000
heap
page read and write
2F1D000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
7DCF000
stack
page read and write
3315000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
29BE000
stack
page read and write
2FD3000
trusted library allocation
page read and write
6F88000
heap
page read and write
32B1000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
2B40000
trusted library allocation
page execute and read and write
2D79000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
3236000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
13AE000
stack
page read and write
3570000
heap
page read and write
26EF000
stack
page read and write
7230000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
546E000
stack
page read and write
31C7000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page execute and read and write
3FDB000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
E26000
heap
page read and write
2DE9000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
1080000
heap
page read and write
167F000
stack
page read and write
3CD000
stack
page read and write
2EA0000
trusted library allocation
page read and write
6FAF000
heap
page read and write
3205000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
2EB7000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
8B6000
unkown
page readonly
1158000
heap
page read and write
E60000
heap
page read and write
2E33000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
10E0000
heap
page read and write
FE0000
heap
page read and write
3338000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
6B3E000
stack
page read and write
54AD000
stack
page read and write
7BB000
heap
page read and write
6A3E000
stack
page read and write
314C000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page read and write
F06000
heap
page read and write
7240000
trusted library allocation
page read and write
474000
system
page execute and read and write
45D5000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
8B2000
unkown
page readonly
1310000
heap
page read and write
142D000
heap
page read and write
54ED000
trusted library allocation
page read and write
B33000
heap
page read and write
56EE000
stack
page read and write
324B000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
46A8000
trusted library allocation
page read and write
5220000
heap
page execute and read and write
301F000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
733000
heap
page read and write
E56000
trusted library allocation
page execute and read and write
CCF000
stack
page read and write
2E18000
trusted library allocation
page read and write
29FF000
stack
page read and write
3107000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
711E000
stack
page read and write
400000
system
page execute and read and write
32A1000
trusted library allocation
page read and write
536E000
stack
page read and write
138E000
stack
page read and write
5BF0000
trusted library allocation
page read and write
12D0000
heap
page read and write
10EE000
heap
page read and write
256F000
stack
page read and write
940000
heap
page read and write
5C00000
trusted library allocation
page read and write
5E0000
heap
page read and write
400000
system
page execute and read and write
2D77000
trusted library allocation
page read and write
137E000
stack
page read and write
442E000
stack
page read and write
2F49000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
325F000
stack
page read and write
3260000
heap
page read and write
6930000
trusted library allocation
page execute and read and write
2E1A000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
6000000
trusted library allocation
page execute and read and write
2A80000
heap
page read and write
582E000
stack
page read and write
2F36000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
31BE000
stack
page read and write
30AC000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
9C0000
heap
page read and write
7030000
trusted library allocation
page read and write
3097000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
7E75000
trusted library allocation
page read and write
132B000
heap
page read and write
322E000
trusted library allocation
page read and write
44E0000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
6E0000
heap
page read and write
1420000
heap
page read and write
31E0000
trusted library allocation
page read and write
640000
heap
page read and write
E40000
trusted library allocation
page read and write
10001000
direct allocation
page execute and read and write
308D000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
7B9000
heap
page read and write
6FA0000
heap
page read and write
3008000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
6B80000
heap
page read and write
1070000
heap
page read and write
11CE000
stack
page read and write
7DE0000
trusted library allocation
page read and write
BD0000
heap
page read and write
30C5000
trusted library allocation
page read and write
FDE000
stack
page read and write
3152000
trusted library allocation
page read and write
7086000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
67F0000
heap
page read and write
2FD9000
trusted library allocation
page read and write
532F000
stack
page read and write
3195000
trusted library allocation
page read and write
3460000
heap
page read and write
2D92000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
3199000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
5F30000
trusted library allocation
page execute and read and write
2C21000
trusted library allocation
page read and write
1333000
heap
page read and write
17B0000
heap
page read and write
30AE000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
32B3000
trusted library allocation
page read and write
4D1E000
stack
page read and write
2DE6000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
55AE000
stack
page read and write
331B000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
5F20000
trusted library allocation
page execute and read and write
1067000
trusted library allocation
page execute and read and write
69A5000
heap
page read and write
3270000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
3304000
trusted library allocation
page read and write
45C000
system
page execute and read and write
31CD000
trusted library allocation
page read and write
70B0000
heap
page execute and read and write
3004000
trusted library allocation
page read and write
E5C000
stack
page read and write
8FC000
stack
page read and write
2AC0000
trusted library allocation
page execute and read and write
32CE000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
E0E000
stack
page read and write
2A28000
trusted library allocation
page read and write
2E8F000
trusted library allocation
page read and write
2C1F000
stack
page read and write
2EFE000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2EB5000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
94C000
stack
page read and write
2F8F000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
CF7000
stack
page read and write
6930000
heap
page execute and read and write
2FA5000
trusted library allocation
page read and write
6F20000
heap
page read and write
2F38000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
586E000
stack
page read and write
3232000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
69FE000
stack
page read and write
2A10000
heap
page execute and read and write
2D62000
trusted library allocation
page read and write
E34000
trusted library allocation
page read and write
9B0000
heap
page read and write
BC0000
heap
page read and write
2E9E000
trusted library allocation
page read and write
3093000
trusted library allocation
page read and write
EF4000
stack
page read and write
2F3A000
trusted library allocation
page read and write
3332000
trusted library allocation
page read and write
10DE000
stack
page read and write
3C21000
trusted library allocation
page read and write
2B50000
heap
page read and write
2E6C000
trusted library allocation
page read and write
434C000
stack
page read and write
7210000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
69BE000
stack
page read and write
10016000
direct allocation
page execute and read and write
F59000
stack
page read and write
3234000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
319B000
trusted library allocation
page read and write
EFC000
heap
page read and write
32B5000
trusted library allocation
page read and write
2A0C000
stack
page read and write
2FA7000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
2CF0000
heap
page read and write
308F000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
BB5000
heap
page read and write
12ED000
heap
page read and write
4824000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
6935000
heap
page execute and read and write
2AD0000
heap
page read and write
2A23000
trusted library allocation
page execute and read and write
31B8000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
5EFF000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
2ACE000
stack
page read and write
81D000
unkown
page read and write
334F000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
13B0000
heap
page read and write
7220000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page execute and read and write
41B000
system
page execute and read and write
2B57000
heap
page read and write
30B0000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
E5A000
trusted library allocation
page execute and read and write
31B2000
trusted library allocation
page read and write
B4A000
heap
page read and write
3193000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
43EE000
stack
page read and write
56C000
stack
page read and write
699E000
heap
page read and write
32F1000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
B22000
heap
page read and write
32BF000
stack
page read and write
3349000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
2E66000
trusted library allocation
page read and write
EDB000
stack
page read and write
2A50000
trusted library allocation
page read and write
2DDE000
trusted library allocation
page read and write
30EE000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
697B000
stack
page read and write
315C000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
3456000
heap
page read and write
315A000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
ED6000
stack
page read and write
E87000
heap
page read and write
2E70000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
6FCB000
heap
page read and write
1330000
heap
page read and write
6030000
trusted library allocation
page execute and read and write
2DC7000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
100E000
stack
page read and write
2EAF000
trusted library allocation
page read and write
6E7000
heap
page read and write
1150000
heap
page read and write
2B60000
heap
page read and write
2D5A000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
6F75000
heap
page read and write
2EE9000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
E6B000
heap
page read and write
596E000
stack
page read and write
30C7000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
6988000
heap
page read and write
25E0000
heap
page read and write
2E59000
trusted library allocation
page read and write
68E000
unkown
page read and write
333A000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
76B000
heap
page read and write
2E8B000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page read and write
5F45000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
2D55000
heap
page read and write
3317000
trusted library allocation
page read and write
3302000
trusted library allocation
page read and write
361F000
heap
page read and write
2FBA000
trusted library allocation
page read and write
6F39000
heap
page read and write
6970000
heap
page read and write
3255000
trusted library allocation
page read and write
6F53000
heap
page read and write
2B28000
trusted library allocation
page read and write
B12000
heap
page read and write
12FC000
heap
page read and write
3006000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
3C8000
stack
page read and write
322C000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
105F000
stack
page read and write
3141000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
5F50000
trusted library allocation
page execute and read and write
300E000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
6D4E000
stack
page read and write
5F10000
trusted library allocation
page read and write
7170000
trusted library allocation
page execute and read and write
10D8000
heap
page read and write
764000
heap
page read and write
6FD8000
heap
page read and write
AD0000
heap
page read and write
70C000
heap
page read and write
332C000
trusted library allocation
page read and write
EEA000
heap
page read and write
FF0000
heap
page read and write
31D2000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
5CDE000
stack
page read and write
EF2000
stack
page read and write
2D68000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
474000
remote allocation
page execute and read and write
116F000
heap
page read and write
6010000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
6B7B000
stack
page read and write
3124000
trusted library allocation
page read and write
2B68000
heap
page read and write
305D000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
302B000
trusted library allocation
page read and write
EEF000
stack
page read and write
683E000
stack
page read and write
6100000
trusted library allocation
page execute and read and write
2F19000
trusted library allocation
page read and write
2E6A000
trusted library allocation
page read and write
7D7E000
stack
page read and write
69A1000
heap
page read and write
3025000
trusted library allocation
page read and write
59AE000
stack
page read and write
ACE000
stack
page read and write
5F00000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
8B0000
unkown
page readonly
EF7000
heap
page read and write
690000
heap
page read and write
2DE0000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
1790000
heap
page read and write
304B000
trusted library allocation
page read and write
6180000
trusted library section
page read and write
30EC000
trusted library allocation
page read and write
6FF5000
heap
page read and write
78E000
heap
page read and write
5D0000
heap
page read and write
6780000
trusted library section
page read and write
2E2B000
trusted library allocation
page read and write
2A39000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
2F02000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
572E000
stack
page read and write
3154000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
4095000
trusted library allocation
page read and write
820000
heap
page read and write
7D80000
heap
page read and write
2E8D000
trusted library allocation
page read and write
323F000
stack
page read and write
2F53000
trusted library allocation
page read and write
13D1000
heap
page read and write
2E1C000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
715E000
stack
page read and write
6ABE000
stack
page read and write
2FAA000
trusted library allocation
page read and write
2F4F000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
3000000
heap
page read and write
2D9E000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
6E32000
heap
page read and write
30AA000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
32C6000
trusted library allocation
page read and write
2B10000
heap
page readonly
55EE000
stack
page read and write
3105000
trusted library allocation
page read and write
106E000
stack
page read and write
10CE000
stack
page read and write
6FA9000
heap
page read and write
3143000
trusted library allocation
page read and write
4481000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
32BC000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
3602000
heap
page read and write
134F000
stack
page read and write
2F32000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
71CE000
stack
page read and write
3209000
trusted library allocation
page read and write
690D000
stack
page read and write
520D000
stack
page read and write
3197000
trusted library allocation
page read and write
6D8E000
stack
page read and write
2DCD000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
329A000
trusted library allocation
page read and write
12CF000
stack
page read and write
3351000
trusted library allocation
page read and write
32E3000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
E20000
heap
page read and write
30B5000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
There are 726 hidden memdumps, click here to show them.