IOC Report
72EED30398363-0983BNDJ0398763536.exe

loading gif

Files

File Path
Type
Category
Malicious
72EED30398363-0983BNDJ0398763536.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpE4A7.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
Non-ISO extended-ASCII text, with NEL line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\ANSVARHAVENDES\rapsende.exe
data
dropped
C:\Users\user\AppData\Local\Temp\ARMOURY CRATE Message.VisualElementsManifest.xml
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Airplane_14.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\MapiProxy.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Sports-Wallpapers-1.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, frames 3
dropped
C:\Users\user\AppData\Local\Temp\TREDIVER.Und
data
dropped
C:\Users\user\AppData\Local\Temp\format-justify-center-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\fzshellext_64.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lang-1071.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mail-reply-all-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\media-playback-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\network-no-route-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsfC5C3.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\system-reboot-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4A7.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://ocsp.sectigo.com0
unknown
https://sectigo.com/CPS0C
unknown
https://doc-0c-as-docs.googleusercontent.com/w
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.avast.com0/
unknown
https://doc-0c-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/i92dnrd5psv5u8m6hlf298ad6a41tmpe/1653299175000/00136562880816484603/*/1xOEjCOqIA-Yci9ED_I139gMqhvvo_S5Y?e=download
172.217.168.33
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://doc-0c-as-docs.googleusercontent.com/
unknown
https://doc-0c-as-docs.googleusercontent.com/%%doc-0c-as-docs.googleusercontent.com
unknown
https://mozilla.org0
unknown
https://doc-0c-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/i92dnrd5
unknown
https://doc-0c-as-docs.googleusercontent.com/B
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
172.217.168.14
googlehosted.l.googleusercontent.com
172.217.168.33
8476.hopto.org
91.193.75.131
doc-0c-as-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
172.217.168.14
drive.google.com
United States
172.217.168.33
googlehosted.l.googleusercontent.com
United States
91.193.75.131
8476.hopto.org
Serbia

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\FLOKDYRS
Fyrvrkeres
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\riffelgangens
Spydkasters198
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Eyebath\Qoph28
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Specularity211\haandholdt
Screwdriver44
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Amazonen4

Memdumps

Base Address
Regiontype
Protect
Malicious
B00000
remote allocation
page execute and read and write
malicious
32D0000
direct allocation
page execute and read and write
malicious
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
59E0000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
FD4000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
197D062A000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E691000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
47D1000
trusted library allocation
page read and write
1E734000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E952000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
920000
remote allocation
page read and write
1E776000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
2D70000
unkown
page readonly
1C1F1000
heap
page read and write
37D1000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F910000
trusted library allocation
page read and write
1E7B6000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F956000
trusted library allocation
page read and write
1E671000
trusted library allocation
page read and write
3068000
heap
page read and write
31A0000
heap
page read and write
1F9F0000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
C65000
heap
page read and write
1E87F000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
2584000
heap
page read and write
408000
unkown
page readonly
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E900000
trusted library allocation
page read and write
1E79B000
trusted library allocation
page read and write
1E8EC000
trusted library allocation
page read and write
1E675000
trusted library allocation
page read and write
1D00000
heap
page read and write
1F910000
trusted library allocation
page read and write
FDF000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E765000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1FA30000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1A4E000
stack
page read and write
1F715000
trusted library allocation
page read and write
1021000
heap
page read and write
1E97A000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E6E2000
trusted library allocation
page read and write
1E812000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E970000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1FA00000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
FAD000
heap
page read and write
1500000
heap
page read and write
1E90F000
trusted library allocation
page read and write
1036000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
3461000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
920000
remote allocation
page read and write
1E849000
trusted library allocation
page read and write
1FA30000
trusted library allocation
page read and write
1E714000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E869000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E97F000
trusted library allocation
page read and write
1E8D2000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
FE2000
heap
page read and write
1C1F1000
heap
page read and write
197D0613000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E7C4000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E6C3000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F956000
trusted library allocation
page read and write
857000
heap
page read and write
1E676000
trusted library allocation
page read and write
1E7BB000
trusted library allocation
page read and write
1E8BD000
trusted library allocation
page read and write
1C1F2000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
197D0654000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E812000
trusted library allocation
page read and write
1812000
trusted library allocation
page execute and read and write
1F715000
trusted library allocation
page read and write
197D063D000
heap
page read and write
2D6A000
stack
page read and write
319E000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E96D000
trusted library allocation
page read and write
1C1F2000
heap
page read and write
1FF70000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
6FE76000
unkown
page readonly
1E7CF000
trusted library allocation
page read and write
197D0633000
heap
page read and write
617000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E6C4000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
5A09000
trusted library allocation
page read and write
1C1F2000
heap
page read and write
1C1F1000
heap
page read and write
1E6CC000
trusted library allocation
page read and write
1FA10000
trusted library allocation
page read and write
1E847000
trusted library allocation
page read and write
94ED3FA000
stack
page read and write
1E7B3000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1023000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E7F6000
trusted library allocation
page read and write
1E924000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
2580000
heap
page read and write
400000
unkown
page readonly
1039000
heap
page read and write
1FA06000
trusted library allocation
page read and write
1FF70000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E87B000
trusted library allocation
page read and write
20950000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
79E000
stack
page read and write
1E8E9000
trusted library allocation
page read and write
1E677000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
1E704000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E765000
trusted library allocation
page read and write
1E968000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E89F000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E8F1000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E976000
trusted library allocation
page read and write
3760000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E824000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E85A000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1590000
heap
page read and write
1C1F1000
heap
page read and write
1E808000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F744000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F95C000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
197D061A000
heap
page read and write
1E7F7000
trusted library allocation
page read and write
1E6BB000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
474000
unkown
page readonly
1F715000
trusted library allocation
page read and write
1037000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E928000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA30000
trusted library allocation
page read and write
197D068F000
heap
page read and write
1E91B000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E767000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F957000
trusted library allocation
page read and write
1E7E4000
trusted library allocation
page read and write
1F960000
trusted library allocation
page read and write
1C1F2000
heap
page read and write
5A0000
remote allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
197D05A0000
heap
page read and write
1C1F1000
heap
page read and write
3AC0000
trusted library allocation
page read and write
1E898000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
2DA0000
unclassified section
page readonly
1C1F1000
heap
page read and write
1E670000
trusted library allocation
page read and write
1E9C4000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
20810000
trusted library allocation
page read and write
1E6DE000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
197D066C000
heap
page read and write
1F715000
trusted library allocation
page read and write
197D0649000
heap
page read and write
1822000
trusted library allocation
page execute and read and write
1E641000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C225000
heap
page read and write
1F715000
trusted library allocation
page read and write
FDC000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
FDC000
heap
page read and write
1E6DB000
trusted library allocation
page read and write
1FA37000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E94F000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1FA30000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
94ED2FE000
stack
page read and write
1C1F1000
heap
page read and write
154E000
stack
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1FF70000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E91B000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E925000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E641000
trusted library allocation
page read and write
1E996000
trusted library allocation
page read and write
1FA30000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E87B000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F960000
trusted library allocation
page read and write
2D80000
unkown
page readonly
1C1F1000
heap
page read and write
6FE74000
unkown
page readonly
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
1E676000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
17B0000
heap
page execute and read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E641000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
197D068B000
heap
page read and write
1F715000
trusted library allocation
page read and write
29CF000
stack
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F955000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E956000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
83A000
heap
page read and write
1A60000
trusted library allocation
page read and write
1E8D1000
trusted library allocation
page read and write
1E729000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F956000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
422000
unkown
page read and write
1F715000
trusted library allocation
page read and write
1F920000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F957000
trusted library allocation
page read and write
333E000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E8FB000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
7E0000
remote allocation
page read and write
1F956000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F914000
trusted library allocation
page read and write
14AE000
stack
page read and write
1E9C1000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
750000
remote allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
2D80000
unkown
page readonly
1F715000
trusted library allocation
page read and write
1E9C6000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
40A000
unkown
page read and write
1FA38000
trusted library allocation
page read and write
197D0E70000
trusted library allocation
page read and write
1E89A000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E7CE000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
3B00000
trusted library allocation
page read and write
20670000
trusted library allocation
page read and write
1E98F000
trusted library allocation
page read and write
B9E000
stack
page read and write
178F000
stack
page read and write
2D90000
unkown
page read and write
1CE0000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E8AE000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
FE0000
heap
page read and write
1C1F1000
heap
page read and write
1E672000
trusted library allocation
page read and write
194F000
stack
page read and write
1E818000
trusted library allocation
page read and write
1E8BF000
trusted library allocation
page read and write
1CC0000
trusted library allocation
page read and write
1E8CD000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1023000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E832000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1021000
heap
page read and write
750000
remote allocation
page read and write
1C1F1000
heap
page read and write
7B0000
heap
page read and write
1FA00000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E93B000
trusted library allocation
page read and write
1CE90000
remote allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E779000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA30000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E71F000
trusted library allocation
page read and write
1E7A5000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E9A0000
trusted library allocation
page read and write
1E9E4000
trusted library allocation
page read and write
1CF0000
trusted library allocation
page read and write
1E7E4000
trusted library allocation
page read and write
197D0686000
heap
page read and write
1F950000
trusted library allocation
page read and write
1E904000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
197D0702000
heap
page read and write
1C1F1000
heap
page read and write
1D0000
unclassified section
page readonly
1D580000
trusted library allocation
page read and write
1E786000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
2D80000
unkown
page readonly
1C1F1000
heap
page read and write
401000
unkown
page execute read
1C223000
heap
page read and write
1E7C6000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
1E87F000
trusted library allocation
page read and write
D84000
heap
page read and write
1C1F1000
heap
page read and write
1E672000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1D565000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA30000
trusted library allocation
page read and write
1E709000
trusted library allocation
page read and write
1E949000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
98000
stack
page read and write
1E8CD000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F970000
trusted library allocation
page read and write
1E976000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E756000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
197D04F0000
heap
page read and write
135A000
stack
page read and write
1E715000
trusted library allocation
page read and write
1E924000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
427000
unkown
page read and write
1E641000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F930000
trusted library allocation
page read and write
1E691000
trusted library allocation
page read and write
AF0000
heap
page read and write
1CE90000
remote allocation
page read and write
1F955000
trusted library allocation
page read and write
7E0000
remote allocation
page read and write
1C1F1000
heap
page read and write
1E968000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
5A50000
trusted library allocation
page read and write
1E82D000
trusted library allocation
page read and write
1E920000
trusted library allocation
page read and write
1E723000
trusted library allocation
page read and write
1F956000
trusted library allocation
page read and write
1A52000
trusted library allocation
page execute and read and write
1F715000
trusted library allocation
page read and write
2CC0000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E84D000
trusted library allocation
page read and write
32FE000
stack
page read and write
1C1F1000
heap
page read and write
1D560000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
197D0600000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E660000
trusted library allocation
page read and write
197D1002000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA38000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E832000
trusted library allocation
page read and write
2D2D000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
197D0646000
heap
page read and write
1E641000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
5AE000
stack
page read and write
1E803000
trusted library allocation
page read and write
1E7B7000
trusted library allocation
page read and write
1F910000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
5A20000
trusted library allocation
page read and write
1F956000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1D560000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
3CBD000
stack
page read and write
14EE000
stack
page read and write
1C1F1000
heap
page read and write
197D067E000
heap
page read and write
1F950000
trusted library allocation
page read and write
1FF70000
trusted library allocation
page read and write
1E837000
trusted library allocation
page read and write
94ECE7B000
stack
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1A6B000
trusted library allocation
page execute and read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E884000
trusted library allocation
page read and write
1E757000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E6E3000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1023000
heap
page read and write
1E94D000
trusted library allocation
page read and write
1598000
heap
page read and write
1C1F1000
heap
page read and write
1E8D2000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
197D0621000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
197D0640000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
5A0000
remote allocation
page read and write
125C000
stack
page read and write
1C1F1000
heap
page read and write
5A0000
remote allocation
page read and write
1C1F1000
heap
page read and write
1E93D000
trusted library allocation
page read and write
1E8B2000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
197D0550000
heap
page read and write
1C1F1000
heap
page read and write
1E9A8000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA30000
trusted library allocation
page read and write
20680000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E9BA000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
250F000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1029000
heap
page read and write
59E0000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1029000
heap
page read and write
1F950000
trusted library allocation
page read and write
1E87B000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
2DEE000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E785000
trusted library allocation
page read and write
FE2000
heap
page read and write
1C1F1000
heap
page read and write
30000
heap
page read and write
851000
heap
page read and write
1390000
unclassified section
page readonly
1E7FB000
trusted library allocation
page read and write
408000
unkown
page readonly
1CE90000
remote allocation
page read and write
1F715000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA30000
trusted library allocation
page read and write
1E68D000
trusted library allocation
page read and write
401000
unkown
page execute read
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E762000
trusted library allocation
page read and write
1E641000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
1F910000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E8AA000
trusted library allocation
page read and write
1E85C000
trusted library allocation
page read and write
6FE71000
unkown
page execute read
1C1F1000
heap
page read and write
83E000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1FA20000
trusted library allocation
page read and write
1E8AD000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
197D0590000
unclassified section
page readonly
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
2510000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
2D90000
unkown
page read and write
40A000
unkown
page write copy
1C1F1000
heap
page read and write
1C1F2000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E734000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E6C3000
trusted library allocation
page read and write
1E769000
trusted library allocation
page read and write
1E80D000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
835000
heap
page read and write
1029000
heap
page read and write
1C1F1000
heap
page read and write
FE2000
heap
page read and write
610000
heap
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
825000
heap
page read and write
1C1F1000
heap
page read and write
4F69000
trusted library allocation
page read and write
1E660000
trusted library allocation
page read and write
341F000
stack
page read and write
1C1F1000
heap
page read and write
1E860000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E6DB000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1FA05000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E87F000
trusted library allocation
page read and write
101F000
heap
page read and write
1E87F000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E8FC000
trusted library allocation
page read and write
1E722000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
101F000
heap
page read and write
1E641000
trusted library allocation
page read and write
1E945000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
197D0682000
heap
page read and write
1E8CD000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
7E0000
remote allocation
page read and write
5EE000
stack
page read and write
1E85F000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
9EE000
stack
page read and write
1C1F1000
heap
page read and write
1E8D2000
trusted library allocation
page read and write
1505000
heap
page read and write
1E6B2000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E8D1000
trusted library allocation
page read and write
20950000
trusted library allocation
page read and write
1E7DB000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
1F6B5000
trusted library allocation
page read and write
1E776000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
182C000
trusted library allocation
page execute and read and write
71F000
stack
page read and write
84B000
heap
page read and write
1FA00000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E8AC000
trusted library allocation
page read and write
615000
heap
page read and write
1C1F1000
heap
page read and write
1FA35000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E859000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F940000
trusted library allocation
page read and write
1B00000
heap
page read and write
1F950000
trusted library allocation
page read and write
1E91E000
trusted library allocation
page read and write
FF0000
heap
page read and write
FC7000
heap
page read and write
1FA30000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1840000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E692000
trusted library allocation
page read and write
1E714000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
1D560000
trusted library allocation
page read and write
32BF000
stack
page read and write
1D560000
trusted library allocation
page read and write
1E825000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1FA36000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E961000
trusted library allocation
page read and write
BDE000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E80B000
trusted library allocation
page read and write
C60000
heap
page read and write
1C1F1000
heap
page read and write
FDE000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1A67000
trusted library allocation
page execute and read and write
1C1F1000
heap
page read and write
1E943000
trusted library allocation
page read and write
7F8000
heap
page read and write
1C1F1000
heap
page read and write
1F9F0000
trusted library allocation
page read and write
1E86A000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E8F5000
trusted library allocation
page read and write
596F000
stack
page read and write
1F715000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F6D6000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1A5A000
trusted library allocation
page execute and read and write
1F715000
trusted library allocation
page read and write
1036000
heap
page read and write
1C1F1000
heap
page read and write
1E671000
trusted library allocation
page read and write
1021000
heap
page read and write
1E716000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
6FE70000
unkown
page readonly
1E9C0000
trusted library allocation
page read and write
197D067D000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E68D000
trusted library allocation
page read and write
750000
remote allocation
page read and write
1E6CD000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
1023000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1D560000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E854000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E641000
trusted library allocation
page read and write
1D560000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
81E000
heap
page read and write
59E0000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E712000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
3460000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E766000
trusted library allocation
page read and write
1AFE000
stack
page read and write
1F950000
trusted library allocation
page read and write
3450000
heap
page read and write
1E74D000
trusted library allocation
page read and write
1E789000
trusted library allocation
page read and write
1E96E000
trusted library allocation
page read and write
1F916000
trusted library allocation
page read and write
1E778000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA38000
trusted library allocation
page read and write
1E66E000
trusted library allocation
page read and write
1E8FD000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
AEF000
stack
page read and write
1F715000
trusted library allocation
page read and write
1E6C2000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C21E000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E729000
trusted library allocation
page read and write
FE2000
heap
page read and write
1E6B7000
trusted library allocation
page read and write
1E68F000
trusted library allocation
page read and write
19A000
stack
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
2D70000
unkown
page readonly
7E0000
remote allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
3060000
heap
page read and write
1C1F1000
heap
page read and write
1F968000
trusted library allocation
page read and write
1F950000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
1E916000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1FA30000
trusted library allocation
page read and write
1AAE000
stack
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E6E4000
trusted library allocation
page read and write
1E98C000
trusted library allocation
page read and write
920000
remote allocation
page read and write
1E9CF000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E7E9000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
181A000
trusted library allocation
page execute and read and write
7E0000
remote allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E641000
trusted library allocation
page read and write
1E6C1000
trusted library allocation
page read and write
1E8A4000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1E809000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
103A000
heap
page read and write
2D70000
unkown
page readonly
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1FA17000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
474000
unkown
page readonly
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1E736000
trusted library allocation
page read and write
1E7A9000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E773000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
1FA35000
trusted library allocation
page read and write
1E797000
trusted library allocation
page read and write
1FF70000
trusted library allocation
page read and write
1E997000
trusted library allocation
page read and write
1C222000
heap
page read and write
1C1F1000
heap
page read and write
1E82E000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E641000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
1E9B3000
trusted library allocation
page read and write
1E641000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
400000
unkown
page readonly
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
3BBC000
stack
page read and write
1C1F1000
heap
page read and write
1F950000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1E7BB000
trusted library allocation
page read and write
1E7B9000
trusted library allocation
page read and write
1F715000
trusted library allocation
page read and write
7F0000
heap
page read and write
15C5000
heap
page read and write
94ED1FE000
stack
page read and write
1F747000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
435000
unkown
page read and write
1F715000
trusted library allocation
page read and write
2D90000
unkown
page read and write
1F715000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1F715000
trusted library allocation
page read and write
1356000
stack
page read and write
1E6CA000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1CD0000
trusted library allocation
page execute and read and write
303F000
stack
page read and write
1F715000
trusted library allocation
page read and write
1E70E000
trusted library allocation
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
1C1F1000
heap
page read and write
FDC000
heap
page read and write
There are 1027 hidden memdumps, click here to show them.