IOC Report
CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar

loading gif

Files

File Path
Type
Category
Malicious
CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d83e2.timestamp
ASCII text, with CRLF line terminators
dropped
C:\cmdlinestart.log
ASCII text, with CRLF line terminators
modified
C:\jar\196442737
ASCII text, with CRLF line terminators
dropped
C:\jar\807691
data
dropped
C:\jar\META-INF\MANIFEST.MF
ASCII text, with CRLF line terminators
dropped
C:\jar\dmi\zfn\n.class
compiled Java class data, version 49.0 (Java 1.5)
dropped
C:\jar\dmi\zfn\yz.class
compiled Java class data, version 49.0 (Java 1.5)
dropped
C:\jar\h.class
compiled Java class data, version 51.0 (Java 1.7)
dropped
C:\jar\i.class
compiled Java class data, version 51.0 (Java 1.7)
dropped
C:\jar\jn.class
compiled Java class data, version 49.0 (Java 1.5)
dropped
C:\jar\uy.class
compiled Java class data, version 49.0 (Java 1.5)
dropped
C:\jar\v.class
compiled Java class data, version 49.0 (Java 1.5)
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe
java.exe -jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar" i
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic CPU get ProcessorId
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic bios get serialnumber
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic csproduct get name
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic csproduct get UUID
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c 7za.exe x -y -oC:\jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar"
C:\Windows\System32\7za.exe
7za.exe x -y -oC:\jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c java.exe -jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar" i >> C:\cmdlinestart.log 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ver
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar"" >> C:\cmdlinestart.log 2>&1
C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
"C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar"
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://apache.org/xml/properties/internal/namespace-contextl
unknown
http://apache.org/xml/features/dom/create-entity-ref-nodes
unknown
http://apache.org/xml/features/validation/dynamic
unknown
http://apache.org/xml/features/validation/schema/augment-psvi
unknown
http://java.sun.com/xml/schema/features/
unknown
http://apache.org/xml/properties/internal/validator/dtd
unknown
http://apache.org/xml/properties/input-buffer-size
unknown
http://apache.org/xml/properties/internal/datatype-validator-factory
unknown
http://apache.org/xml/properties/internal/validator/schema
unknown
http://xml.org/sax/features/external-parameter-entitiesCum
unknown
http://apache.org/xml/features/validate-annotations
unknown
http://apache.org/xml/properties/internal/document-scannerCtm
unknown
http://apache.org/xml/features/disallow-doctype-declc?m
unknown
http://apache.org/xml/features/nonvalidating/load-external-dtdStm
unknown
http://apache.org/xml/properties/security-managerSym
unknown
http://apache.org/xml/features/standard-uri-conformant2
unknown
http://xml.org/sax/features/namespace-prefixes
unknown
http://apache.org/xml/properties/internal/entity-manager
unknown
http://apache.org/xml/properties/internal/dtd-processor
unknown
http://apache.org/xml/features/namespace-growth
unknown
http://apache.org/xml/properties/dom/document-class-name$
unknown
http://apache.org/xml/properties/internal/symbol-tableQ
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTDsym
unknown
http://apache.org/xml/features/internal/parser-settings
unknown
http://apache.org/xml/features/dom/include-ignorable-whitespace
unknown
http://java.sun.com/xml/stream/properties/dom/DOA
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD=
unknown
http://apache.org/xml/features/create-cdata-nodes
unknown
http://java.sun.com/xml/dom/properties/
unknown
http://apache.org/xml/properties/internal/stax-entity-resolver
unknown
http://xml.org/sax/features/namespace-prefixes3
unknown
http://apache.org/xml/features/scanner/notify-char-refs3
unknown
http://apache.org/xml/features/3
unknown
http://javax.xml.XMLConstants/feature/secure-processing
unknown
http://apache.org/xml/features/xinclude/fixup-base-uris
unknown
http://apache.org/xml/properties/internal/grammar-pool6
unknown
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation
unknown
http://apache.org/xml/properties/internal/error-reporter
unknown
http://apache.org/xml/properties/internal/namespace-context
unknown
http://apache.org/xml/features/warn-on-duplicate-entitydef
unknown
http://ipinfo.io/ss
unknown
http://ipinfo.io/
unknown
http://javax.xml.XMLConstants/property/accessExternalSchema
unknown
http://xml.org/sax/properties/(
unknown
http://apache.org/xml/features/include-comments
unknown
http://apache.org/xml/features/scanner/notify-char-refs
unknown
http://apache.org/xml/properties/internal/symbol-table3
unknown
http://apache.org/xml/properties/schema/external-schemaLocationS
unknown
http://apache.org/xml/properties/dom/document-class-nameC
unknown
http://apache.org/xml/xmlschema/1.0/anonymousTypesva/lan
unknown
http://java.sun.com/xml/stream/properties/report-cdata-event
unknown
http://java.sun.com/xml/schema/features/report-ignored-element-content-whitespace3
unknown
http://apache.org/xml/features/nonvalidating/load-external-dtd:
unknown
http://java.sun.com/xml/stream/properties/ignore-external-dtd
unknown
http://apache.org/xml/features/scanner/notify-char-refsctm
unknown
http://apache.org/xml/features/continue-after-fatal-error
unknown
http://apache.org/xml/features/create-cdata-nodesw
unknown
http://apache.org/xml/features/standard-uri-conformant
unknown
http://apache.org/xml/properties/internal/document-scanner
unknown
http://apache.org/xml/properties/internal/validation/schema/dv-factory7
unknown
http://xml.org/sax/features/use-entity-resolver2
unknown
http://bugreport.sun.com/bugreport/
unknown
http://apache.org/xml/properties/internal/entity-resolver
unknown
http://java.oracle.com/
unknown
http://apache.org/xml/properties/internal/namespace-binderSvm
unknown
http://apache.org/xml/features/
unknown
http://apache.org/xml/features/generate-synthetic-annotations
unknown
http://xml.org/sax/features/even
unknown
http://java.sun.com/dtd/properties.dtd
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD
unknown
http://apache.org/xml/features/validation/balance-syntax-trees
unknown
http://javax.xml.XMLConstants/property/accessExternalSchema#
unknown
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation?
unknown
http://apache.org/xml/features/include-comments0
unknown
http://apache.org/xml/features/internal/validation/schema/use-grammar-pool-only
unknown
http://apache.org/xml/features/standard-uri-conformantc
unknown
http://apache.org/xml/properties/internal/namespace-binder
unknown
http://javax.xml.XMLConstants/property/accessExternalDTD;
unknown
http://xml.org/sax/features/validation
unknown
http://xml.org/sax/features/validationC
unknown
http://apache.org/xml/properties/internal/stax-entity-resolverS
unknown
http://apache.org/xml/properties/internal/xinclude-handler
unknown
http://apache.org/xml/properties/security-manager
unknown
http://java.sun.com/xml/dom/properties/ancestor-check
unknown
http://ipinfo.io/ipss
unknown
http://java.sun.com/xml/stream/properties/
unknown
http://apache.org/xml/features/validation/schema
unknown
http://apache.org/xml/properties/internal/dtd-scanner
unknown
http://apache.org/xml/properties/internal/xinclude-handlerC
unknown
http://apache.org/xml/properties/schema/external-schemaLocation
unknown
http://xml.org/sax/features/
unknown
http://apache.org/xml/properties/internal/error-handler
unknown
http://apache.org/xml/properties/security-manager#
unknown
http://xml.org/sax/features/namespaces&
unknown
http://apache.org/xml/features/xinclude
unknown
http://java.sun.com/xml/stream/properties/reader-in-defined-stateType;Z)
unknown
http://apache.org/xml/properties/internal/validator/schema3
unknown
http://apache.org/xml/features/validation/schema/element-default
unknown
http://apache.org/xml/features/validation/schema-full-checking
unknown
http://javax.xml.XMLConstants/property/
unknown
There are 90 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
751000
heap
page read and write
23F70E02000
heap
page read and write
23F7097D000
heap
page read and write
BF2AEFF000
unkown
page read and write
23F7004E000
heap
page read and write
2FD0000
heap
page read and write
15E45000
trusted library allocation
page read and write
23F7099F000
heap
page read and write
1649B802000
heap
page read and write
2EB2000
heap
page read and write
23F70995000
heap
page read and write
3E1397D000
stack
page read and write
166F8000
trusted library allocation
page read and write
4E9F000
stack
page read and write
15DB1000
unkown
page read and write
3506000
trusted library allocation
page read and write
786000
heap
page read and write
21C7A300000
heap
page read and write
16743350000
trusted library allocation
page read and write
1FC0A402000
trusted library allocation
page read and write
1673EBE0000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
23F70900000
heap
page read and write
34F9000
heap
page read and write
3020000
heap
page read and write
15E5D000
unkown
page read and write
47D2000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
2FC0000
heap
page read and write
3281E7B000
stack
page read and write
BDFB8DB000
stack
page read and write
155F000
stack
page read and write
21C7A313000
heap
page read and write
1673DC57000
heap
page read and write
3508000
trusted library allocation
page read and write
163CE000
stack
page read and write
1673DC72000
heap
page read and write
78C000
heap
page read and write
16743240000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
301E000
stack
page read and write
2F40000
trusted library allocation
page read and write
487D177000
stack
page read and write
A5C000
stack
page read and write
323F000
stack
page read and write
2E97000
heap
page read and write
8BC000
stack
page read and write
1F86B829000
heap
page read and write
21C7A200000
heap
page read and write
30CD000
trusted library allocation
page read and write
521F000
trusted library allocation
page read and write
2EAA000
heap
page read and write
3130000
trusted library allocation
page execute and read and write
23F70E00000
heap
page read and write
23F70E02000
heap
page read and write
16743400000
heap
page read and write
1FC09D13000
heap
page read and write
2D8D000
stack
page read and write
321F000
stack
page read and write
1380000
heap
page read and write
2E40000
heap
page read and write
2FB0000
heap
page read and write
4E3F000
stack
page read and write
33AC000
heap
page read and write
5525000
trusted library allocation
page read and write
23F709B4000
heap
page read and write
5595000
trusted library allocation
page read and write
8D0000
heap
page read and write
2E50000
trusted library allocation
page read and write
2E62000
heap
page read and write
1CE2B340000
heap
page read and write
34B0000
trusted library allocation
page read and write
1AD00F7000
stack
page read and write
2B8E000
stack
page read and write
4FA8000
trusted library allocation
page read and write
23F70986000
heap
page read and write
23F700B3000
heap
page read and write
16743380000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
15805000
trusted library allocation
page read and write
15E8C000
unkown
page read and write
23F6FE90000
heap
page read and write
23F7097F000
heap
page read and write
30C9000
trusted library allocation
page read and write
1673DC13000
heap
page read and write
1FC09C29000
heap
page read and write
1649B902000
heap
page read and write
3E13D7F000
stack
page read and write
23F70056000
heap
page read and write
2DF0000
trusted library allocation
page read and write
158EE000
stack
page read and write
3511000
trusted library allocation
page read and write
33A9000
heap
page read and write
782000
heap
page read and write
34F3000
heap
page read and write
23F70993000
heap
page read and write
1CE2B3B5000
heap
page read and write
16743250000
trusted library allocation
page read and write
23F7097D000
heap
page read and write
1597E000
stack
page read and write
54D1000
trusted library allocation
page read and write
350A000
trusted library allocation
page read and write
50E000
stack
page read and write
BF2AD7E000
stack
page read and write
756000
heap
page read and write
23F709AA000
heap
page read and write
157E6000
trusted library allocation
page read and write
157CD000
trusted library allocation
page read and write
47D1000
trusted library allocation
page read and write
A7E7000
trusted library allocation
page read and write
A85000
heap
page read and write
1CE2C360000
trusted library allocation
page read and write
1CE2C370000
heap
page readonly
1673E402000
heap
page read and write
2E69000
heap
page read and write
2E50000
trusted library allocation
page read and write
850000
heap
page read and write
2E75000
heap
page read and write
764000
heap
page read and write
1649B83C000
heap
page read and write
6D8000
heap
page read and write
23F709B4000
heap
page read and write
BF2AB77000
stack
page read and write
768000
heap
page read and write
23F6FF90000
trusted library allocation
page read and write
769000
heap
page read and write
2E45000
heap
page read and write
76E000
heap
page read and write
1F86B88B000
heap
page read and write
2EA4000
heap
page read and write
55A0000
trusted library allocation
page read and write
268F80F0000
heap
page read and write
3281D7B000
stack
page read and write
350E000
trusted library allocation
page read and write
1673DC7C000
heap
page read and write
C542078000
stack
page read and write
A70000
trusted library allocation
page read and write
8AD347F000
stack
page read and write
1ACFEFC000
stack
page read and write
23F7096F000
heap
page read and write
1673DA80000
heap
page read and write
4F91000
trusted library allocation
page read and write
1673DA10000
heap
page read and write
4D7E000
stack
page read and write
3030000
trusted library allocation
page read and write
23F70802000
heap
page read and write
56D0000
trusted library allocation
page read and write
772000
heap
page read and write
16743370000
trusted library allocation
page read and write
167434A0000
heap
page read and write
5A0000
heap
page read and write
14CF000
stack
page read and write
47D0000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
1673E415000
heap
page read and write
23F6FE30000
heap
page read and write
21C7A030000
heap
page read and write
23F7099F000
heap
page read and write
327E000
stack
page read and write
154A3000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
34F0000
heap
page read and write
1F86B900000
heap
page read and write
23F700B0000
heap
page read and write
1FC09C7C000
heap
page read and write
1CE2B3BC000
heap
page read and write
77F000
heap
page read and write
2F6C000
heap
page read and write
1F86B902000
heap
page read and write
2E63000
heap
page read and write
16743220000
trusted library allocation
page read and write
21C7A130000
trusted library allocation
page read and write
1F86C202000
trusted library allocation
page read and write
23F7004A000
heap
page read and write
30D1000
trusted library allocation
page read and write
1673E513000
heap
page read and write
2F69000
heap
page read and write
308D000
heap
page read and write
16743080000
trusted library allocation
page read and write
23F70995000
heap
page read and write
BDFBDFB000
stack
page read and write
23F70116000
heap
page read and write
6DC000
heap
page read and write
3510000
trusted library allocation
page read and write
16743244000
trusted library allocation
page read and write
1ACFBDE000
stack
page read and write
15887000
trusted library allocation
page read and write
C54217C000
stack
page read and write
B60000
trusted library allocation
page read and write
3E1437E000
stack
page read and write
BF2AE7A000
stack
page read and write
2E7C000
heap
page read and write
21C7A23C000
heap
page read and write
2FF3000
heap
page read and write
1110000
trusted library allocation
page read and write
15B9E000
stack
page read and write
350F000
trusted library allocation
page read and write
2F60000
heap
page read and write
1120000
heap
page read and write
3240000
heap
page read and write
1F86B880000
heap
page read and write
15743000
trusted library allocation
page read and write
1F86B780000
heap
page read and write
1673DB80000
trusted library allocation
page read and write
1673DCA0000
heap
page read and write
23F7097D000
heap
page read and write
1673DC3C000
heap
page read and write
15883000
trusted library allocation
page read and write
23F709A1000
heap
page read and write
34A9000
trusted library allocation
page read and write
3E13C7B000
stack
page read and write
2F67000
heap
page read and write
A9E000
stack
page read and write
1638E000
trusted library allocation
page read and write
23F707F0000
remote allocation
page read and write
23F709D6000
heap
page read and write
16743220000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
23F7004B000
heap
page read and write
3E13E7F000
stack
page read and write
2E69000
heap
page read and write
3020000
heap
page read and write
23F70916000
heap
page read and write
B50000
heap
page read and write
5542000
trusted library allocation
page read and write
4FD8000
trusted library allocation
page read and write
C5420FE000
stack
page read and write
23F700E2000
heap
page read and write
5301000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
1CE2B3E1000
heap
page read and write
23F700C5000
heap
page read and write
1678E000
stack
page read and write
1673E518000
heap
page read and write
2E7C000
heap
page read and write
2E60000
heap
page read and write
1AD02FF000
stack
page read and write
30D0000
trusted library allocation
page read and write
98F000
stack
page read and write
23F70995000
heap
page read and write
1649C002000
trusted library allocation
page read and write
1593E000
unkown
page read and write
BCC000
stack
page read and write
3070000
heap
page read and write
23F70995000
heap
page read and write
771000
heap
page read and write
16640000
trusted library allocation
page read and write
2FF2000
heap
page read and write
167432F0000
trusted library allocation
page read and write
1CE2C390000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
23F70108000
heap
page read and write
1673DD02000
heap
page read and write
1673ED10000
trusted library section
page readonly
756000
heap
page read and write
4FD1000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
23F70E02000
heap
page read and write
75A000
heap
page read and write
2E40000
heap
page read and write
23F7099F000
heap
page read and write
3E13DFE000
stack
page read and write
1674342B000
heap
page read and write
34FA000
heap
page read and write
161A1000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
16620000
heap
page read and write
4FD8000
trusted library allocation
page read and write
771000
heap
page read and write
72F000
heap
page read and write
15C2E000
stack
page read and write
1F86B85B000
heap
page read and write
167434E7000
heap
page read and write
23F70027000
heap
page read and write
3E1417B000
stack
page read and write
BF2AA77000
stack
page read and write
731000
heap
page read and write
10AE000
stack
page read and write
15DEC000
trusted library allocation
page read and write
2E92000
heap
page read and write
23F709B0000
heap
page read and write
1ACFFFB000
stack
page read and write
2F66000
heap
page read and write
1FC099B0000
heap
page read and write
52FF000
trusted library allocation
page read and write
4EBF000
stack
page read and write
1673DCA7000
heap
page read and write
16743330000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
1641E000
unkown
page read and write
4750000
trusted library allocation
page read and write
FC000
stack
page read and write
4E7E000
stack
page read and write
1CE2B540000
heap
page read and write
23F700EA000
heap
page read and write
3172000
trusted library allocation
page execute and read and write
268F8435000
heap
page read and write
21C7A256000
heap
page read and write
6BE000
stack
page read and write
4F98000
trusted library allocation
page read and write
2F62000
heap
page read and write
2BE0000
trusted library allocation
page read and write
9FE000
stack
page read and write
1575B000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
23F70918000
heap
page read and write
167434D7000
heap
page read and write
3247000
heap
page read and write
1CE2B3BC000
heap
page read and write
3281F7B000
stack
page read and write
71F000
stack
page read and write
1CE2B565000
heap
page read and write
1F86B864000
heap
page read and write
1CE2C380000
trusted library allocation
page read and write
4DBF000
stack
page read and write
23F7096D000
heap
page read and write
16743264000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
23F70995000
heap
page read and write
16743110000
trusted library allocation
page read and write
1F86B800000
heap
page read and write
771000
heap
page read and write
153F000
stack
page read and write
23F70050000
heap
page read and write
23F70986000
heap
page read and write
4F98000
trusted library allocation
page read and write
2F5E000
stack
page read and write
2DE0000
trusted library allocation
page read and write
16743260000
trusted library allocation
page read and write
1F86B802000
heap
page read and write
2E63000
trusted library allocation
page read and write
BDFC0FF000
stack
page read and write
8AD313C000
stack
page read and write
34F6000
heap
page read and write
1DE000
stack
page read and write
3E13878000
stack
page read and write
1FC09C7C000
heap
page read and write
12E0000
heap
page read and write
1673ECF0000
trusted library section
page readonly
1ACFADB000
stack
page read and write
23F70999000
heap
page read and write
564F000
trusted library allocation
page read and write
23F7096D000
heap
page read and write
5A5000
heap
page read and write
268F8202000
heap
page read and write
16743228000
trusted library allocation
page read and write
3E13FFE000
stack
page read and write
10EE000
stack
page read and write
A0A000
heap
page read and write
34B0000
trusted library allocation
page read and write
1248000
heap
page read and write
268F8430000
heap
page read and write
350D000
trusted library allocation
page read and write
BF2A57C000
stack
page read and write
21C7A27B000
heap
page read and write
F5C000
stack
page read and write
23F70995000
heap
page read and write
56A3000
trusted library allocation
page read and write
21C7A24E000
heap
page read and write
1649B813000
heap
page read and write
15E49000
unkown
page read and write
300A000
heap
page read and write
33AA000
heap
page read and write
1AD01FF000
stack
page read and write
1649B6F0000
heap
page read and write
2FB5000
heap
page read and write
1FC09D02000
heap
page read and write
33A3000
heap
page read and write
23F7097D000
heap
page read and write
2FD1000
heap
page read and write
487CB1E000
stack
page read and write
2E63000
heap
page read and write
23F7097D000
heap
page read and write
2F70000
trusted library allocation
page read and write
C541EFF000
stack
page read and write
33A2000
heap
page read and write
34A6000
trusted library allocation
page read and write
1CE2C120000
trusted library allocation
page read and write
34F7000
heap
page read and write
268F821F000
heap
page read and write
23F6FE20000
heap
page read and write
5234000
trusted library allocation
page read and write
762000
heap
page read and write
1FC09B20000
trusted library allocation
page read and write
16743340000
trusted library allocation
page read and write
1649B84D000
heap
page read and write
23F70E02000
heap
page read and write
54E000
stack
page read and write
2E55000
trusted library allocation
page read and write
2F63000
heap
page read and write
4E5E000
stack
page read and write
2E68000
heap
page read and write
2E97000
heap
page read and write
23F700F8000
heap
page read and write
23F707F0000
remote allocation
page read and write
159CF000
unkown
page read and write
137E000
stack
page read and write
A00000
heap
page read and write
3182000
trusted library allocation
page execute and read and write
157F5000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
268F8202000
heap
page read and write
30B8000
trusted library allocation
page read and write
3E1407F000
stack
page read and write
1574C000
trusted library allocation
page read and write
6D0000
heap
page read and write
302C000
heap
page read and write
15D0E000
unkown
page read and write
2E93000
heap
page read and write
C541FF9000
stack
page read and write
1CE2B370000
heap
page read and write
47D5000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
1CE2B3BF000
heap
page read and write
1673DC27000
heap
page read and write
570B000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
76C000
heap
page read and write
2F90000
heap
page read and write
76C000
heap
page read and write
31FE000
stack
page read and write
2FCE000
heap
page read and write
268F8205000
heap
page read and write
5224000
trusted library allocation
page read and write
759000
heap
page read and write
1CE2B569000
heap
page read and write
167434B3000
heap
page read and write
31D3000
trusted library allocation
page execute and read and write
16743100000
trusted library allocation
page read and write
268F8226000
heap
page read and write
1673E500000
heap
page read and write
EA0000
heap
page read and write
268F820F000
heap
page read and write
F0D000
stack
page read and write
5307000
trusted library allocation
page read and write
23F70999000
heap
page read and write
23F707F0000
remote allocation
page read and write
1674340D000
heap
page read and write
A6E000
stack
page read and write
C541F7F000
stack
page read and write
1FC09D00000
heap
page read and write
1CE2B2E0000
trusted library allocation
page read and write
1CE2B560000
heap
page read and write
34B1000
trusted library allocation
page read and write
21C7AA02000
trusted library allocation
page read and write
98C000
stack
page read and write
2B4F000
stack
page read and write
A760000
trusted library allocation
page read and write
23F700BE000
heap
page read and write
23F700A9000
heap
page read and write
34A9000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
1649B828000
heap
page read and write
753000
heap
page read and write
1673ECD0000
trusted library section
page readonly
487D07F000
stack
page read and write
16624000
heap
page read and write
3380000
heap
page read and write
23F7098F000
heap
page read and write
1FC09C5F000
heap
page read and write
1FC09D08000
heap
page read and write
23F70102000
heap
page read and write
1FC09C88000
heap
page read and write
2E9B000
heap
page read and write
5544000
trusted library allocation
page read and write
31C4000
trusted library allocation
page execute and read and write
72E000
heap
page read and write
350A000
trusted library allocation
page read and write
301E000
stack
page read and write
2E6E000
heap
page read and write
23F709B1000
heap
page read and write
1674344B000
heap
page read and write
15E67000
trusted library allocation
page read and write
23F7096D000
heap
page read and write
306E000
stack
page read and write
1674322E000
trusted library allocation
page read and write
16743241000
trusted library allocation
page read and write
23F70E02000
heap
page read and write
2E3F000
heap
page read and write
158A1000
trusted library allocation
page read and write
308C000
heap
page read and write
34C0000
heap
page read and write
138B000
heap
page read and write
23F70997000
heap
page read and write
4E50000
heap
page read and write
2EF0000
trusted library allocation
page read and write
3003000
heap
page read and write
487D27E000
stack
page read and write
2EAC000
heap
page read and write
1673E400000
heap
page read and write
15448000
trusted library allocation
page read and write
21C7A290000
heap
page read and write
534F000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
3002000
heap
page read and write
2E20000
heap
page read and write
167434EA000
heap
page read and write
487CA9C000
stack
page read and write
1FC09C5C000
heap
page read and write
1CE2C110000
trusted library allocation
page read and write
A6E000
stack
page read and write
1FC09C7F000
heap
page read and write
1E0000
trusted library allocation
page read and write
75A000
heap
page read and write
268F81F2000
heap
page read and write
3190000
trusted library allocation
page read and write
268F81F7000
heap
page read and write
2E9C000
heap
page read and write
34A5000
trusted library allocation
page read and write
16743502000
heap
page read and write
90000
heap
page read and write
16743090000
trusted library allocation
page read and write
21C7A253000
heap
page read and write
2D20000
heap
page read and write
316A000
trusted library allocation
page execute and read and write
3132000
trusted library allocation
page execute and read and write
1649B800000
heap
page read and write
23F70E19000
heap
page read and write
52D5000
trusted library allocation
page read and write
23F70E03000
heap
page read and write
34AD000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
58F000
stack
page read and write
520D000
trusted library allocation
page read and write
23F70E02000
heap
page read and write
2FFB000
heap
page read and write
268F81F6000
heap
page read and write
167434FE000
heap
page read and write
21C7A286000
heap
page read and write
16743380000
remote allocation
page read and write
268F81EB000
heap
page read and write
BDFB9DE000
stack
page read and write
16743462000
heap
page read and write
1CE2B2D0000
heap
page read and write
1673ECE0000
trusted library section
page readonly
52DE000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
62E000
stack
page read and write
2E54000
heap
page read and write
33A6000
heap
page read and write
34AE000
trusted library allocation
page read and write
A1E000
stack
page read and write
2E10000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
268F8224000
heap
page read and write
23F70070000
heap
page read and write
1580E000
trusted library allocation
page read and write
268F8208000
heap
page read and write
32AD000
heap
page read and write
15DA9000
trusted library allocation
page read and write
23F700A2000
heap
page read and write
21C7A213000
heap
page read and write
1F86B7B0000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
1649B7F0000
trusted library allocation
page read and write
15F0000
heap
page read and write
3013000
heap
page read and write
3025000
heap
page read and write
1673DC29000
heap
page read and write
30CB000
trusted library allocation
page read and write
305F000
stack
page read and write
23F7097D000
heap
page read and write
23F7097E000
heap
page read and write
23F7003C000
heap
page read and write
1633B000
trusted library allocation
page read and write
23F70975000
heap
page read and write
23F70995000
heap
page read and write
1F86B863000
heap
page read and write
BDFBFFF000
stack
page read and write
3504000
trusted library allocation
page read and write
1FC09C68000
heap
page read and write
2F95000
heap
page read and write
3509000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
33A0000
heap
page read and write
2EAE000
heap
page read and write
2E6D000
heap
page read and write
A02000
heap
page read and write
1673ECC0000
trusted library section
page readonly
1673DC7A000
heap
page read and write
21C7A24B000
heap
page read and write
157CD000
trusted library allocation
page read and write
1F86B83C000
heap
page read and write
1CE2B381000
heap
page read and write
268F8221000
heap
page read and write
268F820F000
heap
page read and write
487D37E000
stack
page read and write
23F709D6000
heap
page read and write
77F000
heap
page read and write
23F70E02000
heap
page read and write
1649B913000
heap
page read and write
268F820F000
heap
page read and write
23F7097D000
heap
page read and write
317A000
trusted library allocation
page execute and read and write
1649B864000
heap
page read and write
1590000
trusted library allocation
page read and write
1566B000
trusted library allocation
page read and write
16743360000
trusted library allocation
page read and write
8AD31BD000
stack
page read and write
A7FA000
trusted library allocation
page read and write
2DCC000
stack
page read and write
23F709A0000
heap
page read and write
23F709B1000
heap
page read and write
4FA8000
trusted library allocation
page read and write
23F70049000
heap
page read and write
34A4000
trusted library allocation
page read and write
15C7E000
unkown
page read and write
23F70986000
heap
page read and write
1649B680000
heap
page read and write
1FC09C27000
heap
page read and write
1582E000
trusted library allocation
page read and write
23F70113000
heap
page read and write
23F709C2000
heap
page read and write
23F70986000
heap
page read and write
2E71000
heap
page read and write
8AD35FE000
stack
page read and write
30C9000
trusted library allocation
page read and write
4EC0000
heap
page read and write
2BE0000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
150E000
stack
page read and write
1649B690000
heap
page read and write
55FB000
trusted library allocation
page read and write
167434FE000
heap
page read and write
3088000
heap
page read and write
1577F000
trusted library allocation
page read and write
1FC09C13000
heap
page read and write
23F70013000
heap
page read and write
34AA000
trusted library allocation
page read and write
4FD4000
trusted library allocation
page read and write
32AC000
heap
page read and write
23F709A0000
heap
page read and write
34FA000
heap
page read and write
A80000
heap
page read and write
2E3E000
stack
page read and write
23F709E4000
heap
page read and write
A03000
heap
page read and write
23F7098F000
heap
page read and write
157C6000
trusted library allocation
page read and write
BF2AC79000
stack
page read and write
122F000
stack
page read and write
1673DC00000
heap
page read and write
23F70051000
heap
page read and write
9C8000
stack
page read and write
2E8D000
heap
page read and write
2E69000
heap
page read and write
328207F000
stack
page read and write
3500000
trusted library allocation
page read and write
16743250000
trusted library allocation
page read and write
21C7A22A000
heap
page read and write
34FC000
heap
page read and write
2E7B000
heap
page read and write
30CF000
trusted library allocation
page read and write
23F7096F000
heap
page read and write
8AD357A000
stack
page read and write
A70000
trusted library allocation
page read and write
2E65000
heap
page read and write
16743380000
remote allocation
page read and write
21C79FC0000
heap
page read and write
2E97000
heap
page read and write
23F70E20000
heap
page read and write
23F7099D000
heap
page read and write
1FC09C61000
heap
page read and write
3E13CFF000
stack
page read and write
23F70000000
heap
page read and write
55B2000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
1F86B710000
heap
page read and write
133E000
stack
page read and write
23F70986000
heap
page read and write
8AD367E000
stack
page read and write
23F70987000
heap
page read and write
33A7000
heap
page read and write
3E13B7F000
stack
page read and write
1FC09C64000
heap
page read and write
1674342D000
heap
page read and write
4FD0000
trusted library allocation
page read and write
302D000
heap
page read and write
21C7A308000
heap
page read and write
EFC000
stack
page read and write
30DB000
trusted library allocation
page read and write
768000
heap
page read and write
47D9000
trusted library allocation
page read and write
1CE2B570000
trusted library allocation
page read and write
93C000
stack
page read and write
268F8203000
heap
page read and write
1640000
heap
page read and write
5577000
trusted library allocation
page read and write
4F80000
heap
page read and write
167DF000
unkown
page read and write
23F7099E000
heap
page read and write
15E4D000
trusted library allocation
page read and write
16744000000
heap
page read and write
1FC09C00000
heap
page read and write
15CBE000
stack
page read and write
23F70E44000
heap
page read and write
34F7000
heap
page read and write
31CB000
trusted library allocation
page execute and read and write
1FC09C3C000
heap
page read and write
2F5E000
stack
page read and write
1CE2C0A0000
trusted library allocation
page read and write
1630000
unkown
page read and write
920000
heap
page read and write
2E54000
heap
page read and write
1673DC77000
heap
page read and write
1649B900000
heap
page read and write
5349000
trusted library allocation
page read and write
15200000
trusted library allocation
page read and write
167434E9000
heap
page read and write
23F7099F000
heap
page read and write
167434DE000
heap
page read and write
5610000
trusted library allocation
page read and write
2E6D000
heap
page read and write
4FD8000
trusted library allocation
page read and write
268F7FA0000
heap
page read and write
268F8201000
heap
page read and write
2E5D000
trusted library allocation
page read and write
157AE000
trusted library allocation
page read and write
55FF000
trusted library allocation
page read and write
23F70048000
heap
page read and write
268F80D0000
heap
page read and write
A750000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
3281A7C000
stack
page read and write
784000
heap
page read and write
2E9C000
heap
page read and write
8F8000
stack
page read and write
2E79000
heap
page read and write
4F20000
trusted library allocation
page read and write
21C7A251000
heap
page read and write
2EA7000
heap
page read and write
157FE000
trusted library allocation
page read and write
23F70E02000
heap
page read and write
4730000
heap
page read and write
23F70997000
heap
page read and write
4DFE000
stack
page read and write
2E7C000
heap
page read and write
21C7A302000
heap
page read and write
3013000
heap
page read and write
761000
heap
page read and write
30D2000
trusted library allocation
page read and write
1FC09C55000
heap
page read and write
23F70029000
heap
page read and write
23F70986000
heap
page read and write
30D0000
trusted library allocation
page read and write
23F709C3000
heap
page read and write
3080000
heap
page read and write
316E000
trusted library allocation
page execute and read and write
23F70047000
heap
page read and write
756000
heap
page read and write
2E6A000
heap
page read and write
720000
heap
page read and write
4DCF000
stack
page read and write
23F7099F000
heap
page read and write
23F7008A000
heap
page read and write
2E52000
heap
page read and write
1673DCFE000
heap
page read and write
1673DB90000
trusted library section
page read and write
1F86B913000
heap
page read and write
23F7004D000
heap
page read and write
15E1C000
trusted library allocation
page read and write
1673ED00000
trusted library section
page readonly
4E1F000
stack
page read and write
34FA000
heap
page read and write
2E67000
heap
page read and write
1F86B868000
heap
page read and write
784000
heap
page read and write
138000
stack
page read and write
1673F061000
trusted library allocation
page read and write
21C79FD0000
heap
page read and write
4DDE000
stack
page read and write
318F000
stack
page read and write
34A8000
trusted library allocation
page read and write
A78F000
trusted library allocation
page read and write
21C7A28E000
heap
page read and write
1649B879000
heap
page read and write
3003000
heap
page read and write
2E71000
heap
page read and write
23F7091F000
heap
page read and write
23F70E03000
heap
page read and write
300A000
heap
page read and write
1FC09C8E000
heap
page read and write
3E13A7A000
stack
page read and write
1CE2C3E0000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
BDFB95E000
stack
page read and write
30C8000
trusted library allocation
page read and write
1F86B813000
heap
page read and write
300C000
heap
page read and write
731000
heap
page read and write
52FD000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
1673DC94000
heap
page read and write
1673F080000
trusted library allocation
page read and write
1673DC90000
heap
page read and write
5608000
trusted library allocation
page read and write
23F7097E000
heap
page read and write
9B0000
heap
page read and write
56EB000
trusted library allocation
page read and write
23F7096F000
heap
page read and write
1F86B720000
heap
page read and write
2BCF000
stack
page read and write
143E000
stack
page read and write
167434EB000
heap
page read and write
3E13F7A000
stack
page read and write
52D3000
trusted library allocation
page read and write
23F700EB000
heap
page read and write
728000
heap
page read and write
1ACFB5F000
stack
page read and write
A7F3000
trusted library allocation
page read and write
8AD34F9000
stack
page read and write
1673E518000
heap
page read and write
1673E502000
heap
page read and write
A09000
heap
page read and write
560B000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
23F7099C000
heap
page read and write
1AD03FA000
stack
page read and write
A767000
trusted library allocation
page read and write
487CB9E000
stack
page read and write
3508000
trusted library allocation
page read and write
268F8202000
heap
page read and write
32A0000
heap
page read and write
16290000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
23F70995000
heap
page read and write
4FA1000
trusted library allocation
page read and write
32A8000
heap
page read and write
630000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
31DE000
stack
page read and write
106E000
stack
page read and write
2E61000
trusted library allocation
page read and write
166F0000
trusted library allocation
page read and write
BF2A87E000
stack
page read and write
1CE2C0B0000
trusted library allocation
page read and write
A4F000
stack
page read and write
2FD1000
heap
page read and write
23F70986000
heap
page read and write
2E5A000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
2E28000
heap
page read and write
4FA4000
trusted library allocation
page read and write
23F70964000
heap
page read and write
34B0000
trusted library allocation
page read and write
978000
stack
page read and write
1610000
heap
page read and write
167434AA000
heap
page read and write
C541E7A000
stack
page read and write
1F86B85E000
heap
page read and write
2FFA000
heap
page read and write
A07000
heap
page read and write
1FC099C0000
heap
page read and write
300F000
heap
page read and write
762000
heap
page read and write
23F70995000
heap
page read and write
23F70950000
heap
page read and write
1673DA20000
heap
page read and write
34AA000
trusted library allocation
page read and write
21C7A272000
heap
page read and write
34F3000
heap
page read and write
4F50000
trusted library allocation
page read and write
15DA0000
unkown
page read and write
166D0000
trusted library allocation
page read and write
15BEF000
unkown
page read and write
16650000
trusted library allocation
page read and write
FFE000
stack
page read and write
1F86B908000
heap
page read and write
2FDE000
stack
page read and write
1FC09C5E000
heap
page read and write
3257000
heap
page read and write
2FAF000
stack
page read and write
4F90000
trusted library allocation
page read and write
BF2A5FE000
stack
page read and write
47D9000
trusted library allocation
page read and write
1673DC8E000
heap
page read and write
BDFBCFC000
stack
page read and write
487CFFB000
stack
page read and write
23F70054000
heap
page read and write
BDFBEF7000
stack
page read and write
23F709B0000
heap
page read and write
3028000
heap
page read and write
5546000
trusted library allocation
page read and write
76E000
heap
page read and write
15796000
trusted library allocation
page read and write
23F709B0000
heap
page read and write
2E5E000
trusted library allocation
page read and write
2E2E000
heap
page read and write
34A7000
trusted library allocation
page read and write
6DD000
heap
page read and write
268F81E0000
heap
page read and write
2F6A000
heap
page read and write
156B0000
trusted library allocation
page read and write
2E31000
heap
page read and write
34F0000
heap
page read and write
1CE2B378000
heap
page read and write
1240000
heap
page read and write
A06000
heap
page read and write
1CE2B3BD000
heap
page read and write
1FC09A20000
heap
page read and write
5EE000
stack
page read and write
5200000
trusted library allocation
page read and write
12E5000
heap
page read and write
34A6000
trusted library allocation
page read and write
784000
heap
page read and write
2E6D000
heap
page read and write
30CB000
trusted library allocation
page read and write
5347000
trusted library allocation
page read and write
2E53000
heap
page read and write
2E8E000
heap
page read and write
268F8207000
heap
page read and write
3E1367B000
stack
page read and write
2E6F000
heap
page read and write
23F7099D000
heap
page read and write
30DB000
trusted library allocation
page read and write
23F70053000
heap
page read and write
1673DD13000
heap
page read and write
47D9000
trusted library allocation
page read and write
16743380000
remote allocation
page read and write
34F2000
heap
page read and write
23F7094A000
heap
page read and write
1674343E000
heap
page read and write
16743500000
heap
page read and write
2FC8000
heap
page read and write
94E000
stack
page read and write
4F94000
trusted library allocation
page read and write
23F7099F000
heap
page read and write
There are 923 hidden memdumps, click here to show them.