IOC Report
w74ALjpS5h.exe

loading gif

Files

File Path
Type
Category
Malicious
w74ALjpS5h.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:27 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\w74ALjpS5h.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\TmpAD84.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpADD3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5zgmnrk.4nl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uey0ou21.kdq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\w74ALjpS5h.exe
"C:\Users\user\Desktop\w74ALjpS5h.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\w74ALjpS5h.exe' -Force
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
109.120.178.235:26632
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://185.164.163.18
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://tempuri.org/Entity/Id12ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
https://github.com/mgravell/protobuf-net
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://ns.ao
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
109.120.178.235
unknown
Russian Federation
malicious
185.164.163.18
unknown
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\w74ALjpS5h_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
6A71000
trusted library allocation
page read and write
malicious
2997000
trusted library allocation
page read and write
malicious
6B89000
trusted library allocation
page read and write
malicious
2938000
trusted library allocation
page read and write
malicious
6DD6000
trusted library allocation
page read and write
malicious
6090000
trusted library section
page read and write
malicious
36C8000
trusted library allocation
page read and write
malicious
3F2E000
trusted library allocation
page read and write
malicious
5BA0000
trusted library section
page read and write
malicious
2D38000
trusted library allocation
page read and write
2788000
trusted library allocation
page read and write
3204000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
5600000
trusted library allocation
page read and write
2915000
trusted library allocation
page read and write
638B000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
3E4A000
trusted library allocation
page read and write
71C7000
heap
page read and write
3D05000
trusted library allocation
page read and write
7163000
heap
page read and write
8650000
heap
page read and write
3CA4000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
2D17000
stack
page read and write
5397000
heap
page read and write
4E1B000
trusted library allocation
page read and write
75EE000
stack
page read and write
B47000
heap
page read and write
274C000
trusted library allocation
page read and write
3914000
trusted library allocation
page read and write
3AFE000
trusted library allocation
page read and write
78D0000
heap
page read and write
7921000
heap
page read and write
6361000
trusted library allocation
page read and write
59A2000
heap
page read and write
716E000
stack
page read and write
2720000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
735000
heap
page read and write
3DD8000
trusted library allocation
page read and write
3903000
trusted library allocation
page read and write
7246000
heap
page read and write
990000
heap
page read and write
5CAE000
stack
page read and write
4C7E000
stack
page read and write
5350000
trusted library allocation
page read and write
771E000
stack
page read and write
399D000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
71E7000
heap
page read and write
2A80000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
3AC4000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
78BC000
heap
page read and write
3050000
trusted library allocation
page read and write
67BE000
stack
page read and write
635E000
trusted library allocation
page read and write
2737000
trusted library allocation
page execute and read and write
7960000
trusted library allocation
page execute and read and write
5BAD000
heap
page read and write
27B0000
trusted library allocation
page read and write
2F7C000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
7210000
heap
page read and write
51DE000
stack
page read and write
70A8000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
7B00000
trusted library allocation
page read and write
2726000
trusted library allocation
page execute and read and write
270D000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
28EE000
stack
page read and write
C2D000
trusted library allocation
page execute and read and write
33B0000
heap
page read and write
AB0000
heap
page read and write
3378000
heap
page read and write
75AE000
stack
page read and write
810000
heap
page read and write
2D1D000
stack
page read and write
3CD9000
trusted library allocation
page read and write
291B000
trusted library allocation
page read and write
6385000
trusted library allocation
page read and write
28DF000
trusted library allocation
page read and write
3D17000
trusted library allocation
page read and write
79A4000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
4C3F000
stack
page read and write
2EFB000
trusted library allocation
page read and write
2BA6000
trusted library allocation
page read and write
3DE9000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
3AA8000
trusted library allocation
page read and write
5BBA000
heap
page read and write
3B25000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
4E1E000
stack
page read and write
2E94000
trusted library allocation
page read and write
31A0000
heap
page read and write
712F000
stack
page read and write
2750000
trusted library allocation
page read and write
5920000
heap
page read and write
2790000
trusted library allocation
page read and write
3C9D000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
2C7A000
trusted library allocation
page read and write
7180000
heap
page read and write
7174000
heap
page read and write
6F7000
stack
page read and write
7468000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
3257000
heap
page read and write
2703000
trusted library allocation
page execute and read and write
71AF000
stack
page read and write
85A0000
trusted library allocation
page read and write
2735000
trusted library allocation
page execute and read and write
391F000
trusted library allocation
page read and write
4C2C000
stack
page read and write
6370000
trusted library allocation
page read and write
7A2E000
stack
page read and write
292A000
trusted library allocation
page read and write
7884000
heap
page read and write
7879000
heap
page read and write
28DD000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
5C3A000
heap
page read and write
60AE000
stack
page read and write
273B000
trusted library allocation
page execute and read and write
5C43000
heap
page read and write
3E3D000
trusted library allocation
page read and write
6305000
trusted library allocation
page read and write
4F06000
trusted library allocation
page read and write
39E3000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
2733000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page execute and read and write
3A66000
trusted library allocation
page read and write
3DF3000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
3310000
heap
page read and write
2CED000
trusted library allocation
page read and write
5381000
heap
page read and write
278C000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
3E47000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
2747000
trusted library allocation
page read and write
7A4E000
stack
page read and write
7B10000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
3AB5000
trusted library allocation
page read and write
291E000
trusted library allocation
page read and write
35D7000
heap
page read and write
5C53000
heap
page read and write
2C6F000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
322000
unkown
page readonly
2E85000
trusted library allocation
page read and write
3A7F000
trusted library allocation
page read and write
3AEA000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
747F000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
39FB000
trusted library allocation
page read and write
3988000
trusted library allocation
page read and write
61AE000
stack
page read and write
3008000
trusted library allocation
page read and write
7150000
heap
page read and write
2CDC000
stack
page read and write
314E000
stack
page read and write
790B000
heap
page read and write
4CC0000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
2A56000
trusted library allocation
page read and write
28CC000
trusted library allocation
page read and write
3DCC000
trusted library allocation
page read and write
39D6000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
78FA000
heap
page read and write
2730000
trusted library allocation
page read and write
8F6000
heap
page read and write
2B2C000
trusted library allocation
page read and write
7AAE000
stack
page read and write
2732000
trusted library allocation
page read and write
71CB000
heap
page read and write
C42000
trusted library allocation
page read and write
721D000
heap
page read and write
4CBD000
stack
page read and write
7140000
heap
page read and write
7475000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
8590000
trusted library allocation
page execute and read and write
7201000
heap
page read and write
3CB1000
trusted library allocation
page read and write
3A28000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
31E0000
heap
page read and write
3A54000
trusted library allocation
page read and write
638E000
trusted library allocation
page read and write
2500000
heap
page execute and read and write
2DE0000
heap
page read and write
310F000
unkown
page read and write
B3E000
unkown
page read and write
8F9000
heap
page read and write
3AEF000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
7850000
heap
page read and write
39E0000
trusted library allocation
page read and write
71BA000
heap
page read and write
7820000
heap
page execute and read and write
3AC1000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
3A2B000
trusted library allocation
page read and write
706D000
stack
page read and write
BB0000
heap
page read and write
272A000
trusted library allocation
page execute and read and write
55C0000
trusted library allocation
page execute and read and write
26F0000
trusted library allocation
page read and write
791E000
heap
page read and write
7452000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
71B6000
heap
page read and write
3A95000
trusted library allocation
page read and write
6E82000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
B41000
heap
page read and write
4CBE000
stack
page read and write
2EEB000
trusted library allocation
page read and write
3A36000
trusted library allocation
page read and write
3A10000
trusted library allocation
page read and write
5970000
heap
page read and write
3A82000
trusted library allocation
page read and write
3E01000
trusted library allocation
page read and write
3E0D000
trusted library allocation
page read and write
8250000
heap
page read and write
4E70000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
4D2F000
stack
page read and write
C4B000
trusted library allocation
page execute and read and write
2CBB000
trusted library allocation
page read and write
6430000
trusted library allocation
page execute and read and write
2BF9000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
521D000
stack
page read and write
3A1E000
trusted library allocation
page read and write
6346000
trusted library allocation
page read and write
4ACB000
stack
page read and write
303E000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
882000
heap
page read and write
70D0000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
3E4D000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
3943000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
26BF000
stack
page read and write
70A5000
trusted library allocation
page read and write
292E000
trusted library allocation
page read and write
6307000
trusted library allocation
page read and write
3A4F000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
3CF1000
trusted library allocation
page read and write
3232000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
6FA000
stack
page read and write
57BE000
stack
page read and write
2ADE000
trusted library allocation
page read and write
5B9E000
stack
page read and write
3A8A000
trusted library allocation
page read and write
3AA3000
trusted library allocation
page read and write
7ACD000
stack
page read and write
750D000
stack
page read and write
3DD1000
trusted library allocation
page read and write
3250000
heap
page read and write
31E5000
heap
page read and write
C47000
trusted library allocation
page execute and read and write
3ADA000
trusted library allocation
page read and write
5B99000
heap
page read and write
278A000
trusted library allocation
page read and write
692B000
stack
page read and write
5A2E000
trusted library allocation
page read and write
28EC000
trusted library allocation
page read and write
27A1000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
74B0000
trusted library allocation
page execute and read and write
769F000
stack
page read and write
4EA0000
trusted library allocation
page read and write
6610000
trusted library allocation
page execute and read and write
5A20000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
54AE000
stack
page read and write
2E11000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
3CFE000
trusted library allocation
page read and write
3B12000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
880000
heap
page read and write
860D000
stack
page read and write
4E80000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
6150000
trusted library allocation
page execute and read and write
2CA1000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
3DB9000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
25B0000
heap
page read and write
5C24000
heap
page read and write
8285000
heap
page read and write
3A6D000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
2772000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
48F8000
trusted library allocation
page read and write
3E2C000
trusted library allocation
page read and write
2905000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
4B3E000
stack
page read and write
5670000
trusted library allocation
page read and write
633B000
trusted library allocation
page read and write
6200000
trusted library allocation
page execute and read and write
5620000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page execute and read and write
6380000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
BE5000
heap
page read and write
7225000
heap
page execute and read and write
B6E000
heap
page read and write
BE0000
heap
page read and write
5170000
heap
page execute and read and write
39F8000
trusted library allocation
page read and write
755F000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
3049000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
5E2E000
stack
page read and write
677C000
stack
page read and write
78B2000
heap
page read and write
3B1F000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
3DC6000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
3E6E000
trusted library allocation
page read and write
BC6000
heap
page read and write
2928000
trusted library allocation
page read and write
2468000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
3CBF000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
5360000
heap
page read and write
2F03000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
2756000
trusted library allocation
page read and write
28F1000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
3C98000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
72AB000
stack
page read and write
320000
unkown
page readonly
6341000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
78F6000
heap
page read and write
73EE000
stack
page read and write
336F000
heap
page read and write
6352000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
C13000
trusted library allocation
page execute and read and write
28E1000
trusted library allocation
page read and write
3DF6000
trusted library allocation
page read and write
27AC000
trusted library allocation
page read and write
28F8000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
E0E000
stack
page read and write
292C000
trusted library allocation
page read and write
2735000
trusted library allocation
page read and write
4D6E000
stack
page read and write
5C29000
heap
page read and write
3B18000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
3AAE000
trusted library allocation
page read and write
4C6E000
stack
page read and write
2917000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
27A3000
trusted library allocation
page read and write
4E31000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
392A000
trusted library allocation
page read and write
38FF000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
270D000
trusted library allocation
page execute and read and write
5B6E000
stack
page read and write
39C5000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
3CAA000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
C14000
trusted library allocation
page read and write
746A000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
3A5A000
trusted library allocation
page read and write
55BF000
unkown
page read and write
533E000
stack
page read and write
2F76000
trusted library allocation
page read and write
3CEC000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
A00000
trusted library section
page read and write
28FE000
trusted library allocation
page read and write
3A13000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
7560000
trusted library allocation
page execute and read and write
7F010000
trusted library allocation
page execute and read and write
3E20000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
9C0000
heap
page read and write
4EAE000
trusted library allocation
page read and write
3DDE000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
747A000
trusted library allocation
page read and write
71AE000
heap
page read and write
62FA000
trusted library allocation
page read and write
2770000
heap
page execute and read and write
49CB000
stack
page read and write
B5D000
heap
page read and write
864F000
stack
page read and write
7360000
heap
page read and write
62F8000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
716C000
heap
page read and write
2704000
trusted library allocation
page read and write
78B6000
heap
page read and write
277C000
trusted library allocation
page read and write
73AA000
stack
page read and write
3A06000
trusted library allocation
page read and write
5C65000
heap
page read and write
5C60000
heap
page read and write
791B000
heap
page read and write
736D000
stack
page read and write
3CC2000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
3CC5000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
4F03000
heap
page read and write
4EF0000
trusted library allocation
page read and write
754E000
stack
page read and write
35D0000
heap
page read and write
3B78000
trusted library allocation
page read and write
7350000
heap
page read and write
26F2000
trusted library allocation
page read and write
5C1E000
heap
page read and write
4E6E000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
742B000
stack
page read and write
6D4B000
trusted library allocation
page read and write
78EE000
heap
page read and write
78B9000
heap
page read and write
AE7000
heap
page read and write
980000
heap
page read and write
2DA9000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
720000
heap
page read and write
2DD8000
trusted library allocation
page read and write
318E000
stack
page read and write
7210000
heap
page read and write
5A55000
trusted library allocation
page read and write
2776000
trusted library allocation
page read and write
730000
heap
page read and write
4E3D000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
3318000
heap
page read and write
7F7000
stack
page read and write
58FE000
stack
page read and write
4DA0000
heap
page read and write
6300000
trusted library allocation
page read and write
2782000
trusted library allocation
page read and write
2D90000
heap
page read and write
3D3F000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
52BE000
stack
page read and write
68BC000
stack
page read and write
333B000
heap
page read and write
2DAF000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
51BE000
stack
page read and write
4E36000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
6A10000
trusted library allocation
page execute and read and write
3E61000
trusted library allocation
page read and write
3DE5000
trusted library allocation
page read and write
3B7E000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
3041000
trusted library allocation
page read and write
39CC000
trusted library allocation
page read and write
3347000
heap
page read and write
BBE000
unkown
page read and write
546F000
stack
page read and write
BC0000
heap
page read and write
4EE0000
heap
page read and write
86F5000
trusted library allocation
page read and write
3DAD000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
4E14000
trusted library allocation
page read and write
4F00000
heap
page read and write
536E000
stack
page read and write
5650000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
3E25000
trusted library allocation
page read and write
5C6B000
heap
page read and write
4CE0000
heap
page execute and read and write
875000
heap
page read and write
C3A000
trusted library allocation
page execute and read and write
5E40000
trusted library allocation
page read and write
245E000
stack
page read and write
27A0000
heap
page read and write
2784000
trusted library allocation
page read and write
5393000
heap
page read and write
54B0000
trusted library allocation
page read and write
732F000
stack
page read and write
7B60000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
3E55000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
BE6000
trusted library allocation
page read and write
5173000
heap
page execute and read and write
7AD0000
trusted library allocation
page read and write
509E000
stack
page read and write
74AB000
stack
page read and write
2EB8000
trusted library allocation
page read and write
C36000
trusted library allocation
page execute and read and write
28E9000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
61B0000
trusted library allocation
page execute and read and write
840000
heap
page read and write
6390000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
6210000
trusted library allocation
page execute and read and write
6600000
trusted library allocation
page read and write
7459000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
940000
trusted library allocation
page execute and read and write
3CCD000
trusted library allocation
page read and write
28CA000
trusted library allocation
page read and write
2C2C000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
57FE000
stack
page read and write
7220000
heap
page execute and read and write
5B70000
heap
page read and write
848000
heap
page read and write
7869000
heap
page read and write
2B54000
trusted library allocation
page read and write
26C0000
heap
page read and write
7610000
trusted library allocation
page read and write
6420000
trusted library allocation
page execute and read and write
78C3000
heap
page read and write
278E000
trusted library allocation
page read and write
AB8000
heap
page read and write
7192000
heap
page read and write
71D9000
heap
page read and write
5348000
trusted library allocation
page read and write
39AB000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
65E0000
heap
page execute and read and write
2F1C000
trusted library allocation
page read and write
DBE000
stack
page read and write
2D6B000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
270B000
trusted library allocation
page read and write
5FAE000
stack
page read and write
6410000
trusted library allocation
page read and write
7183000
heap
page read and write
4CD0000
heap
page execute and read and write
2722000
trusted library allocation
page read and write
3AE4000
trusted library allocation
page read and write
5C4E000
heap
page read and write
531E000
stack
page read and write
2E3D000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
32AE000
stack
page read and write
765E000
stack
page read and write
726D000
stack
page read and write
3DF9000
trusted library allocation
page read and write
70D8000
trusted library allocation
page read and write
76DE000
stack
page read and write
667C000
stack
page read and write
2A88000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
3CF8000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
78D4000
heap
page read and write
3235000
trusted library allocation
page execute and read and write
7455000
trusted library allocation
page read and write
4E42000
trusted library allocation
page read and write
3203000
trusted library allocation
page execute and read and write
2D47000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
A60000
heap
page read and write
4EF2000
trusted library allocation
page read and write
272F000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
2760000
trusted library allocation
page execute and read and write
28BA000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2C74000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
BF9000
trusted library allocation
page read and write
78EE000
stack
page read and write
71D1000
heap
page read and write
302C000
trusted library allocation
page read and write
3D6F000
trusted library allocation
page read and write
5C58000
heap
page read and write
62F5000
trusted library allocation
page read and write
71BD000
heap
page read and write
254C000
stack
page read and write
35C0000
trusted library allocation
page read and write
746F000
trusted library allocation
page read and write
28C2000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
272D000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
68C7000
trusted library allocation
page read and write
C70000
heap
page read and write
8EB000
heap
page read and write
3A2E000
trusted library allocation
page read and write
5E30000
trusted library allocation
page execute and read and write
3B6B000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
2744000
trusted library allocation
page read and write
3E32000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7A8E000
stack
page read and write
6630000
trusted library allocation
page execute and read and write
5A34000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
7090000
trusted library allocation
page execute and read and write
320D000
trusted library allocation
page execute and read and write
275D000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
271D000
trusted library allocation
page execute and read and write
3A7C000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
47BE000
stack
page read and write
3034000
trusted library allocation
page read and write
C32000
trusted library allocation
page read and write
2758000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
BA0000
heap
page read and write
B70000
trusted library allocation
page read and write
7913000
heap
page read and write
9F0000
heap
page read and write
746E000
stack
page read and write
3BC000
stack
page read and write
28C8000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
3CE6000
trusted library allocation
page read and write
52FE000
stack
page read and write
2BBF000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
6309000
trusted library allocation
page read and write
2936000
trusted library allocation
page read and write
DC0000
heap
page read and write
3056000
trusted library allocation
page read and write
5BA0000
heap
page read and write
290D000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
596D000
heap
page read and write
6C70000
trusted library allocation
page read and write
7986000
trusted library allocation
page read and write
7520000
heap
page read and write
28C6000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
3A72000
trusted library allocation
page read and write
6490000
trusted library allocation
page execute and read and write
4DDE000
stack
page read and write
723D000
heap
page read and write
2B65000
trusted library allocation
page read and write
3CB5000
trusted library allocation
page read and write
BCE000
heap
page read and write
2930000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
72EE000
stack
page read and write
3945000
trusted library allocation
page read and write
2DDE000
unkown
page read and write
5A9E000
stack
page read and write
35A8000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
2550000
trusted library allocation
page execute and read and write
F0E000
stack
page read and write
ACE000
heap
page read and write
2932000
trusted library allocation
page read and write
79EE000
stack
page read and write
ADA000
heap
page read and write
7A0E000
stack
page read and write
7732000
heap
page read and write
C00000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
32F0000
heap
page readonly
2731000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
86B0000
heap
page read and write
2CC6000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
56A0000
trusted library allocation
page execute and read and write
AAE000
stack
page read and write
4E0A000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
2919000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
27EE000
stack
page read and write
3A61000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
50DE000
stack
page read and write
5DE0000
trusted library allocation
page read and write
719C000
heap
page read and write
3E1A000
trusted library allocation
page read and write
32EE000
stack
page read and write
7BAE000
stack
page read and write
3912000
trusted library allocation
page read and write
71F8000
heap
page read and write
2D73000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
7A6F000
stack
page read and write
601F000
stack
page read and write
63D0000
trusted library allocation
page read and write
5CE0000
heap
page read and write
275A000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
5B92000
heap
page read and write
84E000
heap
page read and write
715E000
heap
page read and write
2786000
trusted library allocation
page read and write
6100000
trusted library section
page read and write
71A5000
heap
page read and write
5C2D000
heap
page read and write
5A26000
trusted library allocation
page read and write
3300000
trusted library allocation
page execute and read and write
B40000
trusted library allocation
page read and write
4F9D000
stack
page read and write
There are 814 hidden memdumps, click here to show them.