IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp3008.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zgfPOWyxZm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gyngzfy.g1z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eucybe2g.dvz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyxe20wd.cn4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jsmb0jfg.kol.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrtp5vie.tui.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbkgwcw4.5mj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sofqu2ay.o4o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wkvcjg2j.o10.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp49F9.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zgfPOWyxZm" /XML "C:\Users\user\AppData\Local\Temp\tmp3008.tmp"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe
C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zgfPOWyxZm" /XML "C:\Users\user\AppData\Local\Temp\tmp49F9.tmp"
malicious
C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe
"C:\Users\user\AppData\Roaming\zgfPOWyxZm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.kz.com.eg
unknown

Domains

Name
IP
Malicious
mail.kz.com.eg
162.220.165.43
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
162.220.165.43
mail.kz.com.eg
United States
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zgfPOWyxZm_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32BE000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
3401000
trusted library allocation
page read and write
malicious
2AD1000
trusted library allocation
page read and write
malicious
50B0000
trusted library section
page read and write
malicious
3051000
trusted library allocation
page read and write
malicious
3CAE000
trusted library allocation
page read and write
malicious
2C61000
trusted library allocation
page read and write
malicious
342B000
trusted library allocation
page read and write
malicious
2D3E000
trusted library allocation
page read and write
malicious
2C8B000
trusted library allocation
page read and write
malicious
71B1000
trusted library allocation
page read and write
73B8000
trusted library allocation
page read and write
6BFE000
stack
page read and write
7971000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
31CE000
stack
page read and write
7954000
trusted library allocation
page read and write
740D000
stack
page read and write
58DE000
stack
page read and write
E0E000
stack
page read and write
8020000
heap
page read and write
7BFC000
trusted library allocation
page read and write
15DB000
trusted library allocation
page execute and read and write
19E0000
heap
page execute and read and write
6F90000
heap
page read and write
79B2000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
C98000
heap
page read and write
1690000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
2990000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
69DE000
stack
page read and write
FBE000
stack
page read and write
17C0000
heap
page read and write
7120000
trusted library allocation
page read and write
730E000
stack
page read and write
10AE000
stack
page read and write
E20000
trusted library allocation
page read and write
5AFB000
stack
page read and write
6610000
heap
page read and write
6729000
trusted library allocation
page read and write
750D000
trusted library allocation
page read and write
68E6000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
7993000
trusted library allocation
page read and write
7ABA000
trusted library allocation
page read and write
700C000
stack
page read and write
290D000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6B9D000
stack
page read and write
7995000
trusted library allocation
page read and write
582C000
stack
page read and write
FED000
trusted library allocation
page execute and read and write
441D000
trusted library allocation
page read and write
11B5000
heap
page read and write
6E8C000
stack
page read and write
3BC3000
trusted library allocation
page read and write
91EE000
stack
page read and write
199C000
stack
page read and write
7452000
trusted library allocation
page read and write
16CA000
trusted library allocation
page execute and read and write
7602000
trusted library allocation
page read and write
2E1E000
stack
page read and write
7D7000
stack
page read and write
699E000
stack
page read and write
7410000
trusted library allocation
page read and write
7470000
trusted library allocation
page execute and read and write
7450000
heap
page read and write
5060000
heap
page execute and read and write
7491000
trusted library allocation
page read and write
71C1000
trusted library allocation
page read and write
78EA000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
782C000
trusted library allocation
page read and write
303E000
unkown
page read and write
7C97000
trusted library allocation
page read and write
7377000
trusted library allocation
page read and write
8A1E000
stack
page read and write
7BF1000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
AEA000
stack
page read and write
4059000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
6897000
trusted library allocation
page read and write
13F9000
heap
page read and write
74E2000
trusted library allocation
page read and write
758E000
trusted library allocation
page read and write
7B78000
trusted library allocation
page read and write
32DF000
stack
page read and write
15D0000
trusted library allocation
page read and write
74B3000
trusted library allocation
page read and write
78A8000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
15A1000
heap
page read and write
3AD9000
trusted library allocation
page read and write
7BB8000
trusted library allocation
page read and write
8010000
heap
page read and write
2D5C000
trusted library allocation
page read and write
8A7D000
stack
page read and write
EA0000
trusted library allocation
page read and write
7845000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
3210000
heap
page read and write
7223000
trusted library allocation
page read and write
7864000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
8B1E000
stack
page read and write
5940000
heap
page read and write
74D1000
trusted library allocation
page read and write
13E5000
heap
page read and write
15AB000
heap
page read and write
72D2000
trusted library allocation
page read and write
6F00000
heap
page read and write
79D6000
trusted library allocation
page read and write
787D000
trusted library allocation
page read and write
6DB0000
heap
page read and write
DE0000
heap
page read and write
4C18000
trusted library allocation
page read and write
949E000
stack
page read and write
7811000
trusted library allocation
page read and write
2BCC000
stack
page read and write
7CA9000
trusted library allocation
page read and write
54CD000
stack
page read and write
75D4000
trusted library allocation
page read and write
5954000
heap
page read and write
E70000
trusted library allocation
page read and write
1710000
heap
page read and write
7C0F000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
604F000
stack
page read and write
10B2000
heap
page read and write
166E000
stack
page read and write
73F7000
trusted library allocation
page read and write
78AC000
trusted library allocation
page read and write
6D08000
heap
page read and write
15C6000
trusted library allocation
page execute and read and write
1102000
heap
page read and write
6C40000
trusted library allocation
page read and write
787F000
trusted library allocation
page read and write
E9E000
stack
page read and write
8EDF000
stack
page read and write
EF4000
trusted library allocation
page read and write
1A37000
heap
page read and write
54C2000
trusted library allocation
page read and write
1055000
trusted library allocation
page read and write
425000
remote allocation
page execute and read and write
3107000
trusted library allocation
page read and write
64CE000
stack
page read and write
13FC000
heap
page read and write
125A000
heap
page read and write
3C9E000
trusted library allocation
page read and write
7C8A000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
7CD6000
trusted library allocation
page read and write
7BA6000
trusted library allocation
page read and write
78AA000
trusted library allocation
page read and write
52C0000
heap
page read and write
7941000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
17C9000
heap
page read and write
6D76000
heap
page read and write
7877000
trusted library allocation
page read and write
7ACB000
trusted library allocation
page read and write
16BD000
trusted library allocation
page execute and read and write
584F000
heap
page read and write
7388000
trusted library allocation
page read and write
1117000
heap
page read and write
7FC00000
trusted library allocation
page execute and read and write
7A8C000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
7CE7000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
1250000
heap
page read and write
708B000
stack
page read and write
7BDE000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
713F000
trusted library allocation
page read and write
D09000
heap
page read and write
A40000
heap
page read and write
7353000
trusted library allocation
page read and write
5D9E000
stack
page read and write
10C0000
trusted library allocation
page read and write
79FA000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
10F0000
heap
page read and write
EB0000
heap
page read and write
752F000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
2B8E000
stack
page read and write
13AD000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
78A0000
trusted library allocation
page read and write
7154000
trusted library allocation
page read and write
74E9000
trusted library allocation
page read and write
621E000
stack
page read and write
1558000
heap
page read and write
1910000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
7C26000
trusted library allocation
page read and write
5D60000
trusted library section
page read and write
5570000
trusted library allocation
page read and write
2DF0000
heap
page read and write
8A3D000
stack
page read and write
2DE0000
heap
page read and write
31EA000
heap
page read and write
7090000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
150E000
stack
page read and write
72E7000
trusted library allocation
page read and write
781B000
trusted library allocation
page read and write
5960000
heap
page read and write
13F3000
heap
page read and write
745F000
trusted library allocation
page read and write
710D000
stack
page read and write
718C000
trusted library allocation
page read and write
175E000
unkown
page read and write
86B0000
heap
page read and write
5A30000
trusted library allocation
page execute and read and write
5B30000
trusted library allocation
page read and write
676E000
stack
page read and write
1070000
heap
page read and write
7C7D000
trusted library allocation
page read and write
78FB000
trusted library allocation
page read and write
7487000
trusted library allocation
page read and write
2D2D000
stack
page read and write
2BD4000
trusted library allocation
page read and write
778E000
stack
page read and write
C85000
heap
page read and write
7A20000
trusted library allocation
page read and write
5AB0000
heap
page read and write
741B000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
E80000
trusted library allocation
page execute and read and write
7841000
trusted library allocation
page read and write
320F000
stack
page read and write
71D6000
trusted library allocation
page read and write
8F6F000
stack
page read and write
88DE000
stack
page read and write
85AE000
stack
page read and write
9352000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
8A80000
heap
page read and write
8D3E000
stack
page read and write
757D000
trusted library allocation
page read and write
7BDC000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
19D0000
trusted library allocation
page read and write
53CE000
stack
page read and write
576E000
stack
page read and write
7122000
trusted library allocation
page read and write
7B93000
trusted library allocation
page read and write
72C1000
trusted library allocation
page read and write
7C7F000
trusted library allocation
page read and write
19FB000
trusted library allocation
page read and write
12E7000
heap
page read and write
30FD000
trusted library allocation
page read and write
2F3C000
stack
page read and write
7CA7000
trusted library allocation
page read and write
3290000
heap
page read and write
718E000
trusted library allocation
page read and write
412000
remote allocation
page execute and read and write
15D7000
trusted library allocation
page execute and read and write
3425000
trusted library allocation
page read and write
FFA000
trusted library allocation
page execute and read and write
1600000
heap
page read and write
402000
remote allocation
page execute and read and write
77F0000
heap
page read and write
5A45000
trusted library allocation
page read and write
B80000
heap
page read and write
6F8E000
stack
page read and write
6C70000
trusted library allocation
page execute and read and write
7194000
trusted library allocation
page read and write
69E0000
trusted library allocation
page execute and read and write
6880000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
740A000
trusted library allocation
page read and write
7C37000
trusted library allocation
page read and write
103C000
stack
page read and write
74BD000
trusted library allocation
page read and write
74ED000
trusted library allocation
page read and write
79C3000
trusted library allocation
page read and write
723B000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
2E44000
trusted library allocation
page read and write
788D000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
7A0F000
trusted library allocation
page read and write
731E000
trusted library allocation
page read and write
757B000
trusted library allocation
page read and write
7CEA000
trusted library allocation
page read and write
6D42000
heap
page read and write
7BEC000
trusted library allocation
page read and write
C57000
heap
page read and write
70A0000
trusted library allocation
page execute and read and write
78B0000
trusted library allocation
page read and write
138E000
stack
page read and write
72D6000
trusted library allocation
page read and write
1A1D000
trusted library allocation
page read and write
790E000
trusted library allocation
page read and write
792C000
trusted library allocation
page read and write
739D000
trusted library allocation
page read and write
7ADC000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
8B5E000
stack
page read and write
7960000
trusted library allocation
page read and write
7C5B000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
7A31000
trusted library allocation
page read and write
7BD3000
trusted library allocation
page read and write
79A6000
trusted library allocation
page read and write
C10000
heap
page read and write
693E000
stack
page read and write
75D0000
trusted library allocation
page read and write
660E000
stack
page read and write
28E0000
trusted library allocation
page read and write
74EF000
trusted library allocation
page read and write
7309000
trusted library allocation
page read and write
6ABE000
stack
page read and write
2E30000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
66B2000
heap
page read and write
5500000
heap
page read and write
314F000
unkown
page read and write
1566000
heap
page read and write
2960000
heap
page read and write
7813000
trusted library allocation
page read and write
52E0000
heap
page read and write
7C20000
trusted library allocation
page read and write
6699000
heap
page read and write
6624000
heap
page read and write
C18000
heap
page read and write
BD0000
heap
page read and write
E24000
trusted library allocation
page read and write
7BAC000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page execute and read and write
90EE000
stack
page read and write
6890000
trusted library allocation
page read and write
C46000
heap
page read and write
C5D000
heap
page read and write
3CBE000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
8D9C000
stack
page read and write
12E0000
heap
page read and write
78E8000
trusted library allocation
page read and write
7C81000
trusted library allocation
page read and write
7485000
trusted library allocation
page read and write
307F000
unkown
page read and write
1270000
trusted library allocation
page read and write
2DF0000
heap
page read and write
5242000
trusted library allocation
page read and write
74C7000
trusted library allocation
page read and write
738A000
trusted library allocation
page read and write
15CA000
trusted library allocation
page execute and read and write
31CE000
stack
page read and write
7441000
trusted library allocation
page read and write
15C6000
heap
page read and write
7548000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
1040000
heap
page read and write
2910000
trusted library allocation
page read and write
C9E000
heap
page read and write
8700000
heap
page read and write
791B000
trusted library allocation
page read and write
B6E000
stack
page read and write
6F40000
trusted library allocation
page read and write
795E000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
5F4E000
stack
page read and write
86AE000
stack
page read and write
5850000
heap
page execute and read and write
628E000
stack
page read and write
75F9000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
7A44000
trusted library allocation
page read and write
1A16000
trusted library allocation
page read and write
7546000
trusted library allocation
page read and write
522C000
stack
page read and write
63CD000
stack
page read and write
1007000
trusted library allocation
page execute and read and write
3103000
trusted library allocation
page read and write
5560000
heap
page read and write
5A2F000
stack
page read and write
8DDE000
unkown
page read and write
E46000
trusted library allocation
page execute and read and write
71B5000
trusted library allocation
page read and write
54AE000
stack
page read and write
50A0000
trusted library allocation
page execute and read and write
54DF000
trusted library allocation
page read and write
614D000
stack
page read and write
8C9B000
stack
page read and write
74CF000
trusted library allocation
page read and write
7B1F000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
7843000
trusted library allocation
page read and write
189B000
stack
page read and write
104F000
trusted library allocation
page read and write
74BB000
trusted library allocation
page read and write
FFE000
stack
page read and write
721B000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
677A000
heap
page read and write
16A3000
trusted library allocation
page execute and read and write
7C6C000
trusted library allocation
page read and write
6CFE000
stack
page read and write
16C6000
trusted library allocation
page execute and read and write
78D8000
trusted library allocation
page read and write
1005000
trusted library allocation
page execute and read and write
423000
remote allocation
page execute and read and write
751E000
trusted library allocation
page read and write
7A7B000
trusted library allocation
page read and write
7263000
trusted library allocation
page read and write
144D000
heap
page read and write
7B74000
trusted library allocation
page read and write
78A2000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
7BEA000
trusted library allocation
page read and write
5070000
trusted library section
page read and write
1040000
trusted library allocation
page read and write
7A57000
trusted library allocation
page read and write
8710000
heap
page read and write
2D6A000
stack
page read and write
78DA000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
1130000
heap
page read and write
1060000
heap
page read and write
7883000
trusted library allocation
page read and write
7B0A000
trusted library allocation
page read and write
756A000
trusted library allocation
page read and write
719E000
trusted library allocation
page read and write
73B6000
trusted library allocation
page read and write
7AA9000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
78B4000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
587E000
stack
page read and write
7B0E000
trusted library allocation
page read and write
445D000
trusted library allocation
page read and write
28E4000
trusted library allocation
page read and write
1359000
stack
page read and write
13B0000
heap
page read and write
7930000
trusted library allocation
page read and write
71B9000
trusted library allocation
page read and write
7AA7000
trusted library allocation
page read and write
10A8000
heap
page read and write
EA0000
heap
page read and write
7152000
trusted library allocation
page read and write
5580000
heap
page read and write
2DE0000
heap
page read and write
113A000
heap
page read and write
3C7E000
trusted library allocation
page read and write
8C3E000
stack
page read and write
54E5000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
624E000
stack
page read and write
7CC1000
trusted library allocation
page read and write
72B5000
trusted library allocation
page read and write
7128000
trusted library allocation
page read and write
75B8000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
3C11000
trusted library allocation
page read and write
78A4000
trusted library allocation
page read and write
CA3000
heap
page read and write
11FE000
unkown
page read and write
304F000
stack
page read and write
71BD000
trusted library allocation
page read and write
52E4000
heap
page read and write
683E000
stack
page read and write
72A4000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FD50000
trusted library allocation
page execute and read and write
19FE000
trusted library allocation
page read and write
57EE000
stack
page read and write
40B000
remote allocation
page execute and read and write
7533000
trusted library allocation
page read and write
2ACE000
stack
page read and write
2BF0000
heap
page execute and read and write
790C000
trusted library allocation
page read and write
7472000
trusted library allocation
page read and write
721D000
trusted library allocation
page read and write
28FE000
trusted library allocation
page read and write
688D000
trusted library allocation
page read and write
C1E000
heap
page read and write
55A0000
trusted library allocation
page read and write
6662000
heap
page read and write
723F000
trusted library allocation
page read and write
6F47000
trusted library allocation
page read and write
16D7000
trusted library allocation
page execute and read and write
5A4C000
trusted library allocation
page read and write
582B000
heap
page read and write
3AD1000
trusted library allocation
page read and write
6FA6000
trusted library allocation
page read and write
1A30000
heap
page read and write
82AE000
stack
page read and write
7BEF000
trusted library allocation
page read and write
717B000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
1670000
heap
page read and write
33A0000
heap
page read and write
6770000
heap
page read and write
4435000
trusted library allocation
page read and write
1080000
heap
page read and write
12BE000
stack
page read and write
1088000
heap
page read and write
7A55000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
7265000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
7C39000
trusted library allocation
page read and write
71F9000
trusted library allocation
page read and write
4BCC000
stack
page read and write
54B1000
trusted library allocation
page read and write
6D9000
stack
page read and write
3B75000
trusted library allocation
page read and write
713B000
trusted library allocation
page read and write
75F6000
trusted library allocation
page read and write
78C7000
trusted library allocation
page read and write
2D7A000
stack
page read and write
16C2000
trusted library allocation
page read and write
6D78000
heap
page read and write
726F000
trusted library allocation
page read and write
71BB000
trusted library allocation
page read and write
443D000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
786A000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
90AF000
stack
page read and write
16D2000
trusted library allocation
page read and write
79C5000
trusted library allocation
page read and write
83B0000
heap
page read and write
109E000
heap
page read and write
7291000
trusted library allocation
page read and write
7175000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
7C59000
trusted library allocation
page read and write
E23000
trusted library allocation
page execute and read and write
7165000
trusted library allocation
page read and write
6D00000
heap
page read and write
68DD000
stack
page read and write
E33000
trusted library allocation
page read and write
F05000
heap
page read and write
589E000
stack
page read and write
15C2000
trusted library allocation
page read and write
79E9000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
74CD000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
117E000
stack
page read and write
668D000
heap
page read and write
5260000
trusted library allocation
page execute and read and write
71C3000
trusted library allocation
page read and write
7BA8000
trusted library allocation
page read and write
8300000
heap
page read and write
75AA000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
3180000
heap
page read and write
700F000
stack
page read and write
6BBE000
stack
page read and write
6A7E000
stack
page read and write
41B000
remote allocation
page execute and read and write
15F0000
trusted library allocation
page read and write
74C2000
trusted library allocation
page read and write
7126000
trusted library allocation
page read and write
7CF1000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
329B000
heap
page read and write
71BF000
trusted library allocation
page read and write
562C000
stack
page read and write
14A0000
heap
page read and write
403000
remote allocation
page execute and read and write
13BE000
heap
page read and write
2980000
trusted library allocation
page execute and read and write
74CB000
trusted library allocation
page read and write
750B000
trusted library allocation
page read and write
1077000
heap
page read and write
16D5000
trusted library allocation
page execute and read and write
40C000
remote allocation
page execute and read and write
431000
remote allocation
page execute and read and write
7CEF000
trusted library allocation
page read and write
7A9F000
trusted library allocation
page read and write
2972000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
2E50000
heap
page execute and read and write
72BF000
trusted library allocation
page read and write
2C00000
heap
page execute and read and write
F00000
heap
page read and write
71B7000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
15D2000
trusted library allocation
page read and write
57F0000
heap
page read and write
7B61000
trusted library allocation
page read and write
11B0000
heap
page read and write
1A0E000
trusted library allocation
page read and write
13A4000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
E2D000
trusted library allocation
page execute and read and write
42B5000
trusted library allocation
page read and write
13C0000
heap
page read and write
310E000
unkown
page read and write
16F0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
10F7000
stack
page read and write
7CC5000
trusted library allocation
page read and write
16DB000
trusted library allocation
page execute and read and write
2C87000
trusted library allocation
page read and write
6900000
trusted library allocation
page execute and read and write
5A0000
unkown
page readonly
7535000
trusted library allocation
page read and write
78AE000
trusted library allocation
page read and write
123B000
stack
page read and write
2912000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
713D000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
7BA4000
trusted library allocation
page read and write
505E000
stack
page read and write
69F0000
trusted library allocation
page read and write
72A2000
trusted library allocation
page read and write
724C000
stack
page read and write
30B0000
heap
page read and write
75C9000
trusted library allocation
page read and write
741F000
trusted library allocation
page read and write
7A68000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
2CAA000
trusted library allocation
page read and write
74B5000
trusted library allocation
page read and write
6620000
heap
page read and write
650E000
stack
page read and write
FF6000
trusted library allocation
page execute and read and write
2B68000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
7BB6000
trusted library allocation
page read and write
7559000
trusted library allocation
page read and write
16AD000
trusted library allocation
page execute and read and write
13BA000
heap
page read and write
2DD0000
heap
page read and write
6D82000
heap
page read and write
1002000
trusted library allocation
page read and write
B85000
heap
page read and write
7BB1000
trusted library allocation
page read and write
7225000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
145F000
heap
page read and write
6FA0000
trusted library allocation
page read and write
195E000
stack
page read and write
4331000
trusted library allocation
page read and write
73C9000
trusted library allocation
page read and write
7819000
trusted library allocation
page read and write
71F7000
trusted library allocation
page read and write
EF3000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
52BC000
stack
page read and write
348D000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
514C000
stack
page read and write
18FB000
stack
page read and write
730D000
trusted library allocation
page read and write
57AE000
stack
page read and write
436C000
trusted library allocation
page read and write
74A2000
trusted library allocation
page read and write
100B000
trusted library allocation
page execute and read and write
7483000
trusted library allocation
page read and write
75FE000
trusted library allocation
page read and write
185E000
stack
page read and write
7C99000
trusted library allocation
page read and write
79FC000
trusted library allocation
page read and write
55B3000
heap
page read and write
7A8E000
trusted library allocation
page read and write
7BC2000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
19C4000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
7817000
trusted library allocation
page read and write
7366000
trusted library allocation
page read and write
1717000
heap
page read and write
686E000
stack
page read and write
7500000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
43A6000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
365F000
stack
page read and write
10B5000
heap
page read and write
89DF000
stack
page read and write
146C000
heap
page read and write
7A0D000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
13A3000
trusted library allocation
page execute and read and write
7599000
trusted library allocation
page read and write
6883000
trusted library allocation
page read and write
6C50000
heap
page read and write
720A000
trusted library allocation
page read and write
411000
remote allocation
page execute and read and write
113E000
stack
page read and write
1A11000
trusted library allocation
page read and write
73DA000
trusted library allocation
page read and write
759B000
trusted library allocation
page read and write
7351000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
10C3000
trusted library allocation
page read and write
723D000
trusted library allocation
page read and write
7561000
trusted library allocation
page read and write
7173000
trusted library allocation
page read and write
15B3000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
712A000
trusted library allocation
page read and write
C55000
heap
page read and write
7CC3000
trusted library allocation
page read and write
7364000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5590000
trusted library allocation
page execute and read and write
525D000
trusted library allocation
page read and write
73EB000
trusted library allocation
page read and write
7B41000
trusted library allocation
page read and write
7124000
trusted library allocation
page read and write
71E7000
trusted library allocation
page read and write
15BD000
trusted library allocation
page execute and read and write
C39000
heap
page read and write
939D000
stack
page read and write
7B63000
trusted library allocation
page read and write
704F000
stack
page read and write
7943000
trusted library allocation
page read and write
524E000
trusted library allocation
page read and write
7BBC000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
1060000
trusted library allocation
page execute and read and write
7252000
trusted library allocation
page read and write
1259000
stack
page read and write
6E3E000
stack
page read and write
32E8000
trusted library allocation
page read and write
3B27000
trusted library allocation
page read and write
73AE000
trusted library allocation
page read and write
72F8000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
7BFE000
trusted library allocation
page read and write
DF0000
heap
page read and write
13F6000
heap
page read and write
5F0D000
trusted library allocation
page read and write
2F40000
heap
page read and write
71D4000
trusted library allocation
page read and write
74B7000
trusted library allocation
page read and write
5520000
heap
page execute and read and write
2D3D000
stack
page read and write
7B30000
trusted library allocation
page read and write
15A6000
heap
page read and write
14C5000
heap
page read and write
7A79000
trusted library allocation
page read and write
7868000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
7856000
trusted library allocation
page read and write
10E0000
trusted library allocation
page execute and read and write
7AE8000
trusted library allocation
page read and write
75E5000
trusted library allocation
page read and write
75A8000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
2E9E000
stack
page read and write
638E000
stack
page read and write
50F0000
heap
page read and write
1A02000
trusted library allocation
page read and write
4EAE000
stack
page read and write
430000
remote allocation
page execute and read and write
78C5000
trusted library allocation
page read and write
71B3000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
592E000
stack
page read and write
4143000
trusted library allocation
page read and write
782E000
trusted library allocation
page read and write
BCD000
stack
page read and write
E52000
trusted library allocation
page read and write
29C0000
heap
page execute and read and write
1030000
heap
page read and write
7B4E000
trusted library allocation
page read and write
773D000
stack
page read and write
566E000
stack
page read and write
739B000
trusted library allocation
page read and write
1486000
heap
page read and write
591E000
stack
page read and write
5494000
trusted library allocation
page read and write
E5B000
trusted library allocation
page execute and read and write
13A0000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
73F9000
trusted library allocation
page read and write
8C5F000
stack
page read and write
6C60000
heap
page read and write
5C9C000
stack
page read and write
523E000
trusted library allocation
page read and write
7A42000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
8E6E000
stack
page read and write
2E20000
trusted library allocation
page execute and read and write
7BBE000
trusted library allocation
page read and write
E50000
heap
page read and write
82EE000
stack
page read and write
43B1000
trusted library allocation
page read and write
7982000
trusted library allocation
page read and write
66BE000
stack
page read and write
E4A000
trusted library allocation
page execute and read and write
78B2000
trusted library allocation
page read and write
7AF9000
trusted library allocation
page read and write
52F0000
heap
page read and write
7800000
trusted library allocation
page read and write
11BE000
unkown
page read and write
1538000
heap
page read and write
7470000
trusted library allocation
page read and write
31E0000
heap
page read and write
75D2000
trusted library allocation
page read and write
7815000
trusted library allocation
page read and write
19F0000
trusted library allocation
page read and write
3105000
trusted library allocation
page read and write
7B76000
trusted library allocation
page read and write
D7A000
stack
page read and write
50E0000
trusted library allocation
page read and write
1530000
heap
page read and write
1564000
heap
page read and write
7CBA000
trusted library allocation
page read and write
2901000
trusted library allocation
page read and write
EFD000
trusted library allocation
page execute and read and write
19C0000
trusted library allocation
page read and write
932C000
stack
page read and write
7CA5000
trusted library allocation
page read and write
7179000
trusted library allocation
page read and write
79E7000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
FF2000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
7B82000
trusted library allocation
page read and write
2906000
trusted library allocation
page read and write
922B000
stack
page read and write
5A70000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
7914000
trusted library allocation
page read and write
17A0000
heap
page read and write
8FAE000
stack
page read and write
7C24000
trusted library allocation
page read and write
4EEC000
stack
page read and write
B20000
heap
page read and write
5A50000
trusted library allocation
page execute and read and write
789E000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
16A4000
trusted library allocation
page read and write
6D90000
heap
page read and write
549B000
trusted library allocation
page read and write
75B6000
trusted library allocation
page read and write
78A6000
trusted library allocation
page read and write
5E9F000
stack
page read and write
523B000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
4DAE000
stack
page read and write
EF0000
trusted library allocation
page read and write
E57000
trusted library allocation
page execute and read and write
5A40000
trusted library allocation
page read and write
71AF000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
732F000
trusted library allocation
page read and write
71E9000
trusted library allocation
page read and write
15AE000
stack
page read and write
5572000
trusted library allocation
page read and write
50F3000
heap
page read and write
74FD000
trusted library allocation
page read and write
697E000
stack
page read and write
BE8000
stack
page read and write
5A2000
unkown
page readonly
68E0000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
792E000
trusted library allocation
page read and write
1700000
trusted library allocation
page execute and read and write
65BF000
stack
page read and write
16A0000
trusted library allocation
page read and write
7192000
trusted library allocation
page read and write
730B000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
72D4000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
5950000
heap
page read and write
55B0000
heap
page read and write
There are 896 hidden memdumps, click here to show them.