IOC Report
PAYMENT LIST.exe

loading gif

Files

File Path
Type
Category
Malicious
PAYMENT LIST.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpB768.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\uzBfRO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PAYMENT LIST.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\uzBfRO.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fm5xtiso.lir.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fn0ab0yu.cqb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1qpf0uy.2xd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcze4up2.5kz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jtibsbfb.b2f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vkzrvdw2.a2m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0qn2mig.agj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wwcni40j.4tf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
C:\Users\user\AppData\Roaming\uzBfRO.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (2294)
downloaded
Chrome Cache Entry: 78
ASCII text
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 81
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (65531)
downloaded
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PAYMENT LIST.exe
"C:\Users\user\Desktop\PAYMENT LIST.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PAYMENT LIST.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uzBfRO.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uzBfRO" /XML "C:\Users\user\AppData\Local\Temp\tmpB768.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\uzBfRO.exe
C:\Users\user\AppData\Roaming\uzBfRO.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uzBfRO" /XML "C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1964,i,4356756582602737305,9907266007460560874,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 --field-trial-handle=2216,i,15963493428876276822,10189131563386387026,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.broofa.com
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://www.google.com/async/newtab_promos
142.250.217.196
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://www.carterandcone.coml
unknown
https://plus.google.com
unknown
http://mail.parsdarou.ir
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.217.196
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.sakkal.com0
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://csp.withgoogle.com/csp/lcreport/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
142.250.189.142
http://r3.o.lencr.org0
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.217.196
https://apis.google.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://r3.i.lencr.org/0g
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://domains.google.com/suggest/flow
unknown
https://clients6.google.com
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.parsdarou.ir
5.144.130.49
malicious
google.com
142.251.35.238
plus.l.google.com
142.250.189.142
www.google.com
142.250.217.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
5.144.130.49
mail.parsdarou.ir
Iran (ISLAMIC Republic Of)
malicious
142.250.189.142
plus.l.google.com
United States
192.168.2.4
unknown
unknown
142.250.217.196
www.google.com
United States
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
345B000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2DDC000
trusted library allocation
page read and write
malicious
2926000
trusted library allocation
page read and write
malicious
3081000
trusted library allocation
page read and write
malicious
3306000
trusted library allocation
page read and write
malicious
435D000
trusted library allocation
page read and write
malicious
329C000
trusted library allocation
page read and write
malicious
2DB2000
trusted library allocation
page read and write
malicious
3330000
trusted library allocation
page read and write
malicious
29A3000
trusted library allocation
page read and write
malicious
77E0000
trusted library section
page read and write
malicious
33D6000
trusted library allocation
page read and write
malicious
2D61000
trusted library allocation
page read and write
malicious
38B6000
trusted library allocation
page read and write
malicious
1442000
trusted library allocation
page read and write
4A71000
trusted library allocation
page read and write
4A7D000
trusted library allocation
page read and write
4081000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
6958000
heap
page read and write
19C0000
heap
page execute and read and write
5EA7000
trusted library allocation
page read and write
68AF000
stack
page read and write
57E0000
heap
page execute and read and write
4B50000
trusted library allocation
page execute and read and write
27EB000
trusted library allocation
page read and write
4F80000
trusted library allocation
page execute and read and write
B10000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
16C8000
heap
page read and write
8C8000
heap
page read and write
4EF0000
heap
page read and write
2DE4000
trusted library allocation
page read and write
A20E000
stack
page read and write
688E000
stack
page read and write
989D000
stack
page read and write
27AD000
trusted library allocation
page read and write
503E000
stack
page read and write
47EE000
stack
page read and write
21CB000
trusted library allocation
page execute and read and write
3060000
heap
page read and write
27D9000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
A97000
heap
page read and write
C73000
trusted library allocation
page execute and read and write
6B9E000
stack
page read and write
13BE000
stack
page read and write
282F000
trusted library allocation
page read and write
237E000
stack
page read and write
6A0E000
stack
page read and write
14B0000
heap
page read and write
2815000
trusted library allocation
page read and write
1380000
heap
page read and write
5963000
heap
page read and write
AE6C000
stack
page read and write
4950000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
2F6F000
unkown
page read and write
1457000
trusted library allocation
page execute and read and write
198C000
stack
page read and write
68EE000
stack
page read and write
1595000
trusted library allocation
page execute and read and write
2799000
trusted library allocation
page read and write
6C4F000
stack
page read and write
3001000
trusted library allocation
page read and write
10F5000
heap
page read and write
26EE000
stack
page read and write
5791000
trusted library allocation
page read and write
360000
heap
page read and write
4AC5000
trusted library allocation
page read and write
143D000
trusted library allocation
page execute and read and write
7920000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
1563000
trusted library allocation
page execute and read and write
4F3C000
stack
page read and write
1298000
heap
page read and write
1543000
trusted library allocation
page execute and read and write
ACE000
heap
page read and write
34A000
stack
page read and write
2803000
trusted library allocation
page read and write
21A0000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
27FF000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
161E000
stack
page read and write
8DE000
stack
page read and write
240E000
stack
page read and write
59C8000
trusted library allocation
page read and write
5A50000
heap
page read and write
89E000
stack
page read and write
1560000
trusted library allocation
page read and write
6437000
trusted library allocation
page read and write
ADB000
trusted library allocation
page execute and read and write
5740000
heap
page read and write
4A82000
trusted library allocation
page read and write
21C0000
trusted library allocation
page read and write
12C4000
heap
page read and write
2FAE000
stack
page read and write
6900000
heap
page read and write
15C0000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
56BC000
stack
page read and write
6C80000
trusted library allocation
page execute and read and write
35EE000
trusted library allocation
page read and write
501E000
stack
page read and write
4C6E000
stack
page read and write
880000
heap
page read and write
2845000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
2381000
trusted library allocation
page read and write
A8A000
heap
page read and write
780000
heap
page read and write
2825000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
283E000
trusted library allocation
page read and write
11A8000
heap
page read and write
62C0000
heap
page read and write
598E000
heap
page read and write
3130000
heap
page read and write
A10E000
stack
page read and write
7AB0000
trusted library allocation
page read and write
594E000
stack
page read and write
279F000
trusted library allocation
page read and write
A7F000
heap
page read and write
9FCD000
stack
page read and write
542C000
stack
page read and write
282D000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
593D000
stack
page read and write
1423000
trusted library allocation
page execute and read and write
66CE000
stack
page read and write
AC0000
trusted library allocation
page read and write
25E0000
heap
page read and write
75BE000
stack
page read and write
77F0000
trusted library allocation
page read and write
63E000
stack
page read and write
9E0F000
stack
page read and write
35D1000
trusted library allocation
page read and write
9F0000
heap
page read and write
D10000
heap
page read and write
579D000
trusted library allocation
page read and write
5B50000
trusted library section
page read and write
1F0000
heap
page read and write
1133000
heap
page read and write
5F00000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
AD2000
trusted library allocation
page read and write
B20000
heap
page read and write
264D000
trusted library allocation
page read and write
739000
stack
page read and write
1050000
heap
page read and write
15C0000
heap
page read and write
42B9000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
58EC000
stack
page read and write
332C000
trusted library allocation
page read and write
24FC000
stack
page read and write
3291000
trusted library allocation
page read and write
113B000
heap
page read and write
159B000
trusted library allocation
page execute and read and write
6510000
trusted library allocation
page read and write
2428000
trusted library allocation
page read and write
4AB0000
heap
page read and write
1200000
heap
page read and write
F68000
stack
page read and write
FD0000
heap
page read and write
77C0000
trusted library allocation
page read and write
59BE000
stack
page read and write
3FF000
unkown
page read and write
68A0000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
2B8A000
stack
page read and write
4EB0000
heap
page read and write
6B5E000
stack
page read and write
330E000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
3D89000
trusted library allocation
page read and write
2F2E000
unkown
page read and write
4A54000
trusted library allocation
page read and write
A5EF000
stack
page read and write
5EE0000
trusted library allocation
page execute and read and write
1239000
stack
page read and write
5960000
heap
page read and write
19E0000
heap
page read and write
A96F000
stack
page read and write
3304000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
413B000
trusted library allocation
page read and write
3070000
heap
page execute and read and write
262F000
trusted library allocation
page read and write
1608000
trusted library allocation
page read and write
6890000
trusted library allocation
page execute and read and write
386B000
trusted library allocation
page read and write
A60000
heap
page read and write
5945000
heap
page read and write
1040000
heap
page read and write
27DF000
trusted library allocation
page read and write
7AFE000
stack
page read and write
5960000
heap
page read and write
A3EE000
stack
page read and write
39C1000
trusted library allocation
page read and write
4D90000
heap
page execute and read and write
DD7000
stack
page read and write
1582000
trusted library allocation
page read and write
27B5000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
1369000
heap
page read and write
943000
heap
page read and write
1312000
heap
page read and write
7FDE0000
trusted library allocation
page execute and read and write
600000
heap
page read and write
5570000
trusted library section
page readonly
53A1000
trusted library allocation
page read and write
640000
heap
page read and write
25C0000
trusted library allocation
page read and write
89A000
heap
page read and write
27A7000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
2EE0000
heap
page read and write
53B2000
trusted library allocation
page read and write
27FB000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
57D0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
8F5000
heap
page read and write
5A6B000
stack
page read and write
156D000
trusted library allocation
page execute and read and write
5386000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
14D5000
heap
page read and write
27EF000
trusted library allocation
page read and write
14A0000
heap
page read and write
158A000
trusted library allocation
page execute and read and write
1550000
trusted library allocation
page read and write
76D9000
heap
page read and write
791A000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
172F000
stack
page read and write
1592000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
680E000
stack
page read and write
4D10000
heap
page execute and read and write
1450000
trusted library allocation
page read and write
4189000
trusted library allocation
page read and write
2410000
heap
page execute and read and write
1582000
trusted library allocation
page read and write
6ED000
trusted library allocation
page execute and read and write
16C5000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
4302000
trusted library allocation
page read and write
5900000
trusted library allocation
page execute and read and write
2793000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
99A0000
heap
page read and write
4EA0000
heap
page read and write
578E000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
4D68000
trusted library allocation
page read and write
A30000
heap
page read and write
2DCC000
trusted library allocation
page read and write
5BAE000
stack
page read and write
6B0E000
stack
page read and write
3381000
trusted library allocation
page read and write
AD5000
heap
page read and write
55A3000
heap
page read and write
7300000
heap
page read and write
25D1000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
4ABE000
stack
page read and write
60BE000
stack
page read and write
68E000
stack
page read and write
84E000
stack
page read and write
9F8C000
stack
page read and write
1530000
trusted library allocation
page read and write
8E0000
heap
page read and write
10EE000
stack
page read and write
3012000
trusted library allocation
page read and write
9BDE000
stack
page read and write
3D61000
trusted library allocation
page read and write
5580000
heap
page read and write
1994000
trusted library allocation
page read and write
68EE000
stack
page read and write
C5E000
stack
page read and write
1597000
trusted library allocation
page execute and read and write
A4EE000
stack
page read and write
144A000
trusted library allocation
page execute and read and write
5DEF000
stack
page read and write
53A6000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
84E000
stack
page read and write
55B0000
heap
page execute and read and write
76D4000
heap
page read and write
5950000
heap
page read and write
520000
heap
page read and write
4FA000
stack
page read and write
8D2000
heap
page read and write
2FA000
stack
page read and write
A90000
trusted library allocation
page read and write
1452000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
2FDC000
stack
page read and write
40ED000
trusted library allocation
page read and write
4B60000
trusted library allocation
page execute and read and write
32FA000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
5930000
trusted library allocation
page execute and read and write
2500000
trusted library allocation
page execute and read and write
54E0000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
ACA000
trusted library allocation
page execute and read and write
5453000
heap
page read and write
AC2E000
stack
page read and write
7F790000
trusted library allocation
page execute and read and write
727000
heap
page read and write
A1EE000
stack
page read and write
4AA0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
680D000
stack
page read and write
1339000
stack
page read and write
3006000
trusted library allocation
page read and write
4B30000
heap
page read and write
445C000
stack
page read and write
2220000
heap
page read and write
7800000
trusted library allocation
page read and write
1381000
heap
page read and write
27FD000
trusted library allocation
page read and write
1119000
heap
page read and write
C7D000
trusted library allocation
page execute and read and write
1730000
trusted library allocation
page read and write
2B4D000
stack
page read and write
1540000
trusted library allocation
page read and write
4E9E000
stack
page read and write
1490000
trusted library allocation
page read and write
A68000
heap
page read and write
157A000
trusted library allocation
page execute and read and write
57FE000
stack
page read and write
5620000
heap
page read and write
7930000
trusted library allocation
page execute and read and write
27BB000
trusted library allocation
page read and write
1729000
heap
page read and write
299F000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
2FEF000
stack
page read and write
2807000
trusted library allocation
page read and write
597E000
stack
page read and write
48A0000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
27CB000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page execute and read and write
8BF000
stack
page read and write
270C000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
5510000
trusted library allocation
page execute and read and write
16B9000
heap
page read and write
11FF000
stack
page read and write
54D0000
trusted library allocation
page execute and read and write
5940000
heap
page read and write
25CF000
stack
page read and write
2270000
heap
page execute and read and write
CA7000
trusted library allocation
page execute and read and write
2855000
trusted library allocation
page read and write
1610000
trusted library allocation
page execute and read and write
4A96000
trusted library allocation
page read and write
63E0000
trusted library allocation
page execute and read and write
B92000
unkown
page readonly
2859000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1130000
heap
page read and write
AD7000
trusted library allocation
page execute and read and write
AA0000
trusted library allocation
page read and write
AAAE000
stack
page read and write
455E000
stack
page read and write
145B000
trusted library allocation
page execute and read and write
3010000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
282B000
trusted library allocation
page read and write
AD6B000
stack
page read and write
27CF000
trusted library allocation
page read and write
577B000
trusted library allocation
page read and write
27C7000
trusted library allocation
page read and write
E6A000
stack
page read and write
D0E000
stack
page read and write
21C7000
trusted library allocation
page execute and read and write
6960000
heap
page read and write
24C9000
heap
page read and write
6C70000
heap
page read and write
5CAE000
stack
page read and write
8D4000
heap
page read and write
226E000
stack
page read and write
470C000
stack
page read and write
5500000
trusted library allocation
page read and write
4D20000
trusted library allocation
page execute and read and write
AD2E000
stack
page read and write
5CEE000
stack
page read and write
63C000
stack
page read and write
6E3000
trusted library allocation
page execute and read and write
4F90000
heap
page read and write
10FE000
heap
page read and write
110000
unkown
page readonly
66D0000
heap
page read and write
1433000
trusted library allocation
page read and write
2795000
trusted library allocation
page read and write
903000
heap
page read and write
15BE000
stack
page read and write
B00000
trusted library allocation
page execute and read and write
112000
unkown
page readonly
5910000
trusted library section
page read and write
6720000
heap
page read and write
57BE000
stack
page read and write
5A5E000
heap
page read and write
4273000
trusted library allocation
page read and write
930000
heap
page read and write
71A000
heap
page read and write
12AE000
heap
page read and write
460B000
stack
page read and write
158B000
trusted library allocation
page execute and read and write
27BD000
trusted library allocation
page read and write
2768000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
63CC000
trusted library allocation
page read and write
4D80000
trusted library section
page readonly
4AFE000
stack
page read and write
AA4000
trusted library allocation
page read and write
1740000
heap
page read and write
1576000
trusted library allocation
page execute and read and write
59F7000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
3B0000
heap
page read and write
32F5000
trusted library allocation
page read and write
A730000
heap
page read and write
4A90000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
6992000
heap
page read and write
4AF0000
trusted library allocation
page read and write
5047000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
13FE000
stack
page read and write
6DEE000
stack
page read and write
1420000
trusted library allocation
page read and write
142D000
trusted library allocation
page execute and read and write
2BD000
stack
page read and write
1586000
trusted library allocation
page execute and read and write
949E000
stack
page read and write
8F0000
heap
page read and write
C8D000
trusted library allocation
page execute and read and write
4B40000
heap
page execute and read and write
55A0000
heap
page read and write
7030000
trusted library allocation
page execute and read and write
650E000
stack
page read and write
A22E000
stack
page read and write
4A76000
trusted library allocation
page read and write
1650000
heap
page read and write
6920000
heap
page read and write
6B4E000
stack
page read and write
2853000
trusted library allocation
page read and write
21AD000
trusted library allocation
page execute and read and write
556B000
stack
page read and write
577E000
trusted library allocation
page read and write
8AF000
heap
page read and write
64A000
heap
page read and write
300D000
trusted library allocation
page read and write
16B0000
heap
page read and write
4D4E000
stack
page read and write
5A00000
trusted library allocation
page read and write
6318000
heap
page read and write
AA3000
trusted library allocation
page execute and read and write
C42000
unkown
page readonly
76DD000
heap
page read and write
A86D000
stack
page read and write
5F10000
trusted library allocation
page read and write
1424000
trusted library allocation
page read and write
24C0000
heap
page read and write
27A5000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2FEB000
trusted library allocation
page read and write
CDA000
stack
page read and write
5E70000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
160E000
stack
page read and write
64CF000
stack
page read and write
AF0000
trusted library allocation
page read and write
4CAE000
stack
page read and write
1570000
trusted library allocation
page read and write
2F9E000
stack
page read and write
12BA000
heap
page read and write
6BA0000
trusted library allocation
page execute and read and write
27B3000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
6A0000
heap
page read and write
7B10000
trusted library section
page read and write
AEAD000
stack
page read and write
4D10000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
284A000
trusted library allocation
page read and write
1544000
trusted library allocation
page read and write
5ECC000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
6F4F000
stack
page read and write
1085000
heap
page read and write
16F0000
heap
page read and write
1996000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
1550000
heap
page read and write
5782000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
156D000
trusted library allocation
page execute and read and write
9EF000
stack
page read and write
4C2E000
stack
page read and write
1688000
heap
page read and write
2813000
trusted library allocation
page read and write
7BCE000
stack
page read and write
2801000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
6E4000
trusted library allocation
page read and write
890000
heap
page read and write
640000
heap
page read and write
965F000
stack
page read and write
4EC0000
trusted library allocation
page read and write
15FE000
stack
page read and write
3D0000
heap
page read and write
A62E000
stack
page read and write
323F000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
10F0000
heap
page read and write
7CCF000
stack
page read and write
4EF5000
heap
page read and write
4A94000
trusted library allocation
page read and write
1290000
heap
page read and write
642D000
stack
page read and write
4AB3000
heap
page read and write
61BC000
stack
page read and write
3AE000
unkown
page read and write
4B40000
trusted library allocation
page read and write
5590000
heap
page read and write
27A3000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
999D000
stack
page read and write
2827000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
4A6E000
trusted library allocation
page read and write
68FA000
trusted library allocation
page read and write
21A4000
trusted library allocation
page read and write
6331000
heap
page read and write
3B0000
heap
page read and write
B90000
unkown
page readonly
16F7000
heap
page read and write
125E000
stack
page read and write
A8F000
stack
page read and write
C84000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
1585000
trusted library allocation
page execute and read and write
16EA000
heap
page read and write
76EA000
heap
page read and write
AE7000
heap
page read and write
6A5E000
stack
page read and write
36F1000
trusted library allocation
page read and write
C2F000
stack
page read and write
AAD000
trusted library allocation
page execute and read and write
279D000
trusted library allocation
page read and write
4EFE000
stack
page read and write
10D0000
heap
page read and write
5ED4000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
1620000
heap
page read and write
3C0000
heap
page read and write
21F0000
trusted library allocation
page execute and read and write
63C0000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
6EEE000
stack
page read and write
27A1000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
1305000
heap
page read and write
3DCE000
trusted library allocation
page read and write
6F8000
heap
page read and write
4D8D000
trusted library section
page readonly
89E000
heap
page read and write
27E7000
trusted library allocation
page read and write
11A000
unkown
page readonly
4C4F000
stack
page read and write
1520000
heap
page read and write
4AD0000
trusted library allocation
page read and write
2ED0000
heap
page read and write
15D0000
heap
page execute and read and write
76BF000
stack
page read and write
15B0000
trusted library allocation
page execute and read and write
1446000
trusted library allocation
page execute and read and write
670E000
stack
page read and write
2857000
trusted library allocation
page read and write
1F5000
heap
page read and write
281B000
trusted library allocation
page read and write
542D000
stack
page read and write
6986000
heap
page read and write
27C3000
trusted library allocation
page read and write
6AAD000
stack
page read and write
5B6E000
stack
page read and write
4291000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
964000
heap
page read and write
A0CE000
stack
page read and write
5450000
heap
page read and write
1587000
trusted library allocation
page execute and read and write
261B000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
2200000
heap
page read and write
2823000
trusted library allocation
page read and write
5630000
heap
page read and write
A9AE000
stack
page read and write
27D3000
trusted library allocation
page read and write
C74000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
693B000
heap
page read and write
63D0000
trusted library allocation
page execute and read and write
27B7000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
517C000
stack
page read and write
5EF7000
trusted library allocation
page read and write
59A0000
heap
page read and write
27C5000
trusted library allocation
page read and write
850000
heap
page read and write
6870000
trusted library allocation
page read and write
285B000
trusted library allocation
page read and write
9E8B000
stack
page read and write
1572000
trusted library allocation
page read and write
2BF0000
heap
page read and write
1470000
trusted library allocation
page read and write
1718000
heap
page read and write
15B0000
trusted library allocation
page read and write
328F000
stack
page read and write
4ECD000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page execute and read and write
27F5000
trusted library allocation
page read and write
76C0000
heap
page read and write
3338000
trusted library allocation
page read and write
559E000
stack
page read and write
2DD8000
trusted library allocation
page read and write
A20000
heap
page read and write
1564000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
14D0000
heap
page read and write
12C6000
heap
page read and write
870000
heap
page read and write
43E000
remote allocation
page execute and read and write
2DCA000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
4E1E000
stack
page read and write
AB3000
trusted library allocation
page read and write
1620000
heap
page read and write
8C4000
heap
page read and write
6E30000
heap
page read and write
975E000
stack
page read and write
1685000
heap
page read and write
49BE000
stack
page read and write
37C3000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
985E000
stack
page read and write
2821000
trusted library allocation
page read and write
58EE000
stack
page read and write
4B3E000
stack
page read and write
1480000
trusted library allocation
page execute and read and write
77D0000
heap
page read and write
10F0000
heap
page read and write
1AC000
stack
page read and write
713000
heap
page read and write
8B7000
heap
page read and write
80E000
stack
page read and write
8EF000
stack
page read and write
58F0000
heap
page execute and read and write
1560000
trusted library allocation
page read and write
684E000
stack
page read and write
16D0000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
5460000
heap
page read and write
4F1E000
stack
page read and write
68F0000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
AC2000
trusted library allocation
page read and write
1080000
heap
page read and write
9ADE000
stack
page read and write
AC6000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
8E5000
heap
page read and write
134F000
heap
page read and write
1580000
trusted library allocation
page read and write
4D7C000
stack
page read and write
2851000
trusted library allocation
page read and write
2510000
heap
page execute and read and write
62BD000
stack
page read and write
A72D000
stack
page read and write
B27000
heap
page read and write
167A000
heap
page read and write
945E000
stack
page read and write
5040000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
3C5000
heap
page read and write
1260000
heap
page read and write
57B0000
heap
page read and write
C80000
trusted library allocation
page read and write
10CE000
stack
page read and write
AFAE000
stack
page read and write
284F000
trusted library allocation
page read and write
27F9000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
9FF000
stack
page read and write
539E000
trusted library allocation
page read and write
6F0000
heap
page read and write
280D000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
CAB000
trusted library allocation
page execute and read and write
2FFE000
trusted library allocation
page read and write
A84000
heap
page read and write
7132000
trusted library allocation
page read and write
4A5B000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
58FE000
stack
page read and write
2819000
trusted library allocation
page read and write
6F7000
stack
page read and write
301B000
heap
page read and write
1990000
trusted library allocation
page read and write
2809000
trusted library allocation
page read and write
1657000
heap
page read and write
9D0E000
stack
page read and write
281D000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
There are 749 hidden memdumps, click here to show them.