IOC Report
PayeeAdvice_HK54912_R0038704_37504.exe

loading gif

Files

File Path
Type
Category
Malicious
PayeeAdvice_HK54912_R0038704_37504.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Dolkestikket\Nocturia.Alm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Dolkestikket\Sipunculoidea.ude
DIY-Thermocam raw data (Lepton 2.x), scale 0-12, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 649037107316853453566312041152512.000000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Dolkestikket\moccasins.ved
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Dolkestikket\sporostrote.dip
data
dropped
C:\Users\user\AppData\Local\Temp\nsj38E6.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PayeeAdvice_HK54912_R0038704_37504.exe
"C:\Users\user\Desktop\PayeeAdvice_HK54912_R0038704_37504.exe"
malicious
C:\Users\user\Desktop\PayeeAdvice_HK54912_R0038704_37504.exe
"C:\Users\user\Desktop\PayeeAdvice_HK54912_R0038704_37504.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://4jjxew.dm.files.1drv.com/D
unknown
https://4jjxew.dm.files.1drv.com/y4mO9x8ZxntK8YWdNZ0APFyw4ftQiKEA3b9ah1Wz-M1CglBAT974LE8XumXkuL0QoN-7vR_btDJUwSahkUS2M93xLAAR6xUxBf6NEExd3XZo57-YMEfTx94x1QxOp2a-8hq__KMNGGaakccwQ1sWJGhyaRsLbTLnjBQxVFJ7n1h5l7q4yyhOY91F-AdnfAux6c4nzAxrfVrEgoQU3Nn3oITjw/KwTCIrYgMbvy217.bin
13.107.43.12
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
http://mail.foodex.com.pk
unknown
https://api.onedrive.com/
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:841675%0D%0ADate%20and%20Time:%2020/11/2024%20/%2019:18:12%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20841675%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://foodex.com.pk
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://4jjxew.dm.files.1drv.com/y4mO9x8ZxntK8YWdNZ0APFyw4ftQiKEA3b9ah1Wz-M1CglBAT974LE8XumXkuL0QoN-
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
132.226.8.169
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://api.onedrive.com/v1.0/shares/s
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:841675%0D%0ADate%20a
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://4jjxew.dm.files.1drv.com/oft
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://4jjxew.dm.files.1drv.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
foodex.com.pk
37.27.123.72
malicious
4jjxew.dm.files.1drv.com
unknown
malicious
mail.foodex.com.pk
unknown
malicious
l-0003.l-dc-msedge.net
13.107.43.12
reallyfreegeoip.org
188.114.96.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.8.169
api.onedrive.com
unknown
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
37.27.123.72
foodex.com.pk
Iran (ISLAMIC Republic Of)
malicious
13.107.43.12
l-0003.l-dc-msedge.net
United States
132.226.8.169
checkip.dyndns.com
United States
149.154.167.220
api.telegram.org
United Kingdom
188.114.96.3
reallyfreegeoip.org
European Union

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\allogeneity
Catabolite
HKEY_CURRENT_USER\Preformative\Uninstall\genitale
varicella
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PayeeAdvice_HK54912_R0038704_37504_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
339C1000
trusted library allocation
page read and write
malicious
8CA000
heap
page read and write
malicious
439B000
direct allocation
page execute and read and write
malicious
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34BAD000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C90000
trusted library allocation
page read and write
34CFD000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CD0000
trusted library allocation
page execute and read and write
37380000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34A7A000
trusted library allocation
page read and write
33B75000
trusted library allocation
page read and write
37380000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
365AE000
heap
page read and write
36CA0000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
33D0B000
trusted library allocation
page read and write
2595000
heap
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35D3A000
trusted library allocation
page read and write
35D20000
trusted library allocation
page read and write
37370000
trusted library allocation
page read and write
3378000
heap
page read and write
36C30000
trusted library allocation
page read and write
35C3D000
stack
page read and write
36C30000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
73405000
unkown
page readonly
36CA0000
trusted library allocation
page read and write
33B82000
trusted library allocation
page read and write
35C00000
trusted library allocation
page read and write
33EA8000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
3674E000
stack
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
36CC0000
trusted library allocation
page execute and read and write
36557000
heap
page read and write
34BA1000
trusted library allocation
page read and write
35C7E000
stack
page read and write
3435000
heap
page read and write
35C80000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
35D30000
trusted library allocation
page read and write
19A000
stack
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
33630000
remote allocation
page read and write
37360000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
37380000
trusted library allocation
page read and write
33A61000
trusted library allocation
page read and write
33BA4000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
322D0000
direct allocation
page read and write
408000
unkown
page readonly
2710000
direct allocation
page read and write
372A5000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36C50000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
37370000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36C50000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
34AF1000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
3330000
heap
page read and write
7AB000
unkown
page read and write
37390000
trusted library allocation
page read and write
33370000
heap
page read and write
4E60000
direct allocation
page read and write
17C000
stack
page read and write
37276000
trusted library allocation
page read and write
373C0000
trusted library allocation
page read and write
32A5000
heap
page read and write
35D20000
trusted library allocation
page read and write
33E2000
heap
page read and write
365DA000
heap
page read and write
36C60000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
10E000
stack
page read and write
33CD8000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
339BF000
stack
page read and write
35C81000
trusted library allocation
page read and write
34CF5000
trusted library allocation
page read and write
3654F000
stack
page read and write
33E7A000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
35CBD000
stack
page read and write
35D40000
trusted library allocation
page read and write
248E000
stack
page read and write
373A0000
trusted library allocation
page execute and read and write
36CB0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
36CA0000
trusted library allocation
page read and write
400000
unkown
page readonly
35C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33A76000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
33BA8000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
349E9000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
33DEF000
trusted library allocation
page read and write
73401000
unkown
page execute read
24DB000
remote allocation
page execute and read and write
7C5000
unkown
page read and write
366F000
stack
page read and write
36D10000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
35D20000
trusted library allocation
page read and write
9B0000
heap
page read and write
35C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
34D3A000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CF0000
trusted library allocation
page execute and read and write
34B01000
trusted library allocation
page read and write
408000
unkown
page readonly
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34C53000
trusted library allocation
page read and write
870000
heap
page read and write
3678E000
stack
page read and write
36CB0000
trusted library allocation
page read and write
33A34000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
33BAE000
trusted library allocation
page read and write
34D1D000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
35D20000
trusted library allocation
page read and write
36C50000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
322F0000
direct allocation
page read and write
C7000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
373B0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34C45000
trusted library allocation
page read and write
34C6F000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
40A000
unkown
page write copy
35C80000
trusted library allocation
page read and write
33D39000
trusted library allocation
page read and write
322B0000
direct allocation
page read and write
33630000
remote allocation
page read and write
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
365A9000
heap
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33CC000
heap
page read and write
37370000
trusted library allocation
page read and write
33A0E000
trusted library allocation
page read and write
35D4D000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34BC5000
trusted library allocation
page read and write
34A93000
trusted library allocation
page read and write
32280000
direct allocation
page read and write
33880000
trusted library allocation
page read and write
34CD4000
trusted library allocation
page read and write
258E000
stack
page read and write
33890000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
26D0000
heap
page read and write
36D10000
trusted library allocation
page read and write
9D5000
heap
page read and write
36CA0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
269F000
stack
page read and write
372A2000
trusted library allocation
page read and write
359C8000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
26C0000
heap
page read and write
35C80000
trusted library allocation
page read and write
34C37000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
36C30000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
34D16000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
36550000
heap
page read and write
33E5000
heap
page read and write
36C40000
trusted library allocation
page read and write
33D93000
trusted library allocation
page read and write
35D30000
trusted library allocation
page read and write
349CB000
trusted library allocation
page read and write
35C90000
trusted library allocation
page read and write
35C10000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33836000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3360000
direct allocation
page read and write
35C80000
trusted library allocation
page read and write
34D08000
trusted library allocation
page read and write
33DE000
heap
page read and write
3350000
direct allocation
page read and write
890000
heap
page read and write
338A0000
heap
page execute and read and write
365FE000
heap
page read and write
36CB0000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
33A25000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
250E000
stack
page read and write
33880000
trusted library allocation
page read and write
34C51000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
35C90000
trusted library allocation
page read and write
408000
unkown
page readonly
35C80000
trusted library allocation
page read and write
373C0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
372E0000
trusted library allocation
page read and write
34CD9000
trusted library allocation
page read and write
96000
stack
page read and write
33880000
trusted library allocation
page read and write
3469000
heap
page read and write
36CA0000
trusted library allocation
page read and write
365F1000
heap
page read and write
34AD9000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
37370000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
35C80000
trusted library allocation
page read and write
349C1000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
3694E000
stack
page read and write
32EE000
stack
page read and write
36CA0000
trusted library allocation
page read and write
34B71000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
408000
unkown
page readonly
2D8F000
stack
page read and write
2744000
heap
page read and write
24C0000
heap
page read and write
36CA0000
trusted library allocation
page read and write
33A72000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33851000
trusted library allocation
page read and write
73403000
unkown
page readonly
33D66000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33896000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
34D23000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
2F00000
direct allocation
page execute and read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
34B10000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
332E000
stack
page read and write
37390000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36D24000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
36D30000
trusted library allocation
page execute and read and write
36C30000
trusted library allocation
page read and write
40A000
unkown
page write copy
34A7C000
trusted library allocation
page read and write
34CEF000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
365C3000
heap
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
3384E000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36D00000
trusted library allocation
page read and write
33A65000
trusted library allocation
page read and write
33B73000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
34ACB000
trusted library allocation
page read and write
36C5F000
trusted library allocation
page read and write
34C4F000
trusted library allocation
page read and write
35D10000
heap
page execute and read and write
2B90000
heap
page read and write
33AA5000
trusted library allocation
page read and write
34C7D000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
399B000
direct allocation
page execute and read and write
36C30000
trusted library allocation
page read and write
349E3000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
7C3000
unkown
page read and write
35D40000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36C40000
trusted library allocation
page read and write
34D33000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33DD000
heap
page read and write
33862000
trusted library allocation
page read and write
34CE5000
trusted library allocation
page read and write
34CCD000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
34AA7000
trusted library allocation
page read and write
33830000
trusted library allocation
page read and write
336AF000
stack
page read and write
365AB000
heap
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34D41000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
36CA0000
trusted library allocation
page read and write
37380000
trusted library allocation
page read and write
33A27000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34B73000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
40A000
unkown
page write copy
4EA0000
heap
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35D30000
trusted library allocation
page read and write
2720000
direct allocation
page read and write
35CFF000
stack
page read and write
35C80000
trusted library allocation
page read and write
401000
unkown
page execute read
365F6000
heap
page read and write
7A6000
unkown
page read and write
35D40000
trusted library allocation
page read and write
7C7000
unkown
page readonly
35C90000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
368CE000
stack
page read and write
36CE0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
365C5000
heap
page read and write
36CA0000
trusted library allocation
page read and write
34C20000
trusted library allocation
page read and write
3420000
heap
page read and write
35C80000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
32290000
direct allocation
page read and write
33B7D000
trusted library allocation
page read and write
35C00000
trusted library allocation
page read and write
372A0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36570000
heap
page read and write
36D10000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34C1A000
trusted library allocation
page read and write
34A8C000
trusted library allocation
page read and write
36C40000
trusted library allocation
page execute and read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
110000
trusted library allocation
page execute and read and write
33BDE000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
36C70000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
33827000
stack
page read and write
34A25000
trusted library allocation
page read and write
33A6E000
trusted library allocation
page read and write
3383E000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
2EDB000
remote allocation
page execute and read and write
33880000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
7C7000
unkown
page readonly
37390000
trusted library allocation
page read and write
33B77000
trusted library allocation
page read and write
37380000
trusted library allocation
page read and write
356F000
stack
page read and write
33CA9000
trusted library allocation
page read and write
33D7000
heap
page read and write
36D10000
trusted library allocation
page read and write
33AC9000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
CAF000
stack
page read and write
35D20000
trusted library allocation
page read and write
359C0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33E5000
heap
page read and write
3366E000
stack
page read and write
33C79000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34AA1000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
3325E000
stack
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33B54000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
35D40000
trusted library allocation
page read and write
336D0000
direct allocation
page read and write
4F70000
heap
page read and write
37390000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
322C0000
direct allocation
page read and write
36C80000
trusted library allocation
page read and write
37367000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
372C0000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D20000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C60000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
34C4B000
trusted library allocation
page read and write
31C0000
heap
page read and write
35C80000
trusted library allocation
page read and write
34CE0000
trusted library allocation
page read and write
34A4A000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C90000
trusted library allocation
page read and write
34A9F000
trusted library allocation
page read and write
82E000
stack
page read and write
A0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
34A4D000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
365DA000
heap
page read and write
35C80000
trusted library allocation
page read and write
33630000
remote allocation
page read and write
35C80000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
365DA000
heap
page read and write
37370000
trusted library allocation
page read and write
3384A000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C90000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C81000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
400000
unkown
page readonly
36C30000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
3422000
heap
page read and write
36D10000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
373B0000
trusted library allocation
page read and write
3370000
heap
page read and write
35C80000
trusted library allocation
page read and write
86E000
stack
page read and write
35C80000
trusted library allocation
page read and write
34AEF000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34AAD000
trusted library allocation
page read and write
782000
unkown
page read and write
37390000
trusted library allocation
page read and write
35C90000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
373B0000
trusted library allocation
page read and write
4E90000
direct allocation
page read and write
36CA0000
trusted library allocation
page read and write
34CC7000
trusted library allocation
page read and write
401000
unkown
page execute read
35D40000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page execute and read and write
34A56000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
37390000
trusted library allocation
page read and write
33390000
heap
page read and write
36CA0000
trusted library allocation
page read and write
401000
unkown
page execute read
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
372B0000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
34A2C000
trusted library allocation
page read and write
34AE8000
trusted library allocation
page read and write
36A4F000
stack
page read and write
34AAF000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
34A2A000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
365F1000
heap
page read and write
33B2000
heap
page read and write
400000
unkown
page readonly
36CB0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34C43000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
2F9B000
direct allocation
page execute and read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
7B3000
unkown
page read and write
7C7000
unkown
page readonly
36CA0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
7A4000
unkown
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34B50000
trusted library allocation
page read and write
338B0000
heap
page read and write
BAF000
stack
page read and write
35D20000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
130000
heap
page read and write
36CA0000
trusted library allocation
page read and write
37370000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
36C30000
trusted library allocation
page read and write
33870000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
3688F000
stack
page read and write
35D36000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34CF2000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33A38000
trusted library allocation
page read and write
7E0000
heap
page read and write
400000
unkown
page readonly
36CA0000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3383B000
trusted library allocation
page read and write
33856000
trusted library allocation
page read and write
33870000
trusted library allocation
page read and write
7C7000
unkown
page readonly
788000
unkown
page read and write
33DE000
heap
page read and write
36C70000
trusted library allocation
page read and write
34B08000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
2740000
heap
page read and write
33A6A000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
33E4C000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34C1E000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36D20000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
33A7A000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
33BB3000
trusted library allocation
page read and write
36555000
heap
page read and write
77C000
unkown
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D50000
heap
page read and write
322A0000
direct allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36D20000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page execute and read and write
33E5000
heap
page read and write
32300000
direct allocation
page read and write
37390000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
33A30000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
4EB0000
direct allocation
page read and write
35C90000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34A5A000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33C0F000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
35D20000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34AAB000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
32A0000
heap
page read and write
36CB0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
322E0000
direct allocation
page read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
336E0000
direct allocation
page read and write
33210000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
373D0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
33DC1000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
2B8F000
stack
page read and write
1A40000
remote allocation
page execute and read and write
35C80000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36D30000
trusted library allocation
page read and write
34C3F000
trusted library allocation
page read and write
3335F000
stack
page read and write
35C80000
trusted library allocation
page read and write
33890000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CE0000
trusted library allocation
page read and write
34B68000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
786000
unkown
page read and write
33A1A000
trusted library allocation
page read and write
33BA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
3385D000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33BA6000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
33865000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34D82000
trusted library allocation
page read and write
35B5E000
stack
page read and write
33890000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35D40000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36A50000
trusted library allocation
page execute and read and write
35C80000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34D9A000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
36CB0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
35D34000
trusted library allocation
page read and write
33A7E000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
35C80000
trusted library allocation
page read and write
34AEB000
trusted library allocation
page read and write
40A000
unkown
page read and write
34C8C000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
33A5D000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36D20000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
34C30000
trusted library allocation
page read and write
372D0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
73400000
unkown
page readonly
3690F000
stack
page read and write
34A9B000
trusted library allocation
page read and write
33880000
trusted library allocation
page read and write
34A76000
trusted library allocation
page read and write
365A5000
heap
page read and write
36CA0000
trusted library allocation
page read and write
36D10000
trusted library allocation
page read and write
1ADB000
remote allocation
page execute and read and write
3660B000
heap
page read and write
33E5000
heap
page read and write
35C80000
trusted library allocation
page read and write
401000
unkown
page execute read
2590000
heap
page read and write
36CA0000
trusted library allocation
page read and write
33B5E000
trusted library allocation
page read and write
36CA0000
trusted library allocation
page read and write
33E1D000
trusted library allocation
page read and write
3372A000
stack
page read and write
35C80000
trusted library allocation
page read and write
898000
heap
page read and write
37370000
trusted library allocation
page read and write
There are 813 hidden memdumps, click here to show them.