IOC Report
Wire slip account payable.pif.exe

loading gif

Files

File Path
Type
Category
Malicious
Wire slip account payable.pif.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Wire slip account payable.pif.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp14C9.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\EQVRGq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EQVRGq.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EQVRGq.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ypxrbms.yze.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lv25mif.uv5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5njz4ciw.ht5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adexolz3.0ml.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_li32tpuz.cnu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_njlbv4uw.ugk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwi1m25g.lp3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qemwcahn.ude.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp25B1.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wire slip account payable.pif.exe
"C:\Users\user\Desktop\Wire slip account payable.pif.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Wire slip account payable.pif.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EQVRGq.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EQVRGq" /XML "C:\Users\user\AppData\Local\Temp\tmp14C9.tmp"
malicious
C:\Users\user\Desktop\Wire slip account payable.pif.exe
"C:\Users\user\Desktop\Wire slip account payable.pif.exe"
malicious
C:\Users\user\AppData\Roaming\EQVRGq.exe
C:\Users\user\AppData\Roaming\EQVRGq.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EQVRGq" /XML "C:\Users\user\AppData\Local\Temp\tmp25B1.tmp"
malicious
C:\Users\user\AppData\Roaming\EQVRGq.exe
"C:\Users\user\AppData\Roaming\EQVRGq.exe"
malicious
C:\Users\user\AppData\Roaming\EQVRGq.exe
"C:\Users\user\AppData\Roaming\EQVRGq.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
https://api.telegram.org
unknown
http://www.fontbureau.com/designers?
unknown
https://api.telegram.org/bot7180778750:AAGcpZL53RI1C6DEr2Yp4lM3UKxKArXTZ4I/sendDocument
149.154.167.220
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
https://api.telegram.org/bot7180778750:AAGcpZL53RI1C6DEr2Yp4lM3UKxKArXTZ4I/
unknown
http://www.goodfont.co.kr
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://ip-api.com
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wire slip account payable_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EQVRGq_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
30E7000
trusted library allocation
page read and write
malicious
3D39000
trusted library allocation
page read and write
malicious
3061000
trusted library allocation
page read and write
malicious
2C67000
trusted library allocation
page read and write
malicious
2BE1000
trusted library allocation
page read and write
malicious
30BD000
trusted library allocation
page read and write
malicious
433000
remote allocation
page execute and read and write
malicious
30C5000
trusted library allocation
page read and write
malicious
E64000
trusted library allocation
page read and write
6CAE000
stack
page read and write
52F0000
trusted library allocation
page execute and read and write
A73000
trusted library allocation
page execute and read and write
7020000
heap
page read and write
6ABF000
stack
page read and write
5650000
heap
page execute and read and write
31D6000
trusted library allocation
page read and write
CAA000
heap
page read and write
306E000
stack
page read and write
FB6000
trusted library allocation
page read and write
64A3000
heap
page read and write
99BE000
stack
page read and write
6430000
heap
page read and write
6C10000
trusted library allocation
page execute and read and write
648A000
heap
page read and write
A9A000
trusted library allocation
page execute and read and write
FC7000
heap
page read and write
6F2E000
stack
page read and write
4D0000
heap
page read and write
3020000
trusted library allocation
page read and write
2940000
heap
page execute and read and write
5340000
trusted library allocation
page read and write
1493000
heap
page read and write
67B2000
heap
page read and write
5230000
heap
page read and write
5276000
trusted library allocation
page read and write
E0E000
stack
page read and write
3A9E000
trusted library allocation
page read and write
6AFE000
stack
page read and write
2C62000
trusted library allocation
page read and write
A01B000
stack
page read and write
12D0000
heap
page read and write
2A5E000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
3C4C000
trusted library allocation
page read and write
1162000
trusted library allocation
page read and write
B55000
heap
page read and write
11F0000
heap
page read and write
77C0000
trusted library section
page read and write
AED1000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
127C000
stack
page read and write
6444000
heap
page read and write
522D000
stack
page read and write
10F2000
heap
page read and write
520C000
stack
page read and write
6D7E000
stack
page read and write
701C000
heap
page read and write
4D50000
heap
page read and write
1489000
heap
page read and write
423000
remote allocation
page execute and read and write
5750000
heap
page read and write
CB5000
heap
page read and write
5250000
trusted library allocation
page read and write
BB7000
trusted library allocation
page execute and read and write
A96000
trusted library allocation
page execute and read and write
13D7000
heap
page read and write
7030000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
120E000
stack
page read and write
6BAE000
stack
page read and write
67D0000
trusted library allocation
page read and write
FC0000
heap
page read and write
C45000
heap
page read and write
6A10000
heap
page read and write
54A6000
trusted library allocation
page read and write
5254000
trusted library allocation
page read and write
5700000
heap
page read and write
2B80000
trusted library allocation
page read and write
2FEE000
stack
page read and write
1167000
trusted library allocation
page execute and read and write
6DEE000
stack
page read and write
5440000
heap
page execute and read and write
7008000
heap
page read and write
5690000
heap
page read and write
A92000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1146000
heap
page read and write
6BD0000
trusted library allocation
page read and write
116B000
trusted library allocation
page execute and read and write
977E000
stack
page read and write
568C000
stack
page read and write
400000
remote allocation
page execute and read and write
9C3E000
stack
page read and write
58B0000
trusted library allocation
page execute and read and write
6FD9000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
4C9B000
trusted library allocation
page read and write
40CC000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
1250000
heap
page read and write
123E000
stack
page read and write
4C90000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
6FDF000
heap
page read and write
78CD000
stack
page read and write
4061000
trusted library allocation
page read and write
700000
heap
page read and write
7490000
trusted library allocation
page execute and read and write
1610000
heap
page read and write
5310000
trusted library allocation
page execute and read and write
62EE000
stack
page read and write
2BA1000
trusted library allocation
page read and write
4BE8000
trusted library allocation
page read and write
302F000
stack
page read and write
E78000
heap
page read and write
11E0000
trusted library allocation
page read and write
10BE000
heap
page read and write
1D0000
heap
page read and write
AC3E000
stack
page read and write
539B000
stack
page read and write
6E20000
trusted library allocation
page read and write
6AEE000
stack
page read and write
13AD000
trusted library allocation
page execute and read and write
A4E000
stack
page read and write
2B8B000
trusted library allocation
page read and write
54E0000
heap
page read and write
1092000
trusted library allocation
page read and write
13A3000
trusted library allocation
page execute and read and write
D58000
stack
page read and write
13CA000
trusted library allocation
page execute and read and write
2E70000
heap
page read and write
12C0000
trusted library allocation
page read and write
1156000
trusted library allocation
page execute and read and write
A7D000
trusted library allocation
page execute and read and write
2D52000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
A9AE000
stack
page read and write
692E000
stack
page read and write
1617000
heap
page read and write
A46E000
stack
page read and write
6E10000
trusted library allocation
page read and write
A8AD000
stack
page read and write
13F0000
heap
page read and write
6980000
heap
page read and write
3030000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
A80000
trusted library allocation
page read and write
3A23000
trusted library allocation
page read and write
6B17000
trusted library allocation
page read and write
4DF4000
trusted library section
page readonly
12AE000
stack
page read and write
1423000
heap
page read and write
3951000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
6E7F000
stack
page read and write
EFF000
heap
page read and write
6B6F000
stack
page read and write
422000
remote allocation
page execute and read and write
2DFE000
stack
page read and write
682D000
stack
page read and write
1080000
trusted library allocation
page read and write
C5A000
stack
page read and write
525B000
trusted library allocation
page read and write
3AF4000
trusted library allocation
page read and write
6E50000
heap
page read and write
11B0000
trusted library allocation
page execute and read and write
4CB6000
trusted library allocation
page read and write
2E70000
heap
page read and write
54BE000
trusted library allocation
page read and write
515D000
stack
page read and write
12C4000
trusted library allocation
page read and write
E35000
heap
page read and write
106D000
trusted library allocation
page execute and read and write
54B2000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
148F000
heap
page read and write
318E000
trusted library allocation
page read and write
C1A000
heap
page read and write
100E000
stack
page read and write
1180000
trusted library allocation
page read and write
6DFE000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
1086000
trusted library allocation
page execute and read and write
3B96000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
2E3C000
stack
page read and write
1073000
trusted library allocation
page read and write
69AD000
trusted library allocation
page read and write
564D000
stack
page read and write
4D30000
heap
page read and write
2CC0000
trusted library allocation
page read and write
4D60000
trusted library allocation
page execute and read and write
403000
remote allocation
page execute and read and write
1090000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
C10000
heap
page read and write
B80000
heap
page read and write
C55000
heap
page read and write
1280000
heap
page read and write
A56E000
stack
page read and write
107D000
trusted library allocation
page execute and read and write
1570000
heap
page read and write
4089000
trusted library allocation
page read and write
1E0000
heap
page read and write
4F0C000
stack
page read and write
69A7000
trusted library allocation
page read and write
275B000
stack
page read and write
1178000
heap
page read and write
A3A1000
trusted library allocation
page read and write
A83000
trusted library allocation
page read and write
2E40000
trusted library allocation
page execute and read and write
6FD2000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
B50000
heap
page read and write
58A0000
heap
page read and write
52A0000
trusted library allocation
page read and write
6740000
heap
page read and write
41C000
remote allocation
page execute and read and write
4E0B000
stack
page read and write
7420000
trusted library allocation
page execute and read and write
9FD000
stack
page read and write
13A4000
trusted library allocation
page read and write
64FE000
stack
page read and write
4DEC000
stack
page read and write
5640000
heap
page execute and read and write
74EE000
stack
page read and write
291C000
stack
page read and write
E50000
trusted library allocation
page read and write
67B0000
heap
page read and write
1597000
heap
page read and write
AB3D000
stack
page read and write
E00000
heap
page read and write
6FD6000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
A39E000
stack
page read and write
6DF9000
trusted library allocation
page read and write
11C0000
heap
page execute and read and write
7A3E000
stack
page read and write
A11C000
stack
page read and write
BAE000
stack
page read and write
13B0000
trusted library allocation
page read and write
180000
heap
page read and write
1CE000
unkown
page read and write
E70000
heap
page read and write
6FDE000
trusted library allocation
page read and write
C1E000
heap
page read and write
5300000
trusted library allocation
page read and write
4071000
trusted library allocation
page read and write
9E7E000
stack
page read and write
2788000
trusted library allocation
page read and write
67E9000
heap
page read and write
AD7C000
stack
page read and write
2E78000
heap
page read and write
EE2000
heap
page read and write
68F000
stack
page read and write
67E7000
trusted library allocation
page read and write
6840000
heap
page read and write
2D8B000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
39E5000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
6E80000
trusted library allocation
page execute and read and write
3188000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
64E000
stack
page read and write
1149000
heap
page read and write
1600000
trusted library allocation
page read and write
5235000
heap
page read and write
E60000
trusted library allocation
page read and write
EF7000
stack
page read and write
6FD0000
heap
page read and write
5270000
heap
page read and write
13AE000
stack
page read and write
B0A000
stack
page read and write
EFC000
heap
page read and write
7B5F000
heap
page read and write
13BD000
trusted library allocation
page execute and read and write
2770000
heap
page read and write
1140000
trusted library allocation
page read and write
1064000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
4CAE000
trusted library allocation
page read and write
58C0000
heap
page read and write
2E3E000
unkown
page read and write
5800000
heap
page read and write
DFE000
stack
page read and write
1010000
heap
page read and write
A90000
trusted library allocation
page read and write
5805000
heap
page read and write
6FD0000
trusted library allocation
page read and write
71CF000
stack
page read and write
4D38000
trusted library allocation
page read and write
9C2000
unkown
page readonly
4D10000
heap
page execute and read and write
10D7000
heap
page read and write
6A20000
trusted library allocation
page execute and read and write
790E000
stack
page read and write
1285000
heap
page read and write
2AE0000
heap
page read and write
13E2000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
7D3F000
stack
page read and write
2BD0000
heap
page read and write
13C6000
trusted library allocation
page execute and read and write
67B4000
heap
page read and write
2920000
trusted library allocation
page read and write
5710000
heap
page read and write
2D6C000
trusted library allocation
page read and write
C30000
heap
page read and write
2C71000
trusted library allocation
page read and write
1550000
trusted library allocation
page execute and read and write
3050000
heap
page execute and read and write
3B76000
trusted library allocation
page read and write
69B7000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
9AFD000
stack
page read and write
E30000
heap
page read and write
10BA000
heap
page read and write
2D5E000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
8F7000
stack
page read and write
67E0000
trusted library allocation
page read and write
6794000
heap
page read and write
69A0000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
A74000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
60F000
unkown
page read and write
12D7000
heap
page read and write
A66D000
stack
page read and write
1050000
trusted library allocation
page read and write
69A3000
trusted library allocation
page read and write
67DD000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
7B73000
heap
page read and write
51BF000
stack
page read and write
2D12000
trusted library allocation
page read and write
1082000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
261E000
stack
page read and write
1560000
trusted library allocation
page read and write
10B0000
heap
page read and write
7320000
heap
page read and write
3C7A000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
5C0D000
stack
page read and write
12BE000
stack
page read and write
1150000
trusted library allocation
page read and write
6E60000
heap
page read and write
CB9000
heap
page read and write
AC7C000
stack
page read and write
4D7D000
stack
page read and write
109B000
trusted library allocation
page execute and read and write
98BE000
stack
page read and write
2FAE000
unkown
page read and write
5300000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
15EE000
stack
page read and write
7430000
trusted library allocation
page read and write
E6D000
trusted library allocation
page execute and read and write
11D0000
trusted library allocation
page read and write
6ECE000
stack
page read and write
2BC5000
trusted library allocation
page read and write
6CBE000
stack
page read and write
30AF000
stack
page read and write
7450000
trusted library allocation
page read and write
149C000
heap
page read and write
A0E000
stack
page read and write
5960000
trusted library section
page read and write
411000
remote allocation
page execute and read and write
5320000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
1590000
heap
page read and write
6EEE000
stack
page read and write
3959000
trusted library allocation
page read and write
1419000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
2C2E000
stack
page read and write
6DF6000
trusted library allocation
page read and write
3F76000
trusted library allocation
page read and write
6998000
trusted library allocation
page read and write
6B2E000
stack
page read and write
4D7B000
trusted library allocation
page read and write
EA4000
heap
page read and write
2BC0000
trusted library allocation
page read and write
9B00000
heap
page read and write
13D0000
heap
page read and write
13C2000
trusted library allocation
page read and write
3C09000
trusted library allocation
page read and write
12CE000
stack
page read and write
2930000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
2BE0000
heap
page execute and read and write
A70000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
5080000
heap
page read and write
11F7000
heap
page read and write
ADBE000
stack
page read and write
A15E000
stack
page read and write
115A000
trusted library allocation
page execute and read and write
10F9000
stack
page read and write
13C0000
trusted library allocation
page read and write
5280000
heap
page read and write
6BC0000
trusted library allocation
page read and write
1426000
heap
page read and write
3024000
trusted library allocation
page read and write
C57000
heap
page read and write
6B10000
trusted library allocation
page read and write
6BC2000
trusted library allocation
page read and write
7260000
heap
page read and write
4CB1000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
77AE000
stack
page read and write
3192000
trusted library allocation
page read and write
E63000
trusted library allocation
page execute and read and write
2BC0000
heap
page read and write
108A000
trusted library allocation
page execute and read and write
11AC000
heap
page read and write
4CBD000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5D0000
heap
page read and write
54AE000
trusted library allocation
page read and write
A8D000
trusted library allocation
page execute and read and write
DD000
stack
page read and write
52EE000
stack
page read and write
DC0000
heap
page read and write
53B3000
heap
page read and write
13E0000
trusted library allocation
page read and write
6479000
heap
page read and write
675B000
heap
page read and write
1165000
trusted library allocation
page execute and read and write
13F7000
heap
page read and write
5C0000
heap
page read and write
CFE000
heap
page read and write
1160000
trusted library allocation
page read and write
13E7000
trusted library allocation
page execute and read and write
526E000
trusted library allocation
page read and write
4D53000
heap
page read and write
AEBE000
stack
page read and write
3D31000
trusted library allocation
page read and write
561C000
stack
page read and write
6CED000
stack
page read and write
9B10000
heap
page read and write
6E70000
trusted library allocation
page execute and read and write
2BAD000
trusted library allocation
page read and write
4C94000
trusted library allocation
page read and write
53B0000
heap
page read and write
1097000
trusted library allocation
page execute and read and write
573E000
heap
page read and write
58D0000
heap
page read and write
30C1000
trusted library allocation
page read and write
776E000
stack
page read and write
2BD0000
heap
page read and write
10E4000
heap
page read and write
6F42000
trusted library allocation
page read and write
BA0000
heap
page read and write
30D5000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
5890000
heap
page read and write
AA0000
heap
page read and write
A25E000
stack
page read and write
31DE000
trusted library allocation
page read and write
5010000
heap
page read and write
69C0000
heap
page read and write
2C5E000
trusted library allocation
page read and write
9D3E000
stack
page read and write
3026000
trusted library allocation
page read and write
987E000
stack
page read and write
1153000
heap
page read and write
C00000
trusted library allocation
page execute and read and write
53A0000
trusted library section
page readonly
788E000
stack
page read and write
7B40000
heap
page read and write
29AB000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
6BBF000
stack
page read and write
2D2E000
stack
page read and write
A86E000
stack
page read and write
A29E000
stack
page read and write
30BB000
trusted library allocation
page read and write
7B3F000
stack
page read and write
124E000
stack
page read and write
3BE1000
trusted library allocation
page read and write
2F7E000
stack
page read and write
6DF2000
trusted library allocation
page read and write
6FCE000
stack
page read and write
FB4000
trusted library allocation
page read and write
B90000
heap
page read and write
2B7E000
stack
page read and write
AA5000
heap
page read and write
A670000
heap
page read and write
2A5C000
trusted library allocation
page read and write
271E000
stack
page read and write
1070000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
5693000
heap
page read and write
4D42000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
3FB8000
trusted library allocation
page read and write
BBB000
trusted library allocation
page execute and read and write
58DC000
stack
page read and write
412000
remote allocation
page execute and read and write
CC5000
heap
page read and write
5020000
heap
page read and write
2B92000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
BEE000
stack
page read and write
52D0000
heap
page read and write
1190000
heap
page read and write
9D7D000
stack
page read and write
BB2000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
99FD000
stack
page read and write
52F0000
heap
page read and write
113E000
stack
page read and write
11A000
stack
page read and write
4DF0000
trusted library section
page readonly
114D000
trusted library allocation
page execute and read and write
31D2000
trusted library allocation
page read and write
9C0000
unkown
page readonly
68EE000
stack
page read and write
54A000
stack
page read and write
A3A000
stack
page read and write
6850000
trusted library allocation
page execute and read and write
732E000
heap
page read and write
7EE40000
trusted library allocation
page execute and read and write
E9A000
heap
page read and write
5273000
heap
page read and write
1152000
trusted library allocation
page read and write
13E5000
trusted library allocation
page execute and read and write
69FD000
stack
page read and write
DD0000
heap
page read and write
D5A000
stack
page read and write
7F010000
trusted library allocation
page execute and read and write
10CF000
heap
page read and write
5030000
trusted library allocation
page execute and read and write
4DB000
heap
page read and write
6C6E000
stack
page read and write
6BCA000
trusted library allocation
page read and write
A36E000
stack
page read and write
3170000
heap
page read and write
6940000
trusted library allocation
page execute and read and write
13EB000
trusted library allocation
page execute and read and write
2925000
trusted library allocation
page read and write
DB0000
heap
page read and write
10F5000
heap
page read and write
30F1000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
3A61000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
67C8000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
EA6000
heap
page read and write
1063000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
3BF8000
trusted library allocation
page read and write
61ED000
stack
page read and write
2D08000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
6481000
heap
page read and write
2D0E000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
2BA6000
trusted library allocation
page read and write
There are 570 hidden memdumps, click here to show them.