IOC Report
payment Receipt.exe

loading gif

Files

File Path
Type
Category
Malicious
payment Receipt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\meshummad
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\payment Receipt.exe
"C:\Users\user\Desktop\payment Receipt.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\payment Receipt.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\payment Receipt.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
204.10.160.224:27667
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E9C000
heap
page read and write
3D13000
direct allocation
page read and write
3C03000
heap
page read and write
EF5DFFE000
stack
page read and write
7C1E000
stack
page read and write
43F5000
heap
page read and write
2BAB000
trusted library allocation
page read and write
42E8000
heap
page read and write
BDE000
heap
page read and write
42E8000
heap
page read and write
201BEB78000
heap
page read and write
148D000
heap
page read and write
A50000
heap
page read and write
42FB000
heap
page read and write
2BD2000
trusted library allocation
page read and write
42E8000
heap
page read and write
2C83000
trusted library allocation
page read and write
420C000
heap
page read and write
42E8000
heap
page read and write
2C4F000
trusted library allocation
page read and write
B74000
heap
page read and write
4378000
heap
page read and write
EF5D5FA000
stack
page read and write
D70000
trusted library allocation
page read and write
433D000
heap
page read and write
420C000
heap
page read and write
D80000
trusted library allocation
page read and write
4AB000
unkown
page readonly
1F0000
heap
page read and write
BDA000
heap
page read and write
3ADF000
stack
page read and write
3BE0000
direct allocation
page read and write
3B50000
direct allocation
page read and write
42D7000
heap
page read and write
3960000
direct allocation
page read and write
420C000
heap
page read and write
49D9000
direct allocation
page read and write
49DD000
direct allocation
page read and write
4A89000
direct allocation
page read and write
751F000
stack
page read and write
57A8000
trusted library allocation
page read and write
41EE000
heap
page read and write
420C000
heap
page read and write
BD0000
heap
page read and write
48E3000
direct allocation
page read and write
426B000
heap
page read and write
39F0000
direct allocation
page read and write
5AB0000
trusted library allocation
page execute and read and write
42FE000
heap
page read and write
420C000
heap
page read and write
A40000
heap
page read and write
42FB000
heap
page read and write
5786000
trusted library allocation
page read and write
5A8B000
stack
page read and write
5540000
heap
page read and write
47C0000
direct allocation
page read and write
344A000
trusted library allocation
page read and write
3A83000
direct allocation
page read and write
43F5000
heap
page read and write
42E8000
heap
page read and write
47C0000
direct allocation
page read and write
491000
unkown
page write copy
41D2000
heap
page read and write
4405000
heap
page execute and read and write
42FB000
heap
page read and write
42FB000
heap
page read and write
2C92000
trusted library allocation
page read and write
537C000
stack
page read and write
41AE000
heap
page read and write
140A000
heap
page read and write
4841000
heap
page read and write
42FB000
heap
page read and write
5282000
heap
page read and write
42E8000
heap
page read and write
A21000
heap
page read and write
15E000
stack
page read and write
5830000
heap
page read and write
420C000
heap
page read and write
42E8000
heap
page read and write
2CF7000
trusted library allocation
page read and write
4162000
heap
page read and write
43F5000
heap
page read and write
2F95000
heap
page read and write
42FF000
heap
page read and write
42FB000
heap
page read and write
2CED000
trusted library allocation
page read and write
A3F000
heap
page read and write
4A4E000
direct allocation
page read and write
EF5DEFD000
stack
page read and write
D92000
trusted library allocation
page read and write
42FB000
heap
page read and write
5220000
trusted library section
page readonly
428A000
heap
page read and write
43F5000
heap
page read and write
4378000
heap
page read and write
426B000
heap
page read and write
4289000
heap
page read and write
A50000
heap
page read and write
48E3000
direct allocation
page read and write
3BCB000
direct allocation
page read and write
5840000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
42E8000
heap
page read and write
1477000
heap
page read and write
779E000
stack
page read and write
43F5000
heap
page read and write
42E8000
heap
page read and write
765E000
stack
page read and write
42E8000
heap
page read and write
2CBB000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
48BB000
heap
page read and write
4140000
heap
page read and write
7A34000
heap
page read and write
48B0000
direct allocation
page read and write
1886000
trusted library allocation
page execute and read and write
EF5E0FF000
stack
page read and write
420C000
heap
page read and write
2B01000
trusted library allocation
page read and write
41EE000
heap
page read and write
42E8000
heap
page read and write
4AB000
unkown
page readonly
4289000
heap
page read and write
349D000
trusted library allocation
page read and write
4378000
heap
page read and write
E3E000
heap
page read and write
420C000
heap
page read and write
49D9000
direct allocation
page read and write
201BEB70000
heap
page read and write
420C000
heap
page read and write
E89000
heap
page read and write
420C000
heap
page read and write
43F5000
heap
page read and write
3B56000
heap
page read and write
414E000
heap
page read and write
4A4E000
direct allocation
page read and write
100000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
4289000
heap
page read and write
2C75000
trusted library allocation
page read and write
426A000
heap
page read and write
43F5000
heap
page read and write
2B6A000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
C9F000
heap
page read and write
428A000
heap
page read and write
42E8000
heap
page read and write
2D3C000
trusted library allocation
page read and write
428A000
heap
page read and write
D9B000
trusted library allocation
page execute and read and write
42FB000
heap
page read and write
5050000
heap
page read and write
2CF3000
trusted library allocation
page read and write
910000
heap
page read and write
4F66000
trusted library allocation
page read and write
97A000
heap
page read and write
43F5000
heap
page read and write
4F72000
trusted library allocation
page read and write
426C000
heap
page read and write
3C14000
heap
page read and write
188A000
trusted library allocation
page execute and read and write
44C7000
heap
page read and write
E95000
heap
page read and write
57E0000
trusted library allocation
page read and write
426B000
heap
page read and write
E06000
heap
page read and write
42FB000
heap
page read and write
6CA0000
trusted library allocation
page read and write
44A1000
heap
page read and write
4289000
heap
page read and write
3431000
trusted library allocation
page read and write
4289000
heap
page read and write
E74000
heap
page read and write
1060000
heap
page read and write
420C000
heap
page read and write
4A8000
unkown
page read and write
B37000
stack
page read and write
45B9000
heap
page read and write
187D000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
420C000
heap
page read and write
42E8000
heap
page read and write
EF5DCFF000
stack
page read and write
43F5000
heap
page read and write
47CE000
heap
page read and write
201C0460000
heap
page read and write
426C000
heap
page read and write
9A000
stack
page read and write
482000
unkown
page readonly
426B000
heap
page read and write
576E000
trusted library allocation
page read and write
4289000
heap
page read and write
1465000
heap
page read and write
426B000
heap
page read and write
41EE000
heap
page read and write
B80000
heap
page read and write
5764000
trusted library allocation
page read and write
4378000
heap
page read and write
48B0000
direct allocation
page read and write
7A68000
heap
page read and write
420C000
heap
page read and write
4A8D000
direct allocation
page read and write
36CE000
stack
page read and write
58B3000
heap
page read and write
41EE000
heap
page read and write
ABC000
heap
page read and write
4F90000
trusted library allocation
page read and write
7A20000
heap
page read and write
73DE000
stack
page read and write
3499000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
1330000
heap
page read and write
420C000
heap
page read and write
410C000
heap
page read and write
34DD000
trusted library allocation
page read and write
1864000
trusted library allocation
page read and write
7A6F000
heap
page read and write
48B0000
direct allocation
page read and write
4A4E000
direct allocation
page read and write
41F6000
heap
page read and write
426B000
heap
page read and write
5890000
trusted library section
page readonly
53D0000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
4378000
heap
page read and write
970000
heap
page read and write
729E000
stack
page read and write
4289000
heap
page read and write
41EE000
heap
page read and write
426C000
heap
page read and write
4A89000
direct allocation
page read and write
426B000
heap
page read and write
490D000
heap
page read and write
420C000
heap
page read and write
4378000
heap
page read and write
4F4E000
trusted library allocation
page read and write
17CF000
stack
page read and write
5250000
heap
page read and write
2CF1000
trusted library allocation
page read and write
401000
unkown
page execute read
9F8000
heap
page read and write
43F5000
heap
page read and write
4287000
heap
page read and write
41EE000
heap
page read and write
4378000
heap
page read and write
4289000
heap
page read and write
4AB000
unkown
page readonly
49DD000
direct allocation
page read and write
41FB000
heap
page execute and read and write
1010000
trusted library allocation
page execute and read and write
4378000
heap
page read and write
DD0000
heap
page read and write
420C000
heap
page read and write
42FB000
heap
page read and write
42FF000
heap
page read and write
1890000
trusted library allocation
page read and write
42B8000
heap
page read and write
4377000
heap
page read and write
3387000
trusted library allocation
page read and write
A20000
heap
page read and write
49D9000
direct allocation
page read and write
9A000
stack
page read and write
4161000
heap
page read and write
43F5000
heap
page read and write
577E000
trusted library allocation
page read and write
420C000
heap
page read and write
4289000
heap
page read and write
34CF000
trusted library allocation
page read and write
42E8000
heap
page read and write
2C85000
trusted library allocation
page read and write
97E000
heap
page read and write
4142000
heap
page read and write
3EC0000
heap
page read and write
401000
unkown
page execute read
4289000
heap
page read and write
A3A000
stack
page read and write
41EE000
heap
page read and write
2C87000
trusted library allocation
page read and write
15DE000
stack
page read and write
42FB000
heap
page read and write
2CD2000
trusted library allocation
page read and write
4289000
heap
page read and write
3ACF000
stack
page read and write
4376000
heap
page read and write
4268000
heap
page read and write
38D0000
direct allocation
page read and write
42FB000
heap
page read and write
3C93000
heap
page read and write
3C07000
heap
page read and write
4378000
heap
page read and write
400000
system
page execute and read and write
57A5000
trusted library allocation
page read and write
4378000
heap
page read and write
E7F000
heap
page read and write
426B000
heap
page read and write
DD8000
heap
page read and write
42E8000
heap
page read and write
31B0000
trusted library allocation
page read and write
9D0000
heap
page read and write
2EE0000
heap
page read and write
42FB000
heap
page read and write
47C0000
direct allocation
page read and write
426C000
heap
page read and write
4A7000
unkown
page read and write
2C70000
trusted library allocation
page read and write
D00000
heap
page read and write
2CEF000
trusted library allocation
page read and write
428A000
heap
page read and write
B70000
heap
page read and write
4378000
heap
page read and write
EF5D9FE000
stack
page read and write
4378000
heap
page read and write
34E1000
trusted library allocation
page read and write
345F000
trusted library allocation
page read and write
43F5000
heap
page read and write
C3D000
heap
page read and write
42E8000
heap
page read and write
2C81000
trusted library allocation
page read and write
422D000
heap
page read and write
5230000
heap
page execute and read and write
4367000
heap
page read and write
48E9000
direct allocation
page read and write
4289000
heap
page read and write
4289000
heap
page read and write
4112000
heap
page read and write
C0C000
heap
page read and write
42E8000
heap
page read and write
7A62000
heap
page read and write
1970000
heap
page read and write
351C000
trusted library allocation
page read and write
43F5000
heap
page read and write
42FB000
heap
page read and write
4950000
heap
page read and write
347D000
trusted library allocation
page read and write
426B000
heap
page read and write
401000
unkown
page execute read
41EE000
heap
page read and write
900000
heap
page read and write
42FB000
heap
page read and write
342B000
trusted library allocation
page read and write
413D000
heap
page read and write
486C000
heap
page read and write
CAD000
heap
page read and write
426C000
heap
page read and write
48B0000
direct allocation
page read and write
3B01000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
41EE000
heap
page read and write
42FB000
heap
page read and write
140F000
heap
page read and write
3472000
trusted library allocation
page read and write
426B000
heap
page read and write
42E8000
heap
page read and write
5850000
trusted library allocation
page execute and read and write
3465000
trusted library allocation
page read and write
4378000
heap
page read and write
201BEB45000
heap
page read and write
2C64000
trusted library allocation
page read and write
43F5000
heap
page read and write
42FB000
heap
page read and write
578D000
trusted library allocation
page read and write
41EE000
heap
page read and write
41C7000
heap
page read and write
A55000
heap
page read and write
422B000
heap
page read and write
70AE000
heap
page read and write
42FB000
heap
page read and write
13FB000
heap
page read and write
3EA0000
heap
page read and write
42E6000
heap
page read and write
426A000
heap
page read and write
4131000
heap
page read and write
420C000
heap
page read and write
4379000
heap
page read and write
4379000
heap
page read and write
4F8F000
trusted library allocation
page read and write
43F5000
heap
page read and write
4379000
heap
page read and write
347B000
trusted library allocation
page read and write
492000
unkown
page read and write
904000
heap
page read and write
201BEBBD000
heap
page read and write
41EE000
heap
page read and write
43F5000
heap
page read and write
1863000
trusted library allocation
page execute and read and write
34EB000
trusted library allocation
page read and write
4289000
heap
page read and write
8B4000
stack
page read and write
2CD6000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
4289000
heap
page read and write
4FD0000
trusted library allocation
page read and write
41EE000
heap
page read and write
4370000
heap
page read and write
342D000
trusted library allocation
page read and write
3482000
trusted library allocation
page read and write
4378000
heap
page read and write
48E9000
direct allocation
page read and write
742E000
heap
page read and write
184E000
stack
page read and write
426B000
heap
page read and write
531B000
stack
page read and write
401000
unkown
page execute read
3C10000
heap
page read and write
D10000
heap
page read and write
4A8D000
direct allocation
page read and write
425A000
heap
page read and write
43F5000
heap
page read and write
3B60000
direct allocation
page read and write
3982000
heap
page read and write
34B6000
trusted library allocation
page read and write
41EE000
heap
page read and write
42FB000
heap
page read and write
4312000
heap
page execute and read and write
1950000
heap
page read and write
34B4000
trusted library allocation
page read and write
43F5000
heap
page read and write
E0000
heap
page read and write
43EE000
heap
page read and write
4F61000
trusted library allocation
page read and write
3BF5000
heap
page read and write
43F5000
heap
page read and write
1860000
trusted library allocation
page read and write
5509000
heap
page read and write
4F6D000
trusted library allocation
page read and write
5500000
heap
page read and write
4289000
heap
page read and write
2DE0000
heap
page read and write
4289000
heap
page read and write
3B68000
heap
page read and write
6C9D000
stack
page read and write
3C03000
heap
page read and write
2C68000
trusted library allocation
page read and write
4162000
heap
page read and write
43F5000
heap
page read and write
AB2000
heap
page read and write
2BFE000
trusted library allocation
page read and write
420C000
heap
page read and write
94E000
stack
page read and write
2C49000
trusted library allocation
page read and write
4F4B000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
426B000
heap
page read and write
3463000
trusted library allocation
page read and write
42FB000
heap
page read and write
4378000
heap
page read and write
3484000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
42E8000
heap
page read and write
31D0000
heap
page execute and read and write
11EF000
stack
page read and write
42FB000
heap
page read and write
400000
unkown
page readonly
42FB000
heap
page read and write
41EE000
heap
page read and write
741E000
stack
page read and write
EF5E1FC000
stack
page read and write
4289000
heap
page read and write
3DC0000
heap
page read and write
4AFE000
direct allocation
page read and write
43F5000
heap
page read and write
423B000
heap
page read and write
38CE000
stack
page read and write
4306000
heap
page read and write
34CD000
trusted library allocation
page read and write
1337000
stack
page read and write
4289000
heap
page read and write
201BEAF0000
heap
page read and write
490000
unkown
page write copy
3446000
trusted library allocation
page read and write
42FB000
heap
page read and write
43F5000
heap
page read and write
421E000
heap
page read and write
4A8D000
direct allocation
page read and write
42E1000
trusted library allocation
page read and write
8AF000
stack
page read and write
41EE000
heap
page read and write
41EE000
heap
page read and write
4289000
heap
page read and write
D50000
trusted library allocation
page read and write
495E000
direct allocation
page read and write
41EE000
heap
page read and write
1940000
trusted library allocation
page read and write
170000
heap
page read and write
41EE000
heap
page read and write
47C0000
direct allocation
page read and write
4377000
heap
page read and write
426A000
heap
page read and write
428A000
heap
page read and write
4379000
heap
page read and write
5E4E000
stack
page read and write
40C0000
heap
page read and write
4379000
heap
page read and write
41B0000
heap
page read and write
5380000
heap
page read and write
420C000
heap
page read and write
4306000
heap
page read and write
7A3C000
heap
page read and write
2C51000
trusted library allocation
page read and write
43F5000
heap
page read and write
9EE000
stack
page read and write
42E8000
heap
page read and write
4306000
heap
page read and write
34DF000
trusted library allocation
page read and write
41B0000
heap
page read and write
2C53000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
42E8000
heap
page read and write
2F80000
direct allocation
page read and write
42E8000
heap
page read and write
3461000
trusted library allocation
page read and write
4378000
heap
page read and write
3020000
heap
page read and write
4278000
heap
page read and write
3B62000
heap
page read and write
42E8000
heap
page read and write
147C000
heap
page read and write
400000
unkown
page readonly
B80000
heap
page read and write
13CE000
stack
page read and write
3A17000
heap
page read and write
57F0000
trusted library allocation
page execute and read and write
4960000
direct allocation
page read and write
3988000
heap
page read and write
3AAB000
heap
page read and write
3CAD000
heap
page read and write
426A000
heap
page read and write
42FB000
heap
page read and write
426B000
heap
page read and write
41EE000
heap
page read and write
334A000
trusted library allocation
page read and write
43F5000
heap
page read and write
189B000
trusted library allocation
page execute and read and write
4378000
heap
page read and write
201BEAD0000
heap
page read and write
96E000
stack
page read and write
53B0000
trusted library allocation
page execute and read and write
411E000
heap
page read and write
32DE000
stack
page read and write
1453000
heap
page read and write
41FF000
heap
page read and write
42E8000
heap
page read and write
41EE000
heap
page read and write
428A000
heap
page read and write
2CB3000
trusted library allocation
page read and write
5258000
heap
page read and write
4A4E000
direct allocation
page read and write
34E3000
trusted library allocation
page read and write
E5000
heap
page read and write
42FB000
heap
page read and write
3AAD000
heap
page read and write
1440000
heap
page read and write
D8A000
trusted library allocation
page execute and read and write
CA3000
heap
page read and write
FCF000
stack
page read and write
420C000
heap
page read and write
426C000
heap
page read and write
100E000
stack
page read and write
41EE000
heap
page read and write
4289000
heap
page read and write
43F5000
heap
page read and write
D82000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
2C45000
trusted library allocation
page read and write
495E000
direct allocation
page read and write
43F5000
heap
page read and write
123A000
stack
page read and write
D97000
trusted library allocation
page execute and read and write
420C000
heap
page read and write
4AB000
unkown
page readonly
CE1000
heap
page read and write
43F5000
heap
page read and write
5040000
trusted library allocation
page execute and read and write
EA8000
heap
page read and write
42FB000
heap
page read and write
4317000
heap
page read and write
576B000
trusted library allocation
page read and write
3025000
heap
page read and write
42E8000
heap
page read and write
18D0000
heap
page read and write
5240000
heap
page read and write
33B6000
trusted library allocation
page read and write
4378000
heap
page read and write
950000
heap
page read and write
4379000
heap
page read and write
4289000
heap
page read and write
140D000
heap
page read and write
755E000
stack
page read and write
3486000
trusted library allocation
page read and write
42FB000
heap
page read and write
426C000
heap
page read and write
5760000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
9BC000
heap
page read and write
43F5000
heap
page read and write
482000
unkown
page readonly
A2F000
heap
page read and write
D64000
trusted library allocation
page read and write
42E8000
heap
page read and write
426A000
heap
page read and write
420C000
heap
page read and write
490000
unkown
page write copy
4377000
heap
page read and write
4F95000
trusted library allocation
page read and write
C1C000
heap
page read and write
42E8000
heap
page read and write
5AA4000
trusted library allocation
page read and write
347F000
trusted library allocation
page read and write
436E000
heap
page read and write
18C0000
trusted library allocation
page execute and read and write
4306000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
761E000
stack
page read and write
4409000
heap
page read and write
42FB000
heap
page read and write
422F000
heap
page read and write
5810000
heap
page read and write
2CA6000
trusted library allocation
page read and write
AF4000
heap
page read and write
2CDE000
trusted library allocation
page read and write
423C000
heap
page read and write
3493000
trusted library allocation
page read and write
541D000
stack
page read and write
3444000
trusted library allocation
page read and write
4115000
heap
page read and write
43F5000
heap
page read and write
4BFC000
stack
page read and write
3FAF000
stack
page read and write
49D9000
direct allocation
page read and write
490000
unkown
page write copy
495E000
direct allocation
page read and write
4289000
heap
page read and write
490000
unkown
page read and write
E92000
heap
page read and write
4F44000
trusted library allocation
page read and write
408C000
heap
page read and write
43F5000
heap
page read and write
490000
unkown
page read and write
42E8000
heap
page read and write
4289000
heap
page read and write
492000
unkown
page read and write
6CC2000
trusted library allocation
page read and write
49DD000
direct allocation
page read and write
1050000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
4378000
heap
page read and write
426C000
heap
page read and write
41E4000
heap
page read and write
48ED000
direct allocation
page read and write
3B13000
direct allocation
page read and write
3960000
direct allocation
page read and write
1850000
trusted library allocation
page read and write
400000
unkown
page readonly
41EE000
heap
page read and write
5B40000
heap
page read and write
DB0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
1496000
heap
page read and write
5200000
trusted library allocation
page read and write
3A83000
direct allocation
page read and write
201BEBA7000
heap
page read and write
420C000
heap
page read and write
42FB000
heap
page read and write
34BA000
trusted library allocation
page read and write
426B000
heap
page read and write
57B0000
trusted library allocation
page read and write
43F5000
heap
page read and write
33BD000
trusted library allocation
page read and write
552E000
heap
page read and write
E4E000
heap
page read and write
426A000
heap
page read and write
2C72000
trusted library allocation
page read and write
9CD000
heap
page read and write
43F5000
heap
page read and write
48B0000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
4377000
heap
page read and write
775E000
stack
page read and write
4378000
heap
page read and write
47C0000
direct allocation
page read and write
42E8000
heap
page read and write
54F0000
heap
page read and write
13D7000
heap
page read and write
424D000
heap
page read and write
48ED000
direct allocation
page read and write
482000
unkown
page readonly
43F5000
heap
page read and write
349F000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
163F000
stack
page read and write
426B000
heap
page read and write
420C000
heap
page read and write
2D37000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
201BEB4E000
heap
page read and write
5C50000
heap
page read and write
42E8000
heap
page read and write
491000
unkown
page write copy
42E8000
heap
page read and write
42FB000
heap
page read and write
524C000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
43F5000
heap
page read and write
400000
unkown
page readonly
420C000
heap
page read and write
1490000
heap
page read and write
4306000
heap
page read and write
125F000
stack
page read and write
CA0000
heap
page read and write
426C000
heap
page read and write
201BEBD5000
heap
page read and write
4289000
heap
page read and write
5A90000
heap
page read and write
4289000
heap
page read and write
420C000
heap
page read and write
4289000
heap
page read and write
2EDF000
stack
page read and write
58B0000
heap
page read and write
491000
unkown
page write copy
34D5000
trusted library allocation
page read and write
5053000
heap
page read and write
40FD000
heap
page read and write
420C000
heap
page read and write
100000
heap
page read and write
420C000
heap
page read and write
4289000
heap
page read and write
41EE000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
9AC000
heap
page read and write
42FB000
heap
page read and write
2CC1000
trusted library allocation
page read and write
DFA000
heap
page read and write
42E8000
heap
page read and write
3BF0000
direct allocation
page read and write
42FB000
heap
page read and write
4379000
heap
page read and write
1640000
heap
page read and write
3B13000
direct allocation
page read and write
4289000
heap
page read and write
3452000
trusted library allocation
page read and write
49DD000
direct allocation
page read and write
4175000
heap
page read and write
43F5000
heap
page read and write
DE5000
heap
page read and write
2CA2000
trusted library allocation
page read and write
42FB000
heap
page read and write
4FE0000
trusted library allocation
page execute and read and write
4378000
heap
page read and write
3AE7000
heap
page read and write
3517000
trusted library allocation
page read and write
1457000
heap
page read and write
31B6000
trusted library allocation
page read and write
3D13000
direct allocation
page read and write
38DC000
heap
page read and write
39F0000
direct allocation
page read and write
EA3000
heap
page read and write
34D1000
trusted library allocation
page read and write
5010000
heap
page read and write
4138000
heap
page read and write
41EE000
heap
page read and write
42FB000
heap
page read and write
39F0000
direct allocation
page read and write
402000
system
page execute and read and write
2CBD000
trusted library allocation
page read and write
EB1000
heap
page read and write
4A7000
unkown
page read and write
D86000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
393B000
direct allocation
page read and write
49D9000
direct allocation
page read and write
48D6000
heap
page read and write
E72000
heap
page read and write
42E8000
heap
page read and write
3450000
trusted library allocation
page read and write
7A6B000
heap
page read and write
428A000
heap
page read and write
420C000
heap
page read and write
44CA000
heap
page read and write
41EE000
heap
page read and write
4378000
heap
page read and write
428A000
heap
page read and write
42E2000
heap
page read and write
2BDD000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
3455000
trusted library allocation
page read and write
43F5000
heap
page read and write
426A000
heap
page read and write
110000
heap
page read and write
47C0000
direct allocation
page read and write
D63000
trusted library allocation
page execute and read and write
4289000
heap
page read and write
4210000
heap
page read and write
2CDC000
trusted library allocation
page read and write
426B000
heap
page read and write
33D5000
trusted library allocation
page read and write
426A000
heap
page read and write
41EE000
heap
page read and write
432A000
heap
page read and write
420C000
heap
page read and write
42E8000
heap
page read and write
2CD4000
trusted library allocation
page read and write
130E000
stack
page read and write
4378000
heap
page read and write
48E3000
direct allocation
page read and write
1897000
trusted library allocation
page execute and read and write
53E5000
heap
page read and write
426B000
heap
page read and write
4090000
heap
page read and write
421D000
heap
page read and write
8AF000
stack
page read and write
DC0000
heap
page execute and read and write
436B000
heap
page read and write
2C7F000
trusted library allocation
page read and write
41EE000
heap
page read and write
426B000
heap
page read and write
4306000
heap
page read and write
42E8000
heap
page read and write
410F000
heap
page read and write
54EE000
stack
page read and write
4960000
direct allocation
page read and write
49DD000
direct allocation
page read and write
EF5DBFE000
stack
page read and write
42FB000
heap
page read and write
426B000
heap
page read and write
A15000
heap
page read and write
420C000
heap
page read and write
42E8000
heap
page read and write
13D0000
heap
page read and write
190000
heap
page read and write
412F000
heap
page read and write
2CB7000
trusted library allocation
page read and write
201BE9F0000
heap
page read and write
41EE000
heap
page read and write
4306000
heap
page read and write
428A000
heap
page read and write
789E000
stack
page read and write
41EE000
heap
page read and write
401000
unkown
page execute read
D7D000
trusted library allocation
page execute and read and write
2CF5000
trusted library allocation
page read and write
42FB000
heap
page read and write
3B05000
trusted library allocation
page read and write
4306000
heap
page read and write
1E0000
heap
page read and write
2BA7000
trusted library allocation
page read and write
193E000
stack
page read and write
420C000
heap
page read and write
146C000
heap
page read and write
3184000
heap
page read and write
3469000
trusted library allocation
page read and write
41EE000
heap
page read and write
4136000
heap
page read and write
42FB000
heap
page read and write
41EE000
heap
page read and write
1157000
heap
page read and write
43F5000
heap
page read and write
4A89000
direct allocation
page read and write
48ED000
direct allocation
page read and write
4225000
heap
page read and write
42E8000
heap
page read and write
4289000
heap
page read and write
4289000
heap
page read and write
4289000
heap
page read and write
42E8000
heap
page read and write
401000
unkown
page execute read
5792000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
3B66000
heap
page read and write
5781000
trusted library allocation
page read and write
34BC000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
72DE000
stack
page read and write
4289000
heap
page read and write
C9E000
stack
page read and write
1892000
trusted library allocation
page read and write
43F5000
heap
page read and write
2C4D000
trusted library allocation
page read and write
3B58000
heap
page read and write
5C60000
heap
page read and write
426B000
heap
page read and write
42FB000
heap
page read and write
8B4000
stack
page read and write
346B000
trusted library allocation
page read and write
42FB000
heap
page read and write
7420000
heap
page read and write
E59000
heap
page read and write
3489000
trusted library allocation
page read and write
400000
unkown
page readonly
42E8000
heap
page read and write
3B50000
heap
page read and write
D6D000
trusted library allocation
page execute and read and write
3448000
trusted library allocation
page read and write
13B5000
heap
page read and write
4306000
heap
page read and write
186D000
trusted library allocation
page execute and read and write
4379000
heap
page read and write
5AC0000
heap
page execute and read and write
41EE000
heap
page read and write
36DE000
stack
page read and write
420C000
heap
page read and write
31B4000
trusted library allocation
page read and write
42FB000
heap
page read and write
E7C000
heap
page read and write
41EE000
heap
page read and write
3309000
trusted library allocation
page read and write
482000
unkown
page readonly
145B000
heap
page read and write
420C000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
42FB000
heap
page read and write
43F5000
heap
page read and write
A81000
heap
page read and write
482000
unkown
page readonly
4379000
heap
page read and write
1486000
heap
page read and write
34D3000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
3AD1000
heap
page read and write
42FB000
heap
page read and write
2AFE000
stack
page read and write
44A7000
heap
page read and write
42E5000
trusted library allocation
page read and write
3B13000
direct allocation
page read and write
2BD6000
trusted library allocation
page read and write
174F000
stack
page read and write
4134000
heap
page read and write
3DA0000
heap
page read and write
4378000
heap
page read and write
31C0000
trusted library allocation
page read and write
420C000
heap
page read and write
E43000
heap
page read and write
4377000
heap
page read and write
42E8000
heap
page read and write
4249000
heap
page read and write
42D9000
heap
page read and write
3FB0000
heap
page read and write
426B000
heap
page read and write
1150000
heap
page read and write
4306000
heap
page read and write
41EE000
heap
page read and write
43F5000
heap
page read and write
9F0000
heap
page read and write
3497000
trusted library allocation
page read and write
5C4D000
stack
page read and write
4379000
heap
page read and write
426A000
heap
page read and write
45B0000
heap
page read and write
1882000
trusted library allocation
page read and write
4289000
heap
page read and write
D05000
heap
page read and write
490000
unkown
page read and write
4960000
direct allocation
page read and write
8AF000
stack
page read and write
42FB000
heap
page read and write
4F80000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
EAC000
heap
page read and write
342F000
trusted library allocation
page read and write
4140000
heap
page read and write
42E8000
heap
page read and write
43F5000
heap
page read and write
53A4000
trusted library allocation
page read and write
940000
heap
page read and write
C08000
heap
page read and write
42E8000
heap
page read and write
41EE000
heap
page read and write
43F5000
heap
page read and write
4AFE000
direct allocation
page read and write
4289000
heap
page read and write
9BE000
stack
page read and write
40A0000
heap
page read and write
41EE000
heap
page read and write
4A4E000
direct allocation
page read and write
41EE000
heap
page read and write
42E000
system
page execute and read and write
420C000
heap
page read and write
3467000
trusted library allocation
page read and write
4AFE000
direct allocation
page read and write
1957000
heap
page read and write
42E8000
heap
page read and write
3A83000
direct allocation
page read and write
32E1000
trusted library allocation
page read and write
3D13000
direct allocation
page read and write
13B0000
heap
page read and write
195000
heap
page read and write
4289000
heap
page read and write
38D1000
heap
page read and write
400000
unkown
page readonly
5B45000
heap
page read and write
A49000
heap
page read and write
34DB000
trusted library allocation
page read and write
3982000
heap
page read and write
3307000
trusted library allocation
page read and write
53E0000
heap
page read and write
42E8000
heap
page read and write
9A000
stack
page read and write
4288000
heap
page read and write
123E000
stack
page read and write
2CB9000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
3425000
trusted library allocation
page read and write
42E8000
heap
page read and write
38D5000
heap
page read and write
2CBF000
trusted library allocation
page read and write
9AE000
stack
page read and write
42E8000
heap
page read and write
4F5E000
trusted library allocation
page read and write
42FB000
heap
page read and write
426B000
heap
page read and write
420C000
heap
page read and write
42FB000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
2C55000
trusted library allocation
page read and write
C2D000
heap
page read and write
445E000
heap
page read and write
1020000
heap
page read and write
34B2000
trusted library allocation
page read and write
420C000
heap
page read and write
41EE000
heap
page read and write
93E000
stack
page read and write
4378000
heap
page read and write
42E8000
heap
page read and write
1870000
trusted library allocation
page read and write
349B000
trusted library allocation
page read and write
41EE000
heap
page read and write
2CA4000
trusted library allocation
page read and write
4A4E000
direct allocation
page read and write
43F5000
heap
page read and write
A45000
heap
page read and write
DEE000
heap
page read and write
13F0000
heap
page read and write
43F5000
heap
page read and write
420C000
heap
page read and write
1880000
trusted library allocation
page read and write
41EE000
heap
page read and write
8B4000
stack
page read and write
3C02000
heap
page read and write
12B0000
heap
page read and write
48E9000
direct allocation
page read and write
420C000
heap
page read and write
11F2000
heap
page read and write
426C000
heap
page read and write
8FE000
stack
page read and write
49DD000
direct allocation
page read and write
5E0E000
stack
page read and write
2CA9000
trusted library allocation
page read and write
47AB000
heap
page read and write
1DE000
stack
page read and write
42E8000
heap
page read and write
42E8000
heap
page read and write
A6B000
heap
page read and write
338B000
trusted library allocation
page read and write
9DD000
heap
page read and write
42E8000
heap
page read and write
406E000
heap
page read and write
43F5000
heap
page read and write
765E000
stack
page read and write
420C000
heap
page read and write
2F90000
heap
page read and write
53A0000
trusted library allocation
page read and write
114B000
stack
page read and write
41EE000
heap
page read and write
5030000
heap
page read and write
5AA0000
trusted library allocation
page read and write
4379000
heap
page read and write
4378000
heap
page read and write
2CDA000
trusted library allocation
page read and write
43F5000
heap
page read and write
426B000
heap
page read and write
426A000
heap
page read and write
33B2000
trusted library allocation
page read and write
420C000
heap
page read and write
41EE000
heap
page read and write
5AE0000
trusted library allocation
page read and write
426C000
heap
page read and write
3960000
direct allocation
page read and write
31A0000
trusted library allocation
page read and write
EF5D8FE000
stack
page read and write
43F5000
heap
page read and write
34BE000
trusted library allocation
page read and write
4281000
heap
page read and write
4196000
heap
page read and write
41EE000
heap
page read and write
201BEB40000
heap
page read and write
1390000
heap
page read and write
E48000
heap
page read and write
4378000
heap
page read and write
43F5000
heap
page read and write
161E000
stack
page read and write
492000
unkown
page read and write
18F0000
heap
page read and write
2E0C000
heap
page read and write
3C11000
heap
page read and write
2F20000
heap
page read and write
41EE000
heap
page read and write
ECC000
heap
page read and write
3180000
heap
page read and write
4289000
heap
page read and write
4289000
heap
page read and write
33DE000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
4AB000
unkown
page readonly
428A000
heap
page read and write
42E8000
heap
page read and write
5870000
trusted library allocation
page read and write
110000
heap
page read and write
58A0000
heap
page read and write
48B0000
direct allocation
page read and write
34D7000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
41EE000
heap
page read and write
4FA0000
trusted library allocation
page read and write
A10000
heap
page read and write
420C000
heap
page read and write
CEE000
stack
page read and write
5390000
heap
page read and write
8FE000
stack
page read and write
5894000
trusted library section
page readonly
4289000
heap
page read and write
3C75000
direct allocation
page read and write
8FE000
stack
page read and write
420C000
heap
page read and write
70A0000
heap
page read and write
4377000
heap
page read and write
3433000
trusted library allocation
page read and write
420C000
heap
page read and write
49D9000
direct allocation
page read and write
41EE000
heap
page read and write
4AB000
unkown
page readonly
428A000
heap
page read and write
38D7000
heap
page read and write
There are 1130 hidden memdumps, click here to show them.