IOC Report
Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\L2D128LW\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\BooConf.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvF4C4.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xadd8c841, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\hvglntqjpwxqeafzzxxpsjflkurl
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsf961A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tmc.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\classrooms\Hematologist\gutterblood.fri
data
dropped
C:\Users\user\classrooms\Hematologist\inexorable.aut
data
dropped
C:\Users\user\classrooms\Hematologist\milieustyrelses.byg
data
dropped
C:\Users\user\classrooms\Hematologist\traumatically.fra
data
dropped
C:\Users\user\classrooms\Hematologist\vennekredse.som
Matlab v4 mat-file (little endian) , numeric, rows 10092776, columns 0
dropped
C:\Users\user\classrooms\Navnefringers\Alkoholisters26.txt
ASCII text, with very long lines (377), with no line terminators
dropped
C:\Users\user\classrooms\Navnefringers\Mediumises.Res
data
dropped
C:\Users\user\classrooms\Navnefringers\Phagophobia.Unt
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe"
malicious
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe"
malicious
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe" /stext "C:\Users\user\AppData\Local\Temp\hvglntqjpwxqeafzzxxpsjflkurl"
malicious
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe" /stext "C:\Users\user\AppData\Local\Temp\sptdomaclepvggbdihsivorutbiuqfu"
malicious
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe" /stext "C:\Users\user\AppData\Local\Temp\cjzw"
malicious

URLs

Name
IP
Malicious
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
unknown
http://www.imvu.comr
unknown
https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svg
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
unknown
https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
unknown
https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
unknown
https://csp.withgoogle.com/csp/ads-programmable
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRi
unknown
https://www.google.com/chrome/
unknown
http://cdp.thawte.com/ThawteRSACA2018.crl0L
unknown
https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
unknown
https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
unknown
https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339
unknown
https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1
unknown
http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
unknown
https://www.msn.com
unknown
https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
unknown
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
unknown
https://btloader.com/tag?o=6208086025961472&upapi=true
unknown
http://www.imvu.comata
unknown
https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
unknown
https://assets.msn.com/weathermapdata/1/static/svg/72/MostlySunnyDay.svg
unknown
https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
unknown
http://ocsp.sca1b.amazontrust.com06
unknown
http://certs.godaddy.com/repository/1301
unknown
http://i.pki.goog/r1.crt0
unknown
http://www.imvu.com
unknown
https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://certs.godaddy.com/repository/0
unknown
https://pki.goog/repository/0
unknown
https://www.msn.com/
unknown
http://i.pki.goog/wr2.crt0
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
unknown
http://cacerts.thawte.com/ThawteRSACA2018.crt0
unknown
http://crl.godaddy.com/gdroot-g2.crl0F
unknown
http://crl.rootg2.amazontrust.com/rootg2.crl0
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
unknown
https://account.live.com/Resources/images/favicon.ico
unknown
https://www.msn.com/?ocid=iehp
unknown
https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
unknown
https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1
unknown
https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
unknown
http://crl.godaddy.com/gdig2s1-2558.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://certificates.godaddy.com/repository/0
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
unknown
https://eb2.3lift.com/sync?
unknown
https://acdn.adnxs.com/dmp/async_usersync.html
unknown
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZE
unknown
http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
unknown
https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
unknown
http://pki.goog/repo/certs/gts1c3.der07
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
unknown
https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
unknown
http://c.pki.goog/r/r1.crl0
unknown
https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
unknown
https://www.msn.com/de-ch/?ocid=iehp
unknown
https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5Q
unknown
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
unknown
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
unknown
https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
unknown
https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregula
unknown
https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8d&Fr
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
unknown
https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&conn
unknown
https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0
unknown
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
unknown
https://www.google.com/pagead/drt/ui
unknown
https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
unknown
http://geoplugin.net/json.gpb9
unknown
http://geoplugin.net/json.gpgramFi
unknown
https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1
unknown
http://pki.goog/gsr1/gsr1.crt02
unknown
http://pki.goog/repo/certs/gts1c3.der0$
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
unknown
https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=htt
unknown
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-bold.wof
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
102.165.14.28
unknown
South Africa
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-0V7E34
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-0V7E34
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-0V7E34
time
malicious
HKEY_CURRENT_USER\svejtserfrancenes\bassangerens
metastatical
HKEY_CURRENT_USER\displayledning\Uninstall\Alacrities\boulevardize
whick

Memdumps

Base Address
Regiontype
Protect
Malicious
416E000
heap
page read and write
malicious
4180000
heap
page read and write
malicious
25B5000
remote allocation
page execute and read and write
malicious
55B5000
direct allocation
page execute and read and write
malicious
4175000
heap
page read and write
malicious
3496A000
heap
page read and write
28C1000
heap
page read and write
2E90000
direct allocation
page read and write
23B3000
heap
page read and write
2AC1000
heap
page read and write
408000
unkown
page readonly
2ADC000
heap
page read and write
5FF000
heap
page read and write
2741000
heap
page read and write
23B1000
heap
page read and write
2B32000
heap
page read and write
630000
heap
page read and write
23A2000
heap
page read and write
34969000
heap
page read and write
41A9000
heap
page read and write
34EFC000
unclassified section
page execute and read and write
2AD4000
heap
page read and write
23A9000
heap
page read and write
23A5000
heap
page read and write
23B8000
heap
page read and write
5E8000
heap
page read and write
2790000
direct allocation
page read and write
23AD000
heap
page read and write
2ADC000
heap
page read and write
2414000
heap
page read and write
23A1000
heap
page read and write
2AD2000
heap
page read and write
5E90000
heap
page read and write
348F0000
heap
page read and write
23BD000
heap
page read and write
5E4000
heap
page read and write
4110000
direct allocation
page read and write
2E50000
direct allocation
page read and write
2B32000
heap
page read and write
34C99000
heap
page read and write
41D7000
heap
page read and write
2B32000
heap
page read and write
4AE000
stack
page read and write
401000
unkown
page execute read
41B9000
heap
page read and write
5E5000
heap
page read and write
34D42000
heap
page read and write
34F56000
direct allocation
page execute and read and write
2AF5000
heap
page read and write
5E0000
heap
page read and write
34D77000
heap
page read and write
30000
heap
page read and write
4050000
direct allocation
page read and write
2B32000
heap
page read and write
27B0000
heap
page read and write
41C9000
heap
page read and write
2F53000
heap
page read and write
23B8000
heap
page read and write
41B9000
heap
page read and write
2B32000
heap
page read and write
2AC7000
heap
page read and write
23CE000
heap
page read and write
401000
unkown
page execute read
2AC1000
heap
page read and write
23B1000
heap
page read and write
4100000
direct allocation
page read and write
494000
heap
page read and write
23F0000
heap
page read and write
42F0000
heap
page read and write
2AC3000
heap
page read and write
23BE000
heap
page read and write
2740000
heap
page read and write
2EA0000
direct allocation
page read and write
C60000
heap
page read and write
23BE000
heap
page read and write
2AC1000
heap
page read and write
494000
heap
page read and write
3456C000
stack
page read and write
23B0000
heap
page read and write
34F40000
direct allocation
page read and write
4164000
heap
page read and write
2EC0000
trusted library allocation
page read and write
40AE000
stack
page read and write
401000
unkown
page execute read
34968000
heap
page read and write
2390000
heap
page read and write
494000
heap
page read and write
30000
heap
page read and write
400000
unkown
page readonly
5E4000
heap
page read and write
2AC7000
heap
page read and write
23BE000
heap
page read and write
41A6000
heap
page read and write
2AF5000
heap
page read and write
34DEF000
heap
page read and write
5E50000
direct allocation
page read and write
2EB0000
direct allocation
page read and write
2412000
heap
page read and write
34E20000
unclassified section
page execute and read and write
23A9000
heap
page read and write
23BE000
heap
page read and write
23BD000
heap
page read and write
5E4000
heap
page read and write
23AC000
heap
page read and write
5E4000
heap
page read and write
C66000
heap
page read and write
408000
unkown
page readonly
23C1000
heap
page read and write
910000
heap
page read and write
40A000
unkown
page write copy
9C000
stack
page read and write
34C21000
heap
page read and write
10003000
unkown
page readonly
2B32000
heap
page read and write
34D72000
heap
page read and write
23A1000
heap
page read and write
2AD8000
heap
page read and write
2ADC000
heap
page read and write
2ADC000
heap
page read and write
2AC3000
heap
page read and write
420D000
heap
page read and write
346AE000
stack
page read and write
297F000
heap
page read and write
7E3000
unkown
page readonly
400000
unkown
page readonly
34D13000
heap
page read and write
28C0000
heap
page read and write
2E60000
direct allocation
page read and write
2EC0000
trusted library allocation
page read and write
9E0000
heap
page read and write
23A9000
heap
page read and write
2AC6000
heap
page read and write
23B0000
heap
page read and write
23A4000
heap
page read and write
680000
heap
page read and write
A18000
heap
page read and write
3016000
heap
page read and write
27C1000
heap
page read and write
2FEF000
heap
page read and write
5E4000
heap
page read and write
2258000
heap
page read and write
2B32000
heap
page read and write
347ED000
stack
page read and write
34EA0000
unclassified section
page execute and read and write
7CA000
unkown
page read and write
473000
system
page execute and read and write
420D000
heap
page read and write
7A6000
unkown
page read and write
C30000
heap
page read and write
494000
heap
page read and write
41C4000
heap
page read and write
23B5000
heap
page read and write
401000
unkown
page execute read
494000
heap
page read and write
C33000
heap
page read and write
5F70000
heap
page read and write
348F1000
heap
page read and write
23BD000
heap
page read and write
41AC000
heap
page read and write
400000
unkown
page readonly
23A1000
heap
page read and write
408000
unkown
page readonly
2B32000
heap
page read and write
2AC1000
heap
page read and write
41E1000
heap
page read and write
2AC1000
heap
page read and write
2414000
heap
page read and write
C3D000
heap
page read and write
41C4000
heap
page read and write
CDF000
stack
page read and write
26FE000
stack
page read and write
494000
heap
page read and write
34F10000
unclassified section
page execute and read and write
400000
system
page execute and read and write
2B32000
heap
page read and write
19C000
stack
page read and write
41B9000
heap
page read and write
23BD000
heap
page read and write
23A4000
heap
page read and write
5E5000
heap
page read and write
494000
heap
page read and write
4196000
heap
page read and write
41B9000
heap
page read and write
34D77000
heap
page read and write
5E4000
heap
page read and write
34F41000
direct allocation
page execute and read and write
23B0000
heap
page read and write
2ADD000
heap
page read and write
34D77000
heap
page read and write
2B01000
heap
page read and write
23B0000
heap
page read and write
2ADC000
heap
page read and write
2AC6000
heap
page read and write
2ADC000
heap
page read and write
5E4000
heap
page read and write
494000
heap
page read and write
23B0000
heap
page read and write
34968000
heap
page read and write
34B8E000
heap
page read and write
34E93000
unclassified section
page execute and read and write
7E3000
unkown
page readonly
34E79000
unclassified section
page execute and read and write
C3E000
heap
page read and write
7DF000
unkown
page read and write
D1E000
stack
page read and write
2B32000
heap
page read and write
23BD000
heap
page read and write
23A2000
heap
page read and write
34DEC000
heap
page read and write
34F2B000
unclassified section
page execute and read and write
23EA000
heap
page read and write
3421E000
stack
page read and write
349E2000
heap
page read and write
494000
heap
page read and write
23B1000
heap
page read and write
7AD000
unkown
page read and write
401000
unkown
page execute read
2B32000
heap
page read and write
39B5000
remote allocation
page execute and read and write
5E60000
direct allocation
page read and write
23B0000
heap
page read and write
2AC1000
heap
page read and write
2AC1000
heap
page read and write
98000
stack
page read and write
2AC7000
heap
page read and write
27C1000
heap
page read and write
23B5000
heap
page read and write
30000
heap
page read and write
3431F000
stack
page read and write
41AA000
heap
page read and write
2AF5000
heap
page read and write
41C4000
heap
page read and write
2DF0000
heap
page read and write
400000
unkown
page readonly
2E70000
direct allocation
page read and write
C20000
heap
page read and write
34EF6000
unclassified section
page execute and read and write
34C20000
heap
page read and write
786000
unkown
page read and write
371C000
stack
page read and write
A0F000
heap
page read and write
2B32000
heap
page read and write
23A9000
heap
page read and write
2B32000
heap
page read and write
34D77000
heap
page read and write
A1C000
heap
page read and write
A0D000
heap
page read and write
5E5000
heap
page read and write
408000
unkown
page readonly
A3C000
heap
page read and write
2AD0000
heap
page read and write
2B32000
heap
page read and write
23B0000
heap
page read and write
23BD000
heap
page read and write
5E4000
heap
page read and write
2AC1000
heap
page read and write
23E3000
heap
page read and write
41AE000
heap
page read and write
9C000
stack
page read and write
2AC1000
heap
page read and write
5E4000
heap
page read and write
2B32000
heap
page read and write
2AC1000
heap
page read and write
2FB5000
remote allocation
page execute and read and write
2B32000
heap
page read and write
10005000
unkown
page readonly
2B32000
heap
page read and write
41A6000
heap
page read and write
916000
heap
page read and write
2ADD000
heap
page read and write
99E000
stack
page read and write
2AD3000
heap
page read and write
26BE000
stack
page read and write
27C1000
heap
page read and write
41A9000
heap
page read and write
420D000
heap
page read and write
2409000
heap
page read and write
4060000
heap
page read and write
2B32000
heap
page read and write
5FD000
heap
page read and write
8E0000
heap
page read and write
7E3000
unkown
page readonly
41AB000
heap
page read and write
7E3000
unkown
page readonly
2F5D000
heap
page read and write
5E5000
heap
page read and write
C00000
heap
page read and write
4128000
heap
page read and write
494000
heap
page read and write
494000
heap
page read and write
2B32000
heap
page read and write
23BD000
heap
page read and write
A33000
heap
page read and write
23B1000
heap
page read and write
44EF000
stack
page read and write
4066000
heap
page read and write
9E8000
heap
page read and write
5E4000
heap
page read and write
789000
unkown
page read and write
5E4000
heap
page read and write
A30000
heap
page read and write
2AC7000
heap
page read and write
23BD000
heap
page read and write
7DD000
stack
page read and write
177000
stack
page read and write
34DBB000
heap
page read and write
C0C000
heap
page read and write
408000
unkown
page readonly
2B32000
heap
page read and write
87D000
stack
page read and write
2B32000
heap
page read and write
2AD4000
heap
page read and write
23BD000
heap
page read and write
239C000
heap
page read and write
23BD000
heap
page read and write
41A6000
heap
page read and write
782000
unkown
page read and write
41B9000
heap
page read and write
23BD000
heap
page read and write
62E000
stack
page read and write
23BD000
heap
page read and write
41A9000
heap
page read and write
C0C000
heap
page read and write
2AC6000
heap
page read and write
BDF000
stack
page read and write
5E4000
heap
page read and write
5AE000
stack
page read and write
5E5000
heap
page read and write
4A80000
direct allocation
page execute and read and write
2EC0000
trusted library allocation
page read and write
22C0000
heap
page read and write
239C000
heap
page read and write
2370000
heap
page read and write
2390000
heap
page read and write
2B32000
heap
page read and write
494000
heap
page read and write
348F1000
heap
page read and write
2280000
trusted library allocation
page read and write
5E4000
heap
page read and write
2AC6000
heap
page read and write
2AC9000
heap
page read and write
5E40000
direct allocation
page read and write
23A1000
heap
page read and write
2F63000
heap
page read and write
2E30000
trusted library allocation
page read and write
239D000
heap
page read and write
2EC2000
heap
page read and write
41C4000
heap
page read and write
19E000
stack
page read and write
23BD000
heap
page read and write
A35000
heap
page read and write
34C9A000
heap
page read and write
6B4000
heap
page read and write
2413000
heap
page read and write
50E000
heap
page read and write
28C1000
heap
page read and write
2AC1000
heap
page read and write
401000
unkown
page execute read
348EF000
stack
page read and write
41AC000
heap
page read and write
9C000
stack
page read and write
23B0000
heap
page read and write
4630000
heap
page read and write
41C4000
heap
page read and write
2AC1000
heap
page read and write
30000
heap
page read and write
2AD3000
heap
page read and write
2AC6000
heap
page read and write
2AC1000
heap
page read and write
1BB5000
remote allocation
page execute and read and write
41A9000
heap
page read and write
23BD000
heap
page read and write
41C9000
heap
page read and write
41E1000
heap
page read and write
2B32000
heap
page read and write
381B000
stack
page read and write
2ADD000
heap
page read and write
23B3000
heap
page read and write
25F4000
heap
page read and write
23AC000
heap
page read and write
41B9000
heap
page read and write
41C4000
heap
page read and write
400000
system
page execute and read and write
17C000
stack
page read and write
5E4000
heap
page read and write
30000
heap
page read and write
23A1000
heap
page read and write
193000
stack
page read and write
23B1000
heap
page read and write
23BD000
heap
page read and write
408000
unkown
page readonly
2AC1000
heap
page read and write
2B32000
heap
page read and write
2AC7000
heap
page read and write
A7F000
stack
page read and write
2B32000
heap
page read and write
5E0000
heap
page read and write
34DEF000
heap
page read and write
2AC9000
heap
page read and write
A5F000
stack
page read and write
A42000
heap
page read and write
5E4000
heap
page read and write
2AC1000
heap
page read and write
23A1000
heap
page read and write
2600000
heap
page read and write
2380000
heap
page read and write
2AD8000
heap
page read and write
2B32000
heap
page read and write
688000
heap
page read and write
40A000
unkown
page write copy
2AC6000
heap
page read and write
27C0000
heap
page read and write
400000
unkown
page readonly
41A6000
heap
page read and write
1A80000
remote allocation
page execute and read and write
5E30000
direct allocation
page read and write
5E5000
heap
page read and write
41B000
system
page execute and read and write
2EC8000
heap
page read and write
7E3000
unkown
page readonly
494000
heap
page read and write
2AD8000
heap
page read and write
92E000
stack
page read and write
34D8B000
heap
page read and write
3620000
heap
page read and write
5FB5000
direct allocation
page execute and read and write
2B32000
heap
page read and write
5CE000
stack
page read and write
2AD3000
heap
page read and write
34968000
heap
page read and write
41C4000
heap
page read and write
459000
system
page execute and read and write
2B32000
heap
page read and write
23BD000
heap
page read and write
10000000
unkown
page readonly
41A9000
heap
page read and write
23A7000
heap
page read and write
23CA000
heap
page read and write
2414000
heap
page read and write
23BD000
heap
page read and write
41A9000
heap
page read and write
40A000
unkown
page write copy
23BD000
heap
page read and write
34968000
heap
page read and write
2AC1000
heap
page read and write
6A7000
heap
page read and write
2AC1000
heap
page read and write
7E3000
unkown
page readonly
2EC0000
direct allocation
page read and write
2EC0000
heap
page read and write
4120000
heap
page read and write
2AC8000
heap
page read and write
2B32000
heap
page read and write
7B3000
unkown
page read and write
2B32000
heap
page read and write
4196000
heap
page read and write
19A000
stack
page read and write
2B32000
heap
page read and write
5E4000
heap
page read and write
2741000
heap
page read and write
10012000
trusted library allocation
page read and write
40A000
unkown
page read and write
23B5000
heap
page read and write
2E40000
direct allocation
page read and write
2B32000
heap
page read and write
2AC0000
heap
page read and write
58E000
stack
page read and write
2ECD000
heap
page read and write
2AC1000
heap
page read and write
5E5000
heap
page read and write
95E000
stack
page read and write
2ED0000
direct allocation
page read and write
2FF0000
heap
page read and write
41A6000
heap
page read and write
45C000
system
page execute and read and write
5E10000
direct allocation
page read and write
41B9000
heap
page read and write
34D8B000
heap
page read and write
2B29000
heap
page read and write
4E8000
heap
page read and write
3466D000
stack
page read and write
34D8B000
heap
page read and write
23A7000
heap
page read and write
401000
unkown
page execute read
2AC6000
heap
page read and write
2610000
heap
page read and write
400000
unkown
page readonly
420D000
heap
page read and write
40A000
unkown
page write copy
408000
unkown
page readonly
23B1000
heap
page read and write
41AC000
heap
page read and write
77C000
unkown
page read and write
2EC0000
trusted library allocation
page read and write
2AC1000
heap
page read and write
2AD0000
heap
page read and write
349E2000
heap
page read and write
9D000
stack
page read and write
23BD000
heap
page read and write
5E5000
heap
page read and write
23A9000
heap
page read and write
41AD000
heap
page read and write
2B32000
heap
page read and write
23B0000
heap
page read and write
10001000
unkown
page execute read
5FF000
heap
page read and write
2AD8000
heap
page read and write
400000
unkown
page readonly
19C000
stack
page read and write
C03000
heap
page read and write
2AC1000
heap
page read and write
40A000
unkown
page write copy
7AF000
stack
page read and write
347AF000
stack
page read and write
40F0000
direct allocation
page read and write
494000
heap
page read and write
97F000
stack
page read and write
494000
heap
page read and write
2AC1000
heap
page read and write
A30000
heap
page read and write
494000
heap
page read and write
419A000
heap
page read and write
2EC0000
trusted library allocation
page read and write
2605000
heap
page read and write
23B1000
heap
page read and write
456000
system
page execute and read and write
40A000
unkown
page write copy
4197000
heap
page read and write
2BFF000
stack
page read and write
2E80000
direct allocation
page read and write
2B32000
heap
page read and write
2ADC000
heap
page read and write
A2F000
stack
page read and write
7E3000
unkown
page readonly
41C4000
heap
page read and write
27C6000
heap
page read and write
2AC7000
heap
page read and write
23A7000
heap
page read and write
23B5000
heap
page read and write
2ACC000
heap
page read and write
C20000
trusted library allocation
page read and write
348F1000
heap
page read and write
A2A000
heap
page read and write
2B32000
heap
page read and write
2E30000
trusted library allocation
page read and write
7A4000
unkown
page read and write
41F4000
heap
page read and write
41B9000
heap
page read and write
C66000
heap
page read and write
420D000
heap
page read and write
23B0000
heap
page read and write
2B29000
heap
page read and write
2EC0000
trusted library allocation
page read and write
239C000
heap
page read and write
23A1000
heap
page read and write
23A5000
heap
page read and write
2B32000
heap
page read and write
4BB5000
direct allocation
page execute and read and write
5E20000
direct allocation
page read and write
239E000
heap
page read and write
2B32000
heap
page read and write
E1F000
stack
page read and write
8EF000
stack
page read and write
34D72000
heap
page read and write
23B0000
heap
page read and write
4E0000
heap
page read and write
23AD000
heap
page read and write
2B32000
heap
page read and write
7EE000
stack
page read and write
41A9000
heap
page read and write
490000
heap
page read and write
23B4000
heap
page read and write
95E000
stack
page read and write
34330000
heap
page read and write
2B32000
heap
page read and write
46E000
stack
page read and write
25F0000
heap
page read and write
2E30000
direct allocation
page read and write
23BD000
heap
page read and write
2AF5000
heap
page read and write
2AD8000
heap
page read and write
2F83000
heap
page read and write
23BD000
heap
page read and write
28C1000
heap
page read and write
23A9000
heap
page read and write
228B000
heap
page read and write
23AC000
heap
page read and write
C3D000
heap
page read and write
41A6000
heap
page read and write
4D0000
heap
page read and write
2AC7000
heap
page read and write
2AC7000
heap
page read and write
18F000
stack
page read and write
34D13000
heap
page read and write
2AC1000
heap
page read and write
23B8000
heap
page read and write
19F000
stack
page read and write
69B5000
direct allocation
page execute and read and write
23A4000
heap
page read and write
23B5000
heap
page read and write
9A0000
heap
page read and write
19A000
stack
page read and write
400000
system
page execute and read and write
8DF000
stack
page read and write
2B32000
heap
page read and write
23A1000
heap
page read and write
494000
heap
page read and write
34D72000
heap
page read and write
239C000
heap
page read and write
2CFF000
stack
page read and write
There are 600 hidden memdumps, click here to show them.