IOC Report
justificante de transferencia.vbs

loading gif

Files

File Path
Type
Category
Malicious
justificante de transferencia.vbs
ASCII text, with very long lines (65486), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\temp_executable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\justificante de transferencia.vbs"
malicious
C:\Users\user\AppData\Local\Temp\temp_executable.exe
"C:\Users\user\AppData\Local\Temp\temp_executable.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe"
malicious

URLs

Name
IP
Malicious
http://transfer.adttemp.com.br
unknown
https://transfer.adttemp.com.br/2alBy/sirdeeeeee.txt
104.196.109.209
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://transfer.adttemp.com.br
unknown
http://transfer.adttemp.com.brl
unknown

Domains

Name
IP
Malicious
transfer.adttemp.com.br
104.196.109.209

IPs

IP
Domain
Country
Malicious
104.196.109.209
transfer.adttemp.com.br
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
13C0000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1B59200C000
heap
page read and write
1B594631000
heap
page read and write
5CC0000
heap
page read and write
4F3F000
stack
page read and write
1B593FED000
heap
page read and write
1B59463E000
heap
page read and write
1B59460A000
heap
page read and write
1B594651000
heap
page read and write
1B594127000
heap
page read and write
1B59460A000
heap
page read and write
1B594157000
heap
page read and write
2592000
trusted library allocation
page read and write
1B59411A000
heap
page read and write
1B59413C000
heap
page read and write
1B594552000
heap
page read and write
1B594143000
heap
page read and write
1B594148000
heap
page read and write
1B594627000
heap
page read and write
1B594159000
heap
page read and write
1B594156000
heap
page read and write
1B5940D0000
heap
page read and write
1B594628000
heap
page read and write
1B5940B9000
heap
page read and write
1B5945CC000
heap
page read and write
1B593F5A000
heap
page read and write
1B593F41000
heap
page read and write
1B5945E6000
heap
page read and write
1B594127000
heap
page read and write
1B59448E000
heap
page read and write
193F000
stack
page read and write
52FE000
stack
page read and write
1B59467B000
heap
page read and write
4BBD000
stack
page read and write
1B59448E000
heap
page read and write
1B59457B000
heap
page read and write
1B59201C000
heap
page read and write
1B594494000
heap
page read and write
1B59413F000
heap
page read and write
1B594156000
heap
page read and write
1B59467B000
heap
page read and write
1B59443E000
heap
page read and write
51FE000
stack
page read and write
1B593FE0000
heap
page read and write
1B594147000
heap
page read and write
1B594628000
heap
page read and write
1B5945A4000
heap
page read and write
1B594098000
heap
page read and write
1B59415E000
heap
page read and write
1B594612000
heap
page read and write
1B594552000
heap
page read and write
548C000
stack
page read and write
1B5940FF000
heap
page read and write
1B5945F8000
heap
page read and write
1B5945A7000
heap
page read and write
1B594133000
heap
page read and write
1B5945FF000
heap
page read and write
1B594103000
heap
page read and write
1B591FEA000
heap
page read and write
1B593A90000
heap
page read and write
1B594651000
heap
page read and write
1B5940F4000
heap
page read and write
1B5940F5000
heap
page read and write
1B593FA6000
heap
page read and write
1B594145000
heap
page read and write
1B59448E000
heap
page read and write
1B594651000
heap
page read and write
1B593F5D000
heap
page read and write
1B5940A6000
heap
page read and write
1B59449F000
heap
page read and write
1B5940F3000
heap
page read and write
1B594622000
heap
page read and write
1B594126000
heap
page read and write
1B594452000
heap
page read and write
1B594361000
heap
page read and write
1B594153000
heap
page read and write
1B5940D3000
heap
page read and write
1B59413C000
heap
page read and write
2539000
trusted library allocation
page read and write
1B594153000
heap
page read and write
1B594153000
heap
page read and write
1B594057000
heap
page read and write
1B59201E000
heap
page read and write
1B59415D000
heap
page read and write
1B594647000
heap
page read and write
1B5945A4000
heap
page read and write
1B59414B000
heap
page read and write
1B594135000
heap
page read and write
1B5940E1000
heap
page read and write
1B5940D3000
heap
page read and write
1B5945D5000
heap
page read and write
1B59449F000
heap
page read and write
1B59200C000
heap
page read and write
1B594156000
heap
page read and write
1B59413C000
heap
page read and write
1B591F50000
heap
page read and write
1B59414B000
heap
page read and write
34E9000
trusted library allocation
page read and write
1B591F9B000
heap
page read and write
2562000
trusted library allocation
page read and write
1B591FFF000
heap
page read and write
183F000
stack
page read and write
1B593992000
heap
page read and write
1B593F58000
heap
page read and write
1B594617000
heap
page read and write
3A01EFD000
stack
page read and write
1B594111000
heap
page read and write
5B6C000
stack
page read and write
1B59467B000
heap
page read and write
1B5944A1000
heap
page read and write
1B593F5A000
heap
page read and write
1B59413C000
heap
page read and write
1B5940F4000
heap
page read and write
1B59414B000
heap
page read and write
1B594129000
heap
page read and write
1B5939F7000
heap
page read and write
1B594153000
heap
page read and write
507E000
stack
page read and write
1B594090000
heap
page read and write
1B594592000
heap
page read and write
1B594057000
heap
page read and write
57ED000
stack
page read and write
1B594101000
heap
page read and write
1B594153000
heap
page read and write
1B5939B2000
heap
page read and write
1B5940DF000
heap
page read and write
1B59448D000
heap
page read and write
1B594153000
heap
page read and write
1B59463C000
heap
page read and write
1B594627000
heap
page read and write
1B591F00000
heap
page read and write
C10000
heap
page read and write
1B594101000
heap
page read and write
1B594490000
heap
page read and write
1B594143000
heap
page read and write
1B594649000
heap
page read and write
1B5945CB000
heap
page read and write
820000
trusted library allocation
page read and write
1B594108000
heap
page read and write
1B59413C000
heap
page read and write
1B594093000
heap
page read and write
1B5940FD000
heap
page read and write
1B59460F000
heap
page read and write
232000
unkown
page readonly
3A01DFE000
stack
page read and write
1B59201E000
heap
page read and write
1B594153000
heap
page read and write
1B5940ED000
heap
page read and write
1B594551000
heap
page read and write
1B594151000
heap
page read and write
1B591F8E000
heap
page read and write
1B59411F000
heap
page read and write
1B594150000
heap
page read and write
B4A000
trusted library allocation
page execute and read and write
1B593F53000
heap
page read and write
1B594150000
heap
page read and write
1B59413D000
heap
page read and write
1B5945CB000
heap
page read and write
1B59414B000
heap
page read and write
1B59461B000
heap
page read and write
1B594651000
heap
page read and write
1B59411F000
heap
page read and write
1B594620000
heap
page read and write
1B59414C000
heap
page read and write
1B594672000
heap
page read and write
222000
unkown
page readonly
1B59414B000
heap
page read and write
1B5940A7000
heap
page read and write
1B594129000
heap
page read and write
1B59414B000
heap
page read and write
1B593F43000
heap
page read and write
1B594120000
heap
page read and write
1B59460C000
heap
page read and write
1B59414A000
heap
page read and write
4CFE000
stack
page read and write
1B5940A5000
heap
page read and write
1B594622000
heap
page read and write
1B591FA3000
heap
page read and write
1B5945D3000
heap
page read and write
1B59414C000
heap
page read and write
3A01AFE000
stack
page read and write
1B594628000
heap
page read and write
3A01CFE000
stack
page read and write
1B594649000
heap
page read and write
1B5945D3000
heap
page read and write
919000
heap
page read and write
874000
heap
page read and write
1B594496000
heap
page read and write
1B593F57000
heap
page read and write
1B594490000
heap
page read and write
1B59449C000
heap
page read and write
F8D000
stack
page read and write
1B5941E1000
heap
page read and write
1B593F60000
heap
page read and write
1B591E20000
heap
page read and write
1B594155000
heap
page read and write
133E000
stack
page read and write
1B59200C000
heap
page read and write
1B594133000
heap
page read and write
1B594498000
heap
page read and write
1B59454E000
heap
page read and write
710000
heap
page read and write
1B594A40000
heap
page read and write
2578000
trusted library allocation
page read and write
46BE000
stack
page read and write
1B594156000
heap
page read and write
1B594634000
heap
page read and write
1B591F5E000
heap
page read and write
1B593F5E000
heap
page read and write
1B593F56000
heap
page read and write
1B593B10000
heap
page read and write
1B59419D000
heap
page read and write
1B59414B000
heap
page read and write
1B5939A9000
heap
page read and write
1CF8000
direct allocation
page execute and read and write
1B593962000
heap
page read and write
3A01BFE000
stack
page read and write
1C61000
direct allocation
page execute and read and write
1478000
heap
page read and write
230000
unkown
page readonly
84E000
heap
page read and write
1B59414B000
heap
page read and write
1B5940A0000
heap
page read and write
1B594095000
heap
page read and write
1B5944A1000
heap
page read and write
1B594552000
heap
page read and write
1B59464B000
heap
page read and write
1B5940F1000
heap
page read and write
1B594553000
heap
page read and write
1B593A3E000
heap
page read and write
1B5940EF000
heap
page read and write
1B591F55000
heap
page read and write
1B593F02000
heap
page read and write
1B59411A000
heap
page read and write
1B594545000
heap
page read and write
1B594150000
heap
page read and write
882000
heap
page read and write
1B594151000
heap
page read and write
1B594627000
heap
page read and write
1B594153000
heap
page read and write
1B593F59000
heap
page read and write
1B5945CD000
heap
page read and write
1B594564000
heap
page read and write
3A018FE000
stack
page read and write
1B594682000
heap
page read and write
50BE000
stack
page read and write
1B594691000
heap
page read and write
1B594464000
heap
page read and write
45BC000
stack
page read and write
1B593F61000
heap
page read and write
1B594127000
heap
page read and write
1E60000
heap
page read and write
1B5940F9000
heap
page read and write
1B59452B000
heap
page read and write
1AD9000
direct allocation
page execute and read and write
1B593F40000
heap
page read and write
1B594107000
heap
page read and write
1B594682000
heap
page read and write
1B592020000
heap
page read and write
1B593FF6000
heap
page read and write
1B594132000
heap
page read and write
564E000
stack
page read and write
1B59414B000
heap
page read and write
1B59457B000
heap
page read and write
1B594090000
heap
page read and write
1B594121000
heap
page read and write
1B594498000
heap
page read and write
19B0000
direct allocation
page execute and read and write
1B594155000
heap
page read and write
1B59411D000
heap
page read and write
1B594142000
heap
page read and write
1B594159000
heap
page read and write
1B594627000
heap
page read and write
4B60000
heap
page read and write
1B59409B000
heap
page read and write
1B594127000
heap
page read and write
1B59448E000
heap
page read and write
1B594101000
heap
page read and write
1B593F4E000
heap
page read and write
1B59423D000
heap
page read and write
1B59414B000
heap
page read and write
257D000
trusted library allocation
page read and write
1B594153000
heap
page read and write
1B594151000
heap
page read and write
1B59414B000
heap
page read and write
1B594055000
heap
page read and write
1B59457B000
heap
page read and write
1B593F5E000
heap
page read and write
1B5940A3000
heap
page read and write
1B593A39000
heap
page read and write
1B59411F000
heap
page read and write
1B594622000
heap
page read and write
1B594153000
heap
page read and write
1B594153000
heap
page read and write
1B594231000
heap
page read and write
1B594147000
heap
page read and write
256C000
trusted library allocation
page read and write
1B59201A000
heap
page read and write
1B5941EE000
heap
page read and write
1B594622000
heap
page read and write
1B591F4A000
heap
page read and write
1B593EE0000
heap
page read and write
1B59467B000
heap
page read and write
1B5940FF000
heap
page read and write
24BE000
stack
page read and write
1B594637000
heap
page read and write
1B5940B1000
heap
page read and write
1B59463C000
heap
page read and write
1B594112000
heap
page read and write
1B594145000
heap
page read and write
1B594E7C000
heap
page read and write
1B594128000
heap
page read and write
1B594672000
heap
page read and write
1B59409D000
heap
page read and write
1B59463E000
heap
page read and write
1B594627000
heap
page read and write
1B59415E000
heap
page read and write
1B5940A6000
heap
page read and write
1B59413A000
heap
page read and write
1B594497000
heap
page read and write
1B59413C000
heap
page read and write
8DD000
heap
page read and write
1B593F5A000
heap
page read and write
1B59413D000
heap
page read and write
1B594156000
heap
page read and write
1B594649000
heap
page read and write
1B594129000
heap
page read and write
1B59414B000
heap
page read and write
1B594148000
heap
page read and write
1B594627000
heap
page read and write
BC0000
trusted library allocation
page execute and read and write
1B594114000
heap
page read and write
1B5945A4000
heap
page read and write
901000
heap
page read and write
1B59460A000
heap
page read and write
1B594134000
heap
page read and write
1B591FF3000
heap
page read and write
1B594124000
heap
page read and write
2542000
trusted library allocation
page read and write
1B594153000
heap
page read and write
82D000
trusted library allocation
page execute and read and write
1B59463E000
heap
page read and write
1B59468F000
heap
page read and write
1B59410B000
heap
page read and write
1B594672000
heap
page read and write
1B5945F9000
heap
page read and write
1B594134000
heap
page read and write
1B5940E8000
heap
page read and write
1B594491000
heap
page read and write
1B59460C000
heap
page read and write
1B594649000
heap
page read and write
1B594672000
heap
page read and write
58ED000
stack
page read and write
1B5945CB000
heap
page read and write
1B594627000
heap
page read and write
1B594617000
heap
page read and write
1B59413C000
heap
page read and write
1B5948D0000
heap
page read and write
1B594155000
heap
page read and write
1B5939E1000
heap
page read and write
B52000
trusted library allocation
page read and write
1B5940EB000
heap
page read and write
1B593A12000
heap
page read and write
1B594103000
heap
page read and write
1B593A31000
heap
page read and write
7E0000
heap
page read and write
1B59412F000
heap
page read and write
1B5940F4000
heap
page read and write
1B591F4F000
heap
page read and write
1B593F90000
heap
page read and write
1B594672000
heap
page read and write
1B59468E000
heap
page read and write
1B594682000
heap
page read and write
1B594121000
heap
page read and write
1B5939A0000
heap
page read and write
1B59464A000
heap
page read and write
1B594672000
heap
page read and write
1B59413A000
heap
page read and write
1B594465000
heap
page read and write
1B592190000
heap
page read and write
1B594628000
heap
page read and write
137E000
stack
page read and write
1B59414F000
heap
page read and write
1B594153000
heap
page read and write
1B59457B000
heap
page read and write
1B594627000
heap
page read and write
592E000
stack
page read and write
1B5940A5000
heap
page read and write
1B594618000
heap
page read and write
1B5940F1000
heap
page read and write
1B593F4E000
heap
page read and write
1B59463E000
heap
page read and write
1B594613000
heap
page read and write
1B5944FB000
heap
page read and write
1B59449C000
heap
page read and write
1B594134000
heap
page read and write
1B594147000
heap
page read and write
1B59467B000
heap
page read and write
1B593F57000
heap
page read and write
1B5944B5000
heap
page read and write
1B594131000
heap
page read and write
1B593F5E000
heap
page read and write
1B594096000
heap
page read and write
1B5940E8000
heap
page read and write
1B594633000
heap
page read and write
1B5940F5000
heap
page read and write
1B594191000
heap
page read and write
1B593F57000
heap
page read and write
1B594159000
heap
page read and write
1B59462B000
heap
page read and write
1B59415B000
heap
page read and write
1B594623000
heap
page read and write
1B59409C000
heap
page read and write
1B593F59000
heap
page read and write
77E000
stack
page read and write
1B5940A7000
heap
page read and write
1B5945D3000
heap
page read and write
1B5940A8000
heap
page read and write
1B59449C000
heap
page read and write
1B594150000
heap
page read and write
1B5945B9000
heap
page read and write
1B59201E000
heap
page read and write
1B59415B000
heap
page read and write
253E000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
1B594156000
heap
page read and write
735000
heap
page read and write
3A017FE000
stack
page read and write
3A016F9000
stack
page read and write
1B59414B000
heap
page read and write
1B594156000
heap
page read and write
1B594603000
heap
page read and write
1B59200C000
heap
page read and write
1B59415D000
heap
page read and write
1B594649000
heap
page read and write
1B594682000
heap
page read and write
4DFE000
stack
page read and write
1B59411A000
heap
page read and write
730000
heap
page read and write
B5B000
trusted library allocation
page execute and read and write
1B594643000
heap
page read and write
1B59414B000
heap
page read and write
1B594087000
heap
page read and write
1B59201B000
heap
page read and write
2CC000
stack
page read and write
1B5945D3000
heap
page read and write
1B594057000
heap
page read and write
1B594622000
heap
page read and write
1B59410B000
heap
page read and write
1B594157000
heap
page read and write
1B59413C000
heap
page read and write
1B593E61000
heap
page read and write
1B594620000
heap
page read and write
1B594127000
heap
page read and write
1B594253000
heap
page read and write
1B594627000
heap
page read and write
1B594153000
heap
page read and write
1B594094000
heap
page read and write
868000
heap
page read and write
2565000
trusted library allocation
page read and write
1B593F58000
heap
page read and write
1B59460A000
heap
page read and write
1B594494000
heap
page read and write
568E000
stack
page read and write
1B594153000
heap
page read and write
1B594153000
heap
page read and write
1B59201E000
heap
page read and write
1B594629000
heap
page read and write
1B593F02000
heap
page read and write
1B5944B4000
heap
page read and write
1B5939A0000
heap
page read and write
1B594682000
heap
page read and write
1B5940FF000
heap
page read and write
B42000
trusted library allocation
page read and write
13B0000
heap
page read and write
1B594682000
heap
page read and write
1B59409C000
heap
page read and write
1B592195000
heap
page read and write
1B594151000
heap
page read and write
1B594545000
heap
page read and write
1B591FFF000
heap
page read and write
1B59411F000
heap
page read and write
1B594647000
heap
page read and write
1B594143000
heap
page read and write
1B5940F4000
heap
page read and write
4F7E000
stack
page read and write
1B594161000
heap
page read and write
1B594691000
heap
page read and write
1B59449C000
heap
page read and write
1B593F5A000
heap
page read and write
1ADD000
direct allocation
page execute and read and write
1B5940F0000
heap
page read and write
1B59414B000
heap
page read and write
1B594672000
heap
page read and write
1B594101000
heap
page read and write
1B594651000
heap
page read and write
1B59461C000
heap
page read and write
8E3000
heap
page read and write
12FC000
stack
page read and write
1B593F48000
heap
page read and write
1B591F56000
heap
page read and write
1B59410C000
heap
page read and write
1B594476000
heap
page read and write
1B5945CD000
heap
page read and write
1B594153000
heap
page read and write
1B59461F000
heap
page read and write
1B5941A6000
heap
page read and write
1B59413E000
heap
page read and write
840000
heap
page read and write
1B593F53000
heap
page read and write
1B59410B000
heap
page read and write
2547000
trusted library allocation
page read and write
1B59462F000
heap
page read and write
BBE000
stack
page read and write
A3E000
stack
page read and write
1B594155000
heap
page read and write
1B594117000
heap
page read and write
1B59449C000
heap
page read and write
1B594490000
heap
page read and write
5A2E000
stack
page read and write
1B593EED000
heap
page read and write
1B59413C000
heap
page read and write
1B594149000
heap
page read and write
1B59464D000
heap
page read and write
1B59413D000
heap
page read and write
1B594135000
heap
page read and write
1B594627000
heap
page read and write
3C9000
stack
page read and write
1B5941FB000
heap
page read and write
1B594055000
heap
page read and write
1B59448F000
heap
page read and write
1B59411F000
heap
page read and write
1B594627000
heap
page read and write
C00000
trusted library allocation
page read and write
1B59412A000
heap
page read and write
1B5940DF000
heap
page read and write
1B594153000
heap
page read and write
1B594682000
heap
page read and write
1B593A47000
heap
page read and write
1B594613000
heap
page read and write
1B593962000
heap
page read and write
1B594083000
heap
page read and write
1B593EA6000
heap
page read and write
1B594616000
heap
page read and write
252E000
trusted library allocation
page read and write
1B593F57000
heap
page read and write
1B593F51000
heap
page read and write
1B5940D3000
heap
page read and write
258C000
trusted library allocation
page read and write
1B594151000
heap
page read and write
1B59413C000
heap
page read and write
1B5940A6000
heap
page read and write
1B594153000
heap
page read and write
1B594593000
heap
page read and write
1B5940A0000
heap
page read and write
1B593F5E000
heap
page read and write
1B593A39000
heap
page read and write
1B5945A5000
heap
page read and write
1B591FFF000
heap
page read and write
B47000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
B57000
trusted library allocation
page execute and read and write
1B5945E7000
heap
page read and write
1B591F50000
heap
page read and write
1B59449D000
heap
page read and write
1B593F3F000
heap
page read and write
1B594153000
heap
page read and write
1B59460A000
heap
page read and write
1B594135000
heap
page read and write
1B59411A000
heap
page read and write
1B59413F000
heap
page read and write
1B594084000
heap
page read and write
1B5940F0000
heap
page read and write
1B59458D000
heap
page read and write
1B5945D3000
heap
page read and write
1B593AA0000
heap
page read and write
1B5940AC000
heap
page read and write
1B594492000
heap
page read and write
1B5940D3000
heap
page read and write
1B5940A5000
heap
page read and write
1B5948B0000
heap
page read and write
1B593A27000
heap
page read and write
1B594495000
heap
page read and write
1B594640000
heap
page read and write
1B5940A0000
heap
page read and write
1B593960000
heap
page read and write
1B5940DF000
heap
page read and write
1B594620000
heap
page read and write
630000
heap
page read and write
1B59413C000
heap
page read and write
1B5940C8000
heap
page read and write
1B594615000
heap
page read and write
1B5945A4000
heap
page read and write
1B59462F000
heap
page read and write
1B5945EB000
heap
page read and write
1B594649000
heap
page read and write
1B593F32000
heap
page read and write
1B594682000
heap
page read and write
1B59414B000
heap
page read and write
1B594127000
heap
page read and write
1B594672000
heap
page read and write
1B59464C000
heap
page read and write
1B59460F000
heap
page read and write
2596000
trusted library allocation
page read and write
1B593961000
heap
page read and write
1B5939E1000
heap
page read and write
1B594246000
heap
page read and write
1B5940FF000
heap
page read and write
1B591FDE000
heap
page read and write
1B59201E000
heap
page read and write
1B594151000
heap
page read and write
1B5945CB000
heap
page read and write
B3E000
stack
page read and write
1B59460D000
heap
page read and write
1B594103000
heap
page read and write
1B59413C000
heap
page read and write
1B594613000
heap
page read and write
1B594649000
heap
page read and write
1B594478000
heap
page read and write
1B594092000
heap
page read and write
1B5940A3000
heap
page read and write
1B5940FE000
heap
page read and write
1B594A50000
trusted library allocation
page read and write
1B5940D3000
heap
page read and write
1B594101000
heap
page read and write
1B59413A000
heap
page read and write
7D0000
heap
page read and write
1B59413C000
heap
page read and write
554E000
stack
page read and write
5BAE000
stack
page read and write
24E1000
trusted library allocation
page read and write
1B59414B000
heap
page read and write
824000
trusted library allocation
page read and write
1B591F20000
heap
page read and write
1B594151000
heap
page read and write
220000
unkown
page readonly
34E1000
trusted library allocation
page read and write
1B59413C000
heap
page read and write
1B594800000
heap
page read and write
1B594143000
heap
page read and write
1B594606000
heap
page read and write
823000
trusted library allocation
page execute and read and write
1B594151000
heap
page read and write
1B59449A000
heap
page read and write
4B70000
heap
page execute and read and write
1B59201E000
heap
page read and write
1640000
heap
page read and write
1B594122000
heap
page read and write
1B5940A6000
heap
page read and write
1B59454F000
heap
page read and write
2531000
trusted library allocation
page read and write
1B594644000
heap
page read and write
1B594153000
heap
page read and write
1B59449C000
heap
page read and write
1B593E9D000
heap
page read and write
578E000
stack
page read and write
1B5940D8000
heap
page read and write
1B593F55000
heap
page read and write
1B594627000
heap
page read and write
1B593F32000
heap
page read and write
2654000
trusted library allocation
page read and write
1B59461D000
heap
page read and write
1B59413C000
heap
page read and write
1B59415A000
heap
page read and write
1B59412A000
heap
page read and write
1B594552000
heap
page read and write
1B5945D4000
heap
page read and write
1B59467B000
heap
page read and write
4CBF000
stack
page read and write
1B59415D000
heap
page read and write
1B59413C000
heap
page read and write
1B59450C000
heap
page read and write
2590000
trusted library allocation
page read and write
1B594135000
heap
page read and write
1B5944A1000
heap
page read and write
1B59414A000
heap
page read and write
1B593B00000
heap
page read and write
1B594618000
heap
page read and write
1B594682000
heap
page read and write
1B594135000
heap
page read and write
1B593F9D000
heap
page read and write
1B594103000
heap
page read and write
1B594131000
heap
page read and write
1B594490000
heap
page read and write
1B594103000
heap
page read and write
3A020FB000
stack
page read and write
1B594452000
heap
page read and write
1B594627000
heap
page read and write
1B5940D3000
heap
page read and write
1B594153000
heap
page read and write
1B59201E000
heap
page read and write
1B594124000
heap
page read and write
4E3D000
stack
page read and write
1B5945A4000
heap
page read and write
1B594156000
heap
page read and write
1B5940DF000
heap
page read and write
1B594564000
heap
page read and write
5A6C000
stack
page read and write
1B594497000
heap
page read and write
1B59413C000
heap
page read and write
1B59409C000
heap
page read and write
1B594651000
heap
page read and write
1B593E90000
heap
page read and write
84A000
heap
page read and write
1B594087000
heap
page read and write
1B594602000
heap
page read and write
1B593F47000
heap
page read and write
1B594057000
heap
page read and write
1B59411A000
heap
page read and write
1B594151000
heap
page read and write
1B59442C000
heap
page read and write
1B594147000
heap
page read and write
1B5941F7000
heap
page read and write
1B594625000
heap
page read and write
1B59449C000
heap
page read and write
1B59463F000
heap
page read and write
1B594153000
heap
page read and write
1B5940D3000
heap
page read and write
1B594618000
heap
page read and write
1B59411A000
heap
page read and write
1B594651000
heap
page read and write
1B594111000
heap
page read and write
1B5940A9000
heap
page read and write
1B59200C000
heap
page read and write
1C76000
direct allocation
page execute and read and write
1B594E50000
heap
page read and write
1B594360000
heap
page read and write
1B591F49000
heap
page read and write
1B594123000
heap
page read and write
1B59414B000
heap
page read and write
1380000
heap
page read and write
1B594145000
heap
page read and write
1B594691000
heap
page read and write
1B59411F000
heap
page read and write
1B59414B000
heap
page read and write
1B594131000
heap
page read and write
1B594567000
heap
page read and write
1B593E60000
heap
page read and write
1B59415E000
heap
page read and write
1B594135000
heap
page read and write
1B5940FC000
heap
page read and write
1B594491000
heap
page read and write
1B594160000
heap
page read and write
1B594691000
heap
page read and write
830000
trusted library allocation
page read and write
1B59449C000
heap
page read and write
1B593EF6000
heap
page read and write
1B594630000
heap
page read and write
1B59201D000
heap
page read and write
1B593994000
heap
page read and write
1B59414B000
heap
page read and write
1B594138000
heap
page read and write
1B593A1F000
heap
page read and write
1B59463F000
heap
page read and write
1B59411A000
heap
page read and write
1B5940F0000
heap
page read and write
1B59411D000
heap
page read and write
1B5940F0000
heap
page read and write
51BF000
stack
page read and write
1B5944A1000
heap
page read and write
1B59413C000
heap
page read and write
1B594098000
heap
page read and write
1B594612000
heap
page read and write
1470000
heap
page read and write
810000
trusted library allocation
page read and write
1B59409C000
heap
page read and write
1B594090000
heap
page read and write
1B594153000
heap
page read and write
5CAE000
stack
page read and write
1B594105000
heap
page read and write
1B59414F000
heap
page read and write
1B594610000
heap
page read and write
1B5940F5000
heap
page read and write
1C7D000
direct allocation
page execute and read and write
1B594622000
heap
page read and write
1B5945A8000
heap
page read and write
1B59461A000
heap
page read and write
1B59414B000
heap
page read and write
1B59415D000
heap
page read and write
1B594490000
heap
page read and write
1B593F57000
heap
page read and write
1B59467B000
heap
page read and write
1B59412F000
heap
page read and write
1B59413C000
heap
page read and write
1B59410C000
heap
page read and write
1B594647000
heap
page read and write
7BE000
stack
page read and write
1B5939EE000
heap
page read and write
1B59201B000
heap
page read and write
1B594153000
heap
page read and write
24D0000
heap
page read and write
1B5940FE000
heap
page read and write
1B59449A000
heap
page read and write
1B59463F000
heap
page read and write
1B5940FF000
heap
page read and write
538D000
stack
page read and write
1B5945D2000
heap
page read and write
1B59409A000
heap
page read and write
1B594153000
heap
page read and write
1B4E000
direct allocation
page execute and read and write
1B59399F000
heap
page read and write
BE0000
heap
page execute and read and write
1B594127000
heap
page read and write
1B594627000
heap
page read and write
1B59467B000
heap
page read and write
1B594612000
heap
page read and write
1B594617000
heap
page read and write
1B5945EB000
heap
page read and write
1B594616000
heap
page read and write
1B594156000
heap
page read and write
255C000
trusted library allocation
page read and write
1B59456A000
heap
page read and write
1B594111000
heap
page read and write
BD0000
trusted library allocation
page read and write
1B593A31000
heap
page read and write
1B594628000
heap
page read and write
1B594497000
heap
page read and write
1B59414B000
heap
page read and write
1B5940A4000
heap
page read and write
1B593966000
heap
page read and write
There are 811 hidden memdumps, click here to show them.