IOC Report
z45paymentadvice.exe

loading gif

Files

File Path
Type
Category
Malicious
z45paymentadvice.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subpredicate.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\windigos
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z45paymentadvice.exe
"C:\Users\user\Desktop\z45paymentadvice.exe"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\Desktop\z45paymentadvice.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\z45paymentadvice.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subpredicate.vbs"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://reallyfreegeoip.org/xml/155.94.241.188l
unknown
http://checkip.dyndns.org/
158.101.44.242
http://crl.micro
unknown
http://crl.microsoft
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot7433626511:AAG6-SliBdFhddNZipC5HIcTnvhgatm6i28/sendDocument?chat_id=1780
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://reallyfreegeoip.org/xml/155.94.241.188
188.114.97.3
https://api.telegram.org/bot7433626511:AAG6-SliBdFhddNZipC5HIcTnvhgatm6i28/sendDocument?chat_id=1780630805&caption=user%20/%20Passwords%20/%20155.94.241.188
149.154.167.220
https://reallyfreegeoip.org/xml/
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D20000
trusted library allocation
page read and write
malicious
26B0000
heap
page read and write
malicious
28D0000
trusted library section
page read and write
malicious
2820000
trusted library section
page read and write
malicious
41B1000
trusted library allocation
page read and write
malicious
3340000
trusted library allocation
page read and write
malicious
5220000
heap
page read and write
3E41000
heap
page read and write
A6C000
heap
page read and write
FADBEFF000
stack
page read and write
4494000
direct allocation
page read and write
2C31000
trusted library allocation
page read and write
9B5000
trusted library allocation
page execute and read and write
28B1000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
490000
unkown
page read and write
1378000
heap
page read and write
27DD000
stack
page read and write
46E0000
direct allocation
page read and write
46BD000
direct allocation
page read and write
68CE000
stack
page read and write
2E20000
heap
page read and write
970000
trusted library allocation
page read and write
3BC0000
heap
page read and write
8FE000
stack
page read and write
1300000
trusted library allocation
page read and write
482000
unkown
page readonly
9D0000
heap
page read and write
2C6D000
trusted library allocation
page read and write
3F74000
heap
page read and write
56A2000
trusted library allocation
page read and write
2350CC89000
heap
page read and write
A9E000
heap
page read and write
3A6F000
stack
page read and write
2CB9000
trusted library allocation
page read and write
4A7000
unkown
page read and write
5D56000
trusted library allocation
page read and write
3B31000
heap
page read and write
9EE000
stack
page read and write
97B000
heap
page read and write
64E0000
heap
page read and write
5BE000
stack
page read and write
3D2B000
heap
page read and write
490000
unkown
page read and write
940000
trusted library section
page read and write
4513000
direct allocation
page read and write
9B7000
trusted library allocation
page execute and read and write
2E50000
heap
page read and write
333A000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
3E43000
heap
page execute and read and write
6DC0000
heap
page read and write
FADC5FD000
stack
page read and write
67B0000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
46BD000
direct allocation
page read and write
2C38000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
94A000
heap
page read and write
6D30000
trusted library allocation
page execute and read and write
910000
heap
page read and write
3CE8000
heap
page read and write
46BD000
direct allocation
page read and write
3C81000
heap
page read and write
3D54000
heap
page read and write
5696000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
1174000
heap
page read and write
5D50000
trusted library allocation
page read and write
3E32000
heap
page execute and read and write
13D9000
heap
page read and write
400000
unkown
page readonly
3E41000
heap
page read and write
694D000
stack
page read and write
327F000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
269E000
stack
page read and write
30A0000
heap
page read and write
2CB5000
trusted library allocation
page read and write
9B2000
trusted library allocation
page read and write
98D000
trusted library allocation
page execute and read and write
4513000
direct allocation
page read and write
6D2E000
stack
page read and write
153F000
stack
page read and write
3BFE000
heap
page read and write
5150000
trusted library allocation
page execute and read and write
6CEE000
stack
page read and write
490000
unkown
page read and write
113F000
stack
page read and write
2910000
trusted library allocation
page execute and read and write
3E37000
heap
page read and write
2BEB000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
5C0000
heap
page read and write
400000
unkown
page readonly
46B9000
direct allocation
page read and write
100000
heap
page read and write
89F000
stack
page read and write
588D000
stack
page read and write
4590000
direct allocation
page read and write
568A000
trusted library allocation
page read and write
1447000
heap
page read and write
482000
unkown
page readonly
12A0000
heap
page read and write
3C48000
heap
page read and write
2BF9000
trusted library allocation
page read and write
1F0000
heap
page read and write
4236000
heap
page read and write
2BD4000
trusted library allocation
page read and write
16E0000
heap
page read and write
31D3000
trusted library allocation
page read and write
1325000
trusted library allocation
page execute and read and write
128F000
stack
page read and write
43F0000
direct allocation
page read and write
4523000
direct allocation
page read and write
3DE4000
heap
page read and write
4239000
trusted library allocation
page read and write
31E9000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
490000
unkown
page read and write
10F6000
stack
page read and write
2F40000
heap
page read and write
100000
heap
page read and write
28AA000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
3C35000
heap
page read and write
2EB7000
heap
page read and write
610F000
stack
page read and write
4A7000
unkown
page read and write
3E33000
heap
page read and write
3C33000
heap
page read and write
29BE000
stack
page read and write
2CAD000
trusted library allocation
page read and write
554E000
stack
page read and write
3CBA000
heap
page read and write
3CAF000
heap
page read and write
4230000
trusted library allocation
page read and write
3CE2000
heap
page read and write
67B2000
trusted library allocation
page read and write
2BC9000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
94E000
heap
page read and write
3A70000
heap
page read and write
64B0000
trusted library allocation
page execute and read and write
131A000
trusted library allocation
page execute and read and write
568E000
trusted library allocation
page read and write
43F0000
direct allocation
page read and write
567B000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
2980000
heap
page read and write
2BB0000
trusted library allocation
page read and write
17E000
stack
page read and write
8C8000
heap
page read and write
3CAE000
heap
page read and write
9AA000
trusted library allocation
page execute and read and write
480D000
direct allocation
page read and write
2350CE70000
heap
page read and write
2E38000
heap
page read and write
426000
system
page execute and read and write
3CE2000
heap
page read and write
123F000
stack
page read and write
487E000
direct allocation
page read and write
3B28000
heap
page read and write
3C30000
heap
page read and write
32F7000
trusted library allocation
page read and write
3E3B000
heap
page read and write
31F4000
trusted library allocation
page read and write
4590000
direct allocation
page read and write
4540000
direct allocation
page read and write
950000
heap
page read and write
1316000
trusted library allocation
page execute and read and write
45A0000
direct allocation
page read and write
3E8F000
heap
page read and write
2E20000
heap
page read and write
480D000
direct allocation
page read and write
9C5000
heap
page read and write
3ED9000
heap
page read and write
3070000
trusted library allocation
page read and write
3BB0000
heap
page read and write
3420000
trusted library allocation
page read and write
472E000
direct allocation
page read and write
1E5000
heap
page read and write
2E2F000
stack
page read and write
6ACF000
stack
page read and write
3CBC000
heap
page read and write
2F10000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
FADC3FE000
stack
page read and write
2D1A000
trusted library allocation
page read and write
3E52000
heap
page read and write
5E0000
heap
page read and write
400000
unkown
page readonly
396F000
stack
page read and write
2BDC000
trusted library allocation
page read and write
FADBB8A000
stack
page read and write
A00000
heap
page read and write
3209000
trusted library allocation
page read and write
1140000
heap
page read and write
2BA6000
trusted library allocation
page read and write
3D9D000
heap
page read and write
8AF000
stack
page read and write
4590000
direct allocation
page read and write
4223000
trusted library allocation
page read and write
3E40000
heap
page read and write
46BD000
direct allocation
page read and write
9A000
stack
page read and write
6774000
trusted library allocation
page read and write
2350CC80000
heap
page read and write
4230000
direct allocation
page read and write
AE5000
heap
page read and write
2350CCA6000
heap
page read and write
2D6E000
stack
page read and write
43F0000
direct allocation
page read and write
3C19000
heap
page read and write
46B9000
direct allocation
page read and write
31AE000
stack
page read and write
9D4000
heap
page read and write
1360000
trusted library allocation
page execute and read and write
3E31000
heap
page read and write
3C79000
trusted library allocation
page read and write
482000
unkown
page readonly
31BC000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
156F000
stack
page read and write
2BE2000
trusted library allocation
page read and write
4AB000
unkown
page readonly
3060000
heap
page execute and read and write
3C16000
heap
page read and write
4C8E000
stack
page read and write
516C000
trusted library allocation
page read and write
CFE000
stack
page read and write
3CD6000
heap
page read and write
2B70000
trusted library allocation
page read and write
9E0000
heap
page read and write
2B7D000
trusted library allocation
page read and write
93E000
stack
page read and write
2BA4000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
2DDF000
stack
page read and write
42FC000
heap
page read and write
429A000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
120E000
stack
page read and write
472E000
direct allocation
page read and write
46C9000
direct allocation
page read and write
2570000
trusted library allocation
page read and write
50CE000
stack
page read and write
3CB9000
heap
page read and write
5169000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
4590000
direct allocation
page read and write
480D000
direct allocation
page read and write
1270000
heap
page read and write
2E40000
heap
page read and write
3D2D000
heap
page read and write
3C06000
heap
page read and write
4809000
direct allocation
page read and write
2E04000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
A30000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
31FE000
trusted library allocation
page read and write
5670000
trusted library allocation
page execute and read and write
3B70000
heap
page read and write
4663000
direct allocation
page read and write
FADC7FF000
stack
page read and write
2BE4000
trusted library allocation
page read and write
11D0000
heap
page read and write
3290000
trusted library allocation
page read and write
46BD000
direct allocation
page read and write
516F000
trusted library allocation
page read and write
490000
unkown
page write copy
4540000
direct allocation
page read and write
1700000
heap
page read and write
9A0000
trusted library allocation
page read and write
490000
unkown
page write copy
2F43000
heap
page read and write
3B2F000
stack
page read and write
1303000
trusted library allocation
page read and write
3A7B000
heap
page read and write
436000
system
page execute and read and write
AC6000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
28BD000
trusted library allocation
page read and write
A48000
heap
page read and write
100000
heap
page read and write
8AF000
stack
page read and write
6779000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
2350CCB6000
heap
page read and write
8AF000
stack
page read and write
2BCB000
trusted library allocation
page read and write
3C5A000
heap
page read and write
4590000
direct allocation
page read and write
2FE4000
heap
page read and write
DF0000
heap
page read and write
46B9000
direct allocation
page read and write
A9D000
heap
page read and write
3074000
trusted library allocation
page read and write
2E89000
heap
page read and write
3E31000
heap
page read and write
33E2000
trusted library allocation
page read and write
2350EC02000
heap
page read and write
2BEF000
trusted library allocation
page read and write
709E000
stack
page read and write
32D1000
trusted library allocation
page read and write
6F9E000
stack
page read and write
3E47000
heap
page read and write
9A5000
heap
page read and write
2BA8000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
A60000
heap
page read and write
1C0000
heap
page read and write
2F8E000
stack
page read and write
567E000
trusted library allocation
page read and write
3F78000
heap
page read and write
142E000
heap
page read and write
64AF000
stack
page read and write
31CA000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
473E000
direct allocation
page read and write
2F25000
heap
page read and write
3BA8000
heap
page read and write
2B9C000
trusted library allocation
page read and write
2B2E000
stack
page read and write
490000
unkown
page write copy
4809000
direct allocation
page read and write
983000
trusted library allocation
page execute and read and write
1210000
heap
page read and write
4540000
direct allocation
page read and write
31C4000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
3204000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
401000
unkown
page execute read
5D66000
trusted library allocation
page read and write
1E0000
heap
page read and write
9BB000
trusted library allocation
page execute and read and write
980000
trusted library allocation
page read and write
130D000
trusted library allocation
page execute and read and write
3B91000
trusted library allocation
page read and write
29CD000
stack
page read and write
3C9E000
heap
page read and write
2D15000
trusted library allocation
page read and write
3CD4000
heap
page read and write
400000
unkown
page readonly
2350CF80000
heap
page read and write
46E0000
direct allocation
page read and write
6AD0000
trusted library allocation
page read and write
3C70000
heap
page read and write
46B9000
direct allocation
page read and write
3BBE000
trusted library allocation
page read and write
113E000
stack
page read and write
2900000
trusted library allocation
page read and write
46B9000
direct allocation
page read and write
9A6000
trusted library allocation
page execute and read and write
356E000
stack
page read and write
330B000
trusted library allocation
page read and write
677C000
trusted library allocation
page read and write
400000
unkown
page readonly
332E000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
2350EC00000
heap
page read and write
4663000
direct allocation
page read and write
5F70000
trusted library allocation
page read and write
46CD000
direct allocation
page read and write
4513000
direct allocation
page read and write
3076000
trusted library allocation
page read and write
473E000
direct allocation
page read and write
3C39000
trusted library allocation
page read and write
57BE000
stack
page read and write
2FA0000
direct allocation
page read and write
3DF7000
heap
page read and write
2BC7000
trusted library allocation
page read and write
A20000
heap
page read and write
D8A000
stack
page read and write
2350CC60000
heap
page read and write
3E40000
heap
page read and write
6D60000
heap
page read and write
2E1E000
stack
page read and write
46E0000
direct allocation
page read and write
5252000
heap
page read and write
3E32000
heap
page execute and read and write
4400000
direct allocation
page read and write
31E1000
trusted library allocation
page read and write
1275000
heap
page read and write
401000
unkown
page execute read
5992000
heap
page read and write
3E41000
heap
page read and write
31CC000
trusted library allocation
page read and write
281E000
stack
page read and write
3C71000
heap
page read and write
31C6000
trusted library allocation
page read and write
482000
unkown
page readonly
566E000
stack
page read and write
135000
heap
page read and write
2C98000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
3E60000
heap
page read and write
6790000
trusted library allocation
page read and write
1F0000
heap
page read and write
32C3000
trusted library allocation
page read and write
3C10000
direct allocation
page read and write
51EE000
stack
page read and write
5650000
trusted library allocation
page execute and read and write
46E0000
direct allocation
page read and write
990000
trusted library allocation
page read and write
480D000
direct allocation
page read and write
3287000
trusted library allocation
page read and write
3C31000
heap
page read and write
940000
heap
page read and write
67C0000
heap
page read and write
4590000
direct allocation
page read and write
31C8000
trusted library allocation
page read and write
570000
heap
page read and write
401000
unkown
page execute read
509000
stack
page read and write
4237000
heap
page read and write
8C0000
heap
page read and write
3080000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
480D000
direct allocation
page read and write
12F0000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
3D18000
heap
page read and write
2FD4000
heap
page read and write
3200000
trusted library allocation
page read and write
130000
heap
page read and write
5160000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
3D18000
heap
page read and write
437D000
heap
page read and write
400000
system
page execute and read and write
401000
unkown
page execute read
331E000
trusted library allocation
page read and write
12F3000
trusted library allocation
page execute and read and write
308E000
trusted library allocation
page read and write
13AD000
heap
page read and write
4809000
direct allocation
page read and write
480D000
direct allocation
page read and write
1280000
heap
page read and write
2BE0000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
628E000
stack
page read and write
3BE5000
trusted library allocation
page read and write
5228000
heap
page read and write
3E30000
heap
page read and write
2CF9000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
3AB1000
heap
page read and write
9A000
stack
page read and write
1327000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
13D0000
heap
page read and write
4A7000
unkown
page read and write
110000
heap
page read and write
3C2E000
heap
page read and write
3A80000
direct allocation
page read and write
569D000
trusted library allocation
page read and write
52A6000
heap
page read and write
8F7000
stack
page read and write
6810000
heap
page read and write
3CCF000
heap
page read and write
472E000
direct allocation
page read and write
2BAC000
trusted library allocation
page read and write
4A7000
unkown
page read and write
1320000
trusted library allocation
page read and write
4513000
direct allocation
page read and write
2A25000
heap
page read and write
372E000
stack
page read and write
984000
trusted library allocation
page read and write
2E45000
heap
page read and write
5810000
trusted library allocation
page execute and read and write
4AB000
unkown
page readonly
9A000
stack
page read and write
3F70000
heap
page read and write
401000
unkown
page execute read
2A20000
heap
page read and write
3F81000
heap
page read and write
8AF000
stack
page read and write
2C2F000
trusted library allocation
page read and write
3C15000
heap
page read and write
46CD000
direct allocation
page read and write
A40000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
10FF000
stack
page read and write
490000
unkown
page write copy
4513000
direct allocation
page read and write
46C9000
direct allocation
page read and write
13A0000
heap
page read and write
4245000
heap
page read and write
D2F000
stack
page read and write
5960000
heap
page read and write
320B000
trusted library allocation
page read and write
12B0000
heap
page read and write
168E000
stack
page read and write
2880000
heap
page read and write
482000
unkown
page readonly
2B97000
trusted library allocation
page read and write
4809000
direct allocation
page read and write
2C7A000
trusted library allocation
page read and write
2A20000
heap
page read and write
52EE000
stack
page read and write
2580000
trusted library allocation
page read and write
A70000
heap
page read and write
3B2E000
heap
page read and write
32B8000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
5950000
heap
page read and write
45A0000
direct allocation
page read and write
3206000
trusted library allocation
page read and write
3E51000
heap
page read and write
3CE0000
heap
page read and write
3302000
trusted library allocation
page read and write
401000
system
page execute and read and write
2350CF85000
heap
page read and write
67A0000
trusted library allocation
page execute and read and write
6780000
trusted library allocation
page execute and read and write
443C000
heap
page read and write
482000
unkown
page readonly
2CDB000
trusted library allocation
page read and write
2350E8B0000
heap
page read and write
3219000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
9C0000
heap
page read and write
400000
unkown
page readonly
42EF000
heap
page read and write
3F81000
heap
page read and write
2BCD000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
3C73000
heap
page read and write
89F000
stack
page read and write
472E000
direct allocation
page read and write
4809000
direct allocation
page read and write
327C000
trusted library allocation
page read and write
677F000
trusted library allocation
page read and write
5FD0000
heap
page read and write
1460000
heap
page read and write
9A0000
heap
page read and write
A68000
heap
page read and write
29FE000
stack
page read and write
400000
unkown
page readonly
2CF5000
trusted library allocation
page read and write
2BB3000
trusted library allocation
page read and write
4AB000
unkown
page readonly
32FB000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
125E000
stack
page read and write
3E42000
heap
page read and write
2C64000
trusted library allocation
page read and write
1290000
trusted library section
page read and write
AC9000
heap
page read and write
5F6E000
stack
page read and write
2FD0000
heap
page read and write
4AB000
unkown
page readonly
43F0000
direct allocation
page read and write
366E000
stack
page read and write
1310000
trusted library allocation
page read and write
472E000
direct allocation
page read and write
97B000
heap
page read and write
3B30000
heap
page read and write
2C5C000
trusted library allocation
page read and write
13F8000
heap
page read and write
2B80000
heap
page execute and read and write
4AB000
unkown
page readonly
487E000
direct allocation
page read and write
624E000
stack
page read and write
4AB000
unkown
page readonly
1322000
trusted library allocation
page read and write
3F73000
heap
page execute and read and write
FADC2FF000
stack
page read and write
3DD9000
heap
page read and write
2D70000
heap
page read and write
3AB0000
heap
page read and write
2BB7000
trusted library allocation
page read and write
371E000
stack
page read and write
3E40000
heap
page read and write
4663000
direct allocation
page read and write
4AB000
unkown
page readonly
2B91000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
614E000
stack
page read and write
2850000
trusted library allocation
page read and write
401000
unkown
page execute read
1340000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
A9A000
heap
page read and write
3D2B000
heap
page read and write
4540000
direct allocation
page read and write
56B0000
heap
page execute and read and write
2350CE50000
heap
page read and write
4809000
direct allocation
page read and write
69CE000
stack
page read and write
4513000
direct allocation
page read and write
110000
heap
page read and write
42F8000
heap
page read and write
1170000
heap
page read and write
2930000
heap
page execute and read and write
328D000
trusted library allocation
page read and write
3F71000
heap
page read and write
2BC5000
trusted library allocation
page read and write
28AE000
trusted library allocation
page read and write
3C28000
heap
page read and write
2CE2000
trusted library allocation
page read and write
99D000
trusted library allocation
page execute and read and write
2883000
heap
page read and write
482000
unkown
page readonly
2D0E000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
2FE0000
heap
page read and write
4523000
direct allocation
page read and write
31B1000
trusted library allocation
page read and write
A2E000
stack
page read and write
3E33000
heap
page read and write
3B47000
heap
page read and write
12F4000
trusted library allocation
page read and write
3B80000
direct allocation
page read and write
9CE000
stack
page read and write
2BF7000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
8FE000
stack
page read and write
FADC0FE000
stack
page read and write
59D7000
heap
page read and write
5D6D000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
3D07000
heap
page read and write
5C8E000
stack
page read and write
132B000
trusted library allocation
page execute and read and write
2590000
heap
page read and write
2CD7000
trusted library allocation
page read and write
A90000
heap
page read and write
2B76000
trusted library allocation
page read and write
401000
unkown
page execute read
3ED9000
heap
page read and write
11BE000
stack
page read and write
289E000
trusted library allocation
page read and write
3D54000
heap
page read and write
12E0000
trusted library allocation
page read and write
2F20000
heap
page read and write
2CB1000
trusted library allocation
page read and write
422D000
trusted library allocation
page read and write
43F0000
direct allocation
page read and write
3D70000
heap
page read and write
FADC8FB000
stack
page read and write
487E000
direct allocation
page read and write
46E0000
direct allocation
page read and write
2BC3000
trusted library allocation
page read and write
46BD000
direct allocation
page read and write
2F30000
trusted library allocation
page read and write
1350000
heap
page read and write
166F000
stack
page read and write
43F0000
direct allocation
page read and write
1BE000
stack
page read and write
3E51000
heap
page read and write
422000
system
page execute and read and write
3284000
trusted library allocation
page read and write
654E000
stack
page read and write
31D0000
trusted library allocation
page read and write
401000
unkown
page execute read
329A000
trusted library allocation
page read and write
3CCF000
heap
page read and write
6770000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
482000
unkown
page readonly
400000
unkown
page readonly
6760000
trusted library allocation
page execute and read and write
1462000
heap
page read and write
3315000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
2350CCE5000
heap
page read and write
3BC7000
heap
page read and write
A40000
heap
page read and write
93E000
stack
page read and write
89F000
stack
page read and write
9A000
stack
page read and write
46B9000
direct allocation
page read and write
2DDE000
stack
page read and write
5954000
heap
page read and write
89F000
stack
page read and write
5660000
trusted library allocation
page read and write
3D9D000
heap
page read and write
2E21000
heap
page read and write
993000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
3C43000
heap
page read and write
3970000
heap
page read and write
4AB000
unkown
page readonly
ACB000
heap
page read and write
9A2000
trusted library allocation
page read and write
96E000
heap
page read and write
1E0000
heap
page read and write
970000
heap
page read and write
3E37000
heap
page read and write
2E60000
heap
page read and write
FADC6FE000
stack
page read and write
3E41000
heap
page read and write
2E20000
heap
page read and write
3B1F000
stack
page read and write
3C08000
heap
page read and write
31B7000
trusted library allocation
page read and write
3E8F000
heap
page read and write
2DC2000
trusted library allocation
page read and write
5F72000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
2DFF000
trusted library allocation
page read and write
950000
heap
page read and write
472E000
direct allocation
page read and write
2E98000
heap
page read and write
2970000
trusted library allocation
page read and write
A4E000
stack
page read and write
2BE9000
trusted library allocation
page read and write
5210000
heap
page read and write
487E000
direct allocation
page read and write
2BDE000
trusted library allocation
page read and write
59EE000
heap
page read and write
D0000
heap
page read and write
D5000
heap
page read and write
698F000
stack
page read and write
31FC000
trusted library allocation
page read and write
FADBFFE000
stack
page read and write
2CFE000
trusted library allocation
page read and write
3E44000
heap
page read and write
FADC4F7000
stack
page read and write
8EE000
heap
page read and write
3E30000
heap
page read and write
1370000
heap
page read and write
There are 727 hidden memdumps, click here to show them.