IOC Report
EPAYMENT.COM

loading gif

Files

File Path
Type
Category
Malicious
EPAYMENT.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ArmouryCrate.AppServiceBridge.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\NeroCmd.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Nysene7.Bru4
data
dropped
C:\Users\user\AppData\Local\Temp\audio-x-generic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\camera-photo.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\libtclsqlite3.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\list-drag-handle-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsfA31.tmp\LangDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsfA31.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EPAYMENT.exe
"C:\Users\user\Desktop\EPAYMENT.exe"
malicious

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://cdn.discordapp.com/attachments/973717070128771135/973717952987820073/a1.exe
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://ocsp.thawte.com0
unknown
http://www.nero.com
unknown
https://sectigo.com/CPS0D
unknown
There are 2 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\snoreloft\Mirakulst
Expand String Value

Memdumps

Base Address
Regiontype
Protect
Malicious
329F000
trusted library allocation
page execute and read and write
malicious
188A0D70000
trusted library allocation
page read and write
155D8DA4000
heap
page read and write
530F07A000
stack
page read and write
4D5000
heap
page read and write
188A0CD0000
heap
page read and write
155D8D9F000
heap
page read and write
2288A720000
heap
page read and write
155D8D74000
heap
page read and write
155D8BC0000
remote allocation
page read and write
D0D747B000
stack
page read and write
274D842D000
heap
page read and write
1D002508000
heap
page read and write
155D9202000
heap
page read and write
76C000
heap
page read and write
2288A884000
heap
page read and write
1BB9ACB0000
trusted library allocation
page read and write
274D2C93000
heap
page read and write
2288A865000
heap
page read and write
274D8400000
heap
page read and write
18ADE6CA000
heap
page read and write
1BB99DB1000
heap
page read and write
155D9200000
heap
page read and write
2288A860000
heap
page read and write
6BB000
heap
page read and write
274D2C00000
heap
page read and write
166E9C00000
heap
page read and write
274D8455000
heap
page read and write
4C09EFF000
stack
page read and write
2288A84F000
heap
page read and write
29F94102000
heap
page read and write
702000
heap
page read and write
155D8DAF000
heap
page read and write
75E000
heap
page read and write
166E9A10000
heap
page read and write
274D2CFD000
heap
page read and write
37A0000
trusted library allocation
page read and write
155D8D9F000
heap
page read and write
155D9202000
heap
page read and write
1FD63868000
heap
page read and write
155D8D83000
heap
page read and write
155D8D8B000
heap
page read and write
29B0478000
stack
page read and write
274D3558000
heap
page read and write
1FD76275000
heap
page read and write
DE6959E000
stack
page read and write
274D2D02000
heap
page read and write
155D8DA2000
heap
page read and write
B47BE7B000
stack
page read and write
2288A86A000
heap
page read and write
1FD7602E000
heap
page read and write
155D8413000
heap
page read and write
E078FE000
stack
page read and write
274D8320000
trusted library allocation
page read and write
274D2B00000
heap
page read and write
274D8290000
trusted library allocation
page read and write
40A000
unkown
page write copy
188A0E55000
heap
page read and write
1BB9AC60000
trusted library allocation
page read and write
46EBD1E000
stack
page read and write
274D2C13000
heap
page read and write
530F279000
stack
page read and write
1FD76020000
heap
page read and write
C36000
heap
page read and write
1FD63902000
heap
page read and write
155D8D8F000
heap
page read and write
29F93F40000
heap
page read and write
2EB2D7C000
stack
page read and write
274D81C0000
trusted library allocation
page read and write
E0752B000
stack
page read and write
155D8513000
heap
page read and write
20C66430000
heap
page read and write
74D000
heap
page read and write
2288A847000
heap
page read and write
20C66590000
trusted library allocation
page read and write
274D3513000
heap
page read and write
155D8DA2000
heap
page read and write
155D8D94000
heap
page read and write
274D8630000
trusted library allocation
page read and write
1BB9A039000
heap
page read and write
29F94050000
heap
page read and write
155D8C02000
heap
page read and write
274D8290000
trusted library allocation
page read and write
29F93EE0000
heap
page read and write
C30000
heap
page read and write
1FD63813000
heap
page read and write
274D3500000
heap
page read and write
274D2CAB000
heap
page read and write
29F93F70000
trusted library allocation
page read and write
18ADE540000
heap
page read and write
1D002453000
heap
page read and write
155D8D15000
heap
page read and write
29F94054000
heap
page read and write
6DC84000
unkown
page readonly
18ADE600000
heap
page read and write
155D8DB1000
heap
page read and write
155D84AB000
heap
page read and write
188A0E81000
heap
page read and write
2288A868000
heap
page read and write
2288A846000
heap
page read and write
2288A7B0000
trusted library allocation
page read and write
6462379000
stack
page read and write
5A30000
trusted library allocation
page read and write
2288A813000
heap
page read and write
274D2C9E000
heap
page read and write
2288A841000
heap
page read and write
1D00244E000
heap
page read and write
1FD76024000
heap
page read and write
530F37C000
stack
page read and write
20C66700000
heap
page read and write
155D8D8F000
heap
page read and write
1FD6383E000
heap
page read and write
29F94108000
heap
page read and write
D3E37FE000
stack
page read and write
274D2CA6000
heap
page read and write
46EC27B000
stack
page read and write
18ADE613000
heap
page read and write
6D4000
heap
page read and write
155D8DC5000
heap
page read and write
274D81E0000
trusted library allocation
page read and write
2713B302000
heap
page read and write
6F2000
heap
page read and write
188A0E48000
heap
page read and write
155D8DA0000
heap
page read and write
18ADE665000
heap
page read and write
20C66629000
heap
page read and write
2EB2A7B000
stack
page read and write
4C09BFC000
stack
page read and write
2288B002000
trusted library allocation
page read and write
155D8D9F000
heap
page read and write
188A0E49000
heap
page read and write
1D00248C000
heap
page read and write
2288A87C000
heap
page read and write
1FD76044000
heap
page read and write
20C66655000
heap
page read and write
29F94048000
heap
page read and write
155D9219000
heap
page read and write
155D8516000
heap
page read and write
155D8D8B000
heap
page read and write
709000
heap
page read and write
2713B276000
heap
page read and write
2288A83D000
heap
page read and write
155D84CC000
heap
page read and write
155D8D8D000
heap
page read and write
2288A82D000
heap
page read and write
274D81E1000
trusted library allocation
page read and write
1D0023B0000
trusted library allocation
page read and write
274D84EB000
heap
page read and write
30000
heap
page read and write
2713B229000
heap
page read and write
DE6951E000
stack
page read and write
274D8320000
remote allocation
page read and write
155D847D000
heap
page read and write
1D00243C000
heap
page read and write
274D3559000
heap
page read and write
155D8DA2000
heap
page read and write
155D8D7E000
heap
page read and write
BF8D37E000
stack
page read and write
660000
heap
page read and write
155D8D8D000
heap
page read and write
155D8448000
heap
page read and write
4D0000
heap
page read and write
6DC80000
unkown
page readonly
155D8DB4000
heap
page read and write
274D2D14000
heap
page read and write
76C000
heap
page read and write
274D2CA9000
heap
page read and write
6E5000
heap
page read and write
274D2D07000
heap
page read and write
20C6664B000
heap
page read and write
29B0577000
stack
page read and write
274D8204000
trusted library allocation
page read and write
75D000
heap
page read and write
1FD63880000
heap
page read and write
188A0E71000
heap
page read and write
166E9C25000
heap
page read and write
737000
heap
page read and write
1D002500000
heap
page read and write
2EB25FF000
stack
page read and write
155D8340000
heap
page read and write
DE69B77000
stack
page read and write
188A0E00000
heap
page read and write
2288A878000
heap
page read and write
155D8D9E000
heap
page read and write
188A0E8C000
heap
page read and write
2288A840000
heap
page read and write
D3E34F7000
stack
page read and write
408000
unkown
page readonly
B47BD7B000
stack
page read and write
1BB99FB0000
trusted library allocation
page read and write
20C6664F000
heap
page read and write
46EC47F000
stack
page read and write
B47BA7C000
stack
page read and write
155D8DAF000
heap
page read and write
155D8DA1000
heap
page read and write
20C66613000
heap
page read and write
1FD63879000
heap
page read and write
166E9C02000
heap
page read and write
2288A845000
heap
page read and write
2713B213000
heap
page read and write
18ADE6B9000
heap
page read and write
1FD63828000
heap
page read and write
764000
heap
page read and write
166EA1A0000
remote allocation
page read and write
46EC377000
stack
page read and write
20C66670000
heap
page read and write
1BB9A020000
trusted library allocation
page read and write
188A0E29000
heap
page read and write
1FD76021000
heap
page read and write
155D83A0000
heap
page read and write
408000
unkown
page readonly
274D8200000
trusted library allocation
page read and write
DE6949B000
stack
page read and write
1FD63913000
heap
page read and write
BF8D57F000
stack
page read and write
6462479000
stack
page read and write
274D2C9E000
heap
page read and write
274D33F0000
trusted library allocation
page read and write
29F94070000
heap
page read and write
3280000
trusted library allocation
page read and write
230E000
stack
page read and write
155D8D8A000
heap
page read and write
74B000
heap
page read and write
6F7000
heap
page read and write
D3E3EF9000
stack
page read and write
274D8461000
heap
page read and write
155D8DA0000
heap
page read and write
A8494FF000
stack
page read and write
D0D76FE000
stack
page read and write
155D8DB6000
heap
page read and write
1D00244C000
heap
page read and write
64623FE000
stack
page read and write
2344000
heap
page read and write
1BB9A035000
heap
page read and write
2288A83A000
heap
page read and write
299F000
trusted library allocation
page read and write
1D002402000
heap
page read and write
E07A7E000
stack
page read and write
B47C07E000
stack
page read and write
274D8476000
heap
page read and write
1FD76016000
heap
page read and write
2288A84E000
heap
page read and write
274D2C8C000
heap
page read and write
20C66600000
heap
page read and write
20C66681000
heap
page read and write
155D9221000
heap
page read and write
2288A844000
heap
page read and write
29F93ED0000
heap
page read and write
29B0679000
stack
page read and write
166E9C13000
heap
page read and write
758000
heap
page read and write
2EB2B77000
stack
page read and write
452000
unkown
page readonly
155D8D85000
heap
page read and write
20C66E02000
trusted library allocation
page read and write
2288A84B000
heap
page read and write
2288A864000
heap
page read and write
155D8DAE000
heap
page read and write
274D8449000
heap
page read and write
2340000
heap
page read and write
746000
heap
page read and write
1D002429000
heap
page read and write
155D8D8C000
heap
page read and write
46EBD9D000
stack
page read and write
6DC86000
unkown
page readonly
762000
heap
page read and write
1BB99F50000
heap
page read and write
1FD76021000
heap
page read and write
1D002413000
heap
page read and write
530F0FF000
stack
page read and write
400000
unkown
page readonly
155D8D8B000
heap
page read and write
29F94047000
heap
page read and write
274D84F6000
heap
page read and write
3790000
trusted library allocation
page read and write
1FD7602E000
heap
page read and write
29F94802000
trusted library allocation
page read and write
155D9202000
heap
page read and write
274D2C6F000
heap
page read and write
1D002320000
heap
page read and write
155D9203000
heap
page read and write
462000
unkown
page readonly
18ADE6E2000
heap
page read and write
155D8BC0000
remote allocation
page read and write
E079FC000
stack
page read and write
155D84B5000
heap
page read and write
274D81F0000
trusted library allocation
page read and write
2EB257B000
stack
page read and write
1D002C02000
trusted library allocation
page read and write
188A0F08000
heap
page read and write
155D8D13000
heap
page read and write
274D81E4000
trusted library allocation
page read and write
1D002480000
heap
page read and write
29B077F000
stack
page read and write
3680000
heap
page read and write
437000
unkown
page read and write
D3E30CB000
stack
page read and write
155D8D9C000
heap
page read and write
D0D74FE000
stack
page read and write
155D8508000
heap
page read and write
DE69E7F000
stack
page read and write
274D8478000
heap
page read and write
274D2CA6000
heap
page read and write
46EBC9B000
stack
page read and write
DE69A7B000
stack
page read and write
401000
unkown
page execute read
155D8D74000
heap
page read and write
4D2F000
stack
page read and write
385C000
stack
page read and write
155D8D9F000
heap
page read and write
188A0E13000
heap
page read and write
1FD63900000
heap
page read and write
29F9404C000
heap
page read and write
A84977B000
stack
page read and write
1FD75FD0000
heap
page read and write
18ADE644000
heap
page read and write
274D82F0000
trusted library allocation
page read and write
680000
heap
page read and write
188A0D40000
heap
page read and write
761000
heap
page read and write
155D8D7F000
heap
page read and write
274D2C8A000
heap
page read and write
BF8CC7B000
stack
page read and write
155D8D9F000
heap
page read and write
18ADE66F000
heap
page read and write
155D8DA2000
heap
page read and write
462000
unkown
page readonly
2713B255000
heap
page read and write
155D84C5000
heap
page read and write
155D8DB5000
heap
page read and write
1FD636F0000
heap
page read and write
155D8D7E000
heap
page read and write
4C098FE000
stack
page read and write
29F94113000
heap
page read and write
1FD75EA0000
heap
page read and write
4C0000
trusted library allocation
page read and write
274D849A000
heap
page read and write
1D002487000
heap
page read and write
155D8D83000
heap
page read and write
2713B23D000
heap
page read and write
274D4001000
trusted library allocation
page read and write
762000
heap
page read and write
2288A830000
heap
page read and write
A84997F000
stack
page read and write
1FD76022000
heap
page read and write
2288A842000
heap
page read and write
1FD76011000
heap
page read and write
18ADE713000
heap
page read and write
166E9BE0000
trusted library allocation
page read and write
1BB99CE0000
heap
page read and write
274D8610000
trusted library allocation
page read and write
155D8DDD000
heap
page read and write
18ADE702000
heap
page read and write
274D8030000
trusted library allocation
page read and write
155D8D86000
heap
page read and write
155D8DA5000
heap
page read and write
274D2B90000
trusted library allocation
page read and write
155D8D8F000
heap
page read and write
18ADEE02000
heap
page read and write
BF8D27E000
stack
page read and write
155D8DA2000
heap
page read and write
155D844C000
heap
page read and write
1BB99DD1000
heap
page read and write
188A0E51000
heap
page read and write
688000
heap
page read and write
B47BF7F000
stack
page read and write
1BB9A9F0000
trusted library allocation
page read and write
1D002447000
heap
page read and write
74D000
heap
page read and write
6DC81000
unkown
page execute read
274D8200000
trusted library allocation
page read and write
188A0F00000
heap
page read and write
188A0E4D000
heap
page read and write
274D8320000
remote allocation
page read and write
530F2FF000
stack
page read and write
1FD76100000
heap
page read and write
155D8D9F000
heap
page read and write
274D2D02000
heap
page read and write
1BB99DA9000
heap
page read and write
274D843C000
heap
page read and write
1FD63750000
heap
page read and write
760000
heap
page read and write
274D2C29000
heap
page read and write
18ADE667000
heap
page read and write
1BB9AC40000
heap
page readonly
274D3518000
heap
page read and write
155D8DAE000
heap
page read and write
274D8020000
trusted library allocation
page read and write
20C66652000
heap
page read and write
2288A839000
heap
page read and write
274D3BE0000
trusted library allocation
page read and write
166E9C57000
heap
page read and write
D3E3DFC000
stack
page read and write
155D8DAE000
heap
page read and write
2288A82E000
heap
page read and write
29F94000000
heap
page read and write
274D8502000
heap
page read and write
29F94100000
heap
page read and write
1BB99FC0000
trusted library allocation
page read and write
1FD63800000
heap
page read and write
2288A862000
heap
page read and write
2288A829000
heap
page read and write
29AFE8B000
stack
page read and write
20C66649000
heap
page read and write
2288A863000
heap
page read and write
166E99A0000
heap
page read and write
29AFF0F000
stack
page read and write
274D81C0000
trusted library allocation
page read and write
73B000
heap
page read and write
155D8502000
heap
page read and write
274D2B60000
heap
page read and write
155D8D53000
heap
page read and write
1FD76042000
heap
page read and write
6461EBC000
stack
page read and write
155D8D9F000
heap
page read and write
155D8D9F000
heap
page read and write
1FD63780000
trusted library allocation
page read and write
155D8400000
heap
page read and write
29B08FE000
unkown
page read and write
18ADEF00000
heap
page read and write
2713B060000
heap
page read and write
1D00247E000
heap
page read and write
228C000
stack
page read and write
1BB99DB1000
heap
page read and write
274D82A0000
trusted library allocation
page read and write
155D8D8B000
heap
page read and write
155D84F1000
heap
page read and write
155D8D83000
heap
page read and write
1FD7602E000
heap
page read and write
188A0E3C000
heap
page read and write
400000
unkown
page readonly
274D4020000
trusted library allocation
page read and write
2288A876000
heap
page read and write
2288A849000
heap
page read and write
155D9202000
heap
page read and write
274D3504000
heap
page read and write
E07DFD000
stack
page read and write
758000
heap
page read and write
4E60000
trusted library allocation
page read and write
155D8DA2000
heap
page read and write
18ADE5D0000
trusted library allocation
page read and write
4E6E000
trusted library allocation
page read and write
155D9202000
heap
page read and write
1BB9AC30000
trusted library allocation
page read and write
D3E36FA000
stack
page read and write
2713BA02000
trusted library allocation
page read and write
1D002451000
heap
page read and write
4E70000
trusted library allocation
page read and write
4C09CFE000
stack
page read and write
46EC17F000
stack
page read and write
274D80A0000
trusted library allocation
page read and write
155D8D72000
heap
page read and write
BF8D07E000
stack
page read and write
E07CFE000
stack
page read and write
155D83D0000
trusted library allocation
page read and write
155D8DA0000
heap
page read and write
452000
unkown
page readonly
D0D78FF000
stack
page read and write
74D000
heap
page read and write
166E9D02000
heap
page read and write
1BB9AC50000
trusted library allocation
page read and write
1D002450000
heap
page read and write
18ADE530000
heap
page read and write
155D8D8B000
heap
page read and write
274D2C58000
heap
page read and write
4C09AFB000
stack
page read and write
274D80B0000
trusted library allocation
page read and write
1FD7602E000
heap
page read and write
274D33F3000
trusted library allocation
page read and write
166EA202000
trusted library allocation
page read and write
1D002448000
heap
page read and write
288F000
stack
page read and write
274D2C3E000
heap
page read and write
4E61000
trusted library allocation
page read and write
BF8D17D000
stack
page read and write
6C1000
heap
page read and write
DE69C7F000
stack
page read and write
18ADE6C3000
heap
page read and write
155D84DE000
heap
page read and write
274D2C74000
heap
page read and write
155D8D83000
heap
page read and write
155D8D8D000
heap
page read and write
274D2C78000
heap
page read and write
1BB9A030000
heap
page read and write
BF8CA7B000
stack
page read and write
155D8471000
heap
page read and write
274D2AF0000
heap
page read and write
20C6664C000
heap
page read and write
20C66708000
heap
page read and write
155D843C000
heap
page read and write
155D8D8B000
heap
page read and write
20C6663C000
heap
page read and write
29F94029000
heap
page read and write
D0D79FF000
stack
page read and write
DE69D7F000
stack
page read and write
274D8310000
trusted library allocation
page read and write
155D8BC0000
remote allocation
page read and write
D3E39FB000
stack
page read and write
155D8429000
heap
page read and write
1FD76016000
heap
page read and write
274D8290000
trusted library allocation
page read and write
155D8330000
heap
page read and write
155D8D9F000
heap
page read and write
274D2CBB000
heap
page read and write
2EB2C7E000
stack
page read and write
274D8300000
trusted library allocation
page read and write
D0D757E000
stack
page read and write
155D8D7F000
heap
page read and write
64622F9000
stack
page read and write
401000
unkown
page execute read
155D8451000
heap
page read and write
274D8320000
remote allocation
page read and write
1FD636E0000
heap
page read and write
29AFF8E000
stack
page read and write
2288A848000
heap
page read and write
274D84FC000
heap
page read and write
155D8D64000
heap
page read and write
1D002380000
heap
page read and write
4C0997B000
stack
page read and write
155D8450000
heap
page read and write
2713B200000
heap
page read and write
4D30000
trusted library allocation
page read and write
278D000
stack
page read and write
1FD76270000
heap
page read and write
D3E314F000
stack
page read and write
166E9C3D000
heap
page read and write
274D82E0000
trusted library allocation
page read and write
20C66713000
heap
page read and write
4C09DFD000
stack
page read and write
22C0000
heap
page read and write
D3E38FD000
stack
page read and write
274D3415000
heap
page read and write
188A0E02000
heap
page read and write
2288A780000
heap
page read and write
2288A831000
heap
page read and write
274D3402000
heap
page read and write
A84957F000
stack
page read and write
274D84F0000
heap
page read and write
155D9202000
heap
page read and write
274D81C8000
trusted library allocation
page read and write
19A000
stack
page read and write
166E9C29000
heap
page read and write
BF8CE7C000
stack
page read and write
2713B070000
heap
page read and write
155D84F9000
heap
page read and write
2713B313000
heap
page read and write
2713B202000
heap
page read and write
4C09A7C000
stack
page read and write
1FD63864000
heap
page read and write
155D8DB4000
heap
page read and write
2288A861000
heap
page read and write
274D82D0000
trusted library allocation
page read and write
2EB287E000
stack
page read and write
741000
heap
page read and write
18ADE5A0000
heap
page read and write
1FD76000000
heap
page read and write
46EC57E000
stack
page read and write
20C66490000
heap
page read and write
4C097FE000
stack
page read and write
1BB99D68000
heap
page read and write
1D002400000
heap
page read and write
1FD63856000
heap
page read and write
155D8455000
heap
page read and write
530F17E000
stack
page read and write
274D2C9C000
heap
page read and write
4E70000
trusted library allocation
page read and write
1FD7602E000
heap
page read and write
274D8420000
heap
page read and write
274D8506000
heap
page read and write
274D81F0000
trusted library allocation
page read and write
155D8D94000
heap
page read and write
155D8D78000
heap
page read and write
18ADE629000
heap
page read and write
D0D77FE000
stack
page read and write
C3B000
heap
page read and write
1BB99DB1000
heap
page read and write
166E99B0000
heap
page read and write
155D8D00000
heap
page read and write
1D002310000
heap
page read and write
274D3518000
heap
page read and write
155D8D7F000
heap
page read and write
188A1602000
trusted library allocation
page read and write
155D8D8B000
heap
page read and write
5230000
trusted library allocation
page read and write
361E000
stack
page read and write
29B087A000
stack
page read and write
1FD76021000
heap
page read and write
2288A710000
heap
page read and write
2288A800000
heap
page read and write
D3E40FE000
stack
page read and write
1D002502000
heap
page read and write
188A0F13000
heap
page read and write
155D8DB6000
heap
page read and write
1BB9A040000
trusted library allocation
page read and write
155D8D9F000
heap
page read and write
2288A867000
heap
page read and write
A849877000
stack
page read and write
BF8D47F000
stack
page read and write
29F94013000
heap
page read and write
155D8D9F000
heap
page read and write
1BB99F30000
heap
page read and write
155D8DB1000
heap
page read and write
274D81CE000
trusted library allocation
page read and write
29F9403C000
heap
page read and write
2EB2E7F000
stack
page read and write
742000
heap
page read and write
29B037F000
stack
page read and write
A84947B000
stack
page read and write
155D9203000
heap
page read and write
166EA1A0000
remote allocation
page read and write
1FD63802000
heap
page read and write
4C0947B000
stack
page read and write
DE6997E000
stack
page read and write
188A0CE0000
heap
page read and write
20C66702000
heap
page read and write
1D002471000
heap
page read and write
188A0F02000
heap
page read and write
1BB99D60000
heap
page read and write
274D3502000
heap
page read and write
274D3400000
heap
page read and write
2713B0D0000
heap
page read and write
395B000
stack
page read and write
155D8485000
heap
page read and write
155D9202000
heap
page read and write
BF8D67F000
stack
page read and write
274D2CFD000
heap
page read and write
155D84E6000
heap
page read and write
738000
heap
page read and write
2288A87E000
heap
page read and write
E07C7E000
stack
page read and write
426000
unkown
page read and write
2288A902000
heap
page read and write
99000
stack
page read and write
155D8D9E000
heap
page read and write
1D00244D000
heap
page read and write
29F94089000
heap
page read and write
2288A875000
heap
page read and write
2288A831000
heap
page read and write
155D8D8B000
heap
page read and write
155D84AC000
heap
page read and write
2288A87B000
heap
page read and write
166E9C23000
heap
page read and write
155D8D8A000
heap
page read and write
155D9202000
heap
page read and write
2713B1D0000
trusted library allocation
page read and write
BF8CD7F000
stack
page read and write
1D002513000
heap
page read and write
2713B25B000
heap
page read and write
530F1F9000
stack
page read and write
762000
heap
page read and write
188A0E7F000
heap
page read and write
737000
heap
page read and write
D3E35FC000
stack
page read and write
155D8D11000
heap
page read and write
274D8503000
heap
page read and write
20C66420000
heap
page read and write
155D8DC6000
heap
page read and write
20C66676000
heap
page read and write
274D8410000
heap
page read and write
1FD64002000
trusted library allocation
page read and write
155D8D78000
heap
page read and write
46EC67F000
stack
page read and write
2890000
heap
page read and write
155D84F1000
heap
page read and write
4C0967C000
stack
page read and write
40A000
unkown
page read and write
166EA1A0000
remote allocation
page read and write
1BB99CF0000
trusted library allocation
page read and write
20C66648000
heap
page read and write
A849A7F000
stack
page read and write
There are 660 hidden memdumps, click here to show them.