IOC Report
Transferencia.exe

loading gif

Files

File Path
Type
Category
Malicious
Transferencia.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Dadoes.thi
data
dropped
C:\Users\user\AppData\Local\Temp\FJERKRFARMENES.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nstC730.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Transferencia.exe
"C:\Users\user\Desktop\Transferencia.exe"
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2D50000
direct allocation
page execute and read and write
malicious
232E0458000
heap
page read and write
1DE8E388000
heap
page read and write
23D5C072000
heap
page read and write
1DE8D8DA000
heap
page read and write
B8172CC000
stack
page read and write
9CE000
heap
page read and write
2B1C805B000
heap
page read and write
40A000
unkown
page write copy
26A74E61000
heap
page read and write
1DE8E380000
heap
page read and write
1DE8E3AB000
heap
page read and write
870000
trusted library allocation
page read and write
24A9B229000
heap
page read and write
1DE8E388000
heap
page read and write
1AA4045B000
heap
page read and write
232E0402000
heap
page read and write
1DE8E364000
heap
page read and write
23D5C100000
heap
page read and write
1DE8E380000
heap
page read and write
1DE8E36C000
heap
page read and write
F1CE37B000
stack
page read and write
24AA0AFD000
heap
page read and write
2B8AA900000
heap
page read and write
1DE8E38B000
heap
page read and write
9C6000
heap
page read and write
1DE8E36A000
heap
page read and write
28465A30000
heap
page read and write
23D5C08D000
heap
page read and write
24A9BB02000
heap
page read and write
1DE8E360000
heap
page read and write
87FC2FE000
stack
page read and write
1DE8D902000
heap
page read and write
4EB50FF000
stack
page read and write
23D5BE40000
heap
page read and write
1DE8E388000
heap
page read and write
26A74E69000
heap
page read and write
70C62FE000
stack
page read and write
1DE8E36F000
heap
page read and write
70C5C7F000
stack
page read and write
1DE8E3A9000
heap
page read and write
2B1C9C40000
trusted library allocation
page read and write
1DE8D8DA000
heap
page read and write
28DD9FE000
stack
page read and write
232E0413000
heap
page read and write
2B8A9EC2000
heap
page read and write
2B1CA000000
remote allocation
page read and write
2B8A9D20000
heap
page read and write
57FEBFF000
stack
page read and write
1DE8D84C000
heap
page read and write
27F34B13000
heap
page read and write
FD5167E000
stack
page read and write
1DE8E36C000
heap
page read and write
1AA40500000
heap
page read and write
4EB52F9000
stack
page read and write
24A9B2FD000
heap
page read and write
87FC17E000
stack
page read and write
1DE8D760000
heap
page read and write
1F3DD013000
heap
page read and write
2B8A9E24000
heap
page read and write
24AA08C4000
trusted library allocation
page read and write
1DE8E38F000
heap
page read and write
B64FD3B000
stack
page read and write
1DE8E391000
heap
page read and write
1DE8D88A000
heap
page read and write
27F34A82000
heap
page read and write
24A9B279000
heap
page read and write
24AA09E0000
remote allocation
page read and write
2B1CA000000
remote allocation
page read and write
1DE8E35E000
heap
page read and write
1C6D4E13000
heap
page read and write
582E37B000
stack
page read and write
232E0360000
remote allocation
page read and write
24AA088E000
trusted library allocation
page read and write
1DE8E36D000
heap
page read and write
232E0360000
remote allocation
page read and write
582E67F000
stack
page read and write
1DE8E3A9000
heap
page read and write
FD50F5B000
stack
page read and write
1AA4043C000
heap
page read and write
4EB557F000
unkown
page read and write
1DE8E392000
heap
page read and write
1F3DD03D000
heap
page read and write
1DE8E389000
heap
page read and write
1DE8E802000
heap
page read and write
1DE8D6F0000
heap
page read and write
1DE8E391000
heap
page read and write
1DE8E36E000
heap
page read and write
1C6D4E00000
heap
page read and write
1DE8E36B000
heap
page read and write
4EB5678000
stack
page read and write
24AA09E0000
remote allocation
page read and write
232E0475000
heap
page read and write
1DE8E39B000
heap
page read and write
786000
unkown
page read and write
25C34240000
trusted library allocation
page read and write
1DE8E38B000
heap
page read and write
24AA0A49000
heap
page read and write
1DE8E36B000
heap
page read and write
26A74D00000
trusted library allocation
page read and write
1DE8E361000
heap
page read and write
B6506FC000
stack
page read and write
24A9B302000
heap
page read and write
1AA40463000
heap
page read and write
24A9B9F3000
trusted library allocation
page read and write
D95A6BB000
stack
page read and write
1BD9285E000
heap
page read and write
1C6D5602000
trusted library allocation
page read and write
24AA0A3C000
heap
page read and write
25C3411C000
heap
page read and write
1DE8E38E000
heap
page read and write
24AA0A5F000
heap
page read and write
FD51C7A000
stack
page read and write
1DE8E399000
heap
page read and write
1DE8E3B0000
heap
page read and write
24A9BB59000
heap
page read and write
28465BC0000
remote allocation
page read and write
4EB4EFF000
stack
page read and write
EF001FF000
stack
page read and write
2B1C804B000
heap
page read and write
2B1C8113000
heap
page read and write
2CC0000
trusted library allocation
page read and write
A678F79000
stack
page read and write
1DE8E819000
heap
page read and write
1DE8E38E000
heap
page read and write
1DE8E377000
heap
page read and write
B6502FE000
stack
page read and write
1DE8E36C000
heap
page read and write
1DE8E36C000
heap
page read and write
582E477000
stack
page read and write
1C425900000
heap
page read and write
1AA40461000
heap
page read and write
1DE8E392000
heap
page read and write
232E045E000
heap
page read and write
1C425905000
heap
page read and write
1DE8E3BB000
heap
page read and write
1BD92900000
heap
page read and write
1C6D4E28000
heap
page read and write
1DE8D83C000
heap
page read and write
1DE8E38A000
heap
page read and write
24AA0990000
trusted library allocation
page read and write
1DE8E38B000
heap
page read and write
1DE8E38A000
heap
page read and write
D95A73E000
stack
page read and write
1DE8E38A000
heap
page read and write
24AA09E0000
remote allocation
page read and write
9C9000
heap
page read and write
24AA0A00000
heap
page read and write
B6509FE000
stack
page read and write
1DE8E392000
heap
page read and write
26A74E63000
heap
page read and write
25C3411C000
heap
page read and write
70C5CFE000
stack
page read and write
28465BC0000
remote allocation
page read and write
1BD9284A000
heap
page read and write
26A74E4A000
heap
page read and write
1DE8D84E000
heap
page read and write
1DE8E36D000
heap
page read and write
23D5C047000
heap
page read and write
28465D02000
heap
page read and write
1C6D4F00000
heap
page read and write
1BD92800000
heap
page read and write
1DE8E3A0000
heap
page read and write
87FC7FF000
stack
page read and write
1F3DD029000
heap
page read and write
24AA08B0000
trusted library allocation
page read and write
24AA0B04000
heap
page read and write
27F34A00000
heap
page read and write
25C35060000
trusted library allocation
page read and write
1C6D4F02000
heap
page read and write
27F34B00000
heap
page read and write
1DE8E821000
heap
page read and write
9C7000
heap
page read and write
25C35010000
trusted library allocation
page read and write
1DE8D84F000
heap
page read and write
25C3411C000
heap
page read and write
1F3DCF80000
trusted library allocation
page read and write
1C425670000
heap
page read and write
1DE8D853000
heap
page read and write
24A9B277000
heap
page read and write
28465C02000
heap
page read and write
8BDE57E000
stack
page read and write
1DE8E803000
heap
page read and write
EF7FEFC000
stack
page read and write
EF004FD000
stack
page read and write
1DE8E36E000
heap
page read and write
2B1C7F10000
heap
page read and write
27F35402000
trusted library allocation
page read and write
401000
unkown
page execute read
2B1C8100000
heap
page read and write
1AA40413000
heap
page read and write
24AA0950000
trusted library allocation
page read and write
24AA08A0000
trusted library allocation
page read and write
24A9BB18000
heap
page read and write
1BD93002000
trusted library allocation
page read and write
1BD92860000
heap
page read and write
1DE8E802000
heap
page read and write
1DE8E300000
heap
page read and write
232E043E000
heap
page read and write
732A4000
unkown
page readonly
1AA4045F000
heap
page read and write
1DE8E389000
heap
page read and write
1F3DD054000
heap
page read and write
27F34A6C000
heap
page read and write
26A74E7D000
heap
page read and write
24A9B302000
heap
page read and write
19A000
stack
page read and write
980000
heap
page read and write
1BD9285D000
heap
page read and write
24A9B1E0000
trusted library allocation
page read and write
1DE8E38B000
heap
page read and write
1DE8E800000
heap
page read and write
25C34FE0000
trusted library allocation
page read and write
23D5C002000
heap
page read and write
26A74E77000
heap
page read and write
1F3DCE80000
heap
page read and write
24AA0770000
trusted library allocation
page read and write
1DE8E389000
heap
page read and write
26A74E45000
heap
page read and write
EF7FAFB000
stack
page read and write
26A74E60000
heap
page read and write
1DE8E202000
heap
page read and write
2B1C8118000
heap
page read and write
2B1C7EB0000
heap
page read and write
1DE8E388000
heap
page read and write
D95AB7E000
stack
page read and write
B81777C000
stack
page read and write
328D000
stack
page read and write
7DA000
unkown
page readonly
1DE8E39F000
heap
page read and write
1F3DD05B000
heap
page read and write
1DE8E390000
heap
page read and write
1BD92FA0000
trusted library allocation
page read and write
1DE8E389000
heap
page read and write
B6508FF000
stack
page read and write
70C59FB000
stack
page read and write
EF003FC000
stack
page read and write
23D5C000000
heap
page read and write
27F34B08000
heap
page read and write
1DE8E363000
heap
page read and write
232E0449000
heap
page read and write
1DE8E391000
heap
page read and write
FD51B7A000
stack
page read and write
1C4256B3000
heap
page read and write
1DE8E388000
heap
page read and write
25C34220000
trusted library allocation
page read and write
1DE8D881000
heap
page read and write
25C340B0000
heap
page read and write
24A9B314000
heap
page read and write
1C425540000
heap
page read and write
EF005FF000
stack
page read and write
1DE8E388000
heap
page read and write
2590000
heap
page read and write
4EB53F7000
stack
page read and write
1DE8E367000
heap
page read and write
1DE8D8C7000
heap
page read and write
28DD87F000
stack
page read and write
23D5C013000
heap
page read and write
2B8A9EE4000
heap
page read and write
A678EFF000
stack
page read and write
26A74E32000
heap
page read and write
1C6D4CA0000
heap
page read and write
1DE8E3B9000
heap
page read and write
4EB51FA000
stack
page read and write
1DE8E0C0000
remote allocation
page read and write
27F34A13000
heap
page read and write
1BD9285B000
heap
page read and write
23D5C081000
heap
page read and write
1DE8E366000
heap
page read and write
1DE8E802000
heap
page read and write
2B8A9E13000
heap
page read and write
24AA0AA8000
heap
page read and write
1DE8E362000
heap
page read and write
23D5BFB0000
trusted library allocation
page read and write
88FF27F000
stack
page read and write
26A74E3E000
heap
page read and write
26A74E48000
heap
page read and write
9B4000
heap
page read and write
1C425790000
heap
page read and write
789000
unkown
page read and write
1DE8E802000
heap
page read and write
28DD52A000
stack
page read and write
24A9B2AF000
heap
page read and write
1DE8E3B0000
heap
page read and write
24A9C190000
trusted library allocation
page read and write
23D5C108000
heap
page read and write
1DE8D871000
heap
page read and write
1DE8E38B000
heap
page read and write
A678E79000
stack
page read and write
1DE8E364000
heap
page read and write
28465A20000
heap
page read and write
1F3DCE10000
heap
page read and write
2B8A9F02000
heap
page read and write
24AA09B0000
trusted library allocation
page read and write
732A6000
unkown
page readonly
400000
unkown
page readonly
F56000
heap
page read and write
1DE8D849000
heap
page read and write
1DE8D855000
heap
page read and write
2CD0000
trusted library allocation
page read and write
26A74E64000
heap
page read and write
1DE8E36B000
heap
page read and write
1DE8E3B2000
heap
page read and write
70C61FA000
stack
page read and write
26A74E41000
heap
page read and write
27F34A4B000
heap
page read and write
1C425690000
heap
page read and write
2B8A9E67000
heap
page read and write
1F3DD102000
heap
page read and write
B6505FC000
stack
page read and write
26A74E4C000
heap
page read and write
1DE8E3A7000
heap
page read and write
88FF37E000
stack
page read and write
1C4256B8000
heap
page read and write
24A9B080000
heap
page read and write
F1CE57F000
stack
page read and write
7B3000
unkown
page read and write
1DE8E388000
heap
page read and write
1DE8D8B4000
heap
page read and write
28465A90000
heap
page read and write
1AA40466000
heap
page read and write
26A74F02000
heap
page read and write
9C4000
heap
page read and write
1DE8E392000
heap
page read and write
988000
heap
page read and write
1DE8E392000
heap
page read and write
1DE8D851000
heap
page read and write
26A74E65000
heap
page read and write
232E01D0000
heap
page read and write
1AA40400000
heap
page read and write
23D5C050000
heap
page read and write
1DE8D8E3000
heap
page read and write
28DD8FF000
stack
page read and write
1C4256A1000
heap
page read and write
1C4256B5000
heap
page read and write
232E0240000
heap
page read and write
2B1C7EA0000
heap
page read and write
25C340D8000
heap
page read and write
24A9C700000
trusted library allocation
page read and write
26A74E85000
heap
page read and write
57FEAFD000
stack
page read and write
1DE8E399000
heap
page read and write
24AA0880000
trusted library allocation
page read and write
F1CE477000
stack
page read and write
2B1C803D000
heap
page read and write
1DE8E391000
heap
page read and write
24AA0960000
trusted library allocation
page read and write
7A6000
unkown
page read and write
1DE8E388000
heap
page read and write
FD51377000
stack
page read and write
1DE8E360000
heap
page read and write
70C5EFD000
stack
page read and write
1DE8E360000
heap
page read and write
1DE8E39F000
heap
page read and write
1DE8E362000
heap
page read and write
24A9B26F000
heap
page read and write
28465C29000
heap
page read and write
25C34114000
heap
page read and write
1C6D55A0000
trusted library allocation
page read and write
25C34265000
heap
page read and write
1DE8E36B000
heap
page read and write
2B1C9A02000
trusted library allocation
page read and write
26A74E46000
heap
page read and write
24A9BB04000
heap
page read and write
26A74E47000
heap
page read and write
2B8A9EB9000
heap
page read and write
24A9B0E0000
heap
page read and write
1DE8E39F000
heap
page read and write
27F34A56000
heap
page read and write
B817A7F000
stack
page read and write
1DE8E803000
heap
page read and write
26A74E76000
heap
page read and write
25C34FF0000
heap
page readonly
1AA40513000
heap
page read and write
24A9B28C000
heap
page read and write
1DE8E38B000
heap
page read and write
1F3DCE20000
heap
page read and write
88FF17B000
stack
page read and write
57FE5FB000
stack
page read and write
57FE9FF000
stack
page read and write
1DE8E388000
heap
page read and write
24A9B293000
heap
page read and write
57FECFF000
stack
page read and write
4EB4F7E000
stack
page read and write
1DE8E362000
heap
page read and write
26A74E13000
heap
page read and write
EF006FC000
stack
page read and write
28465C58000
heap
page read and write
2BBF000
stack
page read and write
1BD92700000
heap
page read and write
26A74C00000
heap
page read and write
1DE8E36C000
heap
page read and write
24AA0888000
trusted library allocation
page read and write
1DE8E390000
heap
page read and write
2B1C804B000
heap
page read and write
1DE8E3CC000
heap
page read and write
F1CDDEB000
stack
page read and write
24AA0CF0000
trusted library allocation
page read and write
26A75602000
trusted library allocation
page read and write
D95AC7E000
stack
page read and write
1DE8E3AC000
heap
page read and write
24AA09E0000
trusted library allocation
page read and write
23D5C802000
trusted library allocation
page read and write
1DE8E37B000
heap
page read and write
2B1C808C000
heap
page read and write
1DE8E38A000
heap
page read and write
2B1C8077000
heap
page read and write
EF000FE000
stack
page read and write
1DE8E360000
heap
page read and write
1DE8E38B000
heap
page read and write
1C4256D1000
heap
page read and write
582DDDB000
stack
page read and write
27F34B02000
heap
page read and write
1BD92853000
heap
page read and write
27F34A52000
heap
page read and write
27F34A49000
heap
page read and write
2B1C804A000
heap
page read and write
8BDE477000
stack
page read and write
70C5FFA000
stack
page read and write
1DE8E3B9000
heap
page read and write
F1CE27E000
stack
page read and write
25C33F50000
heap
page read and write
1DE8D700000
heap
page read and write
2B1CA000000
remote allocation
page read and write
2B8AA912000
heap
page read and write
26A74B90000
heap
page read and write
1DE8E3AB000
heap
page read and write
24AA0B05000
heap
page read and write
1DE8E388000
heap
page read and write
87FC0FF000
stack
page read and write
232E0455000
heap
page read and write
24AA09C0000
trusted library allocation
page read and write
EF0037D000
stack
page read and write
2B1C9C00000
trusted library allocation
page read and write
87FC4F7000
stack
page read and write
24AA08C0000
trusted library allocation
page read and write
1DE8E36C000
heap
page read and write
23D5C03C000
heap
page read and write
77C000
unkown
page read and write
26A74E5D000
heap
page read and write
1AA40502000
heap
page read and write
26A74E66000
heap
page read and write
1DE8D913000
heap
page read and write
1DE8D858000
heap
page read and write
1AA4045D000
heap
page read and write
1C4256BF000
heap
page read and write
28DDA7C000
stack
page read and write
1DE8E802000
heap
page read and write
70C5DFE000
stack
page read and write
2B8A9E65000
heap
page read and write
1BD926A0000
heap
page read and write
25C340D0000
heap
page read and write
1DE8E38B000
heap
page read and write
F1CE1FC000
stack
page read and write
1DE8E388000
heap
page read and write
1AA4044C000
heap
page read and write
1DE8E34E000
heap
page read and write
8BDE07B000
stack
page read and write
23D5C113000
heap
page read and write
26A74E80000
heap
page read and write
99000
stack
page read and write
1DE8E38A000
heap
page read and write
28465BC0000
remote allocation
page read and write
1DE8E37B000
heap
page read and write
1DE8E38E000
heap
page read and write
28465C00000
heap
page read and write
1DE8E35D000
heap
page read and write
1DE8E362000
heap
page read and write
1DE8E38B000
heap
page read and write
7DA000
unkown
page readonly
1DE8E388000
heap
page read and write
1DE8E38E000
heap
page read and write
1BD9288E000
heap
page read and write
24A9BA00000
heap
page read and write
1DE8E3A8000
heap
page read and write
24AA0A1D000
heap
page read and write
1DE8E802000
heap
page read and write
1C6D4E3C000
heap
page read and write
1DE8E36C000
heap
page read and write
25DE000
stack
page read and write
2B1C805B000
heap
page read and write
26A74E62000
heap
page read and write
1BD92690000
heap
page read and write
27F34A29000
heap
page read and write
1DE8D85A000
heap
page read and write
1AA4048E000
heap
page read and write
24AA0B02000
heap
page read and write
1DE8E387000
heap
page read and write
F50000
heap
page read and write
7B5000
unkown
page read and write
1F3DD002000
heap
page read and write
24AA08A4000
trusted library allocation
page read and write
1DE8D84A000
heap
page read and write
57FEFFF000
stack
page read and write
FD5157A000
stack
page read and write
408000
unkown
page readonly
24A9B23E000
heap
page read and write
1DE8D8CE000
heap
page read and write
272E000
stack
page read and write
1C4256BF000
heap
page read and write
1DE8E396000
heap
page read and write
1DE8E3D2000
heap
page read and write
1DE8E36B000
heap
page read and write
1AA403E0000
trusted library allocation
page read and write
1DE8E396000
heap
page read and write
401000
unkown
page execute read
732A1000
unkown
page execute read
24A9BB00000
heap
page read and write
1DE8D829000
heap
page read and write
2B8A9E3E000
heap
page read and write
1C4256D0000
heap
page read and write
2B1C99D0000
trusted library allocation
page read and write
D95AD7F000
stack
page read and write
232E0429000
heap
page read and write
1DE8E36C000
heap
page read and write
23D5C029000
heap
page read and write
57FEEFF000
stack
page read and write
1DE8E3CD000
heap
page read and write
26A74E43000
heap
page read and write
1DE8E38E000
heap
page read and write
24A9B9F0000
trusted library allocation
page read and write
24A9B257000
heap
page read and write
40A000
unkown
page read and write
1BD92802000
heap
page read and write
1DE8E3BB000
heap
page read and write
1DE8E36B000
heap
page read and write
28DD979000
stack
page read and write
2B8A9E6D000
heap
page read and write
1DE8E36B000
heap
page read and write
24AA0A9E000
heap
page read and write
27F34910000
heap
page read and write
1DE8E38B000
heap
page read and write
2B1C8013000
heap
page read and write
26A74E6B000
heap
page read and write
232E0420000
heap
page read and write
582E27F000
stack
page read and write
1DE8E36B000
heap
page read and write
2B1C8068000
heap
page read and write
1AA40455000
heap
page read and write
1DE8E39C000
heap
page read and write
88FF07B000
stack
page read and write
24A9BA15000
heap
page read and write
1F3DD802000
trusted library allocation
page read and write
1DE8D790000
trusted library allocation
page read and write
1DE8E396000
heap
page read and write
8BDE37B000
stack
page read and write
57FE6FF000
stack
page read and write
1C6D4E7B000
heap
page read and write
EF007FE000
stack
page read and write
4EB54FF000
stack
page read and write
28466402000
trusted library allocation
page read and write
1DE8E399000
heap
page read and write
26A74E79000
heap
page read and write
FD51E7E000
stack
page read and write
1DE8E0C0000
remote allocation
page read and write
23D5C102000
heap
page read and write
1DE8E361000
heap
page read and write
24A9BB18000
heap
page read and write
27F34900000
heap
page read and write
1C6D4D00000
heap
page read and write
8BDE67E000
stack
page read and write
27F349A0000
trusted library allocation
page read and write
2B8A9D80000
heap
page read and write
25C35000000
trusted library allocation
page read and write
24AA0950000
trusted library allocation
page read and write
1DE8E387000
heap
page read and write
1DE8E373000
heap
page read and write
25C3413B000
heap
page read and write
8BDE17E000
stack
page read and write
1DE8E360000
heap
page read and write
A678DF9000
stack
page read and write
1AA40270000
heap
page read and write
B8177FC000
stack
page read and write
24A9BB58000
heap
page read and write
338E000
stack
page read and write
23D5C080000
heap
page read and write
2B1C99B0000
trusted library allocation
page read and write
4EB4E7B000
stack
page read and write
1DE8E38B000
heap
page read and write
24AA0CD0000
trusted library allocation
page read and write
1DE8E38B000
heap
page read and write
26A74E29000
heap
page read and write
F1CE0FF000
stack
page read and write
26A74E7C000
heap
page read and write
26A74E49000
heap
page read and write
1DE8D8ED000
heap
page read and write
732A0000
unkown
page readonly
27F34970000
heap
page read and write
1F3DD113000
heap
page read and write
24A9B2A0000
heap
page read and write
1DE8E38F000
heap
page read and write
1DE8E399000
heap
page read and write
1DE8E38F000
heap
page read and write
1C4256C9000
heap
page read and write
1DE8D84B000
heap
page read and write
88FEACB000
stack
page read and write
57FE1AB000
stack
page read and write
1DE8E360000
heap
page read and write
1AA40429000
heap
page read and write
9BE000
heap
page read and write
28465C40000
heap
page read and write
B81767E000
stack
page read and write
25C33F60000
trusted library allocation
page read and write
24A9C280000
trusted library allocation
page read and write
24A9B213000
heap
page read and write
2770000
heap
page read and write
24AA0AF5000
heap
page read and write
400000
unkown
page readonly
232E0360000
remote allocation
page read and write
1DE8E388000
heap
page read and write
1DE8E361000
heap
page read and write
24AA0AFB000
heap
page read and write
B6504FE000
stack
page read and write
1DE8D916000
heap
page read and write
87FC07B000
stack
page read and write
1DE8D852000
heap
page read and write
1DE8E360000
heap
page read and write
1DE8E38B000
heap
page read and write
B8179FD000
stack
page read and write
232E0400000
heap
page read and write
26DF000
stack
page read and write
24A9C161000
trusted library allocation
page read and write
1DE8E3A9000
heap
page read and write
87FC3FB000
stack
page read and write
24AA0A9C000
heap
page read and write
1DE8E318000
heap
page read and write
25C34270000
trusted library allocation
page read and write
1C6D4C90000
heap
page read and write
57FEDFE000
stack
page read and write
F1CE67F000
stack
page read and write
26A74E42000
heap
page read and write
1AA402E0000
heap
page read and write
1DE8E395000
heap
page read and write
1DE8E360000
heap
page read and write
1DE8E380000
heap
page read and write
232E0C02000
trusted library allocation
page read and write
D95A7BE000
stack
page read and write
70C60FE000
stack
page read and write
28465C13000
heap
page read and write
1DE8E38B000
heap
page read and write
23D5BEB0000
heap
page read and write
87FC5FF000
stack
page read and write
24AA0950000
trusted library allocation
page read and write
232E01E0000
heap
page read and write
1C4256BF000
heap
page read and write
1DE8E387000
heap
page read and write
24AA0AAB000
heap
page read and write
1BD92908000
heap
page read and write
24AA08A1000
trusted library allocation
page read and write
EF0027C000
stack
page read and write
24AA0B02000
heap
page read and write
24AA0A14000
heap
page read and write
24A9BB13000
heap
page read and write
24AA08B0000
trusted library allocation
page read and write
27F34A4A000
heap
page read and write
2B1C8002000
heap
page read and write
2B8AA802000
heap
page read and write
2B8A9D10000
heap
page read and write
1DE8D8A9000
heap
page read and write
1DE8E395000
heap
page read and write
1DE8D8EF000
heap
page read and write
1C6D4E02000
heap
page read and write
1DE8E380000
heap
page read and write
1DE8E36C000
heap
page read and write
70C5EFF000
stack
page read and write
408000
unkown
page readonly
782000
unkown
page read and write
232E0470000
heap
page read and write
1C4256C8000
heap
page read and write
27F34A4D000
heap
page read and write
2B8A9F13000
heap
page read and write
2774000
heap
page read and write
D95AE7E000
stack
page read and write
24AA09D0000
trusted library allocation
page read and write
1DE8D800000
heap
page read and write
24A9BA02000
heap
page read and write
1DE8E3A3000
heap
page read and write
B6503FE000
stack
page read and write
1DE8E38F000
heap
page read and write
1AA40402000
heap
page read and write
FD5147A000
stack
page read and write
1DE8E3A9000
heap
page read and write
25C34260000
heap
page read and write
28DD5AF000
stack
page read and write
27F34A8B000
heap
page read and write
9C7000
heap
page read and write
1AA40C02000
trusted library allocation
page read and write
87FC6FF000
stack
page read and write
1DE8D85B000
heap
page read and write
30000
heap
page read and write
1DE8E38E000
heap
page read and write
23D5C056000
heap
page read and write
1AA40459000
heap
page read and write
2B8A9DB0000
trusted library allocation
page read and write
1F3DD000000
heap
page read and write
1F3DD076000
heap
page read and write
1DE8E362000
heap
page read and write
24AA0A2B000
heap
page read and write
1DE8E312000
heap
page read and write
26A74E68000
heap
page read and write
2B1C8102000
heap
page read and write
2B8A9E00000
heap
page read and write
232E0502000
heap
page read and write
1C4256C9000
heap
page read and write
2B1C802A000
heap
page read and write
1AA40508000
heap
page read and write
B817B7D000
stack
page read and write
1DE8E361000
heap
page read and write
1BD92902000
heap
page read and write
A6789CC000
stack
page read and write
880000
heap
page read and write
25C34269000
heap
page read and write
582E07E000
stack
page read and write
1BD92813000
heap
page read and write
1DE8E361000
heap
page read and write
1DE8E36B000
heap
page read and write
25C34DB0000
trusted library allocation
page read and write
1DE8E391000
heap
page read and write
1DE8D8FA000
heap
page read and write
24A9B274000
heap
page read and write
1DE8E38F000
heap
page read and write
9B0000
heap
page read and write
7A4000
unkown
page read and write
1DE8D813000
heap
page read and write
1DE8E802000
heap
page read and write
24A9B200000
heap
page read and write
1DE8E36B000
heap
page read and write
1BD92861000
heap
page read and write
1DE8E36C000
heap
page read and write
24A9B070000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1DE8E399000
heap
page read and write
24AA0880000
trusted library allocation
page read and write
1AA4047E000
heap
page read and write
57FE7FC000
stack
page read and write
1DE8E38B000
heap
page read and write
1DE8E38B000
heap
page read and write
2B8A9ECA000
heap
page read and write
1C4256B7000
heap
page read and write
1C4256A6000
heap
page read and write
FD5177B000
stack
page read and write
1DE8E380000
heap
page read and write
582E0FE000
stack
page read and write
1BD9283C000
heap
page read and write
232E0340000
trusted library allocation
page read and write
8BDE0FE000
stack
page read and write
1DE8E38C000
heap
page read and write
582E57E000
stack
page read and write
24AA0AEE000
heap
page read and write
24AA0B00000
heap
page read and write
1DE8E395000
heap
page read and write
27F34A4E000
heap
page read and write
24AA09A0000
trusted library allocation
page read and write
1DE8E380000
heap
page read and write
1C6D4E51000
heap
page read and write
1AA40280000
heap
page read and write
1DE8E380000
heap
page read and write
1C6D4F13000
heap
page read and write
25C34230000
trusted library allocation
page read and write
26A74E23000
heap
page read and write
24AA0760000
trusted library allocation
page read and write
26A74E00000
heap
page read and write
2B8A9E88000
heap
page read and write
1DE8D856000
heap
page read and write
28465B90000
trusted library allocation
page read and write
24A9C180000
trusted library allocation
page read and write
24A9B2FD000
heap
page read and write
2B1C805A000
heap
page read and write
1DE8E0C0000
remote allocation
page read and write
1BD92913000
heap
page read and write
27F34A3C000
heap
page read and write
1BD92863000
heap
page read and write
25C34090000
heap
page read and write
1DE8E390000
heap
page read and write
1DE8E35C000
heap
page read and write
1DE8D8C0000
heap
page read and write
2B8A9E29000
heap
page read and write
1DE8E3AC000
heap
page read and write
1DE8E390000
heap
page read and write
1DE8D8F0000
heap
page read and write
1BD9285C000
heap
page read and write
1BD92829000
heap
page read and write
1C4256A6000
heap
page read and write
F1CE07F000
stack
page read and write
1DE8E367000
heap
page read and write
26A74BA0000
heap
page read and write
1DE8D908000
heap
page read and write
23D5BE50000
heap
page read and write
2B1C8000000
heap
page read and write
26A74E3B000
heap
page read and write
1DE8E3DA000
heap
page read and write
There are 781 hidden memdumps, click here to show them.