IOC Report
TRANSFER.EXE

loading gif

Files

File Path
Type
Category
Malicious
TRANSFER.EXE
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TRANSFER.EXE.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\21c8026919fd094ab07ec3c180a9f210_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TRANSFER.EXE
"C:\Users\user\Desktop\TRANSFER.EXE"
malicious
C:\Windows\SysWOW64\cmdkey.exe
C:\Windows\SysWOW64\cmdkey.exe
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://sempersim.su/gi4/fre.php
45.11.26.144
malicious
http://www.ibsensoftware.com/
unknown

Domains

Name
IP
Malicious
sempersim.su
45.11.26.144
malicious

IPs

IP
Domain
Country
Malicious
45.11.26.144
sempersim.su
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3C25000
trusted library allocation
page read and write
malicious
3B05000
trusted library allocation
page read and write
malicious
3BBC000
trusted library allocation
page read and write
malicious
3B88000
trusted library allocation
page read and write
malicious
2D84000
trusted library allocation
page read and write
malicious
4510000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3B1F000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3AE1000
trusted library allocation
page read and write
malicious
3BF1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3B53000
trusted library allocation
page read and write
malicious
1CD143C0000
trusted library allocation
page read and write
29AADF84000
heap
page read and write
29AAD470000
heap
page read and write
3011000
heap
page read and write
2C19000
trusted library allocation
page read and write
2B50000
remote allocation
page read and write
300F000
heap
page read and write
304F000
heap
page read and write
2B5E000
trusted library allocation
page read and write
F608D7B000
stack
page read and write
30D0000
heap
page read and write
1CD154C0000
trusted library allocation
page read and write
2D1C000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
3036000
heap
page read and write
2D1A000
trusted library allocation
page read and write
3032000
heap
page read and write
F9219FF000
stack
page read and write
302F000
heap
page read and write
29AADF82000
heap
page read and write
29AADF8B000
heap
page read and write
2DBD000
trusted library allocation
page read and write
2BD9000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
20D9707B000
heap
page read and write
F921AF8000
stack
page read and write
302A000
heap
page read and write
29AAD648000
heap
page read and write
1A81464E000
heap
page read and write
2DA0DCE0000
heap
page read and write
50C0000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
1A814675000
heap
page read and write
29AAD702000
heap
page read and write
2AE1000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
2B50000
remote allocation
page read and write
4D10000
heap
page read and write
29AAD6F9000
heap
page read and write
4D954FE000
stack
page read and write
50B0000
trusted library allocation
page read and write
520E000
stack
page read and write
2B50000
remote allocation
page read and write
FAE000
stack
page read and write
2B71000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
2BB3000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
23C2965E000
heap
page read and write
23C295E0000
trusted library allocation
page read and write
1A81462E000
heap
page read and write
29AAE402000
heap
page read and write
50B0000
trusted library allocation
page read and write
230DEF90000
heap
page read and write
29AADFBE000
heap
page read and write
302A000
heap
page read and write
3019000
heap
page read and write
302A000
heap
page read and write
2B50000
remote allocation
page read and write
4CAE000
stack
page read and write
304F000
heap
page read and write
29AAD716000
heap
page read and write
2DA0DE7F000
heap
page read and write
304B000
heap
page read and write
2AEC000
stack
page read and write
4A2000
remote allocation
page execute and read and write
F92115B000
stack
page read and write
3050000
heap
page read and write
2B7B000
trusted library allocation
page read and write
3013000
heap
page read and write
2C17000
trusted library allocation
page read and write
2CF9000
trusted library allocation
page read and write
3011000
heap
page read and write
3033000
heap
page read and write
3036000
heap
page read and write
2B96000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
3036000
heap
page read and write
2CEA000
trusted library allocation
page read and write
29AADF7C000
heap
page read and write
2CC5000
trusted library allocation
page read and write
91AB9FC000
stack
page read and write
29AADF79000
heap
page read and write
230DF054000
heap
page read and write
7D84B7F000
stack
page read and write
29AADF00000
heap
page read and write
1A814600000
heap
page read and write
4C6E000
stack
page read and write
50A0000
trusted library allocation
page read and write
29AADF82000
heap
page read and write
302A000
heap
page read and write
230DF108000
heap
page read and write
5A4B27F000
stack
page read and write
302F000
heap
page read and write
2B4F000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
29AADF1F000
heap
page read and write
2B8C000
trusted library allocation
page read and write
23C29600000
heap
page read and write
2D67000
trusted library allocation
page read and write
3034000
heap
page read and write
50B0000
trusted library allocation
page read and write
29AADF82000
heap
page read and write
FD4000
trusted library allocation
page read and write
20D97098000
heap
page read and write
20D97087000
heap
page read and write
E57117F000
stack
page read and write
3019000
heap
page read and write
230DF05B000
heap
page read and write
2F60000
heap
page read and write
29AADFA7000
heap
page read and write
3019000
heap
page read and write
29AADF8D000
heap
page read and write
20D970A0000
heap
page read and write
2C41000
trusted library allocation
page read and write
29AAD651000
heap
page read and write
1A815002000
trusted library allocation
page read and write
230DF022000
heap
page read and write
2DA0DE3D000
heap
page read and write
2CC9000
trusted library allocation
page read and write
20D9707D000
heap
page read and write
1CD1460C000
heap
page read and write
29AADFD6000
heap
page read and write
3033000
heap
page read and write
7D8477E000
stack
page read and write
1CD1460C000
heap
page read and write
4A2000
remote allocation
page execute and read and write
1015000
trusted library allocation
page execute and read and write
2C3C000
trusted library allocation
page read and write
302F000
heap
page read and write
2B8E000
trusted library allocation
page read and write
1A814700000
heap
page read and write
2C70000
trusted library allocation
page read and write
29AAD6AC000
heap
page read and write
2FCE000
stack
page read and write
3019000
heap
page read and write
2D16000
trusted library allocation
page read and write
300E000
heap
page read and write
29AADFC1000
heap
page read and write
29AAD636000
heap
page read and write
230DF05F000
heap
page read and write
29AADF72000
heap
page read and write
29AADF7A000
heap
page read and write
29AAE402000
heap
page read and write
20D970B3000
heap
page read and write
29AAD6C6000
heap
page read and write
1CD14604000
heap
page read and write
C8E000
heap
page read and write
2D31000
trusted library allocation
page read and write
302F000
heap
page read and write
300D000
heap
page read and write
5210000
trusted library allocation
page read and write
29AADF82000
heap
page read and write
2C91000
trusted library allocation
page read and write
3032000
heap
page read and write
5230000
trusted library allocation
page read and write
20D96FC0000
heap
page read and write
29AAD64A000
heap
page read and write
302D000
heap
page read and write
23C29713000
heap
page read and write
2C43000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
2D03000
trusted library allocation
page read and write
101B000
trusted library allocation
page execute and read and write
4A0000
remote allocation
page execute and read and write
1A81465B000
heap
page read and write
2BCE000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
23C29470000
heap
page read and write
50C0000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
230DF02A000
heap
page read and write
2C21000
trusted library allocation
page read and write
E570DFC000
stack
page read and write
2CF3000
trusted library allocation
page read and write
2DA0DF00000
heap
page read and write
3050000
heap
page read and write
230DF100000
heap
page read and write
CEF000
heap
page read and write
2BC8000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
29AADF82000
heap
page read and write
1CD14590000
trusted library allocation
page read and write
1A8144D0000
heap
page read and write
29AAE402000
heap
page read and write
304F000
heap
page read and write
1A81464A000
heap
page read and write
E570C7E000
stack
page read and write
2ED5000
heap
page read and write
20D970A2000
heap
page read and write
2D33000
trusted library allocation
page read and write
29AADF86000
heap
page read and write
2C74000
trusted library allocation
page read and write
2C53000
trusted library allocation
page read and write
23C29629000
heap
page read and write
E571077000
stack
page read and write
29AADDF0000
remote allocation
page read and write
4AE8000
trusted library allocation
page read and write
5A4ACFF000
stack
page read and write
29AADF7A000
heap
page read and write
91AB57E000
stack
page read and write
4AE0000
trusted library allocation
page read and write
29AAE420000
heap
page read and write
2BA5000
trusted library allocation
page read and write
3054000
heap
page read and write
1CD14520000
heap
page read and write
2BFC000
trusted library allocation
page read and write
3054000
heap
page read and write
91AB97F000
stack
page read and write
2B9A000
trusted library allocation
page read and write
290000
unkown
page readonly
FD3000
trusted library allocation
page execute and read and write
3012000
heap
page read and write
29AAE402000
heap
page read and write
FE0000
trusted library allocation
page read and write
1000000
heap
page read and write
2B54000
trusted library allocation
page read and write
29AADFA0000
heap
page read and write
29AADF95000
heap
page read and write
29AADF72000
heap
page read and write
29AADF8D000
heap
page read and write
2DA0E802000
trusted library allocation
page read and write
29AADF9A000
heap
page read and write
3032000
heap
page read and write
2C3A000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
29AADF76000
heap
page read and write
2C57000
trusted library allocation
page read and write
300D000
heap
page read and write
4D953FE000
stack
page read and write
20D970B4000
heap
page read and write
50B0000
trusted library allocation
page read and write
302C000
heap
page read and write
29AADF79000
heap
page read and write
2BBC000
trusted library allocation
page read and write
29AADFAA000
heap
page read and write
3032000
heap
page read and write
29AAD629000
heap
page read and write
2D18000
trusted library allocation
page read and write
3011000
heap
page read and write
29AADF86000
heap
page read and write
300E000
heap
page read and write
CEF000
heap
page read and write
302F000
heap
page read and write
2B49000
trusted library allocation
page read and write
302A000
heap
page read and write
FEF40000
trusted library allocation
page execute and read and write
5A4AE7B000
stack
page read and write
29AAD689000
heap
page read and write
C50000
heap
page read and write
29AADFA8000
heap
page read and write
20D97070000
heap
page read and write
5A4B17F000
stack
page read and write
6A0000
unkown
page readonly
F9211DE000
stack
page read and write
F9216FB000
stack
page read and write
29AADDF0000
remote allocation
page read and write
29AADF99000
heap
page read and write
5A4AD7E000
stack
page read and write
50B0000
trusted library allocation
page read and write
20D970A0000
heap
page read and write
1CD15470000
trusted library allocation
page read and write
300E000
heap
page read and write
2B50000
remote allocation
page read and write
29AADF84000
heap
page read and write
50A0000
trusted library allocation
page read and write
3038000
heap
page read and write
230DF102000
heap
page read and write
295000
unkown
page readonly
29AAE402000
heap
page read and write
5A4AC7B000
stack
page read and write
29AADF82000
heap
page read and write
50D0000
trusted library allocation
page read and write
29AAD713000
heap
page read and write
3012000
heap
page read and write
29AADF82000
heap
page read and write
2D44000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
FDD000
trusted library allocation
page execute and read and write
2C6C000
trusted library allocation
page read and write
29AADDF0000
remote allocation
page read and write
75F0000
heap
page read and write
1CD145C0000
heap
page read and write
2D01000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
E570CFD000
stack
page read and write
29AAD6AA000
heap
page read and write
302F000
heap
page read and write
2A6E000
stack
page read and write
300E000
heap
page read and write
2D23000
trusted library allocation
page read and write
2BFE000
trusted library allocation
page read and write
2B50000
remote allocation
page read and write
29AADF89000
heap
page read and write
1CD1460C000
heap
page read and write
F9215FE000
stack
page read and write
1CD145C8000
heap
page read and write
20D970A2000
heap
page read and write
2DA0DF02000
heap
page read and write
29AADF97000
heap
page read and write
29AAE403000
heap
page read and write
3054000
heap
page read and write
2C5B000
trusted library allocation
page read and write
E5709FB000
stack
page read and write
1CD14525000
heap
page read and write
50C0000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
2D39000
trusted library allocation
page read and write
29AAE402000
heap
page read and write
23C29661000
heap
page read and write
4D94FBE000
stack
page read and write
50C0000
trusted library allocation
page read and write
29AADFBE000
heap
page read and write
20D96F90000
heap
page read and write
302D000
heap
page read and write
230DF067000
heap
page read and write
1CD146C0000
trusted library allocation
page read and write
301C000
heap
page read and write
4D952F9000
stack
page read and write
2CDE000
trusted library allocation
page read and write
23C2965B000
heap
page read and write
29AAE419000
heap
page read and write
2C4D000
trusted library allocation
page read and write
230DFA02000
trusted library allocation
page read and write
2DB4000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
1CD1462F000
heap
page read and write
1CD145B0000
trusted library allocation
page read and write
7D846FE000
stack
page read and write
2AAE000
stack
page read and write
23C29700000
heap
page read and write
2CB0000
trusted library allocation
page read and write
300E000
heap
page read and write
29AADF84000
heap
page read and write
F608F7E000
stack
page read and write
10A0000
trusted library allocation
page read and write
C81000
heap
page read and write
2B98000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
2FD0000
heap
page read and write
FFA000
trusted library allocation
page execute and read and write
2CA8000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
2B2B000
stack
page read and write
300F000
heap
page read and write
2AB0000
heap
page read and write
29AADF82000
heap
page read and write
29AADF86000
heap
page read and write
1A814708000
heap
page read and write
304F000
heap
page read and write
3020000
heap
page read and write
1A814613000
heap
page read and write
2DA0DCD0000
heap
page read and write
5A4B077000
stack
page read and write
304F000
heap
page read and write
297000
unkown
page readonly
2C2E000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
510E000
stack
page read and write
4A0000
remote allocation
page execute and read and write
300D000
heap
page read and write
300D000
heap
page read and write
29AADF98000
heap
page read and write
2C93000
trusted library allocation
page read and write
302A000
heap
page read and write
10C0000
heap
page read and write
302D000
heap
page read and write
2D6D000
trusted library allocation
page read and write
91AB4FA000
stack
page read and write
2B6A000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
300D000
heap
page read and write
29AAD655000
heap
page read and write
300D000
heap
page read and write
4A0000
remote allocation
page execute and read and write
29AAD6E2000
heap
page read and write
2C1B000
trusted library allocation
page read and write
300F000
heap
page read and write
302D000
heap
page read and write
2B50000
remote allocation
page read and write
230DF063000
heap
page read and write
1CD145D0000
heap
page read and write
23C2962D000
heap
page read and write
2CBB000
trusted library allocation
page read and write
1A814681000
heap
page read and write
300D000
heap
page read and write
3033000
heap
page read and write
2B90000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
3033000
heap
page read and write
29AADF9A000
heap
page read and write
840000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
3050000
heap
page read and write
29AAE403000
heap
page read and write
2B90000
trusted library allocation
page readonly
91AB8F8000
stack
page read and write
29AADFAA000
heap
page read and write
2C32000
trusted library allocation
page read and write
3036000
heap
page read and write
300F000
heap
page read and write
2C02000
trusted library allocation
page read and write
3019000
heap
page read and write
2B50000
remote allocation
page read and write
29AAE400000
heap
page read and write
20D97097000
heap
page read and write
29AAD5E0000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
300F000
heap
page read and write
F60879C000
stack
page read and write
1012000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
20D97093000
heap
page read and write
302A000
heap
page read and write
230DF082000
heap
page read and write
2CE0000
trusted library allocation
page read and write
300F000
heap
page read and write
2CA6000
trusted library allocation
page read and write
7D84A77000
stack
page read and write
2D58000
trusted library allocation
page read and write
3038000
heap
page read and write
30E0000
heap
page read and write
3050000
heap
page read and write
304F000
heap
page read and write
2C0A000
trusted library allocation
page read and write
304F000
heap
page read and write
2CC1000
trusted library allocation
page read and write
1017000
trusted library allocation
page execute and read and write
2DA0DE53000
heap
page read and write
29AADF76000
heap
page read and write
1A81464C000
heap
page read and write
2C23000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
2B2C000
trusted library allocation
page read and write
3030000
heap
page read and write
2CCD000
trusted library allocation
page read and write
300F000
heap
page read and write
230DF03C000
heap
page read and write
11CE000
stack
page read and write
2BC6000
trusted library allocation
page read and write
20D970B0000
heap
page read and write
2B28000
trusted library allocation
page read and write
2DA0DE02000
heap
page read and write
2C78000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
3011000
heap
page read and write
F92147E000
stack
page read and write
20D970A0000
heap
page read and write
3019000
heap
page read and write
1A81464D000
heap
page read and write
7D8497B000
stack
page read and write
302A000
heap
page read and write
3011000
heap
page read and write
2CE6000
trusted library allocation
page read and write
23C29655000
heap
page read and write
29AAD647000
heap
page read and write
1A8144C0000
heap
page read and write
2D37000
trusted library allocation
page read and write
3054000
heap
page read and write
50B0000
trusted library allocation
page read and write
300F000
heap
page read and write
1A814713000
heap
page read and write
29AADF8B000
heap
page read and write
29AADF9C000
heap
page read and write
50C0000
trusted library allocation
page read and write
29AADF79000
heap
page read and write
23C29480000
heap
page read and write
300F000
heap
page read and write
3AFF000
trusted library allocation
page read and write
29AAD653000
heap
page read and write
FED000
trusted library allocation
page execute and read and write
50B0000
trusted library allocation
page execute and read and write
29AADF7A000
heap
page read and write
2D56000
trusted library allocation
page read and write
29AAD613000
heap
page read and write
1A814530000
heap
page read and write
2DA0DD70000
trusted library allocation
page read and write
1CD15450000
heap
page readonly
1A814702000
heap
page read and write
2D20000
trusted library allocation
page read and write
3050000
heap
page read and write
3019000
heap
page read and write
1050000
heap
page read and write
300F000
heap
page read and write
302F000
heap
page read and write
3032000
heap
page read and write
29AAD6C0000
heap
page read and write
2D3B000
trusted library allocation
page read and write
50B1000
trusted library allocation
page read and write
29AADF53000
heap
page read and write
2C89000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
3020000
heap
page read and write
1CD14529000
heap
page read and write
2B2E000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
300D000
heap
page read and write
4D9537D000
stack
page read and write
29AAD6F6000
heap
page read and write
20D96F95000
heap
page read and write
304F000
heap
page read and write
2B92000
trusted library allocation
page read and write
2C76000
trusted library allocation
page read and write
300D000
heap
page read and write
2BE9000
trusted library allocation
page read and write
23C29E02000
trusted library allocation
page read and write
302C000
heap
page read and write
E570F7E000
stack
page read and write
8AC000
stack
page read and write
2C3E000
trusted library allocation
page read and write
29AAD480000
heap
page read and write
1040000
trusted library allocation
page execute and read and write
50C5000
trusted library allocation
page read and write
1CD14530000
heap
page read and write
3034000
heap
page read and write
2D78000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
F6F000
stack
page read and write
C8C000
heap
page read and write
2C0D000
trusted library allocation
page read and write
F608AFE000
stack
page read and write
3034000
heap
page read and write
830000
heap
page read and write
29AADF86000
heap
page read and write
F60907B000
stack
page read and write
F608E7B000
stack
page read and write
302A000
heap
page read and write
29AADF76000
heap
page read and write
3012000
heap
page read and write
300E000
heap
page read and write
3050000
heap
page read and write
C5B000
heap
page read and write
91AB5FE000
stack
page read and write
50A0000
trusted library allocation
page read and write
29AAD6EB000
heap
page read and write
2B60000
trusted library allocation
page read and write
75F1000
heap
page read and write
302F000
heap
page read and write
FF6000
trusted library allocation
page execute and read and write
2CA2000
trusted library allocation
page read and write
300E000
heap
page read and write
29AADF89000
heap
page read and write
3036000
heap
page read and write
1CD143B0000
heap
page read and write
29AADF64000
heap
page read and write
29AADF82000
heap
page read and write
2CAA000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
3019000
heap
page read and write
2BEC000
trusted library allocation
page read and write
23C29686000
heap
page read and write
29AADFCE000
heap
page read and write
5210000
trusted library allocation
page read and write
29AADF82000
heap
page read and write
3038000
heap
page read and write
2D69000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
300C000
heap
page read and write
50B0000
trusted library allocation
page read and write
29AADF8B000
heap
page read and write
20D970A2000
heap
page read and write
2CCB000
trusted library allocation
page read and write
3032000
heap
page read and write
7D84C7F000
stack
page read and write
5210000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
4D95479000
stack
page read and write
29AADF8D000
heap
page read and write
29AAD708000
heap
page read and write
20D970AF000
heap
page read and write
29AADF84000
heap
page read and write
3034000
heap
page read and write
2CAC000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
29AADF84000
heap
page read and write
515F000
stack
page read and write
3011000
heap
page read and write
3036000
heap
page read and write
230DF000000
heap
page read and write
3050000
heap
page read and write
304F000
heap
page read and write
2C9A000
trusted library allocation
page read and write
2B68000
trusted library allocation
page read and write
3011000
heap
page read and write
2C36000
trusted library allocation
page read and write
D8E000
stack
page read and write
29AAD6B4000
heap
page read and write
2AD0000
heap
page execute and read and write
FC0000
trusted library allocation
page read and write
20D97087000
heap
page read and write
29AADF82000
heap
page read and write
29AADF8D000
heap
page read and write
2ED0000
heap
page read and write
300E000
heap
page read and write
3C5A000
trusted library allocation
page read and write
FF2000
trusted library allocation
page read and write
29AAE402000
heap
page read and write
23C29708000
heap
page read and write
23C294E0000
heap
page read and write
D95000
heap
page read and write
20D96FA0000
heap
page read and write
230DF113000
heap
page read and write
29AADFAF000
heap
page read and write
302A000
heap
page read and write
2C8F000
trusted library allocation
page read and write
4A2000
remote allocation
page execute and read and write
2C51000
trusted library allocation
page read and write
302A000
heap
page read and write
29AADF94000
heap
page read and write
1030000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
F921B7F000
stack
page read and write
4D94F3B000
stack
page read and write
2CFD000
trusted library allocation
page read and write
3034000
heap
page read and write
29AADF86000
heap
page read and write
2B6C000
trusted library allocation
page read and write
1A814560000
trusted library allocation
page read and write
29AAD4E0000
heap
page read and write
2BE0000
trusted library allocation
page read and write
7D8487C000
stack
page read and write
300C000
heap
page read and write
230DF013000
heap
page read and write
302A000
heap
page read and write
4CB0000
direct allocation
page read and write
29AADF8D000
heap
page read and write
1CD15460000
trusted library allocation
page read and write
1CD14629000
heap
page read and write
1A81465C000
heap
page read and write
2C6E000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
1CD15200000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
2DA0DE74000
heap
page read and write
29AAD64D000
heap
page read and write
2D6B000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
3034000
heap
page read and write
5260000
heap
page execute and read and write
2A80000
heap
page read and write
50B0000
trusted library allocation
page read and write
91AB87F000
stack
page read and write
5210000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
29AAD64E000
heap
page read and write
2D05000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
29AAD649000
heap
page read and write
302A000
heap
page read and write
230DF890000
trusted library allocation
page read and write
29AADF84000
heap
page read and write
230DEFF0000
heap
page read and write
29AAD656000
heap
page read and write
300C000
heap
page read and write
2BCA000
trusted library allocation
page read and write
29AAD63C000
heap
page read and write
1CD145A0000
trusted library allocation
page read and write
E570EFB000
stack
page read and write
29AADE02000
heap
page read and write
3054000
heap
page read and write
3050000
heap
page read and write
1A814629000
heap
page read and write
2C00000
trusted library allocation
page read and write
291000
unkown
page execute read
2B4B000
trusted library allocation
page read and write
2B9C000
trusted library allocation
page read and write
29AADFB0000
heap
page read and write
2F97000
direct allocation
page read and write
D90000
heap
page read and write
50C0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2C72000
trusted library allocation
page read and write
2C59000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
49F000
remote allocation
page execute and read and write
3036000
heap
page read and write
9A8000
stack
page read and write
2D4C000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
29AADF8B000
heap
page read and write
300E000
heap
page read and write
3011000
heap
page read and write
29AADFA8000
heap
page read and write
3011000
heap
page read and write
29AADF7A000
heap
page read and write
29AADFB0000
heap
page read and write
2CAE000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
3036000
heap
page read and write
2C34000
trusted library allocation
page read and write
29AADF76000
heap
page read and write
302F000
heap
page read and write
302D000
heap
page read and write
2FD8000
heap
page read and write
2BA9000
trusted library allocation
page read and write
1A81466D000
heap
page read and write
4D9527F000
stack
page read and write
230DEF80000
heap
page read and write
2C96000
trusted library allocation
page read and write
2CCF000
trusted library allocation
page read and write
23C2963C000
heap
page read and write
2D7A000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
109E000
stack
page read and write
20D97095000
heap
page read and write
2D54000
trusted library allocation
page read and write
2DA0DF13000
heap
page read and write
23C2967A000
heap
page read and write
7D8467B000
stack
page read and write
5A4AF7B000
stack
page read and write
230DF05A000
heap
page read and write
3019000
heap
page read and write
2B94000
trusted library allocation
page read and write
302A000
heap
page read and write
29AADF83000
heap
page read and write
29AADF8F000
heap
page read and write
300E000
heap
page read and write
4C7D000
stack
page read and write
29AADF19000
heap
page read and write
3011000
heap
page read and write
2CC7000
trusted library allocation
page read and write
29AADF76000
heap
page read and write
2C8B000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
29AADFB0000
heap
page read and write
F9217F7000
stack
page read and write
300F000
heap
page read and write
50E0000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
3019000
heap
page read and write
1CD15440000
trusted library allocation
page read and write
29AAD64B000
heap
page read and write
3019000
heap
page read and write
2BB9000
trusted library allocation
page read and write
2DA0DE28000
heap
page read and write
2CDC000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
3036000
heap
page read and write
2BDB000
trusted library allocation
page read and write
29AADF88000
heap
page read and write
5210000
trusted library allocation
page read and write
29AADFB0000
heap
page read and write
2B50000
remote allocation
page read and write
29AAD635000
heap
page read and write
1A81463C000
heap
page read and write
E57127E000
stack
page read and write
F9218F7000
stack
page read and write
302A000
heap
page read and write
29AAD670000
heap
page read and write
302A000
heap
page read and write
2DA0DD40000
heap
page read and write
3019000
heap
page read and write
304F000
heap
page read and write
29AADF86000
heap
page read and write
2CA4000
trusted library allocation
page read and write
29AADF17000
heap
page read and write
4FC0000
trusted library section
page read and write
3011000
heap
page read and write
300F000
heap
page read and write
2DA0DE00000
heap
page read and write
50C0000
trusted library allocation
page read and write
302F000
heap
page read and write
23C29613000
heap
page read and write
302F000
heap
page read and write
2BAF000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
3050000
heap
page read and write
2B50000
remote allocation
page read and write
20D96E50000
heap
page read and write
29AAD650000
heap
page read and write
2C8D000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
29AADF62000
heap
page read and write
FEA000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
1CD144F0000
heap
page read and write
29AAD600000
heap
page read and write
302D000
heap
page read and write
2B73000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
23C29658000
heap
page read and write
FD0000
trusted library allocation
page read and write
3019000
heap
page read and write
2D08000
trusted library allocation
page read and write
6A2000
unkown
page readonly
2DA0DE13000
heap
page read and write
23C29702000
heap
page read and write
2D10000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
23C29666000
heap
page read and write
2B7D000
trusted library allocation
page read and write
20D97082000
heap
page read and write
300E000
heap
page read and write
29AADF74000
heap
page read and write
301C000
heap
page read and write
There are 824 hidden memdumps, click here to show them.