IOC Report
Insight_Medical_Publishing.one

loading gif

Files

File Path
Type
Category
Malicious
Insight_Medical_Publishing.one
data
initial sample
malicious
C:\Users\user\AppData\Local\Temp\click.wsf
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rad0767A.tmp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\CRCPqQPgWxqcgJu\zBLf.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\OneNote\16.0\cache\header
Matlab v4 mat-file (little endian) p\004, numeric, rows 262223750, columns 0
dropped
C:\Users\user\AppData\Local\Temp\OneNote15WatsonLog.etl
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\OneNote\16.0\Preferences.dat
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\36a44befa49650d0.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IOV5D23NX65BBX4TEENK.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Insight_Medical_Publishing.one
malicious
C:\Windows\SysWOW64\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad0767A.tmp.dll
malicious
C:\Windows\System32\regsvr32.exe
"C:\Users\user\AppData\Local\Temp\rad0767A.tmp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CRCPqQPgWxqcgJu\zBLf.dll"
malicious

URLs

Name
IP
Malicious
https://penshorn.org/admin/Ses8712iGR8du/
203.26.41.131
malicious
https://91.121.146.47:8080/jesecsgigcdk/zfgrij/wjhswvhm/D
unknown
malicious
https://182.162.143.56/jesecsgigcdk/zfgrij/wjhswvhm/
182.162.143.56
malicious
http://ozmeydan.com/cekici/9/
unknown
http://softwareulike.com/cWIYxWMPkK/
unknown
https://penshorn.org/
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
unknown
https://www.gomespontes.com.br/logs/pd/
unknown
https://penshorn.org/admin/Ses8712iGR8du/tM
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/0
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
unknown
https://bbvoyage.com/useragreem
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
unknown
https://163.44.196.120:8080/jesecsgigcdk/zfgrij/wjhswvhm/
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/D
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
unknown
http://softwareulike.com/cWIYxWMPkK/yM
unknown
https://91.121.146.47:8080/
unknown
https://163.44.196.120:8080/
unknown
https://160.16.142.56:8080/jesecsgigcdk/zfgrij/wjhswvhm/
unknown
https://penshorn.org/admin/Ses8712iGR8du/:
unknown
https://164.90.222.65:443/jesecsgigcdk/zfgrij/wjhswvhm/
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllG
unknown
https://www.gomespontes.com.br/logs/pd/vM
unknown
https://163.44.196.120:8080/a
unknown
https://www.gomespontes.com.br/logs/pd/RPROFIN
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6
unknown
http://ozmeydan.com/cekici/9/xM
unknown
https://167.172.199.165:8080/
unknown
https://160.16.142.56:8080/jesecsgigcdk/zfgrij/wjhswvhm/~
unknown
https://167.172.199.165:8080/jesecsgigcdk/zfgrij/wjhswvhm/
unknown
https://www.gomespontes.com.br/logs/pd/RPROFII
unknown
https://91.121.146.47:8080/jesecsgigcdk/zfgrij/wjhswvhm/
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/LE=C:
unknown
https://167.172.199.165:8080/&C
unknown
https://penshorn.org/admin/Ses8712iGR8du/o8
unknown
https://penshorn.org/l
unknown
https://160.16.142.56:8080/
unknown
https://penshorn.org:443/admin/Ses8712iGR8du/script.createobject(
unknown
https://160.16.142.56:8080/jesecsgigcdk/zfgrij/wjhswvhm/Low
unknown
https://164.90.222.65/jesecsgigcdk/zfgrij/wjhswvhm/
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
penshorn.org
203.26.41.131
malicious
c-0001.c-msedge.net
13.107.4.50

IPs

IP
Domain
Country
Malicious
110.232.117.186
unknown
Australia
malicious
103.132.242.26
unknown
India
malicious
104.168.155.143
unknown
United States
malicious
79.137.35.198
unknown
France
malicious
115.68.227.76
unknown
Korea Republic of
malicious
163.44.196.120
unknown
Singapore
malicious
206.189.28.199
unknown
United States
malicious
203.26.41.131
penshorn.org
Australia
malicious
107.170.39.149
unknown
United States
malicious
66.228.32.31
unknown
United States
malicious
197.242.150.244
unknown
South Africa
malicious
185.4.135.165
unknown
Greece
malicious
183.111.227.137
unknown
Korea Republic of
malicious
45.176.232.124
unknown
Colombia
malicious
169.57.156.166
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
139.59.126.41
unknown
Singapore
malicious
167.172.253.162
unknown
United States
malicious
167.172.199.165
unknown
United States
malicious
202.129.205.3
unknown
Thailand
malicious
147.139.166.154
unknown
United States
malicious
153.92.5.27
unknown
Germany
malicious
159.65.88.10
unknown
United States
malicious
172.105.226.75
unknown
United States
malicious
164.90.222.65
unknown
United States
malicious
213.239.212.5
unknown
Germany
malicious
5.135.159.50
unknown
France
malicious
186.194.240.217
unknown
Brazil
malicious
119.59.103.152
unknown
Thailand
malicious
159.89.202.34
unknown
United States
malicious
91.121.146.47
unknown
France
malicious
160.16.142.56
unknown
Japan
malicious
201.94.166.162
unknown
Brazil
malicious
91.207.28.33
unknown
Kyrgyzstan
malicious
103.75.201.2
unknown
Thailand
malicious
103.43.75.120
unknown
Japan
malicious
188.44.20.25
unknown
Macedonia
malicious
45.235.8.30
unknown
Brazil
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
187.63.160.88
unknown
Brazil
malicious
82.223.21.224
unknown
Spain
malicious
173.212.193.249
unknown
Germany
malicious
95.217.221.146
unknown
Germany
malicious
149.56.131.28
unknown
Canada
malicious
182.162.143.56
unknown
Korea Republic of
malicious
1.234.2.232
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
94.23.45.86
unknown
France
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Resiliency\StartupItems
e{8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Resiliency\StartupItems
f{8
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
FriendlyName
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
Description
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
LoadBehavior
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
CommandLineSafe
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
FriendlyName
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
Description
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
LoadBehavior
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
CommandLineSafe
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
LastMyDocumentsPathUsed
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ProgressWindowPosLeft
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ProgressWindowPosTop
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ConsecutiveBootCrashes
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ConsecutiveEarlyCrashes
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options\Save
BackupFilenamePostfixStartSP1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options\Save
BackupFilenamePostfixEndSP1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options\Save
BackupFilenamePostfixEndRerepairSP1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote
FirstBootStatus
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options
WatsonLoggingUserId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
LastCacheFclRepairSuccessTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
OneNoteFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4a6d-83F1-098E366C709C}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4a6d-83F1-098E366C709C}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.1\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D12BD3F-89B6-4077-AA2C-C9DC2BCA42F9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1D12BD3F-89B6-4077-AA2C-C9DC2BCA42F9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{627EA7B4-95B5-4980-84C1-9D20DA4460B1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{627EA7B4-95B5-4980-84C1-9D20DA4460B1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{452AC71A-B655-4967-A208-A4CC39DD7949}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{452AC71A-B655-4967-A208-A4CC39DD7949}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D4B9C3E-CC05-493F-85E2-43D1006DF96A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6D4B9C3E-CC05-493F-85E2-43D1006DF96A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E8304B8-CBD1-44F8-B0E8-89C625B2002E}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8E8304B8-CBD1-44F8-B0E8-89C625B2002E}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\TypeLib
Version
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BDC000
heap
page read and write
malicious
24A1000
direct allocation
page execute read
malicious
731000
direct allocation
page execute read
malicious
2470000
direct allocation
page execute and read and write
malicious
700000
direct allocation
page execute and read and write
malicious
C0C000
heap
page read and write
5854000
heap
page read and write
BBA000
heap
page read and write
59B1000
heap
page read and write
31A8000
heap
page read and write
3080000
heap
page read and write
599C000
heap
page read and write
C2D000
heap
page read and write
C41000
heap
page read and write
56FB000
heap
page read and write
58F8000
heap
page read and write
730000
direct allocation
page read and write
526E000
stack
page read and write
32FE000
stack
page read and write
31CA000
heap
page read and write
31FA000
heap
page read and write
2CFC000
heap
page read and write
59E6000
heap
page read and write
315B000
heap
page read and write
5158000
heap
page read and write
CAB000
heap
page read and write
5939000
heap
page read and write
5618000
heap
page read and write
5570000
heap
page read and write
5570000
heap
page read and write
EF9000
stack
page read and write
554B000
heap
page read and write
595C000
heap
page read and write
51CA000
heap
page read and write
CAB000
heap
page read and write
5A30000
heap
page read and write
25F0000
trusted library allocation
page read and write
57C1000
heap
page read and write
3340000
heap
page read and write
C32000
heap
page read and write
5A20000
heap
page read and write
2594EF70000
heap
page read and write
31D1000
heap
page read and write
51B7000
heap
page read and write
CAB000
heap
page read and write
59F0000
heap
page read and write
5710000
heap
page read and write
3159000
heap
page read and write
A7B000
stack
page read and write
5152000
heap
page read and write
31CF000
heap
page read and write
1FAE000
stack
page read and write
5612000
heap
page read and write
CA0000
heap
page read and write
C2D000
heap
page read and write
2EA7000
heap
page read and write
BFD000
heap
page read and write
51CA000
heap
page read and write
8CB44FE000
stack
page read and write
57A4000
heap
page read and write
54E3000
heap
page read and write
2D16000
heap
page read and write
CAB000
heap
page read and write
CA0000
heap
page read and write
5A41000
heap
page read and write
C3C000
heap
page read and write
571C000
heap
page read and write
5A41000
heap
page read and write
5941000
heap
page read and write
31C0000
heap
page read and write
CA9000
heap
page read and write
5824000
heap
page read and write
CA0000
heap
page read and write
25E0000
trusted library allocation
page read and write
587B000
heap
page read and write
1C0000
heap
page read and write
5881000
heap
page read and write
2C7C000
stack
page read and write
5516000
heap
page read and write
595A000
heap
page read and write
5142000
heap
page read and write
269E000
stack
page read and write
5520000
heap
page read and write
599E000
heap
page read and write
5925000
heap
page read and write
C41000
heap
page read and write
516D000
heap
page read and write
513C000
heap
page read and write
F30000
heap
page read and write
3152000
heap
page read and write
51B2000
heap
page read and write
580E000
heap
page read and write
5592000
heap
page read and write
31D7000
heap
page read and write
24CB000
direct allocation
page read and write
5964000
heap
page read and write
3440000
heap
page read and write
590F000
heap
page read and write
58D9000
heap
page read and write
CA4000
heap
page read and write
55F2000
heap
page read and write
562B000
heap
page read and write
5A45000
heap
page read and write
515D000
heap
page read and write
54C0000
heap
page read and write
54D0000
heap
page read and write
3145000
heap
page read and write
5173000
heap
page read and write
5889000
heap
page read and write
31B8000
heap
page read and write
595A000
heap
page read and write
5612000
heap
page read and write
C05000
heap
page read and write
51CA000
heap
page read and write
5709000
heap
page read and write
2EA8000
heap
page read and write
2D24000
heap
page read and write
5854000
heap
page read and write
CAB000
heap
page read and write
5691000
heap
page read and write
554B000
heap
page read and write
5164000
heap
page read and write
5159000
heap
page read and write
5579000
heap
page read and write
2594EF79000
heap
page read and write
5872000
heap
page read and write
C41000
heap
page read and write
2ECF000
heap
page read and write
314A000
heap
page read and write
58B9000
heap
page read and write
5738000
heap
page read and write
5147000
heap
page read and write
59DC000
heap
page read and write
2CEE000
heap
page read and write
3088000
heap
page read and write
2594EDF0000
trusted library allocation
page read and write
25DE000
stack
page read and write
51CA000
heap
page read and write
780000
heap
page read and write
8CB3FDE000
stack
page read and write
56AB000
heap
page read and write
5141000
heap
page read and write
58C1000
heap
page read and write
574E000
heap
page read and write
54D6000
heap
page read and write
3188000
heap
page read and write
2594ECE0000
trusted library allocation
page read and write
47B000
stack
page read and write
2C40000
heap
page read and write
5872000
heap
page read and write
550D000
heap
page read and write
3530000
heap
page read and write
5144000
heap
page read and write
59A5000
heap
page read and write
309E000
stack
page read and write
CA9000
heap
page read and write
3460000
heap
page read and write
5139000
heap
page read and write
5130000
heap
page read and write
C9D000
heap
page read and write
31A8000
heap
page read and write
514A000
heap
page read and write
315A000
heap
page read and write
596D000
heap
page read and write
5881000
heap
page read and write
5753000
heap
page read and write
5154000
heap
page read and write
58A9000
heap
page read and write
55DA000
heap
page read and write
30DE000
stack
page read and write
5162000
heap
page read and write
51CA000
heap
page read and write
CAB000
heap
page read and write
CA9000
heap
page read and write
5536000
heap
page read and write
5155000
heap
page read and write
5A4B000
heap
page read and write
5952000
heap
page read and write
55FE000
heap
page read and write
58B9000
heap
page read and write
CAB000
heap
page read and write
595A000
heap
page read and write
58A0000
heap
page read and write
CAB000
heap
page read and write
2594EC70000
heap
page read and write
5133000
heap
page read and write
2D05000
heap
page read and write
354E000
heap
page read and write
5935000
heap
page read and write
CA0000
heap
page read and write
2610000
heap
page read and write
5135000
heap
page read and write
554C000
heap
page read and write
56A4000
heap
page read and write
3174000
heap
page read and write
2594EE90000
trusted library allocation
page read and write
2CFC000
heap
page read and write
5915000
heap
page read and write
770000
trusted library allocation
page read and write
5146000
heap
page read and write
3197000
heap
page read and write
2594ED3D000
heap
page read and write
CA9000
heap
page read and write
760000
heap
page readonly
2C81000
heap
page read and write
56F4000
heap
page read and write
57B1000
heap
page read and write
579C000
heap
page read and write
51A6000
heap
page read and write
2ED0000
heap
page read and write
5516000
heap
page read and write
5A15000
heap
page read and write
5AA3000
heap
page read and write
5197000
heap
page read and write
5A29000
heap
page read and write
580E000
heap
page read and write
51AB000
heap
page read and write
24CA000
direct allocation
page readonly
CA4000
heap
page read and write
2594ED33000
heap
page read and write
354D000
heap
page read and write
C32000
heap
page read and write
5980000
heap
page read and write
5137000
heap
page read and write
513D000
heap
page read and write
2594ED3B000
heap
page read and write
CAB000
heap
page read and write
514B000
heap
page read and write
51BF000
heap
page read and write
518F000
heap
page read and write
31F2000
heap
page read and write
54AF000
stack
page read and write
3148000
heap
page read and write
CAB000
heap
page read and write
5B41000
heap
page read and write
5730000
heap
page read and write
4C80000
heap
page read and write
5FD0000
remote allocation
page read and write
31B8000
heap
page read and write
C07000
heap
page read and write
2CAC000
stack
page read and write
61AE000
stack
page read and write
5B63000
heap
page read and write
56CB000
heap
page read and write
2594EB20000
trusted library allocation
page read and write
5161000
heap
page read and write
318A000
heap
page read and write
5157000
heap
page read and write
59C9000
heap
page read and write
55B1000
heap
page read and write
CAB000
heap
page read and write
3145000
heap
page read and write
2594ED00000
heap
page read and write
57BA000
heap
page read and write
515C000
heap
page read and write
C41000
heap
page read and write
562F000
heap
page read and write
55A0000
heap
page read and write
26DB000
stack
page read and write
5525000
heap
page read and write
5816000
heap
page read and write
59FA000
heap
page read and write
2EF1000
heap
page read and write
3179000
heap
page read and write
592E000
heap
page read and write
57EE000
heap
page read and write
C08000
heap
page read and write
180021000
unkown
page read and write
578F000
heap
page read and write
5A1E000
heap
page read and write
3548000
heap
page read and write
2594EF80000
trusted library allocation
page read and write
583C000
heap
page read and write
515C000
heap
page read and write
54FC000
heap
page read and write
2D4C000
heap
page read and write
3154000
heap
page read and write
58EF000
heap
page read and write
6F0000
direct allocation
page execute and read and write
30A1000
heap
page read and write
314A000
heap
page read and write
55A0000
heap
page read and write
CA9000
heap
page read and write
CA9000
heap
page read and write
5982000
heap
page read and write
25E0000
trusted library allocation
page read and write
C05000
heap
page read and write
2B5D000
stack
page read and write
54E3000
heap
page read and write
207E000
stack
page read and write
565D000
heap
page read and write
2594EEC0000
trusted library allocation
page read and write
5FD0000
remote allocation
page read and write
54C1000
heap
page read and write
2177000
stack
page read and write
180000000
unkown
page readonly
6A0000
heap
page read and write
5649000
heap
page read and write
5AA5000
heap
page read and write
5950000
heap
page read and write
59A5000
heap
page read and write
59C0000
heap
page read and write
595A000
heap
page read and write
180016000
unkown
page readonly
599C000
heap
page read and write
5A45000
heap
page read and write
54E8000
heap
page read and write
5907000
heap
page read and write
5AF2000
heap
page read and write
75B000
direct allocation
page read and write
571C000
heap
page read and write
5135000
heap
page read and write
595A000
heap
page read and write
56D2000
heap
page read and write
2594FA70000
trusted library allocation
page read and write
596D000
heap
page read and write
2594EC50000
heap
page read and write
CAB000
heap
page read and write
555C000
heap
page read and write
5872000
heap
page read and write
C08000
heap
page read and write
58D8000
heap
page read and write
5657000
heap
page read and write
5747000
heap
page read and write
5A45000
heap
page read and write
3088000
heap
page read and write
CA9000
heap
page read and write
598C000
heap
page read and write
3544000
heap
page read and write
2E80000
heap
page read and write
5A0000
heap
page read and write
2CA7000
heap
page read and write
CA4000
heap
page read and write
5691000
heap
page read and write
5A4B000
heap
page read and write
5963000
heap
page read and write
75A000
direct allocation
page readonly
5D5D000
stack
page read and write
5570000
heap
page read and write
59DC000
heap
page read and write
55B7000
heap
page read and write
8CB4379000
stack
page read and write
5138000
heap
page read and write
24A0000
direct allocation
page read and write
33FF000
stack
page read and write
3193000
heap
page read and write
5151000
heap
page read and write
59EE000
heap
page read and write
5A30000
heap
page read and write
59A5000
heap
page read and write
583C000
heap
page read and write
2594EF10000
trusted library allocation
page read and write
3159000
heap
page read and write
C41000
heap
page read and write
61D0000
heap
page read and write
2B60000
remote allocation
page read and write
57C0000
heap
page read and write
CA4000
heap
page read and write
590D000
heap
page read and write
CA9000
heap
page read and write
5505000
heap
page read and write
5520000
heap
page read and write
583C000
heap
page read and write
57E0000
heap
page read and write
59CB000
heap
page read and write
24D0000
heap
page readonly
578F000
heap
page read and write
56F4000
heap
page read and write
BA0000
heap
page read and write
31A1000
heap
page read and write
57BA000
heap
page read and write
2CEE000
heap
page read and write
5513000
heap
page read and write
5505000
heap
page read and write
8CB42F9000
stack
page read and write
3150000
heap
page read and write
308A000
heap
page read and write
5A0B000
heap
page read and write
2ADB000
stack
page read and write
2F1B000
heap
page read and write
5A0D000
heap
page read and write
BB0000
heap
page read and write
5A30000
heap
page read and write
31E7000
heap
page read and write
2CEE000
heap
page read and write
31C0000
heap
page read and write
53AE000
stack
page read and write
2594ED53000
heap
page read and write
2E7E000
stack
page read and write
5A4B000
heap
page read and write
75C000
direct allocation
page readonly
1FF0000
heap
page read and write
56FF000
heap
page read and write
5173000
heap
page read and write
516D000
heap
page read and write
581C000
heap
page read and write
2E81000
heap
page read and write
590D000
heap
page read and write
CA3000
heap
page read and write
31A9000
heap
page read and write
596F000
heap
page read and write
5600000
heap
page read and write
8CB3F5B000
stack
page read and write
5A4B000
heap
page read and write
2CC8000
heap
page read and write
CAB000
heap
page read and write
5906000
heap
page read and write
180023000
unkown
page readonly
567E000
heap
page read and write
CA9000
heap
page read and write
553A000
heap
page read and write
271B000
stack
page read and write
3100000
heap
page read and write
31D1000
heap
page read and write
58B9000
heap
page read and write
318A000
heap
page read and write
2A60000
trusted library allocation
page read and write
5940000
heap
page read and write
57F6000
heap
page read and write
558C000
heap
page read and write
C34000
heap
page read and write
59DC000
heap
page read and write
590D000
heap
page read and write
C2D000
heap
page read and write
55E0000
heap
page read and write
785000
heap
page read and write
5F9F000
stack
page read and write
CA4000
heap
page read and write
5657000
heap
page read and write
54FC000
heap
page read and write
51A3000
heap
page read and write
580000
heap
page read and write
2594ED3B000
heap
page read and write
571D000
heap
page read and write
590D000
heap
page read and write
5989000
heap
page read and write
5A0A000
heap
page read and write
31E1000
heap
page read and write
58D8000
heap
page read and write
F35000
heap
page read and write
3130000
heap
page read and write
59DC000
heap
page read and write
255C000
stack
page read and write
CAC000
heap
page read and write
59F8000
heap
page read and write
56E5000
heap
page read and write
513E000
heap
page read and write
58E1000
heap
page read and write
5948000
heap
page read and write
5797000
heap
page read and write
5AB000
heap
page read and write
5724000
heap
page read and write
54F3000
heap
page read and write
5153000
heap
page read and write
5589000
heap
page read and write
55C8000
heap
page read and write
582C000
heap
page read and write
180021000
unkown
page read and write
C9E000
heap
page read and write
2594ECF0000
heap
page read and write
B10000
heap
page read and write
5A01000
heap
page read and write
59AF000
heap
page read and write
5981000
heap
page read and write
5624000
heap
page read and write
180000000
unkown
page readonly
5669000
heap
page read and write
6DCD000
stack
page read and write
CA3000
heap
page read and write
5B63000
heap
page read and write
2594EE50000
trusted library allocation
page read and write
3139000
heap
page read and write
3130000
heap
page read and write
5520000
heap
page read and write
C4D000
heap
page read and write
56BE000
heap
page read and write
5173000
heap
page read and write
2CFC000
heap
page read and write
564D000
heap
page read and write
C41000
heap
page read and write
1FB0000
trusted library allocation
page read and write
5163000
heap
page read and write
C41000
heap
page read and write
C0C000
heap
page read and write
BA5000
heap
page read and write
57AC000
heap
page read and write
31F7000
heap
page read and write
2CEB000
stack
page read and write
5763000
heap
page read and write
C4C000
heap
page read and write
5780000
heap
page read and write
8CB427F000
stack
page read and write
180016000
unkown
page readonly
5576000
heap
page read and write
6212000
heap
page read and write
5192000
heap
page read and write
55BB000
heap
page read and write
780000
heap
page read and write
2D50000
heap
page read and write
31FA000
heap
page read and write
B70000
heap
page read and write
313A000
heap
page read and write
563A000
heap
page read and write
3170000
heap
page read and write
55CE000
heap
page read and write
57A4000
heap
page read and write
CA9000
heap
page read and write
265F000
stack
page read and write
513D000
heap
page read and write
3183000
heap
page read and write
59D3000
heap
page read and write
5935000
heap
page read and write
5670000
heap
page read and write
31A1000
heap
page read and write
2594ED57000
heap
page read and write
5583000
heap
page read and write
BFD000
heap
page read and write
5A43000
heap
page read and write
3540000
heap
page read and write
5173000
heap
page read and write
2460000
direct allocation
page execute and read and write
2C80000
heap
page read and write
CA0000
heap
page read and write
51FE000
heap
page read and write
2BFE000
stack
page read and write
5A2C000
heap
page read and write
5709000
heap
page read and write
5612000
heap
page read and write
5A41000
heap
page read and write
3108000
heap
page read and write
C2D000
heap
page read and write
C0C000
heap
page read and write
59E4000
heap
page read and write
C0C000
heap
page read and write
59DC000
heap
page read and write
5A9F000
heap
page read and write
5B63000
heap
page read and write
5747000
heap
page read and write
5730000
heap
page read and write
598B000
heap
page read and write
5697000
heap
page read and write
B50000
heap
page read and write
CA0000
heap
page read and write
5642000
heap
page read and write
59A7000
heap
page read and write
3544000
heap
page read and write
6CCE000
stack
page read and write
592C000
heap
page read and write
8CB4479000
stack
page read and write
20FE000
stack
page read and write
BF9000
heap
page read and write
C0C000
heap
page read and write
2594ED3B000
heap
page read and write
C07000
heap
page read and write
598B000
heap
page read and write
CA9000
heap
page read and write
31BD000
heap
page read and write
5531000
heap
page read and write
55E4000
heap
page read and write
2CFC000
heap
page read and write
5892000
heap
page read and write
536F000
stack
page read and write
CA0000
heap
page read and write
2594EB10000
heap
page read and write
CA9000
heap
page read and write
5965000
heap
page read and write
514E000
heap
page read and write
55BB000
heap
page read and write
5158000
heap
page read and write
2ED0000
heap
page read and write
312E000
heap
page read and write
354E000
heap
page read and write
567E000
heap
page read and write
5778000
heap
page read and write
CA9000
heap
page read and write
5583000
heap
page read and write
2D15000
heap
page read and write
51BA000
heap
page read and write
513E000
heap
page read and write
31CA000
heap
page read and write
567E000
heap
page read and write
51CA000
heap
page read and write
57CA000
heap
page read and write
516D000
heap
page read and write
31FA000
heap
page read and write
57EE000
heap
page read and write
31D1000
heap
page read and write
3548000
heap
page read and write
55A6000
heap
page read and write
591E000
heap
page read and write
C3D000
heap
page read and write
5824000
heap
page read and write
24CC000
direct allocation
page readonly
CA0000
heap
page read and write
586A000
heap
page read and write
5B41000
heap
page read and write
31AE000
heap
page read and write
BFD000
heap
page read and write
51AF000
heap
page read and write
C2D000
heap
page read and write
56B7000
heap
page read and write
5A30000
heap
page read and write
2B60000
remote allocation
page read and write
518F000
heap
page read and write
5562000
heap
page read and write
56A4000
heap
page read and write
5606000
heap
page read and write
2594EF75000
heap
page read and write
55FF000
heap
page read and write
5A4B000
heap
page read and write
5144000
heap
page read and write
2594EEA0000
heap
page readonly
519A000
heap
page read and write
57D8000
heap
page read and write
5E5E000
stack
page read and write
5854000
heap
page read and write
5A2C000
heap
page read and write
519C000
heap
page read and write
CA0000
heap
page read and write
C41000
heap
page read and write
3153000
heap
page read and write
60AE000
stack
page read and write
5A41000
heap
page read and write
2DC0000
heap
page read and write
CA9000
heap
page read and write
5144000
heap
page read and write
CAB000
heap
page read and write
5636000
heap
page read and write
59C9000
heap
page read and write
2CFC000
heap
page read and write
2D0C000
heap
page read and write
5C1D000
stack
page read and write
CA0000
heap
page read and write
C3C000
heap
page read and write
514D000
heap
page read and write
55C0000
heap
page read and write
5A15000
heap
page read and write
CA0000
heap
page read and write
57A5000
heap
page read and write
B7C000
stack
page read and write
5131000
heap
page read and write
5551000
heap
page read and write
31A8000
heap
page read and write
5778000
heap
page read and write
576B000
heap
page read and write
5139000
heap
page read and write
2594ECF8000
heap
page read and write
59EE000
heap
page read and write
55FE000
heap
page read and write
58A0000
heap
page read and write
2CFC000
heap
page read and write
5D1D000
stack
page read and write
CA3000
heap
page read and write
2CEE000
heap
page read and write
578F000
heap
page read and write
5684000
heap
page read and write
5502000
heap
page read and write
311C000
heap
page read and write
C9B000
heap
page read and write
5980000
heap
page read and write
6203000
heap
page read and write
5A30000
heap
page read and write
5657000
heap
page read and write
5A2A000
heap
page read and write
54F9000
heap
page read and write
607000
heap
page read and write
C08000
heap
page read and write
180023000
unkown
page readonly
5A4B000
heap
page read and write
2B60000
remote allocation
page read and write
180001000
unkown
page execute read
5692000
heap
page read and write
31A8000
heap
page read and write
5844000
heap
page read and write
54C5000
heap
page read and write
2D14000
heap
page read and write
56F4000
heap
page read and write
5E9E000
stack
page read and write
31A6000
heap
page read and write
BE0000
heap
page read and write
5173000
heap
page read and write
5540000
heap
page read and write
5898000
heap
page read and write
56DE000
heap
page read and write
518F000
heap
page read and write
C33000
heap
page read and write
51CA000
heap
page read and write
5137000
heap
page read and write
317E000
heap
page read and write
2594EEB0000
trusted library allocation
page read and write
55EC000
heap
page read and write
58E7000
heap
page read and write
5A30000
heap
page read and write
5A41000
heap
page read and write
308F000
heap
page read and write
55C1000
heap
page read and write
8CB43FF000
stack
page read and write
311D000
heap
page read and write
5FD0000
remote allocation
page read and write
585C000
heap
page read and write
31FA000
heap
page read and write
5A41000
heap
page read and write
180001000
unkown
page execute read
There are 693 hidden memdumps, click here to show them.