IOC Report
Insight_Medical_Publishing_3.one

loading gif

Files

File Path
Type
Category
Malicious
Insight_Medical_Publishing_3.one
data
initial sample
malicious
C:\Users\user\AppData\Local\Temp\click.wsf
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rad38C2A.tmp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\ZLTlFkhzfcDaCjB\GJcmgWEWTZrc.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\OneNote\16.0\cache\header
Matlab v4 mat-file (little endian) \340\004, numeric, rows 262223750, columns 0
dropped
C:\Users\user\AppData\Local\Temp\OneNote15WatsonLog.etl
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\OneNote\16.0\Preferences.dat
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\36a44befa49650d0.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZUNH4RPCMTORJA8SP86T.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Insight_Medical_Publishing_3.one
malicious
C:\Windows\SysWOW64\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad38C2A.tmp.dll
malicious
C:\Windows\System32\regsvr32.exe
"C:\Users\user\AppData\Local\Temp\rad38C2A.tmp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZLTlFkhzfcDaCjB\GJcmgWEWTZrc.dll"
malicious

URLs

Name
IP
Malicious
https://167.172.199.165:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/eB
unknown
malicious
https://182.162.143.56/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
182.162.143.56
malicious
https://167.172.199.165:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/#
unknown
malicious
https://182.162.143.56/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/x
unknown
malicious
https://penshorn.org/
unknown
malicious
https://penshorn.org/admin/Ses8712iGR8du/tM
unknown
malicious
https://penshorn.org/admin/Ses8712iGR8du/
203.26.41.131
malicious
https://182.162.143.56/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/l/
unknown
malicious
http://softwareulike.com/cWIYxWMPkK/
unknown
https://159.89.202.34/
unknown
https://182.162.143.56/
unknown
https://91.121.146.47:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
unknown
https://pe2.162.143.56/
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
unknown
https://167.172.199.165:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
unknown
https://91.121.146.47:8080/
unknown
https://160.16.142.56:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
unknown
https://187.172.199.165:8080/
unknown
https://160.16.142.56:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl//6(
unknown
https://www.gomespontes.com.br/logs/pd/vM
unknown
https://167.172.199.165:8080/l
unknown
https://167.172.199.165:8080/
unknown
https://159.89.202.34/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/h
unknown
https://167.172.199.165:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/IT
unknown
https://91.121.146.47:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/000
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll
unknown
https://167.172.199.165:8080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/n
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFb
unknown
http://ozmeydan.com/cekici/9/
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
unknown
https://www.gomespontes.com.br/logs/pd/
unknown
https://167.172.199.165:8080/mwollpl/
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1j
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
unknown
http://softwareulike.com/cWIYxWMPkK/7
unknown
https://66.228.32.31:7080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
unknown
http://softwareulike.com/cWIYxWMPkK/yM
unknown
https://167.172.199.165:8080/8
unknown
https://159.89.202.34/I
unknown
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllNZr
unknown
http://softwareulike.com/cWIYxW
unknown
http://ozmeydan.com/cekici/9/xM
unknown
https://187.63.160.88:80/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/01
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
unknown
https://66.228.32.31:7080/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/_
unknown
https://159.89.202.34/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
unknown
https://160.16.142.56:8080/
unknown
https://164.90.222.65/qudwkmxm/xmonncmqfa/dpvphsc/beehnbizxmwollpl/
unknown
https://163.44.196.120:8080/3
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
penshorn.org
203.26.41.131
malicious
windowsupdatebg.s.llnwi.net
178.79.242.128

IPs

IP
Domain
Country
Malicious
110.232.117.186
unknown
Australia
malicious
103.132.242.26
unknown
India
malicious
104.168.155.143
unknown
United States
malicious
79.137.35.198
unknown
France
malicious
115.68.227.76
unknown
Korea Republic of
malicious
163.44.196.120
unknown
Singapore
malicious
206.189.28.199
unknown
United States
malicious
203.26.41.131
penshorn.org
Australia
malicious
107.170.39.149
unknown
United States
malicious
66.228.32.31
unknown
United States
malicious
197.242.150.244
unknown
South Africa
malicious
185.4.135.165
unknown
Greece
malicious
183.111.227.137
unknown
Korea Republic of
malicious
45.176.232.124
unknown
Colombia
malicious
169.57.156.166
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
139.59.126.41
unknown
Singapore
malicious
167.172.253.162
unknown
United States
malicious
167.172.199.165
unknown
United States
malicious
202.129.205.3
unknown
Thailand
malicious
147.139.166.154
unknown
United States
malicious
153.92.5.27
unknown
Germany
malicious
159.65.88.10
unknown
United States
malicious
172.105.226.75
unknown
United States
malicious
164.90.222.65
unknown
United States
malicious
213.239.212.5
unknown
Germany
malicious
5.135.159.50
unknown
France
malicious
186.194.240.217
unknown
Brazil
malicious
119.59.103.152
unknown
Thailand
malicious
159.89.202.34
unknown
United States
malicious
91.121.146.47
unknown
France
malicious
160.16.142.56
unknown
Japan
malicious
201.94.166.162
unknown
Brazil
malicious
91.207.28.33
unknown
Kyrgyzstan
malicious
103.75.201.2
unknown
Thailand
malicious
103.43.75.120
unknown
Japan
malicious
188.44.20.25
unknown
Macedonia
malicious
45.235.8.30
unknown
Brazil
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
187.63.160.88
unknown
Brazil
malicious
82.223.21.224
unknown
Spain
malicious
173.212.193.249
unknown
Germany
malicious
95.217.221.146
unknown
Germany
malicious
149.56.131.28
unknown
Canada
malicious
182.162.143.56
unknown
Korea Republic of
malicious
1.234.2.232
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
94.23.45.86
unknown
France
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Resiliency\StartupItems
xb8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Resiliency\StartupItems
yb8
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
FriendlyName
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
Description
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
LoadBehavior
HKEY_CURRENT_USER\Software\Microsoft\Office\Word\Addins\OneNote.WordAddinTakeNotesButton
CommandLineSafe
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
FriendlyName
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
Description
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
LoadBehavior
HKEY_CURRENT_USER\Software\Microsoft\Office\PowerPoint\Addins\OneNote.PowerPointAddinTakeNotesButton
CommandLineSafe
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
LastMyDocumentsPathUsed
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ProgressWindowPosLeft
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ProgressWindowPosTop
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ConsecutiveBootCrashes
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
ConsecutiveEarlyCrashes
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options\Save
BackupFilenamePostfixStartSP1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options\Save
BackupFilenamePostfixEndSP1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options\Save
BackupFilenamePostfixEndRerepairSP1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote
FirstBootStatus
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\Options
WatsonLoggingUserId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\OneNote\General
LastCacheFclRepairSuccessTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
OneNoteFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4a6d-83F1-098E366C709C}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4a6d-83F1-098E366C709C}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.1\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D12BD3F-89B6-4077-AA2C-C9DC2BCA42F9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1D12BD3F-89B6-4077-AA2C-C9DC2BCA42F9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{627EA7B4-95B5-4980-84C1-9D20DA4460B1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{627EA7B4-95B5-4980-84C1-9D20DA4460B1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{452AC71A-B655-4967-A208-A4CC39DD7949}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{452AC71A-B655-4967-A208-A4CC39DD7949}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D4B9C3E-CC05-493F-85E2-43D1006DF96A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6D4B9C3E-CC05-493F-85E2-43D1006DF96A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E8304B8-CBD1-44F8-B0E8-89C625B2002E}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8E8304B8-CBD1-44F8-B0E8-89C625B2002E}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\TypeLib
Version
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B11000
direct allocation
page execute read
malicious
F41000
direct allocation
page execute read
malicious
1220000
direct allocation
page execute and read and write
malicious
1268000
heap
page read and write
malicious
F10000
direct allocation
page execute and read and write
malicious
1DA52702000
heap
page read and write
5473000
heap
page read and write
5419000
heap
page read and write
4F8D000
heap
page read and write
53B9000
heap
page read and write
2EC80713000
heap
page read and write
11C0000
heap
page read and write
4F4F000
heap
page read and write
205A8902000
heap
page read and write
A8F000
heap
page read and write
B0E000
stack
page read and write
53B1000
heap
page read and write
5237000
heap
page read and write
5210000
heap
page read and write
1A7A6668000
heap
page read and write
12C4000
heap
page read and write
4EA0000
heap
page read and write
A97000
heap
page read and write
1DA526CB000
heap
page read and write
536E000
heap
page read and write
6500000
heap
page read and write
133ACD30000
heap
page read and write
1CFC2350000
trusted library allocation
page read and write
1CFC2340000
heap
page readonly
4EF0000
heap
page read and write
50AC000
heap
page read and write
5346000
heap
page read and write
2D5C000
stack
page read and write
4EB3000
heap
page read and write
133A000
heap
page read and write
1B7380A0000
heap
page read and write
DBC000
heap
page read and write
1A7A6580000
heap
page read and write
1BF3BE60000
heap
page read and write
A8A000
heap
page read and write
5158000
heap
page read and write
12B8000
heap
page read and write
A2B000
heap
page read and write
205A8760000
heap
page read and write
2D00000
heap
page read and write
50AD000
heap
page read and write
5245000
heap
page read and write
543B000
heap
page read and write
52BD000
heap
page read and write
EF0000
direct allocation
page execute and read and write
12DB000
heap
page read and write
AA2000
heap
page read and write
4F6A000
heap
page read and write
4F55000
heap
page read and write
550B000
heap
page read and write
334E000
heap
page read and write
F00000
heap
page read and write
2B3C000
direct allocation
page readonly
A8A000
heap
page read and write
4B2D000
heap
page read and write
134F000
heap
page read and write
1DA52390000
heap
page read and write
205A886D000
heap
page read and write
4B29000
heap
page read and write
133A000
heap
page read and write
5208000
heap
page read and write
4B39000
heap
page read and write
53A0000
heap
page read and write
512D000
heap
page read and write
A78000
heap
page read and write
4B58000
heap
page read and write
4F90000
heap
page read and write
50C0000
heap
page read and write
1B738202000
heap
page read and write
12F0000
heap
page read and write
A49000
heap
page read and write
510B000
heap
page read and write
5350000
heap
page read and write
12FE000
heap
page read and write
12BC000
heap
page read and write
33D7000
heap
page read and write
1CFC14F8000
heap
page read and write
A75000
heap
page read and write
4D70000
heap
page read and write
1B738313000
heap
page read and write
4AC3000
heap
page read and write
535A000
heap
page read and write
12F0000
heap
page read and write
12F0000
heap
page read and write
180001000
unkown
page execute read
1A7A6687000
heap
page read and write
FEF257E000
stack
page read and write
50EF000
heap
page read and write
1DA52D00000
heap
page read and write
4FCF000
heap
page read and write
1A68E7F000
stack
page read and write
3507000
heap
page read and write
AB7000
heap
page read and write
4E0FBFE000
stack
page read and write
133ACF02000
heap
page read and write
FEF247F000
stack
page read and write
FEF267F000
stack
page read and write
205A8865000
heap
page read and write
9EC000
heap
page read and write
AC2000
heap
page read and write
1A7A6600000
heap
page read and write
205A8874000
heap
page read and write
1DA5266A000
heap
page read and write
12E1000
heap
page read and write
53CD000
heap
page read and write
518A000
heap
page read and write
4B8D000
heap
page read and write
53A7000
heap
page read and write
4FAE000
heap
page read and write
4B2E000
heap
page read and write
1DA523A0000
heap
page read and write
4B49000
heap
page read and write
54C000
stack
page read and write
FEF1A9B000
stack
page read and write
AC7000
heap
page read and write
1CFC20E0000
trusted library allocation
page read and write
D1B000
heap
page read and write
51C6000
heap
page read and write
3508000
heap
page read and write
53C6000
heap
page read and write
1A68EFE000
stack
page read and write
5065000
heap
page read and write
5B0000
heap
page read and write
1260000
heap
page read and write
5557000
heap
page read and write
4E0FA7E000
stack
page read and write
538C000
heap
page read and write
1A7A6613000
heap
page read and write
5D0000
heap
page read and write
36E5000
heap
page read and write
205A87C0000
heap
page read and write
4EE6000
heap
page read and write
5141000
heap
page read and write
1B738243000
heap
page read and write
338A000
heap
page read and write
502B000
heap
page read and write
205A87F0000
trusted library allocation
page read and write
1BF3C040000
heap
page read and write
12B8000
heap
page read and write
5175000
heap
page read and write
541B000
heap
page read and write
3578000
heap
page read and write
521E000
heap
page read and write
3372000
heap
page read and write
4F61000
heap
page read and write
5363000
heap
page read and write
180023000
unkown
page readonly
524F000
heap
page read and write
12BC000
heap
page read and write
5423000
heap
page read and write
68AC000
stack
page read and write
4F10000
heap
page read and write
A1E000
heap
page read and write
36E6000
heap
page read and write
1350000
heap
page read and write
1CFC1470000
heap
page read and write
9E9B9FF000
stack
page read and write
5191000
heap
page read and write
4E0F7BE000
stack
page read and write
1210000
direct allocation
page execute and read and write
4E0000
heap
page read and write
2EC80675000
heap
page read and write
53E2000
heap
page read and write
12DB000
heap
page read and write
2CF0000
remote allocation
page read and write
1A7A665D000
heap
page read and write
2B10000
direct allocation
page read and write
30AF9FD000
stack
page read and write
FEF277F000
stack
page read and write
1000000
trusted library allocation
page read and write
5318000
heap
page read and write
1B738251000
heap
page read and write
529E000
heap
page read and write
314C000
stack
page read and write
A78000
heap
page read and write
A2B000
heap
page read and write
205A8863000
heap
page read and write
53FE000
heap
page read and write
8FA000
stack
page read and write
12EC000
heap
page read and write
1CFC2330000
trusted library allocation
page read and write
32E1000
heap
page read and write
5099000
heap
page read and write
12DD000
heap
page read and write
527D000
heap
page read and write
4E90000
heap
page read and write
1B738213000
heap
page read and write
5118000
heap
page read and write
5110000
heap
page read and write
51DC000
heap
page read and write
1A7A8130000
remote allocation
page read and write
55ED000
stack
page read and write
1CFC1541000
heap
page read and write
5007000
heap
page read and write
4E0F73B000
stack
page read and write
5103000
heap
page read and write
52DD000
heap
page read and write
4F7E000
heap
page read and write
2DE0000
heap
page read and write
526F000
heap
page read and write
FEF1EFB000
stack
page read and write
133A000
heap
page read and write
2CC0000
trusted library allocation
page read and write
1CFC14F0000
heap
page read and write
A40000
heap
page read and write
1CFC17F9000
heap
page read and write
2D8B000
stack
page read and write
2DDF000
stack
page read and write
6B732FE000
stack
page read and write
1350000
heap
page read and write
4AC8000
heap
page read and write
2CD0000
trusted library allocation
page read and write
D55000
heap
page read and write
51F2000
heap
page read and write
529E000
heap
page read and write
205A8867000
heap
page read and write
133ACE2A000
heap
page read and write
32DF000
stack
page read and write
4E6F000
stack
page read and write
4B44000
heap
page read and write
53BC000
heap
page read and write
A2E000
heap
page read and write
5321000
heap
page read and write
4B5A000
heap
page read and write
205A8844000
heap
page read and write
4F01000
heap
page read and write
59FE000
stack
page read and write
DB4000
heap
page read and write
531F000
heap
page read and write
A1F000
heap
page read and write
5BCE000
heap
page read and write
12EC000
heap
page read and write
12BC000
heap
page read and write
F6C000
direct allocation
page readonly
D10000
heap
page read and write
529E000
heap
page read and write
180021000
unkown
page read and write
2EC8065B000
heap
page read and write
5077000
heap
page read and write
4B2E000
heap
page read and write
7FE52AC000
stack
page read and write
33B3000
heap
page read and write
AFAC98C000
stack
page read and write
DB8000
heap
page read and write
12EB000
heap
page read and write
336A000
heap
page read and write
AFACFFB000
stack
page read and write
5BCD000
heap
page read and write
133ACE13000
heap
page read and write
4EA6000
heap
page read and write
4EDD000
heap
page read and write
2CF0000
remote allocation
page read and write
12BC000
heap
page read and write
5384000
heap
page read and write
109B000
stack
page read and write
4ECC000
heap
page read and write
12DB000
heap
page read and write
AFAD1FE000
stack
page read and write
180023000
unkown
page readonly
4B2E000
heap
page read and write
12E1000
heap
page read and write
4E95000
heap
page read and write
11A0000
heap
page read and write
1BF3C013000
heap
page read and write
31D0000
heap
page read and write
2CD0000
heap
page read and write
133ACD90000
remote allocation
page read and write
4B33000
heap
page read and write
50F7000
heap
page read and write
205A8842000
heap
page read and write
A0D000
heap
page read and write
4B03000
heap
page read and write
205A886A000
heap
page read and write
1A7A664D000
heap
page read and write
205A8841000
heap
page read and write
4B22000
heap
page read and write
30AF5FE000
stack
page read and write
12FD000
heap
page read and write
6B737FF000
stack
page read and write
1000000
trusted library allocation
page read and write
5503000
heap
page read and write
4F84000
heap
page read and write
A35000
heap
page read and write
550D000
heap
page read and write
1DA526BA000
heap
page read and write
A9A000
heap
page read and write
4B4F000
heap
page read and write
1035000
heap
page read and write
3366000
heap
page read and write
133A000
heap
page read and write
4FF5000
heap
page read and write
28DE000
stack
page read and write
521E000
heap
page read and write
12F0000
heap
page read and write
205A8868000
heap
page read and write
526F000
heap
page read and write
1DA526C4000
heap
page read and write
6B733FB000
stack
page read and write
1BF3C06C000
heap
page read and write
134F000
heap
page read and write
521F000
heap
page read and write
33D3000
heap
page read and write
4FC9000
heap
page read and write
5285000
heap
page read and write
5277000
heap
page read and write
3366000
heap
page read and write
1B738229000
heap
page read and write
4AC5000
heap
page read and write
1A7A668E000
heap
page read and write
5227000
heap
page read and write
4B2C000
heap
page read and write
DB6000
heap
page read and write
1DA52D32000
heap
page read and write
540A000
heap
page read and write
1350000
heap
page read and write
52F4000
heap
page read and write
5083000
heap
page read and write
205A8855000
heap
page read and write
53B9000
heap
page read and write
1BF3C000000
heap
page read and write
4B2A000
heap
page read and write
A63000
heap
page read and write
4B36000
heap
page read and write
DB6000
heap
page read and write
9E9B3FC000
stack
page read and write
334E000
heap
page read and write
1BF3C002000
heap
page read and write
1250000
heap
page read and write
5396000
heap
page read and write
52DB000
heap
page read and write
4B48000
heap
page read and write
5237000
heap
page read and write
4B34000
heap
page read and write
4C1E000
stack
page read and write
5364000
heap
page read and write
180021000
unkown
page read and write
C4E000
stack
page read and write
56ED000
stack
page read and write
1BF3BFC0000
trusted library allocation
page read and write
134D000
heap
page read and write
12F0000
heap
page read and write
4FAB000
heap
page read and write
134A000
heap
page read and write
5375000
heap
page read and write
205A8875000
heap
page read and write
511F000
heap
page read and write
1DA52665000
heap
page read and write
4AC1000
heap
page read and write
12B4000
heap
page read and write
9E9BDFD000
stack
page read and write
1BF3C075000
heap
page read and write
2D7B000
stack
page read and write
1CFC20F0000
trusted library allocation
page read and write
5065000
heap
page read and write
DB8000
heap
page read and write
540A000
heap
page read and write
2E5B000
stack
page read and write
205A8861000
heap
page read and write
4B3B000
heap
page read and write
7FE587E000
stack
page read and write
A71000
heap
page read and write
59A0000
remote allocation
page read and write
A8A000
heap
page read and write
531F000
heap
page read and write
205A8800000
heap
page read and write
1A7A6700000
heap
page read and write
533C000
heap
page read and write
4B5A000
heap
page read and write
5D5000
heap
page read and write
1A7A6679000
heap
page read and write
12AC000
heap
page read and write
1A7A6702000
heap
page read and write
30AF67E000
stack
page read and write
1A68FFE000
stack
page read and write
205A8839000
heap
page read and write
52AD000
heap
page read and write
12C4000
heap
page read and write
536E000
heap
page read and write
9E9BB7C000
stack
page read and write
5245000
heap
page read and write
5B80000
heap
page read and write
1CFC1532000
heap
page read and write
4AC0000
heap
page read and write
3366000
heap
page read and write
12DB000
heap
page read and write
4B21000
heap
page read and write
53EC000
heap
page read and write
134D000
heap
page read and write
2B3A000
direct allocation
page readonly
1B73823C000
heap
page read and write
4F7E000
heap
page read and write
4B03000
heap
page read and write
1030000
heap
page read and write
596F000
stack
page read and write
134F000
heap
page read and write
1A7A664D000
heap
page read and write
31CC000
stack
page read and write
3440000
heap
page read and write
A66000
heap
page read and write
4ED5000
heap
page read and write
4EB3000
heap
page read and write
133ACE40000
heap
page read and write
5056000
heap
page read and write
205A8847000
heap
page read and write
526F000
heap
page read and write
1A7A662A000
heap
page read and write
4EE3000
heap
page read and write
6B7367A000
stack
page read and write
133A000
heap
page read and write
1BF3C102000
heap
page read and write
1B7380B0000
heap
page read and write
5028000
heap
page read and write
AA7000
heap
page read and write
543C000
heap
page read and write
512C000
heap
page read and write
205A8860000
heap
page read and write
133A000
heap
page read and write
4FF9000
heap
page read and write
1DA52629000
heap
page read and write
4B8E000
heap
page read and write
541D000
heap
page read and write
5043000
heap
page read and write
205A8840000
heap
page read and write
336B000
heap
page read and write
522D000
heap
page read and write
4F06000
heap
page read and write
ACB000
heap
page read and write
1DA525D0000
trusted library allocation
page read and write
205A887E000
heap
page read and write
4B3A000
heap
page read and write
5331000
heap
page read and write
5398000
heap
page read and write
4B54000
heap
page read and write
4E91000
heap
page read and write
A3F000
heap
page read and write
5001000
heap
page read and write
337A000
heap
page read and write
51E9000
heap
page read and write
3307000
heap
page read and write
533D000
heap
page read and write
2CC0000
trusted library allocation
page read and write
134D000
heap
page read and write
53AF000
heap
page read and write
5316000
heap
page read and write
14F0000
heap
page read and write
DE0000
heap
page read and write
2EC80D30000
trusted library allocation
page read and write
FEF217B000
stack
page read and write
1BF3C079000
heap
page read and write
1DA52613000
heap
page read and write
1A7A665A000
heap
page read and write
30AF77F000
stack
page read and write
5304000
heap
page read and write
1DA52C02000
heap
page read and write
4B5A000
heap
page read and write
4BC0000
heap
page read and write
205A886B000
heap
page read and write
5160000
heap
page read and write
5419000
heap
page read and write
4B3F000
heap
page read and write
4D6E000
stack
page read and write
A35000
heap
page read and write
12DB000
heap
page read and write
4B59000
heap
page read and write
4EB8000
heap
page read and write
4B41000
heap
page read and write
4F7E000
heap
page read and write
205A8849000
heap
page read and write
12C4000
heap
page read and write
50AC000
heap
page read and write
51D3000
heap
page read and write
5405000
heap
page read and write
3328000
heap
page read and write
4F8D000
heap
page read and write
A78000
heap
page read and write
4B35000
heap
page read and write
67AD000
stack
page read and write
3366000
heap
page read and write
4F1B000
heap
page read and write
180000000
unkown
page readonly
3551000
heap
page read and write
9E9B7FC000
stack
page read and write
50A0000
heap
page read and write
4B35000
heap
page read and write
A7D000
heap
page read and write
6B7357E000
stack
page read and write
5257000
heap
page read and write
DBD000
heap
page read and write
12FE000
heap
page read and write
1A7A665D000
heap
page read and write
4F2C000
heap
page read and write
A58000
heap
page read and write
D78000
heap
page read and write
2EC80600000
heap
page read and write
DB0000
heap
page read and write
1A7A6718000
heap
page read and write
337A000
heap
page read and write
2CBE000
stack
page read and write
12C4000
heap
page read and write
2D3C000
stack
page read and write
205A8864000
heap
page read and write
4B5A000
heap
page read and write
A3F000
heap
page read and write
523F000
heap
page read and write
2EC805D0000
heap
page read and write
A8A000
heap
page read and write
133A000
heap
page read and write
50DB000
heap
page read and write
53E2000
heap
page read and write
133ACCD0000
heap
page read and write
AFAD0FB000
stack
page read and write
5479000
heap
page read and write
7FE5E7C000
stack
page read and write
4EF5000
heap
page read and write
1A7A663D000
heap
page read and write
180001000
unkown
page execute read
36E6000
heap
page read and write
12E1000
heap
page read and write
133ACD90000
remote allocation
page read and write
133ACE36000
heap
page read and write
5AFE000
stack
page read and write
12BC000
heap
page read and write
2EC80641000
heap
page read and write
4ACD000
heap
page read and write
A4D000
heap
page read and write
1350000
heap
page read and write
A79000
heap
page read and write
205A883D000
heap
page read and write
5200000
heap
page read and write
205A8750000
heap
page read and write
12EB000
heap
page read and write
133ACE00000
heap
page read and write
5396000
heap
page read and write
1A7A65B0000
trusted library allocation
page read and write
5406000
heap
page read and write
1BF3C028000
heap
page read and write
4B31000
heap
page read and write
50C0000
heap
page read and write
7FE56FC000
stack
page read and write
538E000
heap
page read and write
1A7A6713000
heap
page read and write
51B0000
heap
page read and write
285E000
stack
page read and write
5382000
heap
page read and write
335A000
heap
page read and write
5182000
heap
page read and write
205A8850000
heap
page read and write
54C1000
heap
page read and write
1B738890000
trusted library allocation
page read and write
12FE000
heap
page read and write
12C4000
heap
page read and write
506B000
heap
page read and write
7FE5D7F000
stack
page read and write
4B2F000
heap
page read and write
205A8830000
heap
page read and write
5070000
heap
page read and write
133AD602000
trusted library allocation
page read and write
205A8813000
heap
page read and write
2EC80702000
heap
page read and write
335A000
heap
page read and write
1BF3C802000
trusted library allocation
page read and write
2EC80602000
heap
page read and write
53AF000
heap
page read and write
335A000
heap
page read and write
2EC80560000
heap
page read and write
1A7A664A000
heap
page read and write
5331000
heap
page read and write
F6A000
direct allocation
page readonly
338A000
heap
page read and write
5423000
heap
page read and write
12FE000
heap
page read and write
5351000
heap
page read and write
2CD0000
trusted library allocation
page read and write
FFF000
stack
page read and write
1A7A65D0000
trusted library allocation
page read and write
4B5A000
heap
page read and write
4E0FCFE000
stack
page read and write
A92000
heap
page read and write
4B5A000
heap
page read and write
4F70000
heap
page read and write
180000000
unkown
page readonly
FEF287E000
stack
page read and write
2EC80570000
heap
page read and write
4ED2000
heap
page read and write
5013000
heap
page read and write
4FDB000
heap
page read and write
2EC8067A000
heap
page read and write
5423000
heap
page read and write
518B000
heap
page read and write
53DA000
heap
page read and write
51BD000
heap
page read and write
133ACD90000
remote allocation
page read and write
4F44000
heap
page read and write
4B4F000
heap
page read and write
1DA526E4000
heap
page read and write
A8A000
heap
page read and write
3366000
heap
page read and write
53D7000
heap
page read and write
1CFC13E0000
heap
page read and write
533B000
heap
page read and write
2958000
stack
page read and write
205A884E000
heap
page read and write
51A7000
heap
page read and write
5396000
heap
page read and write
D4E000
stack
page read and write
205A8877000
heap
page read and write
4EF0000
heap
page read and write
53B9000
heap
page read and write
4E0FEFF000
stack
page read and write
4E70000
heap
page read and write
1A6907F000
stack
page read and write
5149000
heap
page read and write
1A7A8202000
trusted library allocation
page read and write
508A000
heap
page read and write
1B738300000
heap
page read and write
33D7000
heap
page read and write
524F000
heap
page read and write
A0F000
heap
page read and write
5190000
heap
page read and write
4AC9000
heap
page read and write
31DA000
heap
page read and write
1A690F9000
stack
page read and write
5165000
heap
page read and write
205A9002000
trusted library allocation
page read and write
4EC3000
heap
page read and write
4B58000
heap
page read and write
4D1F000
stack
page read and write
12F0000
heap
page read and write
133ACD60000
trusted library allocation
page read and write
134D000
heap
page read and write
512C000
heap
page read and write
ACC000
heap
page read and write
4B5A000
heap
page read and write
9E9BCFB000
stack
page read and write
12AC000
heap
page read and write
4EC9000
heap
page read and write
1CFC1541000
heap
page read and write
2B3B000
direct allocation
page read and write
4B1F000
heap
page read and write
550A000
heap
page read and write
4F3E000
heap
page read and write
30AF12C000
stack
page read and write
A78000
heap
page read and write
1CFC1500000
heap
page read and write
5099000
heap
page read and write
4B30000
heap
page read and write
4F0A000
heap
page read and write
4F32000
heap
page read and write
586E000
stack
page read and write
205A884B000
heap
page read and write
A92000
heap
page read and write
537A000
heap
page read and write
1BF3BE50000
heap
page read and write
1BF3C100000
heap
page read and write
DBE000
heap
page read and write
530D000
heap
page read and write
1CFC2360000
trusted library allocation
page read and write
59A0000
remote allocation
page read and write
5182000
heap
page read and write
14F5000
heap
page read and write
50B3000
heap
page read and write
133ACCC0000
heap
page read and write
1A7A8130000
remote allocation
page read and write
1B738302000
heap
page read and write
4F67000
heap
page read and write
5013000
heap
page read and write
F70000
heap
page readonly
5346000
heap
page read and write
4B1F000
heap
page read and write
501A000
heap
page read and write
A5A000
heap
page read and write
ACB000
heap
page read and write
572E000
stack
page read and write
A71000
heap
page read and write
5306000
heap
page read and write
4ACD000
heap
page read and write
133ACE5C000
heap
page read and write
133A000
heap
page read and write
7FE5C7D000
stack
page read and write
2EC80E02000
trusted library allocation
page read and write
4B44000
heap
page read and write
2CF0000
remote allocation
page read and write
30AF8FF000
stack
page read and write
1BF3C113000
heap
page read and write
1CFC14E0000
trusted library allocation
page read and write
4B59000
heap
page read and write
12DB000
heap
page read and write
30F0000
heap
page read and write
4FEE000
heap
page read and write
9E9BFFC000
stack
page read and write
12AC000
heap
page read and write
205A8856000
heap
page read and write
4B3F000
heap
page read and write
12BC000
heap
page read and write
538C000
heap
page read and write
4ED5000
heap
page read and write
4EE6000
heap
page read and write
1DA52400000
heap
page read and write
205A8884000
heap
page read and write
A08000
heap
page read and write
4F47000
heap
page read and write
A5A000
heap
page read and write
52DB000
heap
page read and write
1CFC1800000
trusted library allocation
page read and write
5305000
heap
page read and write
133ACE02000
heap
page read and write
50CB000
heap
page read and write
1A7A8070000
trusted library allocation
page read and write
5545000
heap
page read and write
4AE9000
heap
page read and write
205A8831000
heap
page read and write
1B738870000
trusted library allocation
page read and write
4B4D000
heap
page read and write
32E0000
heap
page read and write
5333000
heap
page read and write
9D8000
heap
page read and write
334F000
heap
page read and write
205A8845000
heap
page read and write
4B27000
heap
page read and write
335A000
heap
page read and write
59A0000
remote allocation
page read and write
34E0000
heap
page read and write
1B738A02000
trusted library allocation
page read and write
541D000
heap
page read and write
30AFA7C000
stack
page read and write
5014000
heap
page read and write
180016000
unkown
page readonly
1B738200000
heap
page read and write
4F91000
heap
page read and write
A9A000
heap
page read and write
205A8862000
heap
page read and write
1CFC153A000
heap
page read and write
53BB000
heap
page read and write
3530000
heap
page read and write
5103000
heap
page read and write
4B2D000
heap
page read and write
4B59000
heap
page read and write
524F000
heap
page read and write
7FE5A7F000
stack
page read and write
53C4000
heap
page read and write
205A8846000
heap
page read and write
7FE597E000
stack
page read and write
1DA5263D000
heap
page read and write
324D000
stack
page read and write
1DA52687000
heap
page read and write
205A884F000
heap
page read and write
9E9BC7C000
stack
page read and write
1BF3C054000
heap
page read and write
5328000
heap
page read and write
3530000
heap
page read and write
530F000
heap
page read and write
1B738110000
heap
page read and write
535C000
heap
page read and write
1CFC13F0000
trusted library allocation
page read and write
528E000
heap
page read and write
1DA52713000
heap
page read and write
50D3000
heap
page read and write
52DB000
heap
page read and write
4F21000
heap
page read and write
5158000
heap
page read and write
1CFC23B0000
trusted library allocation
page read and write
9FE000
heap
page read and write
4B33000
heap
page read and write
F6B000
direct allocation
page read and write
51B5000
heap
page read and write
3578000
heap
page read and write
5030000
heap
page read and write
4B30000
heap
page read and write
1A7A8130000
remote allocation
page read and write
12E1000
heap
page read and write
DB8000
heap
page read and write
6B731FB000
stack
page read and write
9E9BAFE000
stack
page read and write
5124000
heap
page read and write
338A000
heap
page read and write
12B8000
heap
page read and write
12B8000
heap
page read and write
535A000
heap
page read and write
503C000
heap
page read and write
1B73824D000
heap
page read and write
AFACEFB000
stack
page read and write
12F0000
heap
page read and write
4B5A000
heap
page read and write
2EC80629000
heap
page read and write
9C0000
heap
page read and write
52F2000
heap
page read and write
34DE000
stack
page read and write
1CFC1790000
trusted library allocation
page read and write
C0E000
stack
page read and write
4FA4000
heap
page read and write
4B1E000
heap
page read and write
205A8829000
heap
page read and write
5134000
heap
page read and write
52EB000
heap
page read and write
4B51000
heap
page read and write
4ECC000
heap
page read and write
1DA52600000
heap
page read and write
9D0000
heap
page read and write
A78000
heap
page read and write
4B36000
heap
page read and write
6B72DAB000
stack
page read and write
530D000
heap
page read and write
A37000
heap
page read and write
4FB6000
heap
page read and write
51E9000
heap
page read and write
530D000
heap
page read and write
A8A000
heap
page read and write
12F0000
heap
page read and write
4F1B000
heap
page read and write
6B7347E000
stack
page read and write
9ED000
heap
page read and write
2EC80613000
heap
page read and write
ACD000
heap
page read and write
4B1F000
heap
page read and write
1B738243000
heap
page read and write
A53000
heap
page read and write
4FBD000
heap
page read and write
A3F000
heap
page read and write
4B4A000
heap
page read and write
52C6000
heap
page read and write
5B81000
heap
page read and write
1250000
heap
page readonly
4B41000
heap
page read and write
34E1000
heap
page read and write
51A0000
heap
page read and write
4B42000
heap
page read and write
504F000
heap
page read and write
9E9BEFE000
stack
page read and write
30AF87D000
stack
page read and write
52A6000
heap
page read and write
5346000
heap
page read and write
F40000
direct allocation
page read and write
134D000
heap
page read and write
516D000
heap
page read and write
53D8000
heap
page read and write
4B43000
heap
page read and write
4F87000
heap
page read and write
1A68BFF000
stack
page read and write
205A887A000
heap
page read and write
12E1000
heap
page read and write
5307000
heap
page read and write
1CFC17F0000
heap
page read and write
C7B000
stack
page read and write
5189000
heap
page read and write
205A8823000
heap
page read and write
1BF3BEC0000
heap
page read and write
205A8848000
heap
page read and write
AB2000
heap
page read and write
4ACD000
heap
page read and write
4B59000
heap
page read and write
12F0000
heap
page read and write
A43000
heap
page read and write
530D000
heap
page read and write
33D7000
heap
page read and write
4E0FDFE000
stack
page read and write
4EF0000
heap
page read and write
CD0000
heap
page read and write
12A8000
heap
page read and write
9E9C0FF000
stack
page read and write
5028000
heap
page read and write
4FDB000
heap
page read and write
12B5000
heap
page read and write
4FE2000
heap
page read and write
1A7A80B0000
trusted library allocation
page read and write
205A8879000
heap
page read and write
5363000
heap
page read and write
205A887B000
heap
page read and write
335A000
heap
page read and write
12B8000
heap
page read and write
31F1000
heap
page read and write
5028000
heap
page read and write
DB4000
heap
page read and write
1CFC1450000
heap
page read and write
5346000
heap
page read and write
180016000
unkown
page readonly
3308000
heap
page read and write
1B738257000
heap
page read and write
DB8000
heap
page read and write
12E1000
heap
page read and write
5070000
heap
page read and write
4B36000
heap
page read and write
4F1C000
heap
page read and write
A8B000
heap
page read and write
582E000
stack
page read and write
1A7A6510000
heap
page read and write
FEF237D000
stack
page read and write
12B4000
heap
page read and write
5237000
heap
page read and write
7FE5B7C000
stack
page read and write
52CC000
heap
page read and write
337C000
heap
page read and write
4B47000
heap
page read and write
1A68B7B000
stack
page read and write
12B5000
heap
page read and write
FEF207D000
stack
page read and write
A0E000
heap
page read and write
1CFC17F5000
heap
page read and write
4B3E000
heap
page read and write
12C4000
heap
page read and write
1A7A6520000
heap
page read and write
5347000
heap
page read and write
535B000
heap
page read and write
4B48000
heap
page read and write
50C7000
heap
page read and write
1A68F79000
stack
page read and write
D58000
heap
page read and write
1CFC1541000
heap
page read and write
CB0000
heap
page read and write
There are 903 hidden memdumps, click here to show them.