IOC Report
rAEAT-AvisodeNotificaci__n.exe

loading gif

Files

File Path
Type
Category
Malicious
rAEAT-AvisodeNotificaci__n.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Betegner.But
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_caspol.exe_8e75fe8585f03f6e7a5776aa659ed6798ddaaf9_ea830a9b_b9de75dd-ca8c-4b40-893f-36ddd515dbdd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F32.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Mar 20 11:38:31 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40F8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4128.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Abtegnene\Fabriksnyt\Mdepligts\Sprnghoved\colorimeter-colorhug-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Diuresis\Slockingstone\Rattlebrains\battery-level-90-charging-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Handlingssted\Skovsnegles\Herb\preferences-desktop-font-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Handlingssted\Skovsnegles\Herb\task-due-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Handlingssted\Skovsnegles\Herb\window-close.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\Minnesanger25.Sug
ASCII text, with very long lines (42980), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.TypeExtensions.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\media-playlist-consecutive-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\network-offline-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\network-wireless.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsu2B23.tmp\AdvSplash.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsu2B23.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ISO-8859 text, with CRLF, LF line terminators
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 2552

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
132.226.8.169
malicious
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
https://doc-08-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727c
unknown
http://creativecommons.org/ns#ShareAlike
unknown
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
https://doc-08-as-docs.googleusercontent.com/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://creativecommons.org/ns#
unknown
https://github.com/dotnet/runtime
unknown
http://creativecommons.org/ns#DerivativeWorks
unknown
https://doc-08-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727cbroendti715a9k7i4jfb9nau/1679308650000/13380849351983225481/*/1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4?e=download&uuid=a39e1756-09be-48bf-9f6c-3bbe22c32c5b
142.250.184.193
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://creativecommons.org/ns#Distribution
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://subca.ocsp-certum.com05
unknown
https://drive.google.com/
unknown
http://creativecommons.org/ns#Attribution
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://github.com/dotnet/runtimeBSJB
unknown
http://checkip.dyndns.com
unknown
http://creativecommons.org/ns#Notice
unknown
http://creativecommons.org/ns#Reproduction
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.certum.pl/CPS0
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.com
132.226.8.169
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.110
googlehosted.l.googleusercontent.com
142.250.184.193
doc-08-as-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
malicious
142.250.184.193
googlehosted.l.googleusercontent.com
United States
142.250.185.110
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\InstallDir32
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Micos\Irises\Kandissens\Raceblanding
Sulphammonium164
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Hermeneutics\Ophjedes\Amtsraadsmedlemmet
Printerproblemernes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\Spisekamrenes
Rumfartscenterets
HKEY_LOCAL_MACHINE\SOFTWARE\Fetichry
Isobase
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProgramId
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
FileId
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LowerCaseLongPath
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LongPathHash
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Name
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
OriginalFileName
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Publisher
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Version
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinFileVersion
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinaryType
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProductName
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProductVersion
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LinkDate
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinProductVersion
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
AppxPackageFullName
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
AppxPackageRelativeId
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Size
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Language
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
IsOsComponent
\REGISTRY\A\{bccd5b46-a793-0eb7-59e1-8cca6466b6b7}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C0099025B964
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F30000
remote allocation
page execute and read and write
malicious
49EC000
direct allocation
page execute and read and write
malicious
48C0000
direct allocation
page execute and read and write
malicious
28AEF8B0000
heap
page read and write
28AEFBB0000
heap
page read and write
232BCF2A000
heap
page read and write
782000
unkown
page read and write
232BC53C000
heap
page read and write
B9D000
heap
page read and write
ECE0FE000
stack
page read and write
B9D000
heap
page read and write
232BCF2B000
heap
page read and write
33601000
heap
page read and write
4104000
heap
page read and write
232BCF2E000
heap
page read and write
B63000
heap
page read and write
B9D000
heap
page read and write
232BC4F8000
heap
page read and write
217CF21B000
heap
page read and write
A833DFF000
stack
page read and write
232BCF74000
heap
page read and write
338F0000
direct allocation
page read and write
232BCF29000
heap
page read and write
28AEF940000
heap
page read and write
33601000
heap
page read and write
4127000
heap
page read and write
232BC492000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
36B95000
trusted library allocation
page read and write
B6E000
heap
page read and write
232BCF7C000
heap
page read and write
232BCF2F000
heap
page read and write
232BCF5A000
heap
page read and write
B9D000
heap
page read and write
369C6000
heap
page read and write
36BB0000
trusted library allocation
page read and write
28AEFAB2000
heap
page read and write
232BCF5B000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
34690000
trusted library allocation
page read and write
400000
unkown
page readonly
33601000
heap
page read and write
408000
unkown
page readonly
232BCF95000
heap
page read and write
33601000
heap
page read and write
232BC53C000
heap
page read and write
36BA0000
trusted library allocation
page read and write
4102000
heap
page read and write
5A49000
trusted library allocation
page read and write
40FE000
heap
page read and write
358C7000
trusted library allocation
page read and write
10059000
trusted library allocation
page read and write
232BCF21000
heap
page read and write
28AEFA3E000
heap
page read and write
232BD445000
heap
page read and write
36968000
heap
page read and write
36BB0000
trusted library allocation
page read and write
28AEFCF0000
trusted library allocation
page read and write
341BE000
stack
page read and write
36C40000
heap
page execute and read and write
36CB0000
heap
page read and write
B8F000
heap
page read and write
3E84000
heap
page read and write
232BC42A000
heap
page read and write
B9D000
heap
page read and write
232BCF95000
heap
page read and write
2BFF000
stack
page read and write
232BC481000
heap
page read and write
232BC4A2000
heap
page read and write
33E1E000
stack
page read and write
232BCF5C000
heap
page read and write
232BCF0E000
heap
page read and write
B9D000
heap
page read and write
232BCF78000
heap
page read and write
7E9000
unkown
page readonly
232BCF14000
heap
page read and write
36C10000
trusted library allocation
page read and write
14DE3E28000
unkown
page read and write
232BCF41000
heap
page read and write
3709E000
stack
page read and write
7A6000
unkown
page read and write
2FB0000
heap
page read and write
232BCF46000
heap
page read and write
10001000
unkown
page execute read
232BCF6E000
heap
page read and write
7D0000
unkown
page readonly
28AEFAA0000
heap
page read and write
232BCF43000
heap
page read and write
33601000
heap
page read and write
232BCF3A000
heap
page read and write
B9D000
heap
page read and write
232BD4BB000
heap
page read and write
3388F000
stack
page read and write
408000
unkown
page readonly
36BB6000
trusted library allocation
page read and write
B9D000
heap
page read and write
232BD412000
heap
page read and write
33601000
heap
page read and write
28AEFAA9000
heap
page read and write
33601000
heap
page read and write
411D000
heap
page read and write
411D000
heap
page read and write
232BCF24000
heap
page read and write
B9C000
heap
page read and write
217CF282000
heap
page read and write
232BCF78000
heap
page read and write
7D0000
unkown
page readonly
232BCF76000
heap
page read and write
36BB0000
trusted library allocation
page read and write
33601000
heap
page read and write
232BC400000
heap
page read and write
232BCF6F000
heap
page read and write
348AB000
trusted library allocation
page read and write
232BCF2B000
heap
page read and write
33601000
heap
page read and write
36BB0000
trusted library allocation
page read and write
232BCF3E000
heap
page read and write
232BCF1C000
heap
page read and write
10020000
trusted library allocation
page read and write
232BCF95000
heap
page read and write
34870000
trusted library allocation
page execute and read and write
232BCF2F000
heap
page read and write
232BCF78000
heap
page read and write
33601000
heap
page read and write
232BCF5D000
heap
page read and write
B9D000
heap
page read and write
232BC447000
heap
page read and write
232BC4A9000
heap
page read and write
28AEFAB5000
heap
page read and write
232BD340000
remote allocation
page read and write
28AEFCC0000
trusted library allocation
page read and write
B9D000
heap
page read and write
40F9000
heap
page read and write
232BCF7C000
heap
page read and write
33601000
heap
page read and write
C57537E000
stack
page read and write
369F0000
heap
page read and write
7E9000
unkown
page readonly
217CF290000
heap
page read and write
232BCF29000
heap
page read and write
232BD405000
heap
page read and write
232BC481000
heap
page read and write
232BCF5C000
heap
page read and write
232BCF2E000
heap
page read and write
4060000
heap
page read and write
B9D000
heap
page read and write
232BCF40000
heap
page read and write
346AD000
trusted library allocation
page execute and read and write
A833C7F000
stack
page read and write
232BC49E000
heap
page read and write
40A000
unkown
page write copy
36C8E000
stack
page read and write
232BC420000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
2710000
heap
page read and write
40E4000
heap
page read and write
36BD0000
trusted library allocation
page read and write
B9D000
heap
page read and write
2760000
heap
page read and write
232BCF3B000
heap
page read and write
232BCF29000
heap
page read and write
B9D000
heap
page read and write
B7B000
heap
page read and write
28AEF9E0000
heap
page read and write
33601000
heap
page read and write
217CF251000
heap
page read and write
36BB0000
trusted library allocation
page read and write
232BCF7B000
heap
page read and write
232BC490000
heap
page read and write
36C10000
trusted library allocation
page read and write
232BC427000
heap
page read and write
217CF24B000
heap
page read and write
9D5000
heap
page read and write
AF569FA000
stack
page read and write
28AEFAB0000
heap
page read and write
14DE4300000
heap
page read and write
217CF28E000
heap
page read and write
400E000
stack
page read and write
C57557A000
stack
page read and write
232BCF26000
heap
page read and write
36BA0000
trusted library allocation
page read and write
232BC4DE000
heap
page read and write
407157F000
stack
page read and write
232BCF81000
heap
page read and write
232BC505000
heap
page read and write
B93000
heap
page read and write
33601000
heap
page read and write
40DE000
heap
page read and write
232BC427000
heap
page read and write
406B000
heap
page read and write
1D0000
unclassified section
page readonly
217CF26D000
heap
page read and write
232BCF23000
heap
page read and write
385C000
remote allocation
page execute and read and write
7EF000
unkown
page readonly
14DE3E11000
unkown
page read and write
217CF232000
heap
page read and write
232BCF18000
heap
page read and write
2F6D000
stack
page read and write
34896000
trusted library allocation
page read and write
B84000
heap
page read and write
A833D7C000
stack
page read and write
36BC0000
trusted library allocation
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
232BCF7A000
heap
page read and write
B9D000
heap
page read and write
40FE000
heap
page read and write
33601000
heap
page read and write
232BCF78000
heap
page read and write
346D2000
trusted library allocation
page read and write
B9D000
heap
page read and write
27B0000
heap
page read and write
232BCF42000
heap
page read and write
232BCF95000
heap
page read and write
217CF249000
heap
page read and write
232BCF28000
heap
page read and write
34070000
trusted library allocation
page read and write
14DE3D00000
heap
page read and write
407115D000
stack
page read and write
36C10000
trusted library allocation
page read and write
232BD428000
heap
page read and write
217CF110000
heap
page read and write
4124000
heap
page read and write
28AEFC40000
trusted library allocation
page read and write
14DE3F02000
trusted library allocation
page read and write
B9D000
heap
page read and write
36BA0000
trusted library allocation
page read and write
232BCF76000
heap
page read and write
232BCF32000
heap
page read and write
232BC51A000
heap
page read and write
B9D000
heap
page read and write
232BCF1B000
heap
page read and write
34963000
trusted library allocation
page read and write
33601000
heap
page read and write
28AEFAB4000
heap
page read and write
28AEFAA9000
heap
page read and write
53EC000
direct allocation
page execute and read and write
4134000
heap
page read and write
232BCF93000
heap
page read and write
36C10000
trusted library allocation
page read and write
34880000
trusted library allocation
page read and write
232BD40B000
heap
page read and write
33601000
heap
page read and write
232BCF81000
heap
page read and write
36BB0000
trusted library allocation
page read and write
217CF256000
heap
page read and write
232BCF2C000
heap
page read and write
346C0000
trusted library allocation
page read and write
232BCF5C000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
232BCF20000
heap
page read and write
1A5C000
remote allocation
page execute and read and write
B9D000
heap
page read and write
232BCF32000
heap
page read and write
217CF227000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
B7E000
heap
page read and write
7E0000
unkown
page readonly
B9D000
heap
page read and write
232BCF60000
heap
page read and write
36C10000
trusted library allocation
page read and write
232BCF76000
heap
page read and write
35E0000
trusted library allocation
page read and write
28AF0A40000
trusted library allocation
page read and write
232BCF3D000
heap
page read and write
33601000
heap
page read and write
232BC513000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
14DE4202000
heap
page read and write
217CFA02000
trusted library allocation
page read and write
36BB0000
trusted library allocation
page read and write
36BB0000
trusted library allocation
page read and write
33618000
heap
page read and write
232BC4DE000
heap
page read and write
5A00000
trusted library allocation
page read and write
28AEF9B0000
trusted library allocation
page read and write
AF568FE000
stack
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
232BCF0E000
heap
page read and write
414E000
heap
page read and write
33601000
heap
page read and write
AF5647B000
stack
page read and write
36BA0000
trusted library allocation
page read and write
33601000
heap
page read and write
40F3000
heap
page read and write
232BCF76000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
232BCF7C000
heap
page read and write
B9D000
heap
page read and write
4106000
heap
page read and write
343E0000
remote allocation
page read and write
232BC53B000
heap
page read and write
232BCF2C000
heap
page read and write
18CE58A8000
heap
page read and write
18CE58B5000
heap
page read and write
232BCF19000
heap
page read and write
232BCF54000
heap
page read and write
217CEF90000
heap
page read and write
232BCF7C000
heap
page read and write
67EC000
direct allocation
page execute and read and write
19A000
stack
page read and write
232BCF84000
heap
page read and write
14DE3F40000
heap
page read and write
B9D000
heap
page read and write
40F3000
heap
page read and write
232BC54D000
heap
page read and write
B9D000
heap
page read and write
14DE3F15000
trusted library allocation
page read and write
40E4000
heap
page read and write
232BCF4F000
heap
page read and write
267E000
stack
page read and write
36BA0000
trusted library allocation
page read and write
217CF200000
heap
page read and write
7B3000
unkown
page read and write
217CF28D000
heap
page read and write
34720000
heap
page read and write
232BC421000
heap
page read and write
33601000
heap
page read and write
40E3000
heap
page read and write
33601000
heap
page read and write
217CF283000
heap
page read and write
217CF287000
heap
page read and write
33601000
heap
page read and write
4116000
heap
page read and write
232BCF15000
heap
page read and write
232BCF80000
heap
page read and write
217CEFF0000
heap
page read and write
33601000
heap
page read and write
232BCF8E000
heap
page read and write
343E0000
remote allocation
page read and write
28AEFABF000
heap
page read and write
B9D000
heap
page read and write
7E0000
unkown
page readonly
B9D000
heap
page read and write
232BCF2D000
heap
page read and write
14DE3C90000
heap
page read and write
18CE5950000
heap
page read and write
40D7000
heap
page read and write
346A3000
trusted library allocation
page execute and read and write
33601000
heap
page read and write
232BD469000
heap
page read and write
30000
heap
page read and write
358C1000
trusted library allocation
page read and write
36BB0000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
33601000
heap
page read and write
232BD49D000
heap
page read and write
232BD486000
heap
page read and write
232BCF61000
heap
page read and write
4134000
heap
page read and write
B84000
heap
page read and write
33601000
heap
page read and write
3482E000
stack
page read and write
232BCF81000
heap
page read and write
28AEFAA0000
heap
page read and write
B9D000
heap
page read and write
14DE3E00000
unkown
page read and write
232BCF74000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
36BB0000
trusted library allocation
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
B90000
heap
page read and write
33601000
heap
page read and write
36BA0000
trusted library allocation
page read and write
B9D000
heap
page read and write
400000
unkown
page readonly
232BC51B000
heap
page read and write
28AEFAA0000
heap
page read and write
36C10000
trusted library allocation
page read and write
28AEFAAD000
heap
page read and write
232BCF51000
heap
page read and write
232BD4B3000
heap
page read and write
2E5C000
remote allocation
page execute and read and write
40DC000
heap
page read and write
36BB0000
trusted library allocation
page read and write
36BC0000
trusted library allocation
page read and write
232BCF16000
heap
page read and write
217CF302000
heap
page read and write
14DE3E6F000
heap
page read and write
33601000
heap
page read and write
28AEFD40000
trusted library allocation
page read and write
9D0000
heap
page read and write
232BCF3C000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
232BCF05000
heap
page read and write
A833AFD000
stack
page read and write
348B0000
heap
page execute and read and write
28AEFAA0000
heap
page read and write
346B0000
trusted library allocation
page read and write
B9D000
heap
page read and write
232BCF76000
heap
page read and write
28AEFAB2000
heap
page read and write
232BCF1A000
heap
page read and write
B9D000
heap
page read and write
3486E000
stack
page read and write
33601000
heap
page read and write
71EC000
direct allocation
page execute and read and write
36C20000
trusted library allocation
page read and write
A833CFA000
stack
page read and write
232BCF48000
heap
page read and write
232BC4AF000
heap
page read and write
33601000
heap
page read and write
232BCF17000
heap
page read and write
A833A7B000
stack
page read and write
217CF27F000
heap
page read and write
346C6000
trusted library allocation
page execute and read and write
232BCF3B000
heap
page read and write
B9D000
heap
page read and write
232BCF85000
heap
page read and write
33601000
heap
page read and write
AF567FF000
stack
page read and write
105C000
remote allocation
page execute and read and write
232BCF29000
heap
page read and write
B9D000
heap
page read and write
33DDE000
stack
page read and write
28AEFA93000
heap
page read and write
232BCF2F000
heap
page read and write
232BC2F0000
heap
page read and write
232BC280000
heap
page read and write
232BD4CA000
heap
page read and write
34960000
trusted library allocation
page read and write
232BD42E000
heap
page read and write
B9D000
heap
page read and write
232BCF02000
heap
page read and write
10000000
unkown
page readonly
232BC502000
heap
page read and write
B6F000
heap
page read and write
B9D000
heap
page read and write
36BC0000
trusted library allocation
page read and write
A833B7E000
stack
page read and write
B72000
heap
page read and write
232BCF5A000
heap
page read and write
98000
stack
page read and write
B9D000
heap
page read and write
14DE4302000
heap
page read and write
4127000
heap
page read and write
3427D000
stack
page read and write
3441E000
stack
page read and write
232BCF60000
heap
page read and write
28AEFAA9000
heap
page read and write
B9D000
heap
page read and write
4108000
heap
page read and write
232BCE15000
heap
page read and write
33F5D000
stack
page read and write
232BCF95000
heap
page read and write
232BCF74000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
40F3000
heap
page read and write
33F1F000
stack
page read and write
245C000
remote allocation
page execute and read and write
14DE4000000
trusted library allocation
page read and write
232BD400000
heap
page read and write
14DE3E3D000
heap
page read and write
40EB000
heap
page read and write
B9D000
heap
page read and write
232BCF45000
heap
page read and write
338B0000
direct allocation
page read and write
217CF285000
heap
page read and write
18CE5850000
heap
page read and write
232BD340000
remote allocation
page read and write
28AF04F0000
trusted library allocation
page read and write
36B64000
trusted library allocation
page read and write
28AEFAA9000
heap
page read and write
14DE3F00000
trusted library allocation
page read and write
40E9000
heap
page read and write
33601000
heap
page read and write
33601000
heap
page read and write
232BC4EF000
heap
page read and write
232BCF2B000
heap
page read and write
3456C000
stack
page read and write
217CF213000
heap
page read and write
232BCF56000
heap
page read and write
14DE3E13000
unkown
page read and write
28AEFA67000
heap
page read and write
3FCE000
stack
page read and write
401000
unkown
page execute read
28AEFABF000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
36BB0000
trusted library allocation
page read and write
232BD4C0000
heap
page read and write
232BC4E7000
heap
page read and write
28AEFABF000
heap
page read and write
14DE4302000
heap
page read and write
B9D000
heap
page read and write
232BC51B000
heap
page read and write
B93000
heap
page read and write
33601000
heap
page read and write
18CE5730000
heap
page read and write
10005000
unkown
page readonly
18CE57F5000
heap
page read and write
B9D000
heap
page read and write
789000
unkown
page read and write
B30000
heap
page read and write
232BCF6D000
heap
page read and write
33601000
heap
page read and write
232BCF32000
heap
page read and write
B9D000
heap
page read and write
28AEFAA0000
heap
page read and write
232BCF29000
heap
page read and write
232BCF22000
heap
page read and write
232BCF92000
heap
page read and write
36C0D000
stack
page read and write
232BD45B000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
232BCF95000
heap
page read and write
232BCF72000
heap
page read and write
33601000
heap
page read and write
33601000
heap
page read and write
232BCF5A000
heap
page read and write
14DE3E02000
unkown
page read and write
B38000
heap
page read and write
4116000
heap
page read and write
18CE5858000
heap
page read and write
40C7000
heap
page read and write
217CF289000
heap
page read and write
232BCF6B000
heap
page read and write
28AEFD10000
trusted library allocation
page read and write
232BCF74000
heap
page read and write
232BCF37000
heap
page read and write
B9D000
heap
page read and write
232BCF87000
heap
page read and write
2E6C000
stack
page read and write
B9D000
heap
page read and write
232BCF1E000
heap
page read and write
232BCF76000
heap
page read and write
2DF0000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
36BC0000
trusted library allocation
page read and write
232BCF8F000
heap
page read and write
217CF28A000
heap
page read and write
217CF23B000
heap
page read and write
3497D000
trusted library allocation
page read and write
4010000
heap
page read and write
33601000
heap
page read and write
4108000
heap
page read and write
B9D000
heap
page read and write
232BCF70000
heap
page read and write
33601000
heap
page read and write
4114000
heap
page read and write
28AEFA92000
heap
page read and write
232BCF7C000
heap
page read and write
14DE4300000
heap
page read and write
10003000
unkown
page readonly
40714FF000
stack
page read and write
232BC53B000
heap
page read and write
B9D000
heap
page read and write
232BCF0E000
heap
page read and write
36BB0000
trusted library allocation
page read and write
18CE55F0000
heap
page read and write
40711DE000
stack
page read and write
232BCF60000
heap
page read and write
232BD40D000
heap
page read and write
ECDCFD000
stack
page read and write
341D0000
heap
page read and write
B9D000
heap
page read and write
232BCF6B000
heap
page read and write
232BCF31000
heap
page read and write
3471E000
stack
page read and write
36BB0000
trusted library allocation
page read and write
232BCE00000
heap
page read and write
232BCF2A000
heap
page read and write
3D40000
unclassified section
page readonly
36BC0000
trusted library allocation
page read and write
346DB000
trusted library allocation
page execute and read and write
C57517F000
unkown
page read and write
232BCF4B000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
232BCF70000
heap
page read and write
5DEC000
direct allocation
page execute and read and write
33601000
heap
page read and write
36C10000
trusted library allocation
page read and write
28AEFABA000
heap
page read and write
36BB0000
trusted library allocation
page read and write
B6B000
heap
page read and write
14DE4200000
heap
page read and write
14DE3E6F000
heap
page read and write
4158000
heap
page read and write
40A000
unkown
page read and write
217CF271000
heap
page read and write
232BCF7E000
heap
page read and write
232BCF2A000
heap
page read and write
343E0000
remote allocation
page read and write
3437E000
stack
page read and write
346D0000
trusted library allocation
page read and write
232BC4F5000
heap
page read and write
26BE000
stack
page read and write
B9D000
heap
page read and write
3451E000
stack
page read and write
33601000
heap
page read and write
33600000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
28AEFAB2000
heap
page read and write
B73000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
33CDE000
stack
page read and write
33601000
heap
page read and write
410B000
heap
page read and write
28AEFCA0000
trusted library allocation
page read and write
B9D000
heap
page read and write
232BC600000
unclassified section
page readonly
40EB000
heap
page read and write
232BC456000
heap
page read and write
232BCF2E000
heap
page read and write
232BCF25000
heap
page read and write
40715F9000
stack
page read and write
B9D000
heap
page read and write
232BC461000
heap
page read and write
34667000
stack
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
3E80000
heap
page read and write
786000
unkown
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
B6E000
heap
page read and write
14DE4213000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
232BCF78000
heap
page read and write
3378E000
stack
page read and write
14DE4313000
heap
page read and write
36B5E000
stack
page read and write
3ECE000
stack
page read and write
28AEFABF000
heap
page read and write
348C1000
trusted library allocation
page read and write
232BCF00000
heap
page read and write
232BCF0E000
heap
page read and write
232BCF56000
heap
page read and write
217CF247000
heap
page read and write
232BCF7D000
heap
page read and write
33601000
heap
page read and write
217CF280000
heap
page read and write
232BCF7C000
heap
page read and write
232BC610000
heap
page read and write
232BC4E0000
heap
page read and write
358E9000
trusted library allocation
page read and write
34890000
trusted library allocation
page read and write
232BCF61000
heap
page read and write
28AEFD00000
heap
page readonly
A833BFE000
stack
page read and write
33601000
heap
page read and write
413F000
heap
page read and write
232BCF1D000
heap
page read and write
28AEFAA9000
heap
page read and write
7AB000
unkown
page read and write
232BD340000
remote allocation
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
232BCF1F000
heap
page read and write
14DE3E39000
unkown
page read and write
2CFF000
stack
page read and write
401000
unkown
page execute read
232BCF92000
heap
page read and write
232BCE02000
heap
page read and write
B9D000
heap
page read and write
346D7000
trusted library allocation
page execute and read and write
3E20000
heap
page read and write
B9D000
heap
page read and write
232BCF13000
heap
page read and write
36BA0000
trusted library allocation
page read and write
36BB0000
trusted library allocation
page read and write
217CF286000
heap
page read and write
33601000
heap
page read and write
B9D000
heap
page read and write
7A4000
unkown
page read and write
410B000
heap
page read and write
40710DC000
stack
page read and write
232BC441000
heap
page read and write
232BD402000
heap
page read and write
217CF217000
heap
page read and write
18CE57F0000
heap
page read and write
217CF240000
heap
page read and write
232BCF5C000
heap
page read and write
232BC413000
heap
page read and write
B9D000
heap
page read and write
36C10000
trusted library allocation
page read and write
C57507B000
stack
page read and write
B9D000
heap
page read and write
33910000
direct allocation
page read and write
232BD423000
heap
page read and write
28AEFAA0000
heap
page read and write
3130000
direct allocation
page read and write
B9D000
heap
page read and write
28AEFAA9000
heap
page read and write
28AEFD30000
heap
page read and write
B9D000
heap
page read and write
232BD4B0000
heap
page read and write
413A000
heap
page read and write
36BA0000
trusted library allocation
page read and write
217CF27E000
heap
page read and write
33601000
heap
page read and write
B72000
heap
page read and write
B9D000
heap
page read and write
7CE000
unkown
page read and write
27B5000
heap
page read and write
B9D000
heap
page read and write
40DF000
heap
page read and write
40A9000
heap
page read and write
36BB0000
trusted library allocation
page read and write
217CF100000
unclassified section
page readonly
28AEF9E8000
heap
page read and write
232BCF78000
heap
page read and write
950000
heap
page read and write
C57547B000
stack
page read and write
40DF000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
232BCF4A000
heap
page read and write
425E000
stack
page read and write
232BCF95000
heap
page read and write
232BC448000
heap
page read and write
232BCF2C000
heap
page read and write
232BD434000
heap
page read and write
232BCF32000
heap
page read and write
C57567E000
stack
page read and write
2714000
heap
page read and write
28AF0A80000
trusted library allocation
page read and write
232BD4AA000
heap
page read and write
33601000
heap
page read and write
36C20000
trusted library allocation
page read and write
28AEFD35000
heap
page read and write
36BB0000
trusted library allocation
page read and write
232BCF40000
heap
page read and write
348A0000
trusted library allocation
page read and write
340BE000
stack
page read and write
232BCF47000
heap
page read and write
34966000
trusted library allocation
page read and write
232BC4B0000
heap
page read and write
B9C000
heap
page read and write
28AEFA7D000
heap
page read and write
B9D000
heap
page read and write
36BC0000
trusted library allocation
page read and write
ECE479000
stack
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
232BD45D000
heap
page read and write
B9D000
heap
page read and write
33601000
heap
page read and write
232BCF2B000
heap
page read and write
28AEFA52000
heap
page read and write
232BC491000
heap
page read and write
B9D000
heap
page read and write
28AEFAB2000
heap
page read and write
232BCF7D000
heap
page read and write
346CA000
trusted library allocation
page execute and read and write
232BCF2B000
heap
page read and write
33601000
heap
page read and write
33601000
heap
page read and write
33601000
heap
page read and write
14DE4313000
heap
page read and write
28AEFAB2000
heap
page read and write
232BCC00000
trusted library allocation
page read and write
232BCF7C000
heap
page read and write
232BCF70000
heap
page read and write
232BCF2F000
heap
page read and write
232BC457000
heap
page read and write
3405C000
stack
page read and write
25D0000
heap
page read and write
36F9F000
stack
page read and write
28AEFABF000
heap
page read and write
217CF28C000
heap
page read and write
4110000
heap
page read and write
217CF160000
trusted library allocation
page read and write
33601000
heap
page read and write
33601000
heap
page read and write
C575B7E000
stack
page read and write
232BC4D9000
heap
page read and write
33601000
heap
page read and write
232BCF39000
heap
page read and write
B9D000
heap
page read and write
36BA0000
trusted library allocation
page read and write
36BB0000
trusted library allocation
page read and write
B9D000
heap
page read and write
33950000
heap
page read and write
232BCF92000
heap
page read and write
B9D000
heap
page read and write
77C000
unkown
page read and write
7EF000
unkown
page readonly
407147E000
stack
page read and write
28AEFABF000
heap
page read and write
B9D000
heap
page read and write
232BCF5E000
heap
page read and write
346A4000
trusted library allocation
page read and write
B9D000
heap
page read and write
28AEFAB2000
heap
page read and write
232BCF29000
heap
page read and write
There are 801 hidden memdumps, click here to show them.