IOC Report
0PQIHAmzn4.exe

loading gif

Files

File Path
Type
Category
Malicious
0PQIHAmzn4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\murky
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0PQIHAmzn4.exe
"C:\Users\user\Desktop\0PQIHAmzn4.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\0PQIHAmzn4.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\0PQIHAmzn4.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
204.10.160.224:27667
malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
A30000
trusted library allocation
page read and write
432A000
heap
page read and write
12A6000
trusted library allocation
page execute and read and write
2E4F000
trusted library allocation
page read and write
4356000
heap
page read and write
4889000
direct allocation
page read and write
406D000
heap
page read and write
4327000
heap
page read and write
2992000
trusted library allocation
page read and write
42AE000
heap
page read and write
432A000
heap
page read and write
42AE000
heap
page read and write
4F40000
heap
page read and write
4720000
direct allocation
page read and write
42AE000
heap
page read and write
415C000
heap
page read and write
CDE000
heap
page read and write
432A000
heap
page read and write
41D9000
heap
page read and write
516B000
trusted library allocation
page read and write
41D9000
heap
page read and write
4E10000
trusted library section
page readonly
41D9000
heap
page read and write
4919000
direct allocation
page read and write
38EE000
stack
page read and write
401000
unkown
page execute read
46A3000
direct allocation
page read and write
C1E000
heap
page read and write
2D50000
heap
page read and write
FEF000
heap
page read and write
BA3000
heap
page read and write
4367000
heap
page read and write
432A000
heap
page read and write
4650000
direct allocation
page read and write
48D9000
direct allocation
page read and write
9A000
stack
page read and write
4367000
heap
page read and write
4158000
heap
page read and write
2E09000
trusted library allocation
page read and write
6C1E000
stack
page read and write
42AE000
heap
page read and write
FA7000
heap
page read and write
51D0000
trusted library allocation
page read and write
4849000
direct allocation
page read and write
42AE000
heap
page read and write
A70000
heap
page read and write
C6C000
heap
page read and write
47F0000
direct allocation
page read and write
400000
unkown
page readonly
27C1000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
415C000
heap
page read and write
4367000
heap
page read and write
4367000
heap
page read and write
432A000
heap
page read and write
2D61000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2DC6000
trusted library allocation
page read and write
B89000
heap
page read and write
CFD000
heap
page read and write
9DD000
stack
page read and write
A7B000
trusted library allocation
page execute and read and write
443C000
heap
page read and write
131E000
stack
page read and write
48DD000
direct allocation
page read and write
42F2000
heap
page read and write
415C000
heap
page read and write
42AE000
heap
page read and write
42AE000
heap
page read and write
2892000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
2949000
trusted library allocation
page read and write
42AE000
heap
page read and write
3966000
heap
page read and write
415C000
heap
page read and write
42EA000
heap
page read and write
41D9000
heap
page read and write
41D9000
heap
page read and write
29B5000
trusted library allocation
page read and write
45D5000
direct allocation
page read and write
A10000
heap
page read and write
41D1000
heap
page read and write
400000
unkown
page readonly
41E8000
heap
page read and write
1330000
heap
page execute and read and write
3F80000
heap
page read and write
4235000
heap
page read and write
4EA5000
heap
page read and write
4610000
direct allocation
page read and write
286B000
trusted library allocation
page read and write
B45000
heap
page read and write
432A000
heap
page read and write
407C000
heap
page read and write
42AE000
heap
page read and write
FBE000
heap
page read and write
9A000
stack
page read and write
3CFC000
heap
page read and write
48D9000
direct allocation
page read and write
5181000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
41D9000
heap
page read and write
47FB000
stack
page read and write
51A0000
trusted library allocation
page read and write
4030000
heap
page read and write
45C7000
heap
page read and write
4256000
heap
page read and write
432A000
heap
page read and write
2D55000
trusted library allocation
page read and write
EE7000
heap
page read and write
40A0000
heap
page read and write
432A000
heap
page read and write
41D8000
heap
page read and write
425F000
heap
page execute and read and write
FE9000
heap
page read and write
491000
unkown
page write copy
415C000
heap
page read and write
2867000
trusted library allocation
page read and write
4C4E000
trusted library allocation
page read and write
E00000
heap
page read and write
42AE000
heap
page read and write
4367000
heap
page read and write
B75000
heap
page read and write
4367000
heap
page read and write
400000
unkown
page readonly
4AB000
unkown
page readonly
3D6C000
heap
page read and write
42AE000
heap
page read and write
42EA000
heap
page read and write
42AE000
heap
page read and write
28EB000
trusted library allocation
page read and write
180F000
stack
page read and write
2979000
trusted library allocation
page read and write
41DA000
heap
page read and write
490000
unkown
page write copy
4A8000
unkown
page read and write
4367000
heap
page read and write
42EA000
heap
page read and write
3CF5000
heap
page read and write
48BE000
direct allocation
page read and write
A80000
heap
page read and write
117D000
trusted library allocation
page execute and read and write
37C5000
trusted library allocation
page read and write
415C000
heap
page read and write
47C9000
heap
page read and write
42AE000
heap
page read and write
4C61000
trusted library allocation
page read and write
1320000
trusted library allocation
page execute and read and write
2DFB000
trusted library allocation
page read and write
B78000
heap
page read and write
46A3000
direct allocation
page read and write
415C000
heap
page read and write
2E5B000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
42EA000
heap
page read and write
42E6000
heap
page read and write
4C40000
trusted library allocation
page read and write
42EA000
heap
page read and write
432A000
heap
page read and write
490000
unkown
page read and write
B97000
heap
page read and write
41D9000
heap
page read and write
2E5F000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
4367000
heap
page read and write
432A000
heap
page read and write
5050000
trusted library allocation
page read and write
494E000
direct allocation
page read and write
2D54000
heap
page read and write
432A000
heap
page read and write
4158000
heap
page read and write
4919000
direct allocation
page read and write
432A000
heap
page read and write
BE5000
heap
page read and write
FDF000
heap
page read and write
2DA9000
trusted library allocation
page read and write
41D9000
heap
page read and write
42AE000
heap
page read and write
2909000
trusted library allocation
page read and write
FD0000
heap
page read and write
42EA000
heap
page read and write
4367000
heap
page read and write
432A000
heap
page read and write
415C000
heap
page read and write
47F0000
direct allocation
page read and write
A75000
heap
page read and write
2E97000
trusted library allocation
page read and write
3CAB000
heap
page read and write
415C000
heap
page read and write
B93000
heap
page read and write
41D9000
heap
page read and write
20556040000
heap
page read and write
2D8B000
trusted library allocation
page read and write
8AF000
stack
page read and write
415C000
heap
page read and write
3CEF000
stack
page read and write
4367000
heap
page read and write
7450000
heap
page read and write
4367000
heap
page read and write
7C2000
system
page execute and read and write
41C9000
heap
page read and write
FD5000
heap
page read and write
41D9000
heap
page read and write
472C000
heap
page read and write
428F000
heap
page read and write
415C000
heap
page read and write
415C000
heap
page read and write
5695000
heap
page read and write
42AE000
heap
page read and write
4367000
heap
page read and write
F30000
heap
page read and write
498E000
direct allocation
page read and write
6ADE000
stack
page read and write
2994000
trusted library allocation
page read and write
3CFB000
heap
page read and write
43DE000
heap
page read and write
490000
unkown
page read and write
42EA000
heap
page read and write
68A000
stack
page read and write
2C61000
trusted library allocation
page read and write
415C000
heap
page read and write
CF5000
heap
page read and write
FAC000
heap
page read and write
13B7000
heap
page read and write
484D000
direct allocation
page read and write
48DD000
direct allocation
page read and write
4AB000
unkown
page readonly
42EA000
heap
page read and write
4610000
direct allocation
page read and write
964000
heap
page read and write
482000
unkown
page readonly
7C0000
system
page execute and read and write
42EA000
heap
page read and write
51C5000
trusted library allocation
page read and write
432C000
heap
page read and write
41D9000
heap
page read and write
42EA000
heap
page read and write
51B0000
trusted library allocation
page read and write
41D9000
heap
page read and write
4AB000
unkown
page readonly
41D9000
heap
page read and write
432A000
heap
page read and write
20556125000
heap
page read and write
432A000
heap
page read and write
110E000
stack
page read and write
432A000
heap
page read and write
FCD4CFE000
stack
page read and write
C1A000
heap
page read and write
4367000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
F20000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
41EA000
heap
page read and write
975000
heap
page read and write
42EA000
heap
page read and write
20556050000
heap
page read and write
A66000
trusted library allocation
page execute and read and write
2E1B000
trusted library allocation
page read and write
4733000
direct allocation
page read and write
F4F000
heap
page read and write
4366000
heap
page read and write
2E19000
trusted library allocation
page read and write
292C000
trusted library allocation
page read and write
43D5000
heap
page read and write
8FE000
stack
page read and write
880000
heap
page read and write
4367000
heap
page read and write
AFA000
heap
page read and write
4C4B000
trusted library allocation
page read and write
4E30000
heap
page read and write
41D9000
heap
page read and write
100000
heap
page read and write
5160000
trusted library allocation
page read and write
4773000
direct allocation
page read and write
3FC0000
heap
page read and write
4650000
direct allocation
page read and write
4344000
heap
page read and write
FCD45FE000
stack
page read and write
42EA000
heap
page read and write
41D9000
heap
page read and write
50CB000
stack
page read and write
2973000
trusted library allocation
page read and write
42C000
system
page execute and read and write
42AE000
heap
page read and write
3D30000
heap
page read and write
47B0000
direct allocation
page read and write
422A000
heap
page read and write
4A7000
unkown
page read and write
41D9000
heap
page read and write
4C95000
trusted library allocation
page read and write
432A000
heap
page read and write
2DA5000
trusted library allocation
page read and write
FCD4FFB000
stack
page read and write
4367000
heap
page read and write
4135000
heap
page read and write
41D9000
heap
page read and write
2DF2000
trusted library allocation
page read and write
12A2000
trusted library allocation
page read and write
432C000
heap
page read and write
42AE000
heap
page read and write
42AE000
heap
page read and write
42EA000
heap
page read and write
2E53000
trusted library allocation
page read and write
20556154000
heap
page read and write
2CCA000
trusted library allocation
page read and write
41E6000
heap
page read and write
BB0000
heap
page read and write
42EA000
heap
page read and write
2DEB000
trusted library allocation
page read and write
42EA000
heap
page read and write
297B000
trusted library allocation
page read and write
400000
unkown
page readonly
112F000
stack
page read and write
4367000
heap
page read and write
4367000
heap
page read and write
48BE000
direct allocation
page read and write
42EA000
heap
page read and write
4E33000
heap
page read and write
AA0000
heap
page read and write
289D000
trusted library allocation
page read and write
415C000
heap
page read and write
A40000
trusted library allocation
page read and write
41D9000
heap
page read and write
D57000
stack
page read and write
41C0000
heap
page read and write
2DDF000
trusted library allocation
page read and write
4368000
heap
page read and write
290F000
trusted library allocation
page read and write
27B0000
heap
page read and write
297D000
trusted library allocation
page read and write
FCD49FF000
stack
page read and write
205560C0000
heap
page read and write
4540000
direct allocation
page read and write
432B000
heap
page read and write
433B000
heap
page read and write
432A000
heap
page read and write
43E4000
heap
page read and write
154F000
stack
page read and write
2E51000
trusted library allocation
page read and write
41D9000
heap
page read and write
953000
heap
page read and write
491D000
direct allocation
page read and write
5150000
trusted library allocation
page read and write
5240000
heap
page read and write
490000
unkown
page write copy
393F000
stack
page read and write
424E000
heap
page read and write
3ED0000
direct allocation
page read and write
FE6000
heap
page read and write
205560F0000
heap
page read and write
13B0000
heap
page read and write
2981000
trusted library allocation
page read and write
764E000
stack
page read and write
A00000
heap
page read and write
757E000
stack
page read and write
4650000
direct allocation
page read and write
12B0000
trusted library allocation
page read and write
C30000
heap
page read and write
1170000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
4367000
heap
page read and write
2D36000
trusted library allocation
page read and write
432A000
heap
page read and write
3C47000
heap
page read and write
9A000
stack
page read and write
42EA000
heap
page read and write
FC7000
heap
page read and write
42AE000
heap
page read and write
54B4000
trusted library allocation
page read and write
432A000
heap
page read and write
2DB3000
trusted library allocation
page read and write
4F50000
heap
page execute and read and write
46E3000
direct allocation
page read and write
3F9B000
direct allocation
page read and write
2896000
trusted library allocation
page read and write
745C000
heap
page read and write
492000
unkown
page read and write
2983000
trusted library allocation
page read and write
415C000
heap
page read and write
BAC000
heap
page read and write
41D9000
heap
page read and write
46A3000
direct allocation
page read and write
2DE9000
trusted library allocation
page read and write
4367000
heap
page read and write
4367000
heap
page read and write
45C1000
heap
page read and write
2DAD000
trusted library allocation
page read and write
484D000
direct allocation
page read and write
787000
stack
page read and write
432A000
heap
page read and write
A85000
heap
page read and write
2DE5000
trusted library allocation
page read and write
42AE000
heap
page read and write
4367000
heap
page read and write
432A000
heap
page read and write
4180000
heap
page read and write
1174000
trusted library allocation
page read and write
91A000
heap
page read and write
4367000
heap
page read and write
432B000
heap
page read and write
401000
unkown
page execute read
2DDE000
stack
page read and write
4C6D000
trusted library allocation
page read and write
464A000
heap
page read and write
CEF000
heap
page read and write
43A1000
heap
page read and write
D20000
heap
page read and write
54F0000
heap
page read and write
205560F8000
heap
page read and write
491000
unkown
page write copy
E45000
heap
page read and write
3F30000
direct allocation
page read and write
CE6000
heap
page read and write
2DFD000
trusted library allocation
page read and write
94C000
heap
page read and write
A70000
heap
page read and write
42AA000
heap
page read and write
47B0000
direct allocation
page read and write
140E000
stack
page read and write
43A0000
heap
page read and write
480A000
heap
page read and write
12AA000
trusted library allocation
page execute and read and write
8AF000
stack
page read and write
42EA000
heap
page read and write
4E6A000
heap
page read and write
297F000
trusted library allocation
page read and write
205561A8000
heap
page read and write
94B000
heap
page read and write
4849000
direct allocation
page read and write
8A3E000
stack
page read and write
FCD46FE000
stack
page read and write
415C000
heap
page read and write
953000
heap
page read and write
F9F000
heap
page read and write
484D000
direct allocation
page read and write
42AE000
heap
page read and write
4367000
heap
page read and write
A50000
heap
page read and write
4C44000
trusted library allocation
page read and write
432A000
heap
page read and write
2941000
trusted library allocation
page read and write
4C66000
trusted library allocation
page read and write
415C000
heap
page read and write
C60000
heap
page read and write
4367000
heap
page read and write
41D9000
heap
page read and write
4439000
heap
page read and write
2E1D000
trusted library allocation
page read and write
3940000
heap
page read and write
48FE000
direct allocation
page read and write
2C89000
trusted library allocation
page read and write
2DAF000
trusted library allocation
page read and write
42AA000
heap
page read and write
29B7000
trusted library allocation
page read and write
42AE000
heap
page read and write
5280000
heap
page read and write
3BBC000
heap
page read and write
42EA000
heap
page read and write
4CE0000
trusted library allocation
page execute and read and write
415C000
heap
page read and write
42EA000
heap
page read and write
42EA000
heap
page read and write
2E1F000
trusted library allocation
page read and write
4E9C000
heap
page read and write
29B3000
trusted library allocation
page read and write
415C000
heap
page read and write
7EE000
system
page execute and read and write
48D9000
direct allocation
page read and write
896E000
stack
page read and write
4367000
heap
page read and write
5054000
trusted library allocation
page read and write
432A000
heap
page read and write
415C000
heap
page read and write
2DD5000
trusted library allocation
page read and write
498E000
direct allocation
page read and write
2D51000
trusted library allocation
page read and write
4582000
heap
page read and write
2E34000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
5490000
heap
page read and write
2935000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
4645000
heap
page read and write
516E000
trusted library allocation
page read and write
E40000
heap
page read and write
2D5E000
trusted library allocation
page read and write
29AD000
trusted library allocation
page read and write
41D9000
heap
page read and write
482000
unkown
page readonly
353E000
stack
page read and write
2DC8000
trusted library allocation
page read and write
4889000
direct allocation
page read and write
37C1000
trusted library allocation
page read and write
6D1E000
stack
page read and write
51BF000
trusted library allocation
page read and write
46E8000
heap
page read and write
990000
heap
page read and write
6E50000
heap
page read and write
4239000
heap
page read and write
432A000
heap
page read and write
42EA000
heap
page read and write
3DAB000
heap
page read and write
2E13000
trusted library allocation
page read and write
4329000
heap
page read and write
4433000
heap
page read and write
4AB000
unkown
page readonly
A50000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
31A0000
heap
page read and write
2E55000
trusted library allocation
page read and write
5510000
heap
page execute and read and write
A60000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
41FB000
heap
page read and write
415C000
heap
page read and write
20556390000
heap
page read and write
42AE000
heap
page read and write
42FA000
heap
page read and write
41D9000
heap
page read and write
41D9000
heap
page read and write
52B0000
heap
page read and write
1F0000
heap
page read and write
48DD000
direct allocation
page read and write
2905000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
B70000
heap
page read and write
2926000
trusted library allocation
page read and write
A55000
heap
page read and write
4367000
heap
page read and write
93E000
stack
page read and write
432B000
heap
page read and write
4773000
direct allocation
page read and write
51CD000
stack
page read and write
8B4000
stack
page read and write
1390000
heap
page read and write
4760000
direct allocation
page read and write
3ED8000
heap
page read and write
A72000
trusted library allocation
page read and write
4AB000
unkown
page readonly
48BE000
direct allocation
page read and write
42AE000
heap
page read and write
2971000
trusted library allocation
page read and write
42AE000
heap
page read and write
432A000
heap
page read and write
4430000
direct allocation
page read and write
46A3000
direct allocation
page read and write
4720000
direct allocation
page read and write
2E32000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
B08000
heap
page read and write
46E3000
direct allocation
page read and write
42AE000
heap
page read and write
2DFF000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
292A000
trusted library allocation
page read and write
432A000
heap
page read and write
484D000
direct allocation
page read and write
5080000
heap
page read and write
4CA0000
trusted library allocation
page read and write
415C000
heap
page read and write
42AE000
heap
page read and write
41D9000
heap
page read and write
4E40000
heap
page read and write
423E000
heap
page read and write
585E000
stack
page read and write
43E2000
heap
page read and write
A90000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
B72000
heap
page read and write
42AE000
heap
page read and write
FCD4DFE000
stack
page read and write
2E3E000
trusted library allocation
page read and write
43B5000
heap
page read and write
561D000
stack
page read and write
48FD000
stack
page read and write
4773000
direct allocation
page read and write
41D9000
heap
page read and write
51C8000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
2E6B000
trusted library allocation
page read and write
4337000
heap
page execute and read and write
A62000
trusted library allocation
page read and write
4367000
heap
page read and write
5275000
heap
page read and write
FF3000
heap
page read and write
EB0000
trusted library allocation
page execute and read and write
42AE000
heap
page read and write
28BE000
trusted library allocation
page read and write
41DD000
heap
page read and write
2C87000
trusted library allocation
page read and write
4285000
heap
page read and write
8B4000
stack
page read and write
432A000
heap
page read and write
A5E000
stack
page read and write
12BB000
trusted library allocation
page execute and read and write
EE0000
heap
page read and write
56B0000
heap
page read and write
296F000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
469F000
heap
page read and write
41D9000
heap
page read and write
415C000
heap
page read and write
182F000
stack
page read and write
DCE000
stack
page read and write
42EA000
heap
page read and write
4C80000
trusted library allocation
page read and write
4849000
direct allocation
page read and write
51A4000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
3CAE000
heap
page read and write
415C000
heap
page read and write
41D9000
heap
page read and write
2E8B000
trusted library allocation
page read and write
41D9000
heap
page read and write
42EA000
heap
page read and write
A5D000
trusted library allocation
page execute and read and write
2D3D000
trusted library allocation
page read and write
4367000
heap
page read and write
2DCC000
trusted library allocation
page read and write
4367000
heap
page read and write
589E000
stack
page read and write
482000
unkown
page readonly
70A2000
trusted library allocation
page read and write
EC0000
heap
page execute and read and write
42EA000
heap
page read and write
41DA000
heap
page read and write
389E000
stack
page read and write
3B05000
heap
page read and write
42B2000
heap
page read and write
960000
heap
page read and write
290B000
trusted library allocation
page read and write
415C000
heap
page read and write
42EA000
heap
page read and write
2945000
trusted library allocation
page read and write
940000
heap
page read and write
432A000
heap
page read and write
2055611A000
heap
page read and write
42EA000
heap
page read and write
4733000
direct allocation
page read and write
2E4D000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
42AE000
heap
page read and write
3154000
heap
page read and write
48FE000
direct allocation
page read and write
1E0000
heap
page read and write
1380000
heap
page read and write
3B05000
heap
page read and write
42EA000
heap
page read and write
42EA000
heap
page read and write
415C000
heap
page read and write
FCD4EFE000
stack
page read and write
12B2000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
4E20000
heap
page read and write
2DE7000
trusted library allocation
page read and write
4367000
heap
page read and write
A29000
heap
page read and write
415C000
heap
page read and write
FCD44FA000
stack
page read and write
29F7000
trusted library allocation
page read and write
110000
heap
page read and write
4580000
direct allocation
page read and write
41D9000
heap
page read and write
54B0000
trusted library allocation
page read and write
A44000
trusted library allocation
page read and write
4720000
direct allocation
page read and write
432A000
heap
page read and write
42E6000
heap
page read and write
54A0000
heap
page read and write
C91000
heap
page read and write
12D0000
trusted library allocation
page read and write
4889000
direct allocation
page read and write
2952000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
432A000
heap
page read and write
4720000
direct allocation
page read and write
42EA000
heap
page read and write
41F5000
heap
page read and write
42AE000
heap
page read and write
432A000
heap
page read and write
42AE000
heap
page read and write
2996000
trusted library allocation
page read and write
4764000
heap
page read and write
41D9000
heap
page read and write
52B4000
heap
page read and write
5210000
trusted library allocation
page execute and read and write
42AE000
heap
page read and write
41D9000
heap
page read and write
299C000
trusted library allocation
page read and write
42AE000
heap
page read and write
42EA000
heap
page read and write
2E57000
trusted library allocation
page read and write
278F000
stack
page read and write
491D000
direct allocation
page read and write
45AB000
heap
page read and write
42EA000
heap
page read and write
2962000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
432A000
heap
page read and write
2D9E000
stack
page read and write
2E17000
trusted library allocation
page read and write
42EA000
heap
page read and write
4580000
direct allocation
page read and write
4C8F000
trusted library allocation
page read and write
415C000
heap
page read and write
494E000
direct allocation
page read and write
C4C000
heap
page read and write
415C000
heap
page read and write
42EA000
heap
page read and write
2790000
trusted library allocation
page read and write
415C000
heap
page read and write
43A6000
heap
page read and write
432B000
heap
page read and write
2E36000
trusted library allocation
page read and write
42AE000
heap
page read and write
FBB000
heap
page read and write
41D9000
heap
page read and write
488D000
direct allocation
page read and write
45C0000
direct allocation
page read and write
432A000
heap
page read and write
42EA000
heap
page read and write
486C000
heap
page read and write
4773000
heap
page read and write
3C61000
trusted library allocation
page read and write
423C000
heap
page read and write
9FE000
stack
page read and write
142E000
stack
page read and write
9AE000
stack
page read and write
41D9000
heap
page read and write
31A4000
heap
page read and write
415C000
heap
page read and write
8AF000
stack
page read and write
2998000
trusted library allocation
page read and write
2FD0000
heap
page read and write
BD0000
direct allocation
page read and write
42AE000
heap
page read and write
41D9000
heap
page read and write
2E5D000
trusted library allocation
page read and write
42EA000
heap
page read and write
492000
unkown
page read and write
43D3000
heap
page read and write
53ED000
stack
page read and write
BC7000
heap
page read and write
51C0000
trusted library allocation
page read and write
5480000
trusted library section
page readonly
41D9000
heap
page read and write
2E63000
trusted library allocation
page read and write
432B000
heap
page read and write
4367000
heap
page read and write
432A000
heap
page read and write
C38000
heap
page read and write
42AE000
heap
page read and write
41D9000
heap
page read and write
F68000
heap
page read and write
116E000
stack
page read and write
F0000
heap
page read and write
42AE000
heap
page read and write
54C0000
trusted library allocation
page execute and read and write
3150000
heap
page read and write
415C000
heap
page read and write
C70000
heap
page read and write
2D0B000
trusted library allocation
page read and write
9C0000
heap
page read and write
FB0000
heap
page read and write
415C000
heap
page read and write
C10000
heap
page read and write
3F36000
heap
page read and write
490000
unkown
page read and write
4D10000
heap
page read and write
4760000
direct allocation
page read and write
42AE000
heap
page read and write
4919000
direct allocation
page read and write
93E000
stack
page read and write
29A1000
trusted library allocation
page read and write
52DB000
stack
page read and write
401000
unkown
page execute read
491000
unkown
page write copy
12B7000
trusted library allocation
page execute and read and write
4C90000
trusted library allocation
page read and write
4323000
heap
page read and write
42EA000
heap
page read and write
4367000
heap
page read and write
4367000
heap
page read and write
1E0000
heap
page read and write
52E3000
heap
page read and write
D35000
heap
page read and write
41D9000
heap
page read and write
415C000
heap
page read and write
4E58000
heap
page read and write
114E000
stack
page read and write
1180000
heap
page read and write
40B0000
heap
page read and write
47B0000
direct allocation
page read and write
458C000
heap
page read and write
432A000
heap
page read and write
4641000
heap
page read and write
41F2000
heap
page read and write
AD0000
heap
page read and write
42AE000
heap
page read and write
2977000
trusted library allocation
page read and write
498E000
direct allocation
page read and write
4DFC000
stack
page read and write
C5A000
stack
page read and write
4138000
heap
page read and write
4367000
heap
page read and write
8B3E000
stack
page read and write
100000
heap
page read and write
5192000
trusted library allocation
page read and write
52E0000
heap
page read and write
5260000
trusted library allocation
page execute and read and write
29AF000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
3C65000
trusted library allocation
page read and write
488D000
direct allocation
page read and write
4DF0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
8FE000
stack
page read and write
A81000
heap
page read and write
46D6000
heap
page read and write
415C000
heap
page read and write
400000
unkown
page readonly
41D9000
heap
page read and write
482000
unkown
page readonly
40AD000
heap
page read and write
432C000
heap
page read and write
415C000
heap
page read and write
4733000
direct allocation
page read and write
431B000
heap
page read and write
2E38000
trusted library allocation
page read and write
2DF0000
heap
page read and write
432A000
heap
page read and write
56A0000
heap
page read and write
432C000
heap
page read and write
42DD000
heap
page read and write
2DAB000
trusted library allocation
page read and write
42EA000
heap
page read and write
3F3B000
direct allocation
page read and write
42EA000
heap
page read and write
2DF5000
heap
page read and write
7492000
heap
page read and write
75BE000
stack
page read and write
400000
unkown
page readonly
2055639E000
heap
page read and write
415C000
heap
page read and write
490000
unkown
page write copy
4367000
heap
page read and write
42AE000
heap
page read and write
5060000
trusted library allocation
page execute and read and write
41F8000
heap
page read and write
409C000
heap
page read and write
54E0000
trusted library allocation
page read and write
F5000
heap
page read and write
415C000
heap
page read and write
42EA000
heap
page read and write
2DC4000
trusted library allocation
page read and write
3CA4000
heap
page read and write
20556070000
heap
page read and write
A2B000
heap
page read and write
4095000
heap
page read and write
42AE000
heap
page read and write
42AE000
heap
page read and write
432A000
heap
page read and write
1560000
heap
page read and write
42EA000
heap
page read and write
415C000
heap
page read and write
42BE000
heap
page read and write
69A0000
heap
page read and write
F82000
heap
page read and write
29FC000
trusted library allocation
page read and write
282A000
trusted library allocation
page read and write
3EDC000
heap
page read and write
41D9000
heap
page read and write
2E04000
trusted library allocation
page read and write
137C000
stack
page read and write
4254000
heap
page read and write
415C000
heap
page read and write
A43000
trusted library allocation
page execute and read and write
1173000
trusted library allocation
page execute and read and write
43B1000
heap
page execute and read and write
9AE000
stack
page read and write
4263000
heap
page read and write
4AB000
unkown
page readonly
2E9C000
trusted library allocation
page read and write
B4F000
heap
page read and write
568E000
stack
page read and write
4227000
heap
page read and write
4367000
heap
page read and write
2DE3000
trusted library allocation
page read and write
4367000
heap
page read and write
5164000
trusted library allocation
page read and write
432A000
heap
page read and write
940000
heap
page read and write
47F0000
direct allocation
page read and write
9EB000
heap
page read and write
41D9000
heap
page read and write
4364000
heap
page read and write
42EA000
heap
page read and write
42EA000
heap
page read and write
2D07000
trusted library allocation
page read and write
41D9000
heap
page read and write
6BDF000
stack
page read and write
42EA000
heap
page read and write
A77000
trusted library allocation
page execute and read and write
101E000
heap
page read and write
4256000
heap
page read and write
48FE000
direct allocation
page read and write
294B000
trusted library allocation
page read and write
5290000
heap
page read and write
2E0F000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
3C9F000
stack
page read and write
7454000
heap
page read and write
4367000
heap
page read and write
FCD4BFE000
stack
page read and write
C7C000
heap
page read and write
293B000
trusted library allocation
page read and write
401000
unkown
page execute read
42AE000
heap
page read and write
1290000
trusted library allocation
page read and write
4367000
heap
page read and write
4CD0000
trusted library allocation
page read and write
415C000
heap
page read and write
41D9000
heap
page read and write
427C000
heap
page read and write
488D000
direct allocation
page read and write
2DD2000
trusted library allocation
page read and write
20556395000
heap
page read and write
4367000
heap
page read and write
415C000
heap
page read and write
DB0000
heap
page read and write
42AE000
heap
page read and write
4849000
direct allocation
page read and write
4410000
heap
page read and write
5690000
heap
page read and write
C81000
heap
page read and write
2932000
trusted library allocation
page read and write
4367000
heap
page read and write
415C000
heap
page read and write
424F000
heap
page read and write
AC0000
heap
page read and write
432A000
heap
page read and write
492000
unkown
page read and write
4367000
heap
page read and write
41D9000
heap
page read and write
4C5E000
trusted library allocation
page read and write
4698000
heap
page read and write
4580000
direct allocation
page read and write
293F000
trusted library allocation
page read and write
4515000
heap
page read and write
42AE000
heap
page read and write
4367000
heap
page read and write
A97000
heap
page read and write
41D9000
heap
page read and write
F37000
heap
page read and write
3AF0000
heap
page read and write
FB3000
heap
page read and write
42EA000
heap
page read and write
432A000
heap
page read and write
42EA000
heap
page read and write
995000
heap
page read and write
2D5B000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
482000
unkown
page readonly
CCE000
stack
page read and write
4368000
heap
page read and write
2DDB000
trusted library allocation
page read and write
FCD48FF000
stack
page read and write
AEE000
heap
page read and write
2DD0000
trusted library allocation
page read and write
128F000
stack
page read and write
494E000
direct allocation
page read and write
42EA000
heap
page read and write
4580000
direct allocation
page read and write
4367000
heap
page read and write
1550000
heap
page read and write
129D000
trusted library allocation
page execute and read and write
3EDE000
heap
page read and write
A1E000
stack
page read and write
42AE000
heap
page read and write
401000
unkown
page execute read
517E000
trusted library allocation
page read and write
A6A000
trusted library allocation
page execute and read and write
AD8000
heap
page read and write
94E000
heap
page read and write
4367000
heap
page read and write
432B000
heap
page read and write
2943000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
4695000
heap
page read and write
415C000
heap
page read and write
42EA000
heap
page read and write
F59000
heap
page read and write
41C7000
heap
page read and write
415C000
heap
page read and write
42EA000
heap
page read and write
2C5E000
stack
page read and write
4367000
heap
page read and write
491D000
direct allocation
page read and write
12A0000
trusted library allocation
page read and write
41D9000
heap
page read and write
2DB1000
trusted library allocation
page read and write
482000
unkown
page readonly
41D9000
heap
page read and write
42AE000
heap
page read and write
41D9000
heap
page read and write
2947000
trusted library allocation
page read and write
415C000
heap
page read and write
41D7000
heap
page read and write
C5B000
heap
page read and write
DFD000
stack
page read and write
2930000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
299A000
trusted library allocation
page read and write
8B4000
stack
page read and write
403A000
heap
page read and write
4367000
heap
page read and write
415C000
heap
page read and write
46E3000
direct allocation
page read and write
40A6000
heap
page read and write
42AA000
heap
page read and write
4367000
heap
page read and write
2D32000
trusted library allocation
page read and write
42AE000
heap
page read and write
91E000
heap
page read and write
910000
heap
page read and write
69AE000
heap
page read and write
41D9000
heap
page read and write
4A7000
unkown
page read and write
4367000
heap
page read and write
42AE000
heap
page read and write
4C72000
trusted library allocation
page read and write
415C000
heap
page read and write
3E30000
heap
page read and write
E0E000
stack
page read and write
41D9000
heap
page read and write
42EA000
heap
page read and write
4367000
heap
page read and write
BB2000
heap
page read and write
4367000
heap
page read and write
7468000
heap
page read and write
432B000
heap
page read and write
47FD000
heap
page read and write
8FE000
stack
page read and write
2915000
trusted library allocation
page read and write
415C000
heap
page read and write
299E000
trusted library allocation
page read and write
422C000
heap
page read and write
415C000
heap
page read and write
2911000
trusted library allocation
page read and write
5270000
heap
page read and write
41D9000
heap
page read and write
518D000
trusted library allocation
page read and write
985000
heap
page read and write
BE0000
heap
page read and write
42AE000
heap
page read and write
There are 1051 hidden memdumps, click here to show them.