IOC Report
invoice_Fedex.exe

loading gif

Files

File Path
Type
Category
Malicious
invoice_Fedex.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\roundups
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\invoice_Fedex.exe
"C:\Users\user\Desktop\invoice_Fedex.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\invoice_Fedex.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\invoice_Fedex.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
204.10.160.224:27667
malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
43A2000
heap
page read and write
AA0000
heap
page read and write
BA7000
heap
page read and write
48F9000
direct allocation
page read and write
3C0F000
heap
page read and write
3B6D000
heap
page read and write
441E000
heap
page read and write
4324000
heap
page read and write
B87000
heap
page read and write
FDA000
trusted library allocation
page execute and read and write
441E000
heap
page read and write
52B0000
heap
page read and write
441E000
heap
page read and write
425B000
heap
page read and write
43BA000
heap
page read and write
291D000
trusted library allocation
page read and write
A2D000
trusted library allocation
page execute and read and write
433D000
heap
page read and write
2B9C000
trusted library allocation
page read and write
27C0000
heap
page read and write
3DB0000
heap
page read and write
2A32000
trusted library allocation
page read and write
3C90000
direct allocation
page read and write
482000
unkown
page readonly
2940000
trusted library allocation
page read and write
43BA000
heap
page read and write
2A0B000
trusted library allocation
page read and write
4C3D000
trusted library allocation
page read and write
48F0000
direct allocation
page read and write
28F5000
trusted library allocation
page read and write
4129000
heap
page read and write
2B21000
trusted library allocation
page read and write
C24000
trusted library allocation
page read and write
2A36000
trusted library allocation
page read and write
43B2000
heap
page read and write
43A2000
heap
page read and write
4A9D000
direct allocation
page read and write
28EF000
trusted library allocation
page read and write
FD6000
trusted library allocation
page execute and read and write
43A1000
heap
page read and write
29A4000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
482000
unkown
page readonly
29FB000
trusted library allocation
page read and write
4212000
heap
page read and write
43A1000
heap
page read and write
2900000
trusted library allocation
page read and write
CC5000
heap
page read and write
4324000
heap
page read and write
4A99000
direct allocation
page read and write
4257000
heap
page read and write
28C1000
trusted library allocation
page read and write
4DC0000
heap
page read and write
4324000
heap
page read and write
3BF0000
direct allocation
page read and write
410D000
heap
page read and write
4A5C000
stack
page read and write
43BB000
heap
page read and write
2923000
trusted library allocation
page read and write
4290000
heap
page read and write
3D1C000
heap
page read and write
4E40000
trusted library section
page readonly
1F594655000
heap
page read and write
CAE000
stack
page read and write
4A1D000
direct allocation
page read and write
6970000
heap
page read and write
2AE7000
trusted library allocation
page read and write
433D000
heap
page read and write
4290000
heap
page read and write
29CA000
trusted library allocation
page read and write
3EC0000
heap
page read and write
433D000
heap
page read and write
27F7000
trusted library allocation
page read and write
437F000
heap
page read and write
3BF0000
direct allocation
page read and write
29AA000
trusted library allocation
page read and write
43A1000
heap
page read and write
4E00000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
43A1000
heap
page read and write
39EF000
stack
page read and write
433D000
heap
page read and write
433D000
heap
page read and write
706E000
stack
page read and write
3C00000
direct allocation
page read and write
9E5000
heap
page read and write
4324000
heap
page read and write
400000
system
page execute and read and write
48F0000
direct allocation
page read and write
9AE000
stack
page read and write
4C70000
trusted library allocation
page read and write
3BFF000
stack
page read and write
43BB000
heap
page read and write
4EA4000
trusted library allocation
page read and write
490000
unkown
page write copy
2B1F000
trusted library allocation
page read and write
4324000
heap
page read and write
B1E000
heap
page read and write
C3D000
trusted library allocation
page execute and read and write
492000
unkown
page read and write
490000
unkown
page read and write
45CF000
heap
page read and write
496E000
direct allocation
page read and write
43A2000
heap
page read and write
433D000
heap
page read and write
93E000
stack
page read and write
3C0E000
heap
page read and write
CEA000
heap
page read and write
B10000
heap
page read and write
40B0000
heap
page read and write
43BA000
heap
page read and write
AD0000
heap
page read and write
4324000
heap
page read and write
2877000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
9AE000
stack
page read and write
4433000
heap
page read and write
43A1000
heap
page read and write
2B19000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
43A0000
heap
page read and write
2955000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
A30000
heap
page read and write
4212000
heap
page read and write
433D000
heap
page read and write
43BA000
heap
page read and write
43BB000
heap
page read and write
43BA000
heap
page read and write
2ADF000
trusted library allocation
page read and write
4324000
heap
page read and write
B5E000
heap
page read and write
293A000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
3965000
trusted library allocation
page read and write
4DE5000
heap
page read and write
100000
heap
page read and write
4A8E000
direct allocation
page read and write
4134000
heap
page read and write
492000
unkown
page read and write
4C78000
trusted library allocation
page read and write
441E000
heap
page read and write
482000
unkown
page readonly
433D000
heap
page read and write
9688FFE000
stack
page read and write
4A1D000
direct allocation
page read and write
4236000
heap
page read and write
2894000
trusted library allocation
page read and write
48FD000
direct allocation
page read and write
48F3000
direct allocation
page read and write
45E0000
heap
page read and write
433D000
heap
page read and write
4AB000
unkown
page readonly
496E000
direct allocation
page read and write
4212000
heap
page read and write
29CB000
trusted library allocation
page read and write
CE5000
heap
page read and write
428F000
heap
page read and write
47D0000
direct allocation
page read and write
4324000
heap
page read and write
27B0000
trusted library allocation
page read and write
4290000
heap
page read and write
48F0000
direct allocation
page read and write
43A1000
heap
page read and write
4FF4000
trusted library allocation
page read and write
5170000
heap
page read and write
4324000
heap
page read and write
3C68000
heap
page read and write
4324000
heap
page read and write
6A3C000
heap
page read and write
441E000
heap
page read and write
4AB000
unkown
page readonly
47D0000
direct allocation
page read and write
2860000
trusted library allocation
page execute and read and write
940000
heap
page read and write
28AE000
trusted library allocation
page read and write
50C0000
heap
page execute and read and write
4212000
heap
page read and write
4212000
heap
page read and write
2B41000
trusted library allocation
page read and write
A36000
trusted library allocation
page execute and read and write
28D0000
trusted library allocation
page read and write
4321000
heap
page read and write
3D20000
direct allocation
page read and write
2F0C000
heap
page read and write
43BA000
heap
page read and write
441E000
heap
page read and write
3E43000
direct allocation
page read and write
B82000
heap
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
428F000
heap
page read and write
3D20000
direct allocation
page read and write
45E3000
heap
page read and write
427E000
heap
page read and write
28C5000
trusted library allocation
page read and write
433D000
heap
page read and write
2962000
trusted library allocation
page read and write
4212000
heap
page read and write
490000
unkown
page write copy
CBE000
heap
page read and write
CFA000
heap
page read and write
4324000
heap
page read and write
48F3000
direct allocation
page read and write
2AE3000
trusted library allocation
page read and write
400000
unkown
page readonly
2ACA000
trusted library allocation
page read and write
43BA000
heap
page read and write
4212000
heap
page read and write
AB8000
heap
page read and write
4324000
heap
page read and write
4A19000
direct allocation
page read and write
4212000
heap
page read and write
9B0000
heap
page read and write
29A6000
trusted library allocation
page read and write
4324000
heap
page read and write
29AC000
trusted library allocation
page read and write
43BA000
heap
page read and write
4C21000
trusted library allocation
page read and write
433D000
heap
page read and write
35EE000
stack
page read and write
2870000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
431D000
heap
page execute and read and write
7BC000
system
page execute and read and write
433D000
heap
page read and write
43A1000
heap
page read and write
2974000
trusted library allocation
page read and write
43BB000
heap
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
433D000
heap
page read and write
29A2000
trusted library allocation
page read and write
43A2000
heap
page read and write
442F000
heap
page read and write
BD8000
heap
page read and write
2AEB000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
4324000
heap
page read and write
3BF0000
direct allocation
page read and write
441E000
heap
page read and write
3CD1000
heap
page read and write
4430000
heap
page read and write
27D1000
trusted library allocation
page read and write
5040000
heap
page read and write
433D000
heap
page read and write
4CB0000
trusted library allocation
page read and write
4390000
heap
page read and write
432C000
heap
page read and write
4290000
heap
page read and write
100000
heap
page read and write
4448000
heap
page execute and read and write
4290000
heap
page read and write
48FD000
direct allocation
page read and write
4212000
heap
page read and write
441E000
heap
page read and write
65A000
stack
page read and write
43A1000
heap
page read and write
441E000
heap
page read and write
93E000
stack
page read and write
E80000
heap
page read and write
5175000
heap
page read and write
3C90000
direct allocation
page read and write
2B1D000
trusted library allocation
page read and write
4290000
heap
page read and write
9D0000
heap
page read and write
482000
unkown
page readonly
4290000
heap
page read and write
416E000
heap
page read and write
4212000
heap
page read and write
9C4000
heap
page read and write
4290000
heap
page read and write
A60000
trusted library allocation
page read and write
C03000
heap
page read and write
2934000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
4E20000
trusted library section
page readonly
4290000
heap
page read and write
433D000
heap
page read and write
6C6E000
stack
page read and write
4C31000
trusted library allocation
page read and write
423C000
heap
page read and write
4DD0000
trusted library allocation
page read and write
1F594690000
heap
page read and write
2B13000
trusted library allocation
page read and write
45CC000
heap
page read and write
3BCB000
direct allocation
page read and write
400000
unkown
page readonly
DBE000
stack
page read and write
43BA000
heap
page read and write
3CF0000
direct allocation
page read and write
43BA000
heap
page read and write
3C13000
heap
page read and write
433D000
heap
page read and write
30B5000
heap
page read and write
2B55000
trusted library allocation
page read and write
5072000
heap
page read and write
4324000
heap
page read and write
3C90000
direct allocation
page read and write
40A8000
heap
page read and write
441E000
heap
page read and write
43BB000
heap
page read and write
8AF000
stack
page read and write
4290000
heap
page read and write
4234000
heap
page read and write
4212000
heap
page read and write
2B32000
trusted library allocation
page read and write
4A9D000
direct allocation
page read and write
5280000
heap
page read and write
170E000
stack
page read and write
28F0000
trusted library allocation
page read and write
4127000
heap
page read and write
3C6B000
heap
page read and write
40E9000
heap
page read and write
13CE000
stack
page read and write
28C2000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
960000
heap
page read and write
4C1B000
trusted library allocation
page read and write
3C6F000
heap
page read and write
43BB000
heap
page read and write
4324000
heap
page read and write
2B09000
trusted library allocation
page read and write
4C17000
trusted library allocation
page read and write
4A19000
direct allocation
page read and write
BD0000
heap
page read and write
295B000
trusted library allocation
page read and write
4A19000
direct allocation
page read and write
3E43000
direct allocation
page read and write
4E50000
heap
page read and write
5870000
heap
page read and write
43A8000
heap
page read and write
4228000
heap
page read and write
C92000
heap
page read and write
4290000
heap
page read and write
C10000
trusted library allocation
page read and write
9CE000
stack
page read and write
43A2000
heap
page read and write
B8F000
heap
page read and write
1F5946D0000
heap
page read and write
3DB3000
direct allocation
page read and write
4290000
heap
page read and write
1F5946D7000
heap
page read and write
2AC6000
trusted library allocation
page read and write
96E000
stack
page read and write
4290000
heap
page read and write
B5C000
heap
page read and write
291F000
trusted library allocation
page read and write
274B000
stack
page read and write
4C54000
trusted library allocation
page read and write
1F59465E000
heap
page read and write
C78000
heap
page read and write
507A000
heap
page read and write
490000
unkown
page write copy
4290000
heap
page read and write
C2D000
trusted library allocation
page execute and read and write
70AE000
stack
page read and write
4A7000
unkown
page read and write
44A0000
heap
page read and write
4290000
heap
page read and write
2AE5000
trusted library allocation
page read and write
48F9000
direct allocation
page read and write
4304000
heap
page read and write
4290000
heap
page read and write
400000
unkown
page readonly
4EC3000
heap
page read and write
E3F000
stack
page read and write
4371000
heap
page execute and read and write
9688CFE000
stack
page read and write
4324000
heap
page read and write
2951000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
CDC000
heap
page read and write
3D85000
direct allocation
page read and write
5380000
heap
page read and write
2750000
heap
page read and write
4A1D000
direct allocation
page read and write
4324000
heap
page read and write
441E000
heap
page read and write
2919000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
433D000
heap
page read and write
433D000
heap
page read and write
4324000
heap
page read and write
4A8E000
direct allocation
page read and write
4290000
heap
page read and write
4290000
heap
page read and write
440D000
heap
page read and write
4A8E000
direct allocation
page read and write
3CB6000
heap
page read and write
3C6B000
direct allocation
page read and write
401000
unkown
page execute read
496E000
direct allocation
page read and write
9A000
stack
page read and write
4C60000
trusted library allocation
page read and write
4B0E000
direct allocation
page read and write
E87000
heap
page read and write
2A07000
trusted library allocation
page read and write
4324000
heap
page read and write
2A8B000
trusted library allocation
page read and write
9E0000
heap
page read and write
441E000
heap
page read and write
2942000
trusted library allocation
page read and write
4AB000
unkown
page readonly
2B1B000
trusted library allocation
page read and write
441E000
heap
page read and write
441E000
heap
page read and write
441E000
heap
page read and write
298B000
trusted library allocation
page read and write
2A3D000
trusted library allocation
page read and write
285F000
stack
page read and write
4970000
direct allocation
page read and write
4212000
heap
page read and write
E63000
heap
page read and write
3EB0000
heap
page read and write
4212000
heap
page read and write
940000
heap
page read and write
43A2000
heap
page read and write
441E000
heap
page read and write
E60000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
47D0000
direct allocation
page read and write
4324000
heap
page read and write
4290000
heap
page read and write
2B17000
trusted library allocation
page read and write
52B4000
heap
page read and write
41C0000
heap
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
4212000
heap
page read and write
433D000
heap
page read and write
2957000
trusted library allocation
page read and write
FE0000
heap
page read and write
4212000
heap
page read and write
4212000
heap
page read and write
2620000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
433D000
heap
page read and write
4E30000
heap
page read and write
43BA000
heap
page read and write
C48000
heap
page read and write
2989000
trusted library allocation
page read and write
B70000
heap
page read and write
441E000
heap
page read and write
FE7000
heap
page read and write
41ED000
heap
page read and write
4290000
heap
page read and write
4212000
heap
page read and write
D17000
heap
page read and write
42F3000
heap
page read and write
3DB3000
direct allocation
page read and write
43BA000
heap
page read and write
8AF000
stack
page read and write
9A000
stack
page read and write
4290000
heap
page read and write
4324000
heap
page read and write
4290000
heap
page read and write
9E0000
heap
page read and write
2991000
trusted library allocation
page read and write
43BB000
heap
page read and write
441E000
heap
page read and write
E70000
trusted library allocation
page execute and read and write
4324000
heap
page read and write
3C08000
heap
page read and write
4A99000
direct allocation
page read and write
A90000
heap
page read and write
47D0000
direct allocation
page read and write
43A1000
heap
page read and write
3DB3000
direct allocation
page read and write
428D000
heap
page read and write
4290000
heap
page read and write
4324000
heap
page read and write
964000
heap
page read and write
4324000
heap
page read and write
4A8E000
direct allocation
page read and write
43A1000
heap
page read and write
2961000
trusted library allocation
page read and write
433D000
heap
page read and write
A32000
trusted library allocation
page read and write
4231000
heap
page read and write
4212000
heap
page read and write
43BA000
heap
page read and write
4C80000
trusted library allocation
page read and write
4290000
heap
page read and write
47D0000
direct allocation
page read and write
3CB6000
heap
page read and write
2AE1000
trusted library allocation
page read and write
4212000
heap
page read and write
4A19000
direct allocation
page read and write
4418000
heap
page read and write
940000
heap
page read and write
2AF2000
trusted library allocation
page read and write
AB0000
heap
page read and write
272F000
stack
page read and write
A3A000
trusted library allocation
page execute and read and write
2A07000
trusted library allocation
page read and write
2959000
trusted library allocation
page read and write
43A1000
heap
page read and write
29AE000
trusted library allocation
page read and write
4CF0000
heap
page read and write
4290000
heap
page read and write
43A1000
heap
page read and write
433D000
heap
page read and write
298D000
trusted library allocation
page read and write
9688EFD000
stack
page read and write
433D000
heap
page read and write
1F594707000
heap
page read and write
441E000
heap
page read and write
433D000
heap
page read and write
4290000
heap
page read and write
4290000
heap
page read and write
433D000
heap
page read and write
4212000
heap
page read and write
2B04000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
A90000
heap
page read and write
4290000
heap
page read and write
37D1000
trusted library allocation
page read and write
5880000
heap
page read and write
433D000
heap
page read and write
43BA000
heap
page read and write
A10000
trusted library allocation
page read and write
3B60000
direct allocation
page read and write
4324000
heap
page read and write
28BD000
trusted library allocation
page read and write
4A8E000
direct allocation
page read and write
441E000
heap
page read and write
A1D000
trusted library allocation
page execute and read and write
4212000
heap
page read and write
4290000
heap
page read and write
4C10000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
4245000
heap
page read and write
A47000
trusted library allocation
page execute and read and write
35EE000
stack
page read and write
441E000
heap
page read and write
441E000
heap
page read and write
43A9000
heap
page read and write
4212000
heap
page read and write
4A1D000
direct allocation
page read and write
43BB000
heap
page read and write
2E1E000
stack
page read and write
291B000
trusted library allocation
page read and write
433D000
heap
page read and write
29C5000
trusted library allocation
page read and write
C00000
heap
page read and write
4212000
heap
page read and write
2AB1000
trusted library allocation
page read and write
1F594650000
heap
page read and write
4212000
heap
page read and write
4A9D000
direct allocation
page read and write
400000
unkown
page readonly
4C27000
trusted library allocation
page read and write
39EF000
stack
page read and write
42D6000
heap
page read and write
4FF0000
trusted library allocation
page read and write
43A1000
heap
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
CBC000
heap
page read and write
B4A000
heap
page read and write
4A8000
unkown
page read and write
A2E000
stack
page read and write
4212000
heap
page read and write
4C2E000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
441E000
heap
page read and write
43A2000
heap
page read and write
4212000
heap
page read and write
527D000
stack
page read and write
4290000
heap
page read and write
855F000
stack
page read and write
2B23000
trusted library allocation
page read and write
4212000
heap
page read and write
4212000
heap
page read and write
28E0000
trusted library allocation
page read and write
433D000
heap
page read and write
43A0000
heap
page read and write
4A7000
unkown
page read and write
441E000
heap
page read and write
96885CA000
stack
page read and write
4A1D000
direct allocation
page read and write
482000
unkown
page readonly
C04000
heap
page read and write
29BD000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
5C9000
stack
page read and write
43A0000
heap
page read and write
433D000
heap
page read and write
4324000
heap
page read and write
439E000
heap
page read and write
433D000
heap
page read and write
4EB0000
trusted library allocation
page execute and read and write
43A1000
heap
page read and write
296D000
trusted library allocation
page read and write
A6D000
heap
page read and write
411C000
heap
page read and write
43A1000
heap
page read and write
401000
unkown
page execute read
3B66000
heap
page read and write
441E000
heap
page read and write
4324000
heap
page read and write
28AD000
trusted library allocation
page read and write
6EEF000
stack
page read and write
43B8000
heap
page read and write
2AB3000
trusted library allocation
page read and write
441E000
heap
page read and write
43BB000
heap
page read and write
491000
unkown
page write copy
37FE000
stack
page read and write
3C06000
heap
page read and write
43A1000
heap
page read and write
93E000
stack
page read and write
293C000
trusted library allocation
page read and write
3D13000
direct allocation
page read and write
4290000
heap
page read and write
1E0000
heap
page read and write
4212000
heap
page read and write
441E000
heap
page read and write
A25000
heap
page read and write
43A2000
heap
page read and write
296B000
trusted library allocation
page read and write
2983000
trusted library allocation
page read and write
1F594735000
heap
page read and write
2976000
trusted library allocation
page read and write
8FE000
stack
page read and write
43A2000
heap
page read and write
4324000
heap
page read and write
43A1000
heap
page read and write
B1A000
heap
page read and write
CAF000
heap
page read and write
3D1B000
heap
page read and write
4212000
heap
page read and write
433D000
heap
page read and write
4351000
heap
page read and write
43BB000
heap
page read and write
BDF000
stack
page read and write
43BB000
heap
page read and write
43BB000
heap
page read and write
B7B000
heap
page read and write
4C6F000
trusted library allocation
page read and write
C6A000
heap
page read and write
441E000
heap
page read and write
43BA000
heap
page read and write
9E0000
heap
page read and write
441E000
heap
page read and write
A4E000
stack
page read and write
47D0000
direct allocation
page read and write
130F000
stack
page read and write
43BB000
heap
page read and write
3C03000
heap
page read and write
2880000
trusted library allocation
page read and write
1F5946FC000
heap
page read and write
441E000
heap
page read and write
100000
heap
page read and write
4308000
heap
page read and write
43BB000
heap
page read and write
8F7000
stack
page read and write
43A0000
heap
page read and write
D03000
heap
page read and write
2AD0000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
B67000
heap
page read and write
4212000
heap
page read and write
A35000
heap
page read and write
4290000
heap
page read and write
4375000
heap
page read and write
433D000
heap
page read and write
2AAD000
trusted library allocation
page read and write
B1F000
heap
page read and write
48FD000
direct allocation
page read and write
441E000
heap
page read and write
47D0000
direct allocation
page read and write
2930000
trusted library allocation
page read and write
433D000
heap
page read and write
5290000
heap
page read and write
2AD2000
trusted library allocation
page read and write
28A2000
trusted library allocation
page read and write
4AB000
unkown
page readonly
43A0000
heap
page read and write
845E000
stack
page read and write
8B4000
stack
page read and write
4324000
heap
page read and write
A4B000
trusted library allocation
page execute and read and write
43BB000
heap
page read and write
586E000
stack
page read and write
4C24000
trusted library allocation
page read and write
4324000
heap
page read and write
4324000
heap
page read and write
A14000
trusted library allocation
page read and write
B54000
heap
page read and write
980000
heap
page read and write
4290000
heap
page read and write
4B0E000
direct allocation
page read and write
490000
unkown
page read and write
C40000
heap
page read and write
2979000
trusted library allocation
page read and write
441E000
heap
page read and write
A3A000
heap
page read and write
FD0000
trusted library allocation
page read and write
48F0000
direct allocation
page read and write
4290000
heap
page read and write
2940000
trusted library allocation
page execute and read and write
96890FF000
stack
page read and write
4473000
heap
page read and write
6A44000
heap
page read and write
5000000
trusted library allocation
page execute and read and write
441E000
heap
page read and write
30B0000
heap
page read and write
4324000
heap
page read and write
4C14000
trusted library allocation
page read and write
C23000
trusted library allocation
page execute and read and write
4A19000
direct allocation
page read and write
9B0000
heap
page read and write
6A72000
heap
page read and write
400000
unkown
page readonly
48F9000
direct allocation
page read and write
AD5000
heap
page read and write
289B000
trusted library allocation
page read and write
4A8E000
direct allocation
page read and write
4212000
heap
page read and write
43A1000
heap
page read and write
2915000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
441E000
heap
page read and write
9AE000
stack
page read and write
43A1000
heap
page read and write
4290000
heap
page read and write
C20000
trusted library allocation
page read and write
444C000
heap
page read and write
2AB5000
trusted library allocation
page read and write
4290000
heap
page read and write
2B51000
trusted library allocation
page read and write
4212000
heap
page read and write
4212000
heap
page read and write
4E8B000
stack
page read and write
2AAF000
trusted library allocation
page read and write
4324000
heap
page read and write
CFD000
heap
page read and write
27F9000
trusted library allocation
page read and write
4324000
heap
page read and write
28B1000
trusted library allocation
page read and write
441E000
heap
page read and write
4290000
heap
page read and write
433D000
heap
page read and write
4E3B000
stack
page read and write
2EA0000
heap
page read and write
43BA000
heap
page read and write
4DE0000
heap
page read and write
1E0000
heap
page read and write
3D13000
direct allocation
page read and write
30A0000
heap
page read and write
401000
unkown
page execute read
441C000
heap
page read and write
3B63000
heap
page read and write
70EE000
stack
page read and write
42E1000
heap
page read and write
43BB000
heap
page read and write
29C1000
trusted library allocation
page read and write
96889FE000
stack
page read and write
401F000
heap
page read and write
3BF0000
direct allocation
page read and write
6B6E000
stack
page read and write
433D000
heap
page read and write
1750000
heap
page read and write
441E000
heap
page read and write
43BA000
heap
page read and write
A0E000
stack
page read and write
B26000
heap
page read and write
433D000
heap
page read and write
3DDD000
heap
page read and write
4290000
heap
page read and write
4290000
heap
page read and write
CC8000
heap
page read and write
43BB000
heap
page read and write
2945000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
43A1000
heap
page read and write
43A1000
heap
page read and write
43A1000
heap
page read and write
4305000
heap
page read and write
4C37000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
433D000
heap
page read and write
401000
unkown
page execute read
4114000
heap
page read and write
2B34000
trusted library allocation
page read and write
4290000
heap
page read and write
43A0000
heap
page read and write
402000
system
page execute and read and write
3FE0000
heap
page read and write
2750000
heap
page execute and read and write
412B000
heap
page read and write
4DD0000
trusted library allocation
page read and write
43BB000
heap
page read and write
A95000
heap
page read and write
441E000
heap
page read and write
43BB000
heap
page read and write
4203000
heap
page read and write
4290000
heap
page read and write
5030000
heap
page read and write
AE6000
heap
page read and write
A30000
trusted library allocation
page read and write
29CF000
trusted library allocation
page read and write
433D000
heap
page read and write
43A2000
heap
page read and write
2AD5000
trusted library allocation
page read and write
4281000
heap
page read and write
43A2000
heap
page read and write
29C7000
trusted library allocation
page read and write
A8D000
stack
page read and write
4C56000
trusted library allocation
page read and write
D33000
heap
page read and write
491000
unkown
page write copy
3D13000
direct allocation
page read and write
8B4000
stack
page read and write
441E000
heap
page read and write
2B06000
trusted library allocation
page read and write
ACE000
heap
page read and write
4287000
heap
page read and write
1660000
heap
page read and write
43BA000
heap
page read and write
482000
unkown
page readonly
2950000
heap
page execute and read and write
4324000
heap
page read and write
428F000
heap
page read and write
4212000
heap
page read and write
850000
heap
page read and write
8FE000
stack
page read and write
492000
unkown
page read and write
2AE9000
trusted library allocation
page read and write
8B4000
stack
page read and write
2987000
trusted library allocation
page read and write
4A19000
direct allocation
page read and write
4212000
heap
page read and write
298F000
trusted library allocation
page read and write
4AB000
unkown
page readonly
490000
unkown
page read and write
3EE0000
heap
page read and write
5070000
trusted library allocation
page read and write
433D000
heap
page read and write
4D00000
trusted library allocation
page read and write
4290000
heap
page read and write
6A40000
heap
page read and write
43BA000
heap
page read and write
433D000
heap
page read and write
1650000
heap
page read and write
2B3C000
trusted library allocation
page read and write
A42000
trusted library allocation
page read and write
757000
stack
page read and write
C03000
heap
page read and write
A13000
trusted library allocation
page execute and read and write
44B7000
heap
page read and write
B76000
heap
page read and write
8FE000
stack
page read and write
433D000
heap
page read and write
491000
unkown
page write copy
2AAB000
trusted library allocation
page read and write
2607000
trusted library allocation
page execute and read and write
43BA000
heap
page read and write
441E000
heap
page read and write
4290000
heap
page read and write
2600000
trusted library allocation
page read and write
4324000
heap
page read and write
4254000
heap
page read and write
96891FC000
stack
page read and write
9B4000
heap
page read and write
3E43000
direct allocation
page read and write
42DC000
heap
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
4E40000
heap
page read and write
4212000
heap
page read and write
43A1000
heap
page read and write
4E60000
heap
page execute and read and write
441E000
heap
page read and write
4209000
heap
page read and write
3FC0000
heap
page read and write
43BA000
heap
page read and write
4AB000
unkown
page readonly
3C90000
direct allocation
page read and write
42E000
system
page execute and read and write
2AC8000
trusted library allocation
page read and write
2EA5000
heap
page read and write
2972000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
4C75000
trusted library allocation
page read and write
8AF000
stack
page read and write
2938000
trusted library allocation
page read and write
122E000
stack
page read and write
41E0000
heap
page read and write
427D000
heap
page read and write
CB0000
heap
page read and write
43BB000
heap
page read and write
43BA000
heap
page read and write
AB0000
heap
page read and write
6DEE000
stack
page read and write
42A3000
heap
page read and write
2953000
trusted library allocation
page read and write
433D000
heap
page read and write
1F594660000
heap
page read and write
48CD000
stack
page read and write
2AA5000
trusted library allocation
page read and write
9C0000
heap
page read and write
433D000
heap
page read and write
4212000
heap
page read and write
4B0E000
direct allocation
page read and write
441E000
heap
page read and write
43BA000
heap
page read and write
4375000
heap
page read and write
43BB000
heap
page read and write
1F594620000
heap
page read and write
4324000
heap
page read and write
B51000
heap
page read and write
29BF000
trusted library allocation
page read and write
43BA000
heap
page read and write
6CAE000
stack
page read and write
433D000
heap
page read and write
4290000
heap
page read and write
433D000
heap
page read and write
CF4000
heap
page read and write
3C60000
direct allocation
page read and write
433D000
heap
page read and write
4A99000
direct allocation
page read and write
37D5000
trusted library allocation
page read and write
440F000
heap
page read and write
433D000
heap
page read and write
FD2000
trusted library allocation
page read and write
4324000
heap
page read and write
283A000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
4290000
heap
page read and write
48FD000
direct allocation
page read and write
BFA000
heap
page read and write
4A1D000
direct allocation
page read and write
4324000
heap
page read and write
3D20000
direct allocation
page read and write
4324000
heap
page read and write
B8A000
heap
page read and write
AAE000
stack
page read and write
48F0000
direct allocation
page read and write
A3E000
heap
page read and write
4212000
heap
page read and write
400000
unkown
page readonly
48F3000
direct allocation
page read and write
930000
heap
page read and write
441E000
heap
page read and write
4DB0000
trusted library allocation
page execute and read and write
4290000
heap
page read and write
48F0000
direct allocation
page read and write
29D3000
trusted library allocation
page read and write
4290000
heap
page read and write
43BA000
heap
page read and write
433D000
heap
page read and write
43BB000
heap
page read and write
39FC000
heap
page read and write
43A0000
heap
page read and write
4E4F000
trusted library section
page readonly
4212000
heap
page read and write
441E000
heap
page read and write
39F0000
heap
page read and write
4324000
heap
page read and write
2993000
trusted library allocation
page read and write
3961000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
4C42000
trusted library allocation
page read and write
433D000
heap
page read and write
4212000
heap
page read and write
4324000
heap
page read and write
433D000
heap
page read and write
B4F000
heap
page read and write
4E90000
heap
page read and write
4C50000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
1E0000
heap
page read and write
44BC000
heap
page read and write
28FB000
trusted library allocation
page read and write
4FE0000
heap
page read and write
4290000
heap
page read and write
4EC0000
heap
page read and write
96888FE000
stack
page read and write
28B6000
trusted library allocation
page read and write
4324000
heap
page read and write
4073000
heap
page read and write
43BB000
heap
page read and write
4290000
heap
page read and write
4212000
heap
page read and write
433D000
heap
page read and write
4212000
heap
page read and write
496E000
direct allocation
page read and write
43BA000
heap
page read and write
A30000
heap
page read and write
1F594610000
heap
page read and write
41D1000
heap
page read and write
28CB000
trusted library allocation
page read and write
4212000
heap
page read and write
2B36000
trusted library allocation
page read and write
A30000
heap
page read and write
4212000
heap
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
3D13000
direct allocation
page read and write
3AFA000
heap
page read and write
43A1000
heap
page read and write
CD2000
heap
page read and write
C5E000
heap
page read and write
441E000
heap
page read and write
6DAE000
stack
page read and write
4212000
heap
page read and write
5020000
heap
page read and write
17CF000
stack
page read and write
2B3E000
trusted library allocation
page read and write
43BA000
heap
page read and write
401000
unkown
page execute read
48F9000
direct allocation
page read and write
43BB000
heap
page read and write
260B000
trusted library allocation
page execute and read and write
4970000
direct allocation
page read and write
43BB000
heap
page read and write
43A0000
heap
page read and write
266E000
stack
page read and write
7032000
trusted library allocation
page read and write
4290000
heap
page read and write
411E000
heap
page read and write
2B02000
trusted library allocation
page read and write
162F000
stack
page read and write
441E000
heap
page read and write
4212000
heap
page read and write
401000
unkown
page execute read
2602000
trusted library allocation
page read and write
433D000
heap
page read and write
441E000
heap
page read and write
2925000
trusted library allocation
page read and write
BF7000
heap
page read and write
441E000
heap
page read and write
5050000
heap
page read and write
4DE0000
trusted library allocation
page execute and read and write
43A1000
heap
page read and write
985000
heap
page read and write
428F000
heap
page read and write
43BA000
heap
page read and write
4276000
heap
page read and write
2730000
heap
page read and write
9688BFE000
stack
page read and write
4324000
heap
page read and write
294F000
trusted library allocation
page read and write
441E000
heap
page read and write
1630000
heap
page read and write
43BB000
heap
page read and write
2E30000
heap
page read and write
279B000
stack
page read and write
51BE000
stack
page read and write
4C1E000
trusted library allocation
page read and write
A20000
heap
page read and write
9A000
stack
page read and write
There are 1049 hidden memdumps, click here to show them.