IOC Report
Fedex Express Invoice 09004106.exe

loading gif

Files

File Path
Type
Category
Malicious
Fedex Express Invoice 09004106.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\electicism
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
"C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
204.10.160.224:27667
malicious
http://www.w3.
unknown
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
ABA000
heap
page read and write
42E000
system
page execute and read and write
41D8000
heap
page read and write
1480000
heap
page read and write
5110000
trusted library allocation
page read and write
4255000
heap
page read and write
42AC000
heap
page read and write
5C20000
heap
page read and write
43C0000
heap
page read and write
42AC000
heap
page read and write
2DC1000
trusted library allocation
page read and write
42D2000
heap
page read and write
3375000
trusted library allocation
page read and write
47E9000
direct allocation
page read and write
3EFE6FF000
stack
page read and write
4720000
direct allocation
page read and write
164D000
trusted library allocation
page execute and read and write
5360000
heap
page execute and read and write
429C000
heap
page read and write
3F30000
heap
page read and write
4733000
direct allocation
page read and write
42D0000
heap
page read and write
2E2B000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
2C40000
heap
page read and write
16B7000
heap
page read and write
CD8000
heap
page read and write
41D8000
heap
page read and write
8F9000
stack
page read and write
42AC000
heap
page read and write
41D8000
heap
page read and write
4256000
heap
page read and write
3EFECFF000
stack
page read and write
41D8000
heap
page read and write
4373000
heap
page read and write
2922000
trusted library allocation
page read and write
5750000
heap
page read and write
3200000
trusted library allocation
page read and write
4230000
heap
page read and write
2BED000
trusted library allocation
page read and write
41D8000
heap
page read and write
8AFE000
stack
page read and write
2DD8000
trusted library allocation
page read and write
4467000
heap
page read and write
4632000
heap
page read and write
4383000
heap
page execute and read and write
AEB000
heap
page read and write
A9E000
heap
page read and write
4256000
heap
page read and write
33A7000
trusted library allocation
page read and write
4230000
heap
page read and write
43EF000
heap
page read and write
3EFEAFF000
stack
page read and write
42AD000
heap
page read and write
41D8000
heap
page read and write
41D8000
heap
page read and write
485E000
direct allocation
page read and write
43EF000
heap
page read and write
4245000
heap
page read and write
4255000
heap
page read and write
43F0000
heap
page read and write
3373000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
2F20000
heap
page read and write
4230000
heap
page read and write
58D4000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
D52000
heap
page read and write
4373000
heap
page read and write
D89000
heap
page read and write
4256000
heap
page read and write
42D2000
heap
page read and write
22F9F095000
heap
page read and write
3390000
trusted library allocation
page read and write
4255000
heap
page read and write
4225000
heap
page read and write
2E2F000
trusted library allocation
page read and write
4230000
heap
page read and write
490000
unkown
page read and write
41D8000
heap
page read and write
950000
heap
page read and write
42AC000
heap
page read and write
2E73000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
5740000
heap
page read and write
4373000
heap
page read and write
437F000
heap
page read and write
4373000
heap
page read and write
42B2000
heap
page read and write
22F9EFB0000
heap
page read and write
2E19000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
4643000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
41AE000
heap
page read and write
D3E000
heap
page read and write
41D8000
heap
page read and write
4255000
heap
page read and write
42D2000
heap
page read and write
33FA000
trusted library allocation
page read and write
4849000
direct allocation
page read and write
4106000
heap
page read and write
16AF000
stack
page read and write
42D2000
heap
page read and write
33A5000
trusted library allocation
page read and write
4879000
direct allocation
page read and write
12C5000
heap
page read and write
3417000
trusted library allocation
page read and write
42AD000
heap
page read and write
4230000
heap
page read and write
CAE000
stack
page read and write
4373000
heap
page read and write
54E5000
heap
page read and write
A90000
heap
page read and write
12EC000
heap
page read and write
4610000
direct allocation
page read and write
2E6F000
trusted library allocation
page read and write
2926000
trusted library allocation
page execute and read and write
41D8000
heap
page read and write
12CA000
heap
page read and write
2BF2000
trusted library allocation
page read and write
47B0000
direct allocation
page read and write
2E0F000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
431F000
heap
page read and write
39DE000
heap
page read and write
A80000
heap
page read and write
42D2000
heap
page read and write
46FD000
heap
page read and write
AB0000
heap
page read and write
42A3000
heap
page read and write
2E4A000
trusted library allocation
page read and write
41D8000
heap
page read and write
AC9000
heap
page read and write
1662000
trusted library allocation
page read and write
126D000
heap
page read and write
42D2000
heap
page read and write
100000
heap
page read and write
41D8000
heap
page read and write
2D61000
trusted library allocation
page read and write
138E000
stack
page read and write
384B000
heap
page read and write
43EF000
heap
page read and write
32FD000
trusted library allocation
page read and write
4373000
heap
page read and write
41D8000
heap
page read and write
491000
unkown
page write copy
2DE2000
trusted library allocation
page read and write
D62000
heap
page read and write
1D5000
heap
page read and write
33C9000
trusted library allocation
page read and write
4230000
heap
page read and write
3EA2000
heap
page read and write
3EA0000
direct allocation
page read and write
42AC000
heap
page read and write
9A000
stack
page read and write
4373000
heap
page read and write
491000
unkown
page write copy
2E27000
trusted library allocation
page read and write
4230000
heap
page read and write
33E1000
trusted library allocation
page read and write
46D3000
direct allocation
page read and write
2E50000
trusted library allocation
page read and write
FD7000
stack
page read and write
7CC4000
heap
page read and write
3E90000
heap
page read and write
A90000
heap
page read and write
41D8000
heap
page read and write
484D000
direct allocation
page read and write
370E000
stack
page read and write
5474000
trusted library allocation
page read and write
427D000
heap
page read and write
58E0000
trusted library allocation
page execute and read and write
4230000
heap
page read and write
3C65000
heap
page read and write
4373000
heap
page read and write
2E6D000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
2E0D000
trusted library allocation
page read and write
42AC000
heap
page read and write
4373000
heap
page read and write
2C10000
trusted library allocation
page read and write
42D2000
heap
page read and write
A47000
heap
page read and write
4373000
heap
page read and write
33F6000
trusted library allocation
page read and write
3DEF000
stack
page read and write
2D17000
trusted library allocation
page read and write
42AD000
heap
page read and write
43EF000
heap
page read and write
4255000
heap
page read and write
35CE000
stack
page read and write
2E12000
trusted library allocation
page read and write
410F000
heap
page read and write
3CBE000
heap
page read and write
4230000
heap
page read and write
22F9F3B5000
heap
page read and write
42AC000
heap
page read and write
A9A000
heap
page read and write
293B000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
2DC5000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
4255000
heap
page read and write
4230000
heap
page read and write
FBF000
stack
page read and write
42D2000
heap
page read and write
4373000
heap
page read and write
41D8000
heap
page read and write
7CCC000
heap
page read and write
41D8000
heap
page read and write
4373000
heap
page read and write
4256000
heap
page read and write
100000
heap
page read and write
5330000
trusted library section
page readonly
4230000
heap
page read and write
4230000
heap
page read and write
45B0000
direct allocation
page read and write
485E000
direct allocation
page read and write
336D000
trusted library allocation
page read and write
291D000
trusted library allocation
page execute and read and write
8B4000
stack
page read and write
33A9000
trusted library allocation
page read and write
4230000
heap
page read and write
2950000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
15DE000
stack
page read and write
4256000
heap
page read and write
4230000
heap
page read and write
4733000
direct allocation
page read and write
4777000
heap
page read and write
4230000
heap
page read and write
4849000
direct allocation
page read and write
42AC000
heap
page read and write
3EFE8FD000
stack
page read and write
33DF000
trusted library allocation
page read and write
42AE000
heap
page read and write
950000
heap
page read and write
3EFEBFB000
stack
page read and write
CE5000
heap
page read and write
12C7000
heap
page read and write
41D8000
heap
page read and write
4256000
heap
page read and write
4146000
heap
page read and write
43EF000
heap
page read and write
45B0000
direct allocation
page read and write
4373000
heap
page read and write
4373000
heap
page read and write
4230000
heap
page read and write
42AC000
heap
page read and write
4254000
heap
page read and write
4230000
heap
page read and write
3C71000
trusted library allocation
page read and write
437B000
heap
page read and write
482000
unkown
page readonly
1600000
heap
page read and write
D85000
heap
page read and write
4373000
heap
page read and write
2E7B000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
42AC000
heap
page read and write
128F000
stack
page read and write
2E2D000
trusted library allocation
page read and write
3A6F000
stack
page read and write
33E3000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
41D8000
heap
page read and write
42AC000
heap
page read and write
4255000
heap
page read and write
41D8000
heap
page read and write
290D000
trusted library allocation
page execute and read and write
4879000
direct allocation
page read and write
42AC000
heap
page read and write
494E000
direct allocation
page read and write
41E9000
heap
page read and write
4373000
heap
page read and write
42DE000
heap
page read and write
2DDA000
trusted library allocation
page read and write
4373000
heap
page read and write
41D8000
heap
page read and write
4230000
heap
page read and write
3411000
trusted library allocation
page read and write
9D0000
heap
page read and write
1652000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
4230000
heap
page read and write
43EF000
heap
page read and write
4799000
heap
page read and write
42AC000
heap
page read and write
2BB0000
trusted library allocation
page read and write
42AE000
heap
page read and write
46A3000
direct allocation
page read and write
4750000
direct allocation
page read and write
4238000
heap
page read and write
41D8000
heap
page read and write
4254000
heap
page read and write
33C6000
trusted library allocation
page read and write
44F0000
direct allocation
page read and write
8FE000
stack
page read and write
9B1000
heap
page read and write
4230000
heap
page read and write
DE5000
heap
page read and write
4630000
direct allocation
page read and write
1325000
heap
page read and write
93E000
stack
page read and write
2F24000
heap
page read and write
42D2000
heap
page read and write
42AC000
heap
page read and write
58D0000
trusted library allocation
page read and write
4AB000
unkown
page readonly
41C2000
heap
page read and write
161E000
stack
page read and write
4230000
heap
page read and write
4090000
heap
page read and write
2BC4000
heap
page read and write
4254000
heap
page read and write
4230000
heap
page read and write
AEB000
heap
page read and write
4255000
heap
page read and write
492000
unkown
page read and write
1260000
heap
page read and write
340F000
trusted library allocation
page read and write
42D2000
heap
page read and write
4230000
heap
page read and write
B1C000
heap
page read and write
45C8000
heap
page read and write
4255000
heap
page read and write
1640000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
43EF000
heap
page read and write
22F9F0D0000
heap
page read and write
3EFE9FE000
stack
page read and write
42AC000
heap
page read and write
ED9000
stack
page read and write
42D2000
heap
page read and write
33D9000
trusted library allocation
page read and write
32F2000
trusted library allocation
page read and write
4225000
trusted library allocation
page read and write
1590000
heap
page read and write
7CF2000
heap
page read and write
3B79000
heap
page read and write
4254000
heap
page read and write
CF9000
heap
page read and write
484D000
direct allocation
page read and write
400000
unkown
page readonly
1680000
trusted library allocation
page read and write
2903000
trusted library allocation
page execute and read and write
2DD4000
trusted library allocation
page read and write
15E000
stack
page read and write
4520000
direct allocation
page read and write
4255000
heap
page read and write
42AC000
heap
page read and write
22F9F3BE000
heap
page read and write
42AC000
heap
page read and write
42D2000
heap
page read and write
1684000
heap
page read and write
4230000
heap
page read and write
8FE000
stack
page read and write
48DD000
direct allocation
page read and write
43EF000
heap
page read and write
74CE000
stack
page read and write
1650000
trusted library allocation
page read and write
4254000
heap
page read and write
482000
unkown
page readonly
43F0000
heap
page read and write
42AC000
heap
page read and write
2E6B000
trusted library allocation
page read and write
41D8000
heap
page read and write
3B46000
heap
page read and write
4AB000
unkown
page readonly
5C10000
heap
page read and write
D3A000
heap
page read and write
4373000
heap
page read and write
4373000
heap
page read and write
334B000
trusted library allocation
page read and write
4373000
heap
page read and write
336B000
trusted library allocation
page read and write
3EFDFFA000
stack
page read and write
1630000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
5C2E000
heap
page read and write
2E31000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
4AB000
unkown
page readonly
3060000
trusted library allocation
page read and write
42AE000
heap
page read and write
4319000
heap
page read and write
4A7000
unkown
page read and write
4230000
heap
page read and write
48BE000
direct allocation
page read and write
43F1000
heap
page read and write
2C04000
trusted library allocation
page read and write
43EF000
heap
page read and write
3386000
trusted library allocation
page read and write
3EFE5FF000
stack
page read and write
2904000
trusted library allocation
page read and write
43EF000
heap
page read and write
2DF7000
trusted library allocation
page read and write
42D2000
heap
page read and write
43EF000
heap
page read and write
2E23000
trusted library allocation
page read and write
42D2000
heap
page read and write
9A000
stack
page read and write
43F0000
heap
page read and write
101E000
stack
page read and write
56F0000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
3EFE7F8000
stack
page read and write
455B000
heap
page read and write
5530000
heap
page read and write
42D2000
heap
page read and write
42AD000
heap
page read and write
5470000
trusted library allocation
page read and write
42D2000
heap
page read and write
43EF000
heap
page read and write
42AC000
heap
page read and write
2D6E000
trusted library allocation
page read and write
4373000
heap
page read and write
42D2000
heap
page read and write
42D2000
heap
page read and write
491000
unkown
page write copy
42D2000
heap
page read and write
12DD000
heap
page read and write
4328000
heap
page read and write
46C0000
direct allocation
page read and write
42C3000
heap
page read and write
88BE000
stack
page read and write
50C0000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
4697000
heap
page read and write
54A0000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
1656000
trusted library allocation
page execute and read and write
455E000
heap
page read and write
4610000
direct allocation
page read and write
2C60000
heap
page execute and read and write
4388000
heap
page read and write
89FF000
stack
page read and write
2D65000
trusted library allocation
page read and write
463B000
heap
page read and write
492000
unkown
page read and write
43F1000
heap
page read and write
42AD000
heap
page read and write
7F1E000
stack
page read and write
41D8000
heap
page read and write
42D2000
heap
page read and write
42D2000
heap
page read and write
43EF000
heap
page read and write
5AEE000
stack
page read and write
3A70000
heap
page read and write
47ED000
direct allocation
page read and write
401000
unkown
page execute read
317E000
stack
page read and write
43F0000
heap
page read and write
4AB000
unkown
page readonly
2E67000
trusted library allocation
page read and write
4256000
heap
page read and write
2D46000
trusted library allocation
page read and write
401000
unkown
page execute read
42AC000
heap
page read and write
42AC000
heap
page read and write
7F40000
trusted library allocation
page read and write
4373000
heap
page read and write
A85000
heap
page read and write
4254000
heap
page read and write
42AC000
heap
page read and write
43F1000
heap
page read and write
5C15000
heap
page read and write
115000
heap
page read and write
4580000
direct allocation
page read and write
4230000
heap
page read and write
DE0000
heap
page read and write
2BC0000
trusted library allocation
page read and write
42D2000
heap
page read and write
1680000
heap
page read and write
22FA0AC0000
heap
page read and write
955000
heap
page read and write
449A000
heap
page read and write
5B00000
heap
page read and write
4240000
heap
page execute and read and write
4373000
heap
page read and write
401000
unkown
page execute read
4879000
direct allocation
page read and write
A4D000
heap
page read and write
43EF000
heap
page read and write
3EFE3FE000
stack
page read and write
31BB000
stack
page read and write
5480000
trusted library allocation
page execute and read and write
422F000
heap
page read and write
4157000
heap
page read and write
42D2000
heap
page read and write
4230000
heap
page read and write
43EF000
heap
page read and write
41D8000
heap
page read and write
4A7000
unkown
page read and write
4230000
heap
page read and write
42AC000
heap
page read and write
22F9EF80000
heap
page read and write
4230000
heap
page read and write
4230000
heap
page read and write
413B000
heap
page read and write
12F5000
heap
page read and write
A50000
heap
page read and write
43EF000
heap
page read and write
4610000
direct allocation
page read and write
339F000
trusted library allocation
page read and write
490000
unkown
page write copy
12BD000
heap
page read and write
33FE000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
4230000
heap
page read and write
41D8000
heap
page read and write
41CE000
heap
page read and write
5120000
trusted library allocation
page execute and read and write
487D000
direct allocation
page read and write
47B0000
direct allocation
page read and write
46C0000
direct allocation
page read and write
42AD000
heap
page read and write
43EF000
heap
page read and write
42AC000
heap
page read and write
1CE000
stack
page read and write
2A80000
trusted library allocation
page execute and read and write
4277000
heap
page read and write
492000
unkown
page read and write
D92000
heap
page read and write
22F9F030000
heap
page read and write
366E000
stack
page read and write
47E9000
direct allocation
page read and write
165A000
trusted library allocation
page execute and read and write
2BA0000
trusted library allocation
page read and write
D8D000
heap
page read and write
43EF000
heap
page read and write
3DF0000
heap
page read and write
2D4D000
trusted library allocation
page read and write
3C6C000
heap
page read and write
47E9000
direct allocation
page read and write
4230000
heap
page read and write
132C000
heap
page read and write
42AD000
heap
page read and write
2D1B000
trusted library allocation
page read and write
41D8000
heap
page read and write
4221000
trusted library allocation
page read and write
4254000
heap
page read and write
345C000
trusted library allocation
page read and write
4230000
heap
page read and write
2DBB000
trusted library allocation
page read and write
4287000
heap
page read and write
28E0000
heap
page read and write
40F0000
heap
page read and write
43EF000
heap
page read and write
42D2000
heap
page read and write
1660000
trusted library allocation
page read and write
4373000
heap
page read and write
41D8000
heap
page read and write
455B000
direct allocation
page read and write
A25000
heap
page read and write
7E1E000
stack
page read and write
C60000
heap
page read and write
46E2000
heap
page read and write
163D000
trusted library allocation
page execute and read and write
41D8000
heap
page read and write
7298000
heap
page read and write
8B4000
stack
page read and write
D55000
heap
page read and write
4230000
heap
page read and write
9CE000
stack
page read and write
402000
system
page execute and read and write
110000
heap
page read and write
15D0000
heap
page read and write
532C000
stack
page read and write
42D2000
heap
page read and write
170000
heap
page read and write
42D2000
heap
page read and write
31E6000
trusted library allocation
page read and write
2AA4000
heap
page read and write
2E63000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
4373000
heap
page read and write
4520000
direct allocation
page read and write
B9F000
heap
page read and write
22F9F060000
heap
page read and write
127E000
heap
page read and write
3D12000
heap
page read and write
42D2000
heap
page read and write
533F000
trusted library section
page readonly
78D2000
trusted library allocation
page read and write
42AC000
heap
page read and write
4230000
heap
page read and write
2E02000
trusted library allocation
page read and write
42CC000
heap
page read and write
33A1000
trusted library allocation
page read and write
487D000
direct allocation
page read and write
CD0000
heap
page read and write
306F000
trusted library allocation
page read and write
CB0000
heap
page read and write
4255000
heap
page read and write
2920000
trusted library allocation
page read and write
484D000
direct allocation
page read and write
2DB5000
trusted library allocation
page read and write
446B000
heap
page read and write
2C30000
trusted library allocation
page read and write
13DE000
stack
page read and write
42D2000
heap
page read and write
48EE000
direct allocation
page read and write
487D000
direct allocation
page read and write
43EF000
heap
page read and write
42AC000
heap
page read and write
50D0000
trusted library allocation
page execute and read and write
4255000
heap
page read and write
D4E000
heap
page read and write
4373000
heap
page read and write
5760000
heap
page read and write
4230000
heap
page read and write
7CB0000
heap
page read and write
3794000
heap
page read and write
4255000
heap
page read and write
4230000
heap
page read and write
33D3000
trusted library allocation
page read and write
400000
unkown
page readonly
13F0000
heap
page read and write
2F9E000
stack
page read and write
400000
system
page execute and read and write
4373000
heap
page read and write
3369000
trusted library allocation
page read and write
A20000
heap
page read and write
B5F000
heap
page read and write
4244000
heap
page read and write
48D9000
direct allocation
page read and write
4373000
heap
page read and write
4230000
heap
page read and write
42AC000
heap
page read and write
43EF000
heap
page read and write
42F9000
heap
page read and write
41D8000
heap
page read and write
4724000
heap
page read and write
4373000
heap
page read and write
41D8000
heap
page read and write
4230000
heap
page read and write
3365000
trusted library allocation
page read and write
3EFE2FE000
stack
page read and write
4733000
direct allocation
page read and write
2C1F000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
5540000
heap
page read and write
43EF000
heap
page read and write
43EF000
heap
page read and write
5100000
heap
page read and write
43EF000
heap
page read and write
4256000
heap
page read and write
44FB000
direct allocation
page read and write
2E42000
trusted library allocation
page read and write
4373000
heap
page read and write
17BF000
stack
page read and write
AAF000
heap
page read and write
4230000
heap
page read and write
43EF000
heap
page read and write
41D8000
heap
page read and write
9D1000
heap
page read and write
56A0000
trusted library allocation
page execute and read and write
91FE000
stack
page read and write
43EF000
heap
page read and write
7290000
heap
page read and write
3B45000
heap
page read and write
4372000
heap
page read and write
12C1000
heap
page read and write
56D0000
heap
page read and write
2DC3000
trusted library allocation
page read and write
41E0000
heap
page read and write
4230000
heap
page read and write
1332000
heap
page read and write
42D2000
heap
page read and write
2DF3000
trusted library allocation
page read and write
41D8000
heap
page read and write
BC0000
heap
page read and write
4373000
heap
page read and write
4AB000
unkown
page readonly
494E000
direct allocation
page read and write
43EF000
heap
page read and write
33A3000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
1137000
heap
page read and write
4643000
direct allocation
page read and write
47ED000
direct allocation
page read and write
B7E000
heap
page read and write
4230000
heap
page read and write
43EF000
heap
page read and write
429C000
heap
page read and write
2B9F000
stack
page read and write
41D8000
heap
page read and write
4273000
heap
page read and write
42D2000
heap
page read and write
2E71000
trusted library allocation
page read and write
12B6000
heap
page read and write
4373000
heap
page read and write
42D2000
heap
page read and write
4373000
heap
page read and write
E5000
heap
page read and write
2E9B000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
4373000
heap
page read and write
1D0000
heap
page read and write
4373000
heap
page read and write
4175000
heap
page read and write
6C9E000
heap
page read and write
4373000
heap
page read and write
43CD000
heap
page read and write
5710000
trusted library allocation
page read and write
42D2000
heap
page read and write
72AC000
heap
page read and write
43EF000
heap
page read and write
48D5000
heap
page read and write
43ED000
heap
page read and write
957E000
stack
page read and write
2E33000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
4174000
heap
page read and write
5AF0000
heap
page read and write
48D9000
direct allocation
page read and write
4720000
direct allocation
page read and write
887E000
stack
page read and write
41D8000
heap
page read and write
4373000
heap
page read and write
93E000
stack
page read and write
4255000
heap
page read and write
2C71000
trusted library allocation
page read and write
5550000
heap
page read and write
2D9B000
trusted library allocation
page read and write
1690000
trusted library allocation
page execute and read and write
43EF000
heap
page read and write
2E5F000
trusted library allocation
page read and write
494E000
direct allocation
page read and write
42D2000
heap
page read and write
15CF000
stack
page read and write
4296000
heap
page read and write
42D2000
heap
page read and write
4230000
heap
page read and write
72D4000
heap
page read and write
D6A000
heap
page read and write
4254000
heap
page read and write
42D2000
heap
page read and write
4030000
heap
page read and write
4230000
heap
page read and write
4230000
heap
page read and write
42D2000
heap
page read and write
41D8000
heap
page read and write
1120000
trusted library allocation
page read and write
42AC000
heap
page read and write
4255000
heap
page read and write
2930000
trusted library allocation
page read and write
41D4000
heap
page read and write
41D8000
heap
page read and write
2E61000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
41DE000
heap
page read and write
16B0000
heap
page read and write
371B000
heap
page read and write
3050000
trusted library allocation
page read and write
4233000
heap
page read and write
157F000
stack
page read and write
2BC4000
trusted library allocation
page read and write
4255000
heap
page read and write
4373000
heap
page read and write
4373000
heap
page read and write
4230000
heap
page read and write
31C4000
trusted library allocation
page read and write
42AD000
heap
page read and write
4230000
heap
page read and write
16A0000
trusted library allocation
page read and write
42AC000
heap
page read and write
47ED000
direct allocation
page read and write
482000
unkown
page readonly
1248000
heap
page read and write
110000
heap
page read and write
4255000
heap
page read and write
42AC000
heap
page read and write
4373000
heap
page read and write
292A000
trusted library allocation
page execute and read and write
1305000
heap
page read and write
54E0000
heap
page read and write
2900000
trusted library allocation
page read and write
22F9EF90000
heap
page read and write
4373000
heap
page read and write
42D2000
heap
page read and write
32F6000
trusted library allocation
page read and write
42D2000
heap
page read and write
31E1000
trusted library allocation
page read and write
43EF000
heap
page read and write
1595000
heap
page read and write
31ED000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
3C75000
trusted library allocation
page read and write
41D8000
heap
page read and write
41D8000
heap
page read and write
4252000
heap
page read and write
46C5000
direct allocation
page read and write
4230000
heap
page read and write
401000
unkown
page execute read
2D6B000
trusted library allocation
page read and write
4373000
heap
page read and write
3EF0000
heap
page read and write
2DF5000
trusted library allocation
page read and write
4653000
heap
page read and write
2E4C000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
401000
unkown
page execute read
2BE1000
trusted library allocation
page read and write
43EF000
heap
page read and write
A6E000
stack
page read and write
31CB000
trusted library allocation
page read and write
42AC000
heap
page read and write
42D2000
heap
page read and write
22F9F066000
heap
page read and write
45C0000
heap
page read and write
40DC000
heap
page read and write
110000
heap
page read and write
42D2000
heap
page read and write
47B0000
direct allocation
page read and write
2DEF000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
44F9000
heap
page read and write
41D8000
heap
page read and write
42AC000
heap
page read and write
42AC000
heap
page read and write
1335000
heap
page read and write
2C43000
heap
page read and write
42AC000
heap
page read and write
404E000
heap
page read and write
9A000
stack
page read and write
2EAC000
trusted library allocation
page read and write
5340000
heap
page read and write
43F0000
heap
page read and write
42D2000
heap
page read and write
933E000
stack
page read and write
46C0000
direct allocation
page read and write
8AF000
stack
page read and write
4230000
heap
page read and write
2932000
trusted library allocation
page read and write
4750000
direct allocation
page read and write
4327000
heap
page read and write
42BD000
heap
page read and write
4373000
heap
page read and write
111F000
stack
page read and write
8AF000
stack
page read and write
41D8000
heap
page read and write
42AC000
heap
page read and write
41D8000
heap
page read and write
B86000
heap
page read and write
56E0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3070000
heap
page read and write
42AC000
heap
page read and write
4230000
heap
page read and write
4230000
heap
page read and write
33B2000
trusted library allocation
page read and write
3EA3000
heap
page read and write
4230000
heap
page read and write
43DF000
heap
page read and write
2DBF000
trusted library allocation
page read and write
42D2000
heap
page read and write
45C0000
heap
page read and write
1F0000
heap
page read and write
4373000
heap
page read and write
43F0000
heap
page read and write
483D000
heap
page read and write
AFB000
heap
page read and write
44C2000
heap
page read and write
43EF000
heap
page read and write
4520000
direct allocation
page read and write
58F0000
heap
page execute and read and write
2BCB000
trusted library allocation
page read and write
72D2000
heap
page read and write
2C00000
trusted library allocation
page read and write
12E6000
heap
page read and write
4254000
heap
page read and write
46FC000
heap
page read and write
9E1000
heap
page read and write
47B9000
heap
page read and write
980000
heap
page read and write
4315000
heap
page read and write
12AE000
stack
page read and write
42AC000
heap
page read and write
2BDE000
trusted library allocation
page read and write
42D2000
heap
page read and write
1390000
heap
page read and write
42AC000
heap
page read and write
46A3000
direct allocation
page read and write
33AB000
trusted library allocation
page read and write
431B000
heap
page read and write
B0C000
heap
page read and write
44F2000
heap
page read and write
947E000
stack
page read and write
42D2000
heap
page read and write
E0000
heap
page read and write
4256000
heap
page read and write
41E5000
heap
page execute and read and write
42D2000
heap
page read and write
970000
heap
page read and write
485E000
direct allocation
page read and write
42C1000
heap
page read and write
4373000
heap
page read and write
1620000
heap
page read and write
4136000
heap
page read and write
482000
unkown
page readonly
4373000
heap
page read and write
1321000
heap
page read and write
750E000
stack
page read and write
42D2000
heap
page read and write
5B34000
heap
page read and write
2A90000
heap
page read and write
3400000
trusted library allocation
page read and write
166B000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
41D8000
heap
page read and write
400000
unkown
page readonly
5730000
trusted library section
page readonly
340D000
trusted library allocation
page read and write
4255000
heap
page read and write
299E000
stack
page read and write
4255000
heap
page read and write
42AC000
heap
page read and write
2E48000
trusted library allocation
page read and write
1300000
heap
page read and write
4230000
heap
page read and write
42D2000
heap
page read and write
5690000
trusted library allocation
page read and write
1667000
trusted library allocation
page execute and read and write
42D2000
heap
page read and write
4324000
heap
page read and write
42AA000
heap
page read and write
490000
unkown
page write copy
4256000
heap
page read and write
4720000
direct allocation
page read and write
43EF000
heap
page read and write
89BE000
stack
page read and write
2C25000
trusted library allocation
page read and write
48DD000
direct allocation
page read and write
16E0000
heap
page read and write
1F0000
heap
page read and write
9CE000
stack
page read and write
43EF000
heap
page read and write
4350000
heap
page read and write
43EF000
heap
page read and write
92FF000
stack
page read and write
42AC000
heap
page read and write
490000
unkown
page read and write
401000
unkown
page execute read
4373000
heap
page read and write
12D4000
heap
page read and write
445C000
heap
page read and write
117E000
stack
page read and write
2C28000
trusted library allocation
page read and write
4800000
heap
page read and write
2BE6000
trusted library allocation
page read and write
D05000
heap
page read and write
48D9000
direct allocation
page read and write
45FB000
heap
page read and write
2DBD000
trusted library allocation
page read and write
13F5000
heap
page read and write
584B000
stack
page read and write
2E4E000
trusted library allocation
page read and write
4255000
heap
page read and write
2910000
trusted library allocation
page read and write
46D3000
direct allocation
page read and write
3BFE000
heap
page read and write
3798000
heap
page read and write
2EA7000
trusted library allocation
page read and write
4643000
direct allocation
page read and write
48EE000
direct allocation
page read and write
428A000
heap
page read and write
3D90000
heap
page read and write
46A3000
direct allocation
page read and write
2FCF000
stack
page read and write
3210000
heap
page execute and read and write
400000
unkown
page readonly
5140000
trusted library allocation
page read and write
4373000
heap
page read and write
4255000
heap
page read and write
33F4000
trusted library allocation
page read and write
1340000
heap
page read and write
400000
unkown
page readonly
A43000
heap
page read and write
D73000
heap
page read and write
4230000
heap
page read and write
AD9000
heap
page read and write
3205000
trusted library allocation
page read and write
43EF000
heap
page read and write
42AC000
heap
page read and write
2C99000
trusted library allocation
page read and write
9E0000
heap
page read and write
4255000
heap
page read and write
2E0B000
trusted library allocation
page read and write
8AF000
stack
page read and write
48EE000
direct allocation
page read and write
5350000
heap
page read and write
4D6D000
stack
page read and write
4373000
heap
page read and write
6C90000
heap
page read and write
4215000
heap
page read and write
4230000
heap
page read and write
12FC000
heap
page read and write
4230000
heap
page read and write
490000
unkown
page write copy
46D3000
direct allocation
page read and write
41D8000
heap
page read and write
4164000
heap
page read and write
33C4000
trusted library allocation
page read and write
42D2000
heap
page read and write
3E59000
heap
page read and write
546D000
stack
page read and write
3040000
trusted library allocation
page read and write
455D000
heap
page read and write
1633000
trusted library allocation
page execute and read and write
3A80000
heap
page read and write
41D8000
heap
page read and write
42D2000
heap
page read and write
D76000
heap
page read and write
2A7B000
stack
page read and write
42D2000
heap
page read and write
490000
unkown
page read and write
4A7000
unkown
page read and write
43EF000
heap
page read and write
41D8000
heap
page read and write
43EF000
heap
page read and write
338A000
trusted library allocation
page read and write
41D8000
heap
page read and write
3413000
trusted library allocation
page read and write
482000
unkown
page readonly
482000
unkown
page readonly
4750000
direct allocation
page read and write
43F0000
heap
page read and write
3221000
trusted library allocation
page read and write
943E000
stack
page read and write
AFB000
heap
page read and write
41D8000
heap
page read and write
8B4000
stack
page read and write
3392000
trusted library allocation
page read and write
2937000
trusted library allocation
page execute and read and write
5B10000
heap
page read and write
2E65000
trusted library allocation
page read and write
ABE000
heap
page read and write
2C20000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
4373000
heap
page read and write
2DE7000
trusted library allocation
page read and write
43EF000
heap
page read and write
4373000
heap
page read and write
43F0000
heap
page read and write
A3E000
stack
page read and write
2BC0000
heap
page read and write
D18000
heap
page read and write
988000
heap
page read and write
4491000
heap
page read and write
4255000
heap
page read and write
43EF000
heap
page read and write
4373000
heap
page read and write
D9A000
heap
page read and write
73CE000
stack
page read and write
427F000
heap
page read and write
4373000
heap
page read and write
FD0000
heap
page read and write
22F9F3B0000
heap
page read and write
445E000
heap
page read and write
2D71000
trusted library allocation
page read and write
48DD000
direct allocation
page read and write
43C2000
heap
page read and write
4AB000
unkown
page readonly
2DF1000
trusted library allocation
page read and write
72A8000
heap
page read and write
4849000
direct allocation
page read and write
4373000
heap
page read and write
1690000
heap
page read and write
3371000
trusted library allocation
page read and write
4254000
heap
page read and write
42A6000
heap
page read and write
1634000
trusted library allocation
page read and write
5763000
heap
page read and write
9F7000
stack
page read and write
4373000
heap
page read and write
4142000
heap
page read and write
2D42000
trusted library allocation
page read and write
531D000
stack
page read and write
9C0000
heap
page read and write
2DB9000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
33FC000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
4256000
heap
page read and write
39CF000
stack
page read and write
There are 1084 hidden memdumps, click here to show them.