IOC Report
HSBC_PAYMENT.exe

loading gif

Files

File Path
Type
Category
Malicious
HSBC_PAYMENT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\vehiculation
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HSBC_PAYMENT.exe
"C:\Users\user\Desktop\HSBC_PAYMENT.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\HSBC_PAYMENT.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\HSBC_PAYMENT.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
204.10.160.224:27667
malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
443C000
heap
page read and write
442D000
heap
page read and write
5150000
heap
page execute and read and write
4810000
direct allocation
page read and write
4863000
heap
page read and write
3D13000
direct allocation
page read and write
47CE000
heap
page read and write
11FD000
trusted library allocation
page execute and read and write
481B000
heap
page read and write
299A000
trusted library allocation
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
4DB0000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
443C000
heap
page read and write
4616000
heap
page read and write
47C0000
heap
page read and write
4615000
heap
page read and write
4871000
heap
page read and write
3B60000
heap
page read and write
442D000
heap
page read and write
3D44000
heap
page read and write
4425000
heap
page read and write
487A000
heap
page read and write
443B000
heap
page read and write
4616000
heap
page read and write
1300000
heap
page read and write
402000
system
page execute and read and write
4615000
heap
page read and write
1110000
heap
page read and write
3DF0000
heap
page read and write
3CD2000
heap
page read and write
7FFB23B20000
unkown
page read and write
16D0000
heap
page read and write
53CB000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
4615000
heap
page read and write
C90000
heap
page read and write
442D000
heap
page read and write
1212000
trusted library allocation
page read and write
443B000
heap
page read and write
47C4000
heap
page read and write
442D000
heap
page read and write
3DFD000
heap
page read and write
443B000
heap
page read and write
3C2D000
heap
page read and write
2A5B000
trusted library allocation
page read and write
142E000
stack
page read and write
5060000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
3D49000
heap
page read and write
3E6A000
heap
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
443B000
heap
page read and write
26E2000
trusted library allocation
page read and write
487E000
heap
page read and write
443B000
heap
page read and write
E89000
stack
page read and write
47CB000
heap
page read and write
3C25000
heap
page read and write
3D28000
heap
page read and write
3DFD000
heap
page read and write
3CC7000
heap
page read and write
3D10000
direct allocation
page read and write
2A2E000
trusted library allocation
page read and write
4615000
heap
page read and write
5900000
heap
page read and write
5278000
heap
page read and write
441C000
heap
page read and write
4615000
heap
page read and write
307C000
trusted library allocation
page read and write
443B000
heap
page read and write
3D43000
heap
page read and write
443B000
heap
page read and write
442D000
heap
page read and write
5080000
heap
page read and write
CAA000
heap
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
2710000
trusted library allocation
page read and write
4870000
heap
page read and write
5040000
heap
page read and write
2F9E000
trusted library allocation
page read and write
443B000
heap
page read and write
3D4B000
heap
page read and write
47C7000
heap
page read and write
442E000
heap
page read and write
4876000
heap
page read and write
303F000
trusted library allocation
page read and write
3C2A000
heap
page read and write
55DB000
stack
page read and write
4615000
heap
page read and write
3D4A000
heap
page read and write
4429000
heap
page read and write
3C22000
heap
page read and write
15AE000
stack
page read and write
442D000
heap
page read and write
3CDD000
heap
page read and write
4949000
direct allocation
page read and write
442D000
heap
page read and write
3012000
trusted library allocation
page read and write
4AB000
unkown
page readonly
3CC8000
heap
page read and write
3D4C000
heap
page read and write
4615000
heap
page read and write
3DF4000
heap
page read and write
486C000
heap
page read and write
11F0000
trusted library allocation
page read and write
4871000
heap
page read and write
3CDC000
heap
page read and write
443C000
heap
page read and write
490E000
heap
page read and write
4433000
heap
page read and write
443B000
heap
page read and write
2A81000
trusted library allocation
page read and write
162E000
stack
page read and write
442D000
heap
page read and write
5415000
trusted library allocation
page read and write
482E000
heap
page read and write
47C7000
heap
page read and write
3DED000
heap
page read and write
3CD3000
heap
page read and write
3D4A000
heap
page read and write
3DE7000
heap
page read and write
4615000
heap
page read and write
442D000
heap
page read and write
4949000
direct allocation
page read and write
4616000
heap
page read and write
26CD000
trusted library allocation
page execute and read and write
443C000
heap
page read and write
3DE7000
heap
page read and write
4615000
heap
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
2A79000
trusted library allocation
page read and write
4916000
heap
page read and write
443B000
heap
page read and write
3D6C000
heap
page read and write
4867000
heap
page read and write
23F70E50000
heap
page read and write
43FF000
heap
page read and write
443B000
heap
page read and write
9A000
stack
page read and write
441E000
heap
page read and write
6D9000
stack
page read and write
3C28000
heap
page read and write
4EF0000
trusted library allocation
page read and write
3093000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
442D000
heap
page read and write
54A0000
heap
page read and write
26F2000
trusted library allocation
page read and write
442D000
heap
page read and write
47C1000
heap
page read and write
5550000
trusted library allocation
page read and write
442D000
heap
page read and write
2AD4000
trusted library allocation
page read and write
443B000
heap
page read and write
442D000
heap
page read and write
4879000
heap
page read and write
2A96000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
42E000
system
page execute and read and write
4E40000
trusted library allocation
page read and write
BE0000
heap
page read and write
47CF000
heap
page read and write
482000
unkown
page readonly
4615000
heap
page read and write
4616000
heap
page read and write
878E000
stack
page read and write
442D000
heap
page read and write
26E6000
trusted library allocation
page execute and read and write
EFD7CFE000
stack
page read and write
3D4B000
heap
page read and write
3076000
trusted library allocation
page read and write
1307000
heap
page read and write
300E000
trusted library allocation
page read and write
3CC6000
heap
page read and write
443B000
heap
page read and write
3935000
trusted library allocation
page read and write
3C2E000
heap
page read and write
443C000
heap
page read and write
486D000
heap
page read and write
2FF1000
trusted library allocation
page read and write
1170000
heap
page read and write
A75000
heap
page read and write
47C4000
heap
page read and write
4522000
heap
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
47C5000
heap
page read and write
4615000
heap
page read and write
3D4A000
heap
page read and write
7FFB23B16000
unkown
page readonly
C73000
heap
page read and write
5945000
heap
page read and write
4E30000
trusted library allocation
page read and write
443C000
heap
page read and write
482000
unkown
page readonly
128F000
heap
page read and write
4616000
heap
page read and write
5460000
trusted library allocation
page execute and read and write
4865000
heap
page read and write
4AB000
unkown
page readonly
4590000
heap
page read and write
EFD80FE000
stack
page read and write
3DF4000
heap
page read and write
526C000
heap
page read and write
3CC1000
heap
page read and write
443B000
heap
page read and write
116E000
stack
page read and write
3CDF000
heap
page read and write
15F0000
heap
page read and write
443B000
heap
page read and write
1090000
heap
page read and write
12D2000
heap
page read and write
2AA0000
trusted library allocation
page read and write
3CD1000
heap
page read and write
490000
unkown
page write copy
4616000
heap
page read and write
3CDE000
heap
page read and write
CB9000
heap
page read and write
4871000
heap
page read and write
491A000
heap
page read and write
5262000
heap
page read and write
527C000
heap
page read and write
4615000
heap
page read and write
30A1000
trusted library allocation
page read and write
3CD5000
heap
page read and write
4879000
heap
page read and write
303B000
trusted library allocation
page read and write
CA5000
heap
page read and write
4616000
heap
page read and write
6BF0000
heap
page read and write
487E000
heap
page read and write
3029000
trusted library allocation
page read and write
93E000
stack
page read and write
12DC000
heap
page read and write
3C2C000
heap
page read and write
442D000
heap
page read and write
45E2000
heap
page read and write
3DEA000
heap
page read and write
4616000
heap
page read and write
4615000
heap
page read and write
443C000
heap
page read and write
47CC000
heap
page read and write
3CD9000
heap
page read and write
B90000
direct allocation
page read and write
443B000
heap
page read and write
4E22000
trusted library allocation
page read and write
443C000
heap
page read and write
443C000
heap
page read and write
3C22000
heap
page read and write
4616000
heap
page read and write
442D000
heap
page read and write
443C000
heap
page read and write
7FFB23B01000
unkown
page execute read
443B000
heap
page read and write
EDE000
stack
page read and write
7FFB23B22000
unkown
page readonly
442D000
heap
page read and write
3CD2000
heap
page read and write
486E000
heap
page read and write
4615000
heap
page read and write
4615000
heap
page read and write
47C5000
heap
page read and write
3D47000
heap
page read and write
A8D000
heap
page read and write
3CC3000
heap
page read and write
3D47000
heap
page read and write
53E1000
trusted library allocation
page read and write
EFD797A000
stack
page read and write
11E4000
trusted library allocation
page read and write
15D0000
heap
page read and write
3C2D000
heap
page read and write
3DF3000
heap
page read and write
23F7115E000
heap
page read and write
442D000
heap
page read and write
12AD000
heap
page read and write
3D4C000
heap
page read and write
4615000
heap
page read and write
5AF0000
heap
page read and write
482F000
heap
page read and write
15E4000
trusted library allocation
page read and write
3D49000
heap
page read and write
490000
unkown
page write copy
440D000
heap
page read and write
4916000
heap
page read and write
3097000
trusted library allocation
page read and write
3DF8000
heap
page read and write
874F000
stack
page read and write
3CCD000
heap
page read and write
4615000
heap
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
2760000
heap
page execute and read and write
443B000
heap
page read and write
1206000
trusted library allocation
page execute and read and write
4828000
heap
page read and write
486F000
heap
page read and write
11EF000
stack
page read and write
3C21000
heap
page read and write
2810000
trusted library allocation
page execute and read and write
53DE000
trusted library allocation
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
3DF0000
heap
page read and write
443B000
heap
page read and write
3CC8000
heap
page read and write
2B27000
trusted library allocation
page read and write
C0C000
heap
page read and write
47C8000
heap
page read and write
3D42000
heap
page read and write
C81000
heap
page read and write
3053000
trusted library allocation
page read and write
770E000
stack
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
3DF0000
heap
page read and write
4DFB000
trusted library allocation
page read and write
3DED000
heap
page read and write
3D4F000
heap
page read and write
442D000
heap
page read and write
4616000
heap
page read and write
442D000
heap
page read and write
442D000
heap
page read and write
4916000
heap
page read and write
26D0000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
47CA000
heap
page read and write
3059000
trusted library allocation
page read and write
47C2000
heap
page read and write
4519000
heap
page read and write
2B0A000
trusted library allocation
page read and write
3D4E000
heap
page read and write
2B02000
trusted library allocation
page read and write
12D5000
heap
page read and write
4816000
heap
page read and write
302B000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
888F000
stack
page read and write
12F7000
heap
page read and write
47C5000
heap
page read and write
110E000
stack
page read and write
2B0C000
trusted library allocation
page read and write
C9A000
heap
page read and write
482D000
heap
page read and write
4615000
heap
page read and write
2AB3000
trusted library allocation
page read and write
4616000
heap
page read and write
4818000
heap
page read and write
4DFE000
trusted library allocation
page read and write
401000
unkown
page execute read
EFD83FE000
stack
page read and write
4DE0000
trusted library allocation
page read and write
4615000
heap
page read and write
460D000
heap
page read and write
292E000
stack
page read and write
4867000
heap
page read and write
443B000
heap
page read and write
1560000
heap
page execute and read and write
3CCF000
heap
page read and write
4EA0000
trusted library allocation
page read and write
4100000
heap
page read and write
442D000
heap
page read and write
BE8000
heap
page read and write
4615000
heap
page read and write
4615000
heap
page read and write
3CC2000
heap
page read and write
400000
unkown
page readonly
2B11000
trusted library allocation
page read and write
4616000
heap
page read and write
2EA1000
trusted library allocation
page read and write
3D47000
heap
page read and write
3D41000
heap
page read and write
4615000
heap
page read and write
443C000
heap
page read and write
47C8000
heap
page read and write
3D6F000
heap
page read and write
3DF3000
heap
page read and write
30AB000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
443B000
heap
page read and write
486A000
heap
page read and write
5420000
trusted library allocation
page read and write
4615000
heap
page read and write
442D000
heap
page read and write
1550000
heap
page read and write
3C2B000
heap
page read and write
1540000
trusted library allocation
page execute and read and write
39FB000
heap
page read and write
2FE0000
heap
page read and write
4408000
heap
page read and write
23F70E70000
heap
page read and write
2A9A000
trusted library allocation
page read and write
47C8000
heap
page read and write
1258000
heap
page read and write
A40000
heap
page read and write
2F72000
trusted library allocation
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
12E6000
heap
page read and write
4614000
heap
page read and write
4F20000
trusted library allocation
page read and write
2E80000
heap
page read and write
443B000
heap
page read and write
53AE000
stack
page read and write
481F000
heap
page read and write
3025000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
43A8000
heap
page read and write
4864000
heap
page read and write
442D000
heap
page read and write
401000
unkown
page execute read
3CCD000
heap
page read and write
1097000
heap
page read and write
47C7000
heap
page read and write
4615000
heap
page read and write
443C000
heap
page read and write
3CC6000
heap
page read and write
1670000
heap
page read and write
3C25000
heap
page read and write
8FE000
stack
page read and write
132C000
heap
page read and write
3CCD000
heap
page read and write
486C000
heap
page read and write
4615000
heap
page read and write
4439000
heap
page read and write
4615000
heap
page read and write
4614000
heap
page read and write
C89000
heap
page read and write
486B000
heap
page read and write
1310000
heap
page read and write
7D7000
stack
page read and write
3D41000
heap
page read and write
487F000
heap
page read and write
5050000
heap
page read and write
487B000
heap
page read and write
3032000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
400000
unkown
page readonly
442D000
heap
page read and write
4615000
heap
page read and write
490D000
heap
page read and write
493D000
direct allocation
page read and write
CBE000
heap
page read and write
4A6C000
stack
page read and write
443B000
heap
page read and write
4000000
heap
page read and write
525D000
heap
page read and write
4615000
heap
page read and write
1237000
heap
page read and write
443B000
heap
page read and write
4438000
heap
page read and write
4615000
heap
page read and write
4615000
heap
page read and write
1210000
trusted library allocation
page read and write
4612000
heap
page read and write
4824000
direct allocation
page read and write
3DFC000
heap
page read and write
3D4E000
heap
page read and write
30D7000
trusted library allocation
page read and write
4615000
heap
page read and write
3DE3000
heap
page read and write
3D40000
heap
page read and write
303D000
trusted library allocation
page read and write
443C000
heap
page read and write
3C27000
heap
page read and write
442D000
heap
page read and write
2AB5000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
4590000
heap
page read and write
442D000
heap
page read and write
3D40000
heap
page read and write
23F71155000
heap
page read and write
4434000
heap
page read and write
3CD8000
heap
page read and write
442D000
heap
page read and write
490B000
heap
page read and write
4590000
heap
page read and write
2AED000
trusted library allocation
page read and write
4615000
heap
page read and write
2AB1000
trusted library allocation
page read and write
3C24000
heap
page read and write
442D000
heap
page read and write
47C0000
heap
page read and write
2E90000
heap
page read and write
501B000
stack
page read and write
2ADF000
trusted library allocation
page read and write
3CD2000
heap
page read and write
2F7D000
trusted library allocation
page read and write
4615000
heap
page read and write
47C4000
heap
page read and write
3C25000
heap
page read and write
442D000
heap
page read and write
443C000
heap
page read and write
443B000
heap
page read and write
12DF000
heap
page read and write
3095000
trusted library allocation
page read and write
4615000
heap
page read and write
3B6A000
heap
page read and write
47C1000
heap
page read and write
3DED000
heap
page read and write
5418000
trusted library allocation
page read and write
23F70F24000
heap
page read and write
120A000
trusted library allocation
page execute and read and write
4E60000
trusted library allocation
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
47C4000
heap
page read and write
4615000
heap
page read and write
2A7B000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
3D10000
direct allocation
page read and write
3D41000
heap
page read and write
3C29000
heap
page read and write
49AE000
direct allocation
page read and write
4E11000
trusted library allocation
page read and write
47CC000
heap
page read and write
3C21000
heap
page read and write
442D000
heap
page read and write
3BF0000
direct allocation
page read and write
38CE000
stack
page read and write
3C27000
heap
page read and write
304F000
trusted library allocation
page read and write
5AED000
stack
page read and write
443B000
heap
page read and write
4DD0000
trusted library allocation
page read and write
58F0000
heap
page read and write
47CE000
heap
page read and write
494D000
direct allocation
page read and write
3D45000
heap
page read and write
442D000
heap
page read and write
3D4F000
heap
page read and write
3006000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
442D000
heap
page read and write
3CCD000
heap
page read and write
301F000
trusted library allocation
page read and write
442C000
heap
page read and write
443B000
heap
page read and write
2AB9000
trusted library allocation
page read and write
442D000
heap
page read and write
43B6000
heap
page read and write
4433000
heap
page read and write
490C000
heap
page read and write
491E000
heap
page read and write
4615000
heap
page read and write
307E000
trusted library allocation
page read and write
58E0000
trusted library section
page readonly
52A6000
heap
page read and write
2FE5000
heap
page read and write
442D000
heap
page read and write
2A75000
trusted library allocation
page read and write
9F0000
heap
page read and write
100000
heap
page read and write
2AA2000
trusted library allocation
page read and write
56E0000
heap
page read and write
EFD85FB000
stack
page read and write
2AC8000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
1190000
heap
page read and write
443B000
heap
page read and write
8C0E000
stack
page read and write
443B000
heap
page read and write
3C2B000
heap
page read and write
3EA1000
trusted library allocation
page read and write
442D000
heap
page read and write
3DEB000
heap
page read and write
9FA000
heap
page read and write
442D000
heap
page read and write
486A000
heap
page read and write
3CDB000
heap
page read and write
443B000
heap
page read and write
2FCB000
trusted library allocation
page read and write
3CCA000
heap
page read and write
2B6C000
trusted library allocation
page read and write
1328000
heap
page read and write
4EB0000
trusted library allocation
page execute and read and write
3023000
trusted library allocation
page read and write
3CDF000
heap
page read and write
130B000
heap
page read and write
23F71150000
heap
page read and write
3C2B000
heap
page read and write
443B000
heap
page read and write
442D000
heap
page read and write
3C81000
heap
page read and write
3CC3000
heap
page read and write
482000
unkown
page readonly
2AE9000
trusted library allocation
page read and write
3049000
trusted library allocation
page read and write
7FFB23B00000
unkown
page readonly
3D4B000
heap
page read and write
1530000
trusted library allocation
page read and write
442D000
heap
page read and write
443C000
heap
page read and write
30A3000
trusted library allocation
page read and write
30DC000
trusted library allocation
page read and write
3C21000
heap
page read and write
3CD4000
heap
page read and write
3D45000
heap
page read and write
47C3000
heap
page read and write
3CDE000
heap
page read and write
3CD2000
heap
page read and write
4616000
heap
page read and write
26EA000
trusted library allocation
page execute and read and write
4615000
heap
page read and write
2AD9000
trusted library allocation
page read and write
443B000
heap
page read and write
4615000
heap
page read and write
507D000
stack
page read and write
C52000
heap
page read and write
2A94000
trusted library allocation
page read and write
494D000
direct allocation
page read and write
3DEE000
heap
page read and write
950000
heap
page read and write
442D000
heap
page read and write
2B04000
trusted library allocation
page read and write
3CD3000
heap
page read and write
487C000
heap
page read and write
308D000
trusted library allocation
page read and write
4615000
heap
page read and write
23F70EC0000
heap
page read and write
5F20000
heap
page read and write
2FA1000
trusted library allocation
page read and write
3C25000
heap
page read and write
5490000
heap
page read and write
3C2D000
heap
page read and write
11ED000
trusted library allocation
page execute and read and write
3C27000
heap
page read and write
152E000
stack
page read and write
3D45000
heap
page read and write
47C5000
heap
page read and write
47C5000
heap
page read and write
3091000
trusted library allocation
page read and write
490C000
heap
page read and write
1266000
heap
page read and write
2AD2000
trusted library allocation
page read and write
3D42000
heap
page read and write
53CE000
trusted library allocation
page read and write
23F70EF7000
heap
page read and write
26C4000
trusted library allocation
page read and write
3C88000
heap
page read and write
49BE000
direct allocation
page read and write
2F91000
trusted library allocation
page read and write
491B000
heap
page read and write
53C4000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
11E0000
trusted library allocation
page read and write
B8E000
stack
page read and write
3DFD000
heap
page read and write
3DE9000
heap
page read and write
3180000
heap
page read and write
443B000
heap
page read and write
26C3000
trusted library allocation
page execute and read and write
4939000
direct allocation
page read and write
443B000
heap
page read and write
47C4000
heap
page read and write
4615000
heap
page read and write
8B4000
stack
page read and write
C83000
heap
page read and write
442D000
heap
page read and write
2AE3000
trusted library allocation
page read and write
4615000
heap
page read and write
443B000
heap
page read and write
3D41000
heap
page read and write
442D000
heap
page read and write
8ACE000
stack
page read and write
3C23000
heap
page read and write
15F7000
heap
page read and write
4616000
heap
page read and write
2FE5000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
4615000
heap
page read and write
56E6000
heap
page read and write
5064000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
3CCB000
heap
page read and write
4AB000
unkown
page readonly
443A000
heap
page read and write
4615000
heap
page read and write
443B000
heap
page read and write
2AC2000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
490000
unkown
page read and write
47CF000
heap
page read and write
443B000
heap
page read and write
470F000
heap
page read and write
4865000
heap
page read and write
443B000
heap
page read and write
3008000
trusted library allocation
page read and write
487D000
heap
page read and write
3C25000
heap
page read and write
486A000
heap
page read and write
442D000
heap
page read and write
49BE000
direct allocation
page read and write
442D000
heap
page read and write
1553000
heap
page read and write
1175000
heap
page read and write
443C000
heap
page read and write
1217000
trusted library allocation
page execute and read and write
3C2E000
heap
page read and write
3CD7000
heap
page read and write
482A000
heap
page read and write
2AEF000
trusted library allocation
page read and write
400000
unkown
page readonly
2B1D000
trusted library allocation
page read and write
47C9000
heap
page read and write
5F30000
heap
page read and write
7FFB23B25000
unkown
page readonly
2F9B000
trusted library allocation
page read and write
490000
unkown
page write copy
3CD3000
heap
page read and write
442D000
heap
page read and write
1230000
heap
page read and write
43B6000
heap
page read and write
854E000
stack
page read and write
4615000
heap
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
3D42000
heap
page read and write
4616000
heap
page read and write
2AF1000
trusted library allocation
page read and write
4863000
heap
page read and write
442B000
heap
page read and write
443B000
heap
page read and write
442D000
heap
page read and write
4873000
heap
page read and write
3184000
heap
page read and write
2F76000
trusted library allocation
page read and write
443B000
heap
page read and write
443B000
heap
page read and write
2B06000
trusted library allocation
page read and write
4861000
heap
page read and write
4EE0000
heap
page read and write
56F9000
heap
page read and write
4867000
heap
page read and write
4615000
heap
page read and write
4E0E000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
EFD82FD000
stack
page read and write
47C1000
heap
page read and write
442D000
heap
page read and write
2B21000
trusted library allocation
page read and write
496C000
stack
page read and write
443B000
heap
page read and write
2B25000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
3D10000
direct allocation
page read and write
401000
unkown
page execute read
3C2A000
heap
page read and write
23F70D70000
heap
page read and write
4616000
heap
page read and write
482000
unkown
page readonly
4616000
heap
page read and write
43B6000
heap
page read and write
3DEA000
heap
page read and write
4616000
heap
page read and write
5250000
heap
page read and write
3DE7000
heap
page read and write
442D000
heap
page read and write
481C000
heap
page read and write
442D000
heap
page read and write
443B000
heap
page read and write
442D000
heap
page read and write
482B000
heap
page read and write
3DED000
heap
page read and write
2820000
heap
page read and write
5450000
trusted library allocation
page read and write
443C000
heap
page read and write
26F7000
trusted library allocation
page execute and read and write
307A000
trusted library allocation
page read and write
442D000
heap
page read and write
309B000
trusted library allocation
page read and write
26DD000
trusted library allocation
page execute and read and write
3C2B000
heap
page read and write
89F000
stack
page read and write
442D000
heap
page read and write
2E9E000
stack
page read and write
4867000
heap
page read and write
47C8000
heap
page read and write
3D4D000
heap
page read and write
4616000
heap
page read and write
3EA5000
trusted library allocation
page read and write
443B000
heap
page read and write
2AA5000
trusted library allocation
page read and write
C19000
heap
page read and write
864E000
stack
page read and write
443B000
heap
page read and write
4615000
heap
page read and write
3027000
trusted library allocation
page read and write
442D000
heap
page read and write
3074000
trusted library allocation
page read and write
2A02000
trusted library allocation
page read and write
4A7000
unkown
page read and write
F87000
stack
page read and write
15E0000
trusted library allocation
page read and write
4615000
heap
page read and write
3D46000
heap
page read and write
3D41000
heap
page read and write
3D7D000
heap
page read and write
3DE3000
heap
page read and write
442D000
heap
page read and write
3DF9000
heap
page read and write
3DE7000
heap
page read and write
3C22000
heap
page read and write
3D4C000
heap
page read and write
4615000
heap
page read and write
309F000
trusted library allocation
page read and write
443C000
heap
page read and write
3CC1000
heap
page read and write
2B23000
trusted library allocation
page read and write
3C86000
heap
page read and write
308F000
trusted library allocation
page read and write
443B000
heap
page read and write
443C000
heap
page read and write
4615000
heap
page read and write
4616000
heap
page read and write
4615000
heap
page read and write
3BF0000
direct allocation
page read and write
3CD2000
heap
page read and write
4829000
heap
page read and write
2AB7000
trusted library allocation
page read and write
442D000
heap
page read and write
2A98000
trusted library allocation
page read and write
4F7B000
stack
page read and write
3D4E000
heap
page read and write
55E0000
heap
page execute and read and write
2B67000
trusted library allocation
page read and write
3C2A000
heap
page read and write
4615000
heap
page read and write
442A000
heap
page read and write
3DF6000
heap
page read and write
4615000
heap
page read and write
4E16000
trusted library allocation
page read and write
45E7000
heap
page read and write
5560000
trusted library allocation
page execute and read and write
43A8000
heap
page read and write
53EE000
stack
page read and write
3DFA000
heap
page read and write
3CCF000
heap
page read and write
5268000
heap
page read and write
8D0E000
stack
page read and write
3DF4000
heap
page read and write
47CE000
heap
page read and write
5940000
heap
page read and write
2F0A000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
2FED000
trusted library allocation
page read and write
443C000
heap
page read and write
3C05000
heap
page read and write
3DE8000
heap
page read and write
443B000
heap
page read and write
3CCF000
stack
page read and write
4DF0000
trusted library allocation
page read and write
EFD7DFE000
stack
page read and write
5920000
trusted library allocation
page execute and read and write
542E000
stack
page read and write
443B000
heap
page read and write
4819000
heap
page read and write
47CE000
heap
page read and write
482A000
heap
page read and write
4615000
heap
page read and write
443B000
heap
page read and write
26B0000
trusted library allocation
page read and write
491C000
heap
page read and write
EFD84FF000
stack
page read and write
8AF000
stack
page read and write
3DF8000
heap
page read and write
443B000
heap
page read and write
3061000
trusted library allocation
page read and write
442D000
heap
page read and write
3D4B000
heap
page read and write
2A0D000
trusted library allocation
page read and write
3C22000
heap
page read and write
3CD6000
heap
page read and write
442D000
heap
page read and write
3DF2000
heap
page read and write
4615000
heap
page read and write
47C9000
heap
page read and write
23F70ED2000
heap
page read and write
C93000
heap
page read and write
4869000
heap
page read and write
4939000
direct allocation
page read and write
3CD1000
heap
page read and write
11E3000
trusted library allocation
page execute and read and write
4874000
heap
page read and write
4615000
heap
page read and write
3D41000
heap
page read and write
443B000
heap
page read and write
3D46000
heap
page read and write
12CF000
heap
page read and write
12C8000
heap
page read and write
4829000
heap
page read and write
3D42000
heap
page read and write
3010000
trusted library allocation
page read and write
3C28000
heap
page read and write
5701000
heap
page read and write
15EE000
stack
page read and write
43A8000
heap
page read and write
29D7000
trusted library allocation
page read and write
58DD000
stack
page read and write
53C0000
trusted library allocation
page read and write
1202000
trusted library allocation
page read and write
3CC0000
heap
page read and write
2A7F000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
491C000
heap
page read and write
26C0000
trusted library allocation
page read and write
443C000
heap
page read and write
4E80000
heap
page read and write
442D000
heap
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
305B000
trusted library allocation
page read and write
4E83000
heap
page read and write
442D000
heap
page read and write
4871000
heap
page read and write
4615000
heap
page read and write
460F000
heap
page read and write
3CDC000
heap
page read and write
400000
system
page execute and read and write
2A06000
trusted library allocation
page read and write
442D000
heap
page read and write
487B000
heap
page read and write
47C2000
heap
page read and write
442D000
heap
page read and write
3DE3000
heap
page read and write
70A0000
heap
page read and write
3CDB000
heap
page read and write
3D45000
heap
page read and write
EFD7FFF000
stack
page read and write
1120000
heap
page read and write
3C0F000
heap
page read and write
460A000
heap
page read and write
2A7D000
trusted library allocation
page read and write
481F000
heap
page read and write
121B000
trusted library allocation
page execute and read and write
4615000
heap
page read and write
305D000
trusted library allocation
page read and write
4616000
heap
page read and write
3DEF000
heap
page read and write
3C22000
heap
page read and write
442D000
heap
page read and write
47CE000
heap
page read and write
2B0E000
trusted library allocation
page read and write
443B000
heap
page read and write
4826000
heap
page read and write
2AF3000
trusted library allocation
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
4615000
heap
page read and write
3C20000
heap
page read and write
3057000
trusted library allocation
page read and write
442D000
heap
page read and write
442D000
heap
page read and write
3CD6000
heap
page read and write
4919000
heap
page read and write
486D000
heap
page read and write
23F7115C000
heap
page read and write
12CD000
heap
page read and write
3DEA000
heap
page read and write
3D45000
heap
page read and write
3DF9000
heap
page read and write
4615000
heap
page read and write
443C000
heap
page read and write
3DF6000
heap
page read and write
443B000
heap
page read and write
442D000
heap
page read and write
2F4B000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
3B69000
heap
page read and write
442D000
heap
page read and write
4917000
heap
page read and write
442D000
heap
page read and write
4615000
heap
page read and write
2EC7000
trusted library allocation
page read and write
4E4F000
trusted library allocation
page read and write
442D000
heap
page read and write
4878000
heap
page read and write
3CD4000
heap
page read and write
305F000
trusted library allocation
page read and write
FF0000
heap
page read and write
4604000
heap
page read and write
2FF5000
trusted library allocation
page read and write
481D000
heap
page read and write
443B000
heap
page read and write
3DF8000
heap
page read and write
A50000
heap
page read and write
540F000
trusted library allocation
page read and write
CC4000
heap
page read and write
B90000
heap
page read and write
300C000
trusted library allocation
page read and write
442D000
heap
page read and write
4819000
heap
page read and write
105000
heap
page read and write
3C20000
heap
page read and write
47C3000
heap
page read and write
4E55000
trusted library allocation
page read and write
443B000
heap
page read and write
4616000
heap
page read and write
442D000
heap
page read and write
9FE000
heap
page read and write
443B000
heap
page read and write
4615000
heap
page read and write
5B00000
heap
page read and write
4615000
heap
page read and write
2B1F000
trusted library allocation
page read and write
5254000
heap
page read and write
4616000
heap
page read and write
47CA000
heap
page read and write
780F000
stack
page read and write
47CE000
heap
page read and write
3C2A000
heap
page read and write
4810000
direct allocation
page read and write
443B000
heap
page read and write
5914000
trusted library allocation
page read and write
A70000
heap
page read and write
443B000
heap
page read and write
12F1000
heap
page read and write
5020000
trusted library section
page readonly
5120000
trusted library allocation
page read and write
9DE000
stack
page read and write
491E000
heap
page read and write
3C27000
heap
page read and write
4615000
heap
page read and write
3D6D000
heap
page read and write
443B000
heap
page read and write
443B000
heap
page read and write
C86000
heap
page read and write
3C2A000
heap
page read and write
49AE000
direct allocation
page read and write
3BF0000
direct allocation
page read and write
2A83000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
3D2C000
heap
page read and write
5910000
trusted library allocation
page read and write
3D40000
heap
page read and write
2EC9000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
3C2E000
heap
page read and write
442D000
heap
page read and write
3C2C000
heap
page read and write
5070000
trusted library allocation
page execute and read and write
2FF3000
trusted library allocation
page read and write
1F0000
heap
page read and write
4615000
heap
page read and write
3015000
trusted library allocation
page read and write
4820000
direct allocation
page read and write
3DE7000
heap
page read and write
3DFC000
heap
page read and write
DDF000
stack
page read and write
CB5000
heap
page read and write
470D000
heap
page read and write
3CCD000
heap
page read and write
3D40000
heap
page read and write
3C20000
heap
page read and write
5045000
heap
page read and write
4425000
heap
page read and write
4426000
heap
page read and write
2AAF000
trusted library allocation
page read and write
4820000
direct allocation
page read and write
43FA000
heap
page read and write
3C27000
heap
page read and write
442D000
heap
page read and write
4AB000
unkown
page readonly
26FB000
trusted library allocation
page execute and read and write
5400000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
47C3000
heap
page read and write
493D000
direct allocation
page read and write
3004000
trusted library allocation
page read and write
980000
heap
page read and write
442D000
heap
page read and write
4E50000
trusted library allocation
page read and write
3D4E000
heap
page read and write
442D000
heap
page read and write
3D45000
heap
page read and write
3D13000
direct allocation
page read and write
1200000
trusted library allocation
page read and write
3DF7000
heap
page read and write
275E000
stack
page read and write
15E6000
trusted library allocation
page read and write
3C24000
heap
page read and write
3E33000
direct allocation
page read and write
487A000
heap
page read and write
110000
heap
page read and write
443B000
heap
page read and write
2931000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
23F70EB0000
heap
page read and write
3E33000
direct allocation
page read and write
442D000
heap
page read and write
4918000
heap
page read and write
4615000
heap
page read and write
5030000
heap
page read and write
3DF2000
heap
page read and write
3931000
trusted library allocation
page read and write
443C000
heap
page read and write
3C21000
heap
page read and write
2FF5000
heap
page read and write
8BCE000
stack
page read and write
482C000
heap
page read and write
53E6000
trusted library allocation
page read and write
BDE000
stack
page read and write
5950000
trusted library allocation
page read and write
442D000
heap
page read and write
442D000
heap
page read and write
47C2000
heap
page read and write
442D000
heap
page read and write
There are 1112 hidden memdumps, click here to show them.