IOC Report
PO-A1702108.exe

loading gif

Files

File Path
Type
Category
Malicious
PO-A1702108.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\eupolyzoan\Prober.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Prober.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\molecast
data
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\system32\wbem\Performance\WmiApRpl.h (copy)
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO-A1702108.exe
"C:\Users\user\Desktop\PO-A1702108.exe"
malicious
C:\Users\user\AppData\Local\eupolyzoan\Prober.exe
"C:\Users\user\Desktop\PO-A1702108.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\PO-A1702108.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Prober.vbs"
malicious
C:\Users\user\AppData\Local\eupolyzoan\Prober.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Users\user\AppData\Local\eupolyzoan\Prober.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Users\user\AppData\Local\eupolyzoan\Prober.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Users\user\AppData\Local\eupolyzoan\Prober.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\eupolyzoan\Prober.exe"
malicious
C:\Windows\System32\wbem\WMIADAP.exe
wmiadap.exe /F /T /R
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.us
unknown
https://account.dyn.com/
unknown
http://ocsp.sectigo.com0
unknown
https://api.ipify.org/t
unknown
http://mail.privateemail.com
unknown
http://ocsp.comodoca
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.privateemail.com
198.54.122.135
malicious
api.ipify.org
172.67.74.152
171.39.242.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
198.54.122.135
mail.privateemail.com
United States
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FB4000
trusted library allocation
page read and write
malicious
2B14000
trusted library allocation
page read and write
malicious
2B53000
trusted library allocation
page read and write
malicious
2B47000
trusted library allocation
page read and write
malicious
29F0000
trusted library section
page read and write
malicious
2FDF000
trusted library allocation
page read and write
malicious
5140000
trusted library section
page read and write
malicious
26EF000
heap
page read and write
malicious
2B3F000
trusted library allocation
page read and write
malicious
2FF3000
trusted library allocation
page read and write
malicious
2FE7000
trusted library allocation
page read and write
malicious
3AC1000
trusted library allocation
page read and write
malicious
3F04000
heap
page read and write
2AE2000
trusted library allocation
page read and write
3FD7000
heap
page read and write
3F3B000
heap
page read and write
3F94000
heap
page read and write
BC8000
stack
page read and write
3FFF000
trusted library allocation
page read and write
5040000
heap
page read and write
479D000
direct allocation
page read and write
3E92000
heap
page read and write
3FED000
heap
page read and write
3F4E000
heap
page read and write
8B4000
stack
page read and write
4410000
direct allocation
page read and write
3F04000
heap
page read and write
8AF000
stack
page read and write
2AC3000
trusted library allocation
page read and write
4069000
heap
page read and write
E80000
heap
page read and write
54BA000
trusted library allocation
page read and write
4448000
heap
page read and write
474E000
direct allocation
page read and write
56CE000
stack
page read and write
5D9E000
stack
page read and write
43C6000
heap
page read and write
3F95000
heap
page read and write
433F000
heap
page read and write
1A0000
heap
page read and write
48BE000
direct allocation
page read and write
3FA7000
heap
page read and write
FFD000
heap
page read and write
3FDB000
heap
page read and write
490000
unkown
page read and write
157F000
stack
page read and write
3FA6000
heap
page read and write
3F28000
heap
page read and write
BB3000
heap
page read and write
100000
heap
page read and write
54C1000
trusted library allocation
page read and write
2C70000
heap
page read and write
1021000
heap
page read and write
480E000
direct allocation
page read and write
2B60000
trusted library allocation
page execute and read and write
43C6000
heap
page read and write
3FED000
heap
page read and write
440C000
heap
page read and write
4010000
heap
page read and write
3FDB000
heap
page read and write
2E6A000
heap
page read and write
4023000
heap
page read and write
10B3000
heap
page read and write
4239000
heap
page read and write
3E0A000
heap
page read and write
4600000
direct allocation
page read and write
3F26000
heap
page read and write
3FDB000
heap
page read and write
3F95000
heap
page read and write
2BF5000
heap
page read and write
401000
unkown
page execute read
4023000
heap
page read and write
4870000
heap
page read and write
4069000
heap
page read and write
4583000
direct allocation
page read and write
440C000
heap
page read and write
3FA7000
heap
page read and write
1F5000
heap
page read and write
4460000
direct allocation
page read and write
130000
heap
page read and write
3F94000
heap
page read and write
3FAB000
heap
page read and write
3F4E000
heap
page read and write
3B8F000
stack
page read and write
2B90000
heap
page read and write
58C8000
heap
page read and write
4069000
heap
page read and write
4729000
direct allocation
page read and write
63E7000
trusted library allocation
page read and write
46A3000
direct allocation
page read and write
3FA7000
heap
page read and write
3B41000
heap
page read and write
43C6000
heap
page read and write
3F4E000
heap
page read and write
4A7000
unkown
page read and write
BDE000
stack
page read and write
2AFA000
trusted library allocation
page read and write
3F91000
heap
page read and write
248B000
trusted library allocation
page execute and read and write
3F05000
heap
page execute and read and write
1D0000
heap
page read and write
2FD0000
heap
page read and write
4242000
heap
page read and write
490000
unkown
page read and write
5042000
heap
page read and write
4232000
heap
page read and write
4799000
direct allocation
page read and write
480E000
direct allocation
page read and write
4799000
direct allocation
page read and write
3B9A000
heap
page read and write
4AB000
unkown
page readonly
2BB0000
heap
page read and write
2AB4000
trusted library allocation
page read and write
63DE000
stack
page read and write
16F0000
heap
page read and write
3FED000
heap
page read and write
3F4E000
heap
page read and write
5072000
heap
page read and write
A00000
heap
page read and write
616F000
stack
page read and write
5842000
heap
page read and write
6770000
trusted library allocation
page execute and read and write
4357000
heap
page execute and read and write
4069000
heap
page read and write
1B8BB890000
heap
page read and write
2F50000
heap
page read and write
2A80000
trusted library section
page read and write
3F4E000
heap
page read and write
2918000
trusted library allocation
page read and write
4069000
heap
page read and write
2A90000
trusted library allocation
page read and write
58A000
stack
page read and write
490000
unkown
page read and write
400A000
heap
page read and write
F5D8FB000
stack
page read and write
3FED000
heap
page read and write
4670000
direct allocation
page read and write
4347000
heap
page read and write
4023000
heap
page read and write
B8A000
heap
page read and write
9DE000
stack
page read and write
6510000
trusted library allocation
page execute and read and write
43C6000
heap
page read and write
4069000
heap
page read and write
3DC0000
heap
page read and write
474E000
direct allocation
page read and write
1C0000
heap
page read and write
3FDB000
heap
page read and write
101C000
heap
page read and write
3FED000
heap
page read and write
4D2E000
direct allocation
page read and write
3B1E000
heap
page read and write
2FDD000
trusted library allocation
page read and write
9A000
stack
page read and write
2CF3000
heap
page read and write
54AB000
trusted library allocation
page read and write
A10000
heap
page read and write
401000
unkown
page execute read
89F000
stack
page read and write
4069000
heap
page read and write
15E000
stack
page read and write
3F94000
heap
page read and write
3064000
heap
page read and write
B8E000
heap
page read and write
3B83000
trusted library allocation
page read and write
A3E000
stack
page read and write
45B0000
direct allocation
page read and write
43C6000
heap
page read and write
3FA7000
heap
page read and write
679E000
stack
page read and write
8B4000
stack
page read and write
F5D5FD000
stack
page read and write
3F4E000
heap
page read and write
400000
unkown
page readonly
440C000
heap
page read and write
3FDB000
heap
page read and write
2BF0000
heap
page read and write
2FE0000
direct allocation
page read and write
4010000
heap
page read and write
400000
unkown
page readonly
54E4000
trusted library allocation
page read and write
91E000
stack
page read and write
45B0000
direct allocation
page read and write
400A000
heap
page read and write
3FED000
heap
page read and write
476B000
heap
page read and write
3F94000
heap
page read and write
3FED000
heap
page read and write
3F94000
heap
page read and write
253C000
stack
page read and write
401000
unkown
page execute read
3F94000
heap
page read and write
3F28000
heap
page read and write
3F4E000
heap
page read and write
4453000
direct allocation
page read and write
3E46000
heap
page read and write
3E32000
heap
page read and write
46DD000
direct allocation
page read and write
43C0000
heap
page read and write
4580000
direct allocation
page read and write
2AE0000
trusted library allocation
page read and write
3E96000
heap
page read and write
C01000
heap
page read and write
9A000
stack
page read and write
2430000
trusted library section
page read and write
1274000
heap
page read and write
3B1F000
heap
page read and write
46A3000
direct allocation
page read and write
484D000
direct allocation
page read and write
3F95000
heap
page read and write
5ABE000
stack
page read and write
9F4000
heap
page read and write
4441000
heap
page read and write
4670000
direct allocation
page read and write
568D000
stack
page read and write
24A0000
heap
page read and write
43C6000
heap
page read and write
8DA000
heap
page read and write
8FE000
stack
page read and write
1B8BBB70000
heap
page read and write
3FDB000
heap
page read and write
400A000
heap
page read and write
38BA000
heap
page read and write
3B0F000
stack
page read and write
4069000
heap
page read and write
3E39000
heap
page read and write
4533000
direct allocation
page read and write
3F3F000
heap
page read and write
400000
unkown
page readonly
3F95000
heap
page read and write
550F000
stack
page read and write
49F0000
direct allocation
page read and write
54F0000
trusted library allocation
page read and write
639E000
stack
page read and write
3FDB000
heap
page read and write
3045000
heap
page read and write
1630000
heap
page read and write
164E000
stack
page read and write
100000
heap
page read and write
2DAC000
heap
page read and write
4050000
heap
page read and write
2A60000
heap
page read and write
2F61000
trusted library allocation
page read and write
5810000
heap
page read and write
4023000
heap
page read and write
B50000
heap
page read and write
4023000
heap
page read and write
1625000
heap
page read and write
43C6000
heap
page read and write
3F30000
heap
page read and write
43F6000
heap
page read and write
3FED000
heap
page read and write
440C000
heap
page read and write
4580000
direct allocation
page read and write
3FA7000
heap
page read and write
1B8BB7F0000
heap
page read and write
3DFC000
heap
page read and write
4720000
direct allocation
page read and write
28CF000
stack
page read and write
400000
system
page execute and read and write
268E000
stack
page read and write
3FED000
heap
page read and write
1710000
direct allocation
page read and write
4720000
direct allocation
page read and write
3F94000
heap
page read and write
2ABD000
trusted library allocation
page execute and read and write
3FDB000
heap
page read and write
3FED000
heap
page read and write
24FE000
stack
page read and write
4CB9000
direct allocation
page read and write
4023000
heap
page read and write
A00000
heap
page read and write
38B0000
direct allocation
page read and write
3F4D000
heap
page read and write
19E000
stack
page read and write
3F4E000
heap
page read and write
3F3E000
heap
page read and write
2BDC000
stack
page read and write
8C0000
heap
page read and write
A0E000
stack
page read and write
3FED000
heap
page read and write
4A7000
unkown
page read and write
3FED000
heap
page read and write
5020000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
3FDB000
heap
page read and write
43C6000
heap
page read and write
42B8000
heap
page read and write
6950000
trusted library allocation
page read and write
AA1000
heap
page read and write
4583000
direct allocation
page read and write
4023000
heap
page read and write
48BE000
direct allocation
page read and write
1C5000
heap
page read and write
440C000
heap
page read and write
4050000
heap
page read and write
3F27000
heap
page execute and read and write
400A000
heap
page read and write
63F0000
trusted library allocation
page read and write
422000
system
page execute and read and write
3F94000
heap
page read and write
F5D3FF000
stack
page read and write
15FE000
stack
page read and write
4069000
heap
page read and write
988000
heap
page read and write
4023000
heap
page read and write
440C000
heap
page read and write
2C08000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page execute and read and write
119E000
stack
page read and write
3F94000
heap
page read and write
4069000
heap
page read and write
4AB000
unkown
page readonly
FC8000
heap
page read and write
3F4E000
heap
page read and write
3DC3000
heap
page read and write
3FDB000
heap
page read and write
9EE000
stack
page read and write
56DC000
stack
page read and write
482000
unkown
page readonly
1BE000
stack
page read and write
2B70000
heap
page read and write
C31000
heap
page read and write
2A7D000
trusted library allocation
page read and write
8B4000
stack
page read and write
135E000
stack
page read and write
400A000
heap
page read and write
4448000
heap
page read and write
479E000
direct allocation
page read and write
3FA7000
heap
page read and write
BB0000
heap
page read and write
4050000
heap
page read and write
3F94000
heap
page read and write
426000
system
page execute and read and write
4069000
heap
page read and write
4B13000
direct allocation
page read and write
4050000
heap
page read and write
2B3B000
trusted library allocation
page read and write
3E83000
heap
page read and write
4408000
heap
page read and write
484D000
direct allocation
page read and write
400000
unkown
page readonly
9A000
stack
page read and write
3E25000
heap
page read and write
EE5000
heap
page read and write
3FA7000
heap
page read and write
3F4E000
heap
page read and write
3F4E000
heap
page read and write
4069000
heap
page read and write
3EE5000
heap
page read and write
4023000
heap
page read and write
43C6000
heap
page read and write
3CF0000
heap
page read and write
490000
unkown
page read and write
2FFF000
stack
page read and write
89F000
stack
page read and write
1BE000
stack
page read and write
4009000
heap
page read and write
3DCB000
heap
page read and write
3F3B000
heap
page read and write
5190000
heap
page read and write
3FED000
heap
page read and write
474E000
direct allocation
page read and write
159F000
stack
page read and write
440C000
heap
page read and write
1B8BBB75000
heap
page read and write
4023000
heap
page read and write
3FA7000
heap
page read and write
4069000
heap
page read and write
8B4000
stack
page read and write
120F000
stack
page read and write
3F95000
heap
page read and write
401000
unkown
page execute read
6500000
heap
page read and write
659F000
stack
page read and write
46DD000
direct allocation
page read and write
2F20000
heap
page read and write
4580000
direct allocation
page read and write
3FA6000
heap
page read and write
440C000
heap
page read and write
4849000
direct allocation
page read and write
490000
unkown
page read and write
FF0000
heap
page read and write
A10000
heap
page read and write
3E0E000
heap
page read and write
3F18000
heap
page read and write
472D000
direct allocation
page read and write
2EFE000
stack
page read and write
3FDB000
heap
page read and write
46DD000
direct allocation
page read and write
440C000
heap
page read and write
2454000
trusted library allocation
page read and write
3CB0000
heap
page read and write
4AB000
unkown
page readonly
3B1A000
heap
page read and write
45B0000
direct allocation
page read and write
432F000
heap
page read and write
3F3A000
heap
page execute and read and write
4799000
direct allocation
page read and write
490000
unkown
page write copy
B40000
trusted library section
page read and write
4069000
heap
page read and write
3E83000
heap
page read and write
1700000
heap
page read and write
6A0D000
stack
page read and write
990000
heap
page read and write
2480000
trusted library allocation
page read and write
106D000
heap
page read and write
2C75000
heap
page read and write
3F4E000
heap
page read and write
3F94000
heap
page read and write
2AE5000
trusted library allocation
page execute and read and write
504C000
heap
page read and write
15DE000
stack
page read and write
4069000
heap
page read and write
3F4E000
heap
page read and write
3F4E000
heap
page read and write
3FED000
heap
page read and write
110000
heap
page read and write
4CB9000
direct allocation
page read and write
A35000
heap
page read and write
3F4E000
heap
page read and write
3EC7000
heap
page read and write
9A000
stack
page read and write
675E000
stack
page read and write
3FC2000
heap
page read and write
3FB0000
heap
page read and write
3BF0000
heap
page read and write
2550000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
4372000
heap
page read and write
4583000
direct allocation
page read and write
1E0000
heap
page read and write
6290000
trusted library allocation
page read and write
3FED000
heap
page read and write
A99000
heap
page read and write
3F4E000
heap
page read and write
4799000
direct allocation
page read and write
3B28000
heap
page read and write
3F40000
heap
page read and write
4050000
heap
page read and write
A98000
heap
page read and write
970000
heap
page read and write
4BBE000
stack
page read and write
54A6000
trusted library allocation
page read and write
440C000
heap
page read and write
4600000
direct allocation
page read and write
62A4000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
3E8B000
heap
page read and write
5580000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
7030000
heap
page read and write
3F4E000
heap
page read and write
3FC0000
heap
page read and write
3E01000
heap
page read and write
2AD0000
trusted library allocation
page read and write
B3E000
stack
page read and write
3F95000
heap
page read and write
43C6000
heap
page read and write
8AF000
stack
page read and write
43C6000
heap
page read and write
2B00000
trusted library allocation
page read and write
480E000
direct allocation
page read and write
A18000
heap
page read and write
3F61000
trusted library allocation
page read and write
1659000
heap
page read and write
4069000
heap
page read and write
2A6A000
trusted library allocation
page read and write
440C000
heap
page read and write
3FC2000
heap
page read and write
3EDA000
heap
page read and write
4AB000
unkown
page readonly
3FA7000
heap
page read and write
A70000
heap
page read and write
482000
unkown
page readonly
4023000
heap
page read and write
3F2C000
heap
page read and write
440C000
heap
page read and write
2ACD000
trusted library allocation
page execute and read and write
4022000
heap
page read and write
43C6000
heap
page read and write
978000
heap
page read and write
43C6000
heap
page read and write
4288000
heap
page read and write
54A0000
trusted library allocation
page read and write
100000
heap
page read and write
4023000
heap
page read and write
1770000
heap
page read and write
4B90000
direct allocation
page read and write
43C6000
heap
page read and write
400000
unkown
page readonly
440C000
heap
page read and write
484D000
direct allocation
page read and write
93E000
stack
page read and write
3FDB000
heap
page read and write
43C6000
heap
page read and write
8DE000
heap
page read and write
3040000
heap
page read and write
5046000
heap
page read and write
2BF0000
heap
page read and write
999000
heap
page read and write
3E12000
heap
page read and write
1730000
heap
page read and write
3DBE000
heap
page read and write
6920000
trusted library allocation
page read and write
3FA7000
heap
page read and write
A04000
heap
page read and write
3F95000
heap
page read and write
1380000
heap
page read and write
626E000
stack
page read and write
3E0F000
heap
page read and write
4AB000
unkown
page readonly
54AE000
trusted library allocation
page read and write
3E20000
heap
page read and write
1B8BB880000
heap
page read and write
4720000
direct allocation
page read and write
3F95000
heap
page read and write
440C000
heap
page read and write
9A000
stack
page read and write
3F95000
heap
page read and write
4AB000
unkown
page readonly
6760000
trusted library allocation
page read and write
43C6000
heap
page read and write
4069000
heap
page read and write
440C000
heap
page read and write
3F94000
heap
page read and write
1B8BBB7E000
heap
page read and write
4431000
heap
page read and write
46A3000
direct allocation
page read and write
4600000
direct allocation
page read and write
6A4F000
stack
page read and write
307F000
stack
page read and write
558E000
trusted library allocation
page read and write
8AF000
stack
page read and write
4222000
heap
page read and write
1634000
heap
page read and write
44F7000
heap
page read and write
2B5E000
stack
page read and write
170000
heap
page read and write
C4A000
heap
page read and write
3EFA000
heap
page read and write
4069000
heap
page read and write
482000
unkown
page readonly
4494000
direct allocation
page read and write
564E000
stack
page read and write
440D000
heap
page read and write
400A000
heap
page read and write
2560000
heap
page read and write
4330000
direct allocation
page read and write
2470000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page execute and read and write
46A3000
direct allocation
page read and write
2CE0000
trusted library allocation
page read and write
3F95000
heap
page read and write
43C6000
heap
page read and write
440C000
heap
page read and write
4A7000
unkown
page read and write
3F94000
heap
page read and write
A3A000
heap
page read and write
3FDB000
heap
page read and write
C0A000
heap
page read and write
43C0000
direct allocation
page read and write
4D2E000
direct allocation
page read and write
400A000
heap
page read and write
4340000
direct allocation
page read and write
3F95000
heap
page read and write
3CC0000
heap
page read and write
3E22000
heap
page read and write
4236000
heap
page read and write
4580000
direct allocation
page read and write
482000
unkown
page readonly
43C6000
heap
page read and write
3FED000
heap
page read and write
3BAF000
stack
page read and write
1700000
heap
page read and write
7F9A0000
trusted library allocation
page execute and read and write
3EE1000
heap
page read and write
3F94000
heap
page read and write
401000
unkown
page execute read
3F95000
heap
page read and write
900000
heap
page read and write
4050000
heap
page read and write
3FED000
heap
page read and write
4849000
direct allocation
page read and write
126F000
stack
page read and write
5E9B000
stack
page read and write
246D000
trusted library allocation
page execute and read and write
8FE000
stack
page read and write
58E0000
heap
page read and write
3F94000
heap
page read and write
3FDB000
heap
page read and write
4023000
heap
page read and write
371E000
stack
page read and write
44F7000
heap
page read and write
3F4C000
heap
page read and write
C35000
heap
page read and write
3FA7000
heap
page read and write
2FC0000
heap
page read and write
135000
heap
page read and write
8AF000
stack
page read and write
2AB0000
heap
page read and write
3FDB000
heap
page read and write
3FC1000
heap
page execute and read and write
3F95000
heap
page read and write
99C000
heap
page read and write
2D1F000
heap
page read and write
2580000
heap
page read and write
440C000
heap
page read and write
3FED000
heap
page read and write
3FED000
heap
page read and write
400000
unkown
page readonly
C0E000
heap
page read and write
3F95000
heap
page read and write
400A000
heap
page read and write
437E000
heap
page read and write
6930000
trusted library allocation
page read and write
3F95000
heap
page read and write
67DE000
stack
page read and write
2CDE000
stack
page read and write
3B42000
heap
page read and write
49F0000
direct allocation
page read and write
593E000
stack
page read and write
3FDB000
heap
page read and write
2A56000
trusted library allocation
page read and write
42FC000
heap
page read and write
3FED000
heap
page read and write
440C000
heap
page read and write
4AB000
unkown
page readonly
100000
heap
page read and write
401000
unkown
page execute read
163F000
stack
page read and write
435B000
heap
page read and write
4050000
heap
page read and write
5A7E000
stack
page read and write
2F9A000
trusted library allocation
page read and write
64FD000
trusted library allocation
page read and write
479E000
direct allocation
page read and write
2D5F000
heap
page read and write
440C000
heap
page read and write
95E000
stack
page read and write
7F090000
trusted library allocation
page execute and read and write
4069000
heap
page read and write
1B8BB7C0000
heap
page read and write
3FA7000
heap
page read and write
4069000
heap
page read and write
62A0000
trusted library allocation
page read and write
669E000
stack
page read and write
4410000
direct allocation
page read and write
3FA7000
heap
page read and write
505E000
stack
page read and write
43C6000
heap
page read and write
3E40000
heap
page read and write
3FED000
heap
page read and write
F5D6FE000
stack
page read and write
89F000
stack
page read and write
3FDB000
heap
page read and write
50E8000
heap
page read and write
16B0000
heap
page read and write
3E06000
heap
page read and write
4FFE000
stack
page read and write
2B6E000
stack
page read and write
4580000
direct allocation
page read and write
3F06000
heap
page read and write
3E1C000
heap
page read and write
43BC000
heap
page read and write
3FA7000
heap
page read and write
4023000
heap
page read and write
4A7000
unkown
page read and write
26B0000
trusted library allocation
page read and write
4022000
heap
page read and write
3FB9000
heap
page read and write
4400000
direct allocation
page read and write
3FDB000
heap
page read and write
3FA7000
heap
page read and write
3F4D000
heap
page read and write
3FA7000
heap
page read and write
54CD000
trusted library allocation
page read and write
3B2E000
heap
page read and write
3EE5000
heap
page read and write
3FED000
heap
page read and write
3F95000
heap
page read and write
43C6000
heap
page read and write
440C000
heap
page read and write
43C6000
heap
page read and write
46A3000
direct allocation
page read and write
3EA0000
heap
page read and write
110000
heap
page read and write
2B80000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
554D000
stack
page read and write
490000
unkown
page read and write
A30000
heap
page read and write
4849000
direct allocation
page read and write
48BE000
direct allocation
page read and write
3E90000
heap
page read and write
3FA7000
heap
page read and write
4069000
heap
page read and write
4069000
heap
page read and write
FC0000
heap
page read and write
3FA7000
heap
page read and write
3F95000
heap
page read and write
970000
heap
page read and write
1B8BB92D000
heap
page read and write
980000
heap
page read and write
400000
unkown
page readonly
3060000
heap
page read and write
2B90000
heap
page read and write
980000
heap
page read and write
46D9000
direct allocation
page read and write
3FDB000
heap
page read and write
15A0000
heap
page read and write
4330000
direct allocation
page read and write
90D000
heap
page read and write
8D0000
heap
page read and write
2B03000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
3EEE000
heap
page read and write
3F94000
heap
page read and write
1028000
heap
page read and write
8B4000
stack
page read and write
4023000
heap
page read and write
490000
unkown
page write copy
100000
heap
page read and write
3F2B000
heap
page read and write
3FDB000
heap
page read and write
3F94000
heap
page read and write
4023000
heap
page read and write
482000
unkown
page readonly
3F94000
heap
page read and write
9A5000
heap
page read and write
431B000
heap
page read and write
3F4E000
heap
page read and write
2463000
trusted library allocation
page read and write
3FBD000
heap
page read and write
4AB000
unkown
page readonly
3FA7000
heap
page read and write
4015000
heap
page read and write
3FA7000
heap
page read and write
3E16000
heap
page read and write
4000000
heap
page read and write
2482000
trusted library allocation
page read and write
587B000
heap
page read and write
3FA7000
heap
page read and write
54BE000
trusted library allocation
page read and write
3F4E000
heap
page read and write
3EA2000
heap
page read and write
B58000
heap
page read and write
4069000
heap
page read and write
3FA7000
heap
page read and write
1700000
heap
page read and write
3FED000
heap
page read and write
3FB3000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
9A000
stack
page read and write
42FE000
heap
page read and write
4246000
heap
page read and write
472D000
direct allocation
page read and write
3F95000
heap
page read and write
C3C000
heap
page read and write
3F4E000
heap
page read and write
3F4E000
heap
page read and write
E30000
heap
page read and write
3FDB000
heap
page read and write
4023000
heap
page read and write
150000
heap
page read and write
400A000
heap
page read and write
50A3000
heap
page read and write
3FDB000
heap
page read and write
1D5000
heap
page read and write
2FC4000
heap
page read and write
AA1000
heap
page read and write
4B90000
direct allocation
page read and write
4069000
heap
page read and write
3E78000
heap
page read and write
4720000
direct allocation
page read and write
3EEB000
heap
page read and write
5030000
heap
page execute and read and write
6970000
trusted library allocation
page read and write
3F95000
heap
page read and write
4069000
heap
page read and write
37AE000
stack
page read and write
54C6000
trusted library allocation
page read and write
3FC5000
heap
page read and write
89F000
stack
page read and write
2AB0000
trusted library allocation
page read and write
3FDB000
heap
page read and write
43C6000
heap
page read and write
482000
unkown
page readonly
5060000
heap
page read and write
2A5B000
trusted library allocation
page read and write
401000
unkown
page execute read
17E000
stack
page read and write
611F000
stack
page read and write
3F4A000
heap
page read and write
2FA3000
trusted library allocation
page read and write
6957000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page execute and read and write
43C6000
heap
page read and write
2476000
trusted library allocation
page execute and read and write
89F000
stack
page read and write
9B1000
heap
page read and write
3FA7000
heap
page read and write
401000
unkown
page execute read
440C000
heap
page read and write
A40000
heap
page read and write
665E000
stack
page read and write
4670000
direct allocation
page read and write
4023000
heap
page read and write
3F94000
heap
page read and write
6960000
trusted library allocation
page read and write
A78000
heap
page read and write
3F4E000
heap
page read and write
26C3000
heap
page read and write
3E9B000
heap
page read and write
26A0000
trusted library allocation
page read and write
373E000
stack
page read and write
3FED000
heap
page read and write
440C000
heap
page read and write
A42000
heap
page read and write
479D000
direct allocation
page read and write
4069000
heap
page read and write
54E6000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
4069000
heap
page read and write
482000
unkown
page readonly
123F000
stack
page read and write
3F94000
heap
page read and write
400A000
heap
page read and write
3E14000
heap
page read and write
2AD6000
trusted library allocation
page execute and read and write
440C000
heap
page read and write
2CF0000
heap
page read and write
135000
heap
page read and write
3FA7000
heap
page read and write
3FDB000
heap
page read and write
3F5F000
heap
page read and write
3F3E000
heap
page read and write
415F000
stack
page read and write
2AD2000
trusted library allocation
page read and write
43C6000
heap
page read and write
370E000
stack
page read and write
2AC0000
trusted library allocation
page read and write
A42000
heap
page read and write
117F000
stack
page read and write
1620000
heap
page read and write
1B8BBB7C000
heap
page read and write
2A71000
trusted library allocation
page read and write
490000
unkown
page write copy
4AB000
unkown
page readonly
3F94000
heap
page read and write
4050000
heap
page read and write
4023000
heap
page read and write
2A50000
trusted library allocation
page read and write
4023000
heap
page read and write
4849000
direct allocation
page read and write
3DC9000
heap
page read and write
3F95000
heap
page read and write
401000
unkown
page execute read
2453000
trusted library allocation
page execute and read and write
1C0000
heap
page read and write
3D5F000
stack
page read and write
4460000
direct allocation
page read and write
3F4E000
heap
page read and write
3E8B000
heap
page read and write
6940000
trusted library allocation
page read and write
4023000
heap
page read and write
4849000
direct allocation
page read and write
67A0000
heap
page read and write
160E000
stack
page read and write
2A10000
heap
page read and write
4410000
direct allocation
page read and write
4069000
heap
page read and write
AC9000
stack
page read and write
3F95000
heap
page read and write
440C000
heap
page read and write
2A62000
trusted library allocation
page read and write
401000
unkown
page execute read
2900000
heap
page read and write
29EE000
stack
page read and write
43C6000
heap
page read and write
4431000
heap
page read and write
3ED4000
heap
page read and write
3F94000
heap
page read and write
4720000
direct allocation
page read and write
400000
unkown
page readonly
4AB000
unkown
page readonly
50ED000
heap
page read and write
6A30000
heap
page read and write
3DC6000
heap
page read and write
440C000
heap
page read and write
3F95000
heap
page read and write
46D9000
direct allocation
page read and write
3F95000
heap
page read and write
F5CEFA000
stack
page read and write
3FDB000
heap
page read and write
502D000
trusted library allocation
page read and write
4000000
heap
page read and write
3B3F000
stack
page read and write
2B10000
trusted library allocation
page read and write
162E000
stack
page read and write
3FA7000
heap
page read and write
2A6E000
trusted library allocation
page read and write
3F5E000
heap
page read and write
3FA7000
heap
page read and write
3FDB000
heap
page read and write
4023000
heap
page read and write
1E0000
heap
page read and write
2BB4000
heap
page read and write
2FD5000
heap
page read and write
3DC0000
heap
page read and write
1720000
heap
page read and write
3F4E000
heap
page read and write
43B0000
direct allocation
page read and write
480E000
direct allocation
page read and write
2540000
trusted library allocation
page execute and read and write
3F94000
heap
page read and write
8B4000
stack
page read and write
3FA7000
heap
page read and write
89F000
stack
page read and write
53CC000
stack
page read and write
2485000
trusted library allocation
page execute and read and write
440C000
heap
page read and write
3F94000
heap
page read and write
3FDB000
heap
page read and write
490000
unkown
page write copy
3FED000
heap
page read and write
4069000
heap
page read and write
440C000
heap
page read and write
3F09000
heap
page read and write
43C6000
heap
page read and write
4AB000
unkown
page readonly
4069000
heap
page read and write
3FA7000
heap
page read and write
4160000
heap
page read and write
3FDB000
heap
page read and write
3FED000
heap
page read and write
4441000
heap
page read and write
484D000
direct allocation
page read and write
4533000
direct allocation
page read and write
4720000
direct allocation
page read and write
4023000
heap
page read and write
4023000
heap
page read and write
4069000
heap
page read and write
440C000
heap
page read and write
540E000
stack
page read and write
3D40000
heap
page read and write
5500000
heap
page execute and read and write
3FDB000
heap
page read and write
3E16000
heap
page read and write
FFA000
heap
page read and write
3FA7000
heap
page read and write
3F4E000
heap
page read and write
3FDB000
heap
page read and write
46D9000
direct allocation
page read and write
3F6D000
heap
page read and write
4358000
heap
page read and write
37C4000
heap
page read and write
444A000
heap
page read and write
437E000
heap
page read and write
1032000
heap
page read and write
1C0000
heap
page read and write
64F0000
trusted library allocation
page read and write
400000
unkown
page readonly
24B0000
trusted library allocation
page read and write
1679000
heap
page read and write
482000
unkown
page readonly
43C6000
heap
page read and write
3FDB000
heap
page read and write
4580000
direct allocation
page read and write
3FA7000
heap
page read and write
1680000
heap
page read and write
3F94000
heap
page read and write
4050000
heap
page read and write
482000
unkown
page readonly
3FDB000
heap
page read and write
440C000
heap
page read and write
54FE000
trusted library allocation
page read and write
3FA7000
heap
page read and write
46A3000
direct allocation
page read and write
400000
unkown
page readonly
2B10000
heap
page read and write
247A000
trusted library allocation
page execute and read and write
692C000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page execute and read and write
4360000
heap
page read and write
615E000
stack
page read and write
400000
unkown
page readonly
3F4E000
heap
page read and write
3F94000
heap
page read and write
440C000
heap
page read and write
3FED000
heap
page read and write
484D000
direct allocation
page read and write
4069000
heap
page read and write
3D30000
heap
page read and write
423E000
heap
page read and write
43C5000
heap
page read and write
3F4C000
heap
page read and write
2AC1000
trusted library allocation
page read and write
3EA4000
heap
page read and write
4670000
direct allocation
page read and write
43C6000
heap
page read and write
4729000
direct allocation
page read and write
479D000
direct allocation
page read and write
95E000
stack
page read and write
3FED000
heap
page read and write
479D000
direct allocation
page read and write
437E000
heap
page read and write
26C0000
heap
page read and write
482000
unkown
page readonly
4023000
heap
page read and write
43C6000
heap
page read and write
4729000
direct allocation
page read and write
110000
heap
page read and write
484D000
direct allocation
page read and write
6E10000
heap
page read and write
3F95000
heap
page read and write
2EE0000
heap
page read and write
3F94000
heap
page read and write
2AA0000
trusted library allocation
page read and write
A05000
heap
page read and write
3F95000
heap
page read and write
3F4E000
heap
page read and write
8AF000
stack
page read and write
100000
heap
page read and write
F5CFFF000
stack
page read and write
2B17000
heap
page read and write
3F95000
heap
page read and write
440C000
heap
page read and write
4CBD000
direct allocation
page read and write
3F4E000
heap
page read and write
6928000
trusted library allocation
page read and write
1705000
heap
page read and write
3B40000
direct allocation
page read and write
601E000
stack
page read and write
378E000
stack
page read and write
3B1F000
stack
page read and write
6A60000
heap
page read and write
3F95000
heap
page read and write
4023000
heap
page read and write
3F95000
heap
page read and write
3F4E000
heap
page read and write
3F94000
heap
page read and write
3BB2000
heap
page read and write
3F95000
heap
page read and write
3F4E000
heap
page read and write
3FC2000
heap
page read and write
3F95000
heap
page read and write
2B3D000
trusted library allocation
page read and write
1580000
heap
page read and write
549E000
stack
page read and write
4849000
direct allocation
page read and write
3FDB000
heap
page read and write
8F8000
stack
page read and write
4018000
heap
page read and write
3F95000
heap
page read and write
4023000
heap
page read and write
1F0000
heap
page read and write
490000
unkown
page write copy
5A3E000
stack
page read and write
4023000
heap
page read and write
2472000
trusted library allocation
page read and write
3E47000
heap
page read and write
3FDB000
heap
page read and write
3FB9000
heap
page read and write
4533000
direct allocation
page read and write
166E000
stack
page read and write
401000
unkown
page execute read
4023000
trusted library allocation
page read and write
F5D7FE000
stack
page read and write
3F06000
heap
page read and write
9F0000
heap
page read and write
3FA7000
heap
page read and write
3DF8000
heap
page read and write
4463000
direct allocation
page read and write
3F95000
heap
page read and write
4050000
heap
page read and write
43F1000
heap
page read and write
56E0000
trusted library allocation
page execute and read and write
3FED000
heap
page read and write
3B27000
heap
page read and write
4CBD000
direct allocation
page read and write
2450000
trusted library allocation
page read and write
3F95000
heap
page read and write
3DB0000
heap
page read and write
1B8BB8C6000
heap
page read and write
43C6000
heap
page read and write
1B8BB8F4000
heap
page read and write
5F0000
heap
page read and write
6910000
trusted library allocation
page execute and read and write
400A000
heap
page read and write
440C000
heap
page read and write
6934000
trusted library allocation
page read and write
901000
heap
page read and write
56D0000
heap
page read and write
43C6000
heap
page read and write
63E0000
trusted library allocation
page read and write
3F94000
heap
page read and write
2BA0000
direct allocation
page read and write
401000
unkown
page execute read
4023000
heap
page read and write
3FA7000
heap
page read and write
3FDB000
heap
page read and write
3F4E000
heap
page read and write
EE0000
heap
page read and write
625E000
stack
page read and write
3FED000
heap
page read and write
52CC000
stack
page read and write
2A76000
trusted library allocation
page read and write
245D000
trusted library allocation
page execute and read and write
400A000
heap
page read and write
4463000
direct allocation
page read and write
3FA7000
heap
page read and write
3F5F000
heap
page read and write
3FED000
heap
page read and write
479E000
direct allocation
page read and write
440C000
heap
page read and write
3EE5000
heap
page read and write
4A7000
unkown
page read and write
4340000
direct allocation
page read and write
1B0000
heap
page read and write
3FED000
heap
page read and write
400000
unkown
page readonly
2A90000
trusted library section
page read and write
37BE000
stack
page read and write
48BE000
direct allocation
page read and write
2B70000
heap
page execute and read and write
2FB0000
trusted library allocation
page read and write
630D000
stack
page read and write
4B13000
direct allocation
page read and write
3F94000
heap
page read and write
F5D0FF000
stack
page read and write
43C6000
heap
page read and write
4060000
trusted library allocation
page read and write
3E6B000
heap
page read and write
400A000
heap
page read and write
57DC000
stack
page read and write
42F1000
heap
page read and write
43C6000
heap
page read and write
3DB0000
heap
page read and write
6A50000
trusted library allocation
page execute and read and write
48BE000
direct allocation
page read and write
3F94000
heap
page read and write
4358000
heap
page read and write
4050000
heap
page read and write
401A000
heap
page read and write
17E000
stack
page read and write
F5D2FF000
stack
page read and write
4023000
heap
page read and write
3F4E000
heap
page read and write
3F94000
heap
page read and write
3FED000
heap
page read and write
2A5E000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
490000
unkown
page write copy
482000
unkown
page readonly
62B0000
trusted library allocation
page execute and read and write
9CE000
stack
page read and write
164F000
heap
page read and write
1B8BB7D0000
heap
page read and write
130000
heap
page read and write
2487000
trusted library allocation
page execute and read and write
C1F000
heap
page read and write
4460000
direct allocation
page read and write
4022000
heap
page read and write
5800000
heap
page read and write
3F94000
heap
page read and write
4069000
heap
page read and write
B80000
heap
page read and write
4023000
heap
page read and write
4069000
heap
page read and write
8AF000
stack
page read and write
3EF0000
heap
page read and write
950000
heap
page read and write
2440000
trusted library allocation
page read and write
24A6000
heap
page read and write
55A0000
heap
page read and write
3F94000
heap
page read and write
3F94000
heap
page read and write
242E000
stack
page read and write
14E000
stack
page read and write
4023000
heap
page read and write
3E7D000
heap
page read and write
13FF000
stack
page read and write
4023000
heap
page read and write
6298000
trusted library allocation
page read and write
C00000
heap
page read and write
445000
system
page execute and read and write
3F4E000
heap
page read and write
472D000
direct allocation
page read and write
2FDB000
trusted library allocation
page read and write
4453000
direct allocation
page read and write
4AB000
unkown
page readonly
440C000
heap
page read and write
3FB8000
heap
page execute and read and write
3FED000
heap
page read and write
3E23000
heap
page read and write
68DE000
stack
page read and write
4A7000
unkown
page read and write
4023000
heap
page read and write
3FDB000
heap
page read and write
482000
unkown
page readonly
3F4C000
heap
page read and write
There are 1193 hidden memdumps, click here to show them.