IOC Report
AWkpqJMxci.exe

loading gif

Files

File Path
Type
Category
Malicious
AWkpqJMxci.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Bzaszylr.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Bzaszylr.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Bzaszylr
data
dropped
malicious
C:\Users\Public\Libraries\Bzaszylr.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\rlyzsazB.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AWkpqJMxci.exe
"C:\Users\user\Desktop\AWkpqJMxci.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\rlyzsazB.cmd" "
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\AWkpqJMxci.exe /d C:\\Users\\Public\\Libraries\\Bzaszylr.PIF /o
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\xpha.pif
C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
malicious
C:\Users\Public\Libraries\Bzaszylr.PIF
"C:\Users\Public\Libraries\Bzaszylr.PIF"
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Users\Public\Libraries\Bzaszylr.PIF
"C:\Users\Public\Libraries\Bzaszylr.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
ogcmaw.duckdns.org
malicious
emberluck.duckdns.org
malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://geoplugin.net/json.gp
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://geoplugin.net/json.gp/C
unknown
https://drive.usercontent.google.com/download?id=1K_zVl3JVaxBaP1lXOhZSCueAU9P7Lpb0?
unknown
https://drive.usercontent.google.com/download?id=1K_zVl3JVaxBaP1lXOhZSCueAU9P7Lpb0
142.250.181.33
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://drive.usercontent.google.com/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
https://drive.usercontent.google.com:443/download?id=1K_zVl3JVaxBaP1lXOhZSCueAU9P7Lpb0x
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ogcmaw.duckdns.org
162.216.243.15
malicious
emberluck.duckdns.org
192.169.69.26
malicious
bg.microsoft.map.fastly.net
199.232.210.172
drive.usercontent.google.com
142.250.181.33

IPs

IP
Domain
Country
Malicious
192.169.69.26
emberluck.duckdns.org
United States
malicious
162.216.243.15
ogcmaw.duckdns.org
United States
malicious
142.250.181.33
drive.usercontent.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Bzaszylr
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-SKG82E
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-SKG82E
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-SKG82E
time
malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles

Memdumps

Base Address
Regiontype
Protect
Malicious
27BA000
heap
page read and write
malicious
308E000
heap
page read and write
malicious
6700000
remote allocation
page execute and read and write
malicious
400000
direct allocation
page execute and read and write
malicious
308E000
heap
page read and write
malicious
2780000
heap
page read and write
malicious
5120000
remote allocation
page execute and read and write
malicious
4660000
direct allocation
page execute and read and write
malicious
DCCF000
stack
page read and write
7F020000
direct allocation
page read and write
DA2F000
stack
page read and write
2930000
heap
page read and write
E693000
heap
page read and write
695000
heap
page read and write
5FE000
stack
page read and write
33BD000
heap
page read and write
50F0000
direct allocation
page read and write
33E0000
heap
page read and write
2841000
direct allocation
page execute read
325E000
stack
page read and write
D16000
unkown
page readonly
24B3000
heap
page read and write
DCCF000
stack
page read and write
339C000
heap
page read and write
354EC000
stack
page read and write
DFA0000
remote allocation
page read and write
65C000
heap
page read and write
B01000
unkown
page execute read
2EFE000
stack
page read and write
7F460000
direct allocation
page read and write
2D5F000
stack
page read and write
770000
heap
page read and write
DF5F000
stack
page read and write
33A5000
heap
page read and write
33BD000
heap
page read and write
344E000
heap
page read and write
321F000
stack
page read and write
2230000
heap
page read and write
225B000
direct allocation
page read and write
29BB000
direct allocation
page execute and read and write
33BD000
heap
page read and write
2788000
heap
page read and write
6D0000
heap
page read and write
6DE000
stack
page read and write
4FC0000
trusted library allocation
page read and write
33D1000
heap
page read and write
ABD000
stack
page read and write
D7AA000
stack
page read and write
33A3000
heap
page read and write
7AE000
heap
page read and write
3300000
heap
page read and write
33D1000
heap
page read and write
1EA000
stack
page read and write
DF60000
heap
page read and write
33E1000
heap
page read and write
33D1000
heap
page read and write
3270000
heap
page read and write
B01000
unkown
page execute read
32C0000
heap
page read and write
E3EC000
heap
page read and write
33C9000
heap
page read and write
33BD000
heap
page read and write
3192000
heap
page read and write
840000
heap
page read and write
7EB9F000
direct allocation
page read and write
4FB000
heap
page read and write
E070000
trusted library allocation
page read and write
B4A000
unkown
page readonly
B2E000
unkown
page read and write
33BD000
heap
page read and write
630000
heap
page read and write
E7E8000
direct allocation
page read and write
E664000
heap
page read and write
380000
heap
page read and write
2290000
heap
page read and write
73E000
heap
page read and write
735000
heap
page read and write
3060000
heap
page read and write
7FB70000
direct allocation
page read and write
27D0000
heap
page read and write
2650000
heap
page read and write
B4A000
unkown
page readonly
B00000
unkown
page readonly
B2E000
unkown
page write copy
362F000
stack
page read and write
E070000
trusted library allocation
page read and write
33BE000
heap
page read and write
67E000
stack
page read and write
33BD000
heap
page read and write
B2E000
unkown
page write copy
241D000
direct allocation
page read and write
2DA0000
heap
page read and write
48F0000
heap
page read and write
2DF0000
heap
page read and write
21D0000
heap
page read and write
B0A000
heap
page read and write
B4E000
unkown
page readonly
362F000
stack
page read and write
DF72000
heap
page read and write
B4A000
unkown
page readonly
7EFEF000
direct allocation
page read and write
33A4000
heap
page read and write
5440000
trusted library allocation
page read and write
E69D000
heap
page read and write
B2E000
unkown
page read and write
33BD000
heap
page read and write
92F000
stack
page read and write
67E000
stack
page read and write
D661000
direct allocation
page read and write
AEE000
stack
page read and write
33BD000
heap
page read and write
9B000
stack
page read and write
860000
heap
page read and write
DBCE000
stack
page read and write
23F3000
direct allocation
page read and write
23D0000
heap
page read and write
3036000
heap
page read and write
2790000
heap
page read and write
B4A000
unkown
page readonly
33BD000
heap
page read and write
4B57000
heap
page read and write
7ECA0000
direct allocation
page read and write
1F0000
heap
page read and write
2BC0000
heap
page read and write
22A3000
direct allocation
page read and write
2918000
heap
page read and write
33BD000
heap
page read and write
7FCA0000
direct allocation
page read and write
9B000
stack
page read and write
E620000
heap
page read and write
33A3000
heap
page read and write
D63D000
direct allocation
page read and write
7F130000
direct allocation
page read and write
33A3000
heap
page read and write
B01000
unkown
page execute read
D60000
heap
page read and write
73A000
heap
page read and write
527000
unkown
page read and write
88D000
stack
page read and write
33A4000
heap
page read and write
7EBC0000
direct allocation
page read and write
E12E000
stack
page read and write
478000
direct allocation
page execute and read and write
2306000
heap
page read and write
33BE000
heap
page read and write
50DE000
stack
page read and write
2F6D000
stack
page read and write
33A4000
heap
page read and write
4AFB000
stack
page read and write
63A000
heap
page read and write
5E00000
trusted library allocation
page read and write
808000
heap
page read and write
D63C000
direct allocation
page read and write
AF8000
heap
page read and write
65C000
heap
page read and write
5C0000
heap
page read and write
325F000
stack
page read and write
7EF50000
direct allocation
page read and write
33A3000
heap
page read and write
33A4000
heap
page read and write
EB90000
direct allocation
page execute and read and write
7FC80000
direct allocation
page read and write
470000
heap
page read and write
D644000
direct allocation
page read and write
785000
heap
page read and write
D10000
unkown
page readonly
33A4000
heap
page read and write
B00000
unkown
page readonly
65C000
heap
page read and write
7F17A000
direct allocation
page read and write
650000
heap
page read and write
33BD000
heap
page read and write
629000
heap
page read and write
A4E000
stack
page read and write
33D1000
heap
page read and write
32B0000
heap
page read and write
D7AE000
stack
page execute and read and write
B4E000
unkown
page readonly
33BD000
heap
page read and write
D14000
unkown
page read and write
608000
heap
page read and write
DF71000
heap
page read and write
31D000
stack
page read and write
D62F000
direct allocation
page read and write
2DA5000
heap
page read and write
19D000
stack
page read and write
33D1000
heap
page read and write
2900000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
527000
unkown
page read and write
B00000
unkown
page readonly
B2E000
unkown
page write copy
33A4000
heap
page read and write
27CA000
heap
page read and write
33BD000
heap
page read and write
7C6000
heap
page read and write
D5C7000
direct allocation
page read and write
7EA10000
direct allocation
page read and write
2D8D000
stack
page read and write
2B70000
heap
page read and write
2880000
direct allocation
page readonly
308E000
heap
page read and write
368E000
stack
page read and write
DBCE000
stack
page read and write
33BD000
heap
page read and write
7F980000
direct allocation
page read and write
71F000
stack
page read and write
54E000
stack
page read and write
7E970000
direct allocation
page read and write
730000
heap
page read and write
D6C4000
direct allocation
page read and write
33C1000
heap
page read and write
780000
heap
page read and write
46D4000
direct allocation
page execute and read and write
2320000
heap
page read and write
697000
heap
page read and write
D5B0000
direct allocation
page read and write
7FCCF000
direct allocation
page read and write
D6DA000
direct allocation
page read and write
78A000
heap
page read and write
656000
heap
page read and write
33A4000
heap
page read and write
27E6000
heap
page read and write
A2F000
stack
page read and write
33BD000
heap
page read and write
2BFB000
heap
page read and write
7FE000
stack
page read and write
2293000
heap
page read and write
D6A1000
direct allocation
page read and write
A50000
heap
page read and write
228D000
direct allocation
page read and write
7AD000
heap
page read and write
7FDA0000
direct allocation
page read and write
32BB000
heap
page read and write
B01000
unkown
page execute read
7FC80000
direct allocation
page read and write
656000
heap
page read and write
645000
heap
page read and write
2D6C000
stack
page read and write
32BE000
stack
page read and write
B4E000
unkown
page readonly
B00000
unkown
page readonly
DF60000
heap
page read and write
C0F000
stack
page read and write
AF0000
heap
page read and write
DE1E000
stack
page read and write
7B9000
heap
page read and write
356E000
stack
page read and write
21F0000
direct allocation
page execute and read and write
33D0000
heap
page read and write
D7AE000
stack
page execute and read and write
4CC0000
heap
page read and write
E3E3000
heap
page read and write
B2B000
heap
page read and write
7FBBF000
direct allocation
page read and write
7F120000
direct allocation
page read and write
472E000
stack
page read and write
DF70000
heap
page read and write
28E0000
heap
page read and write
6DE000
stack
page read and write
2448000
direct allocation
page read and write
3276000
heap
page read and write
30CF000
stack
page read and write
2D30000
heap
page read and write
645000
heap
page read and write
D67D000
direct allocation
page read and write
4D00000
heap
page read and write
19D000
stack
page read and write
2408000
direct allocation
page read and write
33A3000
heap
page read and write
645000
heap
page read and write
7F270000
direct allocation
page read and write
D8EF000
stack
page read and write
33BD000
heap
page read and write
710000
heap
page read and write
27CD000
heap
page read and write
26BE000
stack
page read and write
E86F000
heap
page read and write
28C7000
direct allocation
page execute and read and write
352E000
stack
page read and write
460000
heap
page read and write
33D1000
heap
page read and write
7E990000
direct allocation
page read and write
B2E000
unkown
page write copy
35530000
heap
page read and write
E5FF000
trusted library allocation
page read and write
3549E000
stack
page read and write
324E000
stack
page read and write
22B8000
direct allocation
page read and write
2BF0000
heap
page read and write
2330000
direct allocation
page execute and read and write
DA2F000
stack
page read and write
33D0000
heap
page read and write
33BE000
heap
page read and write
22F0000
heap
page read and write
7F130000
direct allocation
page read and write
AA0000
direct allocation
page read and write
33BD000
heap
page read and write
22C0000
heap
page read and write
33A5000
heap
page read and write
33D1000
heap
page read and write
27D0000
heap
page read and write
313D000
stack
page read and write
33BE000
heap
page read and write
3170000
heap
page read and write
4F6000
heap
page read and write
600000
heap
page read and write
7FCF0000
direct allocation
page read and write
33D0000
heap
page read and write
26FF000
stack
page read and write
249B000
stack
page read and write
6F0000
heap
page read and write
697000
heap
page read and write
9DF000
stack
page read and write
33E1000
heap
page read and write
3250000
heap
page read and write
800000
heap
page read and write
3690000
heap
page read and write
B2B000
heap
page read and write
33BD000
heap
page read and write
2401000
direct allocation
page read and write
92F000
stack
page read and write
358A0000
heap
page read and write
2300000
heap
page read and write
B2B000
heap
page read and write
B4A000
unkown
page readonly
2F0F000
stack
page read and write
D7AF000
stack
page read and write
33D1000
heap
page read and write
24B0000
heap
page read and write
33BD000
heap
page read and write
33BE000
heap
page read and write
7F7000
heap
page read and write
311E000
stack
page read and write
D6AC000
stack
page read and write
33BD000
heap
page read and write
3036000
heap
page read and write
400000
unkown
page readonly
DD1E000
stack
page read and write
79F000
stack
page read and write
7FBE9000
direct allocation
page read and write
2881000
direct allocation
page execute read
D693000
direct allocation
page read and write
7E800000
direct allocation
page read and write
D67C000
direct allocation
page read and write
E3D0000
heap
page read and write
720000
heap
page read and write
33C1000
heap
page read and write
E710000
heap
page read and write
33A4000
heap
page read and write
7E970000
direct allocation
page read and write
DB6F000
stack
page read and write
2400000
direct allocation
page read and write
8A0000
heap
page read and write
730000
heap
page read and write
33E1000
heap
page read and write
E863000
heap
page read and write
29B6000
heap
page read and write
B00000
unkown
page readonly
D6BD000
direct allocation
page read and write
33D1000
heap
page read and write
481000
unkown
page read and write
2DF0000
heap
page read and write
7FCA0000
direct allocation
page read and write
338F000
stack
page read and write
6FE000
stack
page read and write
2294000
direct allocation
page read and write
B4A000
unkown
page readonly
3552E000
stack
page read and write
2BBE000
stack
page read and write
7E910000
direct allocation
page read and write
D6D3000
direct allocation
page read and write
7ECA0000
direct allocation
page read and write
D684000
direct allocation
page read and write
4FE000
stack
page read and write
27B7000
heap
page read and write
33C1000
heap
page read and write
7F460000
direct allocation
page read and write
7F340000
direct allocation
page read and write
B00000
unkown
page readonly
3D10F000
trusted library allocation
page read and write
79F000
stack
page read and write
5EF000
stack
page read and write
B4E000
unkown
page readonly
33C1000
heap
page read and write
7F1F0000
direct allocation
page read and write
465C000
stack
page read and write
B4A000
unkown
page readonly
33BD000
heap
page read and write
28B0000
heap
page read and write
DF70000
heap
page read and write
46D8000
direct allocation
page execute and read and write
33D1000
heap
page read and write
2310000
heap
page read and write
33E1000
heap
page read and write
75B000
heap
page read and write
79F000
stack
page read and write
304C000
heap
page read and write
7F1E0000
direct allocation
page read and write
D69A000
direct allocation
page read and write
B4E000
unkown
page readonly
7EC40000
direct allocation
page read and write
4F6000
heap
page read and write
33BE000
heap
page read and write
33C1000
heap
page read and write
2934000
heap
page read and write
2907000
direct allocation
page execute and read and write
75E000
stack
page read and write
35AF000
stack
page read and write
2C5F000
stack
page read and write
2BCE000
stack
page read and write
590000
heap
page read and write
D7EE000
stack
page read and write
33D1000
heap
page read and write
3410000
heap
page read and write
B0C000
heap
page read and write
3290000
heap
page read and write
500000
heap
page read and write
B01000
unkown
page execute read
3545E000
stack
page read and write
3070000
heap
page read and write
2910000
heap
page read and write
E861000
heap
page read and write
B01000
unkown
page execute read
7EBC0000
direct allocation
page read and write
8C9000
stack
page read and write
8DE000
stack
page read and write
23DD000
direct allocation
page read and write
B00000
unkown
page readonly
DA6E000
stack
page read and write
B4A000
unkown
page readonly
2887000
direct allocation
page execute and read and write
B2E000
unkown
page write copy
33BD000
heap
page read and write
D92E000
stack
page read and write
22B0000
heap
page read and write
D7AF000
stack
page read and write
7FBF0000
direct allocation
page read and write
B4A000
unkown
page readonly
D16000
unkown
page readonly
D605000
direct allocation
page read and write
B01000
unkown
page execute read
7F460000
direct allocation
page read and write
2424000
direct allocation
page read and write
481000
unkown
page read and write
7F980000
direct allocation
page read and write
B25000
heap
page read and write
47A000
stack
page read and write
7FCA0000
direct allocation
page read and write
E9F7000
heap
page read and write
4F6000
heap
page read and write
730000
heap
page read and write
E07F000
trusted library allocation
page read and write
226C000
stack
page read and write
7FB70000
direct allocation
page read and write
DFEE000
stack
page read and write
300F000
stack
page read and write
24F0000
heap
page read and write
D14000
unkown
page write copy
33BD000
heap
page read and write
481000
unkown
page write copy
33A4000
heap
page read and write
27BC000
heap
page read and write
B4E000
unkown
page readonly
2675000
heap
page read and write
DE5E000
stack
page read and write
33D1000
heap
page read and write
5AE000
stack
page read and write
DFA0000
remote allocation
page read and write
59E000
stack
page read and write
33BD000
heap
page read and write
297B000
direct allocation
page execute and read and write
2350000
heap
page read and write
7EB60000
direct allocation
page read and write
340F000
stack
page read and write
DE1E000
stack
page read and write
D66F000
direct allocation
page read and write
1F0000
heap
page read and write
33CE000
stack
page read and write
D6CC000
direct allocation
page read and write
21D0000
heap
page read and write
B4E000
unkown
page readonly
4C0000
heap
page read and write
530000
unkown
page readonly
3390000
heap
page read and write
7FCA0000
direct allocation
page read and write
A2E000
stack
page read and write
3010000
heap
page read and write
7EA7F000
direct allocation
page read and write
238F000
direct allocation
page read and write
B2E000
unkown
page read and write
D653000
direct allocation
page read and write
B2E000
unkown
page read and write
27A4000
heap
page read and write
B00000
unkown
page readonly
21E0000
direct allocation
page execute and read and write
CEF000
stack
page read and write
DBCE000
stack
page read and write
75E000
stack
page read and write
5A0000
heap
page read and write
B32000
unkown
page read and write
33A3000
heap
page read and write
7FCA0000
direct allocation
page read and write
DCCF000
stack
page read and write
33BD000
heap
page read and write
529000
unkown
page read and write
7F180000
direct allocation
page read and write
4900000
heap
page read and write
B00000
unkown
page readonly
7BE000
stack
page read and write
2E50000
heap
page read and write
3630000
heap
page read and write
29FE000
direct allocation
page execute and read and write
28D0000
heap
page read and write
401000
unkown
page execute read
33C1000
heap
page read and write
33D1000
heap
page read and write
7FAD0000
direct allocation
page read and write
7ECA0000
direct allocation
page read and write
3710000
heap
page read and write
7EC0F000
direct allocation
page read and write
7EB30000
direct allocation
page read and write
B0A000
heap
page read and write
DA2F000
stack
page read and write
E070000
trusted library allocation
page read and write
D636000
direct allocation
page read and write
7EC0F000
direct allocation
page read and write
28C3000
direct allocation
page read and write
4F7000
heap
page read and write
3017000
heap
page read and write
3210000
heap
page read and write
19D000
stack
page read and write
B2E000
unkown
page write copy
33A4000
heap
page read and write
7E9F0000
direct allocation
page read and write
7AD000
stack
page read and write
2801000
direct allocation
page execute read
7EF60000
direct allocation
page read and write
7FB50000
direct allocation
page read and write
B2E000
unkown
page read and write
737000
heap
page read and write
22C6000
heap
page read and write
B01000
unkown
page execute read
DF5F000
stack
page read and write
DFA0000
remote allocation
page read and write
B14000
heap
page read and write
1F0000
heap
page read and write
236C000
stack
page read and write
E865000
heap
page read and write
B00000
unkown
page readonly
28AE000
direct allocation
page read and write
AA0000
heap
page read and write
7E890000
direct allocation
page read and write
34AF000
stack
page read and write
7FC5F000
direct allocation
page read and write
B00000
unkown
page readonly
AE0000
direct allocation
page read and write
73E000
stack
page read and write
E62B000
heap
page read and write
30FD000
stack
page read and write
B14000
heap
page read and write
E22E000
stack
page read and write
D7EF000
stack
page read and write
DB6F000
stack
page read and write
3270000
heap
page read and write
33D1000
heap
page read and write
7EC10000
direct allocation
page read and write
7FCA0000
direct allocation
page read and write
B0C000
heap
page read and write
7FCA0000
direct allocation
page read and write
2883000
direct allocation
page read and write
B25000
heap
page read and write
B4E000
unkown
page readonly
2C5F000
stack
page read and write
358F000
unkown
page read and write
33A4000
heap
page read and write
D7EE000
stack
page read and write
29FB000
direct allocation
page execute and read and write
30D0000
heap
page read and write
7AA000
heap
page read and write
64A000
heap
page read and write
7EAA0000
direct allocation
page read and write
D5CA000
direct allocation
page read and write
260E000
stack
page read and write
23E4000
direct allocation
page read and write
27CA000
heap
page read and write
2670000
heap
page read and write
33BE000
heap
page read and write
3D100000
trusted library allocation
page read and write
7EBC0000
direct allocation
page read and write
480000
heap
page read and write
D668000
direct allocation
page read and write
D92E000
stack
page read and write
22FE000
stack
page read and write
529000
unkown
page read and write
35EE000
stack
page read and write
A7F000
stack
page read and write
450000
heap
page read and write
4C60000
heap
page read and write
33D0000
heap
page read and write
B4E000
unkown
page readonly
620000
heap
page read and write
7F45B000
direct allocation
page read and write
7FCA0000
direct allocation
page read and write
23AB000
direct allocation
page read and write
E861000
heap
page read and write
7F030000
direct allocation
page read and write
4C9000
heap
page read and write
511E000
stack
page read and write
228C000
stack
page read and write
7F1F0000
direct allocation
page read and write
7EB80000
direct allocation
page read and write
7F1F0000
direct allocation
page read and write
D7EA000
stack
page read and write
3260000
heap
page read and write
527000
unkown
page read and write
7F150000
direct allocation
page read and write
B15000
heap
page read and write
B14000
heap
page read and write
2455000
stack
page read and write
E668000
heap
page read and write
D683000
direct allocation
page read and write
7E730000
direct allocation
page read and write
D92E000
stack
page read and write
4F6000
heap
page read and write
1AD000
stack
page read and write
3500000
heap
page read and write
4FB000
heap
page read and write
E960000
trusted library allocation
page read and write
22AA000
direct allocation
page read and write
D6E1000
direct allocation
page read and write
D11000
unkown
page execute read
E5F0000
trusted library allocation
page read and write
B2E000
unkown
page read and write
D65A000
direct allocation
page read and write
DB6F000
stack
page read and write
4B50000
heap
page read and write
B25000
heap
page read and write
D11000
unkown
page execute read
5C0000
heap
page read and write
33A5000
heap
page read and write
2FAD000
stack
page read and write
34E0000
heap
page read and write
58E000
stack
page read and write
33D1000
heap
page read and write
33BD000
heap
page read and write
D7EE000
stack
page execute and read and write
B4A000
unkown
page readonly
B01000
unkown
page execute read
4E5000
heap
page read and write
23EC000
direct allocation
page read and write
286E000
direct allocation
page read and write
2DE0000
heap
page read and write
D674000
direct allocation
page read and write
E621000
heap
page read and write
19D000
stack
page read and write
730000
heap
page read and write
32D0000
heap
page read and write
2B80000
heap
page read and write
23E0000
heap
page read and write
344A000
heap
page read and write
27D8000
heap
page read and write
2E40000
heap
page read and write
33A3000
heap
page read and write
33BD000
heap
page read and write
DF71000
heap
page read and write
B4A000
unkown
page readonly
320E000
unkown
page read and write
DA6E000
stack
page read and write
7FCEF000
direct allocation
page read and write
23DE000
direct allocation
page read and write
33A3000
heap
page read and write
B01000
unkown
page execute read
264F000
stack
page read and write
3D0000
heap
page read and write
9B000
stack
page read and write
A9F000
stack
page read and write
2BD0000
heap
page read and write
282E000
direct allocation
page read and write
D5FA000
direct allocation
page read and write
33C1000
heap
page read and write
33D1000
heap
page read and write
4DB000
heap
page read and write
DE1E000
stack
page read and write
2D25000
stack
page read and write
B00000
unkown
page readonly
630000
heap
page read and write
4B3D000
stack
page read and write
304C000
heap
page read and write
7F24F000
direct allocation
page read and write
4FB000
heap
page read and write
33A4000
heap
page read and write
7A0000
heap
page read and write
7FB70000
direct allocation
page read and write
B2B000
heap
page read and write
7EC0F000
direct allocation
page read and write
243A000
direct allocation
page read and write
321E000
stack
page read and write
232C000
stack
page read and write
E860000
heap
page read and write
3430000
heap
page read and write
242C000
direct allocation
page read and write
32DF000
stack
page read and write
317A000
heap
page read and write
33BD000
heap
page read and write
930000
heap
page read and write
7F1E0000
direct allocation
page read and write
D676000
direct allocation
page read and write
DD1E000
stack
page read and write
27DA000
heap
page read and write
7F980000
direct allocation
page read and write
690000
heap
page read and write
23C0000
direct allocation
page read and write
7EA70000
direct allocation
page read and write
33B0000
heap
page read and write
7FCA0000
direct allocation
page read and write
65C000
heap
page read and write
7E8C0000
direct allocation
page read and write
476F000
stack
page read and write
D10000
unkown
page readonly
D65F000
direct allocation
page read and write
29B0000
heap
page read and write
303D000
stack
page read and write
E712000
heap
page read and write
33BD000
heap
page read and write
DF5D000
stack
page read and write
B4E000
unkown
page readonly
43D000
stack
page read and write
33A4000
heap
page read and write
2433000
direct allocation
page read and write
890000
heap
page read and write
E2BD000
heap
page read and write
33A3000
heap
page read and write
33BD000
heap
page read and write
297C000
stack
page read and write
6F3000
heap
page read and write
474000
direct allocation
page execute and read and write
4FF0000
direct allocation
page read and write
4E5000
heap
page read and write
4909000
heap
page read and write
33A3000
heap
page read and write
7F340000
direct allocation
page read and write
D607000
direct allocation
page read and write
4F80000
trusted library allocation
page read and write
7F1A0000
direct allocation
page read and write
77E000
stack
page read and write
23FA000
direct allocation
page read and write
D6E8000
direct allocation
page read and write
D7AA000
stack
page read and write
DD1E000
stack
page read and write
29BA000
heap
page read and write
D6A8000
direct allocation
page read and write
33A4000
heap
page read and write
D8EF000
stack
page read and write
DE5E000
stack
page read and write
63D000
stack
page read and write
52B000
unkown
page write copy
B4A000
unkown
page readonly
4D04000
heap
page read and write
E0EF000
stack
page read and write
2855000
direct allocation
page read and write
2D2E000
stack
page read and write
AFE000
stack
page read and write
7EAF0000
direct allocation
page read and write
8C0000
heap
page read and write
695000
heap
page read and write
2441000
direct allocation
page read and write
3CE000
stack
page read and write
656000
heap
page read and write
8CB000
heap
page read and write
33BD000
heap
page read and write
DA6E000
stack
page read and write
27DD000
heap
page read and write
D6B6000
direct allocation
page read and write
33D1000
heap
page read and write
B01000
unkown
page execute read
33D0000
heap
page read and write
2356000
heap
page read and write
7EB0F000
direct allocation
page read and write
73B000
heap
page read and write
7A1000
heap
page read and write
33D1000
heap
page read and write
7F23F000
direct allocation
page read and write
E960000
direct allocation
page execute and read and write
90F000
stack
page read and write
690000
heap
page read and write
B4E000
unkown
page readonly
481000
unkown
page read and write
229C000
direct allocation
page read and write
27AF000
heap
page read and write
27EE000
heap
page read and write
E63F000
heap
page read and write
33D1000
heap
page read and write
D8EF000
stack
page read and write
DE5E000
stack
page read and write
4DA000
heap
page read and write
490000
heap
page read and write
2270000
direct allocation
page read and write
E697000
heap
page read and write
B4E000
unkown
page readonly
B01000
unkown
page execute read
4FB000
heap
page read and write
7F270000
direct allocation
page read and write
4FB000
heap
page read and write
5090000
trusted library allocation
page read and write
2895000
direct allocation
page read and write
329E000
stack
page read and write
22B1000
direct allocation
page read and write
2B60000
heap
page read and write
343B000
heap
page read and write
27BA000
heap
page read and write
63A000
heap
page read and write
33BD000
heap
page read and write
6600000
heap
page read and write
33BD000
heap
page read and write
There are 806 hidden memdumps, click here to show them.