IOC Report
0OZQi3b0tM.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0OZQi3b0tM.exe
"C:\Users\user\Desktop\0OZQi3b0tM.exe"
malicious

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
193.122.130.0
malicious
https://api.telegram
unknown
https://api.telegram.org4
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot5392870078:AAEZf0ajeo_PMkBddeC_JE--NP4u4367N6c/sendDocument?chat_id=1856108848&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Keylogger%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake
149.154.167.220
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.orgD8
unknown
http://checkip.dyndns.org/q
unknown
https://api.telegram.org/bot5392870078:AAEZf0ajeo_PMkBddeC_JE--NP4u4367N6c/sendDocument?chat_id=1856
unknown

Domains

Name
IP
Malicious
checkip.dyndns.com
193.122.130.0
malicious
checkip.dyndns.org
unknown
malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
193.122.130.0
checkip.dyndns.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\0OZQi3b0tM_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
532000
unkown
page readonly
malicious
532000
unkown
page readonly
malicious
2867000
trusted library allocation
page read and write
malicious
4E00000
trusted library allocation
page read and write
5FBE000
stack
page read and write
1C596D50000
trusted library allocation
page read and write
1C5971A0000
remote allocation
page read and write
F41000
trusted library allocation
page read and write
B3F000
heap
page read and write
4EE0000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
2C330A00000
heap
page read and write
B0A000
heap
page read and write
28C7000
trusted library allocation
page read and write
737E977000
stack
page read and write
5150000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
4674F79000
stack
page read and write
4EE0000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1F414453000
heap
page read and write
292C000
trusted library allocation
page read and write
2C3309B0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
1C596E89000
heap
page read and write
1C598000000
heap
page read and write
1A4B1999000
heap
page read and write
C10000
trusted library allocation
page read and write
1A4B1DC0000
remote allocation
page read and write
29A4000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1E3D802A000
heap
page read and write
1A4B1E3E000
heap
page read and write
EB0000
heap
page execute and read and write
2944000
trusted library allocation
page read and write
1A4B199B000
heap
page read and write
1A4B19A4000
heap
page read and write
1A4B1048000
heap
page read and write
1C596E1F000
heap
page read and write
4D65000
trusted library allocation
page read and write
195AEC70000
heap
page read and write
4E10000
trusted library allocation
page read and write
1A4B1967000
heap
page read and write
950C9FE000
stack
page read and write
467507F000
stack
page read and write
2AE1000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
195AEC70000
heap
page read and write
387B000
trusted library allocation
page read and write
1C592100000
heap
page read and write
4D9197D000
stack
page read and write
1F414413000
heap
page read and write
65F0000
heap
page read and write
AC6A57C000
stack
page read and write
1A4B1999000
heap
page read and write
4E10000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
2898000
trusted library allocation
page read and write
26768500000
heap
page read and write
4E00000
trusted library allocation
page read and write
291C000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2676844B000
heap
page read and write
4E00000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
195AEC6E000
heap
page read and write
18AC4A10000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2A3D000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
1C592015000
heap
page read and write
1C596D20000
trusted library allocation
page read and write
F51000
trusted library allocation
page read and write
6221000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
2894000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
B864DEB000
stack
page read and write
A90000
heap
page read and write
4E00000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
295C000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1A4B1047000
heap
page read and write
530000
unkown
page readonly
4E0C000
trusted library allocation
page read and write
580000
heap
page read and write
4E00000
trusted library allocation
page read and write
CA3000
trusted library allocation
page read and write
1C596F02000
heap
page read and write
4EC0000
trusted library allocation
page execute and read and write
28E3000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1A4B1900000
heap
page read and write
4E10000
trusted library allocation
page read and write
6221000
trusted library allocation
page read and write
1A4B1049000
heap
page read and write
626A000
trusted library allocation
page read and write
8F7000
stack
page read and write
F40000
trusted library allocation
page read and write
1A4B199E000
heap
page read and write
5EB000
stack
page read and write
4EE0000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
623A000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
B8652FB000
stack
page read and write
4E10000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
6286000
trusted library allocation
page read and write
627D000
trusted library allocation
page read and write
1C5918BB000
heap
page read and write
4E00000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
26768200000
heap
page read and write
1E3D805C000
heap
page read and write
F50000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
2934000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1E3D8066000
heap
page read and write
5FE0000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
467517A000
stack
page read and write
28CB000
trusted library allocation
page read and write
1C5971A0000
remote allocation
page read and write
2ACD000
trusted library allocation
page read and write
1A4B199A000
heap
page read and write
AF0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
26768C02000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
1A4B199E000
heap
page read and write
1C591925000
heap
page read and write
18AC5930000
heap
page readonly
18AC48A0000
heap
page read and write
297C000
trusted library allocation
page read and write
1A4B10C7000
heap
page read and write
4EE0000
trusted library allocation
page read and write
1F414C02000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
1C591813000
heap
page read and write
2C330B24000
heap
page read and write
1A4B1013000
heap
page read and write
4E00000
trusted library allocation
page read and write
660E67F000
stack
page read and write
4E00000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
1C596E0E000
heap
page read and write
1A4B1108000
heap
page read and write
1A4B10E1000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C596F00000
heap
page read and write
2998000
trusted library allocation
page read and write
26768481000
heap
page read and write
2A75000
trusted library allocation
page read and write
1F41445D000
heap
page read and write
4E00000
trusted library allocation
page read and write
5D7E000
stack
page read and write
737E77C000
stack
page read and write
E90000
heap
page read and write
1C5917A0000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
195AEC4B000
heap
page read and write
4EE0000
remote allocation
page read and write
4E10000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4674FFF000
stack
page read and write
2954000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
1A4B1113000
heap
page read and write
26768190000
heap
page read and write
4D60000
trusted library allocation
page read and write
660E3EE000
stack
page read and write
1F414290000
heap
page read and write
195AEC83000
heap
page read and write
2A81000
trusted library allocation
page read and write
1A4B19B4000
heap
page read and write
1A4B1985000
heap
page read and write
4E00000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2AC9000
trusted library allocation
page read and write
1C596E4B000
heap
page read and write
4674D7F000
stack
page read and write
4E00000
trusted library allocation
page read and write
1A4B198E000
heap
page read and write
2E38000
trusted library allocation
page read and write
195AEE30000
heap
page read and write
18AC4890000
heap
page read and write
1F414400000
heap
page read and write
1E3D8073000
heap
page read and write
6220000
trusted library allocation
page read and write
1C596EEF000
heap
page read and write
1C59189F000
heap
page read and write
4E10000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
1A4B10F8000
heap
page read and write
4D91A79000
stack
page read and write
6248000
trusted library allocation
page read and write
1C591829000
heap
page read and write
6274000
trusted library allocation
page read and write
1A4B10A2000
heap
page read and write
4E00000
trusted library allocation
page read and write
4D52000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
623E000
trusted library allocation
page read and write
1C596E87000
heap
page read and write
195AEC67000
heap
page read and write
1E3D8108000
heap
page read and write
4E00000
trusted library allocation
page read and write
1A4B1999000
heap
page read and write
AC6A12B000
stack
page read and write
5EBE000
stack
page read and write
1F414486000
heap
page read and write
1C591824000
heap
page read and write
4ED0000
trusted library allocation
page read and write
BF9000
heap
page read and write
28CF000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
195AEC7B000
heap
page read and write
C2A000
trusted library allocation
page execute and read and write
28D7000
trusted library allocation
page read and write
1C5928F0000
trusted library section
page readonly
AC6A67B000
stack
page read and write
1E3D8055000
heap
page read and write
2A51000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
950C87C000
stack
page read and write
2AED000
trusted library allocation
page read and write
F3E000
stack
page read and write
1A4B1E02000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C596D40000
trusted library allocation
page read and write
28BF000
trusted library allocation
page read and write
1F4142A0000
heap
page read and write
5FE0000
trusted library allocation
page read and write
26768513000
heap
page read and write
BFC000
heap
page read and write
660E7FF000
stack
page read and write
6259000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
1E3D8079000
heap
page read and write
1E3D7E60000
heap
page read and write
6252000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
6273000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
2889000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1E3D7EC0000
heap
page read and write
29A9000
trusted library allocation
page read and write
195AEC6E000
heap
page read and write
1A4B1999000
heap
page read and write
1A4B1926000
heap
page read and write
1A4B1E02000
heap
page read and write
18AC4AB8000
heap
page read and write
1A4B1E00000
heap
page read and write
F50000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
F51000
trusted library allocation
page read and write
1A4B1999000
heap
page read and write
1C592118000
heap
page read and write
526F000
stack
page read and write
F50000
trusted library allocation
page read and write
26768427000
heap
page read and write
1E3D8113000
heap
page read and write
1C596E61000
heap
page read and write
26768400000
heap
page read and write
1C591800000
heap
page read and write
1C592002000
heap
page read and write
28EF000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
1A4B199E000
heap
page read and write
4F01000
heap
page read and write
2948000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
F41000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
467432C000
stack
page read and write
4E00000
trusted library allocation
page read and write
1A4B1989000
heap
page read and write
4EE0000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
1A4B199E000
heap
page read and write
622B000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
1C596EE5000
heap
page read and write
6221000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
6295000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1A4B199C000
heap
page read and write
1A4B104C000
heap
page read and write
26768470000
heap
page read and write
4D71000
trusted library allocation
page read and write
1C592102000
heap
page read and write
4EE0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
26768429000
heap
page read and write
4E00000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
1A4B1999000
heap
page read and write
6010000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
1A4B1995000
heap
page read and write
1A4B199A000
heap
page read and write
1A4B1E02000
heap
page read and write
2917000
trusted library allocation
page read and write
1C592C71000
trusted library allocation
page read and write
1C596E2D000
heap
page read and write
195AEC66000
heap
page read and write
195AEC87000
heap
page read and write
DC2518B000
stack
page read and write
6294000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
2A95000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
2A39000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
530000
unkown
page readonly
F50000
trusted library allocation
page read and write
1C592920000
trusted library section
page readonly
1C5927F0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1C596EE0000
heap
page read and write
1E3D8068000
heap
page read and write
4E00000
trusted library allocation
page read and write
2C330920000
heap
page read and write
F50000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
C26000
trusted library allocation
page execute and read and write
1A4B1999000
heap
page read and write
1A4B17C0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1C596EEF000
heap
page read and write
1E3D8099000
heap
page read and write
4E00000
trusted library allocation
page read and write
BDB000
heap
page read and write
1A4B1116000
heap
page read and write
4E00000
trusted library allocation
page read and write
18AC5920000
trusted library allocation
page read and write
1C596E3E000
heap
page read and write
660E87C000
stack
page read and write
F50000
trusted library allocation
page read and write
627D000
trusted library allocation
page read and write
26768447000
heap
page read and write
5FE0000
trusted library allocation
page read and write
1F41442A000
heap
page read and write
671A000
trusted library allocation
page read and write
1A4B0EB0000
heap
page read and write
5FD0000
trusted library allocation
page read and write
18AC48A5000
heap
page read and write
DC258FF000
stack
page read and write
1C5918B6000
heap
page read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
1A4B1982000
heap
page read and write
2C330A29000
heap
page read and write
5FE0000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
4D5D000
trusted library allocation
page read and write
AC6A777000
stack
page read and write
2A7D000
trusted library allocation
page read and write
2676844D000
heap
page read and write
26768459000
heap
page read and write
1C592C90000
trusted library allocation
page read and write
6229000
trusted library allocation
page read and write
1A4B1996000
heap
page read and write
26768455000
heap
page read and write
195AEC62000
heap
page read and write
950CE78000
stack
page read and write
1A4B19D6000
heap
page read and write
26768502000
heap
page read and write
F70000
heap
page read and write
5130000
trusted library allocation
page read and write
BE2000
heap
page read and write
C32000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
1C597160000
trusted library allocation
page read and write
195AEC64000
heap
page read and write
2A79000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2C330A3C000
heap
page read and write
B90000
heap
page read and write
4674A7E000
stack
page read and write
2AA5000
trusted library allocation
page read and write
B90000
heap
page read and write
1C597124000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
1C59183D000
heap
page read and write
5150000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6229000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4DFE000
stack
page read and write
28FD000
trusted library allocation
page read and write
6259000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
C70000
heap
page read and write
1C596D70000
trusted library allocation
page read and write
737E38E000
stack
page read and write
1A4B10B3000
heap
page read and write
1F414513000
heap
page read and write
1C591913000
heap
page read and write
B8651FB000
stack
page read and write
1A4B1029000
heap
page read and write
2970000
trusted library allocation
page read and write
288C000
trusted library allocation
page read and write
1C59185A000
heap
page read and write
6228000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
5160000
heap
page execute and read and write
1C596D84000
trusted library allocation
page read and write
1A4B1DC0000
remote allocation
page read and write
B8650FE000
stack
page read and write
6229000
trusted library allocation
page read and write
1C591878000
heap
page read and write
2988000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
950CAF7000
stack
page read and write
AC6A9FF000
stack
page read and write
2A5D000
trusted library allocation
page read and write
1C591630000
heap
page read and write
4D40000
trusted library allocation
page read and write
1C5971A0000
remote allocation
page read and write
660E36A000
stack
page read and write
1F414500000
heap
page read and write
622A000
trusted library allocation
page read and write
1C596EED000
heap
page read and write
4EE0000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
18AC49F0000
heap
page read and write
6238000
trusted library allocation
page read and write
1C591873000
heap
page read and write
4EC0000
trusted library allocation
page read and write
4674B7C000
stack
page read and write
BDB000
heap
page read and write
F50000
trusted library allocation
page read and write
6282000
trusted library allocation
page read and write
1A4B10D9000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C5928E0000
trusted library section
page readonly
4E10000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
195AEC7B000
heap
page read and write
4828000
trusted library allocation
page read and write
2C331402000
trusted library allocation
page read and write
5E7E000
stack
page read and write
6248000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
1F41443C000
heap
page read and write
29F4000
trusted library allocation
page read and write
1F41445F000
heap
page read and write
1C592910000
trusted library section
page readonly
1E3D8802000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
18AC59A0000
trusted library allocation
page read and write
1C59188B000
heap
page read and write
4E10000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
1A4B1995000
heap
page read and write
4E00000
trusted library allocation
page read and write
49FE000
stack
page read and write
1A4B10A9000
heap
page read and write
F60000
trusted library allocation
page read and write
2C330B02000
heap
page read and write
29DA000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
737E87B000
stack
page read and write
2A45000
trusted library allocation
page read and write
1C596D50000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1A4B19B7000
heap
page read and write
4674777000
stack
page read and write
950CD7E000
unkown
page read and write
1A4B1082000
heap
page read and write
4E00000
trusted library allocation
page read and write
1A4B1E20000
heap
page read and write
2924000
trusted library allocation
page read and write
1F41447B000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C597110000
trusted library allocation
page read and write
2C330A13000
heap
page read and write
625C000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
B8655FF000
stack
page read and write
29CB000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
4DBE000
stack
page read and write
536F000
stack
page read and write
4D6C000
trusted library allocation
page read and write
622C000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
2676844C000
heap
page read and write
5140000
trusted library allocation
page read and write
2C330B00000
heap
page read and write
2A6D000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
2AE5000
trusted library allocation
page read and write
1A4B10AF000
heap
page read and write
195AEC84000
heap
page read and write
26768446000
heap
page read and write
6245000
trusted library allocation
page read and write
1C597100000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
2968000
trusted library allocation
page read and write
552000
unkown
page readonly
EE0000
trusted library allocation
page read and write
1C596EA9000
heap
page read and write
1C5918FD000
heap
page read and write
6255000
trusted library allocation
page read and write
29E4000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
1F414462000
heap
page read and write
6282000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
1C59186E000
heap
page read and write
AC6A87E000
stack
page read and write
6020000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4EF0000
heap
page read and write
26768477000
heap
page read and write
18AC4BB0000
trusted library allocation
page read and write
623A000
trusted library allocation
page read and write
737E30C000
stack
page read and write
5150000
trusted library allocation
page read and write
1A4B1802000
heap
page read and write
18AC4AFC000
heap
page read and write
1A4B103C000
heap
page read and write
26768413000
heap
page read and write
1E3D8102000
heap
page read and write
6269000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
1C596F05000
heap
page read and write
1F414502000
heap
page read and write
1C591892000
heap
page read and write
DC259FE000
stack
page read and write
4E00000
trusted library allocation
page read and write
1A4B199C000
heap
page read and write
4D91AF9000
stack
page read and write
2908000
trusted library allocation
page read and write
1C596D30000
trusted library allocation
page read and write
1A4B1000000
heap
page read and write
6237000
trusted library allocation
page read and write
1C5916A0000
heap
page read and write
1E3D7E50000
heap
page read and write
1E3D8013000
heap
page read and write
1C597108000
trusted library allocation
page read and write
195AEC7B000
heap
page read and write
2C330980000
heap
page read and write
4ED0000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
DC256FB000
stack
page read and write
289C000
trusted library allocation
page read and write
1F414300000
heap
page read and write
5FC0000
trusted library allocation
page execute and read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1C597180000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6266000
trusted library allocation
page read and write
4674C7B000
stack
page read and write
4E00000
trusted library allocation
page read and write
4E0F000
trusted library allocation
page read and write
18AC5950000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1C596D40000
trusted library allocation
page read and write
B8654FE000
stack
page read and write
28E7000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
1A4B102C000
heap
page read and write
C03000
trusted library allocation
page execute and read and write
4E00000
trusted library allocation
page read and write
298C000
trusted library allocation
page read and write
2994000
trusted library allocation
page read and write
5AFF000
stack
page read and write
6238000
trusted library allocation
page read and write
737EB7D000
stack
page read and write
1A4B10F0000
heap
page read and write
5130000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
F51000
trusted library allocation
page read and write
950C77E000
stack
page read and write
1A4B1996000
heap
page read and write
5140000
trusted library allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2978000
trusted library allocation
page read and write
18AC4AFC000
heap
page read and write
1A4B104D000
heap
page read and write
1A4B19BF000
heap
page read and write
53AE000
stack
page read and write
1C592900000
trusted library section
page readonly
DC257FB000
stack
page read and write
5150000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
2A99000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
2676843C000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C596F02000
heap
page read and write
1C596D80000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
C3B000
trusted library allocation
page execute and read and write
737EA7F000
stack
page read and write
4D57000
trusted library allocation
page read and write
4D9154B000
stack
page read and write
F60000
trusted library allocation
page read and write
BE2000
heap
page read and write
4EE0000
trusted library allocation
page read and write
18AC4AB0000
heap
page read and write
1C5928D0000
trusted library section
page readonly
1A4B19AC000
heap
page read and write
2AC5000
trusted library allocation
page read and write
1A4B10AA000
heap
page read and write
4ED0000
trusted library allocation
page read and write
2C330910000
heap
page read and write
950C67B000
stack
page read and write
1A4B0F20000
heap
page read and write
5130000
trusted library allocation
page read and write
EF0000
heap
page read and write
29D0000
trusted library allocation
page read and write
1C592C93000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
660E779000
stack
page read and write
552000
unkown
page readonly
1A4B1E02000
heap
page read and write
1A4B19DA000
heap
page read and write
B89000
heap
page read and write
C1D000
trusted library allocation
page execute and read and write
4EE0000
trusted library allocation
page read and write
2883000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
1C596E00000
heap
page read and write
4E00000
trusted library allocation
page read and write
195AEC40000
heap
page read and write
4D54000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
2938000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
18AC4A80000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1A4B1DC0000
remote allocation
page read and write
2A9D000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
660E6F9000
stack
page read and write
1C597170000
trusted library allocation
page read and write
48FE000
stack
page read and write
1C592000000
heap
page read and write
6285000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2AD5000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
1A4B10C0000
heap
page read and write
1A4B1922000
heap
page read and write
C37000
trusted library allocation
page execute and read and write
626A000
trusted library allocation
page read and write
1C596F05000
heap
page read and write
1C596CB0000
trusted library allocation
page read and write
6266000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
1C592118000
heap
page read and write
1C59188D000
heap
page read and write
1C591875000
heap
page read and write
5FD0000
trusted library allocation
page read and write
950CCFF000
stack
page read and write
5FE0000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1A4B1E02000
heap
page read and write
624D000
trusted library allocation
page read and write
4EF3000
heap
page read and write
6258000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
18AC4B1E000
heap
page read and write
4E00000
trusted library allocation
page read and write
628A000
trusted library allocation
page read and write
1C596CA0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
1A4B0EC0000
heap
page read and write
28DB000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
195AEC51000
heap
page read and write
6275000
trusted library allocation
page read and write
950C6FE000
stack
page read and write
28D3000
trusted library allocation
page read and write
737E67E000
stack
page read and write
2A89000
trusted library allocation
page read and write
C93000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1C591640000
heap
page read and write
6259000
trusted library allocation
page read and write
B86507E000
stack
page read and write
267681A0000
heap
page read and write
1A4B19A4000
heap
page read and write
195AEC56000
heap
page read and write
195AEE35000
heap
page read and write
1E3D8100000
heap
page read and write
1A4B1954000
heap
page read and write
1C597150000
trusted library allocation
page read and write
62A4000
trusted library allocation
page read and write
195AEC6E000
heap
page read and write
4674DFF000
stack
page read and write
2676844F000
heap
page read and write
C60000
trusted library allocation
page execute and read and write
6224000
trusted library allocation
page read and write
467487A000
stack
page read and write
2A59000
trusted library allocation
page read and write
281E000
stack
page read and write
4EE0000
trusted library allocation
page read and write
1C59710E000
trusted library allocation
page read and write
1E3D803C000
heap
page read and write
4EE0000
remote allocation
page read and write
2821000
trusted library allocation
page read and write
195AEC10000
heap
page read and write
4EDF000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
18AC4A90000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
1C596D70000
trusted library allocation
page read and write
A95000
heap
page read and write
F40000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
1F414460000
heap
page read and write
6223000
trusted library allocation
page read and write
6232000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
1C597121000
trusted library allocation
page read and write
195AED40000
heap
page read and write
1F414508000
heap
page read and write
4E00000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
18AC49D0000
heap
page read and write
1C596EB1000
heap
page read and write
5C3E000
stack
page read and write
950CBF9000
stack
page read and write
4E10000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
18AC56F0000
trusted library allocation
page read and write
28BB000
trusted library allocation
page read and write
625A000
trusted library allocation
page read and write
195AEC56000
heap
page read and write
28DF000
trusted library allocation
page read and write
1C591902000
heap
page read and write
195AEC88000
heap
page read and write
4E00000
trusted library allocation
page read and write
1A4B1E02000
heap
page read and write
1A4B1E02000
heap
page read and write
4F00000
heap
page read and write
1C596EED000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
1A4B198E000
heap
page read and write
4E00000
trusted library allocation
page read and write
6297000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
622C000
trusted library allocation
page read and write
4EE0000
remote allocation
page read and write
B31000
heap
page read and write
2AB9000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
1A4B1999000
heap
page read and write
467497B000
stack
page read and write
1A4B102D000
heap
page read and write
F50000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
C04000
trusted library allocation
page read and write
1E3D7FC0000
trusted library allocation
page read and write
6276000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
B00000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C592113000
heap
page read and write
4E10000
trusted library allocation
page read and write
4674CFF000
stack
page read and write
F41000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
18AC4AF4000
heap
page read and write
26768300000
trusted library allocation
page read and write
1A4B199E000
heap
page read and write
1A4B19AD000
heap
page read and write
4D918F9000
stack
page read and write
2A91000
trusted library allocation
page read and write
1A4B1102000
heap
page read and write
4E00000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
1A4B104B000
heap
page read and write
1A4B1995000
heap
page read and write
195AEAE0000
heap
page read and write
2C330A02000
heap
page read and write
1A4B1E03000
heap
page read and write
4E00000
trusted library allocation
page read and write
2903000
trusted library allocation
page read and write
5D3E000
stack
page read and write
F51000
trusted library allocation
page read and write
18AC5940000
trusted library allocation
page read and write
1F414BA0000
trusted library allocation
page read and write
1A4B106A000
heap
page read and write
4E00000
trusted library allocation
page read and write
2928000
trusted library allocation
page read and write
467537F000
stack
page read and write
4D919FE000
stack
page read and write
B8653F7000
stack
page read and write
2AD1000
trusted library allocation
page read and write
4D5A000
trusted library allocation
page read and write
4674E7F000
stack
page read and write
4D4B000
trusted library allocation
page read and write
195AEC70000
heap
page read and write
5130000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
950C977000
stack
page read and write
6227000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
BF9000
heap
page read and write
4E10000
trusted library allocation
page read and write
18AC4AFC000
heap
page read and write
5150000
trusted library allocation
page read and write
2C330A6E000
heap
page read and write
294C000
trusted library allocation
page read and write
26768508000
heap
page read and write
F56000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1E3D8000000
heap
page read and write
2C330A52000
heap
page read and write
F51000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
AC6A47E000
stack
page read and write
1A4B1E02000
heap
page read and write
5130000
trusted library allocation
page read and write
625C000
trusted library allocation
page read and write
1C592CA0000
trusted library allocation
page read and write
669D000
trusted library allocation
page read and write
512E000
stack
page read and write
1C596EE9000
heap
page read and write
18AC4A70000
trusted library allocation
page read and write
623E000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
59FE000
stack
page read and write
4EE0000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
AC6A1AE000
stack
page read and write
737EC7E000
stack
page read and write
18AC48A9000
heap
page read and write
AC6A8FE000
stack
page read and write
5FD0000
trusted library allocation
page read and write
1C5917B0000
trusted library section
page read and write
1A4B19C2000
heap
page read and write
2964000
trusted library allocation
page read and write
There are 908 hidden memdumps, click here to show them.