IOC Report
inquiry EBS# 82785.exe

loading gif

Files

File Path
Type
Category
Malicious
inquiry EBS# 82785.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\inquiry EBS# 82785.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0h3d3rkt.p1t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hrju2tjp.gy3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxfj2kcz.5sf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rkjkjola.n41.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\n200C853
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\inquiry EBS# 82785.exe
"C:\Users\user\Desktop\inquiry EBS# 82785.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry EBS# 82785.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Program Files (x86)\IxomXFNfjAqbdkBATZPViqvQCuLxJYOyhTqHleVCYbVam\hbfEEdNoiUG.exe
"C:\Program Files (x86)\IxomXFNfjAqbdkBATZPViqvQCuLxJYOyhTqHleVCYbVam\hbfEEdNoiUG.exe"
malicious
C:\Windows\SysWOW64\iexpress.exe
"C:\Windows\SysWOW64\iexpress.exe"
malicious
C:\Program Files (x86)\IxomXFNfjAqbdkBATZPViqvQCuLxJYOyhTqHleVCYbVam\hbfEEdNoiUG.exe
"C:\Program Files (x86)\IxomXFNfjAqbdkBATZPViqvQCuLxJYOyhTqHleVCYbVam\hbfEEdNoiUG.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.shopnaya.fr/7skl/
212.227.172.254
http://www.touchdres.top/hjqs/
198.177.123.106
https://duckduckgo.com/chrome_newtab
unknown
http://www.geltipleasure.com/8vpj/
3.33.130.190
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.birthingwitht.com/v0eo/
34.149.87.45
https://www.shopnaya.fr/7skl/?f4=xxLl5tHp-byppxH&MNodJD8p=dTL83zpU0xQ9edv6OGiX5dEIo4WZrMM8fLl2Krrsxa
unknown
http://www.0bi8.fun/static/admin/js/jquery.min.js
unknown
http://www.galatalosangeles.org/v7f6/?MNodJD8p=XF4qeg9ZZgTAThyVlalCdKNU99LfXS2lLMZLa1YAu2kMLhYluJ+1/4qiQDOp90UUak+QbyH64omdN7gzrQa5FaRBbg95DUa8jSSlfRAmfeyBeU+cpFm8YfZCh5mA/E+0k6dMbGsvvroL&f4=xxLl5tHp-byppxH
3.33.130.190
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.drednents.es/z86o/
104.21.81.34
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/romenrg/genetic-startups
unknown
http://www.touchdres.top/hjqs/?f4=xxLl5tHp-byppxH&MNodJD8p=5qGwR/efmPt/I6Ynz6AqB74GuZv+m8IAYAQ4rwOKHDcf/eaPG6yHH9N9SqcPE5LhBkrMW/1fhU0AkMcaTSWt5r3v+QyKYKY8hdB1xYhSZ8o8wTivSleoUXQcrXTUVIgWubI9r3mYr34W
198.177.123.106
http://www.0bi8.fun/static/admin/js/bootstrap.min.js
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.0bi8.fun/static/admin/css/style.min.css
unknown
http://www.0bi8.fun/bjqr/?f4=xxLl5tHp-byppxH&MNodJD8p=gV3rr7jqPVIv1Mn/lEpKIewKkib7Fcul04Jd32/fmw2k/EH2FaAQks6L8J0asfE6jsJhPUd3WUfcv1S8rbU6nGqSEFtTbFoUTPdBAPE1L3Zw4OEG+thjvk7ioWrFkV00ho6iarHOpTEe
107.151.241.58
http://www.omilux.vn/hrz3/
103.28.36.189
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.0bi8.fun/bjqr/
107.151.241.58
http://www.0bi8.fun/static/admin/css/bootstrap.min.css
unknown
https://www.birthingwitht.com/v0eo?MNodJD8p=53hfMKMEN3GhcMKa3FD3GzP2
unknown
http://www.geltipleasure.com/8vpj/?f4=xxLl5tHp-byppxH&MNodJD8p=PND0ETKqlieTTeqinVoOdoMDGkM5Odo4sqg2s5YxFKdh6CPUHw2tTMKdV9M9FPP1W5xV4FYCql8AQrim1T6KQKabV5DPdnWB0A0Xkl8YOGjv4J+ZuCok4XgXnh6EsXJFAwVfNVgHNN7O
3.33.130.190
http://www.birthingwitht.com/v0eo/?MNodJD8p=53hfMKMEN3GhcMKa3FD3GzP2+NOMOkRil+RTINeunm9wIq1fivMeg2WaHp19Pt0EnqgBYyGRdzAlBNzF4cJsjA2PPFb1LRhEuRJejr6Fp+RggyN+VxffrmtVRKuIz6NLG42mGA2FBBi+&f4=xxLl5tHp-byppxH
34.149.87.45
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.yamlex.ru/ji0p/
194.58.112.174
http://www.duobao698.com/b5mo/
3.33.130.190
http://www.0bi8.fun/static/admin/css/materialdesignicons.min.css
unknown
http://www.chillingtime.shop/e6fw/
3.33.130.190
http://www.galatalosangeles.org/v7f6/
3.33.130.190
http://yamlex.ru/ji0p/?MNodJD8p=xXD9CQ3N7xKDLchfMZiKEzPna0191/2yPXYla/3jou9aJjDG40/AHObgd4ksmL/dNcSW
unknown
http://www.duobao698.com/b5mo/?f4=xxLl5tHp-byppxH&MNodJD8p=YF33wiUQP61+bcRucpXfP2bszl+S1jXxxa03lm8i9Cm6yh/X5E/MKQF3SqHNMSDah8acWmTXWKI80zfQn0GR7e3o5MjoaLzb9IV74TF38aXM2/s/Vr42kQEqdr4drO8NCxauOi017rm8
3.33.130.190
http://www.drednents.es/z86o/?MNodJD8p=Ojnz0Kg7atrxNq8YCu+svyw5JWMM1LKejTFIWEVqDJTsr8k/Cp/y34hmBl88WC07fa4Gfm/DSv1MHu4JYtU+JFgy+UqwczkQfuHRwTZ5WPzaTNzF4FwHRgOY2DJ/mTb+46Ki7EnPzQiQ&f4=xxLl5tHp-byppxH
104.21.81.34
http://www.shopnaya.fr/7skl/?f4=xxLl5tHp-byppxH&MNodJD8p=dTL83zpU0xQ9edv6OGiX5dEIo4WZrMM8fLl2Krrsxam7NAcpt0Es3EGDcNMssM7b8wua4BB6pAKcVugLPNxCMOYttcIT7GyMy0e3JishaTIPS+4u6tMJjGSu/0BLy0AvAJTG8pRcvlin
212.227.172.254
http://www.pricekaboom.com/88is/?f4=xxLl5tHp-byppxH&MNodJD8p=Et7jFQQESHR6QMcH21WFfBueb87jCDciOXesV2PUTY+phHzqwibAOf6k5ayeI+rSGw4JUshP7eT3Dg0I6eQ+O8WQlCHWQqse33D+WHaqsKhBys2QaUSMPkBSAmePUjZQCr8qbSgJVbhV
185.31.240.240
http://www.yamlex.ru/ji0p/?MNodJD8p=xXD9CQ3N7xKDLchfMZiKEzPna0191/2yPXYla/3jou9aJjDG40/AHObgd4ksmL/dNcSWCZmrHM/RDWoQ1OVMTJmDIfJC0DRY8vTyfwkh08Xc3obI9sRDXMdHo4KaM9QY8Uf5asICqepP&f4=xxLl5tHp-byppxH
194.58.112.174
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://tempuri.org/DataSet1.xsd#tableLayoutPanel1
unknown
http://www.geltipleasure.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.chillingtime.shop/e6fw/?f4=xxLl5tHp-byppxH&MNodJD8p=n5dESxf/cXtX+IWK1PHyu1L8TFflxVgasmaJS2CdKaZYGchug9mh5pyHlytVKDb3Cg5u6YFnb48YkM5fb7pMgDgbFs0i5g+O9MKB2IOkFyIMxqAROkXgP4I/Dc/XYjPAbEAcXqhbTswY
3.33.130.190
http://www.hilfe24x7.de/vrn9/
3.33.130.190
http://www.ycwtch.co.uk/kpja/
34.149.87.45
http://browsehappy.com/
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.omilux.vn
unknown
malicious
www.birthingwitht.com
unknown
malicious
www.pricekaboom.com
unknown
malicious
www.duobao698.com
unknown
malicious
www.ycwtch.co.uk
unknown
malicious
www.galatalosangeles.org
unknown
malicious
www.chillingtime.shop
unknown
malicious
www.geltipleasure.com
unknown
malicious
www.hilfe24x7.de
unknown
malicious
www.yamlex.ru
194.58.112.174
duobao698.com
3.33.130.190
www.shopnaya.fr
212.227.172.254
pricekaboom.com
185.31.240.240
td-ccm-neg-87-45.wixdns.net
34.149.87.45
chillingtime.shop
3.33.130.190
galatalosangeles.org
3.33.130.190
www.drednents.es
104.21.81.34
www.0bi8.fun
107.151.241.58
omilux.vn
103.28.36.189
hilfe24x7.de
3.33.130.190
www.touchdres.top
198.177.123.106
geltipleasure.com
3.33.130.190
There are 12 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.81.34
www.drednents.es
United States
185.31.240.240
pricekaboom.com
Estonia
198.177.123.106
www.touchdres.top
United States
107.151.241.58
www.0bi8.fun
United States
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
194.58.112.174
www.yamlex.ru
Russian Federation
103.28.36.189
omilux.vn
Viet Nam
3.33.130.190
duobao698.com
United States
212.227.172.254
www.shopnaya.fr
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2340000
unclassified section
page execute and read and write
malicious
3020000
system
page execute and read and write
malicious
4B70000
trusted library allocation
page read and write
malicious
54D0000
system
page execute and read and write
malicious
30E0000
unkown
page execute and read and write
malicious
1830000
unclassified section
page execute and read and write
malicious
4CC0000
trusted library allocation
page read and write
malicious
4BC1000
heap
page read and write
3291000
heap
page read and write
4BC1000
heap
page read and write
ABD000
heap
page read and write
331D000
heap
page read and write
4BC1000
heap
page read and write
4D6B000
heap
page read and write
2B40000
unkown
page read and write
DCA000
trusted library allocation
page execute and read and write
2AF2D600000
trusted library allocation
page read and write
900000
unkown
page readonly
F7C01FE000
stack
page read and write
8F7000
stack
page read and write
123F000
heap
page read and write
4D40000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4C7B000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4CA2000
trusted library allocation
page read and write
521000
unkown
page execute read
DC2000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
2AF2D6CE000
trusted library allocation
page read and write
A08F000
stack
page read and write
6900000
heap
page read and write
A1E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
2AF2D380000
heap
page read and write
4BC1000
heap
page read and write
2AF2D400000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5594000
system
page execute and read and write
DA3000
trusted library allocation
page execute and read and write
2440000
unkown
page readonly
4BC1000
heap
page read and write
2CCF000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
3090000
heap
page read and write
2B20000
heap
page read and write
8400000
heap
page read and write
4BC1000
heap
page read and write
5140000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
5000000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
3304000
heap
page read and write
137E000
stack
page read and write
25F0000
unkown
page readonly
F70000
heap
page read and write
D8E000
stack
page read and write
4BC1000
heap
page read and write
538D000
direct allocation
page execute and read and write
BF0000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
24A4000
heap
page read and write
4BC1000
heap
page read and write
560000
unkown
page readonly
9BD0000
heap
page read and write
99E1000
heap
page read and write
8473000
heap
page read and write
5340000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4FC8000
trusted library allocation
page read and write
2AF2BA33000
heap
page read and write
5044000
heap
page read and write
E5A000
stack
page read and write
16B0000
unkown
page readonly
4BC1000
heap
page read and write
552C000
unclassified section
page read and write
4BC1000
heap
page read and write
AC0000
heap
page read and write
5C66000
unclassified section
page read and write
2AF2BA07000
heap
page read and write
940000
heap
page read and write
8449000
heap
page read and write
4EDE000
stack
page read and write
DC6000
trusted library allocation
page execute and read and write
1021000
unkown
page readonly
3254000
heap
page read and write
6F1E000
stack
page read and write
4BC1000
heap
page read and write
33B7000
unkown
page execute and read and write
3254000
heap
page read and write
8170000
trusted library allocation
page read and write
F07000
heap
page read and write
4BC1000
heap
page read and write
393A000
unkown
page read and write
6EED6000
unkown
page readonly
535000
unkown
page read and write
8470000
heap
page read and write
2CD0000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2AF2D500000
trusted library allocation
page read and write
4BC1000
heap
page read and write
520000
unkown
page readonly
C8E000
stack
page read and write
B80000
heap
page read and write
525E000
direct allocation
page execute and read and write
2E82000
unkown
page read and write
953E000
stack
page read and write
4438000
unkown
page read and write
4BC1000
heap
page read and write
2420000
unkown
page read and write
A44E000
stack
page read and write
27E0000
heap
page read and write
4BC1000
heap
page read and write
AD6000
heap
page read and write
3296000
heap
page read and write
4BC1000
heap
page read and write
537000
unkown
page readonly
920000
unkown
page readonly
24A4000
heap
page read and write
32C1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
520000
unkown
page readonly
2AF2B9B0000
heap
page read and write
F00000
heap
page read and write
521000
unkown
page execute read
4BC1000
heap
page read and write
E3E000
stack
page read and write
9E4D000
stack
page read and write
52E000
unkown
page readonly
4BC1000
heap
page read and write
3309000
heap
page read and write
52E000
unkown
page readonly
1021000
unkown
page readonly
4BC1000
heap
page read and write
F5C000
stack
page read and write
4C8E000
trusted library allocation
page read and write
910000
heap
page read and write
F4E000
stack
page read and write
1940000
unclassified section
page execute and read and write
A70000
heap
page read and write
2AF2D2B0000
heap
page read and write
984F000
stack
page read and write
1030000
unkown
page read and write
F50000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
6EEDD000
unkown
page read and write
68F6000
unclassified section
page read and write
A60000
unkown
page read and write
24A0000
heap
page read and write
C70000
unkown
page readonly
2EDC000
unkown
page read and write
3ACC000
unkown
page read and write
DB0000
trusted library allocation
page read and write
FA0000
unkown
page readonly
8500000
trusted library allocation
page read and write
3E0000
unkown
page readonly
4BC1000
heap
page read and write
2CD0000
unkown
page readonly
521000
unkown
page execute read
27AE000
stack
page read and write
F90000
unkown
page readonly
4BC1000
heap
page read and write
D49000
unkown
page read and write
4BC1000
heap
page read and write
553D000
system
page execute and read and write
3616000
unkown
page read and write
4BC1000
heap
page read and write
42A6000
unkown
page read and write
4BC1000
heap
page read and write
26E0000
unkown
page execute and read and write
5D0000
heap
page read and write
DAD000
trusted library allocation
page execute and read and write
690E000
heap
page read and write
4BC1000
heap
page read and write
DA4000
trusted library allocation
page read and write
535000
unkown
page read and write
4BC1000
heap
page read and write
3484000
unkown
page read and write
2B24000
heap
page read and write
569C000
unkown
page read and write
970E000
stack
page read and write
4D20000
heap
page read and write
DA0000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
4BC1000
heap
page read and write
32A0000
heap
page read and write
BD0000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
F5C000
stack
page read and write
2AF2BA30000
heap
page read and write
3254000
heap
page read and write
535000
unkown
page read and write
2AF2BA1D000
heap
page read and write
4BC1000
heap
page read and write
32D8000
heap
page read and write
4F90000
heap
page read and write
A30C000
stack
page read and write
BE0000
unkown
page readonly
32CE000
heap
page read and write
3104000
heap
page read and write
1220000
heap
page read and write
56A000
stack
page read and write
6AFF000
stack
page read and write
4BC1000
heap
page read and write
1030000
unkown
page read and write
A61000
heap
page read and write
B9C000
stack
page read and write
32A9000
heap
page read and write
2440000
unkown
page readonly
4D50000
heap
page read and write
FB0000
unkown
page readonly
4BC1000
heap
page read and write
8443000
heap
page read and write
4BC1000
heap
page read and write
930000
unkown
page readonly
A78000
heap
page read and write
4BC1000
heap
page read and write
65D2000
unclassified section
page read and write
4BC1000
heap
page read and write
3DF0000
unkown
page read and write
4BC0000
heap
page read and write
2460000
heap
page read and write
5540000
system
page execute and read and write
4BC1000
heap
page read and write
99AE000
heap
page read and write
5518000
system
page execute and read and write
AC0000
heap
page read and write
83F0000
trusted library allocation
page read and write
121F000
stack
page read and write
1930000
heap
page read and write
176D000
direct allocation
page execute and read and write
510E000
stack
page read and write
4BC1000
heap
page read and write
2AF2D6BE000
trusted library allocation
page read and write
4BC1000
heap
page read and write
51E9000
direct allocation
page execute and read and write
3249000
heap
page read and write
32B6000
heap
page read and write
2BC0000
heap
page read and write
4CC0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
A78000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
3F82000
unkown
page read and write
4BC1000
heap
page read and write
2617000
unclassified section
page execute and read and write
4BC1000
heap
page read and write
37F1000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
4D60000
heap
page execute and read and write
2831000
trusted library allocation
page read and write
4BC1000
heap
page read and write
9D0000
heap
page read and write
E68000
trusted library allocation
page read and write
24A0000
heap
page read and write
1228000
heap
page read and write
BE0000
unkown
page readonly
32A3000
heap
page read and write
510000
unkown
page readonly
910000
heap
page read and write
8424000
heap
page read and write
2AF2BA33000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4F17000
heap
page read and write
4BC1000
heap
page read and write
974E000
stack
page read and write
8A0F000
stack
page read and write
4BC1000
heap
page read and write
2AF2D517000
trusted library allocation
page read and write
2AF2D6A5000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
4BC1000
heap
page read and write
8FC000
stack
page read and write
6C1A000
unclassified section
page read and write
2DC2000
unkown
page read and write
4BC1000
heap
page read and write
AAF000
heap
page read and write
3CC9000
trusted library allocation
page read and write
1045000
heap
page read and write
3249000
heap
page read and write
5CA000
stack
page read and write
4D93000
heap
page read and write
4BC1000
heap
page read and write
E40000
trusted library allocation
page execute and read and write
4BC1000
heap
page read and write
4C70000
trusted library allocation
page read and write
62AE000
unclassified section
page read and write
4BC1000
heap
page read and write
2BC0000
heap
page read and write
4D30000
trusted library allocation
page execute and read and write
4C91000
trusted library allocation
page read and write
1010000
unkown
page read and write
8415000
heap
page read and write
1010000
unkown
page readonly
4D80000
trusted library allocation
page execute and read and write
325A000
heap
page read and write
537000
unkown
page readonly
94D0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
94F0000
trusted library allocation
page execute and read and write
846D000
heap
page read and write
DDB000
trusted library allocation
page execute and read and write
4C96000
trusted library allocation
page read and write
843E000
heap
page read and write
ADA000
unkown
page read and write
DC0000
trusted library allocation
page read and write
C70000
unkown
page readonly
3A66000
trusted library allocation
page read and write
5AD4000
unclassified section
page read and write
F7BF9FD000
stack
page read and write
3254000
heap
page read and write
89CE000
stack
page read and write
4CB5000
trusted library allocation
page read and write
5130000
heap
page read and write
8447000
heap
page read and write
E71000
unkown
page readonly
5040000
heap
page read and write
28E3000
trusted library allocation
page read and write
1140000
heap
page read and write
537000
unkown
page readonly
4BC1000
heap
page read and write
1766000
direct allocation
page execute and read and write
32E4000
heap
page read and write
4E8E000
heap
page read and write
4E00000
trusted library allocation
page execute and read and write
8438000
heap
page read and write
9F4E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2AF2D503000
trusted library allocation
page read and write
482B000
stack
page read and write
27D0000
trusted library allocation
page read and write
535000
unkown
page read and write
FC0000
heap
page read and write
8418000
heap
page read and write
2AF2BA2C000
heap
page read and write
284A000
trusted library allocation
page read and write
3104000
heap
page read and write
5391000
direct allocation
page execute and read and write
F78000
heap
page read and write
8410000
heap
page read and write
A5E000
stack
page read and write
4BC1000
heap
page read and write
52E000
unkown
page readonly
5531000
system
page execute and read and write
4FF0000
trusted library allocation
page execute and read and write
5020000
heap
page read and write
8406000
heap
page read and write
397C000
trusted library allocation
page read and write
2B60000
unkown
page read and write
4FE0000
trusted library section
page read and write
324B000
heap
page read and write
4BC1000
heap
page read and write
6C00000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
32B6000
heap
page read and write
4BC1000
heap
page read and write
920000
unkown
page readonly
2AF2B904000
system
page execute and read and write
15C9000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
9D5000
heap
page read and write
E50000
heap
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
5110000
trusted library section
page read and write
32A0000
heap
page read and write
2AF2BA00000
heap
page read and write
510000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
54D2000
unclassified section
page read and write
1010000
unkown
page read and write
4D90000
heap
page read and write
4BC1000
heap
page read and write
25EF000
stack
page read and write
4B50000
trusted library allocation
page read and write
2BF24000
system
page read and write
FC0000
heap
page read and write
51ED000
direct allocation
page execute and read and write
8480000
heap
page read and write
7EF20000
trusted library allocation
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
50B5000
heap
page read and write
701E000
stack
page read and write
1320000
unkown
page readonly
27F1000
trusted library allocation
page read and write
2470000
unkown
page read and write
3349000
unkown
page execute and read and write
4BC1000
heap
page read and write
1010000
unkown
page readonly
A20000
heap
page read and write
8479000
heap
page read and write
3254000
heap
page read and write
2DE8000
stack
page read and write
2AF2B9A0000
heap
page read and write
F90000
unkown
page readonly
4BC1000
heap
page read and write
5CA000
stack
page read and write
BD0000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
8412000
heap
page read and write
4BC1000
heap
page read and write
32C8000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4D0000
unkown
page readonly
F60000
heap
page read and write
6E50000
trusted library section
page read and write
4BC1000
heap
page read and write
841A000
heap
page read and write
DD7000
trusted library allocation
page execute and read and write
4D47000
trusted library allocation
page read and write
3E2000
unkown
page readonly
2B10000
unkown
page readonly
4BC1000
heap
page read and write
2DAB000
stack
page read and write
4BC1000
heap
page read and write
F7BF1FB000
stack
page read and write
2B50000
unkown
page read and write
2B862000
system
page read and write
DB3000
trusted library allocation
page read and write
A2E000
heap
page read and write
4F80000
trusted library section
page readonly
4BC1000
heap
page read and write
A34E000
stack
page read and write
2B40000
unkown
page read and write
4FA0000
heap
page read and write
930000
unkown
page readonly
4BC1000
heap
page read and write
27B0000
trusted library allocation
page read and write
3C5E000
unkown
page read and write
2470000
unkown
page read and write
C6F000
stack
page read and write
4BC1000
heap
page read and write
1040000
heap
page read and write
6EEC1000
unkown
page execute read
4BC1000
heap
page read and write
5150000
heap
page read and write
5F8A000
unclassified section
page read and write
4BC1000
heap
page read and write
2AF2B907000
system
page execute and read and write
4BC1000
heap
page read and write
4BB0000
heap
page read and write
100E000
stack
page read and write
8482000
heap
page read and write
4BC1000
heap
page read and write
2AF2BA10000
heap
page read and write
2AF2D521000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2BBC000
unkown
page read and write
611C000
unclassified section
page read and write
4BC1000
heap
page read and write
30E0000
heap
page read and write
32D1000
heap
page read and write
4BC1000
heap
page read and write
5DF8000
unclassified section
page read and write
9E0E000
stack
page read and write
3238000
heap
page read and write
A8B000
heap
page read and write
BF0000
unkown
page readonly
4BC1000
heap
page read and write
E71000
unkown
page readonly
3100000
heap
page read and write
37A8000
unkown
page read and write
32F9000
heap
page read and write
4BC1000
heap
page read and write
EFA000
stack
page read and write
4D00000
trusted library allocation
page read and write
3285000
heap
page read and write
1751000
direct allocation
page execute and read and write
560000
unkown
page readonly
6440000
unclassified section
page read and write
A96000
heap
page read and write
4BC1000
heap
page read and write
5300000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
14A0000
direct allocation
page execute and read and write
A63000
heap
page read and write
2B20000
heap
page read and write
32A3000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
FB7000
heap
page read and write
8401000
heap
page read and write
4BC1000
heap
page read and write
163E000
direct allocation
page execute and read and write
6EEDF000
unkown
page readonly
32A9000
heap
page read and write
1220000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2AF2D601000
trusted library allocation
page read and write
4BC1000
heap
page read and write
DD2000
trusted library allocation
page read and write
521000
unkown
page execute read
2AF2D6C4000
trusted library allocation
page read and write
2AF2D511000
trusted library allocation
page read and write
4BC1000
heap
page read and write
2AF2B8D0000
system
page execute and read and write
4BC1000
heap
page read and write
4B50000
heap
page read and write
9ACD000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
520000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2420000
unkown
page read and write
4BC1000
heap
page read and write
998F000
stack
page read and write
840B000
heap
page read and write
17F0000
direct allocation
page read and write
550000
unkown
page readonly
4BC1000
heap
page read and write
845D000
heap
page read and write
3254000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2AF2D390000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4F1E000
stack
page read and write
2A63000
trusted library allocation
page read and write
8466000
heap
page read and write
B5E000
stack
page read and write
4BC1000
heap
page read and write
2AF2D50F000
trusted library allocation
page read and write
A28000
heap
page read and write
4BC1000
heap
page read and write
2B0E000
stack
page read and write
15CD000
direct allocation
page execute and read and write
3230000
heap
page read and write
520000
unkown
page readonly
133F000
stack
page read and write
5402000
direct allocation
page execute and read and write
25F0000
unkown
page readonly
F00000
heap
page read and write
5E0000
heap
page read and write
16B1000
unkown
page readonly
4FB0000
trusted library allocation
page read and write
4D42000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
FA0000
unkown
page readonly
52E000
unkown
page readonly
25A9000
unclassified section
page execute and read and write
E5A000
stack
page read and write
9F8E000
stack
page read and write
4BC1000
heap
page read and write
147F000
stack
page read and write
2460000
heap
page read and write
4BC1000
heap
page read and write
5412000
unclassified section
page read and write
83FE000
heap
page read and write
9BCD000
stack
page read and write
4BC1000
heap
page read and write
A56000
heap
page read and write
4D60000
trusted library allocation
page read and write
4BC1000
heap
page read and write
900000
unkown
page readonly
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
45CA000
unkown
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4F7B000
stack
page read and write
3285000
heap
page read and write
6A88000
unclassified section
page read and write
4BC1000
heap
page read and write
4114000
unkown
page read and write
4D50000
trusted library allocation
page read and write
52FE000
stack
page read and write
4BC1000
heap
page read and write
2AF2D390000
trusted library allocation
page read and write
8FC000
stack
page read and write
4BC1000
heap
page read and write
DF0000
trusted library allocation
page read and write
A70000
heap
page read and write
A20B000
stack
page read and write
2B10000
unkown
page readonly
5521000
system
page execute and read and write
4C9D000
trusted library allocation
page read and write
9994000
heap
page read and write
3104000
heap
page read and write
4BC1000
heap
page read and write
32FF000
heap
page read and write
37F9000
trusted library allocation
page read and write
537000
unkown
page readonly
17E8000
direct allocation
page execute and read and write
1320000
unkown
page readonly
4BC1000
heap
page read and write
325A000
heap
page read and write
F7C09FE000
stack
page read and write
3251000
heap
page read and write
550000
unkown
page readonly
9990000
heap
page read and write
1228000
heap
page read and write
4FC0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2DC2000
unkown
page read and write
940000
heap
page read and write
6EEC0000
unkown
page readonly
1040000
heap
page read and write
988E000
stack
page read and write
24EE000
stack
page read and write
2B24000
heap
page read and write
6764000
unclassified section
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
FB0000
unkown
page readonly
9D0D000
stack
page read and write
F7C11FF000
stack
page read and write
27C0000
trusted library allocation
page read and write
8401000
heap
page read and write
5135000
heap
page read and write
492C000
stack
page read and write
A60000
unkown
page read and write
3259000
heap
page read and write
2B922000
system
page read and write
4CB0000
trusted library allocation
page read and write
There are 646 hidden memdumps, click here to show them.