IOC Report
Quotation List Pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation List Pdf.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\y870G2JOQ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation List Pdf.exe
"C:\Users\user\Desktop\Quotation List Pdf.exe"
malicious
C:\Windows\System32\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Windows\regedit.exe
"C:\Windows\regedit.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Program Files (x86)\imKjXZcdkPvaNBmohymPyGBpYqHlJGFXfRwQSYwktKdQathTVR\tiwTBKVufjvhPL.exe
"C:\Program Files (x86)\imKjXZcdkPvaNBmohymPyGBpYqHlJGFXfRwQSYwktKdQathTVR\tiwTBKVufjvhPL.exe"
malicious
C:\Windows\SysWOW64\PING.EXE
"C:\Windows\SysWOW64\PING.EXE"
malicious
C:\Program Files (x86)\imKjXZcdkPvaNBmohymPyGBpYqHlJGFXfRwQSYwktKdQathTVR\tiwTBKVufjvhPL.exe
"C:\Program Files (x86)\imKjXZcdkPvaNBmohymPyGBpYqHlJGFXfRwQSYwktKdQathTVR\tiwTBKVufjvhPL.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.mycaringfriend.online/4xhu/?hv=kUigRkBAqBt1RQ4PHNukF4xZPToH+1QI6otQDXJCvCY9YbUgfI2Re+iS8c4dlot+geZi3vfTzLYXZH9sWq6jT8j+eYYKaAUwNfi+eLrrbumEku+3ygxonLPUoh3L9hGJlw==&Sbzdb=DvgXWdN
3.33.244.179
malicious
http://www.mycaringfriend.online/4xhu/
3.33.244.179
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
http://www.marttyes.top/o2rg/
203.161.41.207
https://duckduckgo.com/ac/?q=
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
http://www.ngkwnq.xyz/44zl/
35.241.41.54
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.yvw66.top/e5ni/?hv=5igWVKYME1F2HJuEqzDD4BytRWNfFWn6ld9EO0nuwIC7ejuHGgZWNZHr69K3UvIzgGWBTOng6QRLO5bRM99dWtUQcUECcC3CaxVjbCwQta3fR2FUS95NK5IjfJQajbbRQA==&Sbzdb=DvgXWdN
38.47.232.185
http://www.te74y.top/fuua/?hv=3fNRerFIk63V1+IMAu4qlsMdt7YNs0EnlFsxF2g0jvBo5aDcf8mM3XhGrDpzzYUjwL0bjZmkMy0lhAUZIEhvtJpfy2aMBt81fLEje/cDaztKC30TKJAPkx8cZzQFh5/qVA==&Sbzdb=DvgXWdN
38.47.207.94
https://aka.ms/nativeaot-c
unknown
http://www.fundraiserstuffies.com/vapn/
3.33.130.190
https://aka.ms/nativeaot-compatibilityy
unknown
http://www.eoghenluire.com/jtz4/
76.223.105.230
https://track.uc.cn/collect
unknown
http://www.ngkwnq.xyz/44zl/?hv=cT3mCg7Cmib/+TsqKgcGcLNa3rN7XS3dP4LITboVuuCqI7qZSFFYJV7Jt59+pqQMU8QRjoSmjIZC25OqP8KY8gmteTpLVZlDreUlLLyNnWL1wa1Nczp2K6xKprp1RRbIsA==&Sbzdb=DvgXWdN
35.241.41.54
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.yvw66.top/e5ni/
38.47.232.185
http://www.ajjmamlllqqq.xyz
unknown
https://www.ecosia.org/newtab/
unknown
http://www.fundraiserstuffies.com/vapn/?hv=zIQCtJPr8f6IEHIEo3TNC67HH9mmSCxic5WS7/A3sw1OteiabhN4nVuyPRk+K2L+MLR9kC9TPTQdF4ehIT0bCTCmTt1bteoRMu1plsZV53w6ucKr+pMiAUHXVfrsn+3QcA==&Sbzdb=DvgXWdN
3.33.130.190
http://www.ajjmamlllqqq.xyz/5lw2/
35.244.172.47
http://www.sponsoraveteran.info/v1kj/?hv=doj+6iUDZydJqFVnCXjkp3F4RUW5KXgrYHqPdL8oMaa0q7VqYsyQxdbUVD3Fk32bJgHvLY4KB1BicN6WuEPq/9BNjeLnpFWO+QoiBFVxHjC/ELqB/38Ky5muYdCtwXhrYw==&Sbzdb=DvgXWdN
3.33.130.190
http://www.marttyes.top/o2rg/?hv=HosprsjiipEFZkdlXtfyIs2HS8VP0Lx1JctxEV0LpDy1TX4kdcFD2HTZ1ZNwt0d2CmaO7pR5URztAlcHvOxdSj57tnDbyp24LsG2z7IhVzqV3j0gtM8YC4wacEpxZhptTA==&Sbzdb=DvgXWdN
203.161.41.207
http://www.aquamotricidad.com/8lwi/?hv=VRq/gdJR4rGg5JPfAG5ylFJXonLci7il5oNXQSZCeVYj1ovZxvPBP2fSASRs9V/B8emNhLugTvQrnEJ4A2g8ywXJhi2TGyyLJT3xrxwpBdhnsBD5VEgEmoQil+34l9QVbw==&Sbzdb=DvgXWdN
81.88.48.71
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.sponsoraveteran.info/v1kj/
3.33.130.190
https://hm.baidu.com/hm.js?
unknown
http://www.evoolihubs.shop/z6sg/?hv=zih0DoxsYMMKz8ZABxgT1WFK2McCJpyMbPq/OME2Y84w2Vm66kFudiKZ8IXY1l1UIMuRoxNGX/afyyUEkrlqrKni6t8ICyCnTx8av+sD3Gyos8WHaN8U0OpOBqhAw2rkZw==&Sbzdb=DvgXWdN
188.114.97.3
https://aka.ms/nativeaot-compatibility
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://aka.ms/nativeaot-compatibilityY
unknown
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
http://www.aquamotricidad.com/8lwi/
81.88.48.71
https://aka.ms/GlobalizationInvariantMode
unknown
http://www.poodlemum.com/17ef/?hv=BkwgEDM72plk1SoNdv8pOFX/Y0L1Y0wMy+4dvxwo/Oj/80wh3Wvb7+zqtjdXyImQl2Jnvy48BKhjFvscwh0k3TFr3WzonWtP3CiK72Em1Tp7LQVto/HSEXKZGZ++Ap7pGg==&Sbzdb=DvgXWdN
3.33.130.190
https://www.evoolihubs.shop/z6sg/?hv=zih0DoxsYMMKz8ZABxgT1WFK2McCJpyMbPq/OME2Y84w2Vm66kFudiKZ8IXY1l1
unknown
http://www.te74y.top/fuua/
38.47.207.94
http://www.ajjmamlllqqq.xyz/5lw2/?hv=iESIo6eVsdqcOmRYuFlUcr07YKkPV6iF6CPlu5h9EhLBhYFmo+CVfgok2cyX/3C89hOXIPK4L028RRlOYTTbn0S9j8UWgSdZAw9+mXeQ1LVvSh67jDUK/iIxNMtsobgO7w==&Sbzdb=DvgXWdN
35.244.172.47
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.poodlemum.com/17ef/
3.33.130.190
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
http://www.eoghenluire.com/jtz4/?hv=r1qQkpPieaVsNUG68+02NppS6IukHQ6wFXr4oQU+uO/CVftnLbVi7u9JfCXfhwamzeJuyCR7X8qwC2gN3XV8echUBAJmUx7G1CfEdwxlKk1EGrOsAByXTICV/hREjOoViQ==&Sbzdb=DvgXWdN
76.223.105.230
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.mycaringfriend.online
3.33.244.179
malicious
www.eoghenluire.com
unknown
malicious
www.yvw66.top
unknown
malicious
www.aquamotricidad.com
unknown
malicious
www.te74y.top
unknown
malicious
www.sponsoraveteran.info
unknown
malicious
www.fundraiserstuffies.com
unknown
malicious
www.poodlemum.com
unknown
malicious
www.evoolihubs.shop
188.114.97.3
sponsoraveteran.info
3.33.130.190
www.ngkwnq.xyz
35.241.41.54
www.ajjmamlllqqq.xyz
35.244.172.47
aquamotricidad.com
81.88.48.71
www.marttyes.top
203.161.41.207
poodlemum.com
3.33.130.190
fundraiserstuffies.com
3.33.130.190
te74y.top
38.47.207.94
eoghenluire.com
76.223.105.230
yvw66.top
38.47.232.185
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
3.33.244.179
www.mycaringfriend.online
United States
malicious
38.47.207.94
te74y.top
United States
35.244.172.47
www.ajjmamlllqqq.xyz
United States
188.114.97.3
www.evoolihubs.shop
European Union
76.223.105.230
eoghenluire.com
United States
38.47.232.185
yvw66.top
United States
203.161.41.207
www.marttyes.top
Malaysia
35.241.41.54
www.ngkwnq.xyz
United States
3.33.130.190
sponsoraveteran.info
United States
81.88.48.71
aquamotricidad.com
Italy

Memdumps

Base Address
Regiontype
Protect
Malicious
43B0000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3450000
trusted library allocation
page read and write
malicious
3410000
trusted library allocation
page read and write
malicious
7A30000
unclassified section
page execute and read and write
malicious
3080000
system
page execute and read and write
malicious
5780000
unclassified section
page execute and read and write
malicious
5210000
system
page execute and read and write
malicious
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
2B02000
unkown
page read and write
360000
unkown
page readonly
34B1000
heap
page read and write
3C0000
heap
page read and write
8571000
heap
page read and write
22D1C000
system
page read and write
34B1000
heap
page read and write
16FA4710000
trusted library allocation
page read and write
85FC000
heap
page read and write
8582000
heap
page read and write
34B1000
heap
page read and write
30DE000
heap
page read and write
F0000
unkown
page readonly
8594000
heap
page read and write
7030000
unclassified section
page execute and read and write
5480000
heap
page read and write
9F0000
unkown
page readonly
8588000
heap
page read and write
5280000
heap
page read and write
16FA2C60000
heap
page read and write
16FA48C4000
trusted library allocation
page read and write
34B1000
heap
page read and write
920000
unkown
page readonly
34B1000
heap
page read and write
25A4000
heap
page read and write
34B1000
heap
page read and write
16FC59C0000
heap
page read and write
2DDC000
unkown
page read and write
34B1000
heap
page read and write
D71000
unkown
page readonly
430A000
unkown
page read and write
7FF768671000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
16FA2CD3000
heap
page read and write
31AA000
heap
page read and write
34B1000
heap
page read and write
109F000
stack
page read and write
34B1000
heap
page read and write
16FA2CBD000
heap
page read and write
2300000
unkown
page read and write
380C000
unkown
page read and write
FE000
unkown
page readonly
34B1000
heap
page read and write
3EC2000
unclassified section
page read and write
5C30000
unclassified section
page execute and read and write
5260000
heap
page read and write
3B1000
unkown
page readonly
23C0000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
16FC5A2C000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
25A0000
heap
page read and write
34B1000
heap
page read and write
597E000
direct allocation
page execute and read and write
16FCCA00000
direct allocation
page read and write
FE000
unkown
page readonly
16FA2CD3000
heap
page read and write
3710000
trusted library allocation
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
8F03000
unclassified section
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
544C000
unkown
page read and write
34B1000
heap
page read and write
16FC7400000
direct allocation
page read and write
534C000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34A0000
heap
page read and write
25A4000
heap
page read and write
3791000
heap
page read and write
85D8000
heap
page read and write
23B0000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
2840000
stack
page read and write
34B1000
heap
page read and write
85AB000
heap
page read and write
34B1000
heap
page read and write
2B02000
unkown
page read and write
3C0000
heap
page read and write
16FA2AB0000
system
page execute and read and write
7FF7685C8000
unkown
page readonly
34B1000
heap
page read and write
5270000
heap
page read and write
7FF7685C8000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
9AA000
stack
page read and write
37CE000
stack
page read and write
34B1000
heap
page read and write
16FA48BE000
trusted library allocation
page read and write
3143000
heap
page read and write
2C1C000
unkown
page read and write
34B1000
heap
page read and write
3184000
heap
page read and write
16FA4703000
trusted library allocation
page read and write
380000
unkown
page readonly
DB0000
heap
page read and write
31BE000
heap
page read and write
4178000
unkown
page read and write
323E000
stack
page read and write
16FA4700000
trusted library allocation
page read and write
35E1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
16FCA104000
direct allocation
page read and write
84C6000
heap
page read and write
52A5000
system
page execute and read and write
F0000
unkown
page readonly
34B1000
heap
page read and write
3078000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
39AE000
direct allocation
page execute and read and write
3136000
heap
page read and write
30D6000
heap
page read and write
30DB000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
859E000
heap
page read and write
315C000
heap
page read and write
16FA4480000
heap
page read and write
34B1000
heap
page read and write
52CB000
heap
page read and write
48601FE000
stack
page read and write
2C0000
unkown
page readonly
22B5C000
system
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
590D000
direct allocation
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
485F9FC000
stack
page read and write
34B1000
heap
page read and write
7FF768678000
unkown
page read and write
34B1000
heap
page read and write
6FC000
stack
page read and write
1431000
unkown
page readonly
34B1000
heap
page read and write
390000
heap
page read and write
2990000
unkown
page read and write
30D0000
heap
page read and write
34B1000
heap
page read and write
16FA4600000
trusted library allocation
page read and write
3A0000
unkown
page read and write
34B1000
heap
page read and write
3A0000
unkown
page read and write
4B0C000
unclassified section
page read and write
4E30000
unclassified section
page read and write
2BC2000
unkown
page read and write
3F1C000
unclassified section
page read and write
D80000
unkown
page read and write
D5E000
stack
page read and write
EA0000
heap
page read and write
D60000
unkown
page read and write
560A000
unclassified section
page read and write
34B1000
heap
page read and write
3123000
heap
page read and write
2990000
unkown
page read and write
3149000
heap
page read and write
2A0000
unkown
page readonly
FE000
unkown
page readonly
34B1000
heap
page read and write
AD1000
unkown
page read and write
3290000
heap
page read and write
16FC5A26000
heap
page read and write
34B1000
heap
page read and write
303B000
stack
page read and write
85B1000
heap
page read and write
34B1000
heap
page read and write
7FF76857B000
unkown
page read and write
982B7F000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
DA0000
unkown
page readonly
35B0000
trusted library allocation
page read and write
D10000
heap
page read and write
34B1000
heap
page read and write
3795000
heap
page read and write
34B1000
heap
page read and write
3806000
heap
page read and write
4FC2000
unclassified section
page read and write
EA0000
heap
page read and write
EA8000
heap
page read and write
34B1000
heap
page read and write
16FC5A7E000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
2C0000
unkown
page readonly
370000
unkown
page readonly
780000
heap
page read and write
DA0000
unkown
page readonly
34B1000
heap
page read and write
7FF768430000
unkown
page readonly
34B1000
heap
page read and write
7B03000
unclassified section
page execute and read and write
34BE000
heap
page read and write
4FFB000
stack
page read and write
858A000
heap
page read and write
16FA2CD0000
heap
page read and write
3E54000
unkown
page read and write
3140000
heap
page read and write
73E000
stack
page read and write
3668000
heap
page read and write
34B1000
heap
page read and write
3199000
heap
page read and write
298F000
stack
page read and write
367A000
unkown
page read and write
6283000
unkown
page execute and read and write
8570000
heap
page read and write
3D0000
unkown
page read and write
4656000
unclassified section
page read and write
5770000
heap
page read and write
34B1000
heap
page read and write
33F0000
heap
page read and write
3AE1000
direct allocation
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
9E0000
unkown
page readonly
16FA2CA0000
heap
page read and write
16FC9803000
direct allocation
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
105000
unkown
page read and write
16FC5A20000
heap
page read and write
34B1000
heap
page read and write
400000
remote allocation
page execute and read and write
788000
heap
page read and write
34E8000
unkown
page read and write
ECC000
heap
page read and write
8560000
trusted library allocation
page read and write
2DDC000
unkown
page read and write
34B1000
heap
page read and write
33F0000
trusted library allocation
page read and write
47E8000
unclassified section
page read and write
3177000
heap
page read and write
5154000
unclassified section
page read and write
8580000
heap
page read and write
85DE000
heap
page read and write
30EE000
heap
page read and write
85E2000
heap
page read and write
84B5000
heap
page read and write
7A5000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
8710000
heap
page read and write
780000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
F1000
unkown
page execute read
7A95000
unclassified section
page execute and read and write
40DC000
unclassified section
page read and write
788000
heap
page read and write
16FA48B1000
trusted library allocation
page read and write
3280000
heap
page read and write
DB5000
heap
page read and write
34B1000
heap
page read and write
16FC59E0000
heap
page read and write
10A0000
unkown
page readonly
34B1000
heap
page read and write
48609FE000
stack
page read and write
34B1000
heap
page read and write
16FCD400000
direct allocation
page read and write
3939000
direct allocation
page execute and read and write
34B1000
heap
page read and write
9AA000
stack
page read and write
34B1000
heap
page read and write
3143000
heap
page read and write
6FC000
stack
page read and write
8576000
heap
page read and write
34B1000
heap
page read and write
16FA470E000
trusted library allocation
page read and write
A50000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
30D8000
heap
page read and write
34B1000
heap
page read and write
56BF000
stack
page read and write
34B1000
heap
page read and write
52B8000
heap
page read and write
34B1000
heap
page read and write
30DA000
heap
page read and write
5286000
system
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
3149000
heap
page read and write
34B1000
heap
page read and write
400000
remote allocation
page execute and read and write
8CCF000
stack
page read and write
30D8000
heap
page read and write
34B1000
heap
page read and write
85F7000
heap
page read and write
30DD000
heap
page read and write
34B1000
heap
page read and write
16FC9403000
direct allocation
page read and write
34B1000
heap
page read and write
107000
unkown
page readonly
3166000
heap
page read and write
360000
unkown
page readonly
34B1000
heap
page read and write
EA8000
heap
page read and write
982CFF000
stack
page read and write
77E000
stack
page read and write
16FC9800000
direct allocation
page read and write
16FC9C00000
direct allocation
page read and write
16FA4800000
trusted library allocation
page read and write
16FA2AD9000
system
page execute and read and write
287E000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
8585000
heap
page read and write
34B1000
heap
page read and write
85EC000
heap
page read and write
2FB0000
unkown
page execute and read and write
F1000
unkown
page execute read
109F000
stack
page read and write
34B1000
heap
page read and write
25B0000
unkown
page execute and read and write
5C2F000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
22A42000
system
page read and write
34B1000
heap
page read and write
31F0000
heap
page read and write
1AFDB3BF000
direct allocation
page read and write
22EF000
stack
page read and write
2B0000
unkown
page readonly
16FA2CA9000
heap
page read and write
34B1000
heap
page read and write
7FF76867D000
unkown
page read and write
5A91000
direct allocation
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
85EE000
heap
page read and write
105000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
D80000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
48611FE000
stack
page read and write
23104000
system
page read and write
399E000
unkown
page read and write
920000
unkown
page readonly
3FE6000
unkown
page read and write
16FA2ADD000
system
page execute and read and write
34B1000
heap
page read and write
2A10000
unkown
page readonly
1B05BEC0000
heap
page read and write
34B1000
heap
page read and write
3710000
trusted library allocation
page read and write
FE000
unkown
page readonly
39B0000
unkown
page execute and read and write
25A0000
heap
page read and write
D5E000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
F0000
unkown
page readonly
34B1000
heap
page read and write
390000
heap
page read and write
5B28000
direct allocation
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
7FF768680000
unkown
page readonly
34B1000
heap
page read and write
D10000
heap
page read and write
3B6E000
heap
page read and write
34B1000
heap
page read and write
3172000
heap
page read and write
105000
unkown
page read and write
52A2000
system
page execute and read and write
16FC5A10000
heap
page read and write
34B1000
heap
page read and write
32A000
stack
page read and write
34B1000
heap
page read and write
3810000
direct allocation
page execute and read and write
23B0000
heap
page read and write
52F9000
system
page execute and read and write
34B1000
heap
page read and write
85AB000
heap
page read and write
85F4000
heap
page read and write
84B0000
trusted library allocation
page read and write
10A0000
unkown
page readonly
85D0000
heap
page read and write
85F4000
heap
page read and write
982E7E000
stack
page read and write
85E5000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
16FA4520000
heap
page read and write
22B02000
system
page read and write
6A90000
trusted library allocation
page read and write
16FA4721000
trusted library allocation
page read and write
30E1000
heap
page read and write
DE0000
unkown
page readonly
34B1000
heap
page read and write
85BC000
heap
page read and write
16FA4801000
trusted library allocation
page read and write
2884000
heap
page read and write
31A4000
heap
page read and write
D00000
unkown
page readonly
34B1000
heap
page read and write
16FC9400000
direct allocation
page read and write
378E000
stack
page read and write
9903000
unclassified section
page execute and read and write
34B1000
heap
page read and write
3F0000
unkown
page readonly
34B1000
heap
page read and write
393D000
direct allocation
page execute and read and write
7FF768431000
unkown
page execute read
3156000
heap
page read and write
34B1000
heap
page read and write
16FA2B70000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
56FE000
stack
page read and write
34B0000
heap
page read and write
16FA2CCC000
heap
page read and write
31A8000
heap
page read and write
3CC2000
unkown
page read and write
3D0000
unkown
page read and write
2884000
heap
page read and write
16FCC000000
direct allocation
page read and write
319F000
heap
page read and write
2A00000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
930000
unkown
page readonly
3ADD000
direct allocation
page execute and read and write
34B1000
heap
page read and write
57E0000
direct allocation
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
7FF768430000
unkown
page readonly
2300000
unkown
page read and write
34B1000
heap
page read and write
5296000
system
page execute and read and write
34B1000
heap
page read and write
4483000
unkown
page execute and read and write
1B05C3D0000
direct allocation
page read and write
EBF000
heap
page read and write
34B1000
heap
page read and write
940000
unkown
page readonly
16FA4717000
trusted library allocation
page read and write
55BE000
stack
page read and write
16FA4530000
trusted library allocation
page read and write
5478000
unclassified section
page read and write
34B1000
heap
page read and write
3156000
heap
page read and write
497A000
unclassified section
page read and write
34B1000
heap
page read and write
2880000
heap
page read and write
85D0000
heap
page read and write
316D000
heap
page read and write
3294000
heap
page read and write
3B52000
direct allocation
page execute and read and write
8503000
unclassified section
page execute and read and write
34B1000
heap
page read and write
85E7000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
3E02000
unclassified section
page read and write
34B1000
heap
page read and write
527C000
system
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
1B05BFC0000
direct allocation
page read and write
34B1000
heap
page read and write
107000
unkown
page readonly
16FA4530000
trusted library allocation
page read and write
85B6000
heap
page read and write
7FF768671000
unkown
page write copy
34B1000
heap
page read and write
16FA470A000
trusted library allocation
page read and write
34B1000
heap
page read and write
2880000
heap
page read and write
29A0000
unkown
page read and write
52E6000
unclassified section
page read and write
34B1000
heap
page read and write
85B1000
heap
page read and write
F0000
unkown
page readonly
34B1000
heap
page read and write
2A0000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
D71000
unkown
page readonly
34B1000
heap
page read and write
3F0000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
2A10000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
23C0000
unkown
page readonly
52B0000
heap
page read and write
34B1000
heap
page read and write
7FF768680000
unkown
page readonly
F1000
unkown
page execute read
34B1000
heap
page read and write
370000
unkown
page readonly
34B1000
heap
page read and write
16FCA084000
direct allocation
page read and write
CFC000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
7FF768431000
unkown
page execute read
44C4000
unclassified section
page read and write
9827D9000
stack
page read and write
107000
unkown
page readonly
34B1000
heap
page read and write
3B30000
unkown
page read and write
9E0000
unkown
page readonly
16FC59B0000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
84C7000
heap
page read and write
4C9E000
unclassified section
page read and write
3294000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
30E1000
heap
page read and write
940000
unkown
page readonly
3B1000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
5AA6000
direct allocation
page execute and read and write
34B1000
heap
page read and write
107000
unkown
page readonly
34B1000
heap
page read and write
A50000
unkown
page readonly
2B0000
unkown
page readonly
30E6000
heap
page read and write
2A00000
heap
page read and write
34B1000
heap
page read and write
3294000
heap
page read and write
105000
unkown
page read and write
3660000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
CFC000
stack
page read and write
3710000
trusted library allocation
page read and write
A4F000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
327F000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
3294000
heap
page read and write
85F1000
heap
page read and write
3140000
heap
page read and write
D60000
unkown
page read and write
8C8E000
stack
page read and write
857B000
heap
page read and write
31C4000
unkown
page read and write
34B1000
heap
page read and write
32A000
stack
page read and write
85B6000
heap
page read and write
48619FE000
stack
page read and write
380000
unkown
page readonly
34B1000
heap
page read and write
85E8000
heap
page read and write
16FA48CE000
trusted library allocation
page read and write
F1000
unkown
page execute read
4E83000
unkown
page execute and read and write
29B0000
unkown
page read and write
930000
unkown
page readonly
1B05BFAF000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
4415000
unkown
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
85BC000
heap
page read and write
4EFC000
stack
page read and write
1430000
unkown
page readonly
3356000
unkown
page read and write
5883000
unkown
page execute and read and write
1B05BF89000
heap
page read and write
3131000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
6630000
unclassified section
page execute and read and write
34B1000
heap
page read and write
9F0000
unkown
page readonly
5700000
direct allocation
page read and write
DE0000
unkown
page readonly
5AAD000
direct allocation
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
D00000
unkown
page readonly
5909000
direct allocation
page execute and read and write
34B1000
heap
page read and write
3160000
heap
page read and write
85D2000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
DB0000
heap
page read and write
There are 624 hidden memdumps, click here to show them.