IOC Report
rPRESUPUESTO.exe

loading gif

Files

File Path
Type
Category
Malicious
rPRESUPUESTO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rPRESUPUESTO.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\07c402-5
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ggwsvlml.yr5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oaoerwqi.pzx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pul4memt.qud.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vtza4nxy.w3x.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rPRESUPUESTO.exe
"C:\Users\user\Desktop\rPRESUPUESTO.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPRESUPUESTO.exe"
malicious
C:\Users\user\Desktop\rPRESUPUESTO.exe
"C:\Users\user\Desktop\rPRESUPUESTO.exe"
malicious
C:\Program Files (x86)\HuaxilgvNMlvjXqnbAUTDSsPYLOkyuWgMOeQybdntYYLGjJr\MqDMLUHvZmSMqiwTfIsHo.exe
"C:\Program Files (x86)\HuaxilgvNMlvjXqnbAUTDSsPYLOkyuWgMOeQybdntYYLGjJr\MqDMLUHvZmSMqiwTfIsHo.exe"
malicious
C:\Windows\SysWOW64\ktmutil.exe
"C:\Windows\SysWOW64\ktmutil.exe"
malicious
C:\Program Files (x86)\HuaxilgvNMlvjXqnbAUTDSsPYLOkyuWgMOeQybdntYYLGjJr\MqDMLUHvZmSMqiwTfIsHo.exe
"C:\Program Files (x86)\HuaxilgvNMlvjXqnbAUTDSsPYLOkyuWgMOeQybdntYYLGjJr\MqDMLUHvZmSMqiwTfIsHo.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://www.rlplatro.sbs/hpa2/
109.123.121.243
malicious
http://www.transelva.com/edi4/
74.208.236.72
malicious
http://www.coinmao.com/irbt/
192.227.175.142
malicious
http://www.xsemckm.sbs/pyns/
47.242.109.15
malicious
http://www.quantumvoil.xyz/gb2c/
203.161.62.199
malicious
http://www.genesiestudios.online/s29p/
31.186.11.254
malicious
http://www.203av.com/dy54/
45.207.12.95
malicious
http://www.gsdaluan.shop/8urb/
192.207.62.21
malicious
http://www.hydrogenmovie.com/vi6c/
81.95.96.29
malicious
http://www.atmpla.net/n983/
103.224.182.246
malicious
http://www.europedriveguide.com/2pcd/
72.52.179.174
malicious
http://www.mommysdaycare.net/k4dg/
199.59.243.226
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://faq.active24.com/cz/162807-DNS-hosting?l=cs
unknown
https://gui.active24.cz/img/icon/a24-favicon-16x16.png
unknown
https://webftp.active24.com/
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-57x57.png
unknown
https://gui.active24.cz/img/icon/a24-favicon-32x32.png
unknown
https://faq.active24.com/cz/806087-Z%c3%a1kladn%c3%ad-informace
unknown
https://www.active24.com/webforward-mailforward
unknown
https://mssql.active24.com/
unknown
https://www.active24.com/domeny#m-certifikace
unknown
https://gui.active24.cz/img/default-domain/free.png
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://active24.com/cssc/a21/main.less?v=7d8e320747f67055c1a1008fbc40d0c1
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-152x152.png
unknown
https://www.active24.com/domeny
unknown
https://www.google.com
unknown
http://gq64q4.cn/user/design/clas/euse/sksueqquqf/81
unknown
https://www.active24.com/o-spolecnosti/obchodni-podminky
unknown
https://gui.active24.cz/library/theme/hp16/style.css
unknown
https://customer.active24.com/
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-114x114.png
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-180x180.png
unknown
https://active24.cz/objednavka/domain/availability/list
unknown
https://gui.active24.cz/font/active24-icons.eot
unknown
https://www.active24.com/o-spolecnosti/media
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://faq.active24.com/cz/045021-Webov%c3%a9-str%c3%a1nky-a-E-shopy
unknown
https://faq.active24.com/cz/085122-Hosting-a-Servery
unknown
https://gui.active24.cz/font/active24-icons.woff
unknown
https://www.active24.com/o-spolecnosti/kontakty
unknown
https://www.active24.com/weby/mojestranky
unknown
https://gui.active24.cz/img/icon/a24-favicon-96x96.png
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-76x76.png
unknown
https://www.transelva.com/edi4/?4dV43tA=NUWN0h33C1Yyooj/Nqm5TKnDvFAfPsTlu/xXoo6GTaC/958/rmN21lJSbp33
unknown
https://www.active24.com/jak-na-tvorbu-webu
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.genesiestudios.online
unknown
https://www.active24.com/o-spolecnosti/rikaji-o-nas-zakaznici
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-60x60.png
unknown
https://www.active24.com/o-spolecnosti/kariera
unknown
https://gui.active24.cz/img/default-domain/dnssec.png
unknown
https://faq.active24.com/cz/808905-E-mailov%c3%a1-%c5%99e%c5%a1en%c3%ad
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-120x120.png
unknown
https://gui.active24.cz/font/active24-icons.svg
unknown
https://gui.active24.cz/img/webmail_ikony_vlajky.png)
unknown
https://www.active24.com/o-spolecnosti
unknown
https://gui.active24.cz/img/icon/a24-ms-icon-144x144.png
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://faq.active24.com/cz/932337-Spolupr%c3%a1ce
unknown
https://faq.active24.com/cz/939671-Fakturace-a-platby
unknown
https://www.active24.com/dnssec
unknown
https://gui.active24.cz/font/active24-icons.ttf
unknown
https://www.active24.com/klientska-zona/zakaznicka-podpora
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://faq.active24.com/cz/757409-Bezpe%c4%8dnost
unknown
https://gui.active24.cz/img/default-domain/dns.png
unknown
https://blog.active24.cz//
unknown
http://ww7.europedriveguide.com/2pcd/?4dV43tA=tIH23YAAyU0vk1VwVlLsnDkrzub9KGyrHgMKKMQURaOCIZhbg0Upzh
unknown
https://www.ecosia.org/newtab/
unknown
https://gui.active24.cz/img/default-domain/superpage.png
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://faq.active24.com/cz/920729-Dom%c3%a9ny-a-DNS
unknown
https://www.active24.com/objednavka/login
unknown
https://webmail.active24.com/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://gui.active24.cz/img/default-domain/image.png
unknown
https://mysql.active24.com/
unknown
https://gui.active24.cz/css/landing.css
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-144x144.png
unknown
https://gui.active24.cz/img/default-domain/redirect.png
unknown
https://gui.active24.cz/img/default-domain/notify.png
unknown
https://gui.active24.cz/img/icon/a24-favicon-192x192.png
unknown
https://gui.active24.cz/img/icon/a24-apple-favicon-72x72.png
unknown
https://www.active24.com
unknown
https://www.superstranka.cz/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.active24.com/spoluprace
unknown
https://www.active24.com/upozorneni
unknown
There are 81 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
225.jtrhc.fun
192.207.62.21
malicious
www.mommysdaycare.net
199.59.243.226
malicious
www.coinmao.com
192.227.175.142
malicious
www.quantumvoil.xyz
203.161.62.199
malicious
genesiestudios.online
31.186.11.254
malicious
www.atmpla.net
103.224.182.246
malicious
2xin3.zhanghonghong.com
122.10.13.122
malicious
www.203av.com
45.207.12.95
malicious
www.b6fbly7u.shop
121.254.178.238
malicious
www.europedriveguide.com
72.52.179.174
malicious
www.xsemckm.sbs
47.242.109.15
malicious
www.rlplatro.sbs
109.123.121.243
malicious
www.transelva.com
74.208.236.72
malicious
www.hydrogenmovie.com
81.95.96.29
malicious
www.tcqlk.com
unknown
malicious
www.genesiestudios.online
unknown
malicious
www.gsdaluan.shop
unknown
malicious
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
122.10.13.122
2xin3.zhanghonghong.com
Hong Kong
malicious
74.208.236.72
www.transelva.com
United States
malicious
121.254.178.238
www.b6fbly7u.shop
Korea Republic of
malicious
192.207.62.21
225.jtrhc.fun
United States
malicious
72.52.179.174
www.europedriveguide.com
United States
malicious
192.227.175.142
www.coinmao.com
United States
malicious
199.59.243.226
www.mommysdaycare.net
United States
malicious
203.161.62.199
www.quantumvoil.xyz
Malaysia
malicious
109.123.121.243
www.rlplatro.sbs
United Kingdom
malicious
103.224.182.246
www.atmpla.net
Australia
malicious
31.186.11.254
genesiestudios.online
Turkey
malicious
45.207.12.95
www.203av.com
Seychelles
malicious
81.95.96.29
www.hydrogenmovie.com
Czech Republic
malicious
47.242.109.15
www.xsemckm.sbs
United States
malicious
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Blob

Memdumps

Base Address
Regiontype
Protect
Malicious
1600000
unclassified section
page execute and read and write
malicious
5560000
system
page execute and read and write
malicious
180000
system
page execute and read and write
malicious
720000
trusted library allocation
page read and write
malicious
760000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
27C1000
heap
page read and write
27C1000
heap
page read and write
44C8000
unkown
page read and write
75C4000
heap
page read and write
5340000
heap
page read and write
1F4179C4000
trusted library allocation
page read and write
1F415C53000
heap
page read and write
C9A000
trusted library allocation
page execute and read and write
603000
heap
page read and write
C8D000
trusted library allocation
page execute and read and write
36C6000
unclassified section
page read and write
CAB000
trusted library allocation
page execute and read and write
2C4D000
direct allocation
page execute and read and write
1F415C4C000
heap
page read and write
27C1000
heap
page read and write
1F415C53000
heap
page read and write
7551000
heap
page read and write
4E30000
heap
page execute and read and write
4260000
unkown
page execute and read and write
27C1000
heap
page read and write
28C0000
heap
page read and write
7550000
heap
page read and write
27C1000
heap
page read and write
1110000
unkown
page read and write
1320000
heap
page read and write
282D000
trusted library allocation
page read and write
44E8000
unclassified section
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
1F415A90000
system
page execute and read and write
27C1000
heap
page read and write
8148000
heap
page read and write
7C9F000
stack
page read and write
27C1000
heap
page read and write
2AB0000
trusted library allocation
page read and write
8122000
heap
page read and write
55B8000
system
page execute and read and write
CFA000
stack
page read and write
DFD000
stack
page read and write
27C1000
heap
page read and write
4D00000
unkown
page execute and read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
645000
heap
page read and write
1070000
unkown
page read and write
27C1000
heap
page read and write
5390000
trusted library allocation
page read and write
1120000
unkown
page readonly
1191000
unkown
page readonly
2E3C000
unkown
page read and write
659000
heap
page read and write
27C1000
heap
page read and write
5F3000
heap
page read and write
1AE8000
direct allocation
page execute and read and write
2821000
trusted library allocation
page read and write
1040000
unkown
page readonly
98E000
unkown
page readonly
27C1000
heap
page read and write
5D60000
trusted library allocation
page read and write
2D70000
unkown
page readonly
2DF1000
direct allocation
page execute and read and write
1030000
unkown
page readonly
27C1000
heap
page read and write
53A0000
trusted library allocation
page execute and read and write
27C1000
heap
page read and write
5FC000
heap
page read and write
27C1000
heap
page read and write
2E62000
direct allocation
page execute and read and write
6B0000
heap
page read and write
4E43000
heap
page read and write
DF0000
heap
page read and write
1347000
heap
page read and write
27C1000
heap
page read and write
76A0000
trusted library allocation
page read and write
27C1000
heap
page read and write
7C5E000
stack
page read and write
995000
unkown
page read and write
1F41780F000
trusted library allocation
page read and write
10FE000
stack
page read and write
27C1000
heap
page read and write
6CF000
heap
page read and write
5700000
unkown
page execute and read and write
27C1000
heap
page read and write
1120000
trusted library allocation
page read and write
1F417690000
heap
page read and write
2976000
heap
page read and write
15CFC000
system
page read and write
75C9000
heap
page read and write
2D60000
heap
page read and write
5CDD000
stack
page read and write
DFD000
stack
page read and write
7880000
trusted library allocation
page read and write
28ED000
heap
page read and write
1010000
unkown
page readonly
2AA3000
heap
page read and write
1F417803000
trusted library allocation
page read and write
27C1000
heap
page read and write
B60000
trusted library allocation
page read and write
8151000
heap
page read and write
27C1000
heap
page read and write
9D0000
heap
page read and write
1AF0000
unclassified section
page execute and read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
1F415C27000
heap
page read and write
3951000
trusted library allocation
page read and write
4D95000
trusted library allocation
page read and write
6B5000
heap
page read and write
11E4000
heap
page read and write
602000
heap
page read and write
4336000
unkown
page read and write
654000
heap
page read and write
C90000
unkown
page readonly
2CB0000
unkown
page read and write
62B000
heap
page read and write
53C8000
trusted library allocation
page read and write
7595000
heap
page read and write
27C1000
heap
page read and write
6E0000
heap
page read and write
1130000
heap
page read and write
5F1000
heap
page read and write
4D90000
trusted library allocation
page read and write
135D000
heap
page read and write
CC0000
trusted library allocation
page read and write
1060000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
7B00000
heap
page read and write
820E000
stack
page read and write
480C000
unclassified section
page read and write
1F4000
heap
page read and write
53DA000
trusted library allocation
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
997000
unkown
page readonly
27C1000
heap
page read and write
C80000
unkown
page readonly
2CAF000
stack
page read and write
1F417901000
trusted library allocation
page read and write
683000
heap
page read and write
574C000
unkown
page read and write
D8C000
stack
page read and write
27C1000
heap
page read and write
654000
heap
page read and write
2D04000
heap
page read and write
1F415C3D000
heap
page read and write
27C1000
heap
page read and write
1100000
trusted library allocation
page execute and read and write
1130000
trusted library allocation
page read and write
27C1000
heap
page read and write
677000
heap
page read and write
132E000
heap
page read and write
1F4000
heap
page read and write
7590000
heap
page read and write
1340000
heap
page read and write
640000
heap
page read and write
3B5C000
unkown
page read and write
75D5000
heap
page read and write
C92000
trusted library allocation
page read and write
1028000
heap
page read and write
98E000
unkown
page readonly
AEE000
stack
page read and write
2A9F000
heap
page read and write
11C0000
unkown
page readonly
1761000
unkown
page readonly
1050000
unkown
page readonly
78DE000
stack
page read and write
75B9000
heap
page read and write
294E000
stack
page read and write
512F000
stack
page read and write
1F4179CE000
trusted library allocation
page read and write
281E000
trusted library allocation
page read and write
FFE000
unkown
page read and write
C40000
unkown
page readonly
27C1000
heap
page read and write
C90000
trusted library allocation
page read and write
C83000
trusted library allocation
page read and write
27C1000
heap
page read and write
1F4179BE000
trusted library allocation
page read and write
27C1000
heap
page read and write
4012000
unkown
page read and write
6100000
unkown
page execute and read and write
CFA000
stack
page read and write
5B0B000
stack
page read and write
1F4000
heap
page read and write
BB5000
heap
page read and write
314C000
unclassified section
page read and write
27C1000
heap
page read and write
C73000
trusted library allocation
page execute and read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
55D6000
system
page execute and read and write
1310000
unkown
page readonly
27C1000
heap
page read and write
5D85000
heap
page read and write
27C1000
heap
page read and write
2AB0000
trusted library allocation
page read and write
C74000
trusted library allocation
page read and write
75D2000
heap
page read and write
1F417815000
trusted library allocation
page read and write
5EE0000
heap
page read and write
815F000
heap
page read and write
27C1000
heap
page read and write
C70000
trusted library allocation
page read and write
11E0000
heap
page read and write
1F417800000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
4E2000
unkown
page readonly
27C1000
heap
page read and write
7495000
heap
page read and write
1210000
heap
page read and write
5E8000
heap
page read and write
41A4000
unkown
page read and write
2E72000
unclassified section
page read and write
1130000
heap
page read and write
132A000
heap
page read and write
27C1000
heap
page read and write
75CF000
heap
page read and write
5FC000
heap
page read and write
18CD000
direct allocation
page execute and read and write
5E8E000
stack
page read and write
CA7000
trusted library allocation
page execute and read and write
18B1000
unkown
page readonly
27C1000
heap
page read and write
1F417813000
trusted library allocation
page read and write
27C1000
heap
page read and write
6F0000
heap
page read and write
BB3000
heap
page read and write
BA4000
heap
page read and write
2A10000
trusted library allocation
page execute and read and write
1310000
unkown
page readonly
8260000
trusted library section
page read and write
27C1000
heap
page read and write
C2A000
heap
page read and write
2B14000
heap
page read and write
27C1000
heap
page read and write
1000000
unkown
page readonly
10FB000
stack
page read and write
824B000
stack
page read and write
516E000
stack
page read and write
11E0000
heap
page read and write
5310000
trusted library allocation
page read and write
27C1000
heap
page read and write
1A51000
direct allocation
page execute and read and write
D60000
heap
page read and write
27C1000
heap
page read and write
780F000
stack
page read and write
1F415C20000
heap
page read and write
689000
heap
page read and write
5350000
trusted library allocation
page read and write
C7D000
trusted library allocation
page execute and read and write
27C1000
heap
page read and write
1010000
unkown
page readonly
C2905FF000
stack
page read and write
117E000
stack
page read and write
5398000
trusted library allocation
page read and write
B2E000
stack
page read and write
755B000
heap
page read and write
2EF0000
unclassified section
page execute and read and write
981000
unkown
page execute read
27C1000
heap
page read and write
817C000
heap
page read and write
3AAA000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
36A6000
unkown
page read and write
27C1000
heap
page read and write
52FE000
stack
page read and write
75D7000
heap
page read and write
27C1000
heap
page read and write
640000
heap
page read and write
27C1000
heap
page read and write
1349000
heap
page read and write
27C1000
heap
page read and write
5AB0000
trusted library allocation
page read and write
1F415C50000
heap
page read and write
839000
stack
page read and write
C80000
trusted library allocation
page read and write
AE6C000
stack
page read and write
C1E000
heap
page read and write
8112000
heap
page read and write
11E4000
heap
page read and write
B30000
heap
page read and write
710000
heap
page read and write
27C1000
heap
page read and write
980000
unkown
page readonly
27C1000
heap
page read and write
27C1000
heap
page read and write
720000
trusted library allocation
page read and write
502E000
stack
page read and write
4390000
unclassified section
page execute and read and write
27C1000
heap
page read and write
400000
heap
page read and write
27C1000
heap
page read and write
770E000
stack
page read and write
27C1000
heap
page read and write
535E000
trusted library allocation
page read and write
27C1000
heap
page read and write
5360000
trusted library allocation
page execute and read and write
C60000
unkown
page readonly
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
1130000
heap
page read and write
27C1000
heap
page read and write
1040000
unkown
page readonly
7FBB0000
trusted library allocation
page execute and read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
1580000
direct allocation
page read and write
2768000
trusted library allocation
page read and write
7480000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
5F07000
heap
page read and write
27C1000
heap
page read and write
1180000
unkown
page read and write
5F8000
heap
page read and write
6AA000
heap
page read and write
3534000
unclassified section
page read and write
27C1000
heap
page read and write
562B000
system
page execute and read and write
27C1000
heap
page read and write
5F3000
heap
page read and write
157F000
stack
page read and write
758E000
heap
page read and write
55D4000
system
page execute and read and write
5B30000
heap
page read and write
27C1000
heap
page read and write
7C82000
trusted library allocation
page read and write
2CE0000
unkown
page read and write
3B94000
trusted library allocation
page read and write
981000
unkown
page execute read
1650000
heap
page read and write
98E000
unkown
page readonly
27C1000
heap
page read and write
CD0000
heap
page execute and read and write
7830000
trusted library allocation
page read and write
2E60000
unkown
page execute and read and write
2E52000
unkown
page read and write
75CE000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
6BB000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
535B000
trusted library allocation
page read and write
2CB0000
unkown
page read and write
75DD000
heap
page read and write
F6F000
stack
page read and write
756A000
heap
page read and write
7A3E000
stack
page read and write
39CA000
unkown
page read and write
39EA000
unclassified section
page read and write
1F4179B4000
trusted library allocation
page read and write
AA8E000
stack
page read and write
27C1000
heap
page read and write
2800000
trusted library allocation
page read and write
5FC000
heap
page read and write
27C1000
heap
page read and write
17A0000
direct allocation
page execute and read and write
650000
heap
page read and write
55AE000
system
page execute and read and write
659000
heap
page read and write
5D70000
trusted library allocation
page execute and read and write
2D10000
unkown
page readonly
10BE000
stack
page read and write
58E000
unkown
page readonly
2970000
trusted library allocation
page read and write
C70000
unkown
page readonly
132A000
heap
page read and write
759A000
heap
page read and write
27C1000
heap
page read and write
312C000
unkown
page read and write
24F0000
unclassified section
page execute and read and write
5CCE000
stack
page read and write
2CBE000
direct allocation
page execute and read and write
2B20000
direct allocation
page execute and read and write
27C1000
heap
page read and write
75C6000
heap
page read and write
27C1000
heap
page read and write
981000
unkown
page execute read
2F12000
unkown
page read and write
2BAE000
stack
page read and write
1101000
unkown
page readonly
27C1000
heap
page read and write
27C1000
heap
page read and write
41C4000
unclassified section
page read and write
5ECE000
stack
page read and write
52BE000
stack
page read and write
467A000
unclassified section
page read and write
7568000
heap
page read and write
C80000
unkown
page readonly
53B9000
trusted library allocation
page read and write
27C1000
heap
page read and write
1050000
unkown
page readonly
8193000
heap
page read and write
27C1000
heap
page read and write
2F32000
unclassified section
page read and write
5B10000
heap
page read and write
695000
heap
page read and write
2BCB000
trusted library allocation
page read and write
27C1000
heap
page read and write
4356000
unclassified section
page read and write
1030000
unkown
page readonly
3514000
unkown
page read and write
53E4000
trusted library allocation
page read and write
1F4174D0000
trusted library allocation
page read and write
27C1000
heap
page read and write
2D70000
unkown
page readonly
C40000
unkown
page readonly
27C1000
heap
page read and write
312C000
unkown
page read and write
997000
unkown
page readonly
27C1000
heap
page read and write
27C1000
heap
page read and write
981000
unkown
page execute read
B8F000
heap
page read and write
11F0000
heap
page read and write
4E0E000
stack
page read and write
1520000
unkown
page readonly
11F0000
heap
page read and write
130E000
stack
page read and write
5E0000
heap
page read and write
2951000
trusted library allocation
page read and write
4C60000
unkown
page execute and read and write
1120000
unkown
page readonly
27C1000
heap
page read and write
1F415BB0000
heap
page read and write
1F415B70000
heap
page read and write
1101000
unkown
page readonly
465A000
unkown
page read and write
7580000
heap
page read and write
27C1000
heap
page read and write
4FEE000
stack
page read and write
27C1000
heap
page read and write
2C49000
direct allocation
page execute and read and write
1F417821000
trusted library allocation
page read and write
27C1000
heap
page read and write
175F000
stack
page read and write
D1E000
stack
page read and write
27CA000
heap
page read and write
C28F5FD000
stack
page read and write
75B3000
heap
page read and write
3CEE000
unkown
page read and write
18C9000
direct allocation
page execute and read and write
2832000
trusted library allocation
page read and write
5D5E000
stack
page read and write
9A0000
heap
page read and write
7870000
trusted library allocation
page execute and read and write
10BE000
stack
page read and write
666000
heap
page read and write
18B1000
unkown
page readonly
27C1000
heap
page read and write
1200000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
990000
heap
page read and write
83EF000
stack
page read and write
27C1000
heap
page read and write
5ED0000
heap
page read and write
27C1000
heap
page read and write
7820000
trusted library section
page read and write
2D10000
unkown
page readonly
27C1000
heap
page read and write
4DA0000
trusted library allocation
page read and write
1F41780A000
trusted library allocation
page read and write
27C1000
heap
page read and write
4E0000
unkown
page readonly
7810000
heap
page read and write
11A0000
unkown
page read and write
27C1000
heap
page read and write
C50000
unkown
page readonly
7540000
trusted library allocation
page read and write
27C1000
heap
page read and write
C90000
unkown
page readonly
AD6E000
stack
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
3990000
unclassified section
page execute and read and write
2E52000
unkown
page read and write
1F4174D0000
trusted library allocation
page read and write
1F415B60000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
9D5000
heap
page read and write
C50000
unkown
page readonly
27C1000
heap
page read and write
27C1000
heap
page read and write
C28FDFE000
stack
page read and write
2D04000
heap
page read and write
27C1000
heap
page read and write
2804000
trusted library allocation
page read and write
27C1000
heap
page read and write
CCA000
stack
page read and write
27C1000
heap
page read and write
59D0000
trusted library allocation
page read and write
1110000
unkown
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
980000
unkown
page readonly
995000
unkown
page read and write
1A66000
direct allocation
page execute and read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
1020000
heap
page read and write
1000000
unkown
page readonly
27C1000
heap
page read and write
27C1000
heap
page read and write
1191000
unkown
page readonly
2E40000
heap
page read and write
27C1000
heap
page read and write
53E0000
trusted library allocation
page read and write
27C1000
heap
page read and write
7560000
heap
page read and write
5B20000
trusted library section
page readonly
27C1000
heap
page read and write
526E000
stack
page read and write
27C1000
heap
page read and write
1020000
heap
page read and write
AACE000
stack
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
75D8000
heap
page read and write
27C1000
heap
page read and write
53DF000
trusted library allocation
page read and write
15A22000
system
page read and write
2AB0000
trusted library allocation
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
3D0E000
unclassified section
page read and write
DCC000
stack
page read and write
27C1000
heap
page read and write
2DED000
direct allocation
page execute and read and write
7B5E000
stack
page read and write
7565000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
749E000
heap
page read and write
132E000
heap
page read and write
76C0000
trusted library allocation
page read and write
788B000
trusted library allocation
page read and write
C70000
unkown
page readonly
4E40000
heap
page read and write
27C1000
heap
page read and write
7810000
trusted library allocation
page execute and read and write
27C1000
heap
page read and write
80D0000
heap
page read and write
1140000
heap
page read and write
4D90000
unclassified section
page execute and read and write
1F4174D0000
trusted library allocation
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
67F000
heap
page read and write
937000
stack
page read and write
27C1000
heap
page read and write
53D0000
trusted library allocation
page read and write
E6F000
stack
page read and write
53B5000
trusted library allocation
page read and write
15FE000
stack
page read and write
DCC000
stack
page read and write
11A0000
unkown
page read and write
27C1000
heap
page read and write
76B0000
trusted library section
page read and write
2D60000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
B97000
heap
page read and write
8146000
heap
page read and write
53F0000
trusted library allocation
page read and write
671000
heap
page read and write
27C1000
heap
page read and write
53D5000
trusted library allocation
page read and write
758A000
heap
page read and write
27C1000
heap
page read and write
602000
heap
page read and write
2D00000
heap
page read and write
1F417700000
trusted library allocation
page read and write
75AE000
heap
page read and write
38F0000
unclassified section
page execute and read and write
130F000
stack
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
5AA0000
trusted library allocation
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
997000
unkown
page readonly
4A4C000
stack
page read and write
818F000
heap
page read and write
2D00000
heap
page read and write
15AE2000
system
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
997000
unkown
page readonly
11D0000
heap
page read and write
3961000
trusted library allocation
page read and write
10B000
stack
page read and write
5FC000
heap
page read and write
1180000
unkown
page read and write
C60000
unkown
page readonly
2CD0000
unkown
page read and write
1110000
trusted library allocation
page read and write
98E000
unkown
page readonly
1A6D000
direct allocation
page execute and read and write
1060000
heap
page read and write
27C1000
heap
page read and write
151F000
stack
page read and write
27C1000
heap
page read and write
5FC000
heap
page read and write
5D1E000
stack
page read and write
C28EDFB000
stack
page read and write
75C9000
heap
page read and write
1761000
unkown
page readonly
13D0000
unkown
page readonly
55C8000
system
page execute and read and write
27C1000
heap
page read and write
2F6C000
unkown
page read and write
7556000
heap
page read and write
7562000
heap
page read and write
27C1000
heap
page read and write
1145000
heap
page read and write
27C1000
heap
page read and write
53B2000
trusted library allocation
page read and write
CA2000
trusted library allocation
page read and write
27C1000
heap
page read and write
3EA0000
unclassified section
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
3860000
unkown
page execute and read and write
51E000
stack
page read and write
53FB000
trusted library allocation
page read and write
13CF000
stack
page read and write
5C8E000
stack
page read and write
1130000
heap
page read and write
3B7C000
unclassified section
page read and write
B7E000
heap
page read and write
27C1000
heap
page read and write
645000
heap
page read and write
4032000
unclassified section
page read and write
B70000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
2826000
trusted library allocation
page read and write
147E000
stack
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
995000
unkown
page read and write
980000
unkown
page readonly
27C1000
heap
page read and write
666000
heap
page read and write
3E80000
unkown
page read and write
ABCE000
stack
page read and write
5F1000
heap
page read and write
1F415C30000
heap
page read and write
27C1000
heap
page read and write
47EC000
unkown
page read and write
5D80000
heap
page read and write
11C0000
unkown
page readonly
1F415AC5000
system
page execute and read and write
980000
unkown
page readonly
1070000
unkown
page read and write
CCA000
stack
page read and write
27C1000
heap
page read and write
5370000
heap
page read and write
27C1000
heap
page read and write
793E000
stack
page read and write
5FC000
heap
page read and write
148000
stack
page read and write
27C1000
heap
page read and write
7480000
trusted library allocation
page read and write
27C1000
heap
page read and write
995000
unkown
page read and write
27C1000
heap
page read and write
55F000
stack
page read and write
27C1000
heap
page read and write
53BD000
trusted library allocation
page read and write
650000
heap
page read and write
2840000
heap
page read and write
C96000
trusted library allocation
page execute and read and write
2CD0000
unkown
page read and write
75BF000
heap
page read and write
27C1000
heap
page read and write
1F0000
heap
page read and write
1028000
heap
page read and write
27C1000
heap
page read and write
2F8C000
unclassified section
page read and write
1520000
unkown
page readonly
27C1000
heap
page read and write
13D0000
unkown
page readonly
2E40000
heap
page read and write
1320000
heap
page read and write
27C1000
heap
page read and write
27C1000
heap
page read and write
27C0000
heap
page read and write
193E000
direct allocation
page execute and read and write
7574000
heap
page read and write
D5C000
stack
page read and write
There are 705 hidden memdumps, click here to show them.