IOC Report
Request for Quotation for PTTEP - EPCC for SISGES Development Project 2.exe

loading gif

Files

File Path
Type
Category
Malicious
Request for Quotation for PTTEP - EPCC for SISGES Development Project 2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1-673479
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\aut1BE5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut1C15.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cerecloths
data
dropped
C:\Users\user\AppData\Local\Temp\exhilaratingly
ASCII text, with very long lines (28756), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Request for Quotation for PTTEP - EPCC for SISGES Development Project 2.exe
"C:\Users\user\Desktop\Request for Quotation for PTTEP - EPCC for SISGES Development Project 2.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Request for Quotation for PTTEP - EPCC for SISGES Development Project 2.exe"
malicious
C:\Program Files (x86)\iKNmzFfFgrrPOeSHltSpZMrQNKJTmclXpOPcoazBWvRlIjHILwtNsamegFO\iMkYSrQTtTrGyHYf.exe
"C:\Program Files (x86)\iKNmzFfFgrrPOeSHltSpZMrQNKJTmclXpOPcoazBWvRlIjHILwtNsamegFO\iMkYSrQTtTrGyHYf.exe"
malicious
C:\Windows\SysWOW64\RMActivate_ssp.exe
"C:\Windows\SysWOW64\RMActivate_ssp.exe"
malicious
C:\Program Files (x86)\iKNmzFfFgrrPOeSHltSpZMrQNKJTmclXpOPcoazBWvRlIjHILwtNsamegFO\iMkYSrQTtTrGyHYf.exe
"C:\Program Files (x86)\iKNmzFfFgrrPOeSHltSpZMrQNKJTmclXpOPcoazBWvRlIjHILwtNsamegFO\iMkYSrQTtTrGyHYf.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.a9jcpf.top/1kbe/
45.126.181.243
malicious
http://www.webuyfontana.com/cns4/?3prdkVqx=b+X9HsydX2EZhoFbHWDGWLn8qSDjJiBvgg2FVhcLABkhzzs0ucmBPDMRqtKe3XUMFDw5FS9Ji9Imkcb4M+SgV1CrLIKWT8R/LC2e+AlJEb/hHwO3uGNSJEs=&RvYDw=90B0ZBu0r6iPPND0
3.64.163.50
malicious
http://www.778981.com/p1dd/?RvYDw=90B0ZBu0r6iPPND0&3prdkVqx=G7DDmCfNGXy3uJCEgcIIU1iXFvarFYWbvsRS9sxoYaNScQyM2A1goKEbo8KV9mX8trrejs5AH6YGa7AwDEXag2zD7gw0a+PZJfygUURv+5LCwJWR5NAeUOI=
165.154.0.120
malicious
http://www.augaqfp.lol/l8a4/?3prdkVqx=CPL7YN3vcnDyuUFtA6pv3uMhLFbLrJb1JE9LZisFmiEQ0vYrwOGtj9QBvlTfLzXcbjIACE/TYt0vO88JJ7+OI7LCsTQn12dDmlA0tsWVEcE74AqN9n1fFjE=&RvYDw=90B0ZBu0r6iPPND0
116.213.43.190
malicious
http://www.ytw6.top/rmef/?3prdkVqx=UdI5Nug9LeCq3QKyZxAFTuhDHYNaCA3T0/tR5L8b4jWaA2fUCVH3fLw1ebDEBIsiTWaLxfrgjTz4bD/84RJrNmZZ6yqPN++//ptV/K/4BOxQ2TPEoKO+wL0=&RvYDw=90B0ZBu0r6iPPND0
38.47.232.224
malicious
http://www.lexiecos.top/ff8d/
203.161.55.102
malicious
http://www.lexiecos.top/ff8d/?3prdkVqx=ohJD03igrpR8lwlwc1M4EqZrzingiHicFb+y4T5GGfrPyp+0FgUaOIwicDYxE9IqyQjr9lfiRuNbkNF7eyT6Zergy2OfkJkLywWhdn0W3d/t29Aith2p64g=&RvYDw=90B0ZBu0r6iPPND0
203.161.55.102
malicious
http://www.webuyfontana.com/cns4/
3.64.163.50
malicious
http://www.binpvae.lol/kfqo/
116.213.43.190
malicious
http://www.mhtnvro.lol/il19/?3prdkVqx=2W0Inf+zka60rkge6x3gGQQeo1iuz6hi+bPXuzv4I1vHSGtqZzoorLZZnoCmwyX2i4rMR0gWWwZYBzao7rAttPu5367SyozTICrQ88OWOZt9joXCP1iWm4I=&RvYDw=90B0ZBu0r6iPPND0
116.213.43.190
malicious
http://www.ytw6.top/rmef/
38.47.232.224
malicious
http://www.mhtnvro.lol/il19/
116.213.43.190
malicious
http://www.hsck520.com
unknown
malicious
http://www.binpvae.lol/kfqo/?3prdkVqx=NiOdQOuMLD2zHgMWwKws4JzuutDmLpx3tWxYTf2s7ZGupi3Uz5m5Dts89dE7D44P7JMDqAvEJ+8u+Llyo4b9pPx+fjdmUm+qFImntH+EZRPwIZM2dcS4AHM=&RvYDw=90B0ZBu0r6iPPND0
116.213.43.190
malicious
http://www.augaqfp.lol/l8a4/
116.213.43.190
malicious
https://cdn.livechatinc.com/tracking.js
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
https://duckduckgo.com/ac/?q=
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
http://www.webuyfontana.com/
unknown
https://track.uc.cn/collect
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.hsck520.com/2e2r/
35.190.52.58
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://v-cn.vaptcha.com/v3.js
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://hm.baidu.com/hm.js?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
https://www.livechat.com/chat-with/14282961/
unknown
https://www.livechat.com/?welcome
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ytw6.top
38.47.232.224
malicious
aj.ajunsdfancsda.com
45.126.181.243
malicious
www.binpvae.lol
116.213.43.190
malicious
www.lexiecos.top
203.161.55.102
malicious
www.augaqfp.lol
116.213.43.190
malicious
www.mhtnvro.lol
116.213.43.190
malicious
7a4ca695fd164z.greycdn.net
165.154.0.120
malicious
www.webuyfontana.com
3.64.163.50
malicious
www.778981.com
unknown
malicious
www.byteffederal.com
unknown
malicious
www.jjkelker.com
unknown
malicious
www.ytw6.top
unknown
malicious
www.caroinapottery.com
unknown
malicious
www.a9jcpf.top
unknown
malicious
www.mebutnotme.store
unknown
malicious
www.hsck520.com
35.190.52.58
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
45.126.181.243
aj.ajunsdfancsda.com
Hong Kong
malicious
203.161.55.102
www.lexiecos.top
Malaysia
malicious
165.154.0.120
7a4ca695fd164z.greycdn.net
Canada
malicious
3.64.163.50
www.webuyfontana.com
United States
malicious
38.47.232.224
ytw6.top
United States
malicious
116.213.43.190
www.binpvae.lol
Hong Kong
malicious
35.190.52.58
www.hsck520.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5130000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
2CD0000
trusted library allocation
page read and write
malicious
2D10000
trusted library allocation
page read and write
malicious
2610000
system
page execute and read and write
malicious
32D0000
unclassified section
page execute and read and write
malicious
36E0000
unkown
page execute and read and write
malicious
4600000
unclassified section
page execute and read and write
malicious
3AC9000
direct allocation
page read and write
2A91000
heap
page read and write
343E3FF000
stack
page read and write
3B1D000
direct allocation
page read and write
1620000
unkown
page readonly
3850000
direct allocation
page read and write
408C000
unclassified section
page read and write
BE1000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
3A50000
unkown
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A9A000
stack
page read and write
2BE0000
heap
page read and write
2A91000
heap
page read and write
1212000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1BED91E0000
trusted library allocation
page read and write
AB0000
unkown
page readonly
46D4000
unclassified section
page read and write
2A91000
heap
page read and write
79A3000
heap
page read and write
2A91000
heap
page read and write
2B90000
heap
page read and write
E00000
heap
page read and write
11FF000
heap
page read and write
2A91000
heap
page read and write
1020000
heap
page read and write
39A0000
direct allocation
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
39A0000
direct allocation
page read and write
4E9C000
unclassified section
page execute and read and write
3B19000
direct allocation
page read and write
2C13000
heap
page read and write
30E4000
unkown
page read and write
1098000
heap
page read and write
2A91000
heap
page read and write
10E6000
heap
page read and write
80AF000
stack
page read and write
1004000
heap
page read and write
1054000
heap
page read and write
DE0000
unkown
page readonly
1063000
heap
page read and write
2E1A000
heap
page read and write
970000
heap
page read and write
8E7000
unkown
page readonly
2A91000
heap
page read and write
AA0000
unkown
page readonly
2E90000
trusted library allocation
page read and write
2A91000
heap
page read and write
10E6000
heap
page read and write
E90000
heap
page read and write
106C000
heap
page read and write
79B7000
heap
page read and write
B70000
unkown
page readonly
EE4000
heap
page read and write
2C61000
heap
page read and write
2A91000
heap
page read and write
AB0000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
8DE000
unkown
page readonly
EE0000
heap
page read and write
2A91000
heap
page read and write
7971000
heap
page read and write
292F000
stack
page read and write
960000
unkown
page readonly
2C54000
heap
page read and write
93A000
stack
page read and write
2A91000
heap
page read and write
B1A000
stack
page read and write
BD0000
unkown
page read and write
BF0000
unkown
page read and write
2A91000
heap
page read and write
DFE000
stack
page read and write
1794C000
system
page read and write
1420000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1090000
heap
page read and write
37CD000
direct allocation
page execute and read and write
10CF000
heap
page read and write
2A91000
heap
page read and write
1010000
unkown
page read and write
1BED76E0000
system
page execute and read and write
F00000
direct allocation
page read and write
79A5000
heap
page read and write
27F0000
heap
page read and write
5226000
system
page execute and read and write
2A91000
heap
page read and write
2C4A000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
4560000
unkown
page read and write
2A91000
heap
page read and write
2CD3000
heap
page read and write
2BE2000
heap
page read and write
2C4E000
heap
page read and write
2CFC000
unkown
page read and write
3C00000
unclassified section
page execute and read and write
1063000
heap
page read and write
2C40000
heap
page read and write
2A91000
heap
page read and write
2C13000
heap
page read and write
870000
unkown
page readonly
9E1000
unkown
page readonly
DE0000
unkown
page readonly
588000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
B80000
heap
page read and write
4C0000
unkown
page readonly
9D0000
heap
page read and write
39F0000
direct allocation
page read and write
2A91000
heap
page read and write
3290000
direct allocation
page read and write
1090000
unkown
page readonly
9E1000
unkown
page readonly
1189000
heap
page read and write
2C13000
heap
page read and write
2C13000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
3B76000
heap
page read and write
50B000
stack
page read and write
2E05000
heap
page read and write
1090000
unkown
page readonly
2680000
heap
page read and write
3F06000
unkown
page read and write
1290000
unkown
page readonly
C5B000
stack
page read and write
3000000
heap
page read and write
2A91000
heap
page read and write
970000
heap
page read and write
9F0000
unkown
page read and write
2A91000
heap
page read and write
1C2F000
stack
page read and write
2C7D000
heap
page read and write
548000
stack
page read and write
2B90000
trusted library allocation
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
4C1000
unkown
page execute read
2A91000
heap
page read and write
797B000
heap
page read and write
39F0000
direct allocation
page read and write
2A91000
heap
page read and write
9C0000
unkown
page read and write
3B01000
heap
page read and write
B60000
unkown
page readonly
1BED9310000
trusted library allocation
page read and write
3923000
direct allocation
page read and write
10CE000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
10CF000
heap
page read and write
8E5000
unkown
page read and write
2A91000
heap
page read and write
8E7000
unkown
page readonly
2A91000
heap
page read and write
17732000
system
page read and write
1038000
heap
page read and write
2A91000
heap
page read and write
BD0000
unkown
page read and write
52AC000
unkown
page read and write
2A91000
heap
page read and write
4866000
unclassified section
page read and write
279E000
stack
page read and write
1BED777A000
system
page execute and read and write
1064000
heap
page read and write
2E90000
trusted library allocation
page read and write
7981000
heap
page read and write
2BF0000
unkown
page readonly
2F0E000
stack
page read and write
10E7000
heap
page read and write
2A91000
heap
page read and write
3300000
heap
page read and write
EFD000
stack
page read and write
2A22000
unkown
page read and write
3B8E000
direct allocation
page read and write
3800000
direct allocation
page read and write
10E0000
heap
page read and write
1010000
unkown
page read and write
2674000
heap
page read and write
1222000
heap
page read and write
9D0000
heap
page read and write
2A91000
heap
page read and write
362D000
direct allocation
page execute and read and write
3382000
unclassified section
page read and write
45D9000
unkown
page read and write
2A91000
heap
page read and write
1220000
heap
page read and write
106F000
heap
page read and write
860000
unkown
page readonly
39A0000
direct allocation
page read and write
2A91000
heap
page read and write
3B1D000
direct allocation
page read and write
2A91000
heap
page read and write
10E6000
heap
page read and write
2A91000
heap
page read and write
1BED7890000
heap
page read and write
2A90000
heap
page read and write
2A91000
heap
page read and write
EF0000
direct allocation
page execute and read and write
1020000
heap
page read and write
1BED777C000
system
page execute and read and write
BF0000
unkown
page read and write
3223000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
10B4000
heap
page read and write
3F7C000
unkown
page execute and read and write
3ACD000
direct allocation
page read and write
2A91000
heap
page read and write
2BDB000
heap
page read and write
2A91000
heap
page read and write
3B1D000
direct allocation
page read and write
2C3C000
heap
page read and write
9BE000
stack
page read and write
FE0000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
301E000
heap
page read and write
7999000
heap
page read and write
8E5000
unkown
page read and write
8D1000
unkown
page execute read
2A91000
heap
page read and write
1004000
heap
page read and write
583000
unkown
page write copy
1BED789F000
heap
page read and write
950000
unkown
page readonly
2A91000
heap
page read and write
10E6000
heap
page read and write
108F000
stack
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
37D1000
direct allocation
page execute and read and write
2A5C000
stack
page read and write
2A91000
heap
page read and write
328F000
stack
page read and write
3842000
direct allocation
page execute and read and write
7A60000
trusted library allocation
page read and write
2FA9000
heap
page read and write
3B19000
direct allocation
page read and write
7993000
heap
page read and write
1090000
heap
page read and write
51A9000
system
page execute and read and write
43B0000
unclassified section
page read and write
4C0000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2C13000
heap
page read and write
2DF0000
trusted library allocation
page execute and read and write
2A91000
heap
page read and write
2C9B000
heap
page read and write
2C67000
heap
page read and write
4C1000
unkown
page execute read
2A91000
heap
page read and write
2C13000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1BED94C4000
trusted library allocation
page read and write
2A91000
heap
page read and write
2930000
unkown
page readonly
342D000
heap
page read and write
2A91000
heap
page read and write
422A000
unkown
page read and write
8DE000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
5F40000
trusted library allocation
page read and write
8D0000
unkown
page readonly
1290000
unkown
page readonly
54F000
unkown
page readonly
2A91000
heap
page read and write
11DA000
heap
page read and write
2A91000
heap
page read and write
8E7000
unkown
page readonly
2C00000
heap
page read and write
2674000
heap
page read and write
1BED9401000
trusted library allocation
page read and write
1BED94CE000
trusted library allocation
page read and write
2E05000
heap
page read and write
1420000
unkown
page readonly
318E000
stack
page read and write
A90000
unkown
page readonly
17672000
system
page read and write
2A91000
heap
page read and write
8DE000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2C13000
heap
page read and write
2A91000
heap
page read and write
45D5000
unkown
page read and write
940000
unkown
page readonly
32FD000
direct allocation
page execute and read and write
9F0000
unkown
page read and write
10E0000
heap
page read and write
2A91000
heap
page read and write
798E000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
CFC000
stack
page read and write
8E7000
unkown
page readonly
2A91000
heap
page read and write
2B20000
heap
page read and write
B50000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
343CBFD000
stack
page read and write
E50000
unkown
page read and write
2674000
heap
page read and write
3ACD000
direct allocation
page read and write
1BED9317000
trusted library allocation
page read and write
182E000
stack
page read and write
2A91000
heap
page read and write
3923000
direct allocation
page read and write
2A91000
heap
page read and write
C3F000
stack
page read and write
2A91000
heap
page read and write
3B3E000
direct allocation
page read and write
1BED930D000
trusted library allocation
page read and write
2A91000
heap
page read and write
2C00000
heap
page read and write
7988000
heap
page read and write
E74000
heap
page read and write
54F000
unkown
page readonly
575000
unkown
page readonly
2A91000
heap
page read and write
1BED9300000
trusted library allocation
page read and write
2A91000
heap
page read and write
2C83000
heap
page read and write
308E000
stack
page read and write
2CE0000
unkown
page execute and read and write
2BE0000
heap
page read and write
106E000
stack
page read and write
2A91000
heap
page read and write
343DBFE000
stack
page read and write
2A91000
heap
page read and write
2AE2000
unkown
page read and write
2A91000
heap
page read and write
1BED7810000
heap
page read and write
2C13000
heap
page read and write
BCE000
stack
page read and write
2A91000
heap
page read and write
3010000
direct allocation
page read and write
3973000
direct allocation
page read and write
E74000
heap
page read and write
BBD000
unkown
page read and write
372C000
unkown
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
E40000
heap
page read and write
39F0000
direct allocation
page read and write
3973000
direct allocation
page read and write
3D74000
unkown
page read and write
2BE0000
heap
page read and write
53AC000
unkown
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1BED9321000
trusted library allocation
page read and write
1BED91D0000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
32D0000
direct allocation
page read and write
2A91000
heap
page read and write
93A000
stack
page read and write
2A91000
heap
page read and write
2BD0000
heap
page read and write
3B19000
direct allocation
page read and write
2A91000
heap
page read and write
10D1000
heap
page read and write
2A91000
heap
page read and write
2C7A000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
960000
unkown
page readonly
27E0000
heap
page read and write
3800000
direct allocation
page read and write
2A91000
heap
page read and write
8E5000
unkown
page read and write
304E000
stack
page read and write
3ACD000
direct allocation
page read and write
2DF6000
heap
page read and write
57F000
unkown
page write copy
A90000
unkown
page readonly
8D1000
unkown
page execute read
7960000
heap
page read and write
3301000
direct allocation
page execute and read and write
1BED78BF000
heap
page read and write
79AC000
heap
page read and write
7986000
heap
page read and write
2C13000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1106000
heap
page read and write
2A91000
heap
page read and write
57F000
unkown
page read and write
CE0000
heap
page read and write
2B2F000
stack
page read and write
3923000
direct allocation
page read and write
4B8A000
unclassified section
page read and write
117C000
heap
page read and write
2A91000
heap
page read and write
B1A000
stack
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1098000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
349C000
unclassified section
page read and write
E4E000
stack
page read and write
2A91000
heap
page read and write
E60000
unkown
page read and write
3429000
heap
page read and write
2A91000
heap
page read and write
3B3E000
direct allocation
page read and write
2E90000
trusted library allocation
page read and write
3AC9000
direct allocation
page read and write
2A91000
heap
page read and write
3800000
direct allocation
page read and write
2A91000
heap
page read and write
1BED94BE000
trusted library allocation
page read and write
3B8E000
direct allocation
page read and write
315D000
direct allocation
page execute and read and write
2670000
heap
page read and write
2C54000
heap
page read and write
1BED78AC000
heap
page read and write
B80000
heap
page read and write
2C61000
heap
page read and write
106F000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
B60000
unkown
page readonly
3B3E000
direct allocation
page read and write
2A22000
unkown
page read and write
1BED94A5000
trusted library allocation
page read and write
10E1000
heap
page read and write
3B00000
heap
page read and write
2A91000
heap
page read and write
2E00000
heap
page read and write
2E12000
heap
page read and write
1000000
heap
page read and write
8D1000
unkown
page execute read
3850000
direct allocation
page read and write
850000
unkown
page readonly
2BE0000
heap
page read and write
1BED7860000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
8D1000
unkown
page execute read
2A91000
heap
page read and write
2FAD000
heap
page read and write
E50000
unkown
page read and write
1BED91E0000
trusted library allocation
page read and write
950000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
10CF000
heap
page read and write
2A91000
heap
page read and write
4E2F000
unclassified section
page execute and read and write
575000
unkown
page readonly
10E0000
heap
page read and write
32D0000
direct allocation
page read and write
2CA4000
heap
page read and write
2C02000
heap
page read and write
2C90000
heap
page read and write
17D34000
system
page read and write
2A91000
heap
page read and write
7CA0000
heap
page read and write
10E1000
heap
page read and write
2C4A000
heap
page read and write
1BED789A000
heap
page read and write
2A91000
heap
page read and write
1030000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2BEB000
heap
page read and write
128F000
stack
page read and write
8D0000
unkown
page readonly
C4F000
stack
page read and write
2A91000
heap
page read and write
79A0000
heap
page read and write
2C3C000
heap
page read and write
2D50000
trusted library allocation
page read and write
2B3C000
unkown
page read and write
2A91000
heap
page read and write
2E19000
heap
page read and write
3030000
direct allocation
page execute and read and write
CFC000
stack
page read and write
3AC9000
direct allocation
page read and write
E90000
heap
page read and write
8E5000
unkown
page read and write
2A91000
heap
page read and write
10E6000
heap
page read and write
2A91000
heap
page read and write
3500000
direct allocation
page execute and read and write
2A91000
heap
page read and write
1620000
unkown
page readonly
2A91000
heap
page read and write
10E6000
heap
page read and write
365C000
unclassified section
page read and write
2C13000
heap
page read and write
2A91000
heap
page read and write
2E80000
heap
page read and write
32D0000
direct allocation
page read and write
2930000
unkown
page readonly
31CE000
direct allocation
page execute and read and write
3100000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
1222000
heap
page read and write
AA0000
unkown
page readonly
FE0000
unkown
page readonly
3A01000
heap
page read and write
1BED78C2000
heap
page read and write
2C4E000
heap
page read and write
2A91000
heap
page read and write
1BED9303000
trusted library allocation
page read and write
2C13000
heap
page read and write
2CAA000
heap
page read and write
E70000
heap
page read and write
EC0000
heap
page read and write
2A91000
heap
page read and write
1BED9315000
trusted library allocation
page read and write
343C3FB000
stack
page read and write
C7C000
stack
page read and write
2A91000
heap
page read and write
2CB5000
heap
page read and write
EA0000
heap
page read and write
106C000
heap
page read and write
2CB3000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
8DE000
unkown
page readonly
E70000
heap
page read and write
3372000
direct allocation
page execute and read and write
B50000
unkown
page readonly
2A91000
heap
page read and write
E00000
heap
page read and write
79A8000
heap
page read and write
2C87000
heap
page read and write
2A91000
heap
page read and write
9BE000
stack
page read and write
798B000
heap
page read and write
F60000
heap
page read and write
2A91000
heap
page read and write
BE1000
unkown
page readonly
3159000
direct allocation
page execute and read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2AF0000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
343D3FE000
stack
page read and write
27DF000
stack
page read and write
2A91000
heap
page read and write
3629000
direct allocation
page execute and read and write
1203000
heap
page read and write
2C6C000
heap
page read and write
1BED7830000
heap
page read and write
2F01000
heap
page read and write
1203000
heap
page read and write
EB0000
heap
page read and write
E98000
heap
page read and write
940000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2C13000
heap
page read and write
806E000
stack
page read and write
2A91000
heap
page read and write
3A44000
unclassified section
page read and write
2A91000
heap
page read and write
9C0000
unkown
page read and write
2A91000
heap
page read and write
879000
stack
page read and write
2C13000
heap
page read and write
108F000
stack
page read and write
2A91000
heap
page read and write
1151000
heap
page read and write
10E6000
heap
page read and write
51CF000
system
page execute and read and write
E98000
heap
page read and write
2A91000
heap
page read and write
2C13000
heap
page read and write
2E17000
heap
page read and write
850000
unkown
page readonly
2AD0000
heap
page read and write
2BEB000
heap
page read and write
1BED9400000
trusted library allocation
page read and write
3850000
direct allocation
page read and write
1063000
heap
page read and write
2A91000
heap
page read and write
2CAF000
heap
page read and write
8D0000
unkown
page readonly
2A91000
heap
page read and write
1BED9200000
trusted library allocation
page read and write
2A91000
heap
page read and write
369E000
direct allocation
page execute and read and write
EFD000
stack
page read and write
2A91000
heap
page read and write
3B8E000
direct allocation
page read and write
B70000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
2C13000
heap
page read and write
2C13000
heap
page read and write
870000
unkown
page readonly
51D2000
system
page execute and read and write
106F000
heap
page read and write
2BF0000
unkown
page readonly
E3E000
stack
page read and write
7A70000
trusted library allocation
page read and write
1000000
heap
page read and write
860000
unkown
page readonly
10CF000
heap
page read and write
2A91000
heap
page read and write
2A91000
heap
page read and write
2CFC000
unkown
page read and write
588000
unkown
page readonly
10BF000
heap
page read and write
2A91000
heap
page read and write
349E000
heap
page read and write
2E17000
heap
page read and write
8D0000
unkown
page readonly
2A91000
heap
page read and write
2A91000
heap
page read and write
3442000
unclassified section
page read and write
2A91000
heap
page read and write
2F4E000
stack
page read and write
51B3000
system
page execute and read and write
3F0F000
unkown
page execute and read and write
51C3000
system
page execute and read and write
2A91000
heap
page read and write
2C40000
heap
page read and write
1BED78BA000
heap
page read and write
3973000
direct allocation
page read and write
2A91000
heap
page read and write
There are 654 hidden memdumps, click here to show them.