IOC Report
Attendance list.exe

loading gif

Files

File Path
Type
Category
Malicious
Attendance list.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\23802I71
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Vevine
data
dropped
C:\Users\user\AppData\Local\Temp\adstipulator
ASCII text, with very long lines (28756), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut6F8D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut6FBD.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Attendance list.exe
"C:\Users\user\Desktop\Attendance list.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Attendance list.exe"
malicious
C:\Program Files (x86)\HNlYSctsxjusxqYQrESGhmOEfHJwtjndFahIKSrGDsdYtbZtOyTREdo\sSzWYtHqcRqHklFYcPzKpLlSXP.exe
"C:\Program Files (x86)\HNlYSctsxjusxqYQrESGhmOEfHJwtjndFahIKSrGDsdYtbZtOyTREdo\sSzWYtHqcRqHklFYcPzKpLlSXP.exe"
malicious
C:\Windows\SysWOW64\clip.exe
"C:\Windows\SysWOW64\clip.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.telwisey.info/ei85/?66s0QHx=ORmqfURBt40sHMHN3K9lcqnOZkw5OMnI9iieY9Aomdlbsbne+w1Kch9DF1irZ5FVSFO0rJB3/OJZWwrRbdUXhR90PBHPgFvMy30KUVoXMjhVhw+zOJlVxwLOJt1WoLc5Mw==&Jjv=GpKhRVSHzLA8j4R
199.192.19.19
malicious
http://www.bfiworkerscomp.com/xzzi/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=9CTSfwlM5YWl8fva1LSaXKM8r2QUgbHW1FpC9VokAvwkUHOJycf2DDxLp9tWLELwEKEPfCC2oiLqmqE9jQi/U7l2GiVWxU2JTINSgPIAJ4NvupNBog1mPljiQYHOMEGLOA==
208.91.197.27
malicious
http://www.xn--fhq1c541j0zr.com/rm91/
43.252.167.188
malicious
http://www.bfiworkerscomp.com/xzzi/
208.91.197.27
malicious
http://www.catherineviskadi.com/qe66/?66s0QHx=dnvLceXALBk3Hr4/PEp98EYmblYqw8i+NG0MGchlNc+FfqCdFLzpUNQMmrv30qtrBi93uCjMcFA24SebHgOv5wKSlbq5H9RfpzlUfmq/1+2mTftJij2S2gWTPvHx6aM7mw==&Jjv=GpKhRVSHzLA8j4R
217.160.0.106
malicious
http://www.sandranoll.com/aroo/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=bKy7FSIHmKYFjPoPKsunUN9vBLYaDX52twFEynhtde+XdOqoRjh1sl1n+ba+sSXyFBuEELqLWRHnTW9JDkHGB3kb0OJ7ghG7VUOTSl8sxinDCxUKcrHKEU0DEmNR7hjgMQ==
213.145.228.16
malicious
http://www.anuts.top/li0t/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=cVY/NretpRV3pSqbAwFMzZODfIM0+2Z9S8puWnY234sUXEzh+T0fGizPv/1GJq+MSLyulFxDkLwqIofvrKUfhgzxX5A8Pgwb+i5XvTgZRBJb2EypYfKSb86Vxi/qsGcisw==
23.251.54.212
malicious
http://www.dmtxwuatbz.cc/lfkn/
172.67.210.102
malicious
http://www.sandranoll.com/aroo/
213.145.228.16
malicious
http://www.gipsytroya.com/tf44/
91.195.240.19
malicious
http://www.xn--matfrmn-jxa4m.se/4hda/
194.9.94.85
malicious
http://www.telwisey.info/ei85/
199.192.19.19
malicious
http://www.xn--fhq1c541j0zr.com/rm91/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=jSd7r+67+N1qAQkxX/tAwzcZagSYI1kZQchR8WhIexhCyQiFJMwmzlR6zVHzfOVMvsfcwBywDpFhuhrgfB+WA/0x0l7m7B814c3LweorfxiP0L71SZjJ1PPNKkJ0Qx2crw==
43.252.167.188
malicious
http://www.xn--matfrmn-jxa4m.se/4hda/?66s0QHx=+FYRabRorC7iiipcHmFJARkvcpdCy5kXHVGGEQvE/CSzp7OmTlR57ws6ggMdmmjgEK74RwiZfuW5KkdpyqG94cDJ5htquBO11HcjCOymydCfo0q1+e/CBcncmTCUQD5IVA==&Jjv=GpKhRVSHzLA8j4R
194.9.94.85
malicious
http://www.helpers-lion.online/mooq/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=6C5pq03gIUcCxycao4jVOd5j2ETtSk+CIQvh/K6jTje/eWOGI1u26kAEsQXtCs3elXAZegkYPdXqLAdc1WNGhsE2fBM2zTxwuji6F0Pbl1x/Uo4pPUilA6mApMPDsyvzdQ==
194.58.112.174
malicious
http://www.catherineviskadi.com/qe66/
217.160.0.106
malicious
http://www.anuts.top/li0t/
23.251.54.212
malicious
http://www.helpers-lion.online/mooq/
194.58.112.174
malicious
http://www.gipsytroya.com/tf44/?66s0QHx=zHiAY6EG+HxIxFu8Foth356DlimOdN8M+W8Rr/tGfSzDPDxggLk9FyyADeImH3/ZYgS5WMd+vNhhyXlbnciy2erzG94aXY3gKTO0tUNpFmCuOm5+YFWh8hIX5dCVSC+GNg==&Jjv=GpKhRVSHzLA8j4R
91.195.240.19
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.reg.ru/whois/?check=&dname=www.helpers-lion.online&reg_source=parking_auto
unknown
https://duckduckgo.com/ac/?q=
unknown
https://reg.ru
unknown
http://www.hatercoin.online/wf3a/
142.250.181.243
https://customerservice.web.com/prweb/PRAuth/app/WebKM_/JfLhd8LVz0a16-h3GqsHOCqqFky5N_vd
unknown
https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css
unknown
https://www.reg.ru/web-sites/website-builder/?utm_source=www.helpers-lion.online&utm_medium=parking&
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://static.loopia.se/responsive/images/iOS-72.png
unknown
https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parking
unknown
http://www.domaintechnik.at/data/gfx/dt_logo_parking.png
unknown
https://www.reg.ru/domain/new/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_
unknown
https://parking.reg.ru/script/get_domain_data?domain_name=www.helpers-lion.online&rand=
unknown
https://static.loopia.se/shared/logo/logo-loopia-white.svg
unknown
https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwe
unknown
https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
unknown
https://www.domaintechnik.at/fileadmin/gfx/icons/free-basic-hosting.png
unknown
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
https://www.hprlz.cz/w6qg/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=0lpTRQcDUH
unknown
http://www.hprlz.cz/w6qg/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=0lpTRQcDUH+iEsGzFrKDlEkxf0hSGbqe7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1Ca0ipuJKNLUJAUyvRep5v3DJLNu0m2HizCt4wFiNb5RCLtMg==
5.44.111.162
https://static.loopia.se/shared/images/additional-pages-hero-shape.webp
unknown
https://static.loopia.se/shared/style/2022-extra-pages.css
unknown
https://static.loopia.se/responsive/images/iOS-114.png
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.networksolutions.com/
unknown
https://www.loopia.com/loopiadns/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.domaintechnik.at/fileadmin/pics/logos/icann.gif
unknown
https://www.reg.ru/hosting/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_lan
unknown
http://whois.loopia.com/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&ut
unknown
https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-
unknown
https://www.ecosia.org/newtab/
unknown
https://assets.web.com/legal/English/MSA/v1.0.0.3/ServicesAgreement.pdf
unknown
https://static.loopia.se/responsive/styles/reset.css
unknown
https://www.reg.ru/web-sites/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_l
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://static.loopia.se/responsive/images/iOS-57.png
unknown
https://www.hprlz.cz/w6qg/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=0lpTRQcDUH
unknown
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.1.1/gsap.min.js
unknown
https://www.loopia.com/sitebuilder/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
unknown
https://www.reg.ru/dedicated/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_l
unknown
https://www.loopia.com/domainnames/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
unknown
http://www.dmtxwuatbz.cc
unknown
https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkin
unknown
https://www.hatercoin.online/wf3a/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=EKVDXBgImxJWeZhJNsklc3Q8dq4iVG0MTaJQI
unknown
http://www.hatercoin.online/wf3a/?Jjv=GpKhRVSHzLA8j4R&66s0QHx=EKVDXBgImxJWeZhJNsklc3Q8dq4iVG0MTaJQI9BJxmHKvH3SiDTatPSqYvMyoDFRoX1f1ApOAYKP2hecch8PPIbZZar3vE0ZmDGvAwUCcsFCeR/Dh+n2QaVtkWzZCs4EoA==
142.250.181.243
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.domaintechnik.at/fileadmin/gfx/logos/hostedsoft/typo3-2.png
unknown
https://www.loopia.com/woocommerce/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
unknown
https://www.loopia.se?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb
unknown
https://www.domaintechnik.at/fileadmin/gfx/logos/hostedsoft/piwik.png
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.sandranoll.com
213.145.228.16
malicious
www.dmtxwuatbz.cc
172.67.210.102
malicious
www.xn--matfrmn-jxa4m.se
194.9.94.85
malicious
www.catherineviskadi.com
217.160.0.106
malicious
www.anuts.top
23.251.54.212
malicious
www.helpers-lion.online
194.58.112.174
malicious
www.bfiworkerscomp.com
208.91.197.27
malicious
parkingpage.namecheap.com
91.195.240.19
malicious
www.telwisey.info
199.192.19.19
malicious
www.xn--fhq1c541j0zr.com
43.252.167.188
malicious
www.fourgrouw.cfd
unknown
malicious
www.hatercoin.online
unknown
malicious
www.tinmapco.com
unknown
malicious
www.gipsytroya.com
unknown
malicious
www.hprlz.cz
5.44.111.162
ghs.googlehosted.com
142.250.181.243
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
23.251.54.212
www.anuts.top
United States
malicious
172.67.210.102
www.dmtxwuatbz.cc
United States
malicious
213.145.228.16
www.sandranoll.com
Austria
malicious
194.9.94.85
www.xn--matfrmn-jxa4m.se
Sweden
malicious
217.160.0.106
www.catherineviskadi.com
Germany
malicious
208.91.197.27
www.bfiworkerscomp.com
Virgin Islands (BRITISH)
malicious
91.195.240.19
parkingpage.namecheap.com
Germany
malicious
194.58.112.174
www.helpers-lion.online
Russian Federation
malicious
199.192.19.19
www.telwisey.info
United States
malicious
43.252.167.188
www.xn--fhq1c541j0zr.com
Hong Kong
malicious
5.44.111.162
www.hprlz.cz
Germany
142.250.181.243
ghs.googlehosted.com
United States
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
42F0000
trusted library allocation
page read and write
malicious
2640000
system
page execute and read and write
malicious
34C0000
unclassified section
page execute and read and write
malicious
42B0000
trusted library allocation
page read and write
malicious
5A00000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
4980000
unkown
page execute and read and write
malicious
29E1000
heap
page read and write
27D7000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
8140000
unkown
page read and write
29E1000
heap
page read and write
DE0000
heap
page read and write
802F000
stack
page read and write
2391F6CE000
trusted library allocation
page read and write
301A000
heap
page read and write
27F3000
heap
page read and write
29E1000
heap
page read and write
2775000
heap
page read and write
5348000
unclassified section
page read and write
29E1000
heap
page read and write
38ED000
direct allocation
page read and write
79C3000
heap
page read and write
710A000
system
page read and write
29E1000
heap
page read and write
1140000
unkown
page readonly
97F000
unkown
page write copy
4601000
heap
page read and write
2391DABF000
heap
page read and write
26B0000
heap
page read and write
3620000
direct allocation
page read and write
E81A9FE000
stack
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
6410000
unclassified section
page execute and read and write
29E1000
heap
page read and write
120000
unkown
page readonly
29E1000
heap
page read and write
FE8000
heap
page read and write
29E1000
heap
page read and write
97F000
unkown
page read and write
3743000
direct allocation
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
452E000
stack
page read and write
11DD000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
3021000
heap
page read and write
29E1000
heap
page read and write
3005000
heap
page read and write
DC0000
unkown
page readonly
29E1000
heap
page read and write
29E1000
heap
page read and write
395E000
direct allocation
page read and write
62FC000
unclassified section
page read and write
29E1000
heap
page read and write
3580000
unkown
page execute and read and write
101B000
heap
page read and write
29E1000
heap
page read and write
37C0000
direct allocation
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2930000
unkown
page readonly
2825000
heap
page read and write
330000
heap
page read and write
1081000
heap
page read and write
113F000
stack
page read and write
3743000
direct allocation
page read and write
38E9000
direct allocation
page read and write
798C000
heap
page read and write
DD0000
unkown
page readonly
29E1000
heap
page read and write
27ED000
heap
page read and write
29E1000
heap
page read and write
795E000
heap
page read and write
8C1000
unkown
page execute read
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
70E000
stack
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
1DF14000
system
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
7986000
heap
page read and write
DBE000
stack
page read and write
5A1C000
system
page read and write
6156000
system
page read and write
38E9000
direct allocation
page read and write
8B0000
heap
page read and write
4470000
trusted library allocation
page read and write
1095000
heap
page read and write
59C2000
system
page read and write
38ED000
direct allocation
page read and write
DF0000
heap
page read and write
43D0000
trusted library allocation
page execute and read and write
8C0000
unkown
page readonly
29E1000
heap
page read and write
29E1000
heap
page read and write
2CE0000
heap
page read and write
29E1000
heap
page read and write
48DD000
direct allocation
page execute and read and write
79B0000
heap
page read and write
372D000
direct allocation
page execute and read and write
395E000
direct allocation
page read and write
2391D945000
system
page execute and read and write
2391F600000
trusted library allocation
page read and write
11CD000
heap
page read and write
2391F500000
trusted library allocation
page read and write
48E1000
direct allocation
page execute and read and write
80DC000
system
page execute and read and write
458C000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
E81A1FE000
stack
page read and write
4330000
trusted library allocation
page read and write
2E13000
heap
page read and write
29E1000
heap
page read and write
975000
unkown
page readonly
29E1000
heap
page read and write
29E1000
heap
page read and write
2638000
stack
page read and write
3743000
direct allocation
page read and write
29E1000
heap
page read and write
3620000
direct allocation
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
E20000
unkown
page read and write
2802000
heap
page read and write
3101000
heap
page read and write
1081000
heap
page read and write
29E1000
heap
page read and write
347F000
stack
page read and write
710000
heap
page read and write
2780000
heap
page read and write
29E1000
heap
page read and write
27C3000
heap
page read and write
2E13000
heap
page read and write
29E1000
heap
page read and write
37C0000
direct allocation
page read and write
2D10000
heap
page read and write
79C2000
heap
page read and write
F00000
heap
page read and write
14D1000
unkown
page readonly
29E1000
heap
page read and write
79A0000
heap
page read and write
5FC4000
system
page read and write
29E1000
heap
page read and write
4739000
direct allocation
page execute and read and write
29E1000
heap
page read and write
137000
unkown
page readonly
29E1000
heap
page read and write
34C0000
direct allocation
page read and write
2775000
heap
page read and write
76B0000
trusted library allocation
page read and write
29E1000
heap
page read and write
E81B1FF000
stack
page read and write
C00000
unkown
page readonly
E11000
unkown
page readonly
121000
unkown
page execute read
29E1000
heap
page read and write
29E1000
heap
page read and write
2391DAAC000
heap
page read and write
3620000
direct allocation
page read and write
29E1000
heap
page read and write
2391DA90000
heap
page read and write
2391DAC2000
heap
page read and write
79B5000
heap
page read and write
3942000
direct allocation
page execute and read and write
121000
unkown
page execute read
29E1000
heap
page read and write
29E1000
heap
page read and write
38E9000
direct allocation
page read and write
29E1000
heap
page read and write
79B7000
heap
page read and write
29E1000
heap
page read and write
3400000
heap
page read and write
4952000
direct allocation
page execute and read and write
7946000
heap
page read and write
797B000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2750000
heap
page read and write
38E9000
direct allocation
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2DF0000
heap
page read and write
DB0000
unkown
page readonly
5B22000
unclassified section
page read and write
1021000
heap
page read and write
2950000
unkown
page read and write
276F000
heap
page read and write
729C000
system
page read and write
7CA0000
heap
page read and write
29E1000
heap
page read and write
2391DA00000
heap
page read and write
27D0000
heap
page read and write
38ED000
direct allocation
page read and write
29E1000
heap
page read and write
79BF000
heap
page read and write
DAF000
stack
page read and write
E38000
heap
page read and write
2391F601000
trusted library allocation
page read and write
C7A000
stack
page read and write
2E13000
heap
page read and write
29E1000
heap
page read and write
7951000
heap
page read and write
7958000
heap
page read and write
2E13000
heap
page read and write
395E000
direct allocation
page read and write
E8199FB000
stack
page read and write
4470000
trusted library allocation
page read and write
3005000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
120000
unkown
page readonly
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
6AC2000
system
page read and write
3F80000
unkown
page execute and read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
1DB2C000
system
page read and write
2950000
unkown
page read and write
2A90000
unkown
page readonly
2960000
unkown
page read and write
2E13000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2391F6C4000
trusted library allocation
page read and write
29E1000
heap
page read and write
27CD000
heap
page read and write
29E1000
heap
page read and write
352D000
heap
page read and write
29E1000
heap
page read and write
4A22000
unclassified section
page read and write
2E13000
heap
page read and write
1083000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
3000000
heap
page read and write
1080000
heap
page read and write
3743000
direct allocation
page read and write
2391F340000
trusted library allocation
page read and write
395E000
direct allocation
page read and write
112C000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
4A7C000
unclassified section
page read and write
31EF000
stack
page read and write
29E1000
heap
page read and write
796A000
heap
page read and write
988000
unkown
page readonly
34C0000
direct allocation
page read and write
794B000
heap
page read and write
29E1000
heap
page read and write
9F0000
unkown
page readonly
473D000
direct allocation
page execute and read and write
37C0000
direct allocation
page read and write
1013000
heap
page read and write
29E1000
heap
page read and write
3D0000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
27BE000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
37E000
stack
page read and write
5902000
system
page read and write
975000
unkown
page readonly
12E000
unkown
page readonly
660C000
system
page read and write
E20000
unkown
page read and write
29E1000
heap
page read and write
E30000
heap
page read and write
51B6000
unclassified section
page read and write
29E1000
heap
page read and write
17DF000
stack
page read and write
38ED000
direct allocation
page read and write
37C0000
direct allocation
page read and write
2391F400000
trusted library allocation
page read and write
6DE6000
system
page read and write
79C7000
heap
page read and write
282F000
heap
page read and write
803E000
heap
page read and write
2391D9E0000
heap
page read and write
6F78000
system
page read and write
29E1000
heap
page read and write
2391F517000
trusted library allocation
page read and write
3620000
direct allocation
page read and write
380000
heap
page read and write
29E1000
heap
page read and write
276F000
heap
page read and write
E11000
unkown
page readonly
2835000
heap
page read and write
276F000
heap
page read and write
C7A000
stack
page read and write
2E13000
heap
page read and write
29E1000
heap
page read and write
7AE0000
trusted library allocation
page read and write
276F000
heap
page read and write
E4E000
heap
page read and write
323E000
stack
page read and write
3743000
direct allocation
page read and write
29E1000
heap
page read and write
DE0000
heap
page read and write
79A9000
heap
page read and write
E30000
heap
page read and write
29E1000
heap
page read and write
7956000
heap
page read and write
26FE000
stack
page read and write
29E1000
heap
page read and write
795B000
heap
page read and write
2391F521000
trusted library allocation
page read and write
4463000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
27F9000
heap
page read and write
12E000
unkown
page readonly
F04000
heap
page read and write
2B80000
unkown
page execute and read and write
80D0000
system
page execute and read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
37C0000
direct allocation
page read and write
11DB000
heap
page read and write
E00000
unkown
page read and write
42BA000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2740000
heap
page read and write
1021000
heap
page read and write
2974000
heap
page read and write
29E1000
heap
page read and write
616A000
unclassified section
page read and write
135000
unkown
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
27B2000
heap
page read and write
276F000
heap
page read and write
2391DA9F000
heap
page read and write
2391F503000
trusted library allocation
page read and write
29E1000
heap
page read and write
566C000
unclassified section
page read and write
337E000
stack
page read and write
38D1000
direct allocation
page execute and read and write
29E1000
heap
page read and write
44ED000
stack
page read and write
27D0000
heap
page read and write
E60000
heap
page read and write
29E1000
heap
page read and write
2E02000
heap
page read and write
9F0000
unkown
page readonly
29E1000
heap
page read and write
29E1000
heap
page read and write
E38000
heap
page read and write
29E1000
heap
page read and write
2E13000
heap
page read and write
29E1000
heap
page read and write
94F000
unkown
page readonly
3600000
direct allocation
page execute and read and write
4962000
unclassified section
page read and write
2920000
heap
page read and write
DCB000
stack
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2C5C000
stack
page read and write
795F000
heap
page read and write
29E1000
heap
page read and write
DB0000
unkown
page readonly
11BE000
heap
page read and write
D7C000
stack
page read and write
2E13000
heap
page read and write
5024000
unclassified section
page read and write
3620000
direct allocation
page read and write
29E1000
heap
page read and write
359E000
heap
page read and write
3019000
heap
page read and write
29E1000
heap
page read and write
3200000
heap
page read and write
47AE000
direct allocation
page execute and read and write
29E1000
heap
page read and write
3C00000
unclassified section
page execute and read and write
29E1000
heap
page read and write
2CA000
stack
page read and write
29E1000
heap
page read and write
5390000
unkown
page execute and read and write
38ED000
direct allocation
page read and write
29E1000
heap
page read and write
2A7F000
stack
page read and write
8010000
system
page execute and read and write
5000000
unclassified section
page execute and read and write
2391DA9A000
heap
page read and write
1094000
heap
page read and write
3480000
direct allocation
page read and write
29E1000
heap
page read and write
3012000
heap
page read and write
2391F6B3000
trusted library allocation
page read and write
2E00000
heap
page read and write
29E1000
heap
page read and write
1D852000
system
page read and write
79A3000
heap
page read and write
7981000
heap
page read and write
29E1000
heap
page read and write
1140000
unkown
page readonly
80C0000
system
page execute and read and write
29E1000
heap
page read and write
2766000
heap
page read and write
29E1000
heap
page read and write
27E3000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
38E9000
direct allocation
page read and write
29E1000
heap
page read and write
2970000
heap
page read and write
29E0000
heap
page read and write
FE0000
heap
page read and write
29E1000
heap
page read and write
79CE000
heap
page read and write
80B5000
system
page execute and read and write
DF0000
heap
page read and write
829C000
unkown
page read and write
29E1000
heap
page read and write
379E000
direct allocation
page execute and read and write
63A2000
unclassified section
page execute and read and write
135000
unkown
page read and write
2E13000
heap
page read and write
273F000
stack
page read and write
37C0000
direct allocation
page read and write
29E1000
heap
page read and write
D7C000
stack
page read and write
29E1000
heap
page read and write
1063000
heap
page read and write
2391F50E000
trusted library allocation
page read and write
29E1000
heap
page read and write
11CD000
heap
page read and write
29E1000
heap
page read and write
2E13000
heap
page read and write
E80000
direct allocation
page execute and read and write
29E1000
heap
page read and write
27CD000
heap
page read and write
1186000
heap
page read and write
C00000
unkown
page readonly
1D912000
system
page read and write
79C8000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
395E000
direct allocation
page read and write
3323000
heap
page read and write
5322000
unkown
page execute and read and write
2930000
unkown
page readonly
29E1000
heap
page read and write
4600000
unclassified section
page execute and read and write
29E1000
heap
page read and write
2391F510000
trusted library allocation
page read and write
2CC0000
heap
page read and write
113F000
stack
page read and write
8133000
system
page execute and read and write
29E1000
heap
page read and write
2391D8C0000
system
page execute and read and write
1094000
heap
page read and write
29E1000
heap
page read and write
983000
unkown
page write copy
2391DA70000
heap
page read and write
2C9A000
stack
page read and write
137000
unkown
page readonly
E00000
unkown
page read and write
29E1000
heap
page read and write
2974000
heap
page read and write
27FC000
heap
page read and write
38ED000
direct allocation
page read and write
79C5000
heap
page read and write
79B6000
heap
page read and write
3529000
heap
page read and write
29E1000
heap
page read and write
2778000
heap
page read and write
E90000
direct allocation
page read and write
7C6E000
stack
page read and write
27C3000
heap
page read and write
1012000
heap
page read and write
29E1000
heap
page read and write
62E8000
system
page read and write
29E1000
heap
page read and write
110A000
heap
page read and write
3729000
direct allocation
page execute and read and write
29E1000
heap
page read and write
2E13000
heap
page read and write
2AE0000
heap
page read and write
103E000
stack
page read and write
2744000
heap
page read and write
8C0000
unkown
page readonly
11DD000
heap
page read and write
2391DA30000
heap
page read and write
395E000
direct allocation
page read and write
29E1000
heap
page read and write
C10000
unkown
page readonly
2E13000
heap
page read and write
29E1000
heap
page read and write
103E000
stack
page read and write
7A41000
heap
page read and write
280F000
heap
page read and write
29E1000
heap
page read and write
2391DABB000
heap
page read and write
3620000
direct allocation
page read and write
2764000
heap
page read and write
2970000
heap
page read and write
7943000
heap
page read and write
27BE000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2391F6BE000
trusted library allocation
page read and write
3200000
direct allocation
page read and write
8C1000
unkown
page execute read
23CB000
stack
page read and write
14D1000
unkown
page readonly
2A80000
heap
page read and write
988000
unkown
page readonly
29E1000
heap
page read and write
43DD000
heap
page read and write
DEC000
stack
page read and write
11CD000
heap
page read and write
2A90000
unkown
page readonly
7930000
heap
page read and write
1021000
heap
page read and write
2E13000
heap
page read and write
4610000
direct allocation
page execute and read and write
5BDC000
system
page read and write
1012000
heap
page read and write
2764000
heap
page read and write
38E9000
direct allocation
page read and write
27D7000
heap
page read and write
2B00000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
2744000
heap
page read and write
1003000
heap
page read and write
3A01000
heap
page read and write
333F000
stack
page read and write
292E000
stack
page read and write
2E13000
heap
page read and write
DC0000
unkown
page readonly
29E1000
heap
page read and write
6930000
system
page read and write
79BA000
heap
page read and write
C10000
unkown
page readonly
2A80000
heap
page read and write
3743000
direct allocation
page read and write
27E9000
heap
page read and write
4C3C000
unclassified section
page read and write
29E1000
heap
page read and write
29E1000
heap
page read and write
42B0000
trusted library allocation
page read and write
819C000
unkown
page read and write
2391D942000
system
page execute and read and write
94F000
unkown
page readonly
2744000
heap
page read and write
7A30000
trusted library allocation
page read and write
29E1000
heap
page read and write
34C0000
direct allocation
page read and write
2E13000
heap
page read and write
10B4000
heap
page read and write
282B000
heap
page read and write
B66000
unkown
page read and write
5990000
unclassified section
page read and write
79BE000
heap
page read and write
29E1000
heap
page read and write
3017000
heap
page read and write
11AE000
heap
page read and write
11AE000
heap
page read and write
29E1000
heap
page read and write
5FD8000
unclassified section
page read and write
101B000
heap
page read and write
5E46000
unclassified section
page read and write
798A000
heap
page read and write
27E3000
heap
page read and write
2391F50A000
trusted library allocation
page read and write
29E1000
heap
page read and write
79BA000
heap
page read and write
2758000
heap
page read and write
29E1000
heap
page read and write
DF6000
heap
page read and write
DD0000
unkown
page readonly
3017000
heap
page read and write
276F000
heap
page read and write
2391F340000
trusted library allocation
page read and write
29E1000
heap
page read and write
4470000
trusted library allocation
page read and write
38CD000
direct allocation
page execute and read and write
1D96C000
system
page read and write
4590000
heap
page read and write
There are 592 hidden memdumps, click here to show them.