IOC Report
hkLFB22XxS.exe

loading gif

Files

File Path
Type
Category
Malicious
hkLFB22XxS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\-16743
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\aut8EC1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut8EF1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\brawlys
ASCII text, with very long lines (28740), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\parters
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hkLFB22XxS.exe
"C:\Users\user\Desktop\hkLFB22XxS.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\hkLFB22XxS.exe"
malicious
C:\Program Files (x86)\riMAYNELmpJOEonvhslpwxHTizECOGYLjPVpHdyNUuwSormSvetDoHVjvEgC\YcTurzUREEPNDwUlDlxzRT.exe
"C:\Program Files (x86)\riMAYNELmpJOEonvhslpwxHTizECOGYLjPVpHdyNUuwSormSvetDoHVjvEgC\YcTurzUREEPNDwUlDlxzRT.exe"
malicious
C:\Windows\SysWOW64\convert.exe
"C:\Windows\SysWOW64\convert.exe"
malicious
C:\Program Files (x86)\riMAYNELmpJOEonvhslpwxHTizECOGYLjPVpHdyNUuwSormSvetDoHVjvEgC\YcTurzUREEPNDwUlDlxzRT.exe
"C:\Program Files (x86)\riMAYNELmpJOEonvhslpwxHTizECOGYLjPVpHdyNUuwSormSvetDoHVjvEgC\YcTurzUREEPNDwUlDlxzRT.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.rebornqababy.ru/waey/
87.236.19.243
malicious
http://www.autonomyai.xyz/b2v9/?GBbljTO=0sOIBL6Y1M004sQ5TvZd5iz/+VJrlsE2TnBUG2Cle0uPodabdAFumCtHEYRGqgGZaXBiOoh6miWUokUDwH1uxZLkB2zaEttNK0EmqhWvcq3hRWFyql4+CgnPikYYPSDEc9yry/0=&mB=rL4lP
15.197.142.173
malicious
http://www.jl884.vip/r4wk/?mB=rL4lP&GBbljTO=x9GkKIHXkLsCiyVr8u8o1dWkHkpveCE8pq06snQr36Jjj9CRM0vMnoakwWLgrIMHyYBq6SPCqUTgPlgJ6rJOIdv2Hpbl0D0DeBG+01R28dU1nzrJm0yQzAnZDQ+iQUJ8Z49zmcM=
65.181.132.158
malicious
http://www.autonomyai.xyz/b2v9/
15.197.142.173
malicious
http://www.erosonline.com.br/2lcx/
191.6.208.133
malicious
http://www.faxinguxn6.cn/ofk1/
108.186.253.49
malicious
http://www.cavetta.org.mt/yhnb/
188.114.97.3
malicious
http://www.theridleysuk.co.uk/frbh/?GBbljTO=Ab6vpDSK2Brwe75JZoMyqaMvDHsAkCPA2P9OUDXWAzTXqR+fdlaTQvVfgW4hOBJepAqkmb7wk13CIWkS+xjXxgvfntXYbzbMYjBsDXbn2M5yrvr+d9Np/nCfHBQ0eV5fDAaNGRM=&mB=rL4lP
3.33.130.190
malicious
http://www.hereboy.co.uk/4ez3/
3.33.130.190
malicious
http://www.firmshow.top/02nb/
203.161.43.228
malicious
http://www.bulletinnest.com/r7gq/
135.181.212.206
malicious
http://www.hereboy.co.uk/4ez3/?GBbljTO=mfYMsQM3KyhOB9S5RaSW2y5rLmzLgjaa/QLQwIqVV5WYQs45zP0evK7Rjl9k70QaNBAPkr49MsiTFVYwFYBU4UL5Zbi/2lnbDdmhQHx5hvKSlaviHFa+lVmdn2kx/MOS+LGOACo=&mB=rL4lP
3.33.130.190
malicious
http://www.jl800.vip/g67v/
38.47.158.215
malicious
http://www.bulletinnest.com/r7gq/?GBbljTO=J5YXCuAbT0imQyqe16hzUfFFlDgtP40GBYCO3M0UAxiKR6OMc8IU/OmfKBQVi2nAD0slqU03Fjqs2wbSr2/73QjcpJUwGjWcGd039QJH+viAIsBs41Zzvp+05pTyuEBiwTKkz9s=&mB=rL4lP
135.181.212.206
malicious
http://www.dexiangovernment.org/a7b7/?mB=rL4lP&GBbljTO=WBvhIJsiSZ/Mpf8vspJrW/4pjpLKDJYga2inWWxcAarnmjt55lmBuwg8tb7lhDgj0p/kM0sabX/Eh7nxTer92pVV4vHw9Nn4rOH01OSzROy3Dd2AlIGGpSa7+8s++24x8ediPqQ=
3.33.130.190
malicious
http://www.d99qtpkvavjj.xyz/r4rr/
3.33.130.190
malicious
http://www.firmshow.top/02nb/?GBbljTO=wAM00RPxm4SI4CXmbVVIy3I1PpnrRkiLCY5B6OI1JPNyCoxACldRit5a2XiaNEn9mU81Z8Y/J9c7Sme1Jv71eMMWXuG1yY1QMiMjNPzXdj8brJHDqS7NAGlwA4SgIkhB8sM3B24=&mB=rL4lP
203.161.43.228
malicious
http://www.theridleysuk.co.uk/frbh/
3.33.130.190
malicious
http://www.dexiangovernment.org/a7b7/
3.33.130.190
malicious
http://www.faxinguxn6.cn/ofk1/?mB=rL4lP&GBbljTO=BhKqFmuQRptfX/n+GLbvkgrrHWTCYt1Sl5iEedmrVDCnsV4u7G/8RrJF9Ts24XSLey5WO/1p/DVfbDYr/r26W2Tj1BdpAMniD2/mHks2VLu3GzKm6FI2X0B8Walyh6GsFs9hylc=
108.186.253.49
malicious
http://www.erosonline.com.br/2lcx/?mB=rL4lP&GBbljTO=a0QfEZLGBdPS9CupDmnnPsWDKzErLSGek8yDxBQcwyKMQFiimN077KRHkaCGiYerfpBHWbRAiBI+CxxxyL+dNlx1E9UxGMH9Wp+KkC7SZXFmjq4jPFSCThF16iUos8QU5jw0D9M=
191.6.208.133
malicious
http://www.rebornqababy.ru/waey/?mB=rL4lP&GBbljTO=vEbjId+4sF/B1HcK0KnkLWhDt3TDgep1Hisls3jx2sXQLvzc6GGIRAe645U1+0UQoLxHlXEWQ40RpQdm4vEPEKgmfigQSYTBcDja0ho8qyrlnSuwRRMraqkdBe97SwcqQ2Bw4z4=
87.236.19.243
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://login.live.c
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://cavetta.org.mt/yhnb/?GBbljTO=86bcI2qL6Ck2EEXjt07/da0
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.cavetta.org.mt
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://bulletinnest.com/r7gq/?GBbljTO=J5YXCuAbT0imQyqe16hzUfFFlDgtP40GBYCO3M0UAxiKR6OMc8IU/OmfKBQVi2
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.cavetta.org.mt
188.114.97.3
malicious
theridleysuk.co.uk
3.33.130.190
malicious
d99qtpkvavjj.xyz
3.33.130.190
malicious
www.firmshow.top
203.161.43.228
malicious
hereboy.co.uk
3.33.130.190
malicious
www.faxinguxn6.cn
108.186.253.49
malicious
autonomyai.xyz
15.197.142.173
malicious
8418a72e.jl800.vip.cname.scname.com
38.47.158.215
malicious
web1163.kinghost.net
191.6.208.133
malicious
bulletinnest.com
135.181.212.206
malicious
dexiangovernment.org
3.33.130.190
malicious
e6375a47.jl884.vip.cname.scname.com
65.181.132.158
malicious
www.rebornqababy.ru
87.236.19.243
malicious
www.autonomyai.xyz
unknown
malicious
www.hereboy.co.uk
unknown
malicious
www.erosonline.com.br
unknown
malicious
www.theridleysuk.co.uk
unknown
malicious
www.bulletinnest.com
unknown
malicious
www.d99qtpkvavjj.xyz
unknown
malicious
www.jl884.vip
unknown
malicious
www.jl800.vip
unknown
malicious
www.dexiangovernment.org
unknown
malicious
www.cloudsoda.xyz
unknown
malicious
There are 13 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
203.161.43.228
www.firmshow.top
Malaysia
malicious
135.181.212.206
bulletinnest.com
Germany
malicious
108.186.253.49
www.faxinguxn6.cn
United States
malicious
188.114.97.3
www.cavetta.org.mt
European Union
malicious
15.197.142.173
autonomyai.xyz
United States
malicious
87.236.19.243
www.rebornqababy.ru
Russian Federation
malicious
65.181.132.158
e6375a47.jl884.vip.cname.scname.com
United States
malicious
38.47.158.215
8418a72e.jl800.vip.cname.scname.com
United States
malicious
191.6.208.133
web1163.kinghost.net
Brazil
malicious
3.33.130.190
theridleysuk.co.uk
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
28B0000
trusted library allocation
page read and write
malicious
4000000
unclassified section
page execute and read and write
malicious
5200000
system
page execute and read and write
malicious
230000
system
page execute and read and write
malicious
2870000
trusted library allocation
page read and write
malicious
3210000
unkown
page execute and read and write
malicious
5A0000
unclassified section
page execute and read and write
malicious
F60000
heap
page read and write
9F0000
unkown
page readonly
2751000
heap
page read and write
A6E000
stack
page read and write
7875000
heap
page read and write
2751000
heap
page read and write
2952000
heap
page read and write
613000
heap
page read and write
3F9E000
unclassified section
page read and write
1160000
unkown
page readonly
9BA000
stack
page read and write
2751000
heap
page read and write
2600000
heap
page read and write
BF0000
heap
page read and write
31CD000
direct allocation
page execute and read and write
B2C000
stack
page read and write
7E0F000
stack
page read and write
2751000
heap
page read and write
901000
heap
page read and write
2E9E000
heap
page read and write
1B79000
heap
page read and write
2751000
heap
page read and write
BD0000
unkown
page read and write
2949000
heap
page read and write
33DC000
unclassified section
page read and write
2B6B3400000
trusted library allocation
page read and write
2751000
heap
page read and write
4168000
unkown
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2704000
heap
page read and write
290D000
heap
page read and write
2850000
heap
page read and write
2B6B18D7000
heap
page read and write
1B07000
heap
page read and write
2751000
heap
page read and write
444E000
direct allocation
page read and write
2751000
heap
page read and write
545C000
unkown
page read and write
2976000
heap
page read and write
2751000
heap
page read and write
9C0000
unkown
page read and write
2EDD000
direct allocation
page execute and read and write
8CF000
unkown
page write copy
2751000
heap
page read and write
2751000
heap
page read and write
48EE000
unclassified section
page execute and read and write
2751000
heap
page read and write
9C0000
unkown
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
8D8000
unkown
page readonly
2710000
heap
page read and write
16F0000
heap
page read and write
2908000
heap
page read and write
2751000
heap
page read and write
29A7000
heap
page read and write
296D000
heap
page read and write
970000
heap
page read and write
F44000
heap
page read and write
2B6B18EC000
heap
page read and write
613000
heap
page read and write
800000
heap
page read and write
EB000
stack
page read and write
2AF2000
unkown
page read and write
1A78000
heap
page read and write
2983000
heap
page read and write
4110000
direct allocation
page read and write
2751000
heap
page read and write
19E9000
heap
page read and write
613000
heap
page read and write
BF0000
heap
page read and write
2751000
heap
page read and write
2B6B3200000
trusted library allocation
page read and write
1160000
unkown
page readonly
23AF000
stack
page read and write
817000
heap
page read and write
930000
unkown
page readonly
2ED9000
direct allocation
page execute and read and write
43FE000
direct allocation
page read and write
2751000
heap
page read and write
2B6B1903000
heap
page read and write
2751000
heap
page read and write
78F0000
trusted library allocation
page read and write
2751000
heap
page read and write
2C0F000
stack
page read and write
120000
heap
page read and write
8FC000
stack
page read and write
1B0F000
heap
page read and write
BD0000
unkown
page read and write
4110000
direct allocation
page read and write
DB0000
unkown
page readonly
40C0000
direct allocation
page read and write
55E000
stack
page read and write
5FA000
stack
page read and write
A00000
unkown
page readonly
81F000
heap
page read and write
45E6000
unclassified section
page read and write
2751000
heap
page read and write
613000
heap
page read and write
2D28000
heap
page read and write
675C000
unclassified section
page execute and read and write
950000
unkown
page readonly
3E0C000
unclassified section
page read and write
2751000
heap
page read and write
140000
heap
page read and write
2751000
heap
page read and write
41E3000
direct allocation
page read and write
FD6C1FF000
stack
page read and write
2600000
heap
page read and write
A15000
unkown
page read and write
2B6B330A000
trusted library allocation
page read and write
2751000
heap
page read and write
4C2E000
unclassified section
page read and write
5A0000
direct allocation
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
F68000
heap
page read and write
4A9C000
unclassified section
page read and write
3081000
direct allocation
page execute and read and write
2751000
heap
page read and write
490A000
unclassified section
page read and write
2B6B168E000
system
page execute and read and write
8D8000
unkown
page readonly
2751000
heap
page read and write
315C2000
system
page read and write
2751000
heap
page read and write
43D9000
direct allocation
page read and write
812000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
43DD000
direct allocation
page read and write
198B000
heap
page read and write
43D9000
direct allocation
page read and write
2751000
heap
page read and write
2B6B34CE000
trusted library allocation
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
B9E000
stack
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2604000
heap
page read and write
811000
unkown
page execute read
A0E000
unkown
page readonly
580000
unkown
page readonly
2B6B31B0000
heap
page read and write
7868000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2DB0000
direct allocation
page execute and read and write
2D00000
heap
page read and write
811000
unkown
page execute read
4389000
direct allocation
page read and write
2751000
heap
page read and write
8C5000
unkown
page readonly
2B6B168B000
system
page execute and read and write
2751000
heap
page read and write
613000
heap
page read and write
2751000
heap
page read and write
18A3000
heap
page read and write
2710000
heap
page read and write
5A0000
direct allocation
page read and write
17F3000
heap
page read and write
600000
heap
page read and write
1AFE000
heap
page read and write
2751000
heap
page read and write
2BB2000
unkown
page read and write
366A000
unkown
page read and write
2B6B1800000
heap
page read and write
A00000
unkown
page readonly
2751000
heap
page read and write
2B00000
heap
page read and write
2751000
heap
page read and write
DAF000
stack
page read and write
4233000
direct allocation
page read and write
F5A000
stack
page read and write
302D000
direct allocation
page execute and read and write
2F4E000
direct allocation
page execute and read and write
9BE000
stack
page read and write
14F1000
unkown
page readonly
535C000
unkown
page read and write
1A03000
heap
page read and write
2751000
heap
page read and write
1141000
unkown
page readonly
BB1000
unkown
page readonly
2750000
heap
page read and write
5D5C000
unclassified section
page execute and read and write
7839000
heap
page read and write
2751000
heap
page read and write
2450000
direct allocation
page read and write
2B0F000
stack
page read and write
2604000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
AFB000
heap
page read and write
52C6000
system
page execute and read and write
2751000
heap
page read and write
290D000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
783E000
heap
page read and write
A15000
unkown
page read and write
2751000
heap
page read and write
524A000
system
page execute and read and write
398E000
unkown
page read and write
4260000
direct allocation
page read and write
17A0000
heap
page read and write
2BFF000
heap
page read and write
29C5000
heap
page read and write
2751000
heap
page read and write
2CE0000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
FD6B1FD000
stack
page read and write
2751000
heap
page read and write
2A0000
heap
page read and write
570000
unkown
page readonly
2751000
heap
page read and write
2751000
heap
page read and write
42FA000
unkown
page read and write
1B7A000
heap
page read and write
29D0000
heap
page read and write
9D1000
unkown
page readonly
2908000
heap
page read and write
BB1000
unkown
page readonly
2720000
unkown
page readonly
2751000
heap
page read and write
31682000
system
page read and write
3029000
direct allocation
page execute and read and write
2751000
heap
page read and write
183D000
heap
page read and write
A15000
unkown
page read and write
2751000
heap
page read and write
43D9000
direct allocation
page read and write
2B6B18FC000
heap
page read and write
810000
unkown
page readonly
613000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
295E000
heap
page read and write
1F8000
stack
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2B6B31C0000
trusted library allocation
page read and write
438D000
direct allocation
page read and write
3AE8000
unclassified section
page read and write
15FC000
stack
page read and write
41E3000
direct allocation
page read and write
444E000
direct allocation
page read and write
18A2000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2E2D000
heap
page read and write
18B9000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2D9D000
heap
page read and write
2751000
heap
page read and write
A01000
unkown
page execute read
29D5000
heap
page read and write
2B6B3303000
trusted library allocation
page read and write
2B6B34A5000
trusted library allocation
page read and write
2994000
heap
page read and write
1AF4000
heap
page read and write
930000
unkown
page readonly
4454000
unclassified section
page read and write
42C2000
unclassified section
page read and write
785B000
heap
page read and write
456C000
unkown
page execute and read and write
3FD6000
unkown
page read and write
F10000
unkown
page readonly
2751000
heap
page read and write
2913000
heap
page read and write
2C0C000
unkown
page read and write
4778000
unclassified section
page read and write
B40000
unkown
page readonly
2751000
heap
page read and write
2751000
heap
page read and write
15DB000
stack
page read and write
A0E000
unkown
page readonly
781A000
heap
page read and write
AE8000
heap
page read and write
7806000
heap
page read and write
613000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
3102000
unclassified section
page read and write
180000
heap
page read and write
560000
direct allocation
page read and write
3B20000
unkown
page read and write
4233000
direct allocation
page read and write
7852000
heap
page read and write
29FF000
stack
page read and write
2751000
heap
page read and write
2B6B1630000
system
page execute and read and write
F30000
unkown
page read and write
B2C000
stack
page read and write
2DCC000
unkown
page read and write
2751000
heap
page read and write
31C2000
unclassified section
page read and write
2BE0000
heap
page read and write
1140000
unkown
page readonly
DB0000
unkown
page readonly
1B7A000
heap
page read and write
461E000
unkown
page read and write
290D000
heap
page read and write
296D000
heap
page read and write
B40000
unkown
page readonly
FD0000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
29F2000
heap
page read and write
24E0000
heap
page read and write
2751000
heap
page read and write
2904000
heap
page read and write
2751000
heap
page read and write
40C0000
direct allocation
page read and write
A00000
unkown
page readonly
2751000
heap
page read and write
805000
heap
page read and write
2700000
heap
page read and write
81A000
heap
page read and write
A70000
unkown
page readonly
2902000
heap
page read and write
2751000
heap
page read and write
821000
heap
page read and write
F44000
heap
page read and write
613000
heap
page read and write
AE8000
heap
page read and write
444E000
direct allocation
page read and write
BA0000
unkown
page read and write
299D000
heap
page read and write
2751000
heap
page read and write
438D000
direct allocation
page read and write
3401000
heap
page read and write
2751000
heap
page read and write
3189C000
system
page read and write
2751000
heap
page read and write
613000
heap
page read and write
77FB000
heap
page read and write
2751000
heap
page read and write
2976000
heap
page read and write
495C000
unclassified section
page execute and read and write
7801000
heap
page read and write
786E000
heap
page read and write
14F0000
unkown
page readonly
5253000
system
page execute and read and write
17E3000
heap
page read and write
BC0000
heap
page read and write
78E0000
trusted library allocation
page read and write
37C4000
unclassified section
page read and write
960000
unkown
page readonly
2A00000
unkown
page readonly
438D000
direct allocation
page read and write
2751000
heap
page read and write
4130000
unclassified section
page read and write
F60000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2963000
heap
page read and write
2C23000
heap
page read and write
2751000
heap
page read and write
F30000
unkown
page read and write
307D000
direct allocation
page execute and read and write
299A000
heap
page read and write
3C7A000
unclassified section
page read and write
F0E000
stack
page read and write
940000
heap
page read and write
29CB000
heap
page read and write
3AFE000
unkown
page execute and read and write
2E29000
heap
page read and write
9E0000
unkown
page read and write
2F00000
direct allocation
page execute and read and write
43FE000
direct allocation
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
B08000
unkown
page read and write
115F000
stack
page read and write
526F000
system
page execute and read and write
190000
direct allocation
page read and write
596C000
unkown
page execute and read and write
817000
heap
page read and write
290D000
heap
page read and write
29B0000
heap
page read and write
A17000
unkown
page readonly
590000
unkown
page readonly
2B6B18D0000
heap
page read and write
2751000
heap
page read and write
17E2000
heap
page read and write
2751000
heap
page read and write
309E000
direct allocation
page execute and read and write
2751000
heap
page read and write
34D8000
unkown
page read and write
A17000
unkown
page readonly
2704000
heap
page read and write
37FC000
unkown
page read and write
580000
unkown
page readonly
782E000
heap
page read and write
1FAE000
stack
page read and write
8CF000
unkown
page read and write
28F0000
heap
page read and write
2751000
heap
page read and write
950000
unkown
page readonly
2751000
heap
page read and write
2751000
heap
page read and write
A01000
unkown
page execute read
5263000
system
page execute and read and write
B50000
heap
page read and write
AE0000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
42B0000
direct allocation
page read and write
4260000
direct allocation
page read and write
5DC0000
trusted library allocation
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2F0000
heap
page read and write
270F000
stack
page read and write
613000
heap
page read and write
43FE000
direct allocation
page read and write
1BB000
stack
page read and write
FD6A9FB000
stack
page read and write
29F0000
trusted library allocation
page read and write
2751000
heap
page read and write
7834000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
4F6C000
unkown
page execute and read and write
2751000
heap
page read and write
A70000
unkown
page readonly
31D1000
direct allocation
page execute and read and write
43DD000
direct allocation
page read and write
4110000
direct allocation
page read and write
2751000
heap
page read and write
F10000
unkown
page readonly
89F000
unkown
page readonly
2751000
heap
page read and write
2751000
heap
page read and write
2AA0000
trusted library allocation
page execute and read and write
31B4000
unkown
page read and write
5A0000
direct allocation
page read and write
613000
heap
page read and write
1CE000
stack
page read and write
2983000
heap
page read and write
28F8000
heap
page read and write
42B0000
direct allocation
page read and write
602000
heap
page read and write
2751000
heap
page read and write
2B6B3401000
trusted library allocation
page read and write
9D1000
unkown
page readonly
298E000
heap
page read and write
2B50000
trusted library allocation
page read and write
290D000
heap
page read and write
2A00000
unkown
page readonly
2902000
heap
page read and write
F50000
unkown
page read and write
7877000
heap
page read and write
2751000
heap
page read and write
F40000
heap
page read and write
77F3000
heap
page read and write
1B9A000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
15BF000
stack
page read and write
2751000
heap
page read and write
3CB2000
unkown
page read and write
4233000
direct allocation
page read and write
2C2E000
stack
page read and write
2B6B3313000
trusted library allocation
page read and write
2751000
heap
page read and write
BA0000
unkown
page read and write
590000
unkown
page readonly
2751000
heap
page read and write
613000
heap
page read and write
1A8C000
heap
page read and write
930000
unkown
page readonly
2751000
heap
page read and write
17E3000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2B6B1840000
heap
page read and write
2751000
heap
page read and write
A90000
unkown
page read and write
41E3000
direct allocation
page read and write
9F0000
unkown
page readonly
2B6B330F000
trusted library allocation
page read and write
4389000
direct allocation
page read and write
8D3000
unkown
page write copy
805000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2810000
unkown
page execute and read and write
2751000
heap
page read and write
2751000
heap
page read and write
2970000
heap
page read and write
9BA000
stack
page read and write
2B6B34BE000
trusted library allocation
page read and write
A17000
unkown
page readonly
5FA000
stack
page read and write
3E44000
unkown
page read and write
24D4000
heap
page read and write
1A64000
heap
page read and write
1B78000
heap
page read and write
BC0000
heap
page read and write
43DD000
direct allocation
page read and write
30F2000
direct allocation
page execute and read and write
2751000
heap
page read and write
570000
unkown
page readonly
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
613000
heap
page read and write
2751000
heap
page read and write
299F000
heap
page read and write
A01000
unkown
page execute read
940000
unkown
page readonly
2B6B1720000
heap
page read and write
4260000
direct allocation
page read and write
321C000
unclassified section
page read and write
1A82000
heap
page read and write
FD6B9FE000
stack
page read and write
2B50000
trusted library allocation
page read and write
173D000
stack
page read and write
9E0000
unkown
page read and write
940000
heap
page read and write
2751000
heap
page read and write
19A6000
heap
page read and write
2751000
heap
page read and write
613000
heap
page read and write
2989000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
AE0000
heap
page read and write
780B000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
40C0000
direct allocation
page read and write
A90000
unkown
page read and write
2BCE000
stack
page read and write
2720000
unkown
page readonly
2751000
heap
page read and write
3242000
direct allocation
page execute and read and write
2751000
heap
page read and write
B30000
unkown
page readonly
17B8000
heap
page read and write
950000
unkown
page readonly
2751000
heap
page read and write
A15000
unkown
page read and write
2751000
heap
page read and write
B30000
unkown
page readonly
2751000
heap
page read and write
1A3D000
heap
page read and write
2751000
heap
page read and write
2B6B31C0000
trusted library allocation
page read and write
290D000
heap
page read and write
42B0000
direct allocation
page read and write
2751000
heap
page read and write
B50000
heap
page read and write
940000
unkown
page readonly
AC000
stack
page read and write
2850000
trusted library allocation
page read and write
2D2C000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2440000
direct allocation
page execute and read and write
2751000
heap
page read and write
2751000
heap
page read and write
2AF2000
unkown
page read and write
2B6B3321000
trusted library allocation
page read and write
3B6C000
unkown
page execute and read and write
2DCC000
unkown
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
613000
heap
page read and write
2751000
heap
page read and write
A17000
unkown
page readonly
77EF000
heap
page read and write
B9E000
stack
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
B04000
heap
page read and write
89F000
unkown
page readonly
7864000
heap
page read and write
F7F000
heap
page read and write
2751000
heap
page read and write
A01000
unkown
page execute read
2751000
heap
page read and write
FC0000
heap
page read and write
930000
unkown
page readonly
31C84000
system
page read and write
1AAC000
heap
page read and write
2B6B1900000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
115F000
stack
page read and write
29A4000
heap
page read and write
950000
unkown
page readonly
2751000
heap
page read and write
960000
unkown
page readonly
177D000
stack
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2B15000
heap
page read and write
4389000
direct allocation
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
810000
unkown
page readonly
970000
heap
page read and write
2751000
heap
page read and write
2913000
heap
page read and write
A0E000
unkown
page readonly
B09000
unkown
page read and write
170000
heap
page read and write
F68000
heap
page read and write
448C000
unkown
page read and write
A0E000
unkown
page readonly
2B50000
trusted library allocation
page read and write
2704000
heap
page read and write
3600000
unclassified section
page execute and read and write
2751000
heap
page read and write
535C000
unclassified section
page execute and read and write
1B0F000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2970000
heap
page read and write
F40000
heap
page read and write
7DCE000
stack
page read and write
17B0000
heap
page read and write
613000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
8C5000
unkown
page readonly
2B6B3300000
trusted library allocation
page read and write
A00000
unkown
page readonly
CF1000
unkown
page read and write
2751000
heap
page read and write
7862000
heap
page read and write
2751000
heap
page read and write
24D0000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2751000
heap
page read and write
2922000
heap
page read and write
2751000
heap
page read and write
15CF000
stack
page read and write
2751000
heap
page read and write
2B6B34C4000
trusted library allocation
page read and write
2751000
heap
page read and write
8FC000
stack
page read and write
18A2000
heap
page read and write
2751000
heap
page read and write
There are 662 hidden memdumps, click here to show them.