IOC Report
Inquiry No PJO-4010574.exe

loading gif

Files

File Path
Type
Category
Malicious
Inquiry No PJO-4010574.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Inquiry No PJO-4010574.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\6U1s-63
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Inquiry No PJO-4010574.exe
"C:\Users\user\Desktop\Inquiry No PJO-4010574.exe"
malicious
C:\Users\user\Desktop\Inquiry No PJO-4010574.exe
"C:\Users\user\Desktop\Inquiry No PJO-4010574.exe"
malicious
C:\Program Files (x86)\ZbEssRnWukuPlGPIxkeaXYZdLEtxsVgYCSZqRGJpShjyqOjGkYhKrfFdwRLRojZ\HeKTvWjrtOUnkuZfNlEvF.exe
"C:\Program Files (x86)\ZbEssRnWukuPlGPIxkeaXYZdLEtxsVgYCSZqRGJpShjyqOjGkYhKrfFdwRLRojZ\HeKTvWjrtOUnkuZfNlEvF.exe"
malicious
C:\Windows\SysWOW64\w32tm.exe
"C:\Windows\SysWOW64\w32tm.exe"
malicious
C:\Program Files (x86)\ZbEssRnWukuPlGPIxkeaXYZdLEtxsVgYCSZqRGJpShjyqOjGkYhKrfFdwRLRojZ\HeKTvWjrtOUnkuZfNlEvF.exe
"C:\Program Files (x86)\ZbEssRnWukuPlGPIxkeaXYZdLEtxsVgYCSZqRGJpShjyqOjGkYhKrfFdwRLRojZ\HeKTvWjrtOUnkuZfNlEvF.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.tedjp-x.com/c0wr/?iHmHOtK=I4+9foIZEqozW1CrO2Wz7/DZoylmFTPmq9Ir5hkT/AZ8BMXZmPqfikD+B7Zsb9R0Gx6spdbB+zho64Hj/e3L4EYjhZFv4l597JlEzTSXx7nmICgHg7bGrac=&L480=nFsp
162.43.101.114
malicious
http://www.oc7o0.top/2zff/?iHmHOtK=4L8xoD0W4Zo4sy88OPxzXkM4Et1OXrliZZOBxyE5jHDJEgkxN8cq+PG6NIXzy1XRCqQIvL5VyJCknvUNNLKk7znic/DfJyEGJbg1Pv28u2ofuxZkWteJjYs=&L480=nFsp
188.114.97.3
malicious
http://www.capheconde.com/9qp1/
116.193.69.142
malicious
http://www.pblfishing.com/os51/?L480=nFsp&iHmHOtK=c6Au0o4JaGbiIJhi/W9FlVa+W6eKgbIavfE1EfL2H5qYfZI58C4g2l7MAq/uJtf/bSwml0Abw9HN8qCtjnIFaNOIwu03UJk5/xo8eM0g569x/yUzTt9lNQI=
170.130.64.114
malicious
http://www.capheconde.com/assets/404_files/style.css
unknown
malicious
http://www.pp887300.com/lhex/
103.42.144.60
malicious
http://www.tedjp-x.com/c0wr/
162.43.101.114
malicious
http://www.capheconde.com/9qp1/?L480=nFsp&iHmHOtK=piAR+Ff1iHDjdou/rhEQcU2b6yhYr5PYXWk6yO0m5khCtjLWm0pVMCsJ6m/O3zZYbcRJdhVWYb2ADKDO+u4ZlLMBcWRMf05zG4E+9fsN2UBlQi8qbNBOF5k=
116.193.69.142
malicious
http://www.bloomvice.com/wryo/?iHmHOtK=LrRmgYPs8LsdxbzfghU7Rrkcqn/uiUbIhXBev7x5iSFC7eFMAdqrv0qIY78m6am6UfdI85MNKFNBcaa15Zv4z5hxclPHNGb5wEZvbrXrYulKcXi85eVkiLQ=&L480=nFsp
217.160.0.85
malicious
http://www.techsterverse.xyz/5ane/?iHmHOtK=WTbBFWOTcFPDCMhESefslTJ6+GkUog7y940HcquptONdD9QmK5HdLPKC5ymHK27F/BdIZvlTb7atmdZ+8u/HwzLeEe0DEJwM8vfrVi/4VNBsPllMeibbLgY=&L480=nFsp
203.161.49.220
malicious
http://www.relationshipfirst.us/zxku/
212.32.237.101
malicious
http://www.relationshipfirst.us/zxku/?L480=nFsp&iHmHOtK=LzaBpmw0qv0cK+7U3N9wzWvH1rfTwbRorxIVpXGhhpJEoQVn8DIg0i9de8yEo76YxD/IFdbD3aZ704STPEL3y7t+BH8DETSF9Xq3zszk+n+o3arCieFg2Q4=
212.32.237.101
malicious
http://www.globalcred.co/q9jb/?L480=nFsp&iHmHOtK=j0olB4pKJNfBpTyLtiZxxDaYJCDISEWNP33SxFqZDhQbPJdYHiw3UTQ1/R0QXxI3ie6VZCuGDc6mq4FLm2kA6W78v7HmGQDG94BebamJgmWwFfSc9SoNlnA=
103.224.182.250
malicious
http://www.bloomvice.com/wryo/
217.160.0.85
malicious
http://www.oc7o0.top/2zff/
188.114.97.3
malicious
http://www.balifafa.com/4ymg/
107.149.174.220
malicious
http://www.balifafa.com/4ymg/?iHmHOtK=nFZYYf4wbY50wWAChatr++kDEPB15Qhq/x7aQ1H7vt9GgS0wKUnOaHYV5VLziWgziYgeq4JZlKaG5KVexDT+ezFRclyCTcpNeugmvQJUYmTxZwPnAH2U+gM=&L480=nFsp
107.149.174.220
malicious
http://www.techsterverse.xyz/5ane/
203.161.49.220
malicious
http://www.globalcred.co/q9jb/
103.224.182.250
malicious
http://www.pp887300.com/lhex/?iHmHOtK=AKDeU1MOdy2C7+0oZjuGTQm02UaFJku+bqnfKxS0A3LFBkNctrgbipmQYZQ6LZYpsVs9A7W3lG5h26zbDb4ShZiTrehhnNvLwO/B2qpeC52tMHhlrRNDNmI=&L480=nFsp
103.42.144.60
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.relationshipfirst.us/zxku/?L480=nFsp&ch=1&iHmHOtK=LzaBpmw0qv0cK
unknown
http://help.yahoo.com/help/us/ysearch/slurp)
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.pp887300.com/lhex/?iHmHOtK=AKDeU1MOdy2C7
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.pp887300.com
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
http://www.capheconde.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tedjp-x.com
162.43.101.114
malicious
www.pblfishing.com
170.130.64.114
malicious
www.relationshipfirst.us
212.32.237.101
malicious
www.techsterverse.xyz
203.161.49.220
malicious
www.capheconde.com
116.193.69.142
malicious
jh03-site-25.cdn-ng.net
103.42.144.60
malicious
www.balifafa.com
107.149.174.220
malicious
www.globalcred.co
103.224.182.250
malicious
www.ad14.fun
188.114.96.3
malicious
www.oc7o0.top
188.114.97.3
malicious
www.bloomvice.com
217.160.0.85
malicious
www.pp887300.com
unknown
malicious
www.newzionocala.com
unknown
malicious
www.colva.info
unknown
malicious
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
116.193.69.142
www.capheconde.com
Viet Nam
malicious
188.114.97.3
www.oc7o0.top
European Union
malicious
212.32.237.101
www.relationshipfirst.us
Netherlands
malicious
103.224.182.250
www.globalcred.co
Australia
malicious
170.130.64.114
www.pblfishing.com
United States
malicious
217.160.0.85
www.bloomvice.com
Germany
malicious
103.42.144.60
jh03-site-25.cdn-ng.net
Taiwan; Republic of China (ROC)
malicious
107.149.174.220
www.balifafa.com
United States
malicious
203.161.49.220
www.techsterverse.xyz
Malaysia
malicious
162.43.101.114
www.tedjp-x.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2FE0000
trusted library allocation
page read and write
malicious
1910000
unclassified section
page execute and read and write
malicious
3930000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2C50000
system
page execute and read and write
malicious
5670000
system
page execute and read and write
malicious
2E20000
unclassified section
page execute and read and write
malicious
3280000
trusted library allocation
page read and write
malicious
4141000
trusted library allocation
page read and write
3061000
heap
page read and write
3710000
trusted library allocation
page execute and read and write
6490000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
5890000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
432A000
unclassified section
page read and write
88E000
unkown
page readonly
3ADA000
unkown
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1EE58D50000
heap
page read and write
7E9D000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
2404000
heap
page read and write
1308000
heap
page read and write
3061000
heap
page read and write
310B000
trusted library allocation
page read and write
37B2000
unclassified section
page read and write
3061000
heap
page read and write
3A0000
unkown
page readonly
880000
unkown
page readonly
3061000
heap
page read and write
3061000
heap
page read and write
2DAD000
heap
page read and write
3061000
heap
page read and write
2DFA000
heap
page read and write
2E20000
heap
page read and write
3061000
heap
page read and write
115E000
stack
page read and write
2D97000
heap
page read and write
1100000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1220000
heap
page read and write
3061000
heap
page read and write
2F10000
trusted library allocation
page read and write
175E000
direct allocation
page execute and read and write
CC0000
unkown
page readonly
3061000
heap
page read and write
3061000
heap
page read and write
748000
heap
page read and write
1EE59111000
trusted library allocation
page read and write
2D2D000
heap
page read and write
2D2D000
heap
page read and write
895000
unkown
page read and write
3061000
heap
page read and write
3E74000
unclassified section
page read and write
3061000
heap
page read and write
4122000
unkown
page read and write
5AD0000
trusted library allocation
page execute and read and write
B50000
unkown
page readonly
7DAE000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1310000
heap
page read and write
FFE000
stack
page read and write
2DAD000
heap
page read and write
2E40000
heap
page read and write
6590000
trusted library section
page read and write
2D65000
heap
page read and write
3061000
heap
page read and write
FB2000
unkown
page read and write
12B0000
trusted library allocation
page read and write
2F0000
unkown
page readonly
5750000
trusted library allocation
page execute and read and write
54B5000
trusted library allocation
page read and write
3061000
heap
page read and write
5735000
system
page execute and read and write
3061000
heap
page read and write
2D28000
heap
page read and write
5AB0000
trusted library section
page read and write
16ED000
direct allocation
page execute and read and write
3061000
heap
page read and write
12F7000
trusted library allocation
page execute and read and write
126E000
stack
page read and write
2D72000
heap
page read and write
1EE58D70000
trusted library allocation
page read and write
7EA2000
heap
page read and write
D89E000
stack
page read and write
3061000
heap
page read and write
870000
unkown
page read and write
2DA1000
heap
page read and write
2D80000
heap
page read and write
3061000
heap
page read and write
12D3000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
2E60000
heap
page read and write
12C4000
trusted library allocation
page read and write
1908000
direct allocation
page execute and read and write
2400000
heap
page read and write
3061000
heap
page read and write
300C000
unclassified section
page execute and read and write
11D1000
heap
page read and write
3061000
heap
page read and write
FB0000
heap
page read and write
1320000
heap
page read and write
1EE574AF000
heap
page read and write
2E0000
unkown
page readonly
3061000
heap
page read and write
1210000
unkown
page readonly
748000
heap
page read and write
37B6000
unkown
page read and write
D99E000
stack
page read and write
5470000
trusted library allocation
page execute and read and write
476A000
unkown
page read and write
1EE59201000
trusted library allocation
page read and write
35A000
stack
page read and write
1871000
direct allocation
page execute and read and write
3061000
heap
page read and write
1677000
heap
page read and write
2D22000
heap
page read and write
3184000
heap
page read and write
12C0000
trusted library allocation
page read and write
2D84000
heap
page read and write
2D2B000
heap
page read and write
1EE59103000
trusted library allocation
page read and write
7E61000
heap
page read and write
3061000
heap
page read and write
2DB0000
heap
page read and write
2CC0000
heap
page read and write
2E0000
unkown
page readonly
2D8A000
heap
page read and write
54DA000
trusted library allocation
page read and write
5729000
system
page execute and read and write
3C0000
heap
page read and write
2DC4000
heap
page read and write
8847FD000
stack
page read and write
3061000
heap
page read and write
3D0000
unkown
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
7EAE000
stack
page read and write
7E99000
heap
page read and write
3061000
heap
page read and write
29DB000
stack
page read and write
2D2D000
heap
page read and write
16E9000
direct allocation
page execute and read and write
3061000
heap
page read and write
578C000
system
page execute and read and write
1886000
direct allocation
page execute and read and write
3061000
heap
page read and write
7E66000
heap
page read and write
2F60000
trusted library allocation
page read and write
3B0000
unkown
page readonly
4B71000
trusted library allocation
page read and write
7EA6000
heap
page read and write
1EE57450000
heap
page read and write
4006000
unclassified section
page read and write
3061000
heap
page read and write
47E0000
unclassified section
page read and write
7D6E000
stack
page read and write
63B0000
trusted library allocation
page read and write
8112000
heap
page read and write
2F62000
unkown
page read and write
3061000
heap
page read and write
2D72000
heap
page read and write
3061000
heap
page read and write
A40000
heap
page read and write
12FB000
trusted library allocation
page execute and read and write
895000
unkown
page read and write
1EE59121000
trusted library allocation
page read and write
1EE592CE000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
12DD000
trusted library allocation
page execute and read and write
54E8000
trusted library allocation
page read and write
3061000
heap
page read and write
B02000
unkown
page readonly
58E0000
heap
page read and write
3624000
unkown
page read and write
880000
unkown
page readonly
144F000
stack
page read and write
3691000
direct allocation
page execute and read and write
1EE5910A000
trusted library allocation
page read and write
2F70000
heap
page read and write
166E000
stack
page read and write
1A20000
unclassified section
page execute and read and write
2FE0000
trusted library allocation
page read and write
17994000
system
page read and write
2D84000
heap
page read and write
11F0000
unkown
page read and write
2D8A000
heap
page read and write
5780000
heap
page read and write
54DF000
trusted library allocation
page read and write
2E70000
unkown
page readonly
3090000
trusted library allocation
page read and write
3061000
heap
page read and write
2D33000
heap
page read and write
3061000
heap
page read and write
5A6E000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
2530000
unkown
page execute and read and write
2DD7000
heap
page read and write
2F52000
trusted library allocation
page read and write
2DB0000
heap
page read and write
65B0000
trusted library allocation
page read and write
7F2E000
stack
page read and write
10E0000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
32C0000
trusted library allocation
page read and write
7FD40000
trusted library allocation
page execute and read and write
2D97000
heap
page read and write
D90000
unkown
page readonly
3C6C000
unkown
page read and write
1890000
unkown
page readonly
2E10000
heap
page read and write
355E000
direct allocation
page execute and read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
88E000
unkown
page readonly
323C000
unkown
page read and write
35A000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1220000
heap
page read and write
368D000
direct allocation
page execute and read and write
7FE0000
trusted library allocation
page read and write
1EE59116000
trusted library allocation
page read and write
105F000
heap
page read and write
F5A000
stack
page read and write
897000
unkown
page readonly
1250000
heap
page read and write
2D9C000
heap
page read and write
862E000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1210000
unkown
page readonly
C9A000
stack
page read and write
1890000
unkown
page readonly
588E000
stack
page read and write
1EE59000000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
1000000
heap
page read and write
12AE000
stack
page read and write
2D80000
heap
page read and write
54C8000
trusted library allocation
page read and write
1EE58D70000
trusted library allocation
page read and write
1EE5749C000
heap
page read and write
1500000
unkown
page readonly
1020000
heap
page read and write
7E84000
heap
page read and write
3061000
heap
page read and write
88E000
unkown
page readonly
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
7C6E000
stack
page read and write
34ED000
direct allocation
page execute and read and write
2F2B000
trusted library allocation
page read and write
3061000
heap
page read and write
3DFE000
unkown
page read and write
2F00000
trusted library allocation
page execute and read and write
789000
heap
page read and write
3061000
heap
page read and write
1EE57340000
system
page execute and read and write
2D84000
heap
page read and write
6090000
trusted library allocation
page read and write
2E44000
heap
page read and write
5450000
heap
page read and write
2440000
unkown
page readonly
3061000
heap
page read and write
323C000
unkown
page read and write
1EE574B1000
heap
page read and write
30A0000
trusted library allocation
page read and write
2E5E000
stack
page read and write
3D0000
unkown
page read and write
1500000
unkown
page readonly
54D5000
trusted library allocation
page read and write
1EE58D70000
trusted library allocation
page read and write
3061000
heap
page read and write
2DDE000
heap
page read and write
88E000
unkown
page readonly
2D0000
unkown
page readonly
2D33000
heap
page read and write
4E28000
unclassified section
page read and write
1EE57480000
heap
page read and write
2D0000
unkown
page readonly
3061000
heap
page read and write
2E24000
heap
page read and write
7FDE000
trusted library allocation
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
2D72000
heap
page read and write
3A8C000
unclassified section
page read and write
1EE5910E000
trusted library allocation
page read and write
2F5F000
stack
page read and write
3C0000
heap
page read and write
B50000
unkown
page readonly
2DB7000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
7E78000
heap
page read and write
880000
unkown
page readonly
3022000
unkown
page read and write
33AE000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
54BD000
trusted library allocation
page read and write
3061000
heap
page read and write
2D33000
heap
page read and write
7E61000
heap
page read and write
3061000
heap
page read and write
4972000
unclassified section
page read and write
12F0000
trusted library allocation
page read and write
1280000
unkown
page read and write
3061000
heap
page read and write
5494000
trusted library allocation
page read and write
3061000
heap
page read and write
2430000
heap
page read and write
1028000
heap
page read and write
3061000
heap
page read and write
23EF000
stack
page read and write
3061000
heap
page read and write
813B000
heap
page read and write
141E000
stack
page read and write
883FFB000
stack
page read and write
154F000
stack
page read and write
2F3E000
trusted library allocation
page read and write
316D000
heap
page read and write
3061000
heap
page read and write
DFE000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1EE57590000
heap
page read and write
CE0000
unkown
page readonly
30C0000
trusted library allocation
page read and write
3061000
heap
page read and write
3360000
trusted library allocation
page read and write
3061000
heap
page read and write
870000
unkown
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
333D000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
6FC000
stack
page read and write
3061000
heap
page read and write
2D8A000
heap
page read and write
17392000
system
page read and write
390000
unkown
page readonly
895000
unkown
page read and write
11ED000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
2DB2000
heap
page read and write
34E9000
direct allocation
page execute and read and write
4101000
trusted library allocation
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
14FF000
stack
page read and write
850000
unkown
page readonly
3061000
heap
page read and write
2DB7000
heap
page read and write
740000
heap
page read and write
3061000
heap
page read and write
2F0000
unkown
page readonly
3061000
heap
page read and write
740000
heap
page read and write
3095000
trusted library allocation
page read and write
1173000
heap
page read and write
6FC000
stack
page read and write
11D0000
unkown
page read and write
1300000
heap
page read and write
D73E000
stack
page read and write
3061000
heap
page read and write
D80000
unkown
page readonly
D97000
stack
page read and write
1166000
heap
page read and write
2F20000
trusted library allocation
page read and write
12DC000
unkown
page read and write
1280000
unkown
page read and write
38CC000
unclassified section
page read and write
3061000
heap
page read and write
1EE58F20000
heap
page read and write
1EE59100000
trusted library allocation
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1170000
heap
page read and write
33C0000
direct allocation
page execute and read and write
3061000
heap
page read and write
DA0000
unkown
page readonly
2E24000
heap
page read and write
4C96000
unclassified section
page read and write
2430000
heap
page read and write
172D2000
system
page read and write
D80000
unkown
page readonly
7E61000
heap
page read and write
12D0000
trusted library allocation
page read and write
3061000
heap
page read and write
60B2000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
D4A000
stack
page read and write
D9E0000
trusted library section
page read and write
2D80000
heap
page read and write
66AE000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
5500000
trusted library allocation
page read and write
2E20000
heap
page read and write
58A0000
heap
page read and write
2440000
unkown
page readonly
2D76000
heap
page read and write
54F0000
trusted library allocation
page read and write
7E92000
heap
page read and write
11E1000
unkown
page readonly
7E54000
heap
page read and write
2D2D000
heap
page read and write
7EEE000
stack
page read and write
3B0000
unkown
page readonly
884FFE000
stack
page read and write
2D22000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3168000
trusted library allocation
page read and write
B00000
unkown
page readonly
5785000
heap
page read and write
3061000
heap
page read and write
EE0000
unkown
page readonly
3360000
trusted library allocation
page read and write
BFE000
unkown
page readonly
DB0000
heap
page read and write
11F0000
unkown
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
5760000
trusted library allocation
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
DB0000
heap
page read and write
5490000
trusted library allocation
page read and write
3061000
heap
page read and write
4FBA000
unclassified section
page read and write
3061000
heap
page read and write
2420000
unclassified section
page execute and read and write
3061000
heap
page read and write
1290000
unkown
page read and write
3061000
heap
page read and write
80D0000
heap
page read and write
3061000
heap
page read and write
4446000
unkown
page read and write
3F0000
unkown
page read and write
2D2D000
heap
page read and write
897000
unkown
page readonly
3061000
heap
page read and write
881000
unkown
page execute read
3061000
heap
page read and write
2F41000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
3061000
heap
page read and write
B4F000
stack
page read and write
11150000
trusted library allocation
page execute and read and write
3061000
heap
page read and write
2DC4000
heap
page read and write
2D97000
heap
page read and write
881000
unkown
page execute read
DFE000
stack
page read and write
2E44000
heap
page read and write
3061000
heap
page read and write
2E20000
heap
page read and write
D4A000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1137E000
stack
page read and write
1A10000
heap
page read and write
3339000
heap
page read and write
5462000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
45D8000
unkown
page read and write
3061000
heap
page read and write
CD0000
unkown
page readonly
3061000
heap
page read and write
3061000
heap
page read and write
3872000
unclassified section
page read and write
126E000
stack
page read and write
3061000
heap
page read and write
12CD000
trusted library allocation
page execute and read and write
1EE592A6000
trusted library allocation
page read and write
3061000
heap
page read and write
5738000
system
page execute and read and write
3060000
heap
page read and write
10FC000
stack
page read and write
58CE000
heap
page read and write
5520000
heap
page read and write
1EE5748A000
heap
page read and write
44BC000
unclassified section
page read and write
7EB0000
heap
page read and write
2D18000
heap
page read and write
1670000
heap
page read and write
3210000
heap
page read and write
850000
unkown
page readonly
2F30000
unkown
page execute and read and write
1550000
direct allocation
page read and write
572B000
stack
page read and write
2D28000
heap
page read and write
2EAE000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
2D24000
heap
page read and write
14FF000
stack
page read and write
9BE000
stack
page read and write
2D76000
heap
page read and write
E5C000
stack
page read and write
2D0E000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
1130000
heap
page read and write
56E0000
heap
page execute and read and write
3061000
heap
page read and write
1EE574AA000
heap
page read and write
3061000
heap
page read and write
8857FE000
stack
page read and write
895000
unkown
page read and write
3061000
heap
page read and write
7E70000
heap
page read and write
7E60000
heap
page read and write
7E75000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
5460000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
2EFC000
stack
page read and write
3061000
heap
page read and write
56D0000
heap
page read and write
8160000
heap
page read and write
1EE573C0000
system
page execute and read and write
3061000
heap
page read and write
7C2E000
stack
page read and write
30F0000
heap
page execute and read and write
54B2000
trusted library allocation
page read and write
2DB2000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
58A9000
heap
page read and write
11E1000
unkown
page readonly
3E1000
unkown
page readonly
10FC000
stack
page read and write
3061000
heap
page read and write
2DE8000
heap
page read and write
897000
unkown
page readonly
3061000
heap
page read and write
56C0000
trusted library section
page readonly
3061000
heap
page read and write
3F0000
unkown
page read and write
3061000
heap
page read and write
15C0000
direct allocation
page execute and read and write
3061000
heap
page read and write
151F000
stack
page read and write
2D10000
heap
page read and write
3061000
heap
page read and write
5523000
heap
page read and write
7E61000
heap
page read and write
5740000
trusted library allocation
page read and write
866F000
stack
page read and write
2DE2000
heap
page read and write
5AAF000
stack
page read and write
3061000
heap
page read and write
1138000
heap
page read and write
12C3000
trusted library allocation
page execute and read and write
12E6000
trusted library allocation
page execute and read and write
5480000
heap
page read and write
3061000
heap
page read and write
7E6B000
heap
page read and write
3061000
heap
page read and write
3050000
heap
page read and write
3E1000
unkown
page readonly
880000
unkown
page readonly
2404000
heap
page read and write
EE0000
unkown
page readonly
1EE592C4000
trusted library allocation
page read and write
D90000
unkown
page readonly
73E000
stack
page read and write
175AC000
system
page read and write
A40000
heap
page read and write
7B2E000
stack
page read and write
3061000
heap
page read and write
12EA000
trusted library allocation
page execute and read and write
3061000
heap
page read and write
1520000
trusted library allocation
page read and write
D77E000
stack
page read and write
54E0000
trusted library allocation
page read and write
2D9F000
stack
page read and write
2E60000
heap
page read and write
3061000
heap
page read and write
1000000
heap
page read and write
3061000
heap
page read and write
7FD0000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
65A0000
trusted library section
page read and write
3061000
heap
page read and write
CE0000
unkown
page readonly
3B1C000
unkown
page execute and read and write
3061000
heap
page read and write
3101000
trusted library allocation
page read and write
3061000
heap
page read and write
2E44000
heap
page read and write
12E2000
trusted library allocation
page read and write
3061000
heap
page read and write
12E0000
trusted library allocation
page read and write
2D76000
heap
page read and write
2F62000
unkown
page read and write
897000
unkown
page readonly
3061000
heap
page read and write
54B9000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
1300000
heap
page read and write
FAD0000
trusted library allocation
page read and write
1147E000
stack
page read and write
5719000
system
page execute and read and write
CD0000
unkown
page readonly
3061000
heap
page read and write
113E000
heap
page read and write
589C000
unkown
page read and write
11D0000
unkown
page read and write
3061000
heap
page read and write
3F90000
unkown
page read and write
156E000
stack
page read and write
3702000
direct allocation
page execute and read and write
2E70000
unkown
page readonly
1EE573BE000
system
page execute and read and write
881000
unkown
page execute read
3061000
heap
page read and write
54D0000
trusted library allocation
page read and write
CC0000
unkown
page readonly
DA0000
unkown
page readonly
3061000
heap
page read and write
1158000
heap
page read and write
666E000
stack
page read and write
2400000
heap
page read and write
3061000
heap
page read and write
4A86000
trusted library allocation
page read and write
307C000
stack
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
5730000
heap
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
2D24000
heap
page read and write
3061000
heap
page read and write
2D2D000
heap
page read and write
3061000
heap
page read and write
2D29000
heap
page read and write
D790000
trusted library allocation
page read and write
3A0000
unkown
page readonly
3061000
heap
page read and write
3120000
trusted library allocation
page read and write
3061000
heap
page read and write
1EE592BE000
trusted library allocation
page read and write
2C38000
stack
page read and write
3061000
heap
page read and write
188D000
direct allocation
page execute and read and write
881000
unkown
page execute read
307C000
unkown
page read and write
3061000
heap
page read and write
3061000
heap
page read and write
390000
unkown
page readonly
2F4D000
trusted library allocation
page read and write
464E000
unclassified section
page read and write
1308000
heap
page read and write
There are 689 hidden memdumps, click here to show them.