IOC Report
spec 4008670601 AZTEK Order.exe

loading gif

Files

File Path
Type
Category
Malicious
spec 4008670601 AZTEK Order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\spec 4008670601 AZTEK Order.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\N77o9w1836
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yx0pa5d.iec.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hefjqtk1.rer.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvfivwcf.jud.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdfgkkzi.gve.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe
"C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
malicious
C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe
"C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
malicious
C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe
"C:\Users\user\Desktop\spec 4008670601 AZTEK Order.exe"
malicious
C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe
"C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe"
malicious
C:\Windows\SysWOW64\compact.exe
"C:\Windows\SysWOW64\compact.exe"
malicious
C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe
"C:\Program Files (x86)\DmmYnblmJTLDhvgFjbXsIMIesvkaMwNvjRhKKpaFSbEONXnqZBwCbcDNXPDETmxNEAlNU\OFEkXEMCZC.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.hellokong.xyz/oui5/
203.161.49.220
https://duckduckgo.com/chrome_newtab
unknown
http://www.architect-usschool.com/s24g/
217.160.0.84
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.hondamechanic.today/pv57/?7Dihs8p=6UcJOPuI3ds3m8dRFaGqe18kk0aRE6C9zfep+6iQQcPKXv8sEJKo1I2dFrwlAwFzKSJLgqMZnt8gW4RLGDqdj2op7I/d7Qwx4DLM/Sb7UzOzABLy3akf6gQBeurdxZRPhPoEffE=&Bp=2LpD8tLh
64.190.62.22
http://searchdiscovered.com/__media__/images/logo.gif)
unknown
http://www.rz6grmvv.shop/wvam/?Bp=2LpD8tLh&7Dihs8p=ppN4Kg7gaCRo+jf4iLEmna60kcJd+oo7/wZIRMT4+Man5OlGV28GmQNPMVld/mi8klF/kBnYjgc4RUC2chY7WuIAYm4xk+Ll6sKGI2rWgbxJmoqgO5rVx7RJwqzCMQvvfrLjQU4=
121.254.178.230
http://www.hellokong.xyz/oui5/?7Dihs8p=SBbMJInblZiNUqJtj2t3oAZeaf7w1Mr63FaPzYR5npk3jTg+edZF9NME4tF9tViJCHx7c4tSq6N/qcOwzg98IChDG2ekcZOWcYJRK2znKimA3GQ/fbvAwxxdlKlVh8HBUwdv3Sg=&Bp=2LpD8tLh
203.161.49.220
http://i3.cdn-image.com/__media__/pics/28903/search.png)
unknown
https://cdn.consentmanager.net
unknown
http://www.epicbazaarhub.com/2769/
192.185.208.8
http://www.architect-usschool.com/s24g/?Bp=2LpD8tLh&7Dihs8p=4rIlPCx72NWCI0QJXJwD+tzjHhGgLlyDkrck6XhMS8VcXSbKvpDPBj6V0V8nuLzRy/FwKWDUEv1cw0ImnsIqFnkVImpc8YyZ7gWSicgk/ENTSAvixeUyT+Tq9osdZT4ae7dFHSM=
217.160.0.84
http://www.hondamechanic.today/pv57/
64.190.62.22
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://architect-usschool.com/s24g/?Bp=2LpD8tLh&7Dihs8p=4rIlPCx72NWCI0QJXJwD
unknown
http://www.tedjp-x.com/rxdf/?7Dihs8p=n5pckC1kDFTF1S5BKIsmiJ5ryDhRlCYaQVQlc2liktwXiyajKP48Wkncu6FoMqtxFtMv+2TSpEcAsDV+dI8BV0td651LvJeUOcJvnAipjtqBUQAoEW2kSo5oIr+iYWP+5LowsUg=&Bp=2LpD8tLh
162.43.101.114
http://www.ad14.fun/oc7s/?Bp=2LpD8tLh&7Dihs8p=ITz00edB1Uq7JDbRPTK5B57t89T2WQZ+hnFFsCQVLpiDf2LeJizgG+jH2jz5I+TBlRR/yAoHWWMQTB4d0WCMdZHpvgPMtRMFWqdBjyYGuisLgsnAd4XsPoSnl82L2CWvs48fsL0=
188.114.96.3
http://www.tedjp-x.com/rxdf/
162.43.101.114
http://www.rz6grmvv.shop/wvam/
121.254.178.230
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
https://www.namecheap.com/domains/registration/results/?domain=easybackpage.net
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
http://www.mengistiebethlehem.com/Moravia.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe1UYWx%2FFitbFc
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
http://www.fondazionegtech.org/jmiz/?Bp=2LpD8tLh&7Dihs8p=FlIs+r8zH5IdzVyrxFdSYjESHC6F8ED2JjV8fIhoTiEGriidwWKKTvYGFckMGyNztz9f5I1p/5DHHhHlE1nDIZgKO5qXvVh1+gwmyYcA+2CCaGrmZckpjuvJQ96WUy8TtzIG0Do=
89.31.76.10
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
http://www.3cubesinterior.in/n8zi/
45.113.122.18
http://www.mengistiebethlehem.com/display.cfm
unknown
http://3cubesinterior.in/n8zi/?Bp=2LpD8tLh&7Dihs8p=TDN237cw9XQsPbq3g6hYHsVRIrTNU69YOKlE8puzfHXbytTXe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.mengistiebethlehem.com/Christmas_City_Studio.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe
unknown
http://yg08.gowi0i.xyz
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
https://delivery.consentmanager.net
unknown
https://support.hostgator.com/
unknown
http://www.superunicornpalace.com/mwa4/
144.208.124.10
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://epicbazaarhub.com/2769/?7Dihs8p=rQ9MRvShllEvhf19NmQGPjdBfvwxqGfh/iQ/JyzvIKd3JVnhiEf6Ad8S1fm4Y
unknown
http://www.easybackpage.net/3jr0/?7Dihs8p=C6nbN3Z6SrmD48dKFL5Pdr+cZFmYp1QsQ3e628IyGZcRZCB2vhKb6ox4g6I37OYbmAVSFMbRXnVDWcusSAPk0vfQfIagm0ASlZK02lSA38wn9PDfH1oUKWJrxTMbBcOAU+1qziI=&Bp=2LpD8tLh
91.195.240.19
http://i3.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.3cubesinterior.in/n8zi/?Bp=2LpD8tLh&7Dihs8p=TDN237cw9XQsPbq3g6hYHsVRIrTNU69YOKlE8puzfHXbytTXePjBpDkk8R6CbNZjNtV+M1xTH1M7WEFVhsxtrVg+jjfEC0sBsxKcDNAG8QmzJp6ywkUHIkWAXYoQO53dC+2pPrw=
45.113.122.18
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://i3.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
https://www.ecosia.org/newtab/
unknown
http://www.mengistiebethlehem.com/92z0/
208.91.197.13
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://www.mengistiebethlehem.com/Lehigh_Valley.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe1UYWx%2F
unknown
http://www.hondamechanic.today
unknown
https://www.fondazionegtech.org/jmiz/?7Dihs8p=FlIs%20r8zH5IdzVyrxFdSYjESHC6F8ED2JjV8fIhoTiEGriidwWKK
unknown
http://www.artvectorcraft.store/s0j2/?7Dihs8p=BcB93STIeRzesDqYzmgjF/8Aqg2qoGbugvfC7gVQd0Epq+RTfyEF6eLz+ZShIqPWgjFYuR+pkePM3whd8giEyH2988JCuLY+vIFLWxAqbBoWpgzIu1DPnhlaAUBnkOtEvd711RA=&Bp=2LpD8tLh
172.217.18.19
https://img.sedoparking.com/templates/images/hero_nc.svg
unknown
http://i3.cdn-image.com/__media__/js/min.js?v2.3
unknown
http://www.mengistiebethlehem.com/92z0/?7Dihs8p=Gchg326o6RWN/XFADw/V4eD2MO3apSP8yQOPkbolGTbWXGJL1kFLipwvr6KFDeoH1MC+XiIJPCdl50bZjywkZNBk97uFxrq9QGi9z8UXs1GhAfMLlFrOVkcHu0q9EP6WPl8Zh5k=&Bp=2LpD8tLh
208.91.197.13
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.easybackpage.net/3jr0/
91.195.240.19
http://www.artvectorcraft.store/s0j2/
172.217.18.19
http://www.ad14.fun/oc7s/
188.114.96.3
There are 58 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hellokong.xyz
203.161.49.220
malicious
www.3cubesinterior.in
unknown
malicious
www.fondazionegtech.org
unknown
malicious
www.macklaer.com
unknown
malicious
www.easybackpage.net
unknown
malicious
www.epicbazaarhub.com
unknown
malicious
www.superunicornpalace.com
unknown
malicious
www.artvectorcraft.store
unknown
malicious
www.rz6grmvv.shop
121.254.178.230
ghs.google.com
172.217.18.19
superunicornpalace.com
144.208.124.10
www.architect-usschool.com
217.160.0.84
parkingpage.namecheap.com
91.195.240.19
www.hondamechanic.today
64.190.62.22
www.mengistiebethlehem.com
208.91.197.13
www.ad14.fun
188.114.96.3
epicbazaarhub.com
192.185.208.8
sitestudio.it
89.31.76.10
www.tedjp-x.com
162.43.101.114
3cubesinterior.in
45.113.122.18
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
203.161.49.220
www.hellokong.xyz
Malaysia
malicious
172.217.18.19
ghs.google.com
United States
144.208.124.10
superunicornpalace.com
United States
64.190.62.22
www.hondamechanic.today
United States
208.91.197.13
www.mengistiebethlehem.com
Virgin Islands (BRITISH)
91.195.240.19
parkingpage.namecheap.com
Germany
162.43.101.114
www.tedjp-x.com
United States
217.160.0.84
www.architect-usschool.com
Germany
89.31.76.10
sitestudio.it
Italy
188.114.96.3
www.ad14.fun
European Union
45.113.122.18
3cubesinterior.in
India
192.185.208.8
epicbazaarhub.com
United States
121.254.178.230
www.rz6grmvv.shop
Korea Republic of
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
35B0000
trusted library allocation
page read and write
malicious
2DC0000
system
page execute and read and write
malicious
4890000
unkown
page execute and read and write
malicious
38C0000
unclassified section
page execute and read and write
malicious
50C0000
system
page execute and read and write
malicious
3570000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1700000
unclassified section
page execute and read and write
malicious
A3E000
stack
page read and write
26E0000
unkown
page read and write
AC0000
heap
page read and write
3116000
heap
page read and write
190E000
direct allocation
page execute and read and write
3188000
heap
page read and write
6A5E000
stack
page read and write
3371000
heap
page read and write
82C9000
heap
page read and write
1110000
heap
page read and write
3163000
heap
page read and write
2ACC000
unkown
page read and write
3020000
heap
page read and write
A70000
unkown
page read and write
5BD4000
heap
page read and write
AD0000
heap
page read and write
115E000
stack
page read and write
B40000
trusted library allocation
page read and write
AF7000
unkown
page readonly
B1E000
stack
page read and write
2840000
trusted library allocation
page read and write
F70000
unkown
page readonly
3371000
heap
page read and write
AEE000
unkown
page readonly
3371000
heap
page read and write
B56000
trusted library allocation
page execute and read and write
AEE000
unkown
page readonly
3371000
heap
page read and write
1180000
heap
page read and write
3371000
heap
page read and write
4DF6000
trusted library allocation
page read and write
3B72000
unkown
page read and write
27A0000
heap
page read and write
3371000
heap
page read and write
6E03000
heap
page read and write
3371000
heap
page read and write
168287CE000
trusted library allocation
page read and write
168269D5000
system
page execute and read and write
52FC000
unkown
page read and write
B6B000
trusted library allocation
page execute and read and write
310B000
heap
page read and write
3371000
heap
page read and write
10FA000
stack
page read and write
AE1000
unkown
page execute read
B20000
trusted library allocation
page read and write
3371000
heap
page read and write
2A72000
unkown
page read and write
2710000
unkown
page readonly
4E14000
unclassified section
page read and write
AEE000
unkown
page readonly
8283000
heap
page read and write
16828390000
trusted library allocation
page read and write
720000
unkown
page readonly
4D44000
trusted library allocation
page read and write
319A000
heap
page read and write
A20000
unkown
page readonly
82D3000
heap
page read and write
3371000
heap
page read and write
16826A70000
heap
page read and write
2720000
trusted library allocation
page read and write
3371000
heap
page read and write
109D0000
heap
page read and write
3116000
heap
page read and write
5159000
system
page execute and read and write
3371000
heap
page read and write
8600000
heap
page read and write
3371000
heap
page read and write
31DD000
heap
page read and write
3188000
heap
page read and write
3371000
heap
page read and write
599F000
stack
page read and write
29B2000
unkown
page read and write
3371000
heap
page read and write
AC0000
heap
page read and write
50AE000
stack
page read and write
1AC0000
unclassified section
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
16828370000
heap
page read and write
3371000
heap
page read and write
89CE000
stack
page read and write
3371000
heap
page read and write
750000
unkown
page readonly
AD5000
heap
page read and write
26FA4000
system
page read and write
3A20000
trusted library allocation
page execute and read and write
AB0000
unkown
page read and write
2994000
heap
page read and write
67B3FFC000
stack
page read and write
3371000
heap
page read and write
8312000
heap
page read and write
3024000
heap
page read and write
5141000
system
page execute and read and write
A3E000
stack
page read and write
C7B000
heap
page read and write
4E00000
trusted library allocation
page execute and read and write
C3E000
heap
page read and write
449F000
trusted library allocation
page read and write
82CF000
heap
page read and write
3371000
heap
page read and write
1238000
heap
page read and write
3371000
heap
page read and write
16FF000
stack
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
463A000
unclassified section
page read and write
3371000
heap
page read and write
16828621000
trusted library allocation
page read and write
2C8C000
unkown
page read and write
3371000
heap
page read and write
352A000
unkown
page read and write
3D9C000
unclassified section
page read and write
3371000
heap
page read and write
AE1000
unkown
page execute read
3175000
heap
page read and write
8291000
heap
page read and write
6410000
unkown
page execute and read and write
3371000
heap
page read and write
B62000
trusted library allocation
page read and write
308E000
stack
page read and write
3152000
heap
page read and write
3869000
trusted library allocation
page read and write
AD0000
unkown
page read and write
3371000
heap
page read and write
D1E000
stack
page read and write
51F0000
heap
page read and write
3470000
trusted library allocation
page read and write
3371000
heap
page read and write
5165000
system
page execute and read and write
5167000
system
page execute and read and write
67B57FF000
stack
page read and write
16826A80000
heap
page read and write
310D000
heap
page read and write
3371000
heap
page read and write
4C82000
unclassified section
page read and write
A61000
unkown
page readonly
2A90000
unkown
page execute and read and write
486E000
trusted library allocation
page read and write
2A27000
trusted library allocation
page read and write
31D3000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
67A0000
trusted library allocation
page read and write
513E000
system
page execute and read and write
D78000
heap
page read and write
3371000
heap
page read and write
EFF000
stack
page read and write
3371000
heap
page read and write
5440000
unclassified section
page execute and read and write
1A36000
direct allocation
page execute and read and write
28A0000
heap
page read and write
30D0000
heap
page read and write
16826ABC000
heap
page read and write
6DE2000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
C3E000
heap
page read and write
AE1000
unkown
page execute read
4F6E000
stack
page read and write
3370000
heap
page read and write
1A21000
direct allocation
page execute and read and write
2703000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
16828614000
trusted library allocation
page read and write
3371000
heap
page read and write
2730000
heap
page read and write
3528000
heap
page read and write
3371000
heap
page read and write
3398000
unkown
page read and write
2994000
heap
page read and write
50C0000
heap
page read and write
3377000
heap
page read and write
384E000
unkown
page read and write
830F000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
A50000
heap
page read and write
3371000
heap
page read and write
28A0000
heap
page read and write
4316000
unclassified section
page read and write
82A5000
heap
page read and write
3371000
heap
page read and write
4F70000
heap
page execute and read and write
3371000
heap
page read and write
3475000
heap
page read and write
4040000
unclassified section
page execute and read and write
3371000
heap
page read and write
AE0000
unkown
page readonly
423E000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
3371000
heap
page read and write
6A9E000
stack
page read and write
5B9E000
stack
page read and write
3371000
heap
page read and write
3172000
heap
page read and write
6DB0000
heap
page read and write
2A31000
trusted library allocation
page read and write
3116000
heap
page read and write
26BBC000
system
page read and write
A50000
heap
page read and write
31A4000
heap
page read and write
108CB000
stack
page read and write
3371000
heap
page read and write
31D7000
heap
page read and write
3371000
heap
page read and write
82A0000
heap
page read and write
3371000
heap
page read and write
B34000
trusted library allocation
page read and write
AF7000
unkown
page readonly
1098000
heap
page read and write
3371000
heap
page read and write
F00000
unkown
page readonly
3040000
heap
page read and write
168287C4000
trusted library allocation
page read and write
A61000
unkown
page readonly
6F10000
trusted library section
page read and write
2845000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
702E000
stack
page read and write
3490000
unkown
page execute and read and write
B50000
trusted library allocation
page read and write
268E2000
system
page read and write
3371000
heap
page read and write
4028000
unkown
page read and write
16828701000
trusted library allocation
page read and write
C0C000
stack
page read and write
67B47FE000
stack
page read and write
470000
unkown
page readonly
4D80000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
5BB0000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
311F000
heap
page read and write
36BC000
unkown
page read and write
3371000
heap
page read and write
D70000
heap
page read and write
4890000
trusted library allocation
page read and write
D0CE000
stack
page read and write
3100000
heap
page read and write
82FF000
heap
page read and write
4D5E000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
A50000
heap
page read and write
6EB0000
trusted library section
page read and write
4899000
trusted library allocation
page read and write
A40000
unkown
page read and write
CEEE000
stack
page read and write
51F5000
heap
page read and write
3371000
heap
page read and write
30CF000
stack
page read and write
C3A000
heap
page read and write
A61000
unkown
page readonly
B5A000
trusted library allocation
page execute and read and write
37FD000
direct allocation
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
1291000
unkown
page readonly
BAE000
heap
page read and write
523E000
stack
page read and write
A10000
unkown
page readonly
3371000
heap
page read and write
7D0000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
F00000
unkown
page readonly
3371000
heap
page read and write
6F20000
trusted library section
page read and write
3371000
heap
page read and write
26E0000
unkown
page read and write
3024000
heap
page read and write
700000
unkown
page readonly
1070000
heap
page read and write
3B82000
unclassified section
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3175000
heap
page read and write
1A3D000
direct allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
2D4B000
stack
page read and write
11CE000
stack
page read and write
51BC000
system
page execute and read and write
3111000
heap
page read and write
3371000
heap
page read and write
8291000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
2850000
heap
page execute and read and write
40B7000
trusted library allocation
page read and write
3371000
heap
page read and write
2710000
unkown
page readonly
720000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
311C000
heap
page read and write
7C0000
unkown
page readonly
C10000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
99EF000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
AF5000
unkown
page read and write
2B6A000
trusted library allocation
page read and write
4D6D000
trusted library allocation
page read and write
30E0000
heap
page read and write
B3D000
trusted library allocation
page execute and read and write
4DA0000
trusted library allocation
page read and write
C0C000
stack
page read and write
3371000
heap
page read and write
16826950000
system
page execute and read and write
A56000
heap
page read and write
3371000
heap
page read and write
BC0000
heap
page read and write
8309000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
4A40000
unclassified section
page execute and read and write
1899000
direct allocation
page execute and read and write
7DA000
stack
page read and write
7F0000
heap
page read and write
F70000
unkown
page readonly
5138000
unclassified section
page read and write
C10000
heap
page read and write
3A12000
direct allocation
page execute and read and write
3371000
heap
page read and write
52CA000
unclassified section
page read and write
31F1000
heap
page read and write
5A10000
unkown
page execute and read and write
44A8000
unclassified section
page read and write
B80000
trusted library allocation
page read and write
AF5000
unkown
page read and write
3651000
heap
page read and write
16828611000
trusted library allocation
page read and write
4D72000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
2710000
trusted library allocation
page read and write
3371000
heap
page read and write
3E90000
unkown
page execute and read and write
D70000
heap
page read and write
4DF2000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
313B000
heap
page read and write
3371000
heap
page read and write
3690000
trusted library allocation
page read and write
3371000
heap
page read and write
1770000
direct allocation
page execute and read and write
3371000
heap
page read and write
C0C000
stack
page read and write
3371000
heap
page read and write
6F0E000
stack
page read and write
5149000
system
page execute and read and write
7F070000
trusted library allocation
page execute and read and write
AE1000
unkown
page execute read
3655000
heap
page read and write
BA0000
heap
page read and write
10BCC000
stack
page read and write
10CCE000
stack
page read and write
317B000
heap
page read and write
3116000
heap
page read and write
78A000
stack
page read and write
4860000
trusted library allocation
page read and write
A70000
unkown
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
D8F000
heap
page read and write
472000
unkown
page readonly
E9F000
stack
page read and write
3371000
heap
page read and write
1682860B000
trusted library allocation
page read and write
41BA000
unkown
page read and write
F6F000
stack
page read and write
82A8000
heap
page read and write
1090000
heap
page read and write
78A000
stack
page read and write
3111000
heap
page read and write
3371000
heap
page read and write
2C8C000
unkown
page read and write
CFCE000
stack
page read and write
36D0000
direct allocation
page execute and read and write
829B000
heap
page read and write
31AB000
heap
page read and write
67B4FFE000
stack
page read and write
3371000
heap
page read and write
82A2000
heap
page read and write
28AF000
stack
page read and write
AF5000
unkown
page read and write
AF7000
unkown
page readonly
269A2000
system
page read and write
4D40000
trusted library allocation
page read and write
50D0000
heap
page read and write
F6F000
stack
page read and write
3371000
heap
page read and write
3116000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
49FC000
stack
page read and write
1258000
heap
page read and write
824000
unkown
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3074000
unkown
page read and write
1AB8000
direct allocation
page execute and read and write
7D0000
unkown
page readonly
A70000
heap
page read and write
7E0000
unkown
page readonly
2D88000
stack
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
A90000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
712E000
stack
page read and write
51E0000
heap
page read and write
3371000
heap
page read and write
26F0000
trusted library allocation
page read and write
3371000
heap
page read and write
35F0000
trusted library allocation
page read and write
3371000
heap
page read and write
D20000
unkown
page read and write
770000
unkown
page readonly
15FF000
stack
page read and write
A10000
unkown
page readonly
3371000
heap
page read and write
A70000
heap
page read and write
29A0000
unkown
page readonly
3371000
heap
page read and write
16828600000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
3371000
heap
page read and write
750000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
16828390000
trusted library allocation
page read and write
DAC000
stack
page read and write
4880000
trusted library allocation
page execute and read and write
3371000
heap
page read and write
4105000
trusted library allocation
page read and write
3371000
heap
page read and write
A40000
heap
page read and write
3371000
heap
page read and write
4DF0000
trusted library allocation
page read and write
189D000
direct allocation
page execute and read and write
36C6000
heap
page read and write
4DE0000
heap
page read and write
26DE000
stack
page read and write
39E0000
unkown
page read and write
3E96000
unkown
page read and write
5A9E000
stack
page read and write
1160000
heap
page read and write
16828390000
trusted library allocation
page read and write
4F1B000
stack
page read and write
3371000
heap
page read and write
C30000
heap
page read and write
7F0000
heap
page read and write
317B000
heap
page read and write
B90000
trusted library allocation
page execute and read and write
8303000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3112000
heap
page read and write
4FA2000
unkown
page execute and read and write
29B2000
unkown
page read and write
16826AD1000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
8290000
heap
page read and write
AC4000
heap
page read and write
3371000
heap
page read and write
1682860F000
trusted library allocation
page read and write
31A1000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
11D0000
direct allocation
page read and write
29A0000
unkown
page readonly
399D000
direct allocation
page execute and read and write
B67000
trusted library allocation
page execute and read and write
4F20000
trusted library allocation
page execute and read and write
3371000
heap
page read and write
16826ACE000
heap
page read and write
310B000
heap
page read and write
31B7000
heap
page read and write
3024000
heap
page read and write
16826AA0000
heap
page read and write
960000
heap
page read and write
310D000
heap
page read and write
3371000
heap
page read and write
39A1000
direct allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
6DC3000
heap
page read and write
3371000
heap
page read and write
16828617000
trusted library allocation
page read and write
3371000
heap
page read and write
A40000
heap
page read and write
4AF0000
unclassified section
page read and write
BD6000
heap
page read and write
29AF000
stack
page read and write
7C0000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
1290000
unkown
page readonly
3371000
heap
page read and write
16828603000
trusted library allocation
page read and write
5FA000
stack
page read and write
3371000
heap
page read and write
3168000
heap
page read and write
AC0000
unkown
page read and write
770000
unkown
page readonly
3371000
heap
page read and write
27A0000
heap
page read and write
3371000
heap
page read and write
4153000
trusted library allocation
page read and write
830C000
heap
page read and write
82FC000
heap
page read and write
168287A5000
trusted library allocation
page read and write
4184000
unclassified section
page read and write
82ED000
heap
page read and write
3107000
heap
page read and write
1301000
unkown
page readonly
3371000
heap
page read and write
722F000
stack
page read and write
3371000
heap
page read and write
8280000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
A9E000
stack
page read and write
D78000
heap
page read and write
560000
unkown
page readonly
A20000
unkown
page readonly
16826ACA000
heap
page read and write
3371000
heap
page read and write
AB0000
unkown
page read and write
3371000
heap
page read and write
C3A000
heap
page read and write
106E000
stack
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
AE0000
unkown
page readonly
3193000
heap
page read and write
710000
unkown
page readonly
B4D000
trusted library allocation
page execute and read and write
AF7000
unkown
page readonly
A40000
heap
page read and write
BE2000
heap
page read and write
3371000
heap
page read and write
318F000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
2990000
heap
page read and write
A40000
unkown
page read and write
AE0000
unkown
page readonly
283E000
stack
page read and write
C10000
unkown
page readonly
AC4000
heap
page read and write
349A000
heap
page read and write
3FD2000
unclassified section
page execute and read and write
3320000
heap
page read and write
24C0000
unclassified section
page execute and read and write
700000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
C6B000
heap
page read and write
73A2000
trusted library allocation
page read and write
B43000
trusted library allocation
page read and write
283C000
unkown
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
A30000
unkown
page readonly
B30000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
37F9000
direct allocation
page execute and read and write
AC0000
unkown
page read and write
6CA0000
heap
page read and write
3AC2000
unclassified section
page read and write
A30000
unkown
page readonly
8F7000
stack
page read and write
168287BE000
trusted library allocation
page read and write
3371000
heap
page read and write
3172000
heap
page read and write
3117000
heap
page read and write
16826AA7000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
52D0000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
4FA6000
unclassified section
page read and write
8A0F000
stack
page read and write
3371000
heap
page read and write
495E000
unclassified section
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
82AA000
heap
page read and write
3371000
heap
page read and write
31CC000
heap
page read and write
48DE000
stack
page read and write
1760000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
6DA0000
trusted library allocation
page execute and read and write
2A33000
trusted library allocation
page read and write
3371000
heap
page read and write
8296000
heap
page read and write
16828500000
trusted library allocation
page read and write
3206000
unkown
page read and write
C6D000
heap
page read and write
82D9000
heap
page read and write
2EC0000
unclassified section
page execute and read and write
3BDC000
unclassified section
page read and write
A50000
unkown
page read and write
3371000
heap
page read and write
3690000
trusted library allocation
page read and write
3371000
heap
page read and write
BE4000
heap
page read and write
760000
unkown
page readonly
47CC000
unclassified section
page read and write
7E0000
unkown
page readonly
311C000
heap
page read and write
7DA000
stack
page read and write
1230000
heap
page read and write
5BA0000
heap
page read and write
3371000
heap
page read and write
B33000
trusted library allocation
page execute and read and write
AEE000
unkown
page readonly
3371000
heap
page read and write
710000
unkown
page readonly
3371000
heap
page read and write
6DC9000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
B52000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
2990000
heap
page read and write
51DE000
stack
page read and write
A61000
unkown
page readonly
1300000
unkown
page readonly
3157000
heap
page read and write
3371000
heap
page read and write
386E000
direct allocation
page execute and read and write
2700000
heap
page read and write
3371000
heap
page read and write
AE0000
unkown
page readonly
1400000
heap
page read and write
269FC000
system
page read and write
ABE000
stack
page read and write
50B0000
trusted library section
page readonly
3D04000
unkown
page read and write
4D61000
trusted library allocation
page read and write
5010000
unkown
page execute and read and write
3371000
heap
page read and write
16826AAE000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
6E07000
heap
page read and write
C0C000
stack
page read and write
AF5000
unkown
page read and write
26EC000
stack
page read and write
D100000
trusted library section
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
82B4000
heap
page read and write
4870000
trusted library allocation
page read and write
D9F000
stack
page read and write
168284E0000
heap
page read and write
C30000
heap
page read and write
A90000
unkown
page readonly
82F6000
heap
page read and write
A50000
unkown
page read and write
4D66000
trusted library allocation
page read and write
168269D2000
system
page execute and read and write
3690000
trusted library allocation
page read and write
3371000
heap
page read and write
760000
unkown
page readonly
6FAE000
stack
page read and write
There are 698 hidden memdumps, click here to show them.