IOC Report
Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe

loading gif

Files

File Path
Type
Category
Malicious
Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\N77o9w1836
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4vu4nlwr.vnu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ibragxpy.lej.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxqwflws.i4u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vkv0134n.icc.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe
"C:\Users\user\Desktop\Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe"
malicious
C:\Users\user\Desktop\Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe
"C:\Users\user\Desktop\Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exe"
malicious
C:\Program Files (x86)\odwsgngViRYKyJqZXdTIjyeOqeeFpWdVedwgxEUjBOUgmNVeyCCwHnPIhqdBxblppHmpjV\EUSOiCcoIEEJJ.exe
"C:\Program Files (x86)\odwsgngViRYKyJqZXdTIjyeOqeeFpWdVedwgxEUjBOUgmNVeyCCwHnPIhqdBxblppHmpjV\EUSOiCcoIEEJJ.exe"
malicious
C:\Windows\SysWOW64\compact.exe
"C:\Windows\SysWOW64\compact.exe"
malicious
C:\Program Files (x86)\odwsgngViRYKyJqZXdTIjyeOqeeFpWdVedwgxEUjBOUgmNVeyCCwHnPIhqdBxblppHmpjV\EUSOiCcoIEEJJ.exe
"C:\Program Files (x86)\odwsgngViRYKyJqZXdTIjyeOqeeFpWdVedwgxEUjBOUgmNVeyCCwHnPIhqdBxblppHmpjV\EUSOiCcoIEEJJ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.architect-usschool.com/s24g/
217.160.0.84
malicious
http://architect-usschool.com/s24g/?Y6vp=3PLd8j&OdjTHtuX=4rIlPCx72NWCI0QJXJwD
unknown
malicious
http://www.architect-usschool.com/s24g/?Y6vp=3PLd8j&OdjTHtuX=4rIlPCx72NWCI0QJXJwD+tzjHhGgLlyDkrck6XhMS8VcXSbKvpDPBj6V0V8nuLzRy/FwKWDUEv1cw0ImnsIqFnkVImpc8YyZ7gWSicgk/ENTSAvixeUyT+Tq9osdZT4ae7dFHSM=
217.160.0.84
malicious
http://www.hellokong.xyz/oui5/
203.161.49.220
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.artvectorcraft.store/s0j2/?OdjTHtuX=BcB93STIeRzesDqYzmgjF/8Aqg2qoGbugvfC7gVQd0Epq+RTfyEF6eLz+ZShIqPWgjFYuR+pkePM3whd8giEyH2988JCuLY+vIFLWxAqbBoWpgzIu1DPnhlaAUBnkOtEvd711RA=&Y6vp=3PLd8j
142.250.74.211
http://searchdiscovered.com/__media__/images/logo.gif)
unknown
https://cdn.consentmanager.net
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://www.epicbazaarhub.com/2769/
192.185.208.8
http://www.hondamechanic.today/pv57/
64.190.62.22
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://i2.cdn-image.com/__media__/pics/28903/search.png)
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
http://www.tedjp-x.com/rxdf/?OdjTHtuX=n5pckC1kDFTF1S5BKIsmiJ5ryDhRlCYaQVQlc2liktwXiyajKP48Wkncu6FoMqtxFtMv+2TSpEcAsDV+dI8BV0td651LvJeUOcJvnAipjtqBUQAoEW2kSo5oIr+iYWP+5LowsUg=&Y6vp=3PLd8j
162.43.101.114
http://www.tedjp-x.com/rxdf/
162.43.101.114
http://www.rz6grmvv.shop/wvam/
121.254.178.230
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
http://epicbazaarhub.com/2769/?OdjTHtuX=rQ9MRvShllEvhf19NmQGPjdBfvwxqGfh/iQ/JyzvIKd3JVnhiEf6Ad8S1fm4
unknown
https://www.namecheap.com/domains/registration/results/?domain=easybackpage.net
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
http://www.mengistiebethlehem.com/Moravia.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe1UYWx%2FFitbFc
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.fondazionegtech.org/jmiz/?Y6vp=3PLd8j&OdjTHtuX=FlIs+r8zH5IdzVyrxFdSYjESHC6F8ED2JjV8fIhoTiEGriidwWKKTvYGFckMGyNztz9f5I1p/5DHHhHlE1nDIZgKO5qXvVh1+gwmyYcA+2CCaGrmZckpjuvJQ96WUy8TtzIG0Do=
89.31.76.10
http://www.3cubesinterior.in/n8zi/
45.113.122.18
http://www.mengistiebethlehem.com/display.cfm
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
https://hao7.vip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.mengistiebethlehem.com/Christmas_City_Studio.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe
unknown
http://www.mengistiebethlehem.com/92z0/?OdjTHtuX=Gchg326o6RWN/XFADw/V4eD2MO3apSP8yQOPkbolGTbWXGJL1kFLipwvr6KFDeoH1MC+XiIJPCdl50bZjywkZNBk97uFxrq9QGi9z8UXs1GhAfMLlFrOVkcHu0q9EP6WPl8Zh5k=&Y6vp=3PLd8j
208.91.197.13
https://delivery.consentmanager.net
unknown
https://support.hostgator.com/
unknown
http://www.superunicornpalace.com/mwa4/
144.208.124.10
http://www.rz6grmvv.shop/wvam/?Y6vp=3PLd8j&OdjTHtuX=ppN4Kg7gaCRo+jf4iLEmna60kcJd+oo7/wZIRMT4+Man5OlGV28GmQNPMVld/mi8klF/kBnYjgc4RUC2chY7WuIAYm4xk+Ll6sKGI2rWgbxJmoqgO5rVx7RJwqzCMQvvfrLjQU4=
121.254.178.230
http://www.easybackpage.net/3jr0/?OdjTHtuX=C6nbN3Z6SrmD48dKFL5Pdr+cZFmYp1QsQ3e628IyGZcRZCB2vhKb6ox4g6I37OYbmAVSFMbRXnVDWcusSAPk0vfQfIagm0ASlZK02lSA38wn9PDfH1oUKWJrxTMbBcOAU+1qziI=&Y6vp=3PLd8j
91.195.240.19
http://www.hellokong.xyz/oui5/?OdjTHtuX=SBbMJInblZiNUqJtj2t3oAZeaf7w1Mr63FaPzYR5npk3jTg+edZF9NME4tF9tViJCHx7c4tSq6N/qcOwzg98IChDG2ekcZOWcYJRK2znKimA3GQ/fbvAwxxdlKlVh8HBUwdv3Sg=&Y6vp=3PLd8j
203.161.49.220
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
http://i2.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
https://www.fondazionegtech.org/jmiz/?OdjTHtuX=FlIs%20r8zH5IdzVyrxFdSYjESHC6F8ED2JjV8fIhoTiEGriidwWK
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.3cubesinterior.in/n8zi/?Y6vp=3PLd8j&OdjTHtuX=TDN237cw9XQsPbq3g6hYHsVRIrTNU69YOKlE8puzfHXbytTXePjBpDkk8R6CbNZjNtV+M1xTH1M7WEFVhsxtrVg+jjfEC0sBsxKcDNAG8QmzJp6ywkUHIkWAXYoQO53dC+2pPrw=
45.113.122.18
https://www.ecosia.org/newtab/
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://www.mengistiebethlehem.com/92z0/
208.91.197.13
http://3cubesinterior.in/n8zi/?Y6vp=3PLd8j&OdjTHtuX=TDN237cw9XQsPbq3g6hYHsVRIrTNU69YOKlE8puzfHXbytTX
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://i2.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
http://www.mengistiebethlehem.com/Lehigh_Valley.cfm?fp=rb9JssZzcqrxgVbtqj8jg7AT9cR7GfkC5tZbe1UYWx%2F
unknown
http://www.hondamechanic.today
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
http://www.ad14.fun/oc7s/?Y6vp=3PLd8j&OdjTHtuX=ITz00edB1Uq7JDbRPTK5B57t89T2WQZ+hnFFsCQVLpiDf2LeJizgG+jH2jz5I+TBlRR/yAoHWWMQTB4d0WCMdZHpvgPMtRMFWqdBjyYGuisLgsnAd4XsPoSnl82L2CWvs48fsL0=
188.114.96.3
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
https://img.sedoparking.com/templates/images/hero_nc.svg
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://www.hondamechanic.today/pv57/?OdjTHtuX=6UcJOPuI3ds3m8dRFaGqe18kk0aRE6C9zfep+6iQQcPKXv8sEJKo1I2dFrwlAwFzKSJLgqMZnt8gW4RLGDqdj2op7I/d7Qwx4DLM/Sb7UzOzABLy3akf6gQBeurdxZRPhPoEffE=&Y6vp=3PLd8j
64.190.62.22
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
http://i2.cdn-image.com/__media__/js/min.js?v2.3
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.easybackpage.net/3jr0/
91.195.240.19
http://www.artvectorcraft.store/s0j2/
142.250.74.211
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
http://www.ad14.fun/oc7s/
188.114.96.3
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hellokong.xyz
203.161.49.220
malicious
www.3cubesinterior.in
unknown
malicious
www.fondazionegtech.org
unknown
malicious
www.macklaer.com
unknown
malicious
www.easybackpage.net
unknown
malicious
www.epicbazaarhub.com
unknown
malicious
www.superunicornpalace.com
unknown
malicious
www.artvectorcraft.store
unknown
malicious
www.rz6grmvv.shop
121.254.178.230
ghs.google.com
142.250.74.211
superunicornpalace.com
144.208.124.10
www.architect-usschool.com
217.160.0.84
parkingpage.namecheap.com
91.195.240.19
www.hondamechanic.today
64.190.62.22
www.mengistiebethlehem.com
208.91.197.13
www.ad14.fun
188.114.96.3
epicbazaarhub.com
192.185.208.8
sitestudio.it
89.31.76.10
www.tedjp-x.com
162.43.101.114
3cubesinterior.in
45.113.122.18
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
203.161.49.220
www.hellokong.xyz
Malaysia
malicious
142.250.74.211
ghs.google.com
United States
144.208.124.10
superunicornpalace.com
United States
64.190.62.22
www.hondamechanic.today
United States
208.91.197.13
www.mengistiebethlehem.com
Virgin Islands (BRITISH)
91.195.240.19
parkingpage.namecheap.com
Germany
162.43.101.114
www.tedjp-x.com
United States
217.160.0.84
www.architect-usschool.com
Germany
89.31.76.10
sitestudio.it
Italy
188.114.96.3
www.ad14.fun
European Union
45.113.122.18
3cubesinterior.in
India
192.185.208.8
epicbazaarhub.com
United States
121.254.178.230
www.rz6grmvv.shop
Korea Republic of
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2E10000
system
page execute and read and write
malicious
30A0000
trusted library allocation
page read and write
malicious
E00000
unclassified section
page execute and read and write
malicious
4DC0000
system
page execute and read and write
malicious
32E0000
trusted library allocation
page read and write
malicious
2B80000
unclassified section
page execute and read and write
malicious
3D30000
unkown
page execute and read and write
malicious
31E1000
heap
page read and write
31E1000
heap
page read and write
41DE000
unkown
page read and write
31E1000
heap
page read and write
869E000
stack
page read and write
492C000
stack
page read and write
31E1000
heap
page read and write
B8E000
heap
page read and write
31A7000
heap
page read and write
31E1000
heap
page read and write
CCB000
stack
page read and write
870000
unkown
page read and write
641000
unkown
page execute read
31E1000
heap
page read and write
31E1000
heap
page read and write
298C000
unkown
page read and write
31E1000
heap
page read and write
3098000
unkown
page read and write
3E0000
unkown
page readonly
33BC000
unkown
page read and write
6CD0000
trusted library allocation
page read and write
8D0000
heap
page read and write
3791000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
30F6000
heap
page read and write
7FB4000
heap
page read and write
3F0000
unkown
page readonly
31B8000
heap
page read and write
671E000
stack
page read and write
283F000
stack
page read and write
31E1000
heap
page read and write
D7B000
heap
page read and write
2776000
trusted library allocation
page read and write
4C74000
unclassified section
page read and write
790000
unkown
page readonly
2670000
heap
page read and write
25D1000
trusted library allocation
page read and write
657000
unkown
page readonly
4CC0000
trusted library section
page readonly
9C3000
trusted library allocation
page execute and read and write
1770000
heap
page read and write
4FB0000
trusted library allocation
page read and write
314D000
heap
page read and write
31E1000
heap
page read and write
3EBA000
unkown
page read and write
BA0000
unkown
page readonly
31E1000
heap
page read and write
24B0000
heap
page read and write
25D6000
trusted library allocation
page read and write
89E000
stack
page read and write
31E1000
heap
page read and write
4D53000
heap
page read and write
2630000
heap
page read and write
30FC000
heap
page read and write
782E000
heap
page read and write
3D0000
unkown
page readonly
74A000
stack
page read and write
23D0000
heap
page read and write
4D50000
heap
page read and write
3080000
trusted library allocation
page read and write
2953000
trusted library allocation
page read and write
AAF000
heap
page read and write
2E80000
heap
page read and write
3D28000
unkown
page read and write
16C8000
direct allocation
page execute and read and write
19DA6D21000
trusted library allocation
page read and write
3E0000
unkown
page readonly
527E000
stack
page read and write
4F2E000
stack
page read and write
6AA000
stack
page read and write
31E1000
heap
page read and write
4790000
trusted library allocation
page read and write
F0C2000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
3185000
heap
page read and write
31E1000
heap
page read and write
31D4000
heap
page read and write
31E1000
heap
page read and write
2610000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
31E1000
heap
page read and write
30F6000
heap
page read and write
641000
unkown
page execute read
31E1000
heap
page read and write
D91000
heap
page read and write
31E1000
heap
page read and write
8D8000
heap
page read and write
30FE000
heap
page read and write
31E1000
heap
page read and write
2F60000
heap
page read and write
25C0000
unkown
page readonly
2FBE000
stack
page read and write
3A04000
unkown
page read and write
2840000
unkown
page readonly
31E1000
heap
page read and write
95C000
stack
page read and write
6E0000
unkown
page readonly
241C000
unkown
page read and write
30E7000
heap
page read and write
E50000
heap
page read and write
31E1000
heap
page read and write
2730000
heap
page read and write
2730000
heap
page read and write
19DA50D5000
system
page execute and read and write
19DA523C000
heap
page read and write
31E1000
heap
page read and write
BF0000
unkown
page read and write
38E0000
trusted library allocation
page read and write
7F9C000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
640000
unkown
page readonly
2772000
unkown
page read and write
BA0000
unkown
page readonly
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
7F50000
heap
page read and write
7F77000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
2670000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
30ED000
heap
page read and write
31E1000
heap
page read and write
3150000
heap
page read and write
C8E000
stack
page read and write
19DA6D03000
trusted library allocation
page read and write
31E1000
heap
page read and write
4EA3000
system
page execute and read and write
6F8E000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
4C70000
trusted library allocation
page execute and read and write
D40000
unkown
page read and write
31E1000
heap
page read and write
2BD8000
stack
page read and write
9C0000
heap
page read and write
31E1000
heap
page read and write
2B9B000
stack
page read and write
14A9000
direct allocation
page execute and read and write
9E0000
trusted library allocation
page read and write
31E1000
heap
page read and write
675E000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
30F6000
heap
page read and write
31E1000
heap
page read and write
7FE000
stack
page read and write
850000
unkown
page read and write
31E1000
heap
page read and write
6CC0000
trusted library section
page read and write
6BC0000
heap
page read and write
31E1000
heap
page read and write
5175000
heap
page read and write
23D0000
heap
page read and write
AD3000
heap
page read and write
6C0000
unkown
page readonly
31B2000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
14AD000
direct allocation
page execute and read and write
D00000
heap
page read and write
31E1000
heap
page read and write
2180000
unclassified section
page execute and read and write
CE0000
trusted library allocation
page read and write
4F98000
unclassified section
page read and write
2840000
unkown
page readonly
19DA6D15000
trusted library allocation
page read and write
31E1000
heap
page read and write
4E4F000
system
page execute and read and write
6D0000
unkown
page readonly
7FA5000
heap
page read and write
7FBB000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
CF0000
trusted library allocation
page read and write
C30000
heap
page read and write
793E000
stack
page read and write
33E9000
heap
page read and write
7841000
heap
page read and write
77DF000
stack
page read and write
4AE2000
unclassified section
page read and write
31E1000
heap
page read and write
640000
unkown
page readonly
47C0000
trusted library allocation
page execute and read and write
19DA6C00000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
24B4000
heap
page read and write
19DA6BB0000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
900000
heap
page read and write
7FC1000
heap
page read and write
4FE0000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
64E000
unkown
page readonly
19DA50D2000
system
page execute and read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
4F6E000
stack
page read and write
3B96000
unkown
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
7FCA000
heap
page read and write
7F4B000
heap
page read and write
7B0000
heap
page read and write
7E0000
unkown
page readonly
31E1000
heap
page read and write
B9F000
stack
page read and write
252DC000
system
page read and write
31E1000
heap
page read and write
7F55000
heap
page read and write
31E1000
heap
page read and write
38E0000
trusted library allocation
page read and write
26B2000
unkown
page read and write
1B2E9FD000
stack
page read and write
BF0000
unkown
page read and write
640000
unkown
page readonly
2FFF000
stack
page read and write
A9B000
heap
page read and write
8250000
heap
page read and write
2F0C000
unclassified section
page execute and read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
30F6000
heap
page read and write
2770000
trusted library allocation
page read and write
4FEC000
unkown
page read and write
7F40000
heap
page read and write
84E000
stack
page read and write
BD0000
unkown
page read and write
31E1000
heap
page read and write
7F58000
heap
page read and write
31E1000
heap
page read and write
657000
unkown
page readonly
31E1000
heap
page read and write
31E1000
heap
page read and write
3320000
trusted library allocation
page read and write
30F7000
heap
page read and write
4176000
unclassified section
page read and write
84E000
stack
page read and write
30EB000
heap
page read and write
5300000
trusted library allocation
page execute and read and write
33E6000
heap
page read and write
E60000
unkown
page readonly
31E1000
heap
page read and write
2930000
unkown
page execute and read and write
31E1000
heap
page read and write
A70000
trusted library allocation
page execute and read and write
3F0000
unkown
page readonly
38E0000
trusted library allocation
page read and write
3156000
heap
page read and write
7B0000
heap
page read and write
298C000
unkown
page read and write
8040000
trusted library allocation
page read and write
AB6000
heap
page read and write
4D30000
heap
page read and write
19DA5243000
heap
page read and write
31E1000
heap
page read and write
47B0000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
7FC4000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
2760000
heap
page read and write
BE1000
unkown
page readonly
31E1000
heap
page read and write
870000
unkown
page read and write
25C0000
unkown
page readonly
CF5000
trusted library allocation
page read and write
E78000
heap
page read and write
810000
heap
page read and write
AFD000
stack
page read and write
780000
unkown
page readonly
31E1000
heap
page read and write
7F0000
heap
page read and write
31E1000
heap
page read and write
25E2000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
27CC000
unkown
page read and write
3192000
heap
page read and write
544E000
unclassified section
page read and write
31E1000
heap
page read and write
780000
unkown
page readonly
350F000
heap
page read and write
6C0000
unkown
page readonly
86DF000
stack
page read and write
2340000
unkown
page readonly
316E000
heap
page read and write
3163000
heap
page read and write
30F2000
heap
page read and write
5AD0000
heap
page read and write
5AF4000
heap
page read and write
31CC000
heap
page read and write
31E1000
heap
page read and write
19DA51C0000
heap
page read and write
31E1000
heap
page read and write
30ED000
heap
page read and write
76DE000
stack
page read and write
3FE4000
unclassified section
page read and write
30F6000
heap
page read and write
19DA6BB0000
trusted library allocation
page read and write
31E1000
heap
page read and write
8CE000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
273E000
stack
page read and write
D68000
heap
page read and write
354E000
unkown
page read and write
D68000
heap
page read and write
4CB0000
trusted library allocation
page execute and read and write
74A000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
19DA6ECE000
trusted library allocation
page read and write
314D000
heap
page read and write
D95000
unkown
page read and write
806000
heap
page read and write
D3E000
stack
page read and write
31E1000
heap
page read and write
5AC0000
heap
page read and write
11F0000
unkown
page readonly
449A000
unclassified section
page read and write
AFD000
stack
page read and write
3080000
heap
page read and write
8D0000
heap
page read and write
7FB8000
heap
page read and write
7FCF000
heap
page read and write
4E30000
system
page execute and read and write
31E1000
heap
page read and write
256C4000
system
page read and write
19DA5180000
heap
page read and write
39E2000
unclassified section
page read and write
151E000
direct allocation
page execute and read and write
7AD000
stack
page read and write
8B3E000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
2370000
unkown
page read and write
4D2B000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
312A000
heap
page read and write
657000
unkown
page readonly
30EB000
heap
page read and write
4E26000
system
page execute and read and write
861000
unkown
page readonly
7F470000
trusted library allocation
page execute and read and write
7C0000
unkown
page readonly
6E0000
unkown
page readonly
655000
unkown
page read and write
36E0000
unkown
page read and write
72C2000
trusted library allocation
page read and write
47BE000
unclassified section
page read and write
D96000
unkown
page read and write
31E1000
heap
page read and write
8D8000
heap
page read and write
7E0000
unkown
page readonly
31E1000
heap
page read and write
7D0000
unkown
page readonly
A9E000
heap
page read and write
641000
unkown
page execute read
31E1000
heap
page read and write
AC4000
heap
page read and write
CFA000
stack
page read and write
31E1000
heap
page read and write
7A0000
unkown
page readonly
2734000
heap
page read and write
31E1000
heap
page read and write
36B9000
direct allocation
page execute and read and write
31E1000
heap
page read and write
3513000
heap
page read and write
64E000
unkown
page readonly
31E1000
heap
page read and write
19DA5070000
system
page execute and read and write
7F64000
heap
page read and write
31E1000
heap
page read and write
3156000
heap
page read and write
9D3000
trusted library allocation
page read and write
7F86000
heap
page read and write
36BD000
direct allocation
page execute and read and write
AD5000
heap
page read and write
31E1000
heap
page read and write
19DA6D00000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
4CB000
unkown
page read and write
4D40000
trusted library allocation
page read and write
31E1000
heap
page read and write
25BF000
stack
page read and write
31E1000
heap
page read and write
9CD000
trusted library allocation
page execute and read and write
783E000
heap
page read and write
4E40000
system
page execute and read and write
19DA6EBE000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
7FAC000
heap
page read and write
BD0000
unkown
page read and write
800000
heap
page read and write
40BC000
unkown
page execute and read and write
31E1000
heap
page read and write
655000
unkown
page read and write
30E0000
heap
page read and write
790000
unkown
page readonly
1780000
unclassified section
page execute and read and write
31E1000
heap
page read and write
317C000
heap
page read and write
31E1000
heap
page read and write
19DA6D0E000
trusted library allocation
page read and write
31E1000
heap
page read and write
641000
unkown
page execute read
9B0000
trusted library allocation
page read and write
2780000
heap
page execute and read and write
25B0000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
655000
unkown
page read and write
F31000
unkown
page readonly
31E1000
heap
page read and write
7FB6000
heap
page read and write
24B0000
heap
page read and write
B4E000
heap
page read and write
24B4000
heap
page read and write
322A000
unkown
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
480D000
stack
page read and write
2360000
unkown
page read and write
31E1000
heap
page read and write
3189000
heap
page read and write
6D0000
unkown
page readonly
31E1000
heap
page read and write
416E000
trusted library allocation
page read and write
31E1000
heap
page read and write
3590000
direct allocation
page execute and read and write
31E1000
heap
page read and write
19DA6EB0000
trusted library allocation
page read and write
33D0000
heap
page read and write
31E1000
heap
page read and write
7F82000
heap
page read and write
31E1000
heap
page read and write
85E000
stack
page read and write
31E1000
heap
page read and write
1093D000
stack
page read and write
30F1000
heap
page read and write
9D0000
heap
page read and write
31E1000
heap
page read and write
26B2000
unkown
page read and write
313E000
heap
page read and write
3163000
heap
page read and write
7AD000
stack
page read and write
7D0000
unkown
page readonly
4CE0000
heap
page execute and read and write
6AA000
stack
page read and write
E0E000
stack
page read and write
D40000
unkown
page read and write
412A000
unkown
page execute and read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
1631000
direct allocation
page execute and read and write
19DA522D000
heap
page read and write
31E1000
heap
page read and write
D60000
heap
page read and write
655000
unkown
page read and write
64E000
unkown
page readonly
31E1000
heap
page read and write
2F74000
heap
page read and write
19DA5170000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
3584000
heap
page read and write
38D2000
direct allocation
page execute and read and write
2734000
heap
page read and write
3A3C000
unclassified section
page read and write
31E1000
heap
page read and write
317F000
heap
page read and write
3861000
direct allocation
page execute and read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
10A3E000
stack
page read and write
2F70000
heap
page read and write
9F80000
trusted library section
page read and write
9DD000
trusted library allocation
page execute and read and write
31E1000
heap
page read and write
DB0000
heap
page read and write
9C4000
trusted library allocation
page read and write
9E2000
trusted library allocation
page read and write
1B2F1FE000
stack
page read and write
9C0000
trusted library allocation
page read and write
31E1000
heap
page read and write
330F000
heap
page read and write
64E000
unkown
page readonly
4CD0000
heap
page read and write
31E1000
heap
page read and write
BE1000
unkown
page readonly
164D000
direct allocation
page execute and read and write
31E1000
heap
page read and write
A80000
trusted library allocation
page read and write
462C000
unclassified section
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
19DA6D18000
trusted library allocation
page read and write
31E1000
heap
page read and write
250C2000
system
page read and write
E58000
heap
page read and write
50EE000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E0000
heap
page read and write
312000
unkown
page readonly
2340000
unkown
page readonly
D60000
heap
page read and write
7FBF000
heap
page read and write
19DA6E00000
trusted library allocation
page read and write
2F74000
heap
page read and write
19DA6E01000
trusted library allocation
page read and write
31AD000
heap
page read and write
6E8D000
stack
page read and write
31E1000
heap
page read and write
657000
unkown
page readonly
3D0000
unkown
page readonly
499000
stack
page read and write
1B2F9FF000
stack
page read and write
19DA6D0A000
trusted library allocation
page read and write
1020000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
3330000
unkown
page execute and read and write
19DA5217000
heap
page read and write
31E1000
heap
page read and write
7F3C000
heap
page read and write
31E1000
heap
page read and write
2360000
unkown
page read and write
31E1000
heap
page read and write
27D6000
trusted library allocation
page read and write
31E1000
heap
page read and write
4E4C000
system
page execute and read and write
47A0000
trusted library allocation
page read and write
3872000
unkown
page read and write
D7E000
stack
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
7A3F000
stack
page read and write
25CE000
trusted library allocation
page read and write
9FB000
trusted library allocation
page execute and read and write
640000
unkown
page readonly
800000
heap
page read and write
31E1000
heap
page read and write
861000
unkown
page readonly
59BF000
stack
page read and write
2F7A000
unclassified section
page execute and read and write
479E000
trusted library allocation
page read and write
31E1000
heap
page read and write
7F9F000
heap
page read and write
6460000
trusted library allocation
page read and write
2F06000
unkown
page read and write
31E1000
heap
page read and write
19DA6BA0000
heap
page read and write
800000
heap
page read and write
7FC1000
heap
page read and write
B1D000
heap
page read and write
850000
unkown
page read and write
385D000
direct allocation
page execute and read and write
7FAF000
heap
page read and write
31E1000
heap
page read and write
9F7000
trusted library allocation
page execute and read and write
3FE7000
trusted library allocation
page read and write
3143000
heap
page read and write
597000
stack
page read and write
3799000
trusted library allocation
page read and write
C10000
unkown
page readonly
19DA6D10000
trusted library allocation
page read and write
2511C000
system
page read and write
4035000
trusted library allocation
page read and write
512A000
unclassified section
page read and write
310000
unkown
page readonly
31E1000
heap
page read and write
31E1000
heap
page read and write
A90000
heap
page read and write
1B2E1FC000
stack
page read and write
31E1000
heap
page read and write
4950000
unclassified section
page read and write
31E1000
heap
page read and write
2380000
unkown
page read and write
31E1000
heap
page read and write
CF90000
trusted library section
page read and write
31E1000
heap
page read and write
30F1000
heap
page read and write
31E1000
heap
page read and write
7C0000
unkown
page readonly
31E1000
heap
page read and write
31E1000
heap
page read and write
25DD000
trusted library allocation
page read and write
3BFC000
unclassified section
page read and write
77E0000
trusted library section
page read and write
2F74000
heap
page read and write
1380000
direct allocation
page execute and read and write
9E6000
trusted library allocation
page execute and read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
10A7C000
stack
page read and write
25F0000
trusted library allocation
page read and write
31E1000
heap
page read and write
6E4E000
stack
page read and write
7FB2000
heap
page read and write
31E1000
heap
page read and write
B9F000
stack
page read and write
25002000
system
page read and write
7F30000
trusted library allocation
page read and write
3174000
heap
page read and write
C30000
heap
page read and write
4E06000
unclassified section
page read and write
31E1000
heap
page read and write
2791000
trusted library allocation
page read and write
31E1000
heap
page read and write
7F7D000
heap
page read and write
A28000
heap
page read and write
31E1000
heap
page read and write
19DA6EC4000
trusted library allocation
page read and write
31E1000
heap
page read and write
2772000
trusted library allocation
page read and write
6D4E000
stack
page read and write
31E1000
heap
page read and write
7F46000
heap
page read and write
4308000
unclassified section
page read and write
E60000
unkown
page readonly
C10000
unkown
page readonly
31E1000
heap
page read and write
2D74000
unkown
page read and write
263E000
stack
page read and write
F31000
unkown
page readonly
30FC000
heap
page read and write
8D0000
heap
page read and write
31E1000
heap
page read and write
9F2000
trusted library allocation
page read and write
31E1000
heap
page read and write
121F000
stack
page read and write
B1F000
heap
page read and write
31E1000
heap
page read and write
31EC000
heap
page read and write
11F1000
unkown
page readonly
D3F000
stack
page read and write
31E1000
heap
page read and write
4FAE000
stack
page read and write
A20000
heap
page read and write
372E000
direct allocation
page execute and read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
7800000
heap
page read and write
1646000
direct allocation
page execute and read and write
4C80000
trusted library allocation
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
34E0000
trusted library allocation
page execute and read and write
19DA5210000
heap
page read and write
31E1000
heap
page read and write
31E1000
heap
page read and write
7A0000
unkown
page readonly
7F0000
heap
page read and write
A6E000
stack
page read and write
7F88000
heap
page read and write
5170000
heap
page read and write
31E1000
heap
page read and write
780A000
heap
page read and write
DC0000
direct allocation
page read and write
131F000
stack
page read and write
5ABE000
stack
page read and write
9EA000
trusted library allocation
page execute and read and write
31E1000
heap
page read and write
4083000
trusted library allocation
page read and write
47B8000
trusted library allocation
page read and write
31E1000
heap
page read and write
3150000
heap
page read and write
8EF000
heap
page read and write
3922000
unclassified section
page read and write
10B7C000
stack
page read and write
There are 693 hidden memdumps, click here to show them.