IOC Report
dGHiTqj3AB.exe

loading gif

Files

File Path
Type
Category
Malicious
dGHiTqj3AB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dGHiTqj3AB.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\6fI63K3E
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dGHiTqj3AB.exe
"C:\Users\user\Desktop\dGHiTqj3AB.exe"
malicious
C:\Users\user\Desktop\dGHiTqj3AB.exe
"C:\Users\user\Desktop\dGHiTqj3AB.exe"
malicious
C:\Users\user\Desktop\dGHiTqj3AB.exe
"C:\Users\user\Desktop\dGHiTqj3AB.exe"
malicious
C:\Program Files (x86)\wxIxUfGowGoPLrEBANDUBRahhjmbZDGLAZakqLAhQxivtuelgvzf\fgebfePlJm.exe
"C:\Program Files (x86)\wxIxUfGowGoPLrEBANDUBRahhjmbZDGLAZakqLAhQxivtuelgvzf\fgebfePlJm.exe"
malicious
C:\Windows\SysWOW64\mcbuilder.exe
"C:\Windows\SysWOW64\mcbuilder.exe"
malicious
C:\Program Files (x86)\wxIxUfGowGoPLrEBANDUBRahhjmbZDGLAZakqLAhQxivtuelgvzf\fgebfePlJm.exe
"C:\Program Files (x86)\wxIxUfGowGoPLrEBANDUBRahhjmbZDGLAZakqLAhQxivtuelgvzf\fgebfePlJm.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://asymtos.ai/34b9/?bPD=W6RiSnxSk7sWUyAWv8iRSiD0PbjPvpVwUriP78iMWJLg9pjq2qbXqPDPIc9Rf4jTN/ETyga
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.accessoriestechbd.com/5pdf/
103.29.180.74
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.hourglasspoise.net/5gvb/?r4HtI=inDHeTS0D6JHi&bPD=/cc9D7vqfViixqGthyicdvN6zULLmywOC8ezpB4FmcTpRtjTbyPN+qyyn2oVZVAAZJsSw+aEzq+oGUOxhiKfxK7cUWDoBkvPGfZgrhOxmX7AStJyIMBk2Ik=
3.33.130.190
http://www.accessoriestechbd.com
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.asymtos.tech/34b9/?bPD=W6RiSnxSk7sWUyAWv8iRSiD0PbjPvpVwUriP78iMWJLg9pjq2qbXqPDPIc9Rf4jTN/ETygayReM86N3bYDrSkNDIFOCHTFVOdGC1q9B2gGW6d9vv3KfEEgs=&r4HtI=inDHeTS0D6JHi
217.160.164.240
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.asymtos.tech/34b9/
217.160.164.240
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.theiconsummit.life/6fdz/
3.33.130.190
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.lontos.top/ukrf/
203.161.42.162
http://www.bosonserver.net/x10g/?bPD=AtIpZIbrclbIO3wVVorP/+4YW7XwgThFYZcx/yn27KMXet/sCHbTQiCzWIx6Kv/NnE9nJScnuF31JPyJpxVQ15qsd8YhwJ4GP0n6fMl4YdtRcYZTZezTcHY=&r4HtI=inDHeTS0D6JHi
195.200.3.58
https://www.ecosia.org/newtab/
unknown
http://www.bosonserver.net/x10g/
195.200.3.58
https://www.bosonserver.net/x10g/?bPD=AtIpZIbrclbIO3wVVorP/
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.accessoriestechbd.com/5pdf/?r4HtI=inDHeTS0D6JHi&bPD=Ej/EzQPepC1y7H/CB3fFjxmxT5K/uokQyhXQpBVK3nqnb8oYKZIShVAN8OJA1iYy8omWkznWlYUMQWoQrGGIZe4YpIxUtk1QZkVuvgrHNfuUWu/hH7rCDC0=
103.29.180.74
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.hourglasspoise.net/5gvb/
3.33.130.190
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
http://www.accelbusiness.net/sg0d/?r4HtI=inDHeTS0D6JHi&bPD=ZFII8SVAvGzgMmVXT4ZY+5svGFARRAPMY6hEAWMgzd/rbIPLPNZ+nr66isGJwkaWRyig0DUujo2cMsRd49nDMp6VdguE/ogC4VFXU40D/gpWgkUbHmnCm4E=
3.33.130.190
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.theiconsummit.life/6fdz/?bPD=Oie1FXKEyOqxuNWWyzkYdPfZReRkcG0Z1Eay2KtVdEC34I4dz//PHzzr4ve1tSfSRt9M/nPWu6bDrMp0Hm7HeQWrGZPcmCLmPnl5GlJrMre+ojzyhGOYA5A=&r4HtI=inDHeTS0D6JHi
3.33.130.190
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hourglasspoise.net
unknown
malicious
www.theiconsummit.life
unknown
malicious
www.asymtos.tech
unknown
malicious
www.accessoriestechbd.com
unknown
malicious
www.bosonserver.net
unknown
malicious
www.accelbusiness.net
unknown
malicious
accessoriestechbd.com
103.29.180.74
www.lontos.top
203.161.42.162
hourglasspoise.net
3.33.130.190
accelbusiness.net
3.33.130.190
bosonserver.net
195.200.3.58
theiconsummit.life
3.33.130.190
asymtos.tech
217.160.164.240
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
195.200.3.58
bosonserver.net
United Kingdom
103.29.180.74
accessoriestechbd.com
unknown
3.33.130.190
hourglasspoise.net
United States
217.160.164.240
asymtos.tech
Germany
203.161.42.162
www.lontos.top
Malaysia

Memdumps

Base Address
Regiontype
Protect
Malicious
2CD1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
36F0000
trusted library allocation
page read and write
malicious
3090000
system
page execute and read and write
malicious
2810000
unclassified section
page execute and read and write
malicious
2DD0000
unkown
page execute and read and write
malicious
1770000
unclassified section
page execute and read and write
malicious
B00000
system
page execute and read and write
malicious
72B0000
trusted library section
page read and write
malicious
3450000
trusted library allocation
page read and write
malicious
326F000
unkown
page execute and read and write
34F1000
heap
page read and write
E4E000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
752F000
stack
page read and write
7B0000
unkown
page readonly
B83000
system
page execute and read and write
8251000
heap
page read and write
18B0A732000
heap
page read and write
34F1000
heap
page read and write
9E1E000
stack
page read and write
8251000
heap
page read and write
B67000
system
page execute and read and write
18B0A596000
system
page execute and read and write
55F0000
heap
page read and write
CE1000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
C8A000
stack
page read and write
6D8000
heap
page read and write
303B000
stack
page read and write
18B0C4B2000
trusted library allocation
page read and write
34F1000
heap
page read and write
10B1000
heap
page read and write
9FF000
heap
page read and write
50000
unkown
page readonly
34F1000
heap
page read and write
6D0000
heap
page read and write
B77000
system
page execute and read and write
33C9000
heap
page read and write
34F1000
heap
page read and write
3721000
unclassified section
page execute and read and write
3130000
heap
page read and write
34F1000
heap
page read and write
36AC000
heap
page read and write
7C0000
heap
page read and write
3D0000
unkown
page readonly
50DF000
stack
page read and write
5270000
heap
page read and write
34F4000
heap
page read and write
3F2C000
unclassified section
page read and write
960000
unkown
page read and write
FC0000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
33D6000
heap
page read and write
1CC000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
1040000
heap
page read and write
33B6000
heap
page read and write
34F1000
heap
page read and write
34F0000
heap
page read and write
ABA4000
system
page read and write
B5F000
system
page execute and read and write
72E0000
heap
page read and write
A1DE000
stack
page read and write
75A0000
trusted library section
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
3150000
heap
page read and write
33D6000
heap
page read and write
8288000
heap
page read and write
34F1000
heap
page read and write
561E000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
33EB000
heap
page read and write
A0DE000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
4F9F000
stack
page read and write
21EF000
stack
page read and write
9E8000
heap
page read and write
2590000
heap
page read and write
A5A2000
system
page read and write
3989000
direct allocation
page execute and read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
420000
unkown
page readonly
41C8DFB000
stack
page read and write
12BE000
stack
page read and write
34F1000
heap
page read and write
32E1000
unkown
page execute and read and write
EC5000
heap
page read and write
34F1000
heap
page read and write
18D0000
direct allocation
page execute and read and write
34F1000
heap
page read and write
18B0C200000
trusted library allocation
page read and write
828C000
heap
page read and write
990000
unkown
page readonly
18B0C4C4000
trusted library allocation
page read and write
60000
unkown
page readonly
1037000
heap
page read and write
166F000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
10FA000
stack
page read and write
1070000
heap
page read and write
34F1000
heap
page read and write
2C5E000
stack
page read and write
33B1000
heap
page read and write
8251000
heap
page read and write
18B0C30E000
trusted library allocation
page read and write
8295000
heap
page read and write
34F1000
heap
page read and write
18B0BFB0000
trusted library allocation
page read and write
23DC000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
41CA5FF000
stack
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
3D0000
unkown
page readonly
2590000
heap
page read and write
671000
unkown
page readonly
899E000
stack
page read and write
51F5000
trusted library allocation
page read and write
75C000
stack
page read and write
1CC000
stack
page read and write
112A000
heap
page read and write
18B0C30A000
trusted library allocation
page read and write
34F1000
heap
page read and write
3417000
heap
page read and write
2450000
heap
page read and write
3402000
heap
page read and write
385E000
stack
page read and write
33EE000
heap
page read and write
126F000
stack
page read and write
34F1000
heap
page read and write
33C3000
heap
page read and write
4D60000
trusted library allocation
page execute and read and write
520000
heap
page read and write
8281000
heap
page read and write
6C0000
unkown
page read and write
9E8000
heap
page read and write
18B0A550000
system
page execute and read and write
3740000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
950000
unkown
page readonly
6A0000
unkown
page readonly
25A0000
unkown
page readonly
5440000
trusted library allocation
page read and write
18B0A732000
heap
page read and write
381D000
stack
page read and write
27AC000
unkown
page read and write
FD3000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
33F5000
heap
page read and write
790000
unkown
page readonly
34F1000
heap
page read and write
680000
unkown
page read and write
51DD000
trusted library allocation
page read and write
34F1000
heap
page read and write
65A000
stack
page read and write
34F1000
heap
page read and write
1B81000
direct allocation
page execute and read and write
34F1000
heap
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
5340000
heap
page read and write
18B0A70F000
heap
page read and write
19F9000
direct allocation
page execute and read and write
34F1000
heap
page read and write
35FC000
heap
page read and write
3154000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
22E0000
unkown
page readonly
3CD9000
trusted library allocation
page read and write
935000
unkown
page read and write
34F1000
heap
page read and write
C00000
unkown
page readonly
990000
unkown
page readonly
34F1000
heap
page read and write
8251000
heap
page read and write
8291000
heap
page read and write
7550000
trusted library allocation
page execute and read and write
3E0000
unkown
page readonly
1B96000
direct allocation
page execute and read and write
910000
unkown
page readonly
8251000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
5470000
heap
page read and write
E70000
heap
page read and write
3110000
heap
page read and write
10E2000
heap
page read and write
935000
unkown
page read and write
D87000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
5630000
heap
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
937000
unkown
page readonly
336E000
heap
page read and write
34F1000
heap
page read and write
87DC000
stack
page read and write
3860000
direct allocation
page execute and read and write
680000
unkown
page read and write
34F1000
heap
page read and write
8DE000
stack
page read and write
1097000
heap
page read and write
9B0000
unkown
page read and write
3350000
heap
page read and write
33F5000
heap
page read and write
51B4000
trusted library allocation
page read and write
950000
unkown
page read and write
EBE000
stack
page read and write
2C9C000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
255F000
stack
page read and write
34F1000
heap
page read and write
9E0000
heap
page read and write
7A0000
unkown
page readonly
1B9D000
direct allocation
page execute and read and write
33B1000
heap
page read and write
8265000
heap
page read and write
1010000
trusted library allocation
page read and write
DF0000
heap
page read and write
33A5000
heap
page read and write
2D27000
trusted library allocation
page read and write
34F1000
heap
page read and write
296C000
unkown
page read and write
7A0000
unkown
page readonly
34F1000
heap
page read and write
912000
unkown
page readonly
33F0000
heap
page read and write
18B0C303000
trusted library allocation
page read and write
5330000
trusted library allocation
page execute and read and write
B5D000
system
page execute and read and write
430000
heap
page read and write
34F1000
heap
page read and write
3402000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
4638000
unclassified section
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8250000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
7C0000
heap
page read and write
A2DF000
stack
page read and write
7560000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
2594000
heap
page read and write
33B1000
heap
page read and write
920000
unkown
page readonly
1060000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
2B50000
heap
page read and write
2B4E000
stack
page read and write
5780000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
6C0000
unkown
page read and write
51D1000
trusted library allocation
page read and write
3154000
heap
page read and write
520000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
3450000
trusted library allocation
page read and write
34F1000
heap
page read and write
920000
unkown
page readonly
578E000
heap
page read and write
889E000
stack
page read and write
241E000
stack
page read and write
7530000
trusted library allocation
page execute and read and write
3617000
heap
page read and write
34F1000
heap
page read and write
5280000
trusted library allocation
page read and write
3E0000
unkown
page readonly
3366000
heap
page read and write
18B0A709000
heap
page read and write
8A3F000
stack
page read and write
8251000
heap
page read and write
33C0000
heap
page read and write
2752000
unkown
page read and write
3366000
heap
page read and write
FCD000
trusted library allocation
page execute and read and write
B85000
system
page execute and read and write
8256000
heap
page read and write
804000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
410000
unkown
page readonly
89FE000
stack
page read and write
8251000
heap
page read and write
7630000
trusted library allocation
page read and write
3CE1000
unkown
page execute and read and write
34C0000
heap
page read and write
72D0000
trusted library allocation
page read and write
34F1000
heap
page read and write
921000
unkown
page execute read
5760000
heap
page read and write
34F1000
heap
page read and write
1400000
direct allocation
page read and write
34F1000
heap
page read and write
8262000
heap
page read and write
8268000
heap
page read and write
34F1000
heap
page read and write
343A000
heap
page read and write
398D000
direct allocation
page execute and read and write
804000
heap
page read and write
34F1000
heap
page read and write
33EB000
heap
page read and write
34F1000
heap
page read and write
335B000
heap
page read and write
3366000
heap
page read and write
60000
unkown
page readonly
5200000
trusted library allocation
page read and write
34F1000
heap
page read and write
CA000
stack
page read and write
CA000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
829F000
heap
page read and write
3C52000
unclassified section
page read and write
34F1000
heap
page read and write
339C000
unkown
page read and write
34F1000
heap
page read and write
8240000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
34F1000
heap
page read and write
935000
unkown
page read and write
BDA000
system
page execute and read and write
2450000
heap
page read and write
950000
unkown
page readonly
34F1000
heap
page read and write
7B0000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
4314000
unclassified section
page read and write
34F1000
heap
page read and write
3BA2000
direct allocation
page execute and read and write
CE0000
unkown
page readonly
920000
unkown
page readonly
127E000
stack
page read and write
33F0000
heap
page read and write
33C9000
heap
page read and write
34F1000
heap
page read and write
9A8E000
trusted library allocation
page read and write
A3DE000
stack
page read and write
8274000
heap
page read and write
1478000
heap
page read and write
10AF000
heap
page read and write
72F0000
heap
page read and write
67F0000
trusted library allocation
page read and write
51E2000
trusted library allocation
page read and write
9B0000
unkown
page read and write
34A0000
trusted library allocation
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
920000
unkown
page readonly
3428000
heap
page read and write
77A0000
trusted library allocation
page read and write
18B0C313000
trusted library allocation
page read and write
18B0A72B000
heap
page read and write
410000
unkown
page readonly
34F1000
heap
page read and write
3422000
heap
page read and write
2EE6000
unkown
page read and write
34F1000
heap
page read and write
FF7000
trusted library allocation
page execute and read and write
3BB0000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
AF0000
heap
page read and write
107E000
heap
page read and write
F90000
unkown
page readonly
55DE000
stack
page read and write
34F1000
heap
page read and write
2692000
unkown
page read and write
E00000
heap
page read and write
6ED2000
trusted library allocation
page read and write
FFB000
trusted library allocation
page execute and read and write
881D000
stack
page read and write
4D4E000
stack
page read and write
34F1000
heap
page read and write
921000
unkown
page execute read
4E9C000
stack
page read and write
FF2000
trusted library allocation
page read and write
14A8000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8245000
heap
page read and write
777E000
stack
page read and write
22E0000
unkown
page readonly
8251000
heap
page read and write
77A3000
trusted library allocation
page read and write
1078000
heap
page read and write
1470000
heap
page read and write
23D0000
unkown
page execute and read and write
34F1000
heap
page read and write
33D6000
heap
page read and write
1020000
trusted library allocation
page execute and read and write
92E000
unkown
page readonly
6D0000
heap
page read and write
34F1000
heap
page read and write
800000
heap
page read and write
900000
unkown
page read and write
FE2000
trusted library allocation
page read and write
384A000
heap
page read and write
34F1000
heap
page read and write
9E0000
heap
page read and write
34F1000
heap
page read and write
937000
unkown
page readonly
34F1000
heap
page read and write
9DDE000
stack
page read and write
1E00000
heap
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
41C9DFF000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
F91000
unkown
page readonly
C00000
unkown
page readonly
34F1000
heap
page read and write
352E000
unkown
page read and write
34F1000
heap
page read and write
8E0000
unkown
page read and write
4D0E000
stack
page read and write
2F50000
trusted library allocation
page read and write
33DC000
heap
page read and write
336C000
heap
page read and write
2594000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
800000
heap
page read and write
A7BC000
system
page read and write
FC4000
trusted library allocation
page read and write
37D5000
heap
page read and write
34F1000
heap
page read and write
6A0000
unkown
page readonly
19FD000
direct allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
18B0C140000
heap
page read and write
34F1000
heap
page read and write
34E0000
heap
page read and write
420000
unkown
page readonly
510000
unkown
page read and write
8251000
heap
page read and write
22D0000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8F1000
unkown
page readonly
34A0000
trusted library allocation
page read and write
34F1000
heap
page read and write
18B0C300000
trusted library allocation
page read and write
8E0000
unkown
page read and write
55E0000
heap
page read and write
7540000
trusted library section
page read and write
51BB000
trusted library allocation
page read and write
50000
unkown
page readonly
18B0A630000
heap
page read and write
763A000
trusted library allocation
page read and write
3120000
heap
page read and write
12C0000
heap
page read and write
54D0000
heap
page read and write
3366000
heap
page read and write
712000
heap
page read and write
3361000
heap
page read and write
510000
unkown
page read and write
51F0000
trusted library allocation
page read and write
895E000
stack
page read and write
8251000
heap
page read and write
296C000
unkown
page read and write
33C9000
heap
page read and write
33B6000
heap
page read and write
671000
unkown
page readonly
33C3000
heap
page read and write
65A000
stack
page read and write
51CE000
trusted library allocation
page read and write
335D000
heap
page read and write
34F1000
heap
page read and write
3154000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
18B0A700000
heap
page read and write
34F1000
heap
page read and write
5343000
heap
page read and write
34F1000
heap
page read and write
18B0BFB0000
trusted library allocation
page read and write
34F1000
heap
page read and write
92E000
unkown
page readonly
1E10000
unclassified section
page execute and read and write
18B0C317000
trusted library allocation
page read and write
767E000
stack
page read and write
FC3000
trusted library allocation
page execute and read and write
8F1000
unkown
page readonly
176F000
stack
page read and write
8251000
heap
page read and write
2D54000
unkown
page read and write
4E6C000
stack
page read and write
335B000
heap
page read and write
8350000
trusted library allocation
page read and write
34F1000
heap
page read and write
3F0000
unkown
page readonly
88DE000
stack
page read and write
75C000
stack
page read and write
34F1000
heap
page read and write
341E000
heap
page read and write
2D31000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
3D12000
unclassified section
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
885E000
stack
page read and write
34F1000
heap
page read and write
4AEE000
unclassified section
page read and write
34F1000
heap
page read and write
12F0000
heap
page read and write
400000
unkown
page readonly
336C000
heap
page read and write
34F1000
heap
page read and write
3361000
heap
page read and write
18B0C310000
trusted library allocation
page read and write
5770000
heap
page read and write
56E000
stack
page read and write
54C0000
trusted library section
page readonly
34F1000
heap
page read and write
AF5000
heap
page read and write
34F1000
heap
page read and write
1A6E000
direct allocation
page execute and read and write
34F1000
heap
page read and write
3F0000
unkown
page readonly
742E000
stack
page read and write
900000
unkown
page read and write
92E000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
66F000
stack
page read and write
34F1000
heap
page read and write
18B0C401000
trusted library allocation
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
2692000
unkown
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
6EB0000
trusted library allocation
page read and write
FE6000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
2CC0000
heap
page execute and read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
921000
unkown
page execute read
AF0000
heap
page read and write
826A000
heap
page read and write
136F000
stack
page read and write
4FDE000
stack
page read and write
7780000
trusted library allocation
page read and write
2CAF000
unclassified section
page execute and read and write
34F1000
heap
page read and write
937000
unkown
page readonly
2D21000
unclassified section
page execute and read and write
891F000
stack
page read and write
18B0A594000
system
page execute and read and write
41C95FE000
stack
page read and write
937000
unkown
page readonly
430000
heap
page read and write
34F1000
heap
page read and write
5475000
heap
page read and write
34F1000
heap
page read and write
1160000
heap
page read and write
A4E2000
system
page read and write
34F1000
heap
page read and write
33B6000
heap
page read and write
34F1000
heap
page read and write
1300000
heap
page read and write
320A000
unkown
page read and write
34F1000
heap
page read and write
3B31000
direct allocation
page execute and read and write
33EE000
heap
page read and write
FDD000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
3D6C000
unclassified section
page read and write
92E000
unkown
page readonly
3078000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
33C3000
heap
page read and write
34F1000
heap
page read and write
22D0000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8260000
heap
page read and write
FE0000
trusted library allocation
page read and write
33C0000
heap
page read and write
34F1000
heap
page read and write
5282000
trusted library allocation
page read and write
EC0000
heap
page read and write
18B0C4CE000
trusted library allocation
page read and write
34F1000
heap
page read and write
7F1A0000
trusted library allocation
page execute and read and write
39FE000
direct allocation
page execute and read and write
51D6000
trusted library allocation
page read and write
495C000
unclassified section
page read and write
18B0BFB0000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
18B0C321000
trusted library allocation
page read and write
18B0A650000
heap
page read and write
37D9000
heap
page read and write
DFC000
stack
page read and write
8251000
heap
page read and write
3B2D000
direct allocation
page execute and read and write
18B0A71C000
heap
page read and write
400000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
84E000
stack
page read and write
5220000
trusted library allocation
page read and write
40000
unkown
page readonly
34F1000
heap
page read and write
FEA000
trusted library allocation
page execute and read and write
6D8000
heap
page read and write
18B0A680000
heap
page read and write
3358000
heap
page read and write
18B0A72F000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
935000
unkown
page read and write
34F1000
heap
page read and write
33E1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
40000
unkown
page readonly
921000
unkown
page execute read
25A0000
unkown
page readonly
5880000
trusted library allocation
page execute and read and write
44A6000
unclassified section
page read and write
3078000
unkown
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8251000
heap
page read and write
9EE0000
heap
page read and write
33C0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
8251000
heap
page read and write
34F1000
heap
page read and write
18B0C4BE000
trusted library allocation
page read and write
790000
unkown
page readonly
54BB000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
5260000
heap
page execute and read and write
1C18000
direct allocation
page execute and read and write
34F1000
heap
page read and write
825B000
heap
page read and write
1030000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
3366000
heap
page read and write
47CA000
unclassified section
page read and write
34F1000
heap
page read and write
34A0000
trusted library allocation
page read and write
There are 688 hidden memdumps, click here to show them.