IOC Report
z10982283782.exe

loading gif

Files

File Path
Type
Category
Malicious
z10982283782.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\dGg-0-kL
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z10982283782.exe
"C:\Users\user\Desktop\z10982283782.exe"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe
"C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe"
malicious
C:\Windows\SysWOW64\takeown.exe
"C:\Windows\SysWOW64\takeown.exe"
malicious
C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe
"C:\Program Files (x86)\MHJugyuzUaheNGpkBeFBNlDyEOcFcyRVbempThHnCRYANZZY\ObMmiCfBgqmt.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.wcp58.top/u071/
154.23.184.240
malicious
http://www.cpamerix.online/muj9/
194.58.112.174
malicious
http://www.wcp58.top/u071/?fvM8Gh=bBJc85dRrz6VYFP8GwFXoZFtfmuQO+iyQ8ywsDhPMj3PkpaAJncRlOwVGrcs7/oiPMEubiNmeHgqiRXMS1H3OK+Zq7VhNcw4P6d6BN/xAJTWHzjowpdO9JjlTFWXwfVVhN461s++G65d&DfDx=AFrxfzcH-Ld
154.23.184.240
malicious
https://bitbucket.org/akeem4u/canter/downloads/233_Ltspwqrtysw
185.166.143.48
malicious
http://www.lotus9.life/t67j/
3.33.130.190
malicious
http://www.98080753.xyz/eth5/
161.97.168.245
malicious
http://www.lotus9.life/t67j/?fvM8Gh=KowgBu3DXf0G7hBLtaH8s8ZzKm+VG/tpKZ1Q7eDBR0ArwNxjdNGLI+rTTcfRvEyEYs27WEZYXeTRVuyNENDuSquLWx1vE6gNEX6tkQ0IxcS5dAyUTa1RZ/bXBmbIS1WdqDLnMr1sBa9m&DfDx=AFrxfzcH-Ld
3.33.130.190
malicious
http://www.joshcharlesfitness.xyz/f2m8/?fvM8Gh=q8u1m2y9j/W78LyjRjBmLFBPluC1hJa5ZcIT7WbQRmUkJn/aUKn129a9SdOjfVpEuogWIbFDr3wrvEdEbURHbL899LelzoXXcWM6JsFHtDa1nH+G65yTIIp51Lx0C7/dwS8TcymTUlcC&DfDx=AFrxfzcH-Ld
3.33.130.190
malicious
http://www.facaicloud.top/dc1u/
74.48.31.123
malicious
http://www.facaicloud.top/dc1u/?fvM8Gh=fFgJrpU7aD7UkZlQpUegXiYX0mHuwd+xKsDAURMBiAqiBmSaSKvvh09Aihxa8ofx/ezcm777pnsov1VcpLBlwmC3Iqy+K+pafl2LF2kBMm3CKkFZyMytkoTfA5EUxo7rNsMcOhPX02Mw&DfDx=AFrxfzcH-Ld
74.48.31.123
malicious
http://www.cpamerix.online/muj9/?fvM8Gh=hgXo7easQgYwzYM50VVsBbrTpvYmtRva0zGF6x/wVx5xdFtAh4cdAJarj8a6/VZ0fLckawx66xls7kEuRRfHglkiUnpuSxGF6OqSwfVcl2N6vBJ8grdIeIpeinnOhUKuNcVRLIFrNYJr&DfDx=AFrxfzcH-Ld
194.58.112.174
malicious
https://bitbucket.org/Q
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://reg.ru
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://bbuseruploads.s3.amazonaws.com/%
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
https://bbuseruploads.s3.amazonaws.com/S
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paaj
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.reg.ru/dedicated/?utm_source=www.cpamerix.online&utm_medium=parking&utm_campaign=s_land_
unknown
https://aui-cdn.atlassian.com/
unknown
https://www.reg.ru/domain/new/?utm_source=www.cpamerix.online&utm_medium=parking&utm_campaign=s_land
unknown
https://www.reg.ru/hosting/?utm_source=www.cpamerix.online&utm_medium=parking&utm_campaign=s_land_ho
unknown
https://bbuseruploads.s3.amazonaws.com:443/1889f89b-bf3e-4330-a7ab-fccb77ce4890/downloads/a122b37b-2
unknown
https://www.reg.ru/whois/?check=&dname=www.cpamerix.online&reg_source=parking_auto
unknown
https://parking.reg.ru/script/get_domain_data?domain_name=www.cpamerix.online&rand=
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paaF
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.lotus9.life
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
https://bbuseruploads.s3.amazonaws.com/1889f89b-bf3e-4330-a7ab-fccb77ce4890/downloads/a122b37b-2be1-
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-
unknown
https://www.ecosia.org/newtab/
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paa
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://bitbucket.org/akeem4u/canter/downloads/233_LtspwqrtyswX
unknown
https://cdn.cookielaw.org/
unknown
https://www.reg.ru/sozdanie-saita/
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
http://www.pmail.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://remote-app-switcher.prod-east.frontend.
unknown
https://bbuseruploads.s3.amazonaws.com/
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bitbucket.org
185.166.143.48
malicious
www.facaicloud.top
74.48.31.123
malicious
wcp58.top
154.23.184.240
malicious
www.cpamerix.online
194.58.112.174
malicious
www.g4s7e5.biz
203.90.227.88
malicious
www.98080753.xyz
161.97.168.245
malicious
joshcharlesfitness.xyz
3.33.130.190
malicious
lotus9.life
3.33.130.190
malicious
www.joshcharlesfitness.xyz
unknown
malicious
www.wcp58.top
unknown
malicious
bbuseruploads.s3.amazonaws.com
unknown
malicious
www.lotus9.life
unknown
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
s3-w.us-east-1.amazonaws.com
3.5.3.65
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.166.143.48
bitbucket.org
Germany
malicious
154.23.184.240
wcp58.top
United States
malicious
74.48.31.123
www.facaicloud.top
Canada
malicious
194.58.112.174
www.cpamerix.online
Russian Federation
malicious
3.33.130.190
joshcharlesfitness.xyz
United States
malicious
161.97.168.245
www.98080753.xyz
United States
malicious
3.5.3.65
s3-w.us-east-1.amazonaws.com
United States
54.231.236.129
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles

Memdumps

Base Address
Regiontype
Protect
Malicious
4A20000
unclassified section
page execute and read and write
malicious
4C40000
system
page execute and read and write
malicious
65F0000
remote allocation
page execute and read and write
malicious
5060000
unkown
page execute and read and write
malicious
670000
system
page execute and read and write
malicious
25240000
unclassified section
page execute and read and write
malicious
B30000
trusted library allocation
page read and write
malicious
B80000
trusted library allocation
page read and write
malicious
A31000
heap
page read and write
29D4000
heap
page read and write
A31000
heap
page read and write
1161000
unkown
page readonly
22C8000
direct allocation
page read and write
4710000
heap
page read and write
49F1000
heap
page read and write
9B000
stack
page read and write
74E000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
270000
unkown
page readonly
A31000
heap
page read and write
2266B000
heap
page read and write
9C1000
heap
page read and write
21968ED2000
heap
page read and write
2A20000
heap
page read and write
A31000
heap
page read and write
BB0000
unkown
page readonly
28CF000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
217F0000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
4CA2000
system
page execute and read and write
2196AA00000
trusted library allocation
page read and write
A31000
heap
page read and write
5C1000
unkown
page readonly
BB0000
unkown
page readonly
2196AA21000
trusted library allocation
page read and write
7733000
heap
page read and write
A31000
heap
page read and write
7F450000
direct allocation
page read and write
7747000
heap
page read and write
240E000
stack
page read and write
A31000
heap
page read and write
7E7F000
stack
page read and write
670000
unkown
page readonly
7792000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
21968DE0000
heap
page read and write
AB0000
heap
page read and write
A31000
heap
page read and write
2848000
heap
page read and write
A31000
heap
page read and write
7FB4C000
direct allocation
page read and write
A31000
heap
page read and write
E0E000
stack
page read and write
A31000
heap
page read and write
7F8A0000
direct allocation
page read and write
A31000
heap
page read and write
BD8000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
256DA000
unclassified section
page execute and read and write
BD0000
trusted library allocation
page read and write
487C000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
7EFF000
stack
page read and write
25D4000
heap
page read and write
A31000
heap
page read and write
964000
heap
page read and write
209FD000
direct allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
2266F000
heap
page read and write
2C0E000
direct allocation
page execute and read and write
A31000
heap
page read and write
6DA000
stack
page read and write
24AE000
stack
page read and write
4B0000
unkown
page readonly
73D000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
28F3000
heap
page read and write
238F000
stack
page read and write
A31000
heap
page read and write
22542000
heap
page read and write
980000
unkown
page read and write
A31000
heap
page read and write
E80000
unkown
page readonly
A31000
heap
page read and write
9D6000
heap
page read and write
217EF000
trusted library allocation
page read and write
2500000
heap
page read and write
7FA9F000
direct allocation
page read and write
D6A000
heap
page read and write
947000
heap
page read and write
77AB000
heap
page read and write
2900000
heap
page read and write
20D6F000
stack
page read and write
2864000
heap
page read and write
215E3000
heap
page read and write
A31000
heap
page read and write
4A20000
direct allocation
page read and write
44D000
stack
page read and write
788000
heap
page read and write
B60000
heap
page read and write
727000
heap
page read and write
1D5000
heap
page read and write
2434000
heap
page read and write
A90000
unkown
page read and write
2A10000
heap
page read and write
217F8000
heap
page read and write
A31000
heap
page read and write
2A90000
direct allocation
page readonly
21968C6E000
system
page execute and read and write
25AE000
stack
page read and write
A31000
heap
page read and write
218B0000
heap
page read and write
77AE000
heap
page read and write
A31000
heap
page read and write
B88000
heap
page read and write
28A1000
heap
page read and write
7F260000
direct allocation
page read and write
216FD000
heap
page read and write
2196A900000
trusted library allocation
page read and write
93E000
heap
page read and write
2196A680000
trusted library allocation
page read and write
A31000
heap
page read and write
2892000
heap
page read and write
5E90000
trusted library allocation
page read and write
4C89000
system
page execute and read and write
2A26000
heap
page read and write
A31000
heap
page read and write
430000
unkown
page readonly
6F0000
heap
page read and write
4CAE000
system
page execute and read and write
7EBE000
stack
page read and write
22C1000
direct allocation
page read and write
78C000
heap
page read and write
A30000
heap
page read and write
A31000
heap
page read and write
93E000
stack
page read and write
C03000
heap
page read and write
212D0000
remote allocation
page read and write
777000
heap
page read and write
650000
unkown
page readonly
217FF000
heap
page read and write
4C7000
unkown
page readonly
A31000
heap
page read and write
2864000
heap
page read and write
270000
unkown
page readonly
21968ED2000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
28F8000
heap
page read and write
A31000
heap
page read and write
30AA000
unkown
page read and write
9BC000
heap
page read and write
930000
heap
page read and write
23440000
unclassified section
page execute and read and write
A31000
heap
page read and write
960000
unkown
page read and write
740000
heap
page read and write
650000
unkown
page readonly
2840000
heap
page read and write
218A1000
heap
page read and write
215F1000
heap
page read and write
4C5000
unkown
page read and write
722000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
77A8000
heap
page read and write
DDB000
heap
page read and write
A31000
heap
page read and write
19C000
stack
page read and write
1D0000
heap
page read and write
2BF4000
unkown
page read and write
940000
unkown
page readonly
A31000
heap
page read and write
46F000
unkown
page write copy
A31000
heap
page read and write
2892000
heap
page read and write
7F1C0000
direct allocation
page read and write
7ED000
unkown
page read and write
2660000
heap
page read and write
781000
heap
page read and write
2180000
heap
page read and write
28A1000
heap
page read and write
A31000
heap
page read and write
76E000
heap
page read and write
A30000
unkown
page readonly
72C000
heap
page read and write
4A20000
direct allocation
page read and write
748000
heap
page read and write
20A13000
direct allocation
page read and write
A31000
heap
page read and write
364C000
unclassified section
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
25D4000
heap
page read and write
20A0C000
direct allocation
page read and write
5E0000
heap
page read and write
5DF0000
trusted library allocation
page read and write
75F000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
218F0000
trusted library allocation
page read and write
778000
heap
page read and write
7FB5F000
direct allocation
page read and write
77A9000
heap
page read and write
784000
heap
page read and write
A31000
heap
page read and write
2855000
heap
page read and write
276F000
stack
page read and write
782000
heap
page read and write
2196ABBE000
trusted library allocation
page read and write
A31000
heap
page read and write
215E0000
heap
page read and write
25668000
unclassified section
page execute and read and write
209F6000
direct allocation
page read and write
784000
heap
page read and write
20EAF000
stack
page read and write
6BE000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
9A8000
heap
page read and write
2196ABAA000
trusted library allocation
page read and write
217E4000
heap
page read and write
7F3E0000
direct allocation
page read and write
3372000
unclassified section
page read and write
22A32000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
5E0000
heap
page read and write
20B2F000
stack
page read and write
3C60000
unkown
page execute and read and write
7F1C0000
direct allocation
page read and write
2430000
heap
page read and write
A31000
heap
page read and write
229C1000
direct allocation
page execute and read and write
290000
unkown
page readonly
A31000
heap
page read and write
7720000
heap
page read and write
4BE000
unkown
page readonly
25D0000
heap
page read and write
4AE000
stack
page read and write
20B2E000
stack
page execute and read and write
778000
heap
page read and write
7F000000
direct allocation
page read and write
78C000
heap
page read and write
4C7000
unkown
page readonly
7EFF6000
direct allocation
page read and write
28BC2000
system
page read and write
BCD31FD000
stack
page read and write
28B0000
heap
page read and write
8F0000
heap
page read and write
A40000
heap
page read and write
A31000
heap
page read and write
2118E000
stack
page read and write
2976000
heap
page read and write
3020000
direct allocation
page execute and read and write
706000
heap
page read and write
943000
heap
page read and write
217E0000
trusted library allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
7830000
trusted library allocation
page read and write
5B0000
unkown
page read and write
460000
heap
page read and write
7EE70000
direct allocation
page read and write
A31000
heap
page read and write
93E000
stack
page read and write
2532000
unkown
page read and write
7774000
heap
page read and write
722000
heap
page read and write
A31000
heap
page read and write
2196AA11000
trusted library allocation
page read and write
784000
heap
page read and write
217EE000
heap
page read and write
A31000
heap
page read and write
264C000
unkown
page read and write
20C2F000
stack
page read and write
600000
heap
page read and write
2141F000
stack
page read and write
A31000
heap
page read and write
20DAE000
stack
page read and write
A31000
heap
page read and write
221E000
direct allocation
page read and write
A40000
heap
page read and write
BCD49FE000
stack
page read and write
9AD000
heap
page read and write
A31000
heap
page read and write
20A1A000
direct allocation
page read and write
3149000
direct allocation
page execute and read and write
2196ABC4000
trusted library allocation
page read and write
48BC000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A30000
unkown
page readonly
A31000
heap
page read and write
77C000
heap
page read and write
A31000
heap
page read and write
4B1000
unkown
page execute read
A31000
heap
page read and write
20A04000
direct allocation
page read and write
217E6000
heap
page read and write
947000
heap
page read and write
2100F000
stack
page read and write
9B7000
heap
page read and write
A31000
heap
page read and write
7FBA0000
direct allocation
page read and write
9FD000
heap
page read and write
A2A000
heap
page read and write
2878000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
2A2A000
heap
page read and write
BEB000
heap
page read and write
1160000
unkown
page readonly
7FCD7000
direct allocation
page read and write
3362000
direct allocation
page execute and read and write
A31000
heap
page read and write
7736000
heap
page read and write
A22000
heap
page read and write
94D000
heap
page read and write
2888000
heap
page read and write
BB0000
heap
page read and write
A10000
unkown
page readonly
32ED000
direct allocation
page execute and read and write
2288E000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
BD0000
heap
page read and write
2503000
heap
page read and write
22B3000
direct allocation
page read and write
217E0000
heap
page read and write
7E3E000
stack
page read and write
400000
heap
page read and write
77A4000
heap
page read and write
4B0000
unkown
page readonly
2434000
heap
page read and write
7FA50000
direct allocation
page read and write
9AF000
stack
page read and write
77B4000
heap
page read and write
21968D00000
heap
page read and write
A31000
heap
page read and write
7F8FF000
direct allocation
page read and write
7F170000
direct allocation
page read and write
22A40000
unclassified section
page execute and read and write
940000
unkown
page readonly
23CC000
unkown
page read and write
3A34000
unclassified section
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
48D0000
heap
page read and write
5488000
unkown
page execute and read and write
A31000
heap
page read and write
217F2000
heap
page read and write
A31000
heap
page read and write
7FD30000
direct allocation
page read and write
2155D000
stack
page read and write
BCD29FB000
stack
page read and write
217EA000
heap
page read and write
39B000
stack
page read and write
7EF10000
direct allocation
page read and write
670000
unkown
page readonly
4C92000
system
page execute and read and write
A31000
heap
page read and write
AA1000
unkown
page readonly
28AA000
heap
page read and write
A31000
heap
page read and write
21968ED0000
heap
page read and write
727000
heap
page read and write
440000
unkown
page readonly
C3D000
heap
page read and write
4E4C000
unkown
page read and write
29F0000
heap
page read and write
A31000
heap
page read and write
660000
unkown
page readonly
21968C6B000
system
page execute and read and write
6BA000
heap
page read and write
A31000
heap
page read and write
20B2A000
stack
page read and write
A31000
heap
page read and write
4B1000
unkown
page execute read
7FC10000
direct allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
290000
unkown
page readonly
C30000
trusted library allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
777E000
heap
page read and write
960000
unkown
page read and write
247C000
stack
page read and write
8AF000
stack
page read and write
A20000
unkown
page readonly
9B7000
heap
page read and write
779000
heap
page read and write
AB0000
heap
page read and write
A31000
heap
page read and write
22AC000
direct allocation
page read and write
740000
heap
page read and write
A31000
heap
page read and write
287B000
heap
page read and write
A31000
heap
page read and write
2104E000
stack
page read and write
2128E000
stack
page read and write
4BE000
unkown
page readonly
217E5000
heap
page read and write
22BA000
direct allocation
page read and write
C80000
unkown
page readonly
21968EA0000
heap
page read and write
948000
heap
page read and write
A31000
heap
page read and write
216E0000
heap
page read and write
A31000
heap
page read and write
28C82000
system
page read and write
7F210000
direct allocation
page read and write
215EC000
heap
page read and write
A31000
heap
page read and write
2196A800000
heap
page read and write
28FC000
heap
page read and write
73E000
heap
page read and write
2196AB01000
trusted library allocation
page read and write
774D000
heap
page read and write
21968ECB000
heap
page read and write
2770000
unkown
page readonly
A31000
heap
page read and write
7F9C0000
direct allocation
page read and write
24EE000
stack
page read and write
28A1000
heap
page read and write
28A1000
heap
page read and write
24840000
unclassified section
page execute and read and write
A31000
heap
page read and write
2170000
heap
page read and write
A31000
heap
page read and write
20A28000
direct allocation
page read and write
7970000
heap
page read and write
7FAC0000
direct allocation
page read and write
2196AA0C000
trusted library allocation
page read and write
20A21000
direct allocation
page read and write
314D000
direct allocation
page execute and read and write
28A0000
heap
page read and write
212D0000
remote allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
280C000
unkown
page read and write
7F100000
direct allocation
page read and write
9AD000
heap
page read and write
450000
unkown
page readonly
287D000
heap
page read and write
9EE000
heap
page read and write
A31000
heap
page read and write
1D7000
heap
page read and write
4C5000
unkown
page read and write
A31000
heap
page read and write
C03000
heap
page read and write
A31000
heap
page read and write
209D9000
direct allocation
page read and write
970000
unkown
page read and write
A31000
heap
page read and write
217F1000
heap
page read and write
94D000
heap
page read and write
732000
heap
page read and write
48D1000
heap
page read and write
7745000
heap
page read and write
7FB0F000
direct allocation
page read and write
A31000
heap
page read and write
28A5000
heap
page read and write
7D3E000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
660000
unkown
page readonly
A31000
heap
page read and write
7EE20000
direct allocation
page read and write
A31000
heap
page read and write
9CE000
heap
page read and write
9CE000
heap
page read and write
2894000
heap
page read and write
A31000
heap
page read and write
25B0000
unkown
page read and write
25D0000
heap
page read and write
48CE000
heap
page read and write
A31000
heap
page read and write
2440000
unkown
page readonly
A31000
heap
page read and write
7F0E0000
direct allocation
page read and write
A1C000
heap
page read and write
93C000
heap
page read and write
7795000
heap
page read and write
2C0B000
direct allocation
page execute and read and write
93C000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
BD0000
trusted library allocation
page read and write
A31000
heap
page read and write
2280000
direct allocation
page read and write
947000
heap
page read and write
A31000
heap
page read and write
AA1000
unkown
page readonly
29D0000
heap
page read and write
A31000
heap
page read and write
779B000
heap
page read and write
2196AA03000
trusted library allocation
page read and write
2196AA0F000
trusted library allocation
page read and write
2131E000
stack
page read and write
28A0000
heap
page read and write
A31000
heap
page read and write
21968E20000
heap
page read and write
2510000
heap
page read and write
A31000
heap
page read and write
5D0000
unkown
page read and write
947000
heap
page read and write
A31000
heap
page read and write
9BC000
heap
page read and write
B88000
heap
page read and write
5D0000
unkown
page read and write
A31000
heap
page read and write
7DBE000
stack
page read and write
226F0000
direct allocation
page execute and read and write
32F1000
direct allocation
page execute and read and write
7F200000
direct allocation
page read and write
2ABE000
direct allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
28F7000
heap
page read and write
A17000
heap
page read and write
BCD41FE000
stack
page read and write
A31000
heap
page read and write
280C000
unkown
page read and write
A3D000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A20000
unkown
page readonly
6B0000
heap
page read and write
A31000
heap
page read and write
93E000
heap
page read and write
2145E000
stack
page read and write
2888000
heap
page read and write
400000
unkown
page readonly
BCD39FE000
stack
page read and write
B80000
heap
page read and write
4B1000
unkown
page execute read
7759000
heap
page read and write
9E8000
heap
page read and write
215EA000
heap
page read and write
7FA2F000
direct allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
77B6000
heap
page read and write
77BF000
heap
page read and write
5C1000
unkown
page readonly
4C87000
system
page execute and read and write
209EF000
direct allocation
page read and write
785000
heap
page read and write
A31000
heap
page read and write
2FA000
stack
page read and write
7EEC0000
direct allocation
page read and write
A31000
heap
page read and write
22819000
direct allocation
page execute and read and write
C06000
heap
page read and write
4BE000
unkown
page readonly
A31000
heap
page read and write
2164E000
heap
page read and write
7EFB0000
direct allocation
page read and write
77B1000
heap
page read and write
20C6E000
stack
page read and write
3FC000
stack
page read and write
A8E000
stack
page read and write
BD0000
heap
page read and write
E81000
unkown
page readonly
3D58000
unclassified section
page read and write
3260000
unkown
page execute and read and write
7FB10000
direct allocation
page read and write
A31000
heap
page read and write
4AE000
stack
page read and write
A31000
heap
page read and write
289C000
heap
page read and write
76E000
heap
page read and write
355000
stack
page read and write
226E0000
heap
page read and write
2196A680000
trusted library allocation
page read and write
4C5000
unkown
page read and write
8F0000
trusted library allocation
page read and write
2860000
unkown
page execute and read and write
A31000
heap
page read and write
72D000
heap
page read and write
440000
unkown
page readonly
24EE000
stack
page read and write
28B0000
heap
page read and write
28AF000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
9D0000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
209E8000
direct allocation
page read and write
DD0000
unkown
page readonly
229D000
direct allocation
page read and write
A31000
heap
page read and write
28D8000
heap
page read and write
DCE000
stack
page read and write
7DC000
stack
page read and write
938000
heap
page read and write
8FF000
stack
page read and write
7740000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
28A5000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
2196A680000
trusted library allocation
page read and write
407C000
unclassified section
page read and write
7778000
heap
page read and write
7F8B0000
direct allocation
page read and write
A31000
heap
page read and write
2FA000
stack
page read and write
A31000
heap
page read and write
280000
unkown
page readonly
A31000
heap
page read and write
2F18000
unkown
page read and write
A31000
heap
page read and write
500000
unkown
page read and write
77B7000
heap
page read and write
A31000
heap
page read and write
54FA000
unkown
page execute and read and write
401000
unkown
page execute read
A31000
heap
page read and write
B80000
heap
page read and write
7F2C0000
direct allocation
page read and write
2895000
heap
page read and write
46F000
unkown
page read and write
7CFC000
stack
page read and write
4A20000
direct allocation
page read and write
9A8000
heap
page read and write
A31000
heap
page read and write
776E000
heap
page read and write
2099E000
direct allocation
page read and write
29284000
system
page read and write
A11000
heap
page read and write
9D0000
heap
page read and write
4BE000
unkown
page readonly
A31000
heap
page read and write
C06000
heap
page read and write
A31000
heap
page read and write
7FAA0000
direct allocation
page read and write
4C7000
unkown
page readonly
A31000
heap
page read and write
784000
heap
page read and write
7DFF000
stack
page read and write
9F2000
heap
page read and write
24F0000
heap
page read and write
77B9000
heap
page read and write
4660000
unkown
page execute and read and write
2A91000
direct allocation
page execute read
BD0000
trusted library allocation
page read and write
64E000
stack
page read and write
795C000
stack
page read and write
7747000
heap
page read and write
3432000
unclassified section
page read and write
229BD000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
2515000
heap
page read and write
2114D000
stack
page read and write
A31000
heap
page read and write
3FB000
stack
page read and write
215E1000
heap
page read and write
323C000
unkown
page read and write
68E000
stack
page read and write
A31000
heap
page read and write
22D0000
heap
page read and write
774F000
heap
page read and write
2281D000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
430000
unkown
page readonly
289C000
heap
page read and write
21968EA7000
heap
page read and write
A31000
heap
page read and write
504000
unkown
page write copy
947000
heap
page read and write
28AA000
heap
page read and write
20F0E000
stack
page read and write
4C7000
unkown
page readonly
2196AA15000
trusted library allocation
page read and write
2870000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
2440000
unkown
page readonly
745000
heap
page read and write
CE0000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
7F90F000
direct allocation
page read and write
727000
heap
page read and write
7FA80000
direct allocation
page read and write
7EF60000
direct allocation
page read and write
A90000
unkown
page read and write
9D8000
heap
page read and write
4F4F000
stack
page read and write
B90000
unkown
page read and write
BD8000
heap
page read and write
3FC000
stack
page read and write
777000
heap
page read and write
A31000
heap
page read and write
238F000
stack
page read and write
774A000
heap
page read and write
B9F000
heap
page read and write
7F270000
direct allocation
page read and write
78C000
heap
page read and write
2196ABCE000
trusted library allocation
page read and write
2336000
heap
page read and write
218F0000
direct allocation
page execute and read and write
460000
heap
page read and write
28CDC000
system
page read and write
A31000
heap
page read and write
73E000
heap
page read and write
28EF000
heap
page read and write
22A4000
direct allocation
page read and write
28BC000
heap
page read and write
283F000
stack
page read and write
2430000
heap
page read and write
49D0000
direct allocation
page read and write
21968EAF000
heap
page read and write
28AA000
heap
page read and write
2330000
heap
page read and write
9E5000
heap
page read and write
25F2000
unkown
page read and write
7FAF0000
direct allocation
page read and write
2770000
unkown
page readonly
DCF000
stack
page read and write
9C1000
heap
page read and write
28A0000
heap
page read and write
75E000
heap
page read and write
7F1A0000
direct allocation
page read and write
4B0000
unkown
page readonly
A31000
heap
page read and write
23E40000
unclassified section
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
733000
heap
page read and write
787000
heap
page read and write
7DC000
stack
page read and write
A31000
heap
page read and write
C80000
unkown
page readonly
4B0000
unkown
page readonly
7820000
trusted library allocation
page read and write
A31000
heap
page read and write
6DA000
stack
page read and write
7F210000
direct allocation
page read and write
A31000
heap
page read and write
78D000
heap
page read and write
2870000
heap
page read and write
A31000
heap
page read and write
4D04000
system
page execute and read and write
9DE000
heap
page read and write
733000
heap
page read and write
21968C30000
system
page execute and read and write
A31000
heap
page read and write
6EF000
heap
page read and write
A10000
unkown
page readonly
A31000
heap
page read and write
216F4000
heap
page read and write
A31000
heap
page read and write
5B0000
unkown
page read and write
780000
heap
page read and write
49D0000
direct allocation
page read and write
21968EBC000
heap
page read and write
A31000
heap
page read and write
28E9C000
system
page read and write
8FF000
stack
page read and write
77A1000
heap
page read and write
280000
unkown
page readonly
25B0000
unkown
page read and write
4B1000
unkown
page execute read
285E000
heap
page read and write
B90000
unkown
page read and write
BF7000
heap
page read and write
A31000
heap
page read and write
4C5000
unkown
page read and write
8E0000
heap
page read and write
4740000
heap
page read and write
D66000
heap
page read and write
2660000
heap
page read and write
A31000
heap
page read and write
DD0000
unkown
page readonly
450000
unkown
page readonly
A31000
heap
page read and write
509000
unkown
page readonly
7F387000
direct allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
7FA50000
direct allocation
page read and write
A31000
heap
page read and write
22F0000
direct allocation
page execute and read and write
288A000
heap
page read and write
28AA000
heap
page read and write
216F8000
heap
page read and write
348C000
unclassified section
page read and write
2532000
unkown
page read and write
C20000
heap
page read and write
31BE000
direct allocation
page execute and read and write
638000
stack
page read and write
215F0000
heap
page read and write
773B000
heap
page read and write
7F000000
direct allocation
page read and write
752000
heap
page read and write
A31000
heap
page read and write
212D0000
remote allocation
page read and write
7D7F000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
216FC000
heap
page read and write
A31000
heap
page read and write
2B17000
direct allocation
page execute and read and write
A31000
heap
page read and write
520000
heap
page read and write
74E000
heap
page read and write
A31000
heap
page read and write
28B7000
heap
page read and write
3EEA000
unclassified section
page read and write
There are 830 hidden memdumps, click here to show them.