IOC Report
Payment&WarantyBonds.bat

loading gif

Files

File Path
Type
Category
Malicious
Payment&WarantyBonds.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment&WarantyBonds.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4648H9mUM
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment&WarantyBonds.exe
"C:\Users\user\Desktop\Payment&WarantyBonds.exe"
malicious
C:\Users\user\Desktop\Payment&WarantyBonds.exe
"C:\Users\user\Desktop\Payment&WarantyBonds.exe"
malicious
C:\Program Files (x86)\fYDLcCyaMmIgCIuJvQtuhYKweaZKobtovnkkWnpRVzoAFQNOKevwszFmxGofsYScF\lVlYtqLlYCJP.exe
"C:\Program Files (x86)\fYDLcCyaMmIgCIuJvQtuhYKweaZKobtovnkkWnpRVzoAFQNOKevwszFmxGofsYScF\lVlYtqLlYCJP.exe"
malicious
C:\Windows\SysWOW64\systeminfo.exe
"C:\Windows\SysWOW64\systeminfo.exe"
malicious
C:\Program Files (x86)\fYDLcCyaMmIgCIuJvQtuhYKweaZKobtovnkkWnpRVzoAFQNOKevwszFmxGofsYScF\lVlYtqLlYCJP.exe
"C:\Program Files (x86)\fYDLcCyaMmIgCIuJvQtuhYKweaZKobtovnkkWnpRVzoAFQNOKevwszFmxGofsYScF\lVlYtqLlYCJP.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.cotti.club/3ej6/?78=Gf4n60vPMxeL0A+d5GBWdueSYaV7AAF6sYlT7O2otcMNGwtil4ITBlU9iT/EVO+vtwlhWFB1C/mfTw8URcWhMQgTObTwj1m/ib0JAzzbicsZX3cTLGstzzo=&hrOd=1DzdIBZXhZaHw2Wp
103.120.80.111
malicious
http://www.091210.xyz/jwed/?hrOd=1DzdIBZXhZaHw2Wp&78=BP+RnxL4kRmCbJis2H94uci3abF0xOX/uWRdW7IS0nQn3eBqrLGhokpRAgB0njlljCrnZN3jlOJi4UAaeIXlep/T+OgRPR3ifAipJWCHkORcjZ0KtUFfU2c=
172.67.154.67
malicious
http://www.297676.com/xyex/?78=GRv8gXQeeb2Gl8ts68dy26JEIDOFTPQDU1Y3CPEivIL54q3aRuVfXNser16Tn8T/OBl4IICKxXKXWQiZ2Uzn7HwRtVNzQ2FbKXtno3vR39Y/zqEhWKkV0ww=&hrOd=1DzdIBZXhZaHw2Wp
199.59.243.227
malicious
http://www.extrime1.shop/jr4j/
152.42.255.48
malicious
http://www.xipowerplay.xyz/akxn/
13.248.169.48
malicious
http://www.xipowerplay.xyz/akxn/?hrOd=1DzdIBZXhZaHw2Wp&78=bVCpbCQOZK8RJSSOpbtjW6178FykoGhXFODVqYypnT+nS+pakzyDZ3G2gJzbbKB5bmDBooJSbxoFgw5n88RQ4gN+spy4B3V2SPR8yfMM1NLM4EIxe0ofqks=
13.248.169.48
malicious
http://www.030002059.xyz/2sun/?78=HFv57CWzV4D1L9ubGrUw/N+LZZ6BniYLjcS4cRbGENzhA3BKZjtgqnC6wzdpxcsL4M445YXmdmOqKzt/9+uXSXCfKbs+tX0lmfcjUf3N9oWc/wvfMeYS2jQ=&hrOd=1DzdIBZXhZaHw2Wp
161.97.142.144
malicious
http://www.iampinky.info/nhtq/?78=0+mU6fX4mGgH3aI4KvnZ0Dnt9NN9uhfQ4WQLoO9YJQq1rLkiV3mWe/ShpiWb6GRwN8XKSHyyPlz1ODC2MK0vYsx4EzdsG0j0QesGBnWjRvygBOdKdkC21k4=&hrOd=1DzdIBZXhZaHw2Wp
3.33.130.190
malicious
http://www.cesach.net/dma3/?hrOd=1DzdIBZXhZaHw2Wp&78=IhPPRAmDChEnx8G5Mk3wYKJVvliqClSy7lT3/i9hniKwN2WP3nmtzIAyaYX2MoR3jQRU/NaT7iTCvd3O/fPSuEFMVnQWNGAOAVxjgpJaGw2AUh+P10Czoew=
217.76.156.252
malicious
http://www.stationseek.online/wd23/?78=hRp9+v2en7tRz1flyqG17kFmttLc1zOskyKd0ztIjTxyYqd810hmijNQE9yj6BxK05vUksKTuuJXofOYLi9PR6uwuESMYbomdUS7hY3ZEsqPIlhTOHkKZSQ=&hrOd=1DzdIBZXhZaHw2Wp
198.251.84.200
malicious
http://www.091210.xyz/jwed/
172.67.154.67
malicious
http://www.adsa6c.top/wr26/
20.2.249.7
malicious
http://www.simplek.top/ep69/?78=1FIMhSJhU8+lHAAmrS+FlWYlLXz7aIiZYVZCfaZw4D7e7Ym+VFULEmTMy/HAB+T+rsRxHszMTzww+hC5XQWyLoZ+L/5l/vKoQeg/i8EmIWt3MnVCcXzM6O0=&hrOd=1DzdIBZXhZaHw2Wp
203.161.49.193
malicious
http://www.cotti.club/3ej6/
103.120.80.111
malicious
http://www.030002059.xyz/2sun/
161.97.142.144
malicious
http://www.solarand.online/diem/?hrOd=1DzdIBZXhZaHw2Wp&78=6kQoSQEqBTKFeIgPWItcwMtJ6+nSmUORx6o6L7StlLAM0wJa+kMHFj5rDbCqKJO5phAeVuacSteB2VMr/yCaTx+wFCn7HbSrd9uZdvfw4QtNwXqKd1ZsMRg=
217.160.0.60
malicious
http://www.basicreviews.online/3xn5/
144.76.190.39
malicious
http://www.adsa6c.top/wr26/?78=8UnATjvfTpQ77jvixFCgWVUX2yh4jGZbjC17bXoElnpRCxInjgnE/2IqsqXHODoNl6OiDfBQBXM7D7XvNANc8/XGVjRwEyGKTULZaqlRQkXooaUfX5GSz0A=&hrOd=1DzdIBZXhZaHw2Wp
20.2.249.7
malicious
http://www.297676.com/xyex/
199.59.243.227
malicious
http://www.solarand.online/diem/
217.160.0.60
malicious
http://www.stationseek.online/wd23/
198.251.84.200
malicious
http://www.cesach.net/dma3/
217.76.156.252
malicious
http://www.basicreviews.online/3xn5/?78=hLX784qEA4n55Q1oGw1olOPE1jv2cb5vRwpnfGUpuE0YTY8y9L6/CN63cm0behm+qDJgSuJj8e8DxEJz6zH1lBsEYFc4WGfLLcwXK2bqtXGi64JZ82gh2/U=&hrOd=1DzdIBZXhZaHw2Wp
144.76.190.39
malicious
http://www.simplek.top/ep69/
203.161.49.193
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://piensasolutions.com/css/parking2.css
unknown
http://www.fontbureau.com/designers?
unknown
http://www.stationseek.online/wd23?78=hRp9
unknown
https://www.west.cn/services/mail/
unknown
http://www.tiro.com
unknown
https://piensasolutions.com/imgs/parking/icon-desplegar.jpg
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.piensasolutions.com/ssl?utm_source=parking&utm_medium=link&utm_campaign=correo
unknown
http://www.sgland06.online/33ib/?hrOd=1DzdIBZXhZaHw2Wp&78=AYOfApeu9cghctp2i/KTSy5LkW4tz9x7+arej5d+r0NkQieZykYOddwLhoh5ni50J8Z5WiAS8Adn1ZwJ2laV/jmSd394ohUQohZCg1IJ+kicD56x/bghldI=
34.92.128.59
http://www.basicreviews.online/cgi-sys/suspendedpage.cgi?78=hLX784qEA4n55Q1oGw1olOPE1jv2cb5vRwpnfGUp
unknown
https://www.piensasolutions.com/certificado-ssl?utm_source=parking&utm_medium=link&utm_campa
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://www.google.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://hm.baidu.com/hm.js?352bf0fb165ca7ab634d3cea879c7a72
unknown
https://www.west.cn/cloudhost/
unknown
https://www.west.cn/ykj/view.asp?domain=cotti.club
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://www.piensasolutions.com?utm_source=parking&utm_medium=link&utm_campaign=piensa
unknown
http://www.sakkal.com
unknown
https://www.piensasolutions.com/crear-web?utm_source=parking&utm_medium=link&utm_campaign=we
unknown
https://shop.piensasolutions.com/search-ajax.php?utm_source=parking&utm_medium=link&utm_camp
unknown
http://www.extrime1.shop
unknown
https://www.strato.de
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://piensasolutions.com/imgs/parking/icon-ssl-parking.png
unknown
https://www.west.cn/services/webhosting/
unknown
https://plus.google.com/u/0/102310483732773374239
unknown
https://www.west.cn/services/domain/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)
unknown
https://www.ecosia.org/newtab/
unknown
http://www.sgland06.online/33ib/
34.92.128.59
https://piensasolutions.com/imgs/parking/icon-hosting.png
unknown
https://piensasolutions.com/imgs/parking/icon-web.png
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
https://www.piensasolutions.com/web-sencilla?utm_source=parking&utm_medium=link&utm_campaign
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.piensasolutions.com/dominios?utm_source=parking&utm_medium=link&utm_campaign=dom
unknown
https://www.piensasolutions.com/hosting?utm_source=parking&utm_medium=link&utm_campaign=host
unknown
https://piensasolutions.com/imgs/parking/icon-parking.png
unknown
https://www.west.cn/jiaoyi/
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://piensasolutions.com/imgs/parking/icon-facebook-small.png
unknown
http://www.fontbureau.com/designers8
unknown
https://piensasolutions.com/imgs/parking/icon-twitter-small.png
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://twitter.com/piensasolutions
unknown
https://piensasolutions.com/imgs/parking/icon-web-sencilla.png
unknown
There are 82 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.cotti.club
103.120.80.111
malicious
solarand.online
217.160.0.60
malicious
www.simplek.top
203.161.49.193
malicious
extrime1.shop
152.42.255.48
malicious
www.cesach.net
217.76.156.252
malicious
basicreviews.online
144.76.190.39
malicious
www.091210.xyz
172.67.154.67
malicious
www.adsa6c.top
20.2.249.7
malicious
www.297676.com
199.59.243.227
malicious
www.xipowerplay.xyz
13.248.169.48
malicious
www.030002059.xyz
161.97.142.144
malicious
iampinky.info
3.33.130.190
malicious
stationseek.online
198.251.84.200
malicious
www.sgland06.online
34.92.128.59
www.solarand.online
unknown
www.extrime1.shop
unknown
www.stationseek.online
unknown
www.iampinky.info
unknown
www.basicreviews.online
unknown
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.154.67
www.091210.xyz
United States
malicious
13.248.169.48
www.xipowerplay.xyz
United States
malicious
20.2.249.7
www.adsa6c.top
United States
malicious
144.76.190.39
basicreviews.online
Germany
malicious
199.59.243.227
www.297676.com
United States
malicious
217.160.0.60
solarand.online
Germany
malicious
198.251.84.200
stationseek.online
United States
malicious
161.97.142.144
www.030002059.xyz
United States
malicious
203.161.49.193
www.simplek.top
Malaysia
malicious
103.120.80.111
www.cotti.club
Hong Kong
malicious
3.33.130.190
iampinky.info
United States
malicious
152.42.255.48
extrime1.shop
United States
malicious
217.76.156.252
www.cesach.net
Spain
malicious
34.92.128.59
www.sgland06.online
United States
There are 4 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
41D0000
unkown
page execute and read and write
malicious
1740000
unclassified section
page execute and read and write
malicious
4570000
trusted library allocation
page read and write
malicious
4A70000
system
page execute and read and write
malicious
5B0000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4520000
trusted library allocation
page read and write
malicious
31C0000
unclassified section
page execute and read and write
malicious
4351000
heap
page read and write
853E000
stack
page read and write
800000
unkown
page readonly
43A000
stack
page read and write
4351000
heap
page read and write
4CDC000
unkown
page read and write
7845000
heap
page read and write
4351000
heap
page read and write
860000
heap
page read and write
4351000
heap
page read and write
8D4000
heap
page read and write
ACE000
stack
page read and write
4981000
direct allocation
page execute and read and write
3EB74000
system
page read and write
550000
unkown
page readonly
830000
unkown
page read and write
560000
unkown
page readonly
4351000
heap
page read and write
4351000
heap
page read and write
4456000
heap
page read and write
2631000
trusted library allocation
page read and write
7825000
heap
page read and write
2677000
trusted library allocation
page read and write
9FD000
heap
page read and write
CB0000
trusted library allocation
page read and write
B00000
unkown
page readonly
20D39FB000
stack
page read and write
12580000000
heap
page read and write
3E4B2000
system
page read and write
247C000
unkown
page read and write
786E000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
1721000
unkown
page readonly
4D30000
heap
page read and write
4F20000
heap
page read and write
4351000
heap
page read and write
469E000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
873E000
stack
page read and write
1230000
heap
page read and write
4351000
heap
page read and write
A02000
heap
page read and write
4670000
trusted library allocation
page read and write
4351000
heap
page read and write
10F0000
unkown
page read and write
1080000
unkown
page readonly
4351000
heap
page read and write
69E000
stack
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
66A0000
trusted library allocation
page read and write
B00000
unkown
page readonly
4F30000
heap
page read and write
7869000
heap
page read and write
263C000
unkown
page read and write
5E04000
unclassified section
page read and write
6B1000
unkown
page readonly
4351000
heap
page read and write
A667000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
10A4000
heap
page read and write
45C0000
trusted library allocation
page read and write
940000
unkown
page readonly
3E8E000
unkown
page read and write
4D20000
heap
page read and write
12580401000
trusted library allocation
page read and write
121F000
stack
page read and write
36B4000
unkown
page read and write
814000
heap
page read and write
70EE000
stack
page read and write
580000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
10EE000
stack
page read and write
772000
trusted library allocation
page read and write
E60000
unkown
page readonly
4351000
heap
page read and write
AAE000
heap
page read and write
560000
unkown
page readonly
4D0C000
stack
page read and write
13A5000
heap
page read and write
2D30000
heap
page read and write
4351000
heap
page read and write
6EAE000
stack
page read and write
730000
trusted library allocation
page read and write
1C1F000
stack
page read and write
1470000
heap
page read and write
1080000
unkown
page readonly
4AF0000
system
page execute and read and write
4F39000
heap
page read and write
783B000
heap
page read and write
7B8000
heap
page read and write
57BC000
unclassified section
page read and write
37D0000
unkown
page execute and read and write
C8E000
stack
page read and write
7F1000
heap
page read and write
790000
trusted library allocation
page read and write
4351000
heap
page read and write
830000
heap
page read and write
2D48000
unkown
page read and write
6722000
trusted library allocation
page read and write
7FB50000
trusted library allocation
page execute and read and write
777000
trusted library allocation
page execute and read and write
484E000
direct allocation
page execute and read and write
125FE750000
heap
page read and write
B20000
unkown
page readonly
6A0000
unkown
page read and write
77B000
trusted library allocation
page execute and read and write
2362000
unkown
page read and write
840000
heap
page read and write
46B0000
direct allocation
page execute and read and write
4BDC000
unkown
page read and write
E47000
unkown
page readonly
743000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
4351000
heap
page read and write
25DE000
trusted library allocation
page read and write
6E6000
heap
page read and write
4B80000
unkown
page read and write
4351000
heap
page read and write
BE0000
unkown
page readonly
2D10000
heap
page read and write
6A0000
unkown
page read and write
A02000
heap
page read and write
125FE77B000
heap
page read and write
AC0E000
stack
page read and write
578000
stack
page read and write
4F10000
heap
page read and write
125FE565000
system
page execute and read and write
A53000
heap
page read and write
4AC8000
system
page execute and read and write
4351000
heap
page read and write
E3E000
unkown
page readonly
550000
unkown
page readonly
12580311000
trusted library allocation
page read and write
8B0000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
F5C000
stack
page read and write
4351000
heap
page read and write
BD0000
unkown
page readonly
125FE759000
heap
page read and write
802F000
stack
page read and write
125FE782000
heap
page read and write
7BE000
heap
page read and write
2600000
trusted library allocation
page read and write
4629000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
20D41FD000
stack
page read and write
266A000
trusted library allocation
page read and write
4350000
heap
page read and write
B20000
unkown
page readonly
25CB000
trusted library allocation
page read and write
4351000
heap
page read and write
E31000
unkown
page execute read
4351000
heap
page read and write
AD0D000
stack
page read and write
B8A000
stack
page read and write
A3F000
heap
page read and write
A50000
heap
page read and write
1C0000
unkown
page readonly
2664000
trusted library allocation
page read and write
A5A000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
7EE000
heap
page read and write
4351000
heap
page read and write
125FE520000
system
page execute and read and write
7836000
heap
page read and write
4351000
heap
page read and write
858000
heap
page read and write
4D50000
trusted library allocation
page execute and read and write
4BCC000
unclassified section
page read and write
892000
heap
page read and write
847000
heap
page read and write
1258030F000
trusted library allocation
page read and write
2270000
unkown
page readonly
7848000
heap
page read and write
BD0000
unkown
page readonly
25E1000
trusted library allocation
page read and write
5498000
unclassified section
page read and write
25BE000
stack
page read and write
1B0000
unkown
page readonly
16EE000
stack
page read and write
A95000
heap
page read and write
1A0000
unkown
page readonly
4351000
heap
page read and write
53B000
stack
page read and write
370000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
E30000
unkown
page readonly
E10000
unkown
page read and write
848000
heap
page read and write
7876000
heap
page read and write
896000
heap
page read and write
12580160000
heap
page read and write
753000
trusted library allocation
page read and write
125804CE000
trusted library allocation
page read and write
4AB2000
unclassified section
page read and write
2EDA000
unkown
page read and write
3639000
trusted library allocation
page read and write
2BB6000
unkown
page read and write
6C0000
unkown
page read and write
9FD000
heap
page read and write
4351000
heap
page read and write
E3E000
unkown
page readonly
4351000
heap
page read and write
4351000
heap
page read and write
A3F000
heap
page read and write
4B33000
heap
page read and write
4351000
heap
page read and write
ECC000
stack
page read and write
196E000
direct allocation
page execute and read and write
396000
unkown
page read and write
E31000
unkown
page execute read
4351000
heap
page read and write
4351000
heap
page read and write
A5A000
heap
page read and write
74D000
trusted library allocation
page execute and read and write
4351000
heap
page read and write
4351000
heap
page read and write
18FD000
direct allocation
page execute and read and write
12580020000
trusted library allocation
page read and write
4F15000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
6B1000
unkown
page readonly
7CF000
heap
page read and write
125804BE000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
75D000
trusted library allocation
page execute and read and write
A24000
heap
page read and write
AB3000
heap
page read and write
4351000
heap
page read and write
4450000
trusted library allocation
page read and write
830000
unkown
page read and write
76A000
trusted library allocation
page execute and read and write
E31000
unkown
page execute read
4351000
heap
page read and write
2422000
unkown
page read and write
462D000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
39D8000
unkown
page read and write
AE0000
heap
page read and write
4351000
heap
page read and write
C90000
trusted library allocation
page read and write
9F7000
heap
page read and write
3E5CC000
system
page read and write
6B00000
heap
page read and write
A67000
heap
page read and write
7D7000
heap
page read and write
3846000
unkown
page read and write
125FE75F000
heap
page read and write
E3E000
unkown
page readonly
20D49FE000
stack
page read and write
12580020000
trusted library allocation
page read and write
306C000
unkown
page read and write
4351000
heap
page read and write
BF0000
heap
page read and write
4D60000
trusted library allocation
page read and write
15AE000
stack
page read and write
4F5E000
heap
page read and write
4351000
heap
page read and write
47DD000
direct allocation
page execute and read and write
190000
unkown
page readonly
4351000
heap
page read and write
9E8000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
1378000
heap
page read and write
766000
trusted library allocation
page execute and read and write
4351000
heap
page read and write
3BE000
stack
page read and write
12580303000
trusted library allocation
page read and write
4351000
heap
page read and write
760000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
4351000
heap
page read and write
65DE000
unclassified section
page read and write
4351000
heap
page read and write
3E87000
trusted library allocation
page read and write
30A000
stack
page read and write
4351000
heap
page read and write
1298000
heap
page read and write
62BA000
unclassified section
page read and write
E3E000
unkown
page readonly
594E000
unclassified section
page read and write
4AD0000
heap
page read and write
2270000
unkown
page readonly
4351000
heap
page read and write
4D8C000
unclassified section
page read and write
4D10000
trusted library section
page readonly
2BD0000
heap
page read and write
3B6A000
unkown
page read and write
4B46000
system
page execute and read and write
49F2000
direct allocation
page execute and read and write
E30000
unkown
page readonly
A32000
heap
page read and write
A08000
heap
page read and write
12580300000
trusted library allocation
page read and write
4351000
heap
page read and write
7830000
heap
page read and write
4AD4000
system
page execute and read and write
4351000
heap
page read and write
2DD0000
unkown
page execute and read and write
4351000
heap
page read and write
A88000
heap
page read and write
4351000
heap
page read and write
12580020000
trusted library allocation
page read and write
E47000
unkown
page readonly
125FE568000
system
page execute and read and write
4351000
heap
page read and write
A67000
heap
page read and write
4351000
heap
page read and write
8C0000
heap
page read and write
887E000
stack
page read and write
A70000
heap
page read and write
4351000
heap
page read and write
8A2000
heap
page read and write
1298000
heap
page read and write
4358000
heap
page read and write
6FAE000
stack
page read and write
4351000
heap
page read and write
3631000
trusted library allocation
page read and write
4351000
heap
page read and write
77EE000
stack
page read and write
BF0000
heap
page read and write
10F0000
unkown
page read and write
2620000
heap
page execute and read and write
A02000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
E47000
unkown
page readonly
1B18000
direct allocation
page execute and read and write
7865000
heap
page read and write
53C000
stack
page read and write
43A000
stack
page read and write
125FE6F0000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
1DB0000
heap
page read and write
4351000
heap
page read and write
1B0000
unkown
page readonly
A02000
heap
page read and write
4351000
heap
page read and write
580000
heap
page read and write
1A81000
direct allocation
page execute and read and write
AA10000
heap
page read and write
4351000
heap
page read and write
125FE77F000
heap
page read and write
4351000
heap
page read and write
A81000
heap
page read and write
27C0000
unclassified section
page execute and read and write
18F9000
direct allocation
page execute and read and write
6DEE000
unkown
page read and write
1720000
unkown
page readonly
4AE4000
system
page execute and read and write
263C000
unkown
page read and write
3E572000
system
page read and write
ACB000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
360000
heap
page read and write
4351000
heap
page read and write
38CD000
unclassified section
page execute and read and write
BC0000
unkown
page readonly
4351000
heap
page read and write
E47000
unkown
page readonly
4351000
heap
page read and write
4351000
heap
page read and write
12D0000
heap
page read and write
4351000
heap
page read and write
1110000
heap
page read and write
4351000
heap
page read and write
2CE0000
unkown
page readonly
7B60000
heap
page read and write
E45000
unkown
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
9F9000
heap
page read and write
BEE000
stack
page read and write
70AE000
stack
page read and write
4351000
heap
page read and write
4A70000
trusted library allocation
page read and write
D17000
heap
page read and write
BC0000
unkown
page readonly
740000
trusted library allocation
page read and write
4F0D000
stack
page read and write
66D0000
trusted library allocation
page execute and read and write
AA8000
heap
page read and write
848000
heap
page read and write
4351000
heap
page read and write
31FE000
unkown
page read and write
7EF000
stack
page read and write
1390000
unkown
page readonly
A7E000
heap
page read and write
1C2000
unkown
page readonly
4351000
heap
page read and write
4351000
heap
page read and write
1290000
heap
page read and write
562A000
unclassified section
page read and write
B8A000
stack
page read and write
74F0000
trusted library allocation
page read and write
20D51FF000
stack
page read and write
E11000
unkown
page readonly
4351000
heap
page read and write
50D0000
trusted library section
page read and write
AD0000
trusted library allocation
page read and write
4B72000
unclassified section
page read and write
864000
heap
page read and write
3E78C000
system
page read and write
A50000
heap
page read and write
4351000
heap
page read and write
125FE600000
heap
page read and write
4351000
heap
page read and write
1A96000
direct allocation
page execute and read and write
7A0000
trusted library allocation
page execute and read and write
4351000
heap
page read and write
66E0000
trusted library allocation
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
7840000
heap
page read and write
C00000
trusted library allocation
page execute and read and write
A6B000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
814000
heap
page read and write
4351000
heap
page read and write
B10000
unkown
page readonly
A40000
heap
page read and write
4670000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
6E0000
heap
page read and write
5F96000
unclassified section
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
2CDF000
stack
page read and write
840000
heap
page read and write
4351000
heap
page read and write
5C72000
unclassified section
page read and write
4B20000
trusted library allocation
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
6D0000
heap
page read and write
3EC8000
trusted library allocation
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
6CED000
heap
page read and write
2CE0000
unkown
page readonly
4351000
heap
page read and write
4351000
heap
page read and write
6B0E000
heap
page read and write
4351000
heap
page read and write
1A0000
unkown
page readonly
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
6C0000
unkown
page read and write
4351000
heap
page read and write
E60000
unkown
page readonly
447B000
heap
page read and write
4351000
heap
page read and write
1220000
heap
page read and write
5306000
unclassified section
page read and write
4351000
heap
page read and write
6CD7000
heap
page read and write
7854000
heap
page read and write
48DD000
unkown
page execute and read and write
E30000
unkown
page readonly
3390000
unkown
page read and write
3CFC000
unkown
page read and write
8D4000
heap
page read and write
1DC0000
unclassified section
page execute and read and write
6E2D000
unkown
page read and write
A08000
heap
page read and write
1390000
unkown
page readonly
7FEE000
stack
page read and write
787E000
heap
page read and write
FCA000
stack
page read and write
4351000
heap
page read and write
6F7000
stack
page read and write
AFF0000
trusted library section
page read and write
4351000
heap
page read and write
A09000
heap
page read and write
4351000
heap
page read and write
CC0000
heap
page read and write
28BC000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
E00000
unkown
page read and write
4351000
heap
page read and write
CB5000
trusted library allocation
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
10A4000
heap
page read and write
4AF0000
trusted library allocation
page execute and read and write
16F0000
direct allocation
page read and write
E45000
unkown
page read and write
12580313000
trusted library allocation
page read and write
877E000
stack
page read and write
7B0000
heap
page read and write
810000
heap
page read and write
4351000
heap
page read and write
863E000
stack
page read and write
125804C4000
trusted library allocation
page read and write
4A00000
trusted library allocation
page execute and read and write
C4D000
stack
page read and write
A02000
heap
page read and write
762000
trusted library allocation
page read and write
1A9D000
direct allocation
page execute and read and write
D0E000
stack
page read and write
4351000
heap
page read and write
4500000
heap
page read and write
5AE0000
unclassified section
page read and write
A02000
heap
page read and write
4351000
heap
page read and write
2A24000
unkown
page read and write
744000
trusted library allocation
page read and write
E30000
unkown
page readonly
4351000
heap
page read and write
1258030A000
trusted library allocation
page read and write
4351000
heap
page read and write
4AC0000
heap
page execute and read and write
12580200000
trusted library allocation
page read and write
497D000
direct allocation
page execute and read and write
4351000
heap
page read and write
4351000
heap
page read and write
A8F000
stack
page read and write
66E6000
trusted library allocation
page read and write
4351000
heap
page read and write
A45000
heap
page read and write
6C90000
heap
page read and write
E31000
unkown
page execute read
4670000
trusted library allocation
page read and write
4351000
heap
page read and write
106E000
stack
page read and write
1370000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
F5C000
stack
page read and write
B10000
unkown
page readonly
53C000
stack
page read and write
125804A5000
trusted library allocation
page read and write
2362000
unkown
page read and write
6128000
unclassified section
page read and write
1110000
heap
page read and write
9E0000
heap
page read and write
12580321000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
D0B000
stack
page read and write
9F7000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
D10000
heap
page read and write
125FE782000
heap
page read and write
4AE2000
trusted library allocation
page read and write
125FE76C000
heap
page read and write
10A0000
heap
page read and write
AB9000
heap
page read and write
4351000
heap
page read and write
E45000
unkown
page read and write
1290000
heap
page read and write
BE0000
unkown
page readonly
810000
heap
page read and write
6D0000
heap
page read and write
10A0000
heap
page read and write
750000
trusted library allocation
page read and write
4B30000
heap
page read and write
25ED000
trusted library allocation
page read and write
800000
unkown
page readonly
17D0000
direct allocation
page execute and read and write
E20000
unkown
page read and write
5174000
unclassified section
page read and write
4351000
heap
page read and write
570000
unkown
page readonly
6700000
trusted library allocation
page read and write
4351000
heap
page read and write
4AA0000
heap
page read and write
E0F000
stack
page read and write
3522000
unkown
page read and write
4351000
heap
page read and write
190000
unkown
page readonly
A53000
heap
page read and write
570000
unkown
page readonly
77AE000
stack
page read and write
4351000
heap
page read and write
2BD0000
heap
page read and write
644C000
unclassified section
page read and write
47D9000
direct allocation
page execute and read and write
25E6000
trusted library allocation
page read and write
E11000
unkown
page readonly
4351000
heap
page read and write
472C000
stack
page read and write
E00000
unkown
page read and write
6CC4000
heap
page read and write
8D0000
heap
page read and write
6DAE000
unkown
page read and write
940000
unkown
page readonly
4351000
heap
page read and write
E45000
unkown
page read and write
8D4000
heap
page read and write
4351000
heap
page read and write
1260000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
16AE000
stack
page read and write
E20000
unkown
page read and write
3FE000
stack
page read and write
85C000
heap
page read and write
4351000
heap
page read and write
785E000
heap
page read and write
4351000
heap
page read and write
4351000
heap
page read and write
CA0000
trusted library allocation
page read and write
27C000
unkown
page readonly
4351000
heap
page read and write
4F70000
heap
page read and write
There are 629 hidden memdumps, click here to show them.