IOC Report
18in SPA-198-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
18in SPA-198-2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\18in SPA-198-2024.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ea64OHKq
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\18in SPA-198-2024.exe
"C:\Users\user\Desktop\18in SPA-198-2024.exe"
malicious
C:\Users\user\Desktop\18in SPA-198-2024.exe
"C:\Users\user\Desktop\18in SPA-198-2024.exe"
malicious
C:\Users\user\Desktop\18in SPA-198-2024.exe
"C:\Users\user\Desktop\18in SPA-198-2024.exe"
malicious
C:\Program Files (x86)\JGsUfsfkLEFnOUVXpIEOrlgysqKPOBUvlJcqviynHOcrBjfmZdhmJJBY\tWcBthnLrDi.exe
"C:\Program Files (x86)\JGsUfsfkLEFnOUVXpIEOrlgysqKPOBUvlJcqviynHOcrBjfmZdhmJJBY\tWcBthnLrDi.exe"
malicious
C:\Windows\SysWOW64\colorcpl.exe
"C:\Windows\SysWOW64\colorcpl.exe"
malicious
C:\Program Files (x86)\JGsUfsfkLEFnOUVXpIEOrlgysqKPOBUvlJcqviynHOcrBjfmZdhmJJBY\tWcBthnLrDi.exe
"C:\Program Files (x86)\JGsUfsfkLEFnOUVXpIEOrlgysqKPOBUvlJcqviynHOcrBjfmZdhmJJBY\tWcBthnLrDi.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.college-help.info/lk0h/
38.88.82.56
malicious
http://www.owinvip.net/17h7/?1Zgl=+i5q+uzPXmftyZtNZWFr8MC7YoCmvyBt3jjX/X3oRNPJ70eO25N0w4zqWgP4747OpVXsIhnZv7nMmjeXISBtoaIRC/e00OgY88L+a0UDDIyF3kq1BSJhp/lI21Ai+QA6UQ==&w6=2vdPP
3.33.130.190
malicious
http://www.7fh27o.vip/l5ty/
3.33.130.190
malicious
http://www.jexiz.shop/li8d/?1Zgl=sm+xvlFNJ8Jn1MAvBLHfFbmpWDRmMBXnhYuDtN4QDuuoOIQ72IBR7vtXSrP0imT8uQD+i024Jy05gJvrsmbroocsQ5/sNLlweHoyZNleSM2rCzfY5hv0qSgJrhCITOEEHg==&w6=2vdPP
8.210.3.99
malicious
http://www.owinvip.net/17h7/
3.33.130.190
malicious
http://www.gucciqueen.shop/x3by/?w6=2vdPP&1Zgl=Gq0m/cYr7UOoL/rfxlXcWcb0PFgu3v+6IQg5KkZ1GbFCfXnP9OdFnXsg+153ZunkN9E3pnQymCUHBFpvF3MPrj7bwNIl4rM9hQX9D40sB8Q0fvNSVLrWgvNkuIucpqHerw==
178.79.184.196
malicious
http://www.givora.site/855d/
162.0.231.203
malicious
http://www.2925588.com/jx6k/
103.71.154.12
malicious
http://www.timizoasisey.shop/3p0l/?1Zgl=4Jzo6X1Gluc/SF20pEVAyAZrEiE76xvvY+EfZYFlmMajnWRT/uq2dkdTzHDiVdaw3QhDvVFcv5rBuyftUViEMVRHp90uGCn944ajrH63wHv4zzWs5+CZDXB+Ld7sX0D68A==&w6=2vdPP
188.114.97.3
malicious
http://www.2925588.com/jx6k/?1Zgl=beqWGJ7SP2hkLKuH8Xmdr/HDPWeS3cMOlVU3zrC7D+GWWG+2bEVKgJQW/9jqYGl3wiT++u8kPbwe1lvFRaGrQmwW5G4wa8+lbGyMUfdWvdM0+8z00F7HMhpKv8gPeACQcQ==&w6=2vdPP
103.71.154.12
malicious
http://www.prediksipreman.fyi/3lre/?1Zgl=/6Vdp+1Y21llHWrnJFgTkMelxgdakbST517P2ezUMEZQpYm2I4KB95g+5G1ZwATxC5oRicPrlKz7UaUXu7WnWVF0YU8xlLcjqFiWcTqSDyUhRRfYLZXOVM1ZwNUIzk+NCQ==&w6=2vdPP
162.0.215.244
malicious
http://www.meanttobebroken.org/9g6s/
141.193.213.10
malicious
http://www.prediksipreman.fyi/3lre/
162.0.215.244
malicious
http://www.timizoasisey.shop/3p0l/
188.114.97.3
malicious
http://www.jexiz.shop/li8d/
8.210.3.99
malicious
http://www.wrl-llc.net/6o8s/
3.33.130.190
malicious
http://www.ila.beauty/izfe/?1Zgl=ZqR1VSau/njxt8ya9FYdrisRnPwESR8PWK+oFQcVqsUu7dENmwaUoGLSs5vyS4FhQGGlB6r8hHtwTYfK8h1233SUSY5+fAIxnLEAPxNpmpufjlKG3bng8CVsKsGNybcU1g==&w6=2vdPP
13.248.169.48
malicious
http://www.rebel.tienda/7n9v/
199.59.243.227
malicious
http://www.gucciqueen.shop/x3by/
178.79.184.196
malicious
http://www.givora.site/855d/?1Zgl=2B0ERzH0P28lwthSCfczi4+l4RSaGiycEDtAIyO4xBEaITWb1iLHHs/q7NYM0I/g8MkSYcfxzku7nIYL4eoS8eZDgAyht6z65PzZnN779aUYRwuiIRWQuovW44/rxTRHXQ==&w6=2vdPP
162.0.231.203
malicious
http://www.ila.beauty/izfe/
13.248.169.48
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.jexiz.shop/li8d/?1Zgl=sm
unknown
http://meanttobebroken.org/9g6s/?1Zgl=l/X
unknown
http://tempuri.org/Gamee.xsd7PoisonRoulette.GameResource
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.timizoasisey.shop
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.rebel.tienda
199.59.243.227
malicious
www.timizoasisey.shop
188.114.97.3
malicious
jexiz.shop
8.210.3.99
malicious
7fh27o.vip
3.33.130.190
malicious
prediksipreman.fyi
162.0.215.244
malicious
www.ila.beauty
13.248.169.48
malicious
www.givora.site
162.0.231.203
malicious
www.college-help.info
38.88.82.56
malicious
owinvip.net
3.33.130.190
malicious
ladylawher.org
3.33.130.190
malicious
gucciqueen.shop
178.79.184.196
malicious
www.meanttobebroken.org
141.193.213.10
malicious
www.2925588.com
103.71.154.12
malicious
wrl-llc.net
3.33.130.190
malicious
www.prediksipreman.fyi
unknown
www.7fh27o.vip
unknown
www.ladylawher.org
unknown
www.wrl-llc.net
unknown
www.gucciqueen.shop
unknown
www.jexiz.shop
unknown
www.xtelify.tech
unknown
www.owinvip.net
unknown
There are 12 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
141.193.213.10
www.meanttobebroken.org
United States
malicious
162.0.215.244
prediksipreman.fyi
Canada
malicious
13.248.169.48
www.ila.beauty
United States
malicious
162.0.231.203
www.givora.site
Canada
malicious
188.114.97.3
www.timizoasisey.shop
European Union
malicious
38.88.82.56
www.college-help.info
United States
malicious
178.79.184.196
gucciqueen.shop
United Kingdom
malicious
103.71.154.12
www.2925588.com
Hong Kong
malicious
199.59.243.227
www.rebel.tienda
United States
malicious
3.33.130.190
7fh27o.vip
United States
malicious
8.210.3.99
jexiz.shop
Singapore
malicious
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5070000
trusted library allocation
page read and write
malicious
5800000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
50C0000
trusted library allocation
page read and write
malicious
1130000
unclassified section
page execute and read and write
malicious
2A30000
unclassified section
page execute and read and write
malicious
32F0000
system
page execute and read and write
malicious
4020000
unkown
page execute and read and write
malicious
EE0000
heap
page read and write
216160CE000
trusted library allocation
page read and write
6C78000
unclassified section
page read and write
4E71000
heap
page read and write
21615F03000
trusted library allocation
page read and write
3F8E000
unkown
page read and write
4A92000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
F38000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4F29000
heap
page read and write
216144D0000
heap
page read and write
3431000
heap
page read and write
4E71000
heap
page read and write
390F9FE000
stack
page read and write
873A000
heap
page read and write
F70000
heap
page read and write
3000000
unkown
page readonly
EBE000
stack
page read and write
4E71000
heap
page read and write
8713000
heap
page read and write
37E0000
heap
page read and write
1491000
direct allocation
page execute and read and write
4E71000
heap
page read and write
2EF0000
heap
page read and write
F7A000
heap
page read and write
33EB000
heap
page read and write
D10000
heap
page read and write
21615CE0000
heap
page read and write
5502000
direct allocation
page execute and read and write
AED000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
169F000
stack
page read and write
88B0000
trusted library allocation
page execute and read and write
58DC000
unclassified section
page read and write
2E50000
unkown
page readonly
4E71000
heap
page read and write
4A53000
heap
page read and write
35A1000
trusted library allocation
page read and write
4A70000
heap
page read and write
6F9C000
unclassified section
page read and write
2ED0000
unkown
page read and write
571C000
unclassified section
page read and write
1630000
unclassified section
page execute and read and write
1430000
unkown
page read and write
C07000
heap
page read and write
5028000
unkown
page execute and read and write
8620000
heap
page read and write
6954000
unclassified section
page read and write
E50000
unkown
page readonly
216143E0000
heap
page read and write
86E2000
heap
page read and write
4E71000
heap
page read and write
9AA000
stack
page read and write
4E71000
heap
page read and write
86F6000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
51B5000
heap
page read and write
4E71000
heap
page read and write
1330000
unkown
page readonly
97F000
stack
page read and write
147F000
heap
page read and write
8AAE000
stack
page read and write
21615F11000
trusted library allocation
page read and write
4BC5000
heap
page read and write
4E71000
heap
page read and write
E01000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
2B30000
unkown
page readonly
F30000
heap
page read and write
F60000
unkown
page readonly
4E71000
heap
page read and write
5A5C000
unkown
page read and write
35A9000
trusted library allocation
page read and write
21616000000
trusted library allocation
page read and write
12FC000
stack
page read and write
2ACF000
stack
page read and write
4BB0000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
670000
heap
page read and write
86EB000
heap
page read and write
49E0000
trusted library allocation
page read and write
86E6000
heap
page read and write
BE0000
trusted library allocation
page read and write
874C000
heap
page read and write
3A38000
unclassified section
page execute and read and write
D20000
direct allocation
page read and write
4E71000
heap
page read and write
1350000
heap
page read and write
1460000
heap
page read and write
F50000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
3431000
heap
page read and write
4120000
unkown
page read and write
1450000
unkown
page read and write
67A000
heap
page read and write
4E71000
heap
page read and write
245B000
trusted library allocation
page read and write
1460000
heap
page read and write
5877000
system
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
B9E000
stack
page read and write
D00000
unkown
page readonly
1170000
unkown
page readonly
4C20000
trusted library allocation
page read and write
FDA000
stack
page read and write
E51000
unkown
page execute read
58DA000
system
page execute and read and write
F10000
unkown
page read and write
4E71000
heap
page read and write
E65000
unkown
page read and write
21615F00000
trusted library allocation
page read and write
29C0000
heap
page read and write
4E71000
heap
page read and write
3421000
heap
page read and write
4E71000
heap
page read and write
1170000
unkown
page readonly
67E000
heap
page read and write
B30000
trusted library allocation
page read and write
216144C0000
heap
page read and write
4A20000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E6E000
stack
page read and write
4AD0000
trusted library section
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
112F000
stack
page read and write
4E70000
heap
page read and write
1340000
heap
page read and write
610000
heap
page read and write
6D4E000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
E51000
unkown
page execute read
5602000
unclassified section
page read and write
4F25000
heap
page read and write
106F000
unkown
page read and write
1320000
unkown
page readonly
85EE000
stack
page read and write
86D6000
heap
page read and write
282A000
trusted library allocation
page read and write
751D000
stack
page read and write
2FFF000
stack
page read and write
8750000
heap
page read and write
4E71000
heap
page read and write
21615F0F000
trusted library allocation
page read and write
2EC0000
unkown
page read and write
35CE000
stack
page read and write
4E71000
heap
page read and write
2EF4000
heap
page read and write
4E71000
heap
page read and write
E10000
unkown
page read and write
4E71000
heap
page read and write
39109FF000
stack
page read and write
8717000
heap
page read and write
8759000
heap
page read and write
16A0000
unkown
page readonly
3620000
unkown
page execute and read and write
4F8C000
heap
page read and write
4A00000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3473000
heap
page read and write
930000
unkown
page readonly
33A4000
heap
page read and write
535E000
direct allocation
page execute and read and write
862B000
heap
page read and write
8D8F000
stack
page read and write
86E8000
heap
page read and write
159E000
stack
page read and write
4E71000
heap
page read and write
620000
heap
page read and write
4BA0000
heap
page read and write
2C20000
unkown
page execute and read and write
870C000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
875E000
heap
page read and write
116F000
stack
page read and write
4E71000
heap
page read and write
33CC000
unkown
page read and write
697000
heap
page read and write
51C0000
direct allocation
page execute and read and write
6D92000
heap
page read and write
340A000
heap
page read and write
4E71000
heap
page read and write
4AF0000
heap
page read and write
E65000
unkown
page read and write
6630000
unclassified section
page read and write
216142F0000
system
page execute and read and write
21615F14000
trusted library allocation
page read and write
E51000
unkown
page execute read
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
B1B000
trusted library allocation
page execute and read and write
4E80000
heap
page read and write
8754000
heap
page read and write
8747000
heap
page read and write
4444000
unkown
page read and write
4E71000
heap
page read and write
AE4000
trusted library allocation
page read and write
33E6000
heap
page read and write
33EC000
heap
page read and write
4F7C000
heap
page read and write
390E9FB000
stack
page read and write
3426000
heap
page read and write
6D5C000
heap
page read and write
4E71000
heap
page read and write
E40000
unkown
page readonly
1468000
heap
page read and write
5017000
heap
page read and write
6B8000
heap
page read and write
55C0000
trusted library allocation
page read and write
3460000
heap
page read and write
4E71000
heap
page read and write
216160BE000
trusted library allocation
page read and write
4E71000
heap
page read and write
67C2000
trusted library allocation
page read and write
595C000
unkown
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E94000
heap
page read and write
3447000
heap
page read and write
1528000
direct allocation
page execute and read and write
4E71000
heap
page read and write
E50000
unkown
page readonly
1A31000
unkown
page readonly
39101FF000
stack
page read and write
D10000
heap
page read and write
4E71000
heap
page read and write
B40000
trusted library allocation
page execute and read and write
1320000
unkown
page readonly
14342000
system
page read and write
4E69000
heap
page read and write
33E6000
heap
page read and write
4E71000
heap
page read and write
30F2000
unkown
page read and write
EFE000
stack
page read and write
86C0000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1501000
unkown
page readonly
4E71000
heap
page read and write
216144EF000
heap
page read and write
71F3000
trusted library allocation
page read and write
3431000
heap
page read and write
216144DC000
heap
page read and write
67C2000
unclassified section
page read and write
2B30000
unkown
page readonly
49F5000
trusted library allocation
page read and write
1310000
unkown
page readonly
2EF0000
heap
page read and write
33E6000
heap
page read and write
31B2000
unkown
page read and write
4AA0000
trusted library allocation
page read and write
4A8C000
unkown
page read and write
E3DE000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
14AD000
direct allocation
page execute and read and write
4C3A000
trusted library allocation
page read and write
4E71000
heap
page read and write
E50000
unkown
page readonly
5CC4000
unclassified section
page read and write
21614510000
heap
page read and write
1441000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
920000
unkown
page readonly
8731000
heap
page read and write
42B2000
unkown
page read and write
4628000
unkown
page execute and read and write
2B24000
heap
page read and write
9F0000
unkown
page readonly
14A6000
direct allocation
page execute and read and write
4E71000
heap
page read and write
390F1FE000
stack
page read and write
4F20000
heap
page read and write
3C6A000
unkown
page read and write
4768000
unkown
page read and write
2471000
trusted library allocation
page read and write
2EF4000
heap
page read and write
52ED000
direct allocation
page execute and read and write
F7E000
heap
page read and write
4E71000
heap
page read and write
21615D00000
trusted library allocation
page read and write
469C000
stack
page read and write
E20000
heap
page read and write
4E71000
heap
page read and write
1350000
heap
page read and write
A5C000
stack
page read and write
B12000
trusted library allocation
page read and write
4E71000
heap
page read and write
49F0000
trusted library allocation
page read and write
4E71000
heap
page read and write
CCE000
stack
page read and write
E67000
unkown
page readonly
4E71000
heap
page read and write
5140000
heap
page read and write
1330000
unkown
page readonly
4E9F000
heap
page read and write
4E71000
heap
page read and write
1430000
unkown
page read and write
8750000
heap
page read and write
E67000
unkown
page readonly
E41E000
stack
page read and write
5883000
system
page execute and read and write
12FC000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
21615F0A000
trusted library allocation
page read and write
1441000
unkown
page readonly
E5E000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
E2DE000
stack
page read and write
4E71000
heap
page read and write
F60000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
E67000
unkown
page readonly
86DB000
heap
page read and write
E65000
unkown
page read and write
4E71000
heap
page read and write
AFD000
trusted library allocation
page execute and read and write
33A4000
heap
page read and write
D00000
unkown
page readonly
2B20000
heap
page read and write
29C0000
heap
page read and write
E67000
unkown
page readonly
5491000
direct allocation
page execute and read and write
B17000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
1310000
unkown
page readonly
65C0000
heap
page read and write
33C0000
heap
page read and write
3B7000
stack
page read and write
9E0000
unkown
page readonly
4E71000
heap
page read and write
152000
unkown
page readonly
E5E000
unkown
page readonly
4E71000
heap
page read and write
33E6000
heap
page read and write
259E000
stack
page read and write
4E71000
heap
page read and write
BF0000
trusted library allocation
page read and write
4E71000
heap
page read and write
56C2000
unclassified section
page read and write
8754000
heap
page read and write
216160B3000
trusted library allocation
page read and write
4E71000
heap
page read and write
33DB000
heap
page read and write
4C50000
trusted library section
page read and write
247D000
trusted library allocation
page read and write
4E71000
heap
page read and write
4A90000
trusted library allocation
page read and write
65CE000
heap
page read and write
4E71000
heap
page read and write
9BE000
stack
page read and write
3946000
unkown
page read and write
33EC000
heap
page read and write
E65000
unkown
page read and write
216160C4000
trusted library allocation
page read and write
7450000
trusted library section
page read and write
E50000
unkown
page readonly
6D50000
heap
page read and write
4E71000
heap
page read and write
BDC000
stack
page read and write
2030000
unclassified section
page execute and read and write
F70000
heap
page read and write
B02000
trusted library allocation
page read and write
3447000
heap
page read and write
1309000
direct allocation
page execute and read and write
344C000
heap
page read and write
2EAE000
stack
page read and write
E51E000
stack
page read and write
71E0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
1450000
unkown
page read and write
E5E000
unkown
page readonly
E10000
unkown
page read and write
4F70000
trusted library allocation
page read and write
35E5000
trusted library allocation
page read and write
2476000
trusted library allocation
page read and write
E01000
unkown
page readonly
3DFC000
unkown
page read and write
3370000
heap
page read and write
B0A000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
6C4E000
stack
page read and write
4E71000
heap
page read and write
B00000
trusted library allocation
page read and write
C00000
heap
page read and write
3450000
heap
page read and write
FDA000
stack
page read and write
4C30000
trusted library allocation
page read and write
2EC0000
unkown
page read and write
86D1000
heap
page read and write
D80000
heap
page read and write
F7A000
heap
page read and write
89AE000
stack
page read and write
874B000
heap
page read and write
B50000
heap
page execute and read and write
82F0000
trusted library allocation
page read and write
16A0000
unkown
page readonly
756E000
stack
page read and write
E5E000
unkown
page readonly
1345000
heap
page read and write
F10000
unkown
page read and write
4E71000
heap
page read and write
8741000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3000000
unkown
page readonly
4BC0000
heap
page read and write
45D6000
unkown
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E8D000
heap
page read and write
33C8000
heap
page read and write
21614344000
system
page execute and read and write
2E50000
unkown
page readonly
F70000
unkown
page readonly
4E71000
heap
page read and write
E20000
heap
page read and write
4E71000
heap
page read and write
4A50000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
7EF90000
trusted library allocation
page execute and read and write
3435000
heap
page read and write
3489000
heap
page read and write
3457000
heap
page read and write
630000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
33DD000
heap
page read and write
6F46000
heap
page read and write
2BA000
stack
page read and write
8734000
heap
page read and write
940000
unkown
page readonly
4A80000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
D70000
heap
page read and write
4E71000
heap
page read and write
5867000
system
page execute and read and write
3038000
unclassified section
page execute and read and write
F7E000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
5110000
trusted library allocation
page read and write
6B1000
heap
page read and write
21615D00000
trusted library allocation
page read and write
3AD8000
unkown
page read and write
5050000
heap
page read and write
4E71000
heap
page read and write
8747000
heap
page read and write
4E71000
heap
page read and write
2B20000
heap
page read and write
920000
unkown
page readonly
343A000
heap
page read and write
2B24000
heap
page read and write
6D9E000
heap
page read and write
33DB000
heap
page read and write
34AE000
heap
page read and write
617A000
unclassified section
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
D10000
heap
page read and write
F70000
unkown
page readonly
360F000
stack
page read and write
2775000
trusted library allocation
page read and write
930000
unkown
page readonly
AD0000
trusted library allocation
page read and write
48FA000
unkown
page read and write
548D000
direct allocation
page execute and read and write
159E000
stack
page read and write
4E71000
heap
page read and write
CFC000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3466000
heap
page read and write
D0E000
stack
page read and write
4E71000
heap
page read and write
3380000
heap
page read and write
3435000
heap
page read and write
4E71000
heap
page read and write
320C000
unkown
page read and write
86E1000
heap
page read and write
72F000
heap
page read and write
1468000
heap
page read and write
E51000
unkown
page execute read
4E71000
heap
page read and write
871D000
heap
page read and write
660000
heap
page read and write
6E0A000
unclassified section
page read and write
5E56000
unclassified section
page read and write
6AE6000
unclassified section
page read and write
B06000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
8626000
heap
page read and write
2490000
heap
page read and write
8D4E000
stack
page read and write
21616001000
trusted library allocation
page read and write
3460000
heap
page read and write
55C0000
trusted library allocation
page read and write
4E71000
heap
page read and write
1A31000
unkown
page readonly
162F000
stack
page read and write
327B000
stack
page read and write
3447000
heap
page read and write
4E71000
heap
page read and write
3435000
heap
page read and write
1340000
heap
page read and write
21615F21000
trusted library allocation
page read and write
216144EA000
heap
page read and write
4E71000
heap
page read and write
875A000
heap
page read and write
246E000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
6A4000
heap
page read and write
4EA4000
heap
page read and write
5FE8000
unclassified section
page read and write
9E0000
unkown
page readonly
87E000
stack
page read and write
4E71000
heap
page read and write
4C0B000
stack
page read and write
86D0000
heap
page read and write
8970000
heap
page read and write
AE0000
trusted library allocation
page read and write
AF3000
trusted library allocation
page read and write
33A4000
heap
page read and write
150000
unkown
page readonly
4AE0000
heap
page execute and read and write
33E6000
heap
page read and write
348F000
heap
page read and write
1501000
unkown
page readonly
DF0000
unkown
page read and write
630C000
unclassified section
page read and write
21615D00000
trusted library allocation
page read and write
F50000
unkown
page readonly
6D52000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
14282000
system
page read and write
169F000
stack
page read and write
23B8000
trusted library allocation
page read and write
4E71000
heap
page read and write
33A0000
heap
page read and write
4E71000
heap
page read and write
2E60000
heap
page read and write
4C40000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
ABF000
stack
page read and write
3466000
heap
page read and write
345D000
heap
page read and write
345D000
heap
page read and write
635000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
343A000
heap
page read and write
14944000
system
page read and write
9AA000
stack
page read and write
940000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
8756000
heap
page read and write
4E71000
heap
page read and write
5900000
unkown
page read and write
55E0000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
4E71000
heap
page read and write
85AE000
stack
page read and write
33CC000
unkown
page read and write
9F0000
unkown
page readonly
4E71000
heap
page read and write
5510000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
649E000
unclassified section
page read and write
37B4000
unkown
page read and write
33E6000
heap
page read and write
4E71000
heap
page read and write
5000000
trusted library allocation
page read and write
4E71000
heap
page read and write
216144F2000
heap
page read and write
11E0000
direct allocation
page execute and read and write
130D000
direct allocation
page execute and read and write
BB0000
heap
page read and write
4E71000
heap
page read and write
71F0000
trusted library allocation
page read and write
4E71000
heap
page read and write
1455C000
system
page read and write
55C0000
trusted library allocation
page read and write
3473000
heap
page read and write
2E60000
heap
page read and write
4E71000
heap
page read and write
585E000
system
page execute and read and write
6D68000
heap
page read and write
4E71000
heap
page read and write
5144000
heap
page read and write
1439C000
system
page read and write
3493000
heap
page read and write
DF0000
unkown
page read and write
E0E0000
heap
page read and write
4E71000
heap
page read and write
4C70000
heap
page read and write
4E71000
heap
page read and write
32B8000
stack
page read and write
B5B000
stack
page read and write
2834000
trusted library allocation
page read and write
21615E50000
heap
page read and write
5885000
system
page execute and read and write
4E70000
heap
page read and write
4E71000
heap
page read and write
3499000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
CFC000
stack
page read and write
E40000
unkown
page readonly
4E71000
heap
page read and write
E55E000
stack
page read and write
AE3000
trusted library allocation
page execute and read and write
2450000
trusted library allocation
page read and write
4E71000
heap
page read and write
343A000
heap
page read and write
4E71000
heap
page read and write
216144CA000
heap
page read and write
4E71000
heap
page read and write
30F2000
unkown
page read and write
52E9000
direct allocation
page execute and read and write
4E71000
heap
page read and write
137E000
direct allocation
page execute and read and write
There are 651 hidden memdumps, click here to show them.