IOC Report
Anfrage_244384.exe

loading gif

Files

File Path
Type
Category
Malicious
Anfrage_244384.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\02-E8420l
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\nsgA6C3.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\secretaryships\Angoragedernes\nilgedde.mes
Matlab v4 mat-file (little endian) Y, numeric, rows 0, columns 0
dropped
C:\Users\user\AppData\Roaming\secretaryships\Angoragedernes\selefant.kri
data
dropped
C:\Users\user\AppData\Roaming\secretaryships\Angoragedernes\speil.int
data
dropped
C:\Users\user\AppData\Roaming\secretaryships\Hemmeligt70.Bly
data
dropped
C:\Users\user\AppData\Roaming\secretaryships\Tingid.pig
data
dropped
C:\Users\user\AppData\Roaming\secretaryships\anya.por
data
dropped
C:\Users\user\AppData\Roaming\secretaryships\besiddertrang.gra
data
dropped
C:\Users\user\AppData\Roaming\secretaryships\darbyite.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\secretaryships\straffespark.Sek
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Anfrage_244384.exe
"C:\Users\user\Desktop\Anfrage_244384.exe"
malicious
C:\Users\user\Desktop\Anfrage_244384.exe
"C:\Users\user\Desktop\Anfrage_244384.exe"
malicious
C:\Program Files (x86)\tAKCTYeJpmZahMqbkmAXToQDqRYfFQfhdsmegOOXsToYOGIuLlVOIVfQTf\dptLotHBnXg.exe
"C:\Program Files (x86)\tAKCTYeJpmZahMqbkmAXToQDqRYfFQfhdsmegOOXsToYOGIuLlVOIVfQTf\dptLotHBnXg.exe"
malicious
C:\Windows\SysWOW64\verclsid.exe
"C:\Windows\SysWOW64\verclsid.exe"
malicious
C:\Program Files (x86)\tAKCTYeJpmZahMqbkmAXToQDqRYfFQfhdsmegOOXsToYOGIuLlVOIVfQTf\dptLotHBnXg.exe
"C:\Program Files (x86)\tAKCTYeJpmZahMqbkmAXToQDqRYfFQfhdsmegOOXsToYOGIuLlVOIVfQTf\dptLotHBnXg.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://reg.ru
unknown
https://familytherapycenter.rs/
unknown
https://www.reg.ru/dedicated/?utm_source=www.svarus.online&utm_medium=parking&utm_campaign=s_land_se
unknown
https://www.reg.ru/domain/new/?utm_source=www.svarus.online&utm_medium=parking&utm_campaign=s_land_n
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://familytherapycenter.rs/LxuQG254.bin2
unknown
https://familytherapycenter.rs/LxuQG254.bins
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://familytherapycenter.rs/LxuQG254.bin
188.40.95.144
https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-
unknown
https://www.ecosia.org/newtab/
unknown
https://www.reg.ru/whois/?check=&dname=www.svarus.online&reg_source=parking_auto
unknown
https://familytherapycenter.rs/LxuQG254.bink
unknown
https://familytherapycenter.rs/LxuQG254.binl
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://familytherapycenter.rs/LxuQG254.binA
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://parking.reg.ru/script/get_domain_data?domain_name=www.svarus.online&rand=
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
https://www.reg.ru/sozdanie-saita/
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://www.svarus.online/sa87/?LJ=0zbXYrx&6X64=UqcT3NX6Xc6Oa5c5HtJN6Sm3jRGrdUDSppl2CYCGZerglEzU6CQj7u00+cYUshbCTVWQ/5Gc6Lshk9bP6yg8AmPqwLiPHc0f1bybms24K+7m7zNAaNQIZa1j2XstdwJ+GTV4HpA=
194.58.112.174
https://www.reg.ru/hosting/?utm_source=www.svarus.online&utm_medium=parking&utm_campaign=s_land_host
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
familytherapycenter.rs
188.40.95.144
www.svarus.online
194.58.112.174

IPs

IP
Domain
Country
Malicious
188.40.95.144
familytherapycenter.rs
Germany
194.58.112.174
www.svarus.online
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CLI\Start
CLI start
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\Seagram\skrter
Blaatrykket
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check

Memdumps

Base Address
Regiontype
Protect
Malicious
35D90000
unclassified section
page execute and read and write
malicious
960000
trusted library allocation
page read and write
malicious
4560000
unkown
page execute and read and write
malicious
3B0000
system
page execute and read and write
malicious
9B0000
trusted library allocation
page read and write
malicious
7B0000
system
page execute and read and write
malicious
4A03000
direct allocation
page execute and read and write
malicious
34330000
unclassified section
page execute and read and write
malicious
4201000
heap
page read and write
9D7000
unkown
page readonly
345BB000
heap
page read and write
4201000
heap
page read and write
855000
heap
page read and write
89C000
heap
page read and write
4FE000
stack
page read and write
58C000
stack
page read and write
365EA000
unclassified section
page execute and read and write
710000
unkown
page read and write
378000
stack
page read and write
4201000
heap
page read and write
80D000
heap
page read and write
4689000
direct allocation
page execute and read and write
5C0000
unkown
page readonly
4201000
heap
page read and write
5750000
direct allocation
page read and write
4201000
heap
page read and write
2F60000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
34982000
direct allocation
page execute and read and write
2E20000
unkown
page readonly
77D0000
trusted library allocation
page read and write
468D000
direct allocation
page execute and read and write
4201000
heap
page read and write
452E000
stack
page read and write
26AC000
unkown
page read and write
4201000
heap
page read and write
3603000
direct allocation
page execute and read and write
44B000
unkown
page readonly
34403000
heap
page read and write
2E90000
heap
page read and write
8A6000
heap
page read and write
4A22000
unclassified section
page read and write
1C7B3010000
trusted library allocation
page read and write
5740000
direct allocation
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
45BE000
stack
page read and write
4201000
heap
page read and write
9C0000
unkown
page readonly
23D2000
unkown
page read and write
4201000
heap
page read and write
4670000
direct allocation
page read and write
773000
heap
page read and write
43B3000
heap
page read and write
4201000
heap
page read and write
FE0000
unkown
page read and write
40A000
unkown
page write copy
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
FB0000
unkown
page readonly
7D7E000
stack
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4610000
direct allocation
page read and write
7A0000
heap
page read and write
80D000
heap
page read and write
4201000
heap
page read and write
5790000
direct allocation
page read and write
7DBF000
stack
page read and write
EF0000
unkown
page readonly
805000
heap
page read and write
4201000
heap
page read and write
FB0000
unkown
page readonly
887000
heap
page read and write
BA0000
unkown
page read and write
2120000
heap
page read and write
420000
unkown
page readonly
FA0000
unkown
page readonly
4201000
heap
page read and write
33E7F000
stack
page read and write
4201000
heap
page read and write
9D7000
unkown
page readonly
5730000
direct allocation
page read and write
9C1000
unkown
page execute read
142D000
heap
page read and write
4201000
heap
page read and write
4620000
direct allocation
page read and write
4201000
heap
page read and write
4D48000
unkown
page execute and read and write
5403000
direct allocation
page execute and read and write
9CE000
unkown
page readonly
22E0000
unkown
page readonly
4201000
heap
page read and write
76CD000
heap
page read and write
80D000
heap
page read and write
8B9000
heap
page read and write
EF0000
unkown
page readonly
4201000
heap
page read and write
869000
heap
page read and write
342E0000
direct allocation
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
48A000
stack
page read and write
1C7B3010000
trusted library allocation
page read and write
4201000
heap
page read and write
4630000
direct allocation
page read and write
4D5F000
stack
page read and write
33FCE000
stack
page read and write
7752000
heap
page read and write
4201000
heap
page read and write
850000
heap
page read and write
435000
unkown
page read and write
FF1000
unkown
page readonly
1C7B34BE000
trusted library allocation
page read and write
F6A000
stack
page read and write
7743000
heap
page read and write
43E4000
heap
page read and write
4201000
heap
page read and write
3070000
unkown
page readonly
85E000
stack
page read and write
2492000
unkown
page read and write
7E0000
heap
page read and write
892000
heap
page read and write
3160000
unkown
page execute and read and write
292F000
stack
page read and write
2AA0000
direct allocation
page execute and read and write
4201000
heap
page read and write
4421000
heap
page read and write
342E0000
direct allocation
page read and write
43DF000
heap
page read and write
9C1000
unkown
page execute read
4201000
heap
page read and write
80D000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
9C0000
unkown
page readonly
43C1000
heap
page read and write
76F4000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
282F000
stack
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
7749000
heap
page read and write
9C0000
unkown
page readonly
4201000
heap
page read and write
9C1000
unkown
page execute read
4201000
heap
page read and write
43B3000
heap
page read and write
4201000
heap
page read and write
BA0000
trusted library allocation
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
34010000
heap
page read and write
19D0000
unkown
page readonly
46FE000
direct allocation
page execute and read and write
5EE000
unkown
page execute read
4201000
heap
page read and write
2100000
heap
page read and write
774F000
heap
page read and write
4201000
heap
page read and write
4680000
direct allocation
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
7DD000
stack
page read and write
43CD000
heap
page read and write
4660000
direct allocation
page read and write
5E4000
unkown
page execute read
76D6000
heap
page read and write
2E40000
unkown
page read and write
2E40000
unkown
page read and write
22E0000
heap
page read and write
4201000
heap
page read and write
44E0000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
7714000
heap
page read and write
34630000
heap
page read and write
3490D000
direct allocation
page execute and read and write
43C3000
heap
page read and write
4201000
heap
page read and write
1C7B3010000
trusted library allocation
page read and write
BD0000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
48A2000
direct allocation
page execute and read and write
4201000
heap
page read and write
87D000
heap
page read and write
4201000
heap
page read and write
2290000
heap
page read and write
9D7000
unkown
page readonly
400000
unkown
page readonly
750000
heap
page read and write
4201000
heap
page read and write
45FF000
stack
page read and write
401000
unkown
page execute read
4201000
heap
page read and write
4201000
heap
page read and write
33EFD000
stack
page read and write
5E6000
unkown
page execute read
4201000
heap
page read and write
4B0000
heap
page read and write
4DBA000
unkown
page execute and read and write
76E5000
heap
page read and write
87C000
system
page execute and read and write
57B0000
direct allocation
page read and write
FD0000
heap
page read and write
A00000
heap
page read and write
5F0000
heap
page read and write
1E0000
heap
page read and write
825000
system
page execute and read and write
83A000
heap
page read and write
9D5000
unkown
page read and write
4750000
heap
page read and write
4201000
heap
page read and write
13E0000
unkown
page read and write
4427000
heap
page read and write
4201000
heap
page read and write
43E4000
heap
page read and write
4201000
heap
page read and write
345BF000
heap
page read and write
863000
heap
page read and write
1E7000
heap
page read and write
92F000
stack
page read and write
95F000
stack
page read and write
4201000
heap
page read and write
940000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
F00000
unkown
page readonly
7A6000
heap
page read and write
43DF000
heap
page read and write
4201000
heap
page read and write
5024000
unclassified section
page read and write
2200000
heap
page read and write
408000
unkown
page readonly
F00000
unkown
page readonly
342DC000
stack
page read and write
710000
unkown
page read and write
4201000
heap
page read and write
813000
heap
page read and write
4201000
heap
page read and write
43E1000
heap
page read and write
13E0000
unkown
page read and write
FF1000
unkown
page readonly
43D8000
heap
page read and write
721000
unkown
page readonly
3B60000
unkown
page execute and read and write
4201000
heap
page read and write
76E8000
heap
page read and write
4201000
heap
page read and write
5E8000
unkown
page execute read
4201000
heap
page read and write
4201000
heap
page read and write
410000
unkown
page readonly
96000
stack
page read and write
340BF000
stack
page read and write
26AC000
unkown
page read and write
43DF000
heap
page read and write
76D1000
heap
page read and write
57C0000
direct allocation
page read and write
2204000
heap
page read and write
3414E000
stack
page read and write
3400F000
stack
page read and write
4201000
heap
page read and write
5770000
direct allocation
page read and write
36578000
unclassified section
page execute and read and write
4201000
heap
page read and write
3418F000
stack
page read and write
434E000
stack
page read and write
7D3F000
stack
page read and write
34110000
remote allocation
page read and write
2A94000
unkown
page read and write
614000
heap
page read and write
813000
heap
page read and write
4201000
heap
page read and write
34110000
remote allocation
page read and write
3407E000
stack
page read and write
530000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
BD0000
heap
page read and write
BD8000
heap
page read and write
4201000
heap
page read and write
2E94000
heap
page read and write
4201000
heap
page read and write
4600000
direct allocation
page read and write
4201000
heap
page read and write
4427000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
9C1000
unkown
page execute read
640000
heap
page read and write
4560000
direct allocation
page execute and read and write
4201000
heap
page read and write
7719000
heap
page read and write
5D0000
unkown
page readonly
35C3000
remote allocation
page execute and read and write
4201000
heap
page read and write
9CE000
unkown
page readonly
876000
heap
page read and write
1400000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4962000
unclassified section
page read and write
4201000
heap
page read and write
1660000
remote allocation
page execute and read and write
4201000
heap
page read and write
8DD000
heap
page read and write
7930000
heap
page read and write
76D0000
heap
page read and write
EE0000
unkown
page readonly
4C5E000
stack
page read and write
4201000
heap
page read and write
48B0000
trusted library allocation
page execute and read and write
1C7B34CE000
trusted library allocation
page read and write
1640000
unkown
page readonly
4201000
heap
page read and write
4C1C000
stack
page read and write
400000
unkown
page readonly
75E000
stack
page read and write
9B0000
heap
page read and write
BA0000
unkown
page read and write
4201000
heap
page read and write
13D0000
heap
page read and write
4201000
heap
page read and write
816000
heap
page read and write
7A0000
heap
page read and write
9C0000
unkown
page readonly
408000
unkown
page readonly
5E0000
unkown
page readonly
34330000
direct allocation
page read and write
4C3C000
unclassified section
page read and write
8C4000
heap
page read and write
10005000
unkown
page readonly
40A000
unkown
page read and write
4201000
heap
page read and write
9B0000
heap
page read and write
441E000
heap
page read and write
4201000
heap
page read and write
4B1C000
stack
page read and write
80D000
heap
page read and write
140A000
heap
page read and write
33EBD000
stack
page read and write
22E5000
heap
page read and write
5C0000
unkown
page readonly
4831000
direct allocation
page execute and read and write
4201000
heap
page read and write
5780000
direct allocation
page read and write
401000
unkown
page execute read
482D000
direct allocation
page execute and read and write
7E2E000
stack
page read and write
4201000
heap
page read and write
9D7000
unkown
page readonly
614000
heap
page read and write
42C000
unkown
page read and write
4205000
heap
page read and write
4201000
heap
page read and write
3FC3000
remote allocation
page execute and read and write
FE0000
unkown
page read and write
34330000
direct allocation
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
940000
trusted library allocation
page read and write
75A000
heap
page read and write
4201000
heap
page read and write
76D000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
770F000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
5E0000
unkown
page readonly
43D8000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
441E000
heap
page read and write
855000
heap
page read and write
2F60000
heap
page read and write
4201000
heap
page read and write
140E000
heap
page read and write
4300000
heap
page read and write
33F7E000
stack
page read and write
4003000
direct allocation
page execute and read and write
802000
heap
page read and write
1640000
unkown
page readonly
48A000
stack
page read and write
2BC3000
remote allocation
page execute and read and write
9D5000
unkown
page read and write
34330000
direct allocation
page read and write
BA0000
trusted library allocation
page read and write
5F0000
unkown
page execute read
44B000
unkown
page readonly
869000
heap
page read and write
85F000
heap
page read and write
2C03000
direct allocation
page execute and read and write
535000
heap
page read and write
4378000
heap
page read and write
FA0000
unkown
page readonly
7736000
heap
page read and write
898000
heap
page read and write
19A000
stack
page read and write
649000
unkown
page execute read
22A0000
heap
page read and write
4640000
direct allocation
page read and write
57E0000
direct allocation
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
34110000
remote allocation
page read and write
4201000
heap
page read and write
43C1000
heap
page read and write
4423000
heap
page read and write
4201000
heap
page read and write
FD0000
heap
page read and write
4551000
heap
page read and write
4201000
heap
page read and write
8BF000
heap
page read and write
40A000
unkown
page write copy
750000
heap
page read and write
754000
heap
page read and write
272F000
stack
page read and write
BA0000
trusted library allocation
page read and write
1400000
heap
page read and write
4201000
heap
page read and write
5EC000
unkown
page execute read
22E0000
unkown
page readonly
CD0000
unkown
page readonly
4201000
heap
page read and write
9D5000
unkown
page read and write
342E0000
heap
page read and write
5F0000
heap
page read and write
70F000
stack
page read and write
9CE000
unkown
page readonly
19D1000
unkown
page readonly
4201000
heap
page read and write
4201000
heap
page read and write
420000
unkown
page readonly
B80000
unkown
page readonly
4201000
heap
page read and write
876000
heap
page read and write
792C000
stack
page read and write
71000
heap
page read and write
58C000
stack
page read and write
347DE000
direct allocation
page execute and read and write
4201000
heap
page read and write
43E4000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
4328000
heap
page read and write
4690000
direct allocation
page read and write
730000
unkown
page read and write
760000
unkown
page read and write
802000
heap
page read and write
7709000
heap
page read and write
9CE000
unkown
page readonly
4201000
heap
page read and write
7CBC000
stack
page read and write
23D2000
unkown
page read and write
500000
heap
page read and write
85F000
heap
page read and write
1C7B34B2000
trusted library allocation
page read and write
4201000
heap
page read and write
3476D000
direct allocation
page execute and read and write
44B000
unkown
page readonly
4201000
heap
page read and write
5EA000
unkown
page execute read
10003000
unkown
page readonly
76BE000
stack
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
76E0000
heap
page read and write
34640000
direct allocation
page execute and read and write
610000
heap
page read and write
7CFE000
stack
page read and write
EE0000
unkown
page readonly
4201000
heap
page read and write
7F8000
heap
page read and write
2E94000
heap
page read and write
4201000
heap
page read and write
5D0000
unkown
page readonly
35390000
unclassified section
page execute and read and write
BEF000
heap
page read and write
4201000
heap
page read and write
773C000
heap
page read and write
4201000
heap
page read and write
57D0000
direct allocation
page read and write
457F000
stack
page read and write
33B000
stack
page read and write
ED1000
unkown
page readonly
ED0000
unkown
page readonly
5F2000
unkown
page execute read
2E90000
heap
page read and write
4201000
heap
page read and write
441D000
heap
page read and write
4201000
heap
page read and write
401000
unkown
page execute read
4440000
trusted library allocation
page read and write
34911000
direct allocation
page execute and read and write
CD0000
unkown
page readonly
410000
unkown
page readonly
772D000
heap
page read and write
12FC000
stack
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
13D0000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
9D5000
unkown
page read and write
7E6F000
stack
page read and write
4201000
heap
page read and write
5760000
direct allocation
page read and write
4201000
heap
page read and write
17C3000
remote allocation
page execute and read and write
21AE000
stack
page read and write
472E000
stack
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
400000
unkown
page readonly
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
34990000
unclassified section
page execute and read and write
4200000
heap
page read and write
4201000
heap
page read and write
754000
heap
page read and write
10001000
unkown
page execute read
43DF000
heap
page read and write
80D000
heap
page read and write
720000
heap
page read and write
4426000
heap
page read and write
4201000
heap
page read and write
F6A000
stack
page read and write
4201000
heap
page read and write
43E4000
heap
page read and write
4201000
heap
page read and write
850000
heap
page read and write
46B0000
direct allocation
page read and write
76C0000
trusted library allocation
page read and write
770000
unkown
page read and write
140E000
heap
page read and write
614000
heap
page read and write
3070000
unkown
page readonly
70E000
unkown
page read and write
43CD000
heap
page read and write
4300000
heap
page read and write
4201000
heap
page read and write
4370000
heap
page read and write
844000
heap
page read and write
728000
heap
page read and write
721000
unkown
page readonly
BD8000
heap
page read and write
4201000
heap
page read and write
881000
heap
page read and write
4201000
heap
page read and write
7F0000
heap
page read and write
34492000
heap
page read and write
4201000
heap
page read and write
730000
unkown
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
401000
unkown
page execute read
4201000
heap
page read and write
4201000
heap
page read and write
88F000
heap
page read and write
FC0000
unkown
page readonly
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
FC0000
unkown
page readonly
33F3E000
stack
page read and write
4650000
direct allocation
page read and write
43D8000
heap
page read and write
3A6000
unkown
page read and write
4201000
heap
page read and write
12FC000
stack
page read and write
2E20000
unkown
page readonly
4201000
heap
page read and write
57A0000
direct allocation
page read and write
4350000
heap
page read and write
B80000
unkown
page readonly
4201000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
341DC000
stack
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
430000
unkown
page read and write
1C7B34C4000
trusted library allocation
page read and write
34769000
direct allocation
page execute and read and write
4201000
heap
page read and write
4201000
heap
page read and write
46A0000
direct allocation
page read and write
626000
unkown
page execute read
408000
unkown
page readonly
226E000
stack
page read and write
70000
heap
page read and write
1E5000
heap
page read and write
140A000
heap
page read and write
773F000
heap
page read and write
441C000
heap
page read and write
4201000
heap
page read and write
43CD000
heap
page read and write
4201000
heap
page read and write
97E000
unkown
page read and write
44DC000
heap
page read and write
4201000
heap
page read and write
43E1000
heap
page read and write
79E000
stack
page read and write
4201000
heap
page read and write
216E000
stack
page read and write
76DB000
heap
page read and write
10000000
unkown
page readonly
21C3000
remote allocation
page execute and read and write
863000
heap
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
There are 615 hidden memdumps, click here to show them.