IOC Report
Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exe

loading gif

Files

File Path
Type
Category
Malicious
Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\10O4645j
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\aut550.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\intemeration
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exe
"C:\Users\user\Desktop\Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exe"
malicious
C:\Program Files (x86)\VTzihlzzLzedQPFiXqrTetDAzsRToqWcPJcGXqmeLoOhjkiIhXCvjxwbRYbQ\uxnRAYhIPZRPiA.exe
"C:\Program Files (x86)\VTzihlzzLzedQPFiXqrTetDAzsRToqWcPJcGXqmeLoOhjkiIhXCvjxwbRYbQ\uxnRAYhIPZRPiA.exe"
malicious
C:\Windows\SysWOW64\mobsync.exe
"C:\Windows\SysWOW64\mobsync.exe"
malicious
C:\Program Files (x86)\VTzihlzzLzedQPFiXqrTetDAzsRToqWcPJcGXqmeLoOhjkiIhXCvjxwbRYbQ\uxnRAYhIPZRPiA.exe
"C:\Program Files (x86)\VTzihlzzLzedQPFiXqrTetDAzsRToqWcPJcGXqmeLoOhjkiIhXCvjxwbRYbQ\uxnRAYhIPZRPiA.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.aballanet.cat/6xrr/?sVC8z=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&PPP=FHWL56
134.0.14.158
malicious
http://www.aballanet.cat/6xrr/
134.0.14.158
malicious
http://www.madhf.tech/0mwe/?sVC8z=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.canadavinreport.site/g3h7/?sVC8z=dyqW+SkpLS8uL5dRky9k7MKcOglS/8z1zEHoC4ozp/UuBc9Lrzv6UHKMHP5rOiU//FkNbu8cLS6TGHyjoU1BXuIfA/6aNcSUPn2xNM4zETNmyU4aFxTXIL5EZw83E41rkQ==&PPP=FHWL56
185.27.134.206
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.canadavinreport.site/g3h7/
185.27.134.206
http://aballanet.cat/6xrr/?sVC8z=HxJAUmNG5a
unknown
http://www.yunlekeji.top/t322/?PPP=FHWL56&sVC8z=FCfXCbowRdQKA3bKzmWhb/MMDIYWCwffvgnpa1jm1l5RPo8GmzCZxrunal2GKioIIi33qnUs85PYplnvRA3XX9RPs5/iUffq0tmKE8rYJBtcI2bhCRGcMbzPlb/C9uxVPg==
106.15.109.33
http://www.brightvision.website/gn26/?sVC8z=fgpTVhEuh+HnR3p0lfNLmVuUqPxSLN4hCHlB5YwrT5j1SjgoO/sQ0W1xqV3uB3iqP4rffdiJ/shc0ougvjbd7NMKGX1gMLgBVaz3e9231X82jxOqgG++QmJ2h2W7Ejj4Gw==&PPP=FHWL56
203.161.42.73
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.tals.xyz/k1td/
13.248.169.48
https://www.ecosia.org/newtab/
unknown
http://www.madhf.tech/0mwe/?sVC8z=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/0AaWeg==&PPP=FHWL56
103.224.182.242
http://www.logidant.xyz/iuvu/
45.141.156.114
http://www.zkdamdjj.shop/kf1m/
104.21.40.167
http://www.brightvision.website
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://zkdamdjj.shop/kf1m/?sVC8z=gD/FPiA75bYZCbZDbB
unknown
http://www.logidant.xyz/iuvu/?sVC8z=4GSi4NjhieA+eby0NKQzTEPCPA5td1TZNopVgGr+MixqN2kv+x7vZ9YkKN38Qwr7I1LnRiqAhNhB07BIn5ynY1PA81WB0aqcrP8TCrRqA4T6i/Y0YCRnlTl6YfLJ6nzbiw==&PPP=FHWL56
45.141.156.114
http://www.laohub10.net/36be/?sVC8z=zT+fCPSXWqCfWPgMnoOydtJKsJuCEtGx9/DVuG0pIlquWt59hgdSk8Rx6eVvndf2YPyLwPhL3z2g/EyQU+U7tD9cl/byRSbJ8t/R3+K3cKRBXN0bJbe4ZjKihmDBlTXN1Q==&PPP=FHWL56
202.79.161.151
http://www.thinkphp.cn
unknown
http://www.laohub10.net/36be/
202.79.161.151
http://www.zkdamdjj.shop/kf1m/?sVC8z=gD/FPiA75bYZCbZDbB+WsVUzjKMJP+r4HqBHW8I3+Q/3qqcwdH4XqO3fnm/yt4rkfBlpHF229jnZH/lk0nBoRPOyc9x0vhFbku7Ub3qNJZbDXed1slXSq/MHP91YwZ61FA==&PPP=FHWL56
104.21.40.167
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.izmirescortg.xyz/lnl7/?sVC8z=kAPJ1zL1a1XedmcrdtHAbU+8MxIg1b6JbBGKYGigv+9peDDnEk+ogR7nF5sJltA40tggf7QxXQcZwaMcwHfgfVGx56k02tXkAzZldWa3Ro5vlhsr06JocjtffJpgas7XnA==&PPP=FHWL56
104.21.36.62
http://www.tals.xyz/k1td/?sVC8z=oEMxw+ab8QlEZmTmAbDEuuFmAVWx5xMHQHNpbkBMxCjDr7HlodnZgfFsQKGKkvz/XYzpvPMYep3+sZsYYHcCVG2YOA5cLjPPS3bUYxhUJeAm1ae/P1TsW9+p+FqZ3lrXmQ==&PPP=FHWL56
13.248.169.48
http://www.canadavinreport.site/g3h7/?sVC8z=dyqW
unknown
http://www.brightvision.website/gn26/
203.161.42.73
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.madhf.tech/0mwe/
103.224.182.242
http://www.yunlekeji.top/t322/
106.15.109.33
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.izmirescortg.xyz
104.21.36.62
malicious
logidant.xyz
45.141.156.114
malicious
www.tals.xyz
13.248.169.48
malicious
aballanet.cat
134.0.14.158
malicious
www.logidant.xyz
unknown
malicious
www.brightvision.website
203.161.42.73
www.madhf.tech
103.224.182.242
r0lqcud7.nbnnn.xyz
202.79.161.151
www.yunlekeji.top
106.15.109.33
www.zkdamdjj.shop
104.21.40.167
www.canadavinreport.site
185.27.134.206
www.laohub10.net
unknown
www.aballanet.cat
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
45.141.156.114
logidant.xyz
Germany
malicious
13.248.169.48
www.tals.xyz
United States
malicious
104.21.36.62
www.izmirescortg.xyz
United States
malicious
134.0.14.158
aballanet.cat
Spain
malicious
106.15.109.33
www.yunlekeji.top
China
104.21.40.167
www.zkdamdjj.shop
United States
203.161.42.73
www.brightvision.website
Malaysia
103.224.182.242
www.madhf.tech
Australia
185.27.134.206
www.canadavinreport.site
United Kingdom
202.79.161.151
r0lqcud7.nbnnn.xyz
Singapore

Memdumps

Base Address
Regiontype
Protect
Malicious
5600000
unclassified section
page execute and read and write
malicious
640000
trusted library allocation
page read and write
malicious
140000
system
page execute and read and write
malicious
3E50000
unclassified section
page execute and read and write
malicious
4090000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
52D0000
system
page execute and read and write
malicious
37D0000
unkown
page execute and read and write
malicious
170000
unkown
page readonly
3A2D000
heap
page read and write
B40000
direct allocation
page read and write
3F91000
heap
page read and write
FB0000
unkown
page readonly
37BE000
direct allocation
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3480000
direct allocation
page read and write
3A1000
unkown
page execute read
753F000
heap
page read and write
341A000
heap
page read and write
6AE000
unkown
page readonly
138E000
stack
page read and write
28A2000
heap
page read and write
75A2000
heap
page read and write
BDB000
heap
page read and write
1D0000
heap
page read and write
B2C000
stack
page read and write
FD0000
unkown
page read and write
1EA000
stack
page read and write
309B000
stack
page read and write
3200000
heap
page read and write
7523000
heap
page read and write
F80000
unkown
page read and write
4642000
direct allocation
page execute and read and write
3437000
heap
page read and write
378E000
stack
page read and write
3E42000
direct allocation
page execute and read and write
3F91000
heap
page read and write
39134000
system
page read and write
2897000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F93000
heap
page read and write
3F91000
heap
page read and write
180000
unkown
page readonly
E18000
heap
page read and write
3D0000
unkown
page read and write
3F91000
heap
page read and write
8DF000
stack
page read and write
5D0000
trusted library allocation
page read and write
E18000
heap
page read and write
1571000
unkown
page readonly
3F91000
heap
page read and write
38E0000
direct allocation
page read and write
D9C000
heap
page read and write
3F91000
heap
page read and write
7C1E000
stack
page read and write
3F91000
heap
page read and write
3213000
heap
page read and write
442D000
direct allocation
page execute and read and write
35A8000
unkown
page read and write
37BE000
direct allocation
page read and write
4C00000
unclassified section
page execute and read and write
3F91000
heap
page read and write
3A5E000
unkown
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
2C82000
unkown
page read and write
D9C000
heap
page read and write
3F91000
heap
page read and write
A50000
unkown
page readonly
58E000
stack
page read and write
3400000
heap
page read and write
CED000
heap
page read and write
3F91000
heap
page read and write
22E0000
unkown
page readonly
2EC000
stack
page read and write
3F91000
heap
page read and write
3B5000
unkown
page read and write
53E000
stack
page read and write
427E000
stack
page read and write
4D14000
unclassified section
page read and write
D9C000
heap
page read and write
11DF000
stack
page read and write
600000
heap
page read and write
D9C000
heap
page read and write
305C000
stack
page read and write
2AB4000
heap
page read and write
26BBA710000
trusted library allocation
page read and write
CAA000
heap
page read and write
3C29000
direct allocation
page execute and read and write
330000
unkown
page readonly
374D000
direct allocation
page read and write
3A0000
unkown
page readonly
4429000
direct allocation
page execute and read and write
3F91000
heap
page read and write
75B0000
heap
page read and write
E18000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
754A000
heap
page read and write
3F91000
heap
page read and write
28EB000
heap
page read and write
D9C000
heap
page read and write
3F91000
heap
page read and write
26BB8CE0000
heap
page read and write
76C0000
trusted library allocation
page read and write
23D0000
unkown
page execute and read and write
4300000
direct allocation
page execute and read and write
3F91000
heap
page read and write
E30000
heap
page read and write
B9A000
heap
page read and write
534F000
system
page execute and read and write
3439000
heap
page read and write
7D0000
heap
page read and write
3F91000
heap
page read and write
E10000
unkown
page readonly
3213000
heap
page read and write
3F91000
heap
page read and write
8E0000
unkown
page readonly
3823000
heap
page read and write
38CC000
unkown
page read and write
4190000
trusted library allocation
page execute and read and write
3749000
direct allocation
page read and write
752B000
heap
page read and write
BDB000
heap
page read and write
758C000
heap
page read and write
3B7000
unkown
page readonly
37BE000
direct allocation
page read and write
26BB8DF1000
heap
page read and write
3B00000
direct allocation
page execute and read and write
3202000
heap
page read and write
295A000
heap
page read and write
E20000
unkown
page readonly
3F91000
heap
page read and write
3F0000
unkown
page read and write
601000
unkown
page execute read
3213000
heap
page read and write
3C2D000
direct allocation
page execute and read and write
3F91000
heap
page read and write
535C000
unclassified section
page read and write
3DD1000
direct allocation
page execute and read and write
3F91000
heap
page read and write
75AB000
heap
page read and write
3B7000
unkown
page readonly
3F91000
heap
page read and write
2928000
heap
page read and write
3620000
direct allocation
page read and write
6AE000
unkown
page readonly
3F91000
heap
page read and write
1C4000
heap
page read and write
108000
stack
page read and write
2130000
heap
page read and write
3F91000
heap
page read and write
4F0000
heap
page read and write
D56000
heap
page read and write
3F91000
heap
page read and write
20F0000
unkown
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
2888000
heap
page read and write
3B7000
unkown
page readonly
FE8000
heap
page read and write
3480000
direct allocation
page read and write
D4E000
heap
page read and write
C24000
heap
page read and write
608000
heap
page read and write
5038000
unclassified section
page read and write
28B3000
heap
page read and write
3F91000
heap
page read and write
E19000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
11E0000
unkown
page readonly
28A2000
heap
page read and write
364E000
stack
page read and write
3620000
direct allocation
page read and write
75A6000
heap
page read and write
3F91000
heap
page read and write
778D000
stack
page read and write
20D0000
unkown
page readonly
45D1000
direct allocation
page execute and read and write
3F91000
heap
page read and write
2130000
heap
page read and write
E18000
heap
page read and write
2CDC000
unkown
page read and write
3A0000
unkown
page readonly
D9C000
heap
page read and write
11E0000
unkown
page readonly
410000
heap
page read and write
75A2000
heap
page read and write
35A3000
direct allocation
page read and write
CB000
stack
page read and write
7598000
heap
page read and write
3F91000
heap
page read and write
D9C000
heap
page read and write
7538000
heap
page read and write
3F91000
heap
page read and write
4963000
unkown
page execute and read and write
3F91000
heap
page read and write
330000
unkown
page readonly
E10000
unkown
page readonly
3F91000
heap
page read and write
E18000
heap
page read and write
292B000
heap
page read and write
6BA000
unkown
page read and write
68D000
unkown
page readonly
26BB8D40000
heap
page read and write
7C5F000
stack
page read and write
22D0000
heap
page read and write
3419000
heap
page read and write
5352000
system
page execute and read and write
2897000
heap
page read and write
4EA6000
unclassified section
page read and write
7610000
trusted library allocation
page read and write
D9C000
heap
page read and write
3F91000
heap
page read and write
C8B000
heap
page read and write
26BB8DEC000
heap
page read and write
F71000
unkown
page readonly
374D000
direct allocation
page read and write
5F0000
trusted library allocation
page read and write
D9C000
heap
page read and write
7564000
heap
page read and write
28A8000
heap
page read and write
3A9E000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
4652000
unclassified section
page read and write
FD0000
unkown
page read and write
3F91000
heap
page read and write
26BBA801000
trusted library allocation
page read and write
8B19DFC000
stack
page read and write
3480000
direct allocation
page read and write
755E000
heap
page read and write
3F91000
heap
page read and write
F60000
unkown
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3620000
direct allocation
page read and write
26BBA716000
trusted library allocation
page read and write
53C0000
unkown
page read and write
38B32000
system
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3417000
heap
page read and write
3044000
heap
page read and write
7593000
heap
page read and write
2954000
heap
page read and write
3A1000
unkown
page execute read
3F91000
heap
page read and write
2922000
heap
page read and write
D4A000
heap
page read and write
22D4000
heap
page read and write
7569000
heap
page read and write
3F91000
heap
page read and write
D9C000
heap
page read and write
B0B000
stack
page read and write
26BB8B59000
system
page execute and read and write
D9C000
heap
page read and write
449E000
direct allocation
page execute and read and write
F80000
unkown
page read and write
45CD000
direct allocation
page execute and read and write
3DCD000
direct allocation
page execute and read and write
3040000
heap
page read and write
E18000
heap
page read and write
3F91000
heap
page read and write
3213000
heap
page read and write
E40000
heap
page read and write
BCC000
stack
page read and write
3F91000
heap
page read and write
3213000
heap
page read and write
26BBA8C4000
trusted library allocation
page read and write
3F91000
heap
page read and write
AFE000
stack
page read and write
3E1000
unkown
page readonly
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3416000
unkown
page read and write
3F91000
heap
page read and write
26BBA5A0000
trusted library allocation
page read and write
26BB8DDE000
heap
page read and write
3F91000
heap
page read and write
3480000
direct allocation
page read and write
3A1000
unkown
page execute read
3431000
heap
page read and write
3417000
heap
page read and write
3F91000
heap
page read and write
CED000
heap
page read and write
3213000
heap
page read and write
160000
unkown
page readonly
3F91000
heap
page read and write
3F91000
heap
page read and write
293E000
heap
page read and write
1940000
heap
page read and write
4712000
unclassified section
page read and write
2899000
heap
page read and write
374D000
direct allocation
page read and write
3F91000
heap
page read and write
E18000
heap
page read and write
1C4000
heap
page read and write
3213000
heap
page read and write
601000
unkown
page execute read
D9C000
heap
page read and write
3405000
heap
page read and write
3405000
heap
page read and write
A40000
unkown
page readonly
1EA000
stack
page read and write
E36000
heap
page read and write
3F91000
heap
page read and write
E00000
unkown
page readonly
7536000
heap
page read and write
2965000
heap
page read and write
5343000
system
page execute and read and write
A60000
unkown
page readonly
E00000
unkown
page readonly
D9C000
heap
page read and write
8B1A5FE000
stack
page read and write
39E000
stack
page read and write
753B000
heap
page read and write
3213000
heap
page read and write
3F91000
heap
page read and write
2911000
heap
page read and write
3F91000
heap
page read and write
26BB8D10000
heap
page read and write
A60000
unkown
page readonly
3620000
direct allocation
page read and write
68D000
unkown
page readonly
E18000
heap
page read and write
28A2000
heap
page read and write
A40000
unkown
page readonly
3D0000
unkown
page read and write
552C000
unkown
page read and write
26BBA721000
trusted library allocation
page read and write
3F91000
heap
page read and write
26BB8BF0000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3213000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
5F0000
trusted library allocation
page read and write
3F91000
heap
page read and write
26BB8AE0000
system
page execute and read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
7290000
trusted library allocation
page read and write
26BB8DF4000
heap
page read and write
AEB000
stack
page read and write
35A3000
direct allocation
page read and write
3284000
unkown
page read and write
341B000
heap
page read and write
3749000
direct allocation
page read and write
35A3000
direct allocation
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
75AB000
heap
page read and write
BDB000
heap
page read and write
D9C000
heap
page read and write
3610000
direct allocation
page read and write
3F91000
heap
page read and write
374D000
direct allocation
page read and write
2899000
heap
page read and write
3E1000
unkown
page readonly
287D000
stack
page read and write
3F91000
heap
page read and write
340000
unkown
page readonly
3BF0000
unkown
page read and write
2BC2000
unkown
page read and write
FE0000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
E19000
heap
page read and write
3F91000
heap
page read and write
C71000
unkown
page readonly
3F91000
heap
page read and write
5328000
system
page execute and read and write
22D4000
heap
page read and write
26BBA800000
trusted library allocation
page read and write
6BA000
unkown
page write copy
ACA000
stack
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
A50000
unkown
page readonly
3F91000
heap
page read and write
2AB4000
heap
page read and write
600000
heap
page read and write
3749000
direct allocation
page read and write
374E000
stack
page read and write
3F91000
heap
page read and write
3B7000
unkown
page readonly
3F91000
heap
page read and write
3F91000
heap
page read and write
C8A000
heap
page read and write
753E000
heap
page read and write
4278000
heap
page read and write
3F91000
heap
page read and write
7599000
heap
page read and write
3F0000
unkown
page read and write
2E9C000
unkown
page read and write
350000
heap
page read and write
291C000
heap
page read and write
3F91000
heap
page read and write
F5E000
stack
page read and write
630000
heap
page read and write
3F91000
heap
page read and write
26BBA70A000
trusted library allocation
page read and write
2AB0000
heap
page read and write
DD0000
unkown
page read and write
22E0000
unkown
page readonly
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
320000
unkown
page readonly
759D000
heap
page read and write
1C0000
heap
page read and write
3F91000
heap
page read and write
59A4000
unclassified section
page read and write
26BBA703000
trusted library allocation
page read and write
3F91000
heap
page read and write
D9C000
heap
page read and write
29BE000
stack
page read and write
3F91000
heap
page read and write
6C4000
unkown
page readonly
5D93000
unclassified section
page execute and read and write
26BB8B5B000
system
page execute and read and write
BED000
heap
page read and write
2E9C000
unkown
page read and write
3AE000
unkown
page readonly
5D0000
heap
page read and write
3F91000
heap
page read and write
F60000
unkown
page read and write
7531000
heap
page read and write
3B5000
unkown
page read and write
28FA000
heap
page read and write
4274000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
28A2000
heap
page read and write
D4A000
heap
page read and write
3F91000
heap
page read and write
FA0000
heap
page read and write
7526000
heap
page read and write
28A8000
heap
page read and write
2904000
heap
page read and write
3F91000
heap
page read and write
E18000
heap
page read and write
3213000
heap
page read and write
340000
unkown
page readonly
FE0000
heap
page read and write
20F0000
unkown
page read and write
BCC000
stack
page read and write
388F000
stack
page read and write
54EE000
unclassified section
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3A0000
unkown
page readonly
2BBF000
stack
page read and write
3F90000
heap
page read and write
E18000
heap
page read and write
2904000
heap
page read and write
3F91000
heap
page read and write
CED000
heap
page read and write
3F91000
heap
page read and write
3F63000
unkown
page execute and read and write
320000
unkown
page readonly
6793000
unclassified section
page execute and read and write
3AE000
unkown
page readonly
3213000
heap
page read and write
26BBA600000
trusted library allocation
page read and write
38D4C000
system
page read and write
476C000
unclassified section
page read and write
42E9000
heap
page read and write
3F91000
heap
page read and write
3480000
direct allocation
page read and write
ACA000
stack
page read and write
160000
unkown
page readonly
E18000
heap
page read and write
E18000
heap
page read and write
26BB8DC0000
heap
page read and write
3120000
heap
page read and write
3213000
heap
page read and write
3F91000
heap
page read and write
26BBA70E000
trusted library allocation
page read and write
26BBA700000
trusted library allocation
page read and write
37BE000
direct allocation
page read and write
26BBA8A5000
trusted library allocation
page read and write
E18000
heap
page read and write
3F91000
heap
page read and write
2932000
heap
page read and write
3F91000
heap
page read and write
28FA000
heap
page read and write
E30000
heap
page read and write
3F91000
heap
page read and write
E18000
heap
page read and write
7D0000
heap
page read and write
75A8000
heap
page read and write
29C0000
unkown
page readonly
29C0000
unkown
page readonly
E18000
heap
page read and write
3213000
heap
page read and write
374D000
direct allocation
page read and write
D49000
heap
page execute and read and write
3F91000
heap
page read and write
3890000
direct allocation
page read and write
E20000
unkown
page readonly
2AB0000
heap
page read and write
374D000
direct allocation
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
1C4000
heap
page read and write
FB0000
unkown
page readonly
7890000
heap
page read and write
3A29000
heap
page read and write
3213000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
373A000
unkown
page read and write
28EF000
heap
page read and write
3F91000
heap
page read and write
540000
heap
page read and write
5333000
system
page execute and read and write
F71000
unkown
page readonly
350000
heap
page read and write
3501000
heap
page read and write
3F91000
heap
page read and write
2911000
heap
page read and write
30D0000
heap
page read and write
5F0000
trusted library allocation
page read and write
B9E000
heap
page read and write
11DF000
stack
page read and write
D4E000
heap
page read and write
28FD000
heap
page read and write
40B6000
heap
page read and write
3F14000
unkown
page read and write
756E000
heap
page read and write
38A72000
system
page read and write
E18000
heap
page read and write
38E0000
direct allocation
page read and write
1A9000
stack
page read and write
3213000
heap
page read and write
759D000
heap
page read and write
35A3000
direct allocation
page read and write
22D0000
heap
page read and write
492C000
unclassified section
page read and write
3F91000
heap
page read and write
C15000
heap
page read and write
600000
unkown
page readonly
3620000
direct allocation
page read and write
3C9E000
direct allocation
page execute and read and write
170000
unkown
page readonly
35A3000
direct allocation
page read and write
608000
heap
page read and write
6BF000
unkown
page write copy
3F91000
heap
page read and write
3F91000
heap
page read and write
37BE000
direct allocation
page read and write
4200000
unclassified section
page execute and read and write
D9C000
heap
page read and write
3F91000
heap
page read and write
28FD000
heap
page read and write
3D82000
unkown
page read and write
8B1BDFE000
stack
page read and write
2917000
heap
page read and write
8B1ADFE000
stack
page read and write
3B5000
unkown
page read and write
3F91000
heap
page read and write
6C4000
unkown
page readonly
51CA000
unclassified section
page read and write
3F91000
heap
page read and write
26BBA8CE000
trusted library allocation
page read and write
8E0000
unkown
page readonly
D4A000
heap
page read and write
295F000
heap
page read and write
289E000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3749000
direct allocation
page read and write
3F91000
heap
page read and write
3749000
direct allocation
page read and write
BCF000
heap
page read and write
30F0000
heap
page read and write
E18000
heap
page read and write
B90000
heap
page read and write
D9C000
heap
page read and write
3F91000
heap
page read and write
C8A000
heap
page read and write
5812000
unclassified section
page read and write
E18000
heap
page read and write
BD9000
heap
page read and write
40E0000
trusted library allocation
page read and write
3F91000
heap
page read and write
2EC000
stack
page read and write
223F000
stack
page read and write
3F91000
heap
page read and write
35A3000
direct allocation
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
5680000
unclassified section
page read and write
3F91000
heap
page read and write
20D0000
unkown
page readonly
E6D000
heap
page read and write
3900000
heap
page read and write
3A0000
unkown
page readonly
3F91000
heap
page read and write
3437000
heap
page read and write
2880000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
53A6000
system
page execute and read and write
5D21000
unclassified section
page execute and read and write
26BBA5A0000
trusted library allocation
page read and write
3F91000
heap
page read and write
178E000
stack
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
E40000
heap
page read and write
3EF1000
unkown
page execute and read and write
3F91000
heap
page read and write
2DD0000
unkown
page execute and read and write
542C000
unkown
page read and write
26BBA8BE000
trusted library allocation
page read and write
20CE000
stack
page read and write
3F91000
heap
page read and write
600000
unkown
page readonly
8B1B5FE000
stack
page read and write
3AE000
unkown
page readonly
3F91000
heap
page read and write
4001000
heap
page read and write
26BB8B5D000
system
page execute and read and write
37BE000
direct allocation
page read and write
3213000
heap
page read and write
3439000
heap
page read and write
3B5000
unkown
page read and write
F5E000
stack
page read and write
7C7C000
heap
page read and write
180000
unkown
page readonly
26BB8DC9000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
2BC2000
unkown
page read and write
E18000
heap
page read and write
3F91000
heap
page read and write
D9C000
heap
page read and write
1571000
unkown
page readonly
5F0000
heap
page read and write
53D0000
unkown
page read and write
3620000
direct allocation
page read and write
28A2000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3412000
heap
page read and write
3F91000
heap
page read and write
3A1000
unkown
page execute read
3AE000
unkown
page readonly
D9C000
heap
page read and write
7583000
heap
page read and write
3F91000
heap
page read and write
D9C000
heap
page read and write
414B000
heap
page read and write
774C000
stack
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
FFF000
heap
page read and write
1E0000
heap
page read and write
E18000
heap
page read and write
3600000
heap
page read and write
D9C000
heap
page read and write
FE8000
heap
page read and write
C71000
unkown
page readonly
3F91000
heap
page read and write
7623000
heap
page read and write
7586000
heap
page read and write
7518000
heap
page read and write
FA0000
heap
page read and write
28A2000
heap
page read and write
3F91000
heap
page read and write
3749000
direct allocation
page read and write
3480000
direct allocation
page read and write
3700000
heap
page read and write
38E0000
direct allocation
page read and write
There are 682 hidden memdumps, click here to show them.