IOC Report
Remittance copy.exe

FilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
Remittance copy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Remittance copy.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\20Xb-18
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Remittance copy.exe
"C:\Users\user\Desktop\Remittance copy.exe"
malicious
C:\Users\user\Desktop\Remittance copy.exe
"C:\Users\user\Desktop\Remittance copy.exe"
malicious
C:\Program Files (x86)\wxKAsXqDmMAWIhjjzyinfudlQctxsDrkkDmTtDOqhKlIamqikPH\bW8YkLMI5yB2Ss544h.exe
"C:\Program Files (x86)\wxKAsXqDmMAWIhjjzyinfudlQctxsDrkkDmTtDOqhKlIamqikPH\l6uyIJz8jXRB4.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\SysWOW64\dxdiag.exe"
malicious
C:\Program Files (x86)\wxKAsXqDmMAWIhjjzyinfudlQctxsDrkkDmTtDOqhKlIamqikPH\bW8YkLMI5yB2Ss544h.exe
"C:\Program Files (x86)\wxKAsXqDmMAWIhjjzyinfudlQctxsDrkkDmTtDOqhKlIamqikPH\ACq9En1KvWt.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.iooe.net/bi7u/
13.248.169.48
malicious
http://www.persembunyian.xyz/mrwa/
13.248.169.48
malicious
http://www.seekmeme.xyz/jnjq/?wFDpr=UPFTTj504Jb&vX9x=fYRBpq79/vdLM/DPr0STJdujI9Hvvyjl68e08EeOFQJvBUWO3am1R+W+phJmgy/s/r3iuW7pGCpbnyWZa3Gh5LMiShga7+Nt3TNzVtBYBeWhVhYDpY3zvMFdDtX9F8uVCQ==
13.248.169.48
malicious
http://www.blockchaintourism.xyz/t3sb/?wFDpr=UPFTTj504Jb&vX9x=HEteVdb0loX9TCJI+WJeoiAIOXww3dimQfLEmfsRQz8PUBwhHxoP95aVQBoW2e/8thx8RB/zzSUPBfvuAUDaQ8BquajmNS/sIV6H/+Bj44RePnuHUe5cR38LGDaCLNQXIQ==
13.248.169.48
malicious
http://www.iooe.net/bi7u/?wFDpr=UPFTTj504Jb&vX9x=nHws1j0sm5LWhKJJnbe21mmb58UCBJmF8923TJe5xzXsLv8edAM+FUf+gOM1c/pFatMF3UDmCvERFe3bt+SykFY9KzqSWCYRMYhBkpfmNS8ZuQav/zQWx8DUlXueNQKBpw==
13.248.169.48
malicious
http://www.myfort.xyz/regg/
13.248.169.48
malicious
http://www.blockchaintourism.xyz/t3sb/
13.248.169.48
malicious
http://www.myfort.xyz/regg/?vX9x=PAmcXzTqSfUijjzHpTnYcBrTkM71lW81c3IHYjA8Krt584xkA/rjcOMKFKFzXd5oQDUyuOhJZTtnd+0gRL9olG9o1FJ7xy8N6w857W4hJizq9MTnd4G+Cs6+w8kwHWl0vw==&wFDpr=UPFTTj504Jb
13.248.169.48
malicious
http://www.persembunyian.xyz/mrwa/?vX9x=k95oYMBDrBPALRLL2w3oTZxXNaMgRSxUX2yK/+Y8vx1zLlVzRoJMRzV5SPMQtvMPgHiUtaKaJpVJT1ZY948oikK75cCGqDei1+jWmQidnK7+q7MHljzJaf/qXMHwxVcViA==&wFDpr=UPFTTj504Jb
13.248.169.48
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://login.li
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.iooe.net
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.iooe.net
13.248.169.48
malicious
www.persembunyian.xyz
13.248.169.48
malicious
www.blockchaintourism.xyz
13.248.169.48
www.seekmeme.xyz
13.248.169.48
www.myfort.xyz
13.248.169.48

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.iooe.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 4.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelEndpoint 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelOperation 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelService 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SMSvcHost 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SMSvcHost 4.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Workflow Foundation 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Workflow Foundation 4.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BITS\Performance
1008
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\rdyboost\Performance
1023
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\Linkage
Export
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4CC0000
trusted library allocation
page read and write
malicious
2F30000
unkown
page execute and read and write
malicious
66A0000
unclassified section
page execute and read and write
malicious
2E90000
system
page execute and read and write
malicious
4C70000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2C70000
system
page execute and read and write
malicious
21D0000
unclassified section
page execute and read and write
malicious
69F0000
heap
page read and write
6109000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
25635421000
trusted library allocation
page read and write
31F3000
heap
page read and write
D00000
unkown
page readonly
CF0000
unkown
page readonly
3291000
heap
page read and write
157E000
direct allocation
page execute and read and write
1861000
unkown
page readonly
880000
trusted library allocation
page read and write
3270000
heap
page read and write
31F8000
heap
page read and write
80DF000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
6650000
trusted library allocation
page read and write
941000
heap
page read and write
63A000
stack
page read and write
2F62000
unkown
page read and write
DD0000
unkown
page readonly
36F6000
unkown
page read and write
25633980000
heap
page read and write
3291000
heap
page read and write
B2A000
unkown
page readonly
49C0000
trusted library allocation
page read and write
339DC000
system
page read and write
3291000
heap
page read and write
2F10000
heap
page read and write
31A8000
heap
page read and write
10FC000
stack
page read and write
3150000
trusted library allocation
page read and write
2FBC000
unkown
page read and write
4E13000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
38D7000
trusted library allocation
page read and write
80DA000
heap
page read and write
31B9000
heap
page read and write
8080000
heap
page read and write
905000
heap
page read and write
814000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
7DE000
stack
page read and write
2DB0000
unkown
page readonly
51A1000
direct allocation
page execute and read and write
3291000
heap
page read and write
4979000
trusted library allocation
page read and write
2440000
unkown
page readonly
3BAC000
unkown
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
6A2B000
heap
page read and write
8A6000
trusted library allocation
page execute and read and write
10FC000
stack
page read and write
3291000
heap
page read and write
B70000
heap
page read and write
5F2C000
unclassified section
page read and write
807B000
heap
page read and write
3291000
heap
page read and write
821000
unkown
page execute read
89C000
trusted library allocation
page read and write
80E9000
heap
page read and write
7FC6000
heap
page read and write
3291000
heap
page read and write
890E000
stack
page read and write
73C000
stack
page read and write
4FFD000
direct allocation
page execute and read and write
25635410000
trusted library allocation
page read and write
3198000
heap
page read and write
6090000
heap
page read and write
22FE000
stack
page read and write
80A6000
heap
page read and write
8AA000
trusted library allocation
page execute and read and write
3291000
heap
page read and write
6020000
trusted library allocation
page execute and read and write
8094000
heap
page read and write
DE0000
heap
page read and write
4A20000
trusted library allocation
page read and write
3291000
heap
page read and write
11A0000
heap
page read and write
24C0000
trusted library allocation
page read and write
4966000
trusted library allocation
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
863E000
stack
page read and write
4E70000
trusted library allocation
page read and write
1141000
unkown
page readonly
60C0000
trusted library allocation
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
5C08000
unclassified section
page read and write
25633A73000
heap
page read and write
62B5000
heap
page read and write
3564000
unkown
page read and write
24D0000
trusted library allocation
page read and write
820000
unkown
page readonly
2530000
unkown
page execute and read and write
7FC3000
heap
page read and write
85A000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
4D10000
trusted library allocation
page read and write
23FF000
stack
page read and write
25635300000
trusted library allocation
page read and write
113E000
stack
page read and write
3291000
heap
page read and write
80B6000
heap
page read and write
914000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
49BD000
trusted library allocation
page read and write
7EEF000
stack
page read and write
49E0000
trusted library allocation
page read and write
673E000
unkown
page read and write
3190000
heap
page read and write
86FF000
stack
page read and write
2521000
trusted library allocation
page read and write
31B3000
heap
page read and write
519D000
direct allocation
page execute and read and write
324B000
heap
page read and write
810000
heap
page read and write
3291000
heap
page read and write
6080000
trusted library section
page readonly
3291000
heap
page read and write
80CB000
heap
page read and write
3291000
heap
page read and write
839000
unkown
page readonly
25633A6C000
heap
page read and write
322E000
heap
page read and write
3291000
heap
page read and write
6BE000
stack
page read and write
7E1000
unkown
page readonly
25633A5C000
heap
page read and write
256337C9000
system
page execute and read and write
390000
unkown
page readonly
506E000
direct allocation
page execute and read and write
54AE000
stack
page read and write
3291000
heap
page read and write
31B3000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
4C60000
heap
page read and write
7FBE000
stack
page read and write
24E0000
trusted library allocation
page read and write
11BE000
heap
page read and write
790000
unkown
page read and write
839000
unkown
page readonly
4C80000
heap
page execute and read and write
1150000
unkown
page read and write
24F0000
heap
page execute and read and write
760000
unkown
page readonly
740000
unkown
page readonly
5BAE000
stack
page read and write
320B000
heap
page read and write
6127000
heap
page read and write
790000
unkown
page read and write
317C000
unkown
page read and write
33702000
system
page read and write
62A0000
trusted library allocation
page execute and read and write
DB0000
unkown
page readonly
4E54000
heap
page read and write
2E3B000
stack
page read and write
836000
unkown
page read and write
13BF000
stack
page read and write
3291000
heap
page read and write
3235000
heap
page read and write
3284000
heap
page read and write
321D000
heap
page read and write
3291000
heap
page read and write
2D12000
system
page execute and read and write
3291000
heap
page read and write
54F0000
heap
page read and write
EB0000
heap
page read and write
60E0000
trusted library allocation
page read and write
12E0000
heap
page read and write
12F0000
heap
page read and write
814000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
12BE000
stack
page read and write
820000
unkown
page readonly
3291000
heap
page read and write
2500000
trusted library allocation
page read and write
62B49FE000
stack
page read and write
3291000
heap
page read and write
80D3000
heap
page read and write
80E8000
heap
page read and write
1141000
unkown
page readonly
11B0000
heap
page read and write
3291000
heap
page read and write
DC0000
unkown
page readonly
D7A000
stack
page read and write
3291000
heap
page read and write
11BE000
heap
page read and write
8076000
heap
page read and write
6630000
trusted library section
page read and write
7FC3000
heap
page read and write
582F000
stack
page read and write
3291000
heap
page read and write
64BE000
stack
page read and write
3888000
unkown
page read and write
B77000
heap
page read and write
3291000
heap
page read and write
5CAF000
stack
page read and write
590000
heap
page read and write
3228000
heap
page read and write
80CD000
heap
page read and write
720000
trusted library allocation
page read and write
3291000
heap
page read and write
256355BE000
trusted library allocation
page read and write
3291000
heap
page read and write
31F3000
heap
page read and write
850000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3206000
heap
page read and write
4DC0000
trusted library allocation
page execute and read and write
5D9A000
unclassified section
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
4A70000
trusted library allocation
page read and write
730000
heap
page read and write
3291000
heap
page read and write
893000
trusted library allocation
page read and write
256337C5000
system
page execute and read and write
770000
heap
page read and write
2FB4000
heap
page read and write
31DD000
heap
page read and write
3291000
heap
page read and write
62B31FB000
stack
page read and write
87E000
stack
page read and write
E30000
heap
page read and write
2440000
unkown
page readonly
25635400000
trusted library allocation
page read and write
780000
heap
page read and write
4B73000
heap
page read and write
12B0000
unkown
page read and write
3291000
heap
page read and write
B20000
unkown
page readonly
12E4000
heap
page read and write
497F000
trusted library allocation
page read and write
3412000
unkown
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
8060000
trusted library allocation
page read and write
3291000
heap
page read and write
89D000
trusted library allocation
page execute and read and write
3291000
heap
page read and write
3238000
heap
page read and write
5A76000
unclassified section
page read and write
1190000
unkown
page read and write
3291000
heap
page read and write
3612000
trusted library allocation
page read and write
670000
heap
page read and write
AD0000
trusted library allocation
page read and write
2FA0000
heap
page read and write
63A0000
trusted library allocation
page read and write
3381C000
system
page read and write
4B79000
heap
page read and write
3291000
heap
page read and write
80F7000
heap
page read and write
31AE000
heap
page read and write
EB8000
heap
page read and write
62B41FE000
stack
page read and write
3291000
heap
page read and write
17C0000
heap
page read and write
7CC0000
trusted library allocation
page read and write
25635415000
trusted library allocation
page read and write
82F000
unkown
page readonly
DE0000
heap
page read and write
17D0000
unclassified section
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
7F0000
unkown
page read and write
873E000
stack
page read and write
25635500000
trusted library allocation
page read and write
8312000
trusted library allocation
page read and write
E80000
heap
page read and write
3A1A000
unkown
page read and write
82F000
unkown
page readonly
3291000
heap
page read and write
9B3000
heap
page read and write
56EC000
stack
page read and write
1170000
unkown
page readonly
3291000
heap
page read and write
3291000
heap
page read and write
A0000
unkown
page readonly
883000
trusted library allocation
page execute and read and write
80ED000
heap
page read and write
4CC4000
heap
page read and write
4A00000
heap
page read and write
3291000
heap
page read and write
25633A47000
heap
page read and write
5CEE000
stack
page read and write
B20000
unkown
page readonly
347A000
unkown
page execute and read and write
3291000
heap
page read and write
821000
unkown
page execute read
256337C7000
system
page execute and read and write
2428000
trusted library allocation
page read and write
EA0000
heap
page read and write
2DB0000
unkown
page readonly
49B1000
trusted library allocation
page read and write
31E7000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
25F0000
trusted library allocation
page read and write
31AA000
heap
page read and write
4E70000
trusted library allocation
page read and write
11B0000
heap
page read and write
1190000
unkown
page read and write
1509000
direct allocation
page execute and read and write
B60000
trusted library allocation
page execute and read and write
527A000
unkown
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
D10000
unkown
page readonly
3291000
heap
page read and write
827E000
stack
page read and write
3291000
heap
page read and write
823E000
stack
page read and write
3291000
heap
page read and write
B1E000
stack
page read and write
82F000
unkown
page readonly
3291000
heap
page read and write
311A000
unclassified section
page execute and read and write
241E000
stack
page read and write
3210000
heap
page read and write
80B0000
heap
page read and write
127F000
stack
page read and write
85E000
heap
page read and write
3291000
heap
page read and write
877F000
stack
page read and write
D7A000
stack
page read and write
3150000
heap
page read and write
4CB7000
heap
page read and write
836000
unkown
page read and write
3291000
heap
page read and write
821000
unkown
page execute read
3291000
heap
page read and write
49AE000
trusted library allocation
page read and write
2400000
unkown
page readonly
58E4000
unclassified section
page read and write
3291000
heap
page read and write
1861000
unkown
page readonly
5530000
heap
page read and write
3291000
heap
page read and write
326A000
heap
page read and write
4E56000
heap
page read and write
5DEF000
stack
page read and write
64C0000
heap
page read and write
3291000
heap
page read and write
DB0000
unkown
page readonly
3291000
heap
page read and write
150D000
direct allocation
page execute and read and write
8A0000
trusted library allocation
page read and write
BCA000
stack
page read and write
3291000
heap
page read and write
43A000
stack
page read and write
2FB4000
heap
page read and write
62B39FF000
stack
page read and write
6010000
trusted library allocation
page read and write
3291000
heap
page read and write
80F1000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
1150000
unkown
page read and write
572E000
stack
page read and write
25635220000
trusted library allocation
page read and write
2CEE000
system
page execute and read and write
13E0000
direct allocation
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
813E000
stack
page read and write
85FF000
stack
page read and write
60F0000
heap
page read and write
33DC4000
system
page read and write
3291000
heap
page read and write
B1F000
stack
page read and write
3291000
heap
page read and write
4E70000
trusted library allocation
page read and write
3209000
heap
page read and write
600E000
stack
page read and write
2420000
unkown
page read and write
6280000
trusted library allocation
page read and write
899000
trusted library allocation
page read and write
256355A7000
trusted library allocation
page read and write
4ECE000
stack
page read and write
3291000
heap
page read and write
4EA0000
heap
page read and write
3291000
heap
page read and write
3B1A000
unclassified section
page execute and read and write
80E4000
heap
page read and write
4CEA000
heap
page read and write
256355C4000
trusted library allocation
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
31B3000
heap
page read and write
963000
heap
page read and write
80EF000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
537000
stack
page read and write
86BE000
stack
page read and write
3291000
heap
page read and write
CF0000
unkown
page readonly
325F000
heap
page read and write
3291000
heap
page read and write
607C000
stack
page read and write
3291000
heap
page read and write
11D9000
heap
page read and write
4969000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
80AC000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
867F000
stack
page read and write
487A000
unkown
page execute and read and write
26B2000
unclassified section
page execute and read and write
49D0000
trusted library allocation
page read and write
8BB000
trusted library allocation
page execute and read and write
80E4000
heap
page read and write
25633A70000
heap
page read and write
4D25000
heap
page read and write
1730000
direct allocation
page read and write
3291000
heap
page read and write
33C0000
heap
page read and write
12E0000
heap
page read and write
3291000
heap
page read and write
2430000
heap
page read and write
11BA000
heap
page read and write
B5C000
stack
page read and write
3291000
heap
page read and write
4DBD000
heap
page read and write
7F7D000
stack
page read and write
D00000
unkown
page readonly
3291000
heap
page read and write
80E0000
heap
page read and write
3291000
heap
page read and write
25635501000
trusted library allocation
page read and write
839000
unkown
page readonly
750000
unkown
page readonly
3290000
heap
page read and write
8A2000
trusted library allocation
page read and write
85BE000
stack
page read and write
4CE1000
heap
page read and write
8085000
heap
page read and write
4B50000
heap
page read and write
4EC7000
heap
page read and write
DF0000
unkown
page read and write
14D0000
unkown
page readonly
853C000
stack
page read and write
750000
unkown
page readonly
2510000
heap
page read and write
321D000
heap
page read and write
4D29000
heap
page read and write
12E4000
heap
page read and write
2563540E000
trusted library allocation
page read and write
2E78000
stack
page read and write
6290000
trusted library allocation
page read and write
85A000
heap
page read and write
3291000
heap
page read and write
4A03000
heap
page read and write
4CDE000
heap
page read and write
3291000
heap
page read and write
14DA000
unkown
page readonly
3291000
heap
page read and write
4C90000
heap
page read and write
3291000
heap
page read and write
63B0000
heap
page read and write
25633940000
heap
page read and write
3291000
heap
page read and write
31F8000
heap
page read and write
3291000
heap
page read and write
337C2000
system
page read and write
3291000
heap
page read and write
5222000
unclassified section
page read and write
839000
unkown
page readonly
3223000
heap
page read and write
5510000
trusted library allocation
page read and write
884000
trusted library allocation
page read and write
16A6000
direct allocation
page execute and read and write
820000
unkown
page readonly
451A000
unclassified section
page execute and read and write
25635403000
trusted library allocation
page read and write
25633860000
heap
page read and write
3291000
heap
page read and write
194000
unkown
page readonly
25635220000
trusted library allocation
page read and write
7F0000
unkown
page read and write
1080000
heap
page read and write
14D0000
unkown
page readonly
4FF9000
direct allocation
page execute and read and write
8070000
heap
page read and write
780000
heap
page read and write
EB1000
unkown
page readonly
3291000
heap
page read and write
31B3000
heap
page read and write
8088000
heap
page read and write
3206000
heap
page read and write
3291000
heap
page read and write
4A6E000
stack
page read and write
4990000
trusted library allocation
page read and write
4975000
trusted library allocation
page read and write
4C9C000
heap
page read and write
4E70000
trusted library allocation
page read and write
8B2000
trusted library allocation
page read and write
31A8000
heap
page read and write
735000
heap
page read and write
31BC000
heap
page read and write
320B000
heap
page read and write
2400000
unkown
page readonly
3291000
heap
page read and write
ACC000
stack
page read and write
3291000
heap
page read and write
256339A0000
heap
page read and write
3291000
heap
page read and write
31B3000
heap
page read and write
586E000
stack
page read and write
52E2000
unclassified section
page read and write
64CE000
heap
page read and write
83E000
stack
page read and write
8DA000
heap
page read and write
1691000
direct allocation
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3A0000
unkown
page readonly
14DD000
unkown
page readonly
4E52000
heap
page read and write
6D0000
heap
page read and write
3291000
heap
page read and write
8B7000
trusted library allocation
page execute and read and write
836000
unkown
page read and write
8070000
trusted library section
page read and write
3291000
heap
page read and write
60B0000
trusted library allocation
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
49B6000
trusted library allocation
page read and write
2D69000
system
page execute and read and write
31B3000
heap
page read and write
11A0000
heap
page read and write
380000
unkown
page readonly
390000
unkown
page readonly
770000
heap
page read and write
4C36000
heap
page read and write
3291000
heap
page read and write
68EE000
stack
page read and write
1728000
direct allocation
page execute and read and write
2FB4000
heap
page read and write
85E000
heap
page read and write
B2B000
unkown
page readonly
3291000
heap
page read and write
73C000
stack
page read and write
3291000
heap
page read and write
8DE000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
7E1000
unkown
page readonly
3291000
heap
page read and write
12F0000
heap
page read and write
3291000
heap
page read and write
5500000
trusted library allocation
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
760000
unkown
page readonly
3291000
heap
page read and write
B2D000
unkown
page readonly
820000
unkown
page readonly
3291000
heap
page read and write
1170000
unkown
page readonly
3210000
heap
page read and write
3291000
heap
page read and write
3291000
heap
page read and write
2FB0000
heap
page read and write
DC0000
unkown
page readonly
54EE000
stack
page read and write
8D0000
heap
page read and write
14CF000
stack
page read and write
88D000
trusted library allocation
page execute and read and write
31B9000
heap
page read and write
3291000
heap
page read and write
2430000
heap
page read and write
890000
trusted library allocation
page read and write
DD0000
unkown
page readonly
2EA2000
unkown
page read and write
55EC000
stack
page read and write
3291000
heap
page read and write
6270000
trusted library allocation
page read and write
461C000
stack
page read and write
3291000
heap
page read and write
4980000
trusted library allocation
page read and write
ACF000
stack
page read and write
323E000
heap
page read and write
3291000
heap
page read and write
54FC000
unclassified section
page read and write
3209000
heap
page read and write
D10000
unkown
page readonly
49F0000
trusted library allocation
page read and write
3291000
heap
page read and write
380000
unkown
page readonly
6F0000
heap
page read and write
2CF6000
system
page execute and read and write
3291000
heap
page read and write
810000
heap
page read and write
60A0000
trusted library allocation
page read and write
31AE000
heap
page read and write
3291000
heap
page read and write
740000
unkown
page readonly
63A000
stack
page read and write
11BA000
heap
page read and write
3266000
heap
page read and write
5212000
direct allocation
page execute and read and write
821000
unkown
page execute read
7EF0000
trusted library section
page read and write
3291000
heap
page read and write
67AE000
stack
page read and write
499B000
trusted library allocation
page read and write
EB1000
unkown
page readonly
DF0000
unkown
page read and write
2EA2000
unkown
page read and write
3291000
heap
page read and write
317C000
unkown
page read and write
25633A73000
heap
page read and write
3291000
heap
page read and write
82F000
unkown
page readonly
62B0000
heap
page read and write
3291000
heap
page read and write
68AF000
stack
page read and write
6A0C000
heap
page read and write
25633770000
system
page execute and read and write
3291000
heap
page read and write
3291000
heap
page read and write
256355CE000
trusted library allocation
page read and write
3291000
heap
page read and write
3242000
heap
page read and write
25633A40000
heap
page read and write
7FE0000
trusted library allocation
page execute and read and write
80F2000
heap
page read and write
836000
unkown
page read and write
25635412000
trusted library allocation
page read and write
3E7A000
unkown
page execute and read and write
16AD000
direct allocation
page execute and read and write
271A000
unclassified section
page execute and read and write
2420000
unkown
page read and write
3291000
heap
page read and write
31B9000
heap
page read and write
E7E000
stack
page read and write
A2000
unkown
page readonly
14DB000
unkown
page readonly
69EF000
stack
page read and write
3A0000
unkown
page readonly
2D06000
system
page execute and read and write
533C000
unclassified section
page read and write
857D000
stack
page read and write
850000
heap
page read and write
There are 667 hidden memdumps, click here to show them.