IOC Report
QUOTATION#0072395.exe

FilesProcessesURLsDomainsIPsMemdumps2015105010010Label

Files

File Path
Type
Category
Malicious
Download
QUOTATION#0072395.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\786202vrQ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\aut1407.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\chordates
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION#0072395.exe
"C:\Users\user\Desktop\QUOTATION#0072395.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\QUOTATION#0072395.exe"
malicious
C:\Program Files (x86)\eCuTJDdfFhKnpLEYGqExgFqbXhFJLDNwHYICCfSPtBhNLOEWgTwmMfeWaQBCpYc\2i4KSAeQqjs.exe
"C:\Program Files (x86)\eCuTJDdfFhKnpLEYGqExgFqbXhFJLDNwHYICCfSPtBhNLOEWgTwmMfeWaQBCpYc\j5WS6xmWSoOqDp.exe"
malicious
C:\Windows\SysWOW64\RmClient.exe
"C:\Windows\SysWOW64\RmClient.exe"
malicious
C:\Program Files (x86)\eCuTJDdfFhKnpLEYGqExgFqbXhFJLDNwHYICCfSPtBhNLOEWgTwmMfeWaQBCpYc\2i4KSAeQqjs.exe
"C:\Program Files (x86)\eCuTJDdfFhKnpLEYGqExgFqbXhFJLDNwHYICCfSPtBhNLOEWgTwmMfeWaQBCpYc\VdEkc6ze1N.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.dubaicarpark.xyz/v7hg/?7rPThJ=WZWKJ9Qw4GKZhbn8MUB5iivld8cr89J1rzv/5bsAiDwAi3JULUOModzom5VDkHubiOmOghqBmGr3eKIIMQjX9xd0/CFEX0Y7c1deF3t41j0imtNA6Q==&LFuLP=N8sLH430A
13.248.169.48
malicious
http://www.cjokfbvd.net/wgp3/
104.166.89.204
malicious
http://www.xiongsupported.shop/pr5c/
104.21.9.169
malicious
http://www.v153cbo9xcl49.buzz/q18c/?7rPThJ=aDm6GKOYr0XmGF3Nrvz8r4CnGLFy+8A+Hc3l0PWcafPryfk5HY5KCLAngANtOU40Me4kyF9duAdDeiOy56Plugnlhf5N/+krQEa+M2Az8zjwMtt53w==&LFuLP=N8sLH430A
199.59.243.228
malicious
http://www.v153cbo9xcl49.buzz/q18c/
199.59.243.228
malicious
http://www.lefkosaturklisesi.net/scnj/?7rPThJ=la6mruIiTl7jT5t2EcPRjP0WeEe/LFy3MvqxRRXa8eFDOUG5BAmqw6OJnO+J4HgW3FZhvM95BaNPh+FihBC2bfyHMY7kHvwDTHUc9ZYpad+3gLWM+Q==&LFuLP=N8sLH430A
77.245.159.55
malicious
http://www.iborn.org/vtfe/?7rPThJ=0BWSKxZteIMvdWwbkh91oKbL4NvnBT/QlXyZVmxR8bAmAzD3t+OZfnLHg22q5MNh4SOsF0UzniEhEnuUD2V13vLlz1qbIQ4OAllzLwZGc+w0xCltDw==&LFuLP=N8sLH430A
52.223.13.41
malicious
http://www.vitalbiteb.info/zswz/?7rPThJ=edOAwx+0dO4+2suuLvgQpqVnVXSx9YqMGT0O7vLJtqT0uFAfmU6RRfcBg+Pcx7SToF08/52RkEv4Bt7+jrP35cPAiM1wPbiguJUEB3H9phTlt8qMtA==&LFuLP=N8sLH430A
104.21.11.37
malicious
http://www.strappix.online/3ps2/?7rPThJ=WXwa1ouCQFjltjxkAh/CTZI/QJYnZJ7RiFZntFtqJtxG/4+QtIGBFRyOqvXMEZndomF/0dELBX9B3HZcejPcmi7S8oopbgz/RS4sN9Yxn/DETEJlNg==&LFuLP=N8sLH430A
84.32.84.32
malicious
http://www.motherrucker.shop/t52t/?7rPThJ=yEQzVPits0NhHU2gr4RI6lK78RLVs+xCfKL87vgTtuIHzz1j5f1H41/t+dWnccE+luCcZRKiXFUeFx6af2BraP/lEgrHKr98nHo8dWtfCka+aBwNIQ==&LFuLP=N8sLH430A
3.33.130.190
malicious
http://www.motherrucker.shop/t52t/
3.33.130.190
malicious
http://www.link6-tesla-nd6.xyz/ncfq/?7rPThJ=+3ITSOfBVIny1mTavZs17Q9376/klX3H2+I+HyXDj8rxQfoe7x2MXudpkRNTSK9fou3Tb2u3jId7JTCKoKkkCzX48YyJuF2dJHe/jxnO9LYgSB71Ug==&LFuLP=N8sLH430A
172.64.80.1
malicious
http://www.dubaicarpark.xyz/v7hg/
13.248.169.48
malicious
http://www.lefkosaturklisesi.net/scnj/
77.245.159.55
malicious
http://www.vitalbiteb.info/zswz/
104.21.11.37
malicious
http://www.anyang-590303492.click/5asc/
199.59.243.160
malicious
http://www.xiongsupported.shop/pr5c/?7rPThJ=Xi/LK6kwyXQKhjKCQL9Nuw5sgizlPuHS/HlWEmGvuZuMTg5EdAzzL2AF+0bP2fPPzrXK77OIZiUqo3lfgNtbTbj92abcsvZHjy0utSJscyN9WqL1tg==&LFuLP=N8sLH430A
104.21.9.169
malicious
http://www.iborn.org/vtfe/
52.223.13.41
malicious
http://www.progressreport.sbs/fm0t/
38.180.96.83
malicious
http://www.progressreport.sbs/fm0t/?7rPThJ=HN0FJPMJqE54WuoAC9rBg+iyPy7iUGoE0RypB5g7CfrFeifDFflhbSZNtLTs7U15HZnIBVPqsxfpJr9ggZsB8iS8+pGcmwu0pBOXUzcYKWnGwaepyA==&LFuLP=N8sLH430A
38.180.96.83
malicious
http://www.eioo.org/kiwx/?7rPThJ=dwrs7e0nshlLwNStdR2kT1v9YE2v1YHtMO32SGCbnOGQbDovHXh4qK/Lb2CeIfWj/mVHBuYbUbIN17xrS6dZTqkf7Ug1so88Ql3E+azXa+6KG8ukHQ==&LFuLP=N8sLH430A
199.59.243.228
malicious
http://www.cjokfbvd.net/wgp3/?7rPThJ=FbCmunup9JzbyjawoaUYO20YqMz5RcKn1ZlSYbA9NhRQ5NLtX0xVMyAtOROfqSjnxhBC7hrmjJ3peAjGixZUW37xxv92Q15xJEtRXUSux5KrPQ7zjw==&LFuLP=N8sLH430A
104.166.89.204
malicious
http://www.eioo.org/kiwx/
199.59.243.228
malicious
http://www.strappix.online/3ps2/
84.32.84.32
malicious
https://duckduckgo.com/ac/?q=
unknown
https://kb.fastpanel.direct/troubleshoot/
unknown
https://www.ecosia.org/newtab/v20Y&
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://zz.bdstatic.com/linksubmit/push.js
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://push.zhanzhang.baidu.com/push.js
unknown
http://lefkosaturklisesi.net/scnj/?7rPThJ=la6mruIiTl7jT5t2EcPRjP0WeEe/LFy3MvqxRRXa8eFDOUG5BAmqw6OJnO
unknown
http://www.xiongsupported.shop
unknown
https://www.google.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.link6-tesla-nd6.xyz
172.64.80.1
malicious
www.xiongsupported.shop
104.21.9.169
malicious
lefkosaturklisesi.net
77.245.159.55
malicious
www.apexpoint.top
203.161.38.186
malicious
strappix.online
84.32.84.32
malicious
www.vitalbiteb.info
104.21.11.37
malicious
www.iborn.org
52.223.13.41
malicious
www.dubaicarpark.xyz
13.248.169.48
malicious
motherrucker.shop
3.33.130.190
malicious
www.cjokfbvd.net
104.166.89.204
www.progressreport.sbs
38.180.96.83
www.anyang-590303492.click
199.59.243.160
94950.bodis.com
199.59.243.228
www.eioo.org
unknown
www.tzurik.click
unknown
www.motherrucker.shop
unknown
www.strappix.online
unknown
www.v153cbo9xcl49.buzz
unknown
www.lefkosaturklisesi.net
unknown
www.ogbos88.cyou
unknown
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.dubaicarpark.xyz
United States
malicious
77.245.159.55
lefkosaturklisesi.net
Turkey
malicious
203.161.38.186
www.apexpoint.top
Malaysia
malicious
84.32.84.32
strappix.online
Lithuania
malicious
104.21.11.37
www.vitalbiteb.info
United States
malicious
104.21.9.169
www.xiongsupported.shop
United States
malicious
172.64.80.1
www.link6-tesla-nd6.xyz
United States
malicious
52.223.13.41
www.iborn.org
United States
malicious
3.33.130.190
motherrucker.shop
United States
malicious
38.180.96.83
www.progressreport.sbs
United States
199.59.243.160
www.anyang-590303492.click
United States
104.166.89.204
www.cjokfbvd.net
United States
199.59.243.228
94950.bodis.com
United States
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3A40000
unclassified section
page execute and read and write
malicious
2C40000
system
page execute and read and write
malicious
2EE0000
trusted library allocation
page read and write
malicious
49F0000
system
page execute and read and write
malicious
3780000
unkown
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
5350000
unclassified section
page execute and read and write
malicious
3040000
trusted library allocation
page read and write
malicious
30F1000
heap
page read and write
650000
unkown
page read and write
2B36000
unkown
page read and write
37C6000
unkown
page read and write
3A0D000
direct allocation
page read and write
4006000
unclassified section
page read and write
30F1000
heap
page read and write
64E000
heap
page read and write
500000
unkown
page readonly
5C0000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3DB8000
unkown
page execute and read and write
7F9000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3634000
unkown
page read and write
30F1000
heap
page read and write
2284000
heap
page read and write
38E0000
direct allocation
page read and write
10A4000
heap
page read and write
910000
unkown
page readonly
25BC000
unkown
page read and write
30F1000
heap
page read and write
19A73990000
heap
page read and write
7CE8000
heap
page read and write
EAE000
unkown
page write copy
30F1000
heap
page read and write
3090000
trusted library allocation
page read and write
7CE3000
heap
page read and write
2F56000
heap
page read and write
63E000
stack
page read and write
30F1000
heap
page read and write
AE0000
heap
page read and write
30F0000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3213000
heap
page read and write
3C7C000
unkown
page read and write
EB7000
unkown
page readonly
33732000
system
page read and write
32AB000
heap
page read and write
120000
unkown
page readonly
10FF000
heap
page read and write
1116000
heap
page read and write
30F1000
heap
page read and write
83DF000
stack
page read and write
2F6B000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
22E2000
unkown
page read and write
37CF000
stack
page read and write
30F1000
heap
page read and write
ED0000
heap
page read and write
4A58000
system
page execute and read and write
30F1000
heap
page read and write
21E0000
heap
page read and write
2FDD000
heap
page read and write
30F1000
heap
page read and write
4E28000
unclassified section
page read and write
3740000
direct allocation
page read and write
1E0000
unkown
page readonly
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3213000
heap
page read and write
190000
heap
page read and write
55E000
stack
page read and write
30F1000
heap
page read and write
3A40000
direct allocation
page read and write
30F1000
heap
page read and write
10AB000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
A7E000
stack
page read and write
30F1000
heap
page read and write
3A09000
direct allocation
page read and write
30F1000
heap
page read and write
3A09000
direct allocation
page read and write
30F1000
heap
page read and write
180000
unkown
page readonly
30F1000
heap
page read and write
30F1000
heap
page read and write
19A755BE000
trusted library allocation
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
2FAB000
heap
page read and write
3A0D000
direct allocation
page read and write
3A0D000
direct allocation
page read and write
3310000
unkown
page read and write
20AE000
stack
page read and write
4A71000
system
page execute and read and write
7CDF000
heap
page read and write
1068000
heap
page read and write
3700000
heap
page read and write
19A7380F000
system
page execute and read and write
6C0000
heap
page read and write
2F56000
heap
page read and write
19A737A0000
system
page execute and read and write
34A2000
unkown
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
2FDE000
stack
page read and write
510000
heap
page read and write
7CD8000
heap
page read and write
1095000
heap
page read and write
30F1000
heap
page read and write
5F0000
unkown
page read and write
321B000
heap
page read and write
C0000
unkown
page readonly
30F1000
heap
page read and write
500000
unkown
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
6C0000
heap
page read and write
4A7F000
system
page execute and read and write
60000
unkown
page readonly
30E0000
heap
page read and write
6C6000
heap
page read and write
33DF4000
system
page read and write
4B04000
unclassified section
page read and write
3A8C000
unclassified section
page read and write
30F1000
heap
page read and write
185E000
stack
page read and write
30F1000
heap
page read and write
3872000
unclassified section
page read and write
3E0E000
unkown
page read and write
3213000
heap
page read and write
3F50000
unclassified section
page execute and read and write
30F1000
heap
page read and write
DF0000
unkown
page readonly
6F000
unkown
page readonly
30F1000
heap
page read and write
140000
unkown
page readonly
30F1000
heap
page read and write
1AA000
stack
page read and write
30F1000
heap
page read and write
F20000
direct allocation
page read and write
30F1000
heap
page read and write
1A0000
unkown
page read and write
6A0000
unkown
page read and write
72721FE000
stack
page read and write
64E000
heap
page read and write
3DCD000
direct allocation
page execute and read and write
30F1000
heap
page read and write
F10000
heap
page read and write
3213000
heap
page read and write
10AA000
heap
page execute and read and write
684000
heap
page read and write
30F1000
heap
page read and write
3863000
direct allocation
page read and write
3589000
direct allocation
page execute and read and write
3449000
heap
page read and write
2280000
heap
page read and write
30F1000
heap
page read and write
19A752D0000
trusted library allocation
page read and write
7D0000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3863000
direct allocation
page read and write
3C9E000
direct allocation
page execute and read and write
180000
unkown
page readonly
79000
unkown
page readonly
7CFA000
heap
page read and write
4A61000
system
page execute and read and write
60000
unkown
page readonly
30F1000
heap
page read and write
160000
unkown
page readonly
30F1000
heap
page read and write
2F4D000
heap
page read and write
30F1000
heap
page read and write
E3C000
stack
page read and write
3A09000
direct allocation
page read and write
30F1000
heap
page read and write
120000
unkown
page readonly
8D0000
unkown
page readonly
560000
heap
page read and write
2FAB000
heap
page read and write
500000
unkown
page read and write
910000
unkown
page readonly
30F1000
heap
page read and write
E7F000
unkown
page readonly
30F1000
heap
page read and write
372D000
direct allocation
page execute and read and write
358D000
direct allocation
page execute and read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
2F9E000
heap
page read and write
640000
heap
page read and write
3E20000
unkown
page execute and read and write
30F1000
heap
page read and write
3A09000
direct allocation
page read and write
2380000
unkown
page execute and read and write
72729FF000
stack
page read and write
2F40000
heap
page read and write
4A7D000
system
page execute and read and write
30F1000
heap
page read and write
1AA000
stack
page read and write
7CF000
stack
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3C29000
direct allocation
page execute and read and write
30F1000
heap
page read and write
31F0000
trusted library allocation
page read and write
30F1000
heap
page read and write
9DB000
stack
page read and write
7CCB000
heap
page read and write
7DE000
heap
page read and write
21B0000
unkown
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
7CD6000
heap
page read and write
3460000
direct allocation
page execute and read and write
7CB0000
heap
page read and write
4820000
unkown
page execute and read and write
3405000
heap
page read and write
2FC5000
heap
page read and write
19A75403000
trusted library allocation
page read and write
7CC6000
heap
page read and write
2FE3000
heap
page read and write
19A75300000
trusted library allocation
page read and write
30F1000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
38CC000
unclassified section
page read and write
3740000
direct allocation
page read and write
30F1000
heap
page read and write
560000
heap
page read and write
2F97000
heap
page read and write
30F1000
heap
page read and write
19A739C0000
heap
page read and write
19A73A12000
heap
page read and write
30F1000
heap
page read and write
CA1000
unkown
page readonly
76000
unkown
page read and write
6B0000
unkown
page read and write
2290000
unkown
page readonly
160000
unkown
page readonly
4198000
unclassified section
page read and write
EA4000
unkown
page readonly
19A75501000
trusted library allocation
page read and write
30F1000
heap
page read and write
7CDB000
heap
page read and write
2CC8000
unkown
page read and write
4FBA000
unclassified section
page read and write
3213000
heap
page read and write
23A2000
unkown
page read and write
30F1000
heap
page read and write
1F1000
unkown
page readonly
19A755A5000
trusted library allocation
page read and write
4972000
unclassified section
page read and write
7D05000
heap
page read and write
22E2000
unkown
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
38E0000
direct allocation
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3A7E000
direct allocation
page read and write
7D3B000
heap
page read and write
79000
unkown
page readonly
19A75417000
trusted library allocation
page read and write
3740000
direct allocation
page read and write
30F1000
heap
page read and write
684000
heap
page read and write
30F1000
heap
page read and write
9FC000
stack
page read and write
76000
unkown
page read and write
3863000
direct allocation
page read and write
30F1000
heap
page read and write
7FC0000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
2D40000
heap
page read and write
30F1000
heap
page read and write
21F0000
unkown
page readonly
3DD1000
direct allocation
page execute and read and write
CA0000
unkown
page readonly
640000
heap
page read and write
DF1000
unkown
page execute read
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
337F2000
system
page read and write
30F1000
heap
page read and write
6290000
trusted library allocation
page read and write
3A0D000
direct allocation
page read and write
1E0000
unkown
page readonly
590000
unkown
page read and write
30F1000
heap
page read and write
3030000
heap
page read and write
30F1000
heap
page read and write
19A75412000
trusted library allocation
page read and write
38E0000
direct allocation
page read and write
CA0000
heap
page read and write
4132000
unkown
page read and write
3A40000
direct allocation
page read and write
33D4000
heap
page read and write
1EE000
stack
page read and write
30F1000
heap
page read and write
1094000
heap
page read and write
7D28000
heap
page read and write
DF1000
unkown
page execute read
23FC000
unkown
page read and write
7CE3000
heap
page read and write
3A0D000
direct allocation
page read and write
7CF000
stack
page read and write
7D2D000
heap
page read and write
10C0000
heap
page read and write
7D0000
heap
page read and write
30F1000
heap
page read and write
61000
unkown
page execute read
3731000
direct allocation
page execute and read and write
30F1000
heap
page read and write
6F000
unkown
page readonly
3501000
heap
page read and write
A0000
unkown
page readonly
5988000
unclassified section
page execute and read and write
9CF000
stack
page read and write
30F1000
heap
page read and write
B0000
unkown
page readonly
3958000
unkown
page read and write
61000
unkown
page execute read
30F1000
heap
page read and write
DF0000
unkown
page readonly
44BC000
unclassified section
page read and write
30F1000
heap
page read and write
2284000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
590000
unkown
page read and write
AC0000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
301F000
heap
page read and write
7DE000
heap
page read and write
3823000
heap
page read and write
2D44000
heap
page read and write
76000
unkown
page read and write
3213000
heap
page read and write
3740000
direct allocation
page read and write
60000
unkown
page readonly
2FBF000
heap
page read and write
30F1000
heap
page read and write
2CC0000
heap
page read and write
10FF000
heap
page read and write
7E60000
trusted library allocation
page read and write
30F1000
heap
page read and write
3B00000
direct allocation
page execute and read and write
3A09000
direct allocation
page read and write
30F1000
heap
page read and write
76000
unkown
page read and write
7CDE000
heap
page read and write
4950000
unclassified section
page execute and read and write
19A73A0F000
heap
page read and write
30F1000
heap
page read and write
3014000
heap
page read and write
30F1000
heap
page read and write
2F52000
heap
page read and write
3213000
heap
page read and write
30F1000
heap
page read and write
2F5C000
heap
page read and write
30F1000
heap
page read and write
670000
unkown
page readonly
90F000
stack
page read and write
570000
unkown
page readonly
2FB1000
heap
page read and write
30F1000
heap
page read and write
2FA0000
heap
page read and write
2C38000
stack
page read and write
1136000
heap
page read and write
130000
unkown
page readonly
30F1000
heap
page read and write
3213000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
2FC5000
heap
page read and write
3E42000
direct allocation
page execute and read and write
30F1000
heap
page read and write
38E0000
direct allocation
page read and write
3213000
heap
page read and write
4FC000
stack
page read and write
C60000
unkown
page readonly
9BF000
stack
page read and write
2FF4000
heap
page read and write
3AEA000
unkown
page read and write
30F1000
heap
page read and write
A30000
heap
page read and write
33D8000
heap
page read and write
300B000
heap
page read and write
30F1000
heap
page read and write
29A4000
unkown
page read and write
30F1000
heap
page read and write
E7B000
stack
page read and write
2EE0000
trusted library allocation
page read and write
3A0D000
direct allocation
page read and write
7DA000
heap
page read and write
72709FC000
stack
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3863000
direct allocation
page read and write
3417000
heap
page read and write
839E000
stack
page read and write
79000
unkown
page readonly
19A75414000
trusted library allocation
page read and write
3405000
heap
page read and write
1060000
heap
page read and write
61000
unkown
page execute read
EA4000
unkown
page readonly
2F51000
heap
page read and write
338E000
stack
page read and write
30F1000
heap
page read and write
19A75421000
trusted library allocation
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
8D0000
unkown
page readonly
3863000
direct allocation
page read and write
190000
heap
page read and write
4C96000
unclassified section
page read and write
30F1000
heap
page read and write
3A7E000
direct allocation
page read and write
21AF000
stack
page read and write
79000
unkown
page readonly
301B000
heap
page read and write
680000
heap
page read and write
2F4B000
heap
page read and write
33CE000
stack
page read and write
3A3E000
stack
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3A7E000
direct allocation
page read and write
64A000
heap
page read and write
570000
unkown
page readonly
680000
heap
page read and write
3A2D000
heap
page read and write
19A739EA000
heap
page read and write
3CA000
stack
page read and write
30F1000
heap
page read and write
2F56000
heap
page read and write
7CD1000
heap
page read and write
30F1000
heap
page read and write
2F56000
heap
page read and write
30F1000
heap
page read and write
3090000
trusted library allocation
page read and write
2F57000
heap
page read and write
3A40000
direct allocation
page read and write
30F1000
heap
page read and write
10A3000
heap
page execute and read and write
3412000
heap
page read and write
3213000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3F4F000
stack
page read and write
29CB000
stack
page read and write
6A0000
unkown
page read and write
EB0000
heap
page read and write
7DB0000
trusted library allocation
page read and write
2D10000
heap
page read and write
3A9E000
heap
page read and write
3A7E000
direct allocation
page read and write
30F1000
heap
page read and write
2FB1000
heap
page read and write
4FC000
stack
page read and write
2FD2000
heap
page read and write
19A739E0000
heap
page read and write
7D3D000
heap
page read and write
72719FE000
stack
page read and write
10DA000
heap
page read and write
37A2000
direct allocation
page execute and read and write
3213000
heap
page read and write
30F1000
heap
page read and write
EB7000
unkown
page readonly
3417000
heap
page read and write
30F1000
heap
page read and write
1F0000
unkown
page readonly
30F1000
heap
page read and write
D10000
direct allocation
page read and write
2F51000
heap
page read and write
3213000
heap
page read and write
30F1000
heap
page read and write
19A75500000
trusted library allocation
page read and write
30F1000
heap
page read and write
810000
heap
page read and write
650000
unkown
page read and write
30F1000
heap
page read and write
2FBF000
heap
page read and write
7CFF000
heap
page read and write
30F1000
heap
page read and write
6F000
unkown
page readonly
32A0000
trusted library allocation
page execute and read and write
19A739FC000
heap
page read and write
3200000
heap
page read and write
10FF000
heap
page read and write
10E7000
heap
page read and write
1116000
heap
page read and write
30F1000
heap
page read and write
3213000
heap
page read and write
19A752C0000
heap
page read and write
3740000
direct allocation
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
510000
heap
page read and write
3C2D000
direct allocation
page execute and read and write
3A29000
heap
page read and write
1F0000
unkown
page readonly
30F1000
heap
page read and write
2FEC000
unkown
page read and write
30F1000
heap
page read and write
140000
unkown
page readonly
ABE000
stack
page read and write
30F1000
heap
page read and write
341E000
heap
page read and write
2FEE000
heap
page read and write
170000
unkown
page readonly
3384C000
system
page read and write
3090000
trusted library allocation
page read and write
3863000
direct allocation
page read and write
5F0000
unkown
page read and write
7D2B000
heap
page read and write
7D35000
heap
page read and write
11A6000
heap
page read and write
641000
unkown
page readonly
30F1000
heap
page read and write
25BC000
unkown
page read and write
2D20000
heap
page read and write
3A7E000
direct allocation
page read and write
30F1000
heap
page read and write
10AB000
heap
page read and write
2D44000
heap
page read and write
19A73811000
system
page execute and read and write
EB2000
unkown
page write copy
61000
unkown
page execute read
64A000
heap
page read and write
7D21000
heap
page read and write
F00000
heap
page read and write
30F1000
heap
page read and write
19A7380D000
system
page execute and read and write
30F1000
heap
page read and write
6F000
unkown
page readonly
30F1000
heap
page read and write
20B000
unkown
page read and write
2D44000
heap
page read and write
30F1000
heap
page read and write
63E000
stack
page read and write
30F1000
heap
page read and write
7DA000
heap
page read and write
21AF000
stack
page read and write
2F56000
heap
page read and write
30F1000
heap
page read and write
1117000
heap
page read and write
432A000
unclassified section
page read and write
33A0C000
system
page read and write
30F1000
heap
page read and write
12A000
stack
page read and write
38E0000
direct allocation
page read and write
47E0000
unclassified section
page read and write
30F1000
heap
page read and write
35FE000
direct allocation
page execute and read and write
3400000
heap
page read and write
1A0000
unkown
page read and write
19A7540F000
trusted library allocation
page read and write
3202000
heap
page read and write
3740000
direct allocation
page read and write
EAE000
unkown
page read and write
1F1000
unkown
page readonly
A0000
unkown
page readonly
19A73A0B000
heap
page read and write
CA4000
heap
page read and write
30F1000
heap
page read and write
37B2000
unclassified section
page read and write
30F1000
heap
page read and write
4C4C000
unkown
page read and write
E7F000
unkown
page readonly
7CC3000
heap
page read and write
3213000
heap
page read and write
30F1000
heap
page read and write
2D80000
unkown
page execute and read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
3A09000
direct allocation
page read and write
30F1000
heap
page read and write
670000
unkown
page readonly
2290000
unkown
page readonly
2280000
heap
page read and write
2F5C000
heap
page read and write
3025000
heap
page read and write
30F1000
heap
page read and write
19A739EF000
heap
page read and write
2F48000
heap
page read and write
641000
unkown
page readonly
30F1000
heap
page read and write
30F1000
heap
page read and write
C0000
unkown
page readonly
21F0000
unkown
page readonly
30F1000
heap
page read and write
514C000
unclassified section
page read and write
2E5A000
unkown
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
130000
unkown
page readonly
2F4D000
heap
page read and write
30F1000
heap
page read and write
4FC000
stack
page read and write
30F1000
heap
page read and write
19A75400000
trusted library allocation
page read and write
19A738A0000
heap
page read and write
30F1000
heap
page read and write
63F0000
unclassified section
page execute and read and write
3A7E000
direct allocation
page read and write
30F1000
heap
page read and write
19A7540A000
trusted library allocation
page read and write
5602000
unclassified section
page read and write
30F1000
heap
page read and write
500000
unkown
page readonly
2FBC000
heap
page read and write
10A4000
heap
page read and write
2FD2000
heap
page read and write
30F1000
heap
page read and write
7DC1000
heap
page read and write
30F1000
heap
page read and write
1C5F000
stack
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
38E0000
direct allocation
page read and write
2FEA000
heap
page read and write
10DA000
heap
page read and write
30F8000
heap
page read and write
30F1000
heap
page read and write
170000
unkown
page readonly
2FBC000
heap
page read and write
72711FE000
stack
page read and write
3801000
heap
page read and write
C90000
heap
page read and write
4FC000
stack
page read and write
19A752D0000
trusted library allocation
page read and write
30F1000
heap
page read and write
C61000
unkown
page readonly
10DA000
heap
page read and write
30F1000
heap
page read and write
3000000
heap
page read and write
30F1000
heap
page read and write
D00000
heap
page read and write
109E000
heap
page read and write
4AD4000
system
page execute and read and write
30F1000
heap
page read and write
12A000
stack
page read and write
21E0000
heap
page read and write
30F1000
heap
page read and write
5C0000
heap
page read and write
2F4B000
heap
page read and write
B0000
unkown
page readonly
30F1000
heap
page read and write
7CF4000
heap
page read and write
30F1000
heap
page read and write
7D19000
heap
page read and write
4B4C000
unkown
page read and write
30F1000
heap
page read and write
60000
unkown
page readonly
19A755C4000
trusted library allocation
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
52DE000
unclassified section
page read and write
30F1000
heap
page read and write
30F1000
heap
page read and write
59F0000
unclassified section
page execute and read and write
F20000
direct allocation
page read and write
3E74000
unclassified section
page read and write
3900000
heap
page read and write
30F1000
heap
page read and write
There are 681 hidden memdumps, click here to show them.