IOC Report
MACHINE SPECIFICATIONS.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps2015105010010Label

Files

File Path
Type
Category
Malicious
Download
MACHINE SPECIFICATIONS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\786202vrQ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Dalis
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
"C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe"
malicious
C:\Program Files (x86)\SyXPwcovsgyBnimAncDWTfeZLAHUZFFTDxcJNDvPtVVtbugvUDzQfRJdWsqklD\IexMqt2DaKEZyYvnrd.exe
"C:\Program Files (x86)\SyXPwcovsgyBnimAncDWTfeZLAHUZFFTDxcJNDvPtVVtbugvUDzQfRJdWsqklD\wDEIiNFL2nTgFi.exe"
malicious
C:\Windows\SysWOW64\RmClient.exe
"C:\Windows\SysWOW64\RmClient.exe"
malicious
C:\Program Files (x86)\SyXPwcovsgyBnimAncDWTfeZLAHUZFFTDxcJNDvPtVVtbugvUDzQfRJdWsqklD\IexMqt2DaKEZyYvnrd.exe
"C:\Program Files (x86)\SyXPwcovsgyBnimAncDWTfeZLAHUZFFTDxcJNDvPtVVtbugvUDzQfRJdWsqklD\RC7YGTMY.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.cjokfbvd.net/wgp3/
104.166.89.204
malicious
http://www.xiongsupported.shop/pr5c/
104.21.9.169
malicious
http://www.xiongsupported.shop/pr5c/?i0D=Xi/LK6kwyXQKhjKCQL9Nuw5sgizlPuHS/HlWEmGvuZuMTg5EdAzzL2AF+0bP2fPPzrXK77OIZiUqo3lfgNtbWbvn/9PdsdkmkiRzjBkycVp9GvrV7/dJkR+UYfMt4sSY1w==&o4=iBJXOXwHqRvdsxx
104.21.9.169
malicious
http://www.motherrucker.shop/t52t/?i0D=yEQzVPits0NhHU2gr4RI6lK78RLVs+xCfKL87vgTtuIHzz1j5f1H41/t+dWnccE+luCcZRKiXFUeFx6af2BrfPz/NH/GKZAdgXNhTFABCD++KEQteMSSXjZGNT87TwTbHg==&o4=iBJXOXwHqRvdsxx
15.197.148.33
malicious
http://www.iborn.org/vtfe/?i0D=0BWSKxZteIMvdWwbkh91oKbL4NvnBT/QlXyZVmxR8bAmAzD3t+OZfnLHg22q5MNh4SOsF0UzniEhEnuUD2V1yvH/6S+aIiFvH1AuFj0YcZU0hHFNVq1VQLR4F+zYTsGOMA==&o4=iBJXOXwHqRvdsxx
52.223.13.41
malicious
http://www.v153cbo9xcl49.buzz/q18c/
199.59.243.228
malicious
http://www.cjokfbvd.net/wgp3/?i0D=FbCmunup9JzbyjawoaUYO20YqMz5RcKn1ZlSYbA9NhRQ5NLtX0xVMyAtOROfqSjnxhBC7hrmjJ3peAjGixZUT33r4Ip3QHEQOUIMZH/wxeurfVbT1nYBFz5X+ylB/Jxe8w==&o4=iBJXOXwHqRvdsxx
104.166.89.204
malicious
http://www.strappix.online/3ps2/?o4=iBJXOXwHqRvdsxx&i0D=WXwa1ouCQFjltjxkAh/CTZI/QJYnZJ7RiFZntFtqJtxG/4+QtIGBFRyOqvXMEZndomF/0dELBX9B3HZcejPcji3I1P8obSOeWCdxDu1vnYnEDBpFb24Efl4NUTkDDZM/RQ==
84.32.84.32
malicious
http://www.dubaicarpark.xyz/v7hg/?o4=iBJXOXwHqRvdsxx&i0D=WZWKJ9Qw4GKZhbn8MUB5iivld8cr89J1rzv/5bsAiDwAi3JULUOModzom5VDkHubiOmOghqBmGr3eKIIMQjX4xRu2lRFXGlabl4DLkAm1EQi2otgsG2kyYsiaB+bGfQZ+g==
76.223.54.146
malicious
http://www.motherrucker.shop/t52t/
15.197.148.33
malicious
http://www.dubaicarpark.xyz/v7hg/
76.223.54.146
malicious
http://www.lefkosaturklisesi.net/scnj/
77.245.159.55
malicious
http://www.vitalbiteb.info/zswz/
172.67.165.31
malicious
http://www.anyang-590303492.click/5asc/
199.59.243.160
malicious
http://www.iborn.org/vtfe/
52.223.13.41
malicious
http://www.v153cbo9xcl49.buzz/q18c/?o4=iBJXOXwHqRvdsxx&i0D=aDm6GKOYr0XmGF3Nrvz8r4CnGLFy+8A+Hc3l0PWcafPryfk5HY5KCLAngANtOU40Me4kyF9duAdDeiOy56Plrgr/o4tM/MZKXU/jCltt8UHwcoNZhmmUVY8O6c2aCjyN9g==
199.59.243.228
malicious
http://www.progressreport.sbs/fm0t/
38.180.96.83
malicious
http://www.anyang-590303492.click/5asc/?i0D=aFiBmGBHqEtSRV8Cg0RlGSi5TQ6JNnuZv4EZqPlz8fbXA74/mH2vwX8Y+jkph8wmDySORnJ3hzzoOxdxucHlyqeTEhePJlZ1zQpYIuYebwf350JlX/oyurrrinDVfIpPIg==&o4=iBJXOXwHqRvdsxx
199.59.243.160
malicious
http://www.progressreport.sbs/fm0t/?i0D=HN0FJPMJqE54WuoAC9rBg+iyPy7iUGoE0RypB5g7CfrFeifDFflhbSZNtLTs7U15HZnIBVPqsxfpJr9ggZsB5iem3OSdmCTVuRrKagxGKxDGgf+JkfXC7lolV3X7374/ew==&o4=iBJXOXwHqRvdsxx
38.180.96.83
malicious
http://www.lefkosaturklisesi.net/scnj/?i0D=la6mruIiTl7jT5t2EcPRjP0WeEe/LFy3MvqxRRXa8eFDOUG5BAmqw6OJnO+J4HgW3FZhvM95BaNPh+FihBC2ef+dF/vlHdNiUXxBzK13a6a3wO2soDeUJbdcJB2RnA37+w==&o4=iBJXOXwHqRvdsxx
77.245.159.55
malicious
http://www.eioo.org/kiwx/
199.59.243.228
malicious
http://www.link6-tesla-nd6.xyz/ncfq/?i0D=+3ITSOfBVIny1mTavZs17Q9376/klX3H2+I+HyXDj8rxQfoe7x2MXudpkRNTSK9fou3Tb2u3jId7JTCKoKkkHzbi1/mIu3L8OX7itiKQ9s8gCEbVC0ZQdGbRXrevBAMDtA==&o4=iBJXOXwHqRvdsxx
172.64.80.1
malicious
http://www.strappix.online/3ps2/
84.32.84.32
malicious
http://www.eioo.org/kiwx/?i0D=dwrs7e0nshlLwNStdR2kT1v9YE2v1YHtMO32SGCbnOGQbDovHXh4qK/Lb2CeIfWj/mVHBuYbUbIN17xrS6dZWqoFyz00saBdX1SZwJeJaZeKW5OERKuwSjhYoEwuh2SJDQ==&o4=iBJXOXwHqRvdsxx
199.59.243.228
malicious
https://duckduckgo.com/ac/?q=
unknown
https://duckduckgo.com/?q=
unknown
https://kb.fastpanel.direct/troubleshoot/
unknown
http://lefkosaturklisesi.net/scnj/?i0D=la6mruIiTl7jT5t2EcPRjP0WeEe/LFy3MvqxRRXa8eFDOUG5BAmqw6OJnO
unknown
https://zz.bdstatic.com/linksubmit/push.js
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://push.zhanzhang.baidu.com/push.js
unknown
http://www.xiongsupported.shop
unknown
https://www.google.com
unknown
https://www.ecosia.org/newtab/v20w
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.xiongsupported.shop
104.21.9.169
malicious
lefkosaturklisesi.net
77.245.159.55
malicious
www.apexpoint.top
203.161.38.186
malicious
strappix.online
84.32.84.32
malicious
www.vitalbiteb.info
172.67.165.31
malicious
www.iborn.org
52.223.13.41
malicious
www.dubaicarpark.xyz
76.223.54.146
malicious
motherrucker.shop
15.197.148.33
malicious
www.link6-tesla-nd6.xyz
172.64.80.1
www.cjokfbvd.net
104.166.89.204
www.progressreport.sbs
38.180.96.83
www.anyang-590303492.click
199.59.243.160
94950.bodis.com
199.59.243.228
www.eioo.org
unknown
www.tzurik.click
unknown
www.motherrucker.shop
unknown
www.strappix.online
unknown
www.v153cbo9xcl49.buzz
unknown
www.lefkosaturklisesi.net
unknown
www.ogbos88.cyou
unknown
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
76.223.54.146
www.dubaicarpark.xyz
United States
malicious
77.245.159.55
lefkosaturklisesi.net
Turkey
malicious
203.161.38.186
www.apexpoint.top
Malaysia
malicious
84.32.84.32
strappix.online
Lithuania
malicious
15.197.148.33
motherrucker.shop
United States
malicious
104.21.9.169
www.xiongsupported.shop
United States
malicious
52.223.13.41
www.iborn.org
United States
malicious
172.67.165.31
www.vitalbiteb.info
United States
malicious
38.180.96.83
www.progressreport.sbs
United States
199.59.243.160
www.anyang-590303492.click
United States
104.166.89.204
www.cjokfbvd.net
United States
199.59.243.228
94950.bodis.com
United States
172.64.80.1
www.link6-tesla-nd6.xyz
United States
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
5670000
system
page execute and read and write
malicious
74E0000
unclassified section
page execute and read and write
malicious
800000
trusted library allocation
page read and write
malicious
2300000
unkown
page execute and read and write
malicious
7B0000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
110000
system
page execute and read and write
malicious
3FE0000
unclassified section
page execute and read and write
malicious
6B1000
heap
page read and write
1300000
unkown
page read and write
4254000
unclassified section
page read and write
48F000
unkown
page readonly
12A1000
unkown
page readonly
180000
heap
page read and write
48FC000
unkown
page read and write
480000
unkown
page readonly
145A000
heap
page read and write
6B1000
heap
page read and write
46B000
heap
page read and write
B20000
unkown
page readonly
499000
unkown
page readonly
6B1000
heap
page read and write
4FE000
heap
page read and write
6B1000
heap
page read and write
4D8000
heap
page read and write
3402000
heap
page read and write
6B1000
heap
page read and write
3250000
heap
page read and write
610000
heap
page read and write
76F4000
heap
page read and write
6B1000
heap
page read and write
7FC000
stack
page read and write
3A4D000
direct allocation
page read and write
3A49000
direct allocation
page read and write
3ABE000
direct allocation
page read and write
3413000
heap
page read and write
6B1000
heap
page read and write
F6D000
heap
page read and write
3ADA000
unkown
page read and write
A0000
unkown
page readonly
56D4000
system
page execute and read and write
A0000
unkown
page readonly
6B1000
heap
page read and write
9D0000
trusted library allocation
page read and write
3C0C000
unclassified section
page read and write
6B1000
heap
page read and write
99000
stack
page read and write
11A000
stack
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
DA0000
unkown
page readonly
6B1000
heap
page read and write
D72000
direct allocation
page execute and read and write
103A000
stack
page read and write
1450000
heap
page read and write
301C000
unclassified section
page read and write
471000
heap
page read and write
3780000
direct allocation
page read and write
1C0000
heap
page read and write
1250000
unkown
page read and write
6B1000
heap
page read and write
2099D679000
system
page execute and read and write
5A467FE000
stack
page read and write
CDE000
heap
page read and write
1140000
unkown
page readonly
76FD000
heap
page read and write
FFD000
heap
page read and write
53C000
heap
page read and write
6B1000
heap
page read and write
190000
unkown
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
56E0000
system
page execute and read and write
2F62000
unkown
page read and write
3413000
heap
page read and write
3A4D000
direct allocation
page read and write
6B1000
heap
page read and write
496000
unkown
page read and write
6B1000
heap
page read and write
3A4D000
direct allocation
page read and write
3413000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
2E70000
unkown
page readonly
160000
unkown
page readonly
1320000
heap
page read and write
2099F315000
trusted library allocation
page read and write
27FD000
unkown
page execute and read and write
3C00000
direct allocation
page execute and read and write
1150000
unkown
page readonly
76A4000
heap
page read and write
2D24000
heap
page read and write
6B1000
heap
page read and write
AF0000
heap
page read and write
3920000
direct allocation
page read and write
920000
trusted library allocation
page execute and read and write
6B9000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
323C000
unkown
page read and write
9A5000
heap
page read and write
476000
heap
page read and write
DFE000
stack
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
470000
heap
page read and write
6B1000
heap
page read and write
F9C000
heap
page read and write
2099F030000
trusted library allocation
page read and write
6B1000
heap
page read and write
7D6F000
stack
page read and write
3617000
heap
page read and write
D90000
unkown
page readonly
90000
unkown
page readonly
55B000
heap
page read and write
38E8000
unclassified section
page read and write
6B1000
heap
page read and write
1DCA4000
system
page read and write
9D0000
trusted library allocation
page read and write
496000
unkown
page read and write
47C000
heap
page read and write
1150000
unkown
page readonly
2099D67B000
system
page execute and read and write
2099F300000
trusted library allocation
page read and write
546000
heap
page read and write
6B1000
heap
page read and write
3413000
heap
page read and write
38A3000
direct allocation
page read and write
509000
heap
page read and write
6B1000
heap
page read and write
4CD000
heap
page read and write
3B29000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
1450000
heap
page read and write
7BF000
stack
page read and write
7DC000
heap
page read and write
B0000
unkown
page readonly
6B1000
heap
page read and write
3F90000
unkown
page read and write
2FFB000
stack
page read and write
8E0000
unkown
page readonly
150000
unkown
page readonly
3A49000
direct allocation
page read and write
6B1000
heap
page read and write
2210000
unkown
page readonly
18E1000
unkown
page readonly
470000
heap
page read and write
6B1000
heap
page read and write
2099F310000
trusted library allocation
page read and write
6B1000
heap
page read and write
3920000
direct allocation
page read and write
1E0000
unkown
page readonly
2E70000
unkown
page readonly
6B1000
heap
page read and write
4D52000
unclassified section
page read and write
476000
heap
page read and write
1003000
heap
page read and write
6B1000
heap
page read and write
3ABE000
direct allocation
page read and write
6B1000
heap
page read and write
C71000
unkown
page readonly
6B1000
heap
page read and write
3413000
heap
page read and write
42B4000
unkown
page read and write
3ABE000
direct allocation
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
5A46FFE000
stack
page read and write
6B1000
heap
page read and write
87C000
heap
page read and write
40C2000
unclassified section
page read and write
F69000
heap
page read and write
6B1000
heap
page read and write
517000
heap
page read and write
DA0000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
160000
unkown
page readonly
CD0000
direct allocation
page execute and read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
1046000
heap
page read and write
503000
heap
page read and write
768F000
heap
page read and write
33AE000
stack
page read and write
4DC000
heap
page read and write
6B1000
heap
page read and write
CD7000
heap
page read and write
F58000
heap
page read and write
440000
heap
page read and write
BE3000
unkown
page write copy
4A2E000
unclassified section
page read and write
6B1000
heap
page read and write
BAF000
unkown
page readonly
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
48F000
unkown
page readonly
6B1000
heap
page read and write
6B1000
heap
page read and write
2099D783000
heap
page read and write
2099F321000
trusted library allocation
page read and write
2210000
unkown
page readonly
6B1000
heap
page read and write
6B1000
heap
page read and write
1550000
unkown
page readonly
1A1000
unkown
page readonly
1170000
heap
page read and write
1310000
unkown
page read and write
12B0000
unkown
page read and write
3360000
heap
page read and write
3ABE000
direct allocation
page read and write
61E000
heap
page read and write
D80000
unkown
page readonly
4EDD000
unclassified section
page execute and read and write
3780000
direct allocation
page read and write
1140000
unkown
page readonly
6B1000
heap
page read and write
6B1000
heap
page read and write
4B5000
heap
page read and write
6B1000
heap
page read and write
43E6000
unclassified section
page read and write
43F000
stack
page read and write
2104000
heap
page read and write
6B1000
heap
page read and write
3D29000
direct allocation
page execute and read and write
1550000
unkown
page readonly
1F4000
heap
page read and write
D8000
stack
page read and write
1E0000
heap
page read and write
87E000
stack
page read and write
578C000
unkown
page read and write
6B1000
heap
page read and write
1479000
heap
page read and write
6B1000
heap
page read and write
3F50000
direct allocation
page read and write
1D6FC000
system
page read and write
6B1000
heap
page read and write
3701000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
4474000
unclassified section
page execute and read and write
76BB000
heap
page read and write
2104000
heap
page read and write
2099F4CE000
trusted library allocation
page read and write
6B1000
heap
page read and write
2099D780000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
79E0000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
499000
unkown
page readonly
6B1000
heap
page read and write
3920000
direct allocation
page read and write
496000
unkown
page read and write
6B1000
heap
page read and write
7690000
heap
page read and write
3948000
unkown
page read and write
1B0000
unkown
page read and write
38A3000
direct allocation
page read and write
870000
trusted library allocation
page read and write
6B1000
heap
page read and write
35C4000
unclassified section
page read and write
76E0000
heap
page read and write
610000
heap
page read and write
6B1000
heap
page read and write
56BB000
system
page execute and read and write
6B1000
heap
page read and write
3FA0000
direct allocation
page read and write
1D5E2000
system
page read and write
BCE000
direct allocation
page execute and read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3780000
direct allocation
page read and write
DA8000
heap
page read and write
7CF000
stack
page read and write
481000
unkown
page execute read
142F000
stack
page read and write
44DD000
unclassified section
page execute and read and write
45D8000
unkown
page read and write
2D24000
heap
page read and write
37B6000
unkown
page read and write
58DD000
unclassified section
page execute and read and write
C70000
unkown
page readonly
B0000
unkown
page readonly
4D8000
heap
page read and write
6B1000
heap
page read and write
BDF000
unkown
page write copy
480000
unkown
page readonly
79CE000
stack
page read and write
7698000
heap
page read and write
6B1000
heap
page read and write
142F000
stack
page read and write
170000
unkown
page readonly
34FD000
heap
page read and write
B20000
unkown
page readonly
47C000
heap
page read and write
2100000
heap
page read and write
476A000
unkown
page read and write
6B1000
heap
page read and write
BAF000
unkown
page readonly
6B1000
heap
page read and write
3606000
heap
page read and write
A30000
direct allocation
page execute and read and write
536000
heap
page read and write
8DF000
stack
page read and write
31FD000
unkown
page execute and read and write
1B0000
unkown
page read and write
481000
unkown
page execute read
6B1000
heap
page read and write
6B1000
heap
page read and write
3413000
heap
page read and write
476000
heap
page read and write
3F30000
unclassified section
page read and write
31DC000
unclassified section
page read and write
6B1000
heap
page read and write
61A000
heap
page read and write
6B1000
heap
page read and write
48F000
unkown
page readonly
496000
unkown
page read and write
B00000
heap
page read and write
6B1000
heap
page read and write
3920000
direct allocation
page read and write
159D000
stack
page read and write
4C9000
heap
page read and write
B59000
direct allocation
page execute and read and write
2099F401000
trusted library allocation
page read and write
6B1000
heap
page read and write
2099D77B000
heap
page read and write
6B1000
heap
page read and write
38A3000
direct allocation
page read and write
6B1000
heap
page read and write
5C60000
trusted library allocation
page read and write
489C000
unclassified section
page read and write
1300000
unkown
page read and write
190000
heap
page read and write
1E0000
unkown
page readonly
6B1000
heap
page read and write
100000
heap
page read and write
9A9000
heap
page read and write
6B1000
heap
page read and write
5EE000
stack
page read and write
3FA0000
direct allocation
page read and write
4CD000
heap
page read and write
46D000
heap
page read and write
6B1000
heap
page read and write
12B0000
unkown
page read and write
2D6E000
stack
page read and write
7B0000
trusted library allocation
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
113C000
stack
page read and write
950000
heap
page read and write
31A0000
heap
page read and write
6B1000
heap
page read and write
2794000
unkown
page execute and read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
1170000
heap
page read and write
2099F30E000
trusted library allocation
page read and write
477000
heap
page read and write
3F42000
direct allocation
page execute and read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3A49000
direct allocation
page read and write
145E000
heap
page read and write
4EE000
heap
page read and write
7702000
heap
page read and write
2099F140000
heap
page read and write
39FF000
stack
page read and write
6B1000
heap
page read and write
440000
unkown
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3612000
heap
page read and write
6B1000
heap
page read and write
2F62000
unkown
page read and write
B5D000
direct allocation
page execute and read and write
3A49000
direct allocation
page read and write
F7B000
heap
page read and write
541000
heap
page read and write
12D0000
unkown
page readonly
12E0000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3A49000
direct allocation
page read and write
3780000
direct allocation
page read and write
476000
heap
page read and write
3ECD000
direct allocation
page execute and read and write
145A000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
1250000
unkown
page read and write
3756000
unclassified section
page read and write
6B1000
heap
page read and write
190000
unkown
page read and write
2099F303000
trusted library allocation
page read and write
3413000
heap
page read and write
31B3000
heap
page read and write
6B0000
heap
page read and write
4EE000
heap
page read and write
3413000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
8E0000
unkown
page readonly
76CC000
heap
page read and write
83D000
stack
page read and write
3605000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3624000
heap
page read and write
9D0000
trusted library allocation
page read and write
BD5000
unkown
page readonly
BD5000
unkown
page readonly
6B1000
heap
page read and write
3A4D000
direct allocation
page read and write
3413000
heap
page read and write
6B1000
heap
page read and write
103A000
stack
page read and write
2099D720000
heap
page read and write
6B1000
heap
page read and write
1031000
heap
page read and write
6B1000
heap
page read and write
1325000
heap
page read and write
3A4D000
direct allocation
page read and write
150000
unkown
page readonly
6B1000
heap
page read and write
3D2D000
direct allocation
page execute and read and write
362A000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
2099D650000
system
page execute and read and write
3920000
direct allocation
page read and write
470A000
unclassified section
page read and write
F7E000
heap
page read and write
76F9000
heap
page read and write
6B1000
heap
page read and write
1160000
unkown
page readonly
6B1000
heap
page read and write
129E000
stack
page read and write
6B1000
heap
page read and write
2099F312000
trusted library allocation
page read and write
2FB4000
heap
page read and write
307C000
unkown
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
38FE000
stack
page read and write
3400000
heap
page read and write
4122000
unkown
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
12A1000
unkown
page readonly
2F02000
unclassified section
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
1E0000
heap
page read and write
3617000
heap
page read and write
7DB000
stack
page read and write
3C6C000
unkown
page read and write
1F0000
heap
page read and write
6B1000
heap
page read and write
3B9E000
heap
page read and write
3413000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
11A000
stack
page read and write
48B000
heap
page read and write
6B1000
heap
page read and write
180000
heap
page read and write
7680000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
481000
unkown
page execute read
6B1000
heap
page read and write
FE3000
heap
page read and write
D80000
unkown
page readonly
323C000
unkown
page read and write
3370000
direct allocation
page read and write
3413000
heap
page read and write
2099D750000
heap
page read and write
4E1000
heap
page read and write
3413000
heap
page read and write
4A8E000
unkown
page read and write
6B1000
heap
page read and write
3413000
heap
page read and write
76EF000
heap
page read and write
3280000
heap
page read and write
76E8000
heap
page read and write
CFD000
direct allocation
page execute and read and write
1D8BC000
system
page read and write
7704000
heap
page read and write
6B1000
heap
page read and write
7695000
heap
page read and write
499000
unkown
page readonly
6B1000
heap
page read and write
4446000
unkown
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
145E000
heap
page read and write
3413000
heap
page read and write
3ABE000
direct allocation
page read and write
48F000
unkown
page readonly
6B1000
heap
page read and write
CDE000
heap
page read and write
B21000
unkown
page execute read
46B000
heap
page read and write
2D20000
heap
page read and write
6B1000
heap
page read and write
61A000
heap
page read and write
2099D757000
heap
page read and write
481000
unkown
page execute read
471000
heap
page read and write
2099D783000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
472000
heap
page read and write
46D000
heap
page read and write
76C6000
heap
page read and write
6B1000
heap
page read and write
38A3000
direct allocation
page read and write
38A3000
direct allocation
page read and write
3230000
heap
page read and write
4DB2000
unkown
page read and write
6B1000
heap
page read and write
220F000
stack
page read and write
129E000
stack
page read and write
6B1000
heap
page read and write
5AC000
stack
page read and write
3D9E000
direct allocation
page execute and read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3413000
heap
page read and write
CE0000
direct allocation
page read and write
3780000
direct allocation
page read and write
B21000
unkown
page execute read
D90000
unkown
page readonly
170000
unkown
page readonly
6B1000
heap
page read and write
3605000
heap
page read and write
6B1000
heap
page read and write
768B000
heap
page read and write
3BFD000
unkown
page execute and read and write
2099F4C4000
trusted library allocation
page read and write
BE8000
unkown
page readonly
480000
unkown
page readonly
6B1000
heap
page read and write
199F000
stack
page read and write
6B1000
heap
page read and write
3920000
direct allocation
page read and write
3A49000
direct allocation
page read and write
6B1000
heap
page read and write
1A1000
unkown
page readonly
6B1000
heap
page read and write
BDF000
unkown
page read and write
6B1000
heap
page read and write
2099F4B0000
trusted library allocation
page read and write
2099D677000
system
page execute and read and write
4578000
unclassified section
page read and write
3A4D000
direct allocation
page read and write
6B1000
heap
page read and write
769D000
heap
page read and write
3617000
heap
page read and write
9B000
stack
page read and write
6B1000
heap
page read and write
3FA0000
direct allocation
page read and write
6B1000
heap
page read and write
2099F030000
trusted library allocation
page read and write
1F4000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
3780000
direct allocation
page read and write
6B1000
heap
page read and write
3ED1000
direct allocation
page execute and read and write
6B1000
heap
page read and write
5A47FFE000
stack
page read and write
6B1000
heap
page read and write
43E000
stack
page read and write
5A477FE000
stack
page read and write
76C2000
heap
page read and write
476000
heap
page read and write
2E6F000
stack
page read and write
1034000
heap
page read and write
6B1000
heap
page read and write
860000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
E60000
unkown
page read and write
BE8000
unkown
page readonly
33EE000
stack
page read and write
5AC000
stack
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
2FBC000
stack
page read and write
1320000
heap
page read and write
DA0000
unkown
page readonly
DBD000
stack
page read and write
50D000
heap
page read and write
3A7A000
unclassified section
page read and write
6B1000
heap
page read and write
1079000
heap
page read and write
4DC000
heap
page read and write
7686000
heap
page read and write
5737000
system
page execute and read and write
1F4000
heap
page read and write
6B1000
heap
page read and write
1003000
heap
page read and write
4E1000
heap
page read and write
480000
unkown
page readonly
56C4000
system
page execute and read and write
148D000
heap
page read and write
90000
unkown
page readonly
6B1000
heap
page read and write
18E0000
unkown
page readonly
6B1000
heap
page read and write
468000
heap
page read and write
440000
unkown
page read and write
3A01000
heap
page read and write
2099D710000
heap
page read and write
3A00000
heap
page read and write
2099F200000
trusted library allocation
page read and write
101F000
heap
page read and write
523000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
6B1000
heap
page read and write
5A45FFC000
stack
page read and write
6B1000
heap
page read and write
3800000
heap
page read and write
6B1000
heap
page read and write
499000
unkown
page readonly
61E000
heap
page read and write
12E0000
heap
page read and write
6B1000
heap
page read and write
3600000
heap
page read and write
3413000
heap
page read and write
6B1000
heap
page read and write
1160000
unkown
page readonly
113C000
stack
page read and write
6B1000
heap
page read and write
2099F010000
heap
page read and write
460000
heap
page read and write
6B1000
heap
page read and write
1430000
unkown
page read and write
6B1000
heap
page read and write
1DE000
stack
page read and write
3ABE000
direct allocation
page read and write
3B2D000
heap
page read and write
511000
heap
page read and write
6B1000
heap
page read and write
A1A000
heap
page read and write
12D0000
unkown
page readonly
6B1000
heap
page read and write
31A4000
heap
page read and write
D01000
direct allocation
page execute and read and write
2D20000
heap
page read and write
6B1000
heap
page read and write
2099D76D000
heap
page read and write
3624000
unkown
page read and write
1C0000
heap
page read and write
588C000
unkown
page read and write
2099F030000
trusted library allocation
page read and write
2099F4BE000
trusted library allocation
page read and write
6B1000
heap
page read and write
3923000
heap
page read and write
2100000
heap
page read and write
38A3000
direct allocation
page read and write
There are 668 hidden memdumps, click here to show them.