IOC Report
RFQ details folder.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps12108642010010Label

Files

File Path
Type
Category
Malicious
Download
RFQ details folder.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut3BCC.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\enterogenous
data
dropped
C:\Users\user\AppData\Local\Temp\r44a7072
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ details folder.exe
"C:\Users\user\Desktop\RFQ details folder.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\RFQ details folder.exe"
malicious
C:\Program Files (x86)\yDDAlOJrVlJOMgzZheStqffCErzxMCQeNFsCYZihjRALYrQJdJsTIu\99mXjPxVfM3v.exe
"C:\Program Files (x86)\yDDAlOJrVlJOMgzZheStqffCErzxMCQeNFsCYZihjRALYrQJdJsTIu\yAiAbpT3q2kvS2.exe"
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\SysWOW64\reg.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.boa-first-option.click/1lu1/?s2spt=gnLWuwl3YNLZq+kctfrZUOTzTE3pbZVwjJY4ZtQulD85or1kaYgFmp8RYbKmTg0As5h6Mjvom9+7CRNf5gL+WXwHB31qXopKQu9NEjLyPWWcN/0zbSlnIAo=&ed=lFj0T
52.223.13.41
malicious
http://www.myhandyplanner.courses/qm65/?ed=lFj0T&s2spt=WKDdNWC7INV6sdOF5Bhyf1QssefnQWO/zrWG+knbwk3UKiu1mAWcQNEx7C72Rm2XZizvCRn0VF5y6M8t/wPOeO9O0pStKLi9f2h/7RX8W0nZFe+LJKmGy+U=
199.59.243.228
malicious
http://www.5s5zz.icu/7aoy/?ed=lFj0T&s2spt=fp2YbicaeZCvjPlH5kaqf38DV41Alb36RkH12Jc9jsEP3xNt5+yvvuwn7GzaPio27TEiEJpJOLWrHvzanHbqLkTN1Egji6y1JuragXTWaqXBAGzomLUHXW4=
47.239.127.207
malicious
http://www.lindaashley.wedding/vwqy/?s2spt=v3ZoZSKmjs/ElY9JvlJ7BWTwahN5acThzg3dHORkdyRJknvTPlvLy9hszWAf9XBOUxgBVtKXDaR+AVr7OKAzWeOWT1wlljBB6sVlXxalYjF/TM4jMJevS8E=&ed=lFj0T
52.223.13.41
malicious
http://www.nodefolio.xyz/b3dy/?ed=lFj0T&s2spt=h9bs7PJVxZ24zAp8sOvULNZBJpYYvbGSw5AYHhggM3Al5Cg+4lnT1wleJpI9wHWBpVcO5JhmorqlsWRv+OmFrOSl3OTa2WslKmv3CcMifMqF+OCOFwGvzWg=
76.223.54.146
malicious
http://www.maxank.top/esrt/?s2spt=Dauko676kCztHQAXIiMAeyqPgXjiUXsVTvMTsJhZ5gXLx1NdSwykiYrwT7juNmxOBLlr8LsBbcSb/+BWh1+dBPlTlKbRdnNReWZk2Peo2mQA4HQoEli9PVE=&ed=lFj0T
162.254.32.77
malicious
http://www.12345lopkmj.lol/80od/?s2spt=IuBU55xvok3HLpzopmSwS3eRJtMGjt1Zqh5Gq7N5X/kkFlbQTPRvjQimlDDv2Xk75v4IRLPjg1IsLOv524487OyvTvNnLeqteMoFxwXQeG30mYgEGWZi0hA=&ed=lFj0T
104.21.50.219
malicious
http://www.shuangunder.shop/udq7/?s2spt=Rfp+Hy7ypq6TblfO6jtyDxJAW2Iw8lXr1dwSS3/BYvSaAWrqV1h4KNJqwO7WOFQicl/WQZFKFN8T0sKdpeUJpptycc7urIxBUjzwOjRYuCen9LSArV+SfCA=&ed=lFj0T
104.21.23.144
malicious
http://www.mylivingbio.online/dj43/?s2spt=EkKoskt/waFvdKqlQDReAdEPzqNBV/LCRcrbFleOd9fMl1ZZ6F30QdqQrdjttZXwjkEVztFs7SmMJNK/tzPQgm2YdBaGKs9siOngYeKkbdPQQj1YdWC5vzs=&ed=lFj0T
208.91.197.27
malicious
http://www.keys4health.net/wdfk/?s2spt=dQ/vpVbcLME9vwPg7kSs1Ge38yKYU8Ny+d50wcZtmmpldahEUd9gA/U/hLKsV6Bf0aiX/H+ppQZXy0qtZ/D2arixEyiIXMiiQVJMjcbVizmpU0jISOIDNtc=&ed=lFj0T
208.91.197.27
malicious
http://www.full4movies.christmas/eg1u/?s2spt=SD/6wpCnW86cIrWeep14heI3UXePo+SxAqZXzX2LTq+ZxSYJstNKHiEBWhqrQIE7yMyB6clEy8PjJK9sDHiC3e/R1Eg2TmiiuSMczThP3qLlQkQqoU0Int0=&ed=lFj0T
104.21.27.203
malicious
http://www.tgwfj.xyz/b5fo/?ed=lFj0T&s2spt=/PlOLkIgBbh1jkr+6tQiokiNbLxNQiu1t1tA2B5ngzg+2ZPn1SOfaIfgu54OO3WPatKJobuG4vpvl8eIAu2jI3umZurVWzu+6cIQq0VJVLxagrBujY8Vb9g=
104.21.10.18
malicious
https://dts.gnpge.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.consentmanager.net
unknown
http://digi-searches.com/sk-logabpstatus.php?a=U1BVWkdTdzV4emJ5bSs5TXFNVTc3S05kUks2V3l3bzZBUTlwUDhwZ
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://www.mylivingbio.online/dj43/
208.91.197.27
http://www.nodefolio.xyz/b3dy/
76.223.54.146
http://i2.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
unknown
http://digi-searches.com/Chat_Rooms.cfm?fp=y0rjdxcdoANYIcILFoWoqPFXvvI7qm0YiuaMoAwxOEL5AicKTQZ90MxYJ
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://i2.cdn-image.com/__media__/pics/28903/search.png)
unknown
http://digi-searches.com/px.js?ch=1
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
http://digi-searches.com/px.js?ch=2
unknown
http://www.myhandyplanner.courses/qm65/
199.59.243.228
https://www.google.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
http://digi-searches.com/Book_Airline_Tickets.cfm?fp=y0rjdxcdoANYIcILFoWoqPFXvvI7qm0YiuaMoAwxOEL5Aic
unknown
http://www.b47uwch1046r.shop/6q0f/
199.59.243.228
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
http://www.tgwfj.xyz/b5fo/
104.21.10.18
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.myhandyplanner.courses
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
http://www.keys4health.net/wdfk/
208.91.197.27
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
http://www.Mylivingbio.online
unknown
https://delivery.consentmanager.net
unknown
http://digi-searches.com/Living.cfm?fp=y0rjdxcdoANYIcILFoWoqPFXvvI7qm0YiuaMoAwxOEL5AicKTQZ90MxYJLO%2
unknown
http://www.shuangunder.shop/udq7/
104.21.23.144
http://www.mylivingbio.online/__media__/js/trademark.php?d=mylivingbio.online&type=ns
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
https://www.utzp.top/d478/?s2spt=yZiSYoN2a3htTd2ds6QP1P94BsLGeX6oYMbqUQeMjg/YAZw5n93PIWGpgWWmb8mQ8VO
unknown
http://i2.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://www.boa-first-option.click/1lu1/
52.223.13.41
http://www.utzp.top/d478/
149.88.81.195
http://www.mylivingbio.online/__media__/design/underconstructionnotice.php?d=mylivingbio.online
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
http://i2.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
unknown
http://www.12345lopkmj.lol/80od/
104.21.50.219
https://www.ecosia.org/newtab/v20
unknown
http://i2.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
http://www.chatdn.xyz/7ciy/
76.223.54.146
https://duckduckgo.com/chrome_newtabv20
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
http://www.lindaashley.wedding/vwqy/
52.223.13.41
http://i2.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
http://i2.cdn-image.com/__media__/js/min.js?v2.3
unknown
http://www.maxank.top/esrt/
162.254.32.77
http://www.full4movies.christmas/eg1u/
104.21.27.203
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://digi-searches.com/Autoresponder_Marketing.cfm?fp=y0rjdxcdoANYIcILFoWoqPFXvvI7qm0YiuaMoAwxOEL5
unknown
https://gemini.google.com/app?q=
unknown
http://i2.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
http://digi-searches.com/Google_Adwords.cfm?fp=y0rjdxcdoANYIcILFoWoqPFXvvI7qm0YiuaMoAwxOEL5AicKTQZ90
unknown
There are 64 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
zsff.zsdns.top
149.88.81.195
malicious
www.maxank.top
162.254.32.77
www.full4movies.christmas
104.21.27.203
www.tgwfj.xyz
104.21.10.18
www.12345lopkmj.lol
104.21.50.219
www.chatdn.xyz
76.223.54.146
www.shuangunder.shop
104.21.23.144
www.mylivingbio.online
208.91.197.27
94950.bodis.com
199.59.243.228
www.keys4health.net
208.91.197.27
www.5s5zz.icu
47.239.127.207
www.lindaashley.wedding
52.223.13.41
www.nodefolio.xyz
76.223.54.146
www.boa-first-option.click
52.223.13.41
www.myhandyplanner.courses
unknown
www.b47uwch1046r.shop
unknown
www.utzp.top
unknown
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
149.88.81.195
zsff.zsdns.top
United States
malicious
76.223.54.146
www.chatdn.xyz
United States
104.21.50.219
www.12345lopkmj.lol
United States
208.91.197.27
www.mylivingbio.online
Virgin Islands (BRITISH)
52.223.13.41
www.lindaashley.wedding
United States
199.59.243.228
94950.bodis.com
United States
104.21.23.144
www.shuangunder.shop
United States
104.21.27.203
www.full4movies.christmas
United States
104.21.10.18
www.tgwfj.xyz
United States
47.239.127.207
www.5s5zz.icu
United States
162.254.32.77
www.maxank.top
United States
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3790000
unclassified section
page execute and read and write
malicious
4EC0000
unkown
page execute and read and write
malicious
3050000
trusted library allocation
page read and write
malicious
3000000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
7F20000
system
page execute and read and write
malicious
5C50000
unclassified section
page execute and read and write
malicious
A00000
system
page execute and read and write
malicious
3593000
heap
page read and write
3200000
heap
page read and write
3A22000
unclassified section
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
1B00C190000
heap
page read and write
7C9D000
heap
page read and write
5250000
unclassified section
page execute and read and write
1184000
unkown
page read and write
1B00DEAD000
trusted library allocation
page read and write
120E000
heap
page read and write
D61000
unkown
page execute read
6E0000
unkown
page readonly
321D000
heap
page read and write
B20000
heap
page read and write
7C83000
heap
page read and write
3AAE000
direct allocation
page read and write
11C0000
heap
page read and write
120D000
heap
page read and write
11EF000
heap
page read and write
2D01000
heap
page read and write
7F40000
heap
page read and write
11BF000
heap
page execute and read and write
2D01000
heap
page read and write
136A000
heap
page read and write
11EF000
heap
page read and write
3213000
heap
page read and write
2D01000
heap
page read and write
B40000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
120D000
heap
page read and write
6E0000
unkown
page readonly
2E40000
unkown
page read and write
197E000
stack
page read and write
6E1000
unkown
page execute read
7C93000
heap
page read and write
3600000
heap
page read and write
2FC0000
heap
page read and write
2EAE000
stack
page read and write
2D01000
heap
page read and write
F30000
unkown
page readonly
2D01000
heap
page read and write
3213000
heap
page read and write
626D000
unclassified section
page execute and read and write
3770000
direct allocation
page read and write
2D01000
heap
page read and write
3720000
direct allocation
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
307A000
stack
page read and write
31C8000
heap
page read and write
1140000
heap
page read and write
2D01000
heap
page read and write
69D2000
system
page read and write
31DE000
stack
page read and write
7C77000
heap
page read and write
1A30000
unkown
page readonly
399E000
heap
page read and write
1237000
heap
page read and write
58D2000
system
page read and write
2D01000
heap
page read and write
7FE5000
system
page execute and read and write
31C7000
heap
page read and write
3E4F000
stack
page read and write
1164000
heap
page read and write
38DD000
direct allocation
page execute and read and write
6E1000
unkown
page execute read
2D01000
heap
page read and write
2D01000
heap
page read and write
31C3000
heap
page read and write
2D01000
heap
page read and write
2FC0000
heap
page read and write
2D01000
heap
page read and write
6EF000
unkown
page readonly
1B00DD0D000
trusted library allocation
page read and write
7C70000
heap
page read and write
47FE000
unclassified section
page read and write
32B0000
trusted library allocation
page execute and read and write
1B00DECE000
trusted library allocation
page read and write
4E46000
unclassified section
page read and write
1B00D9F0000
trusted library allocation
page read and write
1B00BFD3000
system
page execute and read and write
39E9000
direct allocation
page read and write
7C8B000
heap
page read and write
1B00BF30000
system
page execute and read and write
2D01000
heap
page read and write
3801000
heap
page read and write
373D000
direct allocation
page execute and read and write
1236000
heap
page read and write
38E1000
direct allocation
page execute and read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
31CD000
heap
page read and write
329B000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
328D000
heap
page read and write
2D01000
heap
page read and write
3CD1000
direct allocation
page execute and read and write
31CD000
heap
page read and write
2D01000
heap
page read and write
98B000
stack
page read and write
7FF0000
unkown
page read and write
1180000
heap
page read and write
33DD000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
1B00DEC4000
trusted library allocation
page read and write
2D01000
heap
page read and write
3910000
direct allocation
page read and write
2D01000
heap
page read and write
39E9000
direct allocation
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2E50000
unkown
page read and write
2D01000
heap
page read and write
E1E000
unkown
page read and write
2D01000
heap
page read and write
6F9000
unkown
page readonly
1236000
heap
page read and write
2D01000
heap
page read and write
13E0000
heap
page read and write
3AAE000
direct allocation
page read and write
3150000
trusted library allocation
page read and write
3489000
heap
page read and write
3893000
direct allocation
page read and write
3287000
heap
page read and write
39ED000
direct allocation
page read and write
2D01000
heap
page read and write
E1E000
unkown
page write copy
11BC000
heap
page read and write
C80000
heap
page read and write
B0F000
stack
page read and write
3893000
direct allocation
page read and write
FF0000
unkown
page readonly
3501000
heap
page read and write
3790000
direct allocation
page read and write
FAA000
stack
page read and write
61F8000
system
page read and write
2D01000
heap
page read and write
36759FE000
stack
page read and write
12FC000
stack
page read and write
B44000
heap
page read and write
36749FE000
stack
page read and write
36761FF000
stack
page read and write
2D01000
heap
page read and write
1310000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2E64000
heap
page read and write
2D01000
heap
page read and write
31B7000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
4CB4000
unclassified section
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
1B00DE01000
trusted library allocation
page read and write
3417000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
1460000
unkown
page readonly
548E000
unclassified section
page read and write
1236000
heap
page read and write
341A000
heap
page read and write
322C000
heap
page read and write
325E000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3740000
direct allocation
page read and write
32BA000
heap
page read and write
39E9000
direct allocation
page read and write
2D01000
heap
page read and write
5812000
system
page read and write
7C8F000
heap
page read and write
3720000
direct allocation
page read and write
1B00DD21000
trusted library allocation
page read and write
3720000
direct allocation
page read and write
3A3D000
direct allocation
page read and write
3213000
heap
page read and write
E27000
unkown
page readonly
136E000
heap
page read and write
3190000
heap
page read and write
7C68000
heap
page read and write
3AC0000
unkown
page execute and read and write
343B000
heap
page read and write
7C6B000
heap
page read and write
16A0000
unkown
page readonly
BFC000
stack
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3412000
heap
page read and write
3AAE000
direct allocation
page read and write
2D01000
heap
page read and write
4024000
unclassified section
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
38C0000
direct allocation
page read and write
7C89000
heap
page read and write
31C7000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
120F000
heap
page read and write
2D01000
heap
page read and write
7C73000
heap
page read and write
136A000
heap
page read and write
2D01000
heap
page read and write
7C66000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
D60000
unkown
page readonly
52FC000
unclassified section
page read and write
4850000
unclassified section
page execute and read and write
2D01000
heap
page read and write
1300000
unkown
page readonly
2D01000
heap
page read and write
2D01000
heap
page read and write
11C0000
heap
page read and write
1480000
heap
page read and write
1206000
heap
page read and write
3405000
heap
page read and write
2D01000
heap
page read and write
5475000
unkown
page execute and read and write
5ED4000
system
page read and write
1B00C070000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3929000
heap
page read and write
2D01000
heap
page read and write
2DE0000
heap
page read and write
1B00DD13000
trusted library allocation
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
844F000
stack
page read and write
31C7000
heap
page read and write
3610000
direct allocation
page execute and read and write
31BE000
heap
page read and write
BBE000
stack
page read and write
3770000
direct allocation
page read and write
11EF000
heap
page read and write
169F000
stack
page read and write
F40000
unkown
page readonly
B44000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
3150000
trusted library allocation
page read and write
2D01000
heap
page read and write
4FD8000
unclassified section
page read and write
2E64000
heap
page read and write
31C7000
heap
page read and write
3213000
heap
page read and write
2D01000
heap
page read and write
840E000
stack
page read and write
37AE000
direct allocation
page execute and read and write
ACE000
stack
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3597000
heap
page read and write
7F82000
system
page execute and read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
E14000
unkown
page readonly
2D01000
heap
page read and write
2D01000
heap
page read and write
36751FE000
stack
page read and write
A80000
heap
page read and write
7F8E000
system
page execute and read and write
44C0000
unkown
page execute and read and write
3A7C000
unclassified section
page read and write
1B00C220000
heap
page read and write
2D01000
heap
page read and write
11C7000
heap
page read and write
3962000
unclassified section
page read and write
7D40000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
6B64000
system
page read and write
1320000
unkown
page read and write
2D01000
heap
page read and write
9C8000
stack
page read and write
2D01000
heap
page read and write
36741FC000
stack
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
1020000
heap
page read and write
1B00C23B000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
7C61000
heap
page read and write
3739000
direct allocation
page execute and read and write
38C0000
direct allocation
page read and write
3236000
heap
page read and write
11B3000
heap
page read and write
2D01000
heap
page read and write
7C7E000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
7C56000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
6F9000
unkown
page readonly
11CE000
heap
page read and write
D60000
unkown
page readonly
6F6000
unkown
page read and write
3080000
heap
page read and write
1360000
heap
page read and write
3213000
heap
page read and write
120D000
heap
page read and write
392D000
heap
page read and write
2FD0000
unkown
page readonly
1340000
unkown
page read and write
BDB000
stack
page read and write
CB0000
heap
page read and write
36D0000
direct allocation
page read and write
644D000
stack
page read and write
F40000
unkown
page readonly
2D01000
heap
page read and write
3243000
heap
page read and write
11B4000
heap
page read and write
1300000
unkown
page readonly
4BA000
stack
page read and write
31BE000
heap
page read and write
31C7000
heap
page read and write
F20000
unkown
page readonly
3790000
direct allocation
page read and write
11A4000
heap
page read and write
2D01000
heap
page read and write
3893000
direct allocation
page read and write
3263000
heap
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
1384000
heap
page read and write
3910000
direct allocation
page read and write
1320000
unkown
page read and write
2D01000
heap
page read and write
3800000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
BF82000
system
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3292000
heap
page read and write
4348000
unclassified section
page read and write
1B00C210000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
1188000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3CCD000
direct allocation
page execute and read and write
2D01000
heap
page read and write
FF0000
unkown
page readonly
1D7E000
stack
page read and write
3B29000
direct allocation
page execute and read and write
11C6000
heap
page execute and read and write
7C42000
heap
page read and write
3C3C000
unclassified section
page read and write
3213000
heap
page read and write
1B00C242000
heap
page read and write
66AE000
system
page read and write
2D01000
heap
page read and write
7C7C000
heap
page read and write
31DC000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
1B00D9F0000
trusted library allocation
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
6840000
system
page read and write
804C000
unkown
page read and write
1B00D9F0000
trusted library allocation
page read and write
7F72000
system
page execute and read and write
3266000
heap
page read and write
1331000
unkown
page readonly
2D01000
heap
page read and write
2D01000
heap
page read and write
30C0000
unkown
page execute and read and write
2D01000
heap
page read and write
814C000
unkown
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
1460000
unkown
page readonly
1340000
unkown
page read and write
6066000
system
page read and write
3400000
heap
page read and write
1B00C22C000
heap
page read and write
2D01000
heap
page read and write
12FC000
stack
page read and write
2D01000
heap
page read and write
2E60000
heap
page read and write
6E88000
system
page read and write
3202000
heap
page read and write
2D01000
heap
page read and write
4B22000
unclassified section
page read and write
2D01000
heap
page read and write
3214000
heap
page read and write
3B2D000
direct allocation
page execute and read and write
54DD000
unkown
page execute and read and write
3E50000
unclassified section
page execute and read and write
2D01000
heap
page read and write
1B00DC00000
trusted library allocation
page read and write
2D01000
heap
page read and write
322F000
heap
page read and write
159E000
stack
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
31A0000
direct allocation
page read and write
373F000
stack
page read and write
325C000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
346A000
heap
page read and write
7D50000
trusted library allocation
page read and write
2D01000
heap
page read and write
3723000
heap
page read and write
11DB000
heap
page read and write
3A39000
direct allocation
page read and write
3D42000
direct allocation
page execute and read and write
1236000
heap
page read and write
BEC2000
system
page read and write
7C8E000
heap
page read and write
3419000
heap
page read and write
12CA000
heap
page read and write
3259000
heap
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
41B6000
unclassified section
page read and write
2D01000
heap
page read and write
6190000
trusted library allocation
page read and write
FE0000
unkown
page readonly
1236000
heap
page read and write
2D01000
heap
page read and write
7C50000
heap
page read and write
733E000
system
page read and write
2D01000
heap
page read and write
31BC000
heap
page read and write
1B00DEBE000
trusted library allocation
page read and write
2E40000
unkown
page read and write
1399000
heap
page read and write
303C000
stack
page read and write
2D01000
heap
page read and write
3843000
direct allocation
page read and write
3A5E000
direct allocation
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
C19C000
system
page read and write
1B00DBA0000
heap
page read and write
3A39000
direct allocation
page read and write
3150000
trusted library allocation
page read and write
3405000
heap
page read and write
6205000
unclassified section
page execute and read and write
1B00BFD0000
system
page execute and read and write
2D01000
heap
page read and write
7C6E000
heap
page read and write
16A0000
unkown
page readonly
2D01000
heap
page read and write
648E000
stack
page read and write
3222000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
520000
heap
page read and write
516A000
unclassified section
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
30B0000
heap
page read and write
1485000
heap
page read and write
320F000
heap
page read and write
71AC000
system
page read and write
2D01000
heap
page read and write
131B000
heap
page read and write
3843000
direct allocation
page read and write
1B00DD0F000
trusted library allocation
page read and write
2D01000
heap
page read and write
1B00C23F000
heap
page read and write
1480000
heap
page read and write
2D01000
heap
page read and write
3417000
heap
page read and write
3843000
direct allocation
page read and write
651C000
system
page read and write
11EF000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
1B00C21A000
heap
page read and write
DEF000
unkown
page readonly
2D01000
heap
page read and write
2D01000
heap
page read and write
1360000
heap
page read and write
E27000
unkown
page readonly
2D01000
heap
page read and write
3A39000
direct allocation
page read and write
6EF000
unkown
page readonly
2D01000
heap
page read and write
324D000
heap
page read and write
39ED000
direct allocation
page read and write
701A000
system
page read and write
3A3D000
direct allocation
page read and write
BCE000
stack
page read and write
2D01000
heap
page read and write
7F91000
system
page execute and read and write
FAA000
stack
page read and write
E14000
unkown
page readonly
1160000
heap
page read and write
6CF6000
system
page read and write
2D01000
heap
page read and write
FE0000
unkown
page readonly
2E60000
heap
page read and write
2D01000
heap
page read and write
592C000
system
page read and write
3A00000
direct allocation
page execute and read and write
1331000
unkown
page readonly
1310000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
5AEC000
system
page read and write
3608000
heap
page read and write
169F000
stack
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
2D01000
heap
page read and write
1B00DD00000
trusted library allocation
page read and write
2FD0000
unkown
page readonly
3910000
direct allocation
page read and write
3790000
direct allocation
page read and write
3270000
heap
page read and write
2D01000
heap
page read and write
3213000
heap
page read and write
2D01000
heap
page read and write
F30000
unkown
page readonly
2D01000
heap
page read and write
7C5C000
heap
page read and write
120E000
heap
page read and write
1A31000
unkown
page readonly
2D01000
heap
page read and write
2D01000
heap
page read and write
7C73000
heap
page read and write
C7E000
stack
page read and write
4990000
unclassified section
page read and write
2D01000
heap
page read and write
39ED000
direct allocation
page read and write
F20000
unkown
page readonly
11B3000
heap
page read and write
1256000
heap
page read and write
3A5E000
direct allocation
page read and write
31B0000
heap
page read and write
31BC000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
11EF000
heap
page read and write
B10000
heap
page read and write
D61000
unkown
page execute read
1389000
heap
page read and write
3A3D000
direct allocation
page read and write
2D01000
heap
page read and write
DEF000
unkown
page readonly
120E000
heap
page read and write
1B00DD03000
trusted library allocation
page read and write
159E000
stack
page read and write
E22000
unkown
page write copy
44DA000
unclassified section
page read and write
3770000
direct allocation
page read and write
2D01000
heap
page read and write
6F6000
unkown
page read and write
3297000
heap
page read and write
638A000
system
page read and write
7F68000
system
page execute and read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
120D000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2FAF000
stack
page read and write
136E000
heap
page read and write
2D01000
heap
page read and write
31A0000
heap
page read and write
1B00C160000
heap
page read and write
3000000
trusted library allocation
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
7C89000
heap
page read and write
31C7000
heap
page read and write
C3E000
stack
page read and write
2D01000
heap
page read and write
3A5E000
direct allocation
page read and write
3952000
direct allocation
page execute and read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
B44000
heap
page read and write
2D01000
heap
page read and write
12C5000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
466C000
unclassified section
page read and write
32A4000
heap
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
38C0000
direct allocation
page read and write
2D01000
heap
page read and write
BFDC000
system
page read and write
C584000
system
page read and write
2D01000
heap
page read and write
2D01000
heap
page read and write
2D00000
heap
page read and write
2D01000
heap
page read and write
363E000
stack
page read and write
There are 626 hidden memdumps, click here to show them.