IOC Report
bintoday1.exe

loading gif

Files

File Path
Type
Category
Malicious
bintoday1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\5E-50o
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Dalis
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut76CA.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut7709.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\croc
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bintoday1.exe
"C:\Users\user\Desktop\bintoday1.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\bintoday1.exe"
malicious
C:\Program Files (x86)\mnQwjkyJEUPSWQClPaPDwndGaluejhBJMukNqAUnUoxWZbdPMWwmZABFWlWhdCZEN\eypfpUNFpbLX.exe
"C:\Program Files (x86)\mnQwjkyJEUPSWQClPaPDwndGaluejhBJMukNqAUnUoxWZbdPMWwmZABFWlWhdCZEN\eypfpUNFpbLX.exe"
malicious
C:\Windows\SysWOW64\compact.exe
"C:\Windows\SysWOW64\compact.exe"
malicious
C:\Program Files (x86)\mnQwjkyJEUPSWQClPaPDwndGaluejhBJMukNqAUnUoxWZbdPMWwmZABFWlWhdCZEN\eypfpUNFpbLX.exe
"C:\Program Files (x86)\mnQwjkyJEUPSWQClPaPDwndGaluejhBJMukNqAUnUoxWZbdPMWwmZABFWlWhdCZEN\eypfpUNFpbLX.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.limonchimneysweep.shop/n2gl/?oLy=-hKdflfxw6&cLStcv3=flitv4ONTDzavgdus+zcTsH6nWgS1QLhloTdmohmQPl3KhGoeMiAoTCl41HMocxZ34RiCsybNbAZ6Ep4mPYRLqm0WDj9ayw3PA1jxKqGfzp18YAn+IY5szwPiI05gk5QbUl5B1g=
198.57.245.28
malicious
http://www.dom-2.online/6t1p/
199.59.243.226
malicious
http://www.dom-2.online/6t1p/?cLStcv3=5u/7pIClCxGMr2JDx2moDp4N5NUQR5UHhhh3f8bPAU6e1g5SUh+0OFL6u88M+0RJj1mDTEfrnKPtCcHZ9I9M5tKPqU536cb7UTbsX5MdChh4yVfj4lbg76/wDExADHyv3XJ8cq4=&oLy=-hKdflfxw6
199.59.243.226
malicious
http://www.helloanecdotenow.info/9b27/?oLy=-hKdflfxw6&cLStcv3=7ENy1dnK+hlvjvEO/OaYGC3Wgmb4rYaSD+U+jb6JyxCjiQU3Pm3SylzrvkP1vqSBFdPksRSgAkGS8fPPQLcJJVTWiO9mdIE7BDDVXVUUUxr3BCXvrTsebkLO52NTcukFU1xGaVw=
3.33.130.190
malicious
http://www.fimgroup.net/m3ft/?cLStcv3=mm8fgD9+jitkhgs161OZt8fCms83PFFT8XhsXaqjQsukr7/M7pRfQgp4Nt/ggm/XryzwVs+W+lrB4JMnarTnzCQZM7KWEo1HwHoI3FMw782O73yIdszacYliHArJfGfO1B1Ji3g=&oLy=-hKdflfxw6
62.149.128.40
malicious
http://www.030002721.xyz/jpse/
65.21.196.90
malicious
http://www.fimgroup.net/m3ft/
62.149.128.40
malicious
http://www.helloanecdotenow.info/9b27/
3.33.130.190
malicious
http://www.jobworklanka.online/mm14/
91.184.0.200
malicious
http://www.jobworklanka.online/mm14/?cLStcv3=CxHrv/DWf/f861hRjo0poFYX/xbpoqE9Pkz05rQHhXI0npb5DSaX7ma8TZVC8w6DWPy//ybPymtpw/3NO+S+AgB4ZcSH0lp13pJAkJlF+hiKkERgruIPxb4FabZ2eu3OSDY3yr0=&oLy=-hKdflfxw6
91.184.0.200
malicious
http://www.6rkdm.top/gzjk/?cLStcv3=YDlNDhHByhlf6nQelagaT3FTRjXu5jrNjAd5ZmuDrGe9JGDYJAs2Uym5b/cCl1RiDZ+iQgyIXf65KlrikbfSKljvf01yS/1iDTwvEAEyzsoYMlH0K0Blq6hvBg/o1tysCZp8w58=&oLy=-hKdflfxw6
18.162.124.14
malicious
http://www.6rkdm.top/gzjk/
18.162.124.14
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.kiristyle.shop/m39s/
35.244.245.121
https://www.kiristyle.shop/m39s/?oLy=-hKdflfxw6&cLStcv3=UQp9655FjW3LvDLkuw2PvKQDrSZERfsuMNaS
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://www.030002721.xyz
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.yhqapp.com/?39988
unknown
http://www.fimgroup.net:80/m3ft/?cLStcv3=mm8fgD9
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fimgroup.net
62.149.128.40
malicious
helloanecdotenow.info
3.33.130.190
malicious
030002721.xyz
65.21.196.90
malicious
limonchimneysweep.shop
198.57.245.28
malicious
6rkdm.top
18.162.124.14
malicious
jobworklanka.online
91.184.0.200
malicious
www.dom-2.online
199.59.243.226
malicious
www.6rkdm.top
unknown
malicious
www.limonchimneysweep.shop
unknown
malicious
www.jobworklanka.online
unknown
malicious
www.helloanecdotenow.info
unknown
malicious
www.loveinpoeipet07.site
unknown
malicious
www.kiristyle.shop
unknown
malicious
www.fimgroup.net
unknown
malicious
www.030002721.xyz
unknown
malicious
shops.vipshopbuy.com
35.244.245.121
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
18.162.124.14
6rkdm.top
United States
malicious
62.149.128.40
fimgroup.net
Italy
malicious
198.57.245.28
limonchimneysweep.shop
United States
malicious
91.184.0.200
jobworklanka.online
Netherlands
malicious
65.21.196.90
030002721.xyz
United States
malicious
199.59.243.226
www.dom-2.online
United States
malicious
3.33.130.190
helloanecdotenow.info
United States
malicious
35.244.245.121
shops.vipshopbuy.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2F00000
unclassified section
page execute and read and write
malicious
4D0000
system
page execute and read and write
malicious
3D50000
unclassified section
page execute and read and write
malicious
9D0000
trusted library allocation
page read and write
malicious
980000
trusted library allocation
page read and write
malicious
470000
system
page execute and read and write
malicious
4F80000
system
page execute and read and write
malicious
3100000
unkown
page execute and read and write
malicious
7623000
heap
page read and write
7630000
heap
page read and write
33EA000
unkown
page read and write
77F000
heap
page read and write
871000
heap
page read and write
2780000
unkown
page readonly
1CA1B912000
trusted library allocation
page read and write
10F7000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
58E000
stack
page read and write
871000
heap
page read and write
26F0000
heap
page read and write
3780000
direct allocation
page read and write
871000
heap
page read and write
871000
heap
page read and write
CB0000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
1CA1B900000
trusted library allocation
page read and write
871000
heap
page read and write
871000
heap
page read and write
8E5000
unkown
page read and write
3A6E000
direct allocation
page read and write
2813000
heap
page read and write
871000
heap
page read and write
350000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
403D000
unclassified section
page execute and read and write
871000
heap
page read and write
730000
unkown
page readonly
1CA1BACE000
trusted library allocation
page read and write
871000
heap
page read and write
1044000
heap
page read and write
871000
heap
page read and write
5E0000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
7641000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
7639000
heap
page read and write
7626000
heap
page read and write
BBE000
heap
page read and write
DB0000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
3ABE000
direct allocation
page read and write
706000
heap
page read and write
871000
heap
page read and write
1CA1B921000
trusted library allocation
page read and write
A3F000
stack
page read and write
75A000
heap
page read and write
C2C000
unkown
page readonly
7636000
heap
page read and write
701000
heap
page read and write
B20000
unkown
page read and write
871000
heap
page read and write
1CA1BABE000
trusted library allocation
page read and write
7600000
heap
page read and write
871000
heap
page read and write
1CA19E40000
heap
page read and write
871000
heap
page read and write
2A17000
heap
page read and write
45B000
stack
page read and write
2C1E000
stack
page read and write
2F00000
direct allocation
page read and write
540000
unkown
page read and write
110D000
heap
page read and write
3129000
direct allocation
page execute and read and write
7617000
heap
page read and write
498000
stack
page read and write
5E0000
unkown
page read and write
1122000
heap
page read and write
2630000
direct allocation
page read and write
607000
unkown
page readonly
2E89000
direct allocation
page execute and read and write
871000
heap
page read and write
986000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
78E000
stack
page read and write
871000
heap
page read and write
C52000
unkown
page readonly
5AA000
stack
page read and write
706000
heap
page read and write
27AE000
stack
page read and write
745000
heap
page read and write
3730000
direct allocation
page read and write
5DF000
stack
page read and write
3000000
direct allocation
page execute and read and write
871000
heap
page read and write
1140000
unkown
page readonly
19BD2000
system
page read and write
2D40000
heap
page read and write
3774000
unclassified section
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
1CA1B903000
trusted library allocation
page read and write
614000
heap
page read and write
2770000
heap
page read and write
340000
unkown
page readonly
871000
heap
page read and write
2800000
heap
page read and write
3C2A000
unclassified section
page read and write
706000
heap
page read and write
C52000
unkown
page readonly
702000
heap
page read and write
871000
heap
page read and write
1CA1B915000
trusted library allocation
page read and write
871000
heap
page read and write
3780000
direct allocation
page read and write
1FC000
stack
page read and write
740000
heap
page read and write
1CA19E90000
heap
page read and write
B7C000
unkown
page read and write
3CA000
stack
page read and write
7B0000
unkown
page read and write
75FB000
heap
page read and write
2802000
heap
page read and write
1CA1B770000
heap
page read and write
1CA19E93000
heap
page read and write
BBE000
heap
page read and write
38D0000
direct allocation
page read and write
2550000
unkown
page readonly
2B01000
heap
page read and write
5F0000
unkown
page readonly
740000
heap
page read and write
276F000
stack
page read and write
605000
unkown
page read and write
2A05000
heap
page read and write
3A4D000
direct allocation
page read and write
871000
heap
page read and write
2F00000
direct allocation
page read and write
530000
heap
page read and write
700000
unkown
page readonly
871000
heap
page read and write
2932000
unkown
page read and write
871000
heap
page read and write
2774000
heap
page read and write
59E000
stack
page read and write
3A4D000
direct allocation
page read and write
266E000
stack
page read and write
871000
heap
page read and write
100B000
heap
page read and write
AE0000
heap
page read and write
2A1B000
heap
page read and write
3258000
unkown
page read and write
7B0000
heap
page read and write
C8F000
stack
page read and write
2813000
heap
page read and write
7DC000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
2BA0000
trusted library allocation
page read and write
10DD000
heap
page read and write
10F8000
heap
page read and write
871000
heap
page read and write
2A17000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
CE0000
heap
page read and write
540000
unkown
page readonly
C5C000
unkown
page write copy
2C01000
heap
page read and write
530000
unkown
page readonly
1CA19E93000
heap
page read and write
871000
heap
page read and write
761D000
heap
page read and write
30C6000
unkown
page read and write
2C00000
heap
page read and write
3A32000
unkown
page read and write
DB0000
unkown
page readonly
607000
unkown
page readonly
3780000
direct allocation
page read and write
3CA000
stack
page read and write
763C000
heap
page read and write
26F0000
heap
page read and write
3390000
heap
page read and write
871000
heap
page read and write
1CA19E8C000
heap
page read and write
2D4D000
heap
page read and write
871000
heap
page read and write
1117000
heap
page read and write
2620000
heap
page read and write
871000
heap
page read and write
10C0000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
7D1000
heap
page read and write
5F0000
unkown
page readonly
2A24000
heap
page read and write
2813000
heap
page read and write
530000
unkown
page readonly
871000
heap
page read and write
B0E000
stack
page read and write
2813000
heap
page read and write
871000
heap
page read and write
3320000
heap
page read and write
796000
heap
page read and write
871000
heap
page read and write
10F9000
heap
page read and write
871000
heap
page read and write
30B2000
unclassified section
page read and write
1CA19E7D000
heap
page read and write
CB0000
heap
page read and write
3853000
direct allocation
page read and write
1CA19C89000
system
page execute and read and write
871000
heap
page read and write
3920000
direct allocation
page read and write
3853000
direct allocation
page read and write
302D000
direct allocation
page execute and read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
3ABE000
direct allocation
page read and write
871000
heap
page read and write
1141000
unkown
page readonly
39F9000
direct allocation
page read and write
75C3000
heap
page read and write
871000
heap
page read and write
1044000
heap
page read and write
607000
unkown
page readonly
7A0000
heap
page read and write
10FB000
heap
page read and write
540000
unkown
page readonly
7A1000
unkown
page readonly
2EFE000
direct allocation
page execute and read and write
1122000
heap
page read and write
871000
heap
page read and write
2A31000
heap
page read and write
871000
heap
page read and write
1141000
unkown
page readonly
CB0000
unkown
page readonly
7E0000
heap
page read and write
520000
unkown
page readonly
871000
heap
page read and write
10CB000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
605000
unkown
page read and write
BB0000
heap
page read and write
3F4E000
unclassified section
page read and write
1CA1B800000
trusted library allocation
page read and write
871000
heap
page read and write
5003000
system
page execute and read and write
871000
heap
page read and write
1044000
heap
page read and write
1044000
heap
page read and write
871000
heap
page read and write
5E0000
unkown
page readonly
6FD000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
789000
heap
page read and write
75F0000
heap
page read and write
871000
heap
page read and write
540000
unkown
page read and write
2D60000
direct allocation
page execute and read and write
33ED000
unkown
page execute and read and write
7B0000
heap
page read and write
A9B2FFE000
stack
page read and write
871000
heap
page read and write
2813000
heap
page read and write
762B000
heap
page read and write
871000
heap
page read and write
7A1000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
357C000
unkown
page read and write
605000
unkown
page read and write
701000
heap
page read and write
74B000
heap
page read and write
500000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
1CA1B910000
trusted library allocation
page read and write
5FE000
unkown
page readonly
1CA1B640000
trusted library allocation
page read and write
36E0000
direct allocation
page read and write
871000
heap
page read and write
720000
unkown
page read and write
2EFF000
stack
page read and write
272F000
stack
page read and write
871000
heap
page read and write
2E00000
heap
page read and write
B91000
unkown
page execute read
B90000
unkown
page readonly
871000
heap
page read and write
3A49000
direct allocation
page read and write
76D000
heap
page read and write
FA0000
heap
page read and write
39F9000
direct allocation
page read and write
790000
heap
page read and write
1A294000
system
page read and write
1CA19E10000
heap
page read and write
871000
heap
page read and write
2813000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
5F1000
unkown
page execute read
6F0000
heap
page read and write
179E000
stack
page read and write
7615000
heap
page read and write
871000
heap
page read and write
2A1A000
heap
page read and write
30A2000
direct allocation
page execute and read and write
871000
heap
page read and write
3031000
direct allocation
page execute and read and write
871000
heap
page read and write
785000
heap
page read and write
76D000
heap
page read and write
2770000
heap
page read and write
4CC000
stack
page read and write
75D6000
heap
page read and write
871000
heap
page read and write
520000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
2B4C000
unkown
page read and write
4FF7000
system
page execute and read and write
871000
heap
page read and write
7E0000
heap
page read and write
2813000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
3350000
unclassified section
page execute and read and write
7B4000
heap
page read and write
1122000
heap
page read and write
871000
heap
page read and write
2813000
heap
page read and write
350000
unkown
page readonly
FAF000
stack
page read and write
2D23000
heap
page read and write
871000
heap
page read and write
3394000
heap
page read and write
871000
heap
page read and write
5DE000
stack
page read and write
1045000
heap
page read and write
3A49000
direct allocation
page read and write
6F7000
heap
page read and write
3FCA000
unclassified section
page execute and read and write
871000
heap
page read and write
2620000
heap
page read and write
10DC000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
3A4D000
direct allocation
page read and write
78E000
stack
page read and write
BB0000
heap
page read and write
319E000
direct allocation
page execute and read and write
5FE000
unkown
page readonly
2CDC000
heap
page read and write
7639000
heap
page read and write
1CA1BAAC000
trusted library allocation
page read and write
769000
heap
page read and write
F50000
heap
page read and write
2813000
heap
page read and write
871000
heap
page read and write
790000
unkown
page read and write
871000
heap
page read and write
31CC000
unclassified section
page read and write
7C7000
heap
page read and write
871000
heap
page read and write
B70000
heap
page read and write
DB0000
unkown
page readonly
871000
heap
page read and write
39F9000
direct allocation
page read and write
871000
heap
page read and write
7E5000
heap
page read and write
1CA19C8B000
system
page execute and read and write
C2C000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
19CEC000
system
page read and write
550000
heap
page read and write
871000
heap
page read and write
614000
heap
page read and write
1140000
unkown
page readonly
7CB000
heap
page read and write
27B0000
direct allocation
page read and write
AFF000
stack
page read and write
FA8000
heap
page read and write
340000
unkown
page readonly
1122000
heap
page read and write
B90000
unkown
page readonly
43A000
stack
page read and write
871000
heap
page read and write
71C000
stack
page read and write
1CA1B90B000
trusted library allocation
page read and write
5FE000
unkown
page readonly
706000
heap
page read and write
75E0000
heap
page read and write
2C5E000
stack
page read and write
1122000
heap
page read and write
614000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
607000
unkown
page readonly
10FB000
heap
page read and write
AD0000
trusted library allocation
page execute and read and write
706000
heap
page read and write
871000
heap
page read and write
3DBC000
unclassified section
page read and write
980000
trusted library allocation
page read and write
871000
heap
page read and write
6FD000
heap
page read and write
871000
heap
page read and write
CB8000
heap
page read and write
A4E000
stack
page read and write
AA9000
heap
page read and write
38D0000
direct allocation
page read and write
871000
heap
page read and write
730000
unkown
page readonly
871000
heap
page read and write
2774000
heap
page read and write
10DB000
heap
page read and write
871000
heap
page read and write
75E000
heap
page read and write
2550000
unkown
page readonly
7F0000
unkown
page read and write
A7F000
stack
page read and write
B10000
unkown
page read and write
2813000
heap
page read and write
B86000
heap
page read and write
76C0000
trusted library allocation
page read and write
312D000
direct allocation
page execute and read and write
871000
heap
page read and write
39FD000
direct allocation
page read and write
1CA1B640000
trusted library allocation
page read and write
19EAC000
system
page read and write
871000
heap
page read and write
1CA19C40000
system
page execute and read and write
871000
heap
page read and write
2813000
heap
page read and write
360000
unkown
page readonly
C64000
unkown
page readonly
337A000
unkown
page execute and read and write
FD2000
heap
page read and write
515C000
unkown
page read and write
6FB000
heap
page read and write
110B000
heap
page read and write
1122000
heap
page read and write
10CE000
heap
page read and write
7B0000
unkown
page read and write
5FE000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
1107000
heap
page read and write
3906000
unclassified section
page read and write
7DE000
heap
page read and write
75F6000
heap
page read and write
500000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
CB0000
unkown
page readonly
7D8000
heap
page read and write
2F34000
unkown
page read and write
871000
heap
page read and write
719000
heap
page read and write
360000
unkown
page readonly
5F0000
heap
page read and write
871000
heap
page read and write
510000
unkown
page readonly
2813000
heap
page read and write
772000
heap
page read and write
CCF000
heap
page read and write
2BA0000
trusted library allocation
page read and write
7D0000
unkown
page readonly
A9B27FC000
stack
page read and write
3A98000
unclassified section
page read and write
605000
unkown
page read and write
70C000
heap
page read and write
591000
unkown
page readonly
3A49000
direct allocation
page read and write
7D0000
unkown
page readonly
70C000
heap
page read and write
871000
heap
page read and write
4E0000
heap
page read and write
7C7E000
stack
page read and write
2F00000
direct allocation
page read and write
3730000
direct allocation
page read and write
510000
heap
page read and write
32D1000
direct allocation
page execute and read and write
71C000
stack
page read and write
871000
heap
page read and write
2813000
heap
page read and write
871000
heap
page read and write
5AA000
stack
page read and write
707000
heap
page read and write
B80000
heap
page read and write
77F000
heap
page read and write
1CA1B90E000
trusted library allocation
page read and write
871000
heap
page read and write
A9B3FFE000
stack
page read and write
871000
heap
page read and write
870000
heap
page read and write
2F2D000
heap
page read and write
5F1000
unkown
page execute read
871000
heap
page read and write
3340000
direct allocation
page execute and read and write
871000
heap
page read and write
871000
heap
page read and write
C8F000
stack
page read and write
111A000
heap
page read and write
2A05000
heap
page read and write
2E8D000
direct allocation
page execute and read and write
1CA1BAC4000
trusted library allocation
page read and write
871000
heap
page read and write
A6F000
stack
page read and write
3342000
direct allocation
page execute and read and write
871000
heap
page read and write
76B0000
trusted library allocation
page read and write
4272000
unclassified section
page read and write
2BAF000
heap
page read and write
871000
heap
page read and write
75BD000
heap
page read and write
790000
unkown
page read and write
871000
heap
page read and write
871000
heap
page read and write
520000
unkown
page readonly
3853000
direct allocation
page read and write
871000
heap
page read and write
1CA1B640000
trusted library allocation
page read and write
530000
heap
page read and write
38D0000
direct allocation
page read and write
2813000
heap
page read and write
700000
unkown
page readonly
1118000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
FE1000
heap
page read and write
A9B47FE000
stack
page read and write
871000
heap
page read and write
FD4000
heap
page read and write
871000
heap
page read and write
5F0000
heap
page read and write
7B4000
heap
page read and write
C5C000
unkown
page read and write
871000
heap
page read and write
BEB000
heap
page read and write
39FD000
direct allocation
page read and write
871000
heap
page read and write
4CC000
stack
page read and write
871000
heap
page read and write
871000
heap
page read and write
FE1000
heap
page read and write
3A6E000
direct allocation
page read and write
762A000
heap
page read and write
B91000
unkown
page execute read
720000
unkown
page read and write
871000
heap
page read and write
FDB000
heap
page read and write
39F9000
direct allocation
page read and write
2872000
unkown
page read and write
762D000
heap
page read and write
7AC000
heap
page read and write
871000
heap
page read and write
769000
heap
page read and write
591000
unkown
page readonly
871000
heap
page read and write
3730000
direct allocation
page read and write
871000
heap
page read and write
39FD000
direct allocation
page read and write
871000
heap
page read and write
871000
heap
page read and write
5059000
system
page execute and read and write
110B000
heap
page read and write
871000
heap
page read and write
1CA19D20000
heap
page read and write
871000
heap
page read and write
A20000
trusted library allocation
page read and write
871000
heap
page read and write
2813000
heap
page read and write
FDB000
heap
page read and write
871000
heap
page read and write
799000
heap
page read and write
10E3000
heap
page read and write
772000
heap
page read and write
2A12000
heap
page read and write
7C0000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
6FB000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
1CA19E60000
heap
page read and write
871000
heap
page read and write
38A3000
direct allocation
page read and write
520000
unkown
page readonly
338C000
unclassified section
page read and write
871000
heap
page read and write
75DB000
heap
page read and write
2A00000
heap
page read and write
2700000
unkown
page execute and read and write
871000
heap
page read and write
871000
heap
page read and write
5F1000
unkown
page execute read
871000
heap
page read and write
1122000
heap
page read and write
7CBF000
stack
page read and write
5E0000
unkown
page read and write
1044000
heap
page read and write
871000
heap
page read and write
BBA000
heap
page read and write
970000
heap
page read and write
1CA19E6A000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
3730000
direct allocation
page read and write
871000
heap
page read and write
3920000
direct allocation
page read and write
39FD000
direct allocation
page read and write
3172000
unclassified section
page read and write
4FDC000
system
page execute and read and write
38A3000
direct allocation
page read and write
2B4C000
unkown
page read and write
2F9E000
heap
page read and write
3A6E000
direct allocation
page read and write
871000
heap
page read and write
5F0000
unkown
page readonly
38D0000
direct allocation
page read and write
370E000
unkown
page read and write
B6E000
stack
page read and write
871000
heap
page read and write
32CD000
direct allocation
page execute and read and write
5F0000
unkown
page readonly
19C92000
system
page read and write
679000
stack
page read and write
4C0000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
610000
heap
page read and write
1CA1BA01000
trusted library allocation
page read and write
75E3000
heap
page read and write
38A3000
direct allocation
page read and write
7D3000
heap
page read and write
2872000
unkown
page read and write
298C000
unkown
page read and write
A5B000
stack
page read and write
BBA000
heap
page read and write
871000
heap
page read and write
B80000
heap
page read and write
871000
heap
page read and write
7F0000
unkown
page read and write
FE1000
heap
page read and write
7EA000
heap
page read and write
2F29000
heap
page read and write
2BA0000
trusted library allocation
page read and write
871000
heap
page read and write
C60000
unkown
page write copy
5E0000
unkown
page readonly
871000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
7633000
heap
page read and write
871000
heap
page read and write
871000
heap
page read and write
1122000
heap
page read and write
1CA19C8D000
system
page execute and read and write
3ABE000
direct allocation
page read and write
720000
unkown
page readonly
871000
heap
page read and write
A9B37FE000
stack
page read and write
871000
heap
page read and write
871000
heap
page read and write
B2E000
stack
page read and write
3920000
direct allocation
page read and write
871000
heap
page read and write
5F1000
unkown
page execute read
2CD8000
heap
page read and write
510000
unkown
page readonly
871000
heap
page read and write
C64000
unkown
page readonly
4FE7000
system
page execute and read and write
CB8000
heap
page read and write
1122000
heap
page read and write
2813000
heap
page read and write
871000
heap
page read and write
720000
unkown
page readonly
5B90000
trusted library allocation
page read and write
871000
heap
page read and write
1044000
heap
page read and write
3A6E000
direct allocation
page read and write
2780000
unkown
page readonly
2A31000
heap
page read and write
871000
heap
page read and write
1B9E000
stack
page read and write
871000
heap
page read and write
3853000
direct allocation
page read and write
There are 698 hidden memdumps, click here to show them.