IOC Report
Launcher_x32_x64.exe

loading gif

Files

File Path
Type
Category
Malicious
Launcher_x32_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Windows\Temp\4ud5if5k.0ze.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Launcher_x32_x64.exe
"C:\Users\user\Desktop\Launcher_x32_x64.exe"
malicious
C:\Windows\Temp\4ud5if5k.0ze.exe
"C:\\Windows\\Temp\4ud5if5k.0ze.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
https://locatedblsoqp.shop/api
188.114.97.3
malicious
tenseddrywsqio.shop
malicious
locatedblsoqp.shop
malicious
caffegclasiqwp.shop
malicious
millyscroqwp.shop
malicious
traineiwnqo.shop
malicious
condedqpwqm.shop
malicious
https://tenseddrywsqio.shop/api
172.67.209.93
malicious
stagedchheiqwo.shop
malicious
stamppreewntnq.shop
malicious
evoliutwoqm.shop
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
unknown
https://github.com/mono/linker/issues/1731
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
unknown
https://aka.ms/dotnet/info
unknown
https://paper.dropbox.com/cloud-docs/edit
unknown
https://aka.ms/dotnet/app-launch-failed
unknown
https://app.hellosign.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
unknown
https://github.com/mono/linker/issues/1895v
unknown
https://www.dropbox.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
unknown
https://www.docsend.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
unknown
https://aka.ms/nativeaot-compatibility
unknown
https://www.dropboxstatic.com/static/
unknown
https://github.com/mono/linker/pull/649
unknown
https://officeapps-df.live.com
unknown
https://api.login.yahoo.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://login.yahoo.com/
unknown
https://www.dropbox.com/playlist/
unknown
https://onedrive.live.com/picker
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
unknown
https://www.dropbox.com/scl/fi/zggrbdmbru8wwpp19fnal/Launcher.exe?rlkey=oyhv29cvxml0f5jh9a6ijy93p&st
unknown
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/
unknown
https://aka.ms/dotnet-illink/com
unknown
https://uc65f56b62827632faafd635f90d.dl.dropboxusercontent.com/cd/0/get/CZuc7lbOcorcPO1KnxZRm4I-EZZJ
unknown
https://aka.ms/dotnet/downloadInstall
unknown
https://www.dropbox.com/v/s/playlist/
unknown
https://github.com/dotnet/runtimev
unknown
https://docs.sandbox.google.com/document/fsip/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://github.com/dotnet/runtimer
unknown
https://help.dropbox.com/
unknown
https://docs.google.com/presentation/fsip/
unknown
https://canny.io/sdk.js
unknown
https://2e83413d8036243b-Dropbox-pal-live.adyenpayments.com/
unknown
https://selfguidedlearning.dropboxbusiness.com/
unknown
https://www.google.com/recaptcha/
unknown
https://management.azure.comfailed
unknown
https://github.com/dotnet/runtime/issues/50821
unknown
https://docs.sandbox.google.com/presentation/fsip/
unknown
https://dl-web.dropbox.com/
unknown
https://app.hellofax.com/
unknown
https://cfl.dropboxstatic.com/static/
unknown
https://aka.ms/dotnet/download
unknown
https://www.dropbox.com/csp_log?policy_name=metaserver-whitelist
unknown
https://github.com/dotnet/runtime;
unknown
http://html4/loose.dtd
unknown
https://www.dropbox.com/service_worker.js
unknown
https://api.loganalytics.iohttps://api.loganalytics.usencountered
unknown
https://github.com/dotnet/runtime7
unknown
http://uc65f56b62827632faafd635f90d.dl.dropboxusercontent.com:443/
unknown
https://datalake.azure.net/https://graph.microsoft.us/servicebus.chinacloudapi.cndocuments.microsoft
unknown
https://paper.dropbox.com/
unknown
https://www.hellofax.com/
unknown
https://pal-test.adyen.com
unknown
https://github.com/dotnet/runtime?
unknown
https://www.hellosign.com/
unknown
https://instructorledlearning.dropboxbusiness.com/
unknown
http://.css
unknown
https://www.dropbox.com/page_success/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
unknown
https://aka.ms/dotnet/sdk-not-foundFailed
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://github.com/dotnet/runtime
unknown
https://www.dropbox.com/pithos/
unknown
https://sales.dropboxbusiness.com/
unknown
https://photos.dropbox.com/
unknown
https://a.sprig.com/
unknown
https://aka.ms/dotnet-warnings/
unknown
https://www.dropbox.com/encrypted_folder_download/service_worker.js
unknown
https://github.com/dotnet/runtimef
unknown
https://github.com/dotnet/runtime/issues/71847
unknown
https://github.com/dotnet/runtime_
unknown
https://navi.dropbox.jp/
unknown
https://aka.ms/serializationformat-binary-obsolete
unknown
https://login.microsoftonline.com/METRIC_AZURERM_API_REQUEST_BUCKETSlabel
unknown
https://gallery.usgovcloudapi.net/mariadb.database.usgovcloudapi.netdev.azuresynapse.usgovcloudapi.n
unknown
https://aka.ms/binaryformatter
unknown
https://www.dropbox.com/static/api/
unknown
https://github.com/dotnet/runtimeI_#
unknown
https://uc65f56b62827632faafd635f90d.dl.dropboxusercontent.com/cd/0/get/CZuc7lbOcorcPO1KnxZRm4I-EZZJmX4CAtKb51Ff50K-MBU4Nlue9UTG2pSEpIIqdE9VtxyEjty_TXqZ6fmGkkyezkdESSzw2JVLLryoStBMg9uHfHjByfogdOWZUZ_u2nqNaED64BuzF6YgGT3bVBkI/file?dl=1
162.125.66.15
http://.jpg
unknown
https://www.dropbox.com/scl/fi/zggrbdmbru8wwpp19fnal/Launcher.exe?rlkey=oyhv29cvxml0f5jh9a6ijy93p&st=su8clvok&dl=1
162.125.66.18
https://docsend.com/
unknown
https://showcase.dropbox.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
locatedblsoqp.shop
188.114.97.3
malicious
tenseddrywsqio.shop
172.67.209.93
malicious
traineiwnqo.shop
188.114.97.3
malicious
edge-block-www-env.dropbox-dns.com
162.125.66.15
www-env.dropbox-dns.com
162.125.66.18
uc65f56b62827632faafd635f90d.dl.dropboxusercontent.com
unknown
www.dropbox.com
unknown

IPs

IP
Domain
Country
Malicious
172.67.209.93
tenseddrywsqio.shop
United States
malicious
188.114.97.3
locatedblsoqp.shop
European Union
malicious
162.125.66.18
www-env.dropbox-dns.com
United States
162.125.66.15
edge-block-www-env.dropbox-dns.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3E01000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3B36000
direct allocation
page read and write
malicious
3C9E000
direct allocation
page read and write
malicious
3C28000
direct allocation
page read and write
E4A0000
unkown
page readonly
D0A0000
direct allocation
page execute read
3A2B000
heap
page read and write
EEB5000
heap
page read and write
5A34000
direct allocation
page read and write
EEF4000
heap
page read and write
3B10000
direct allocation
page read and write
117F000
unkown
page readonly
A424000
unkown
page write copy
3924000
direct allocation
page read and write
DF6C000
direct allocation
page read and write
D821000
unkown
page execute read
EEA5000
heap
page read and write
DF48000
direct allocation
page execute read
DF4C000
direct allocation
page read and write
E521000
unkown
page execute read
A500000
direct allocation
page execute read
5A44000
direct allocation
page read and write
3B13000
direct allocation
page read and write
3922000
direct allocation
page read and write
E5F0000
unkown
page readonly
CDCE000
unkown
page readonly
D6F1000
unkown
page execute read
3C3C000
direct allocation
page read and write
2F25000
heap
page read and write
3A66000
heap
page read and write
3A92000
direct allocation
page read and write
3AD8000
direct allocation
page read and write
E604000
unkown
page write copy
EE51000
heap
page read and write
3C86000
direct allocation
page read and write
8B14000
direct allocation
page read and write
23A7F000
stack
page read and write
3A65000
heap
page read and write
3800000
direct allocation
page read and write
EBB8000
direct allocation
page execute read
EEAA000
heap
page read and write
ACF0000
direct allocation
page read and write
5A48000
direct allocation
page execute read
CE00000
unkown
page readonly
FD2F000
direct allocation
page read and write
AF84000
direct allocation
page read and write
EEB3000
heap
page read and write
AF8C000
direct allocation
page read and write
EE34000
direct allocation
page read and write
EE3C000
direct allocation
page read and write
1187000
unkown
page readonly
3C70000
direct allocation
page read and write
8B30000
unclassified section
page read and write
E5A4000
direct allocation
page read and write
3C41000
direct allocation
page read and write
3A92000
heap
page read and write
A560000
direct allocation
page read and write
3987000
direct allocation
page read and write
D047000
unkown
page write copy
A53C000
direct allocation
page read and write
2F3C000
heap
page read and write
EF09000
heap
page read and write
EE9A000
heap
page read and write
D771000
unkown
page execute read
D0C4000
direct allocation
page read and write
3A92000
heap
page read and write
15FB000
unkown
page write copy
3C10000
direct allocation
page read and write
3B22000
direct allocation
page read and write
EAE1000
unkown
page execute read
AB3C000
direct allocation
page read and write
D054000
direct allocation
page read and write
D6F0000
unkown
page readonly
EEAA000
heap
page read and write
EEB5000
heap
page read and write
FD5B000
direct allocation
page read and write
EF0C000
heap
page read and write
3908000
direct allocation
page read and write
EEA5000
heap
page read and write
D0DC000
direct allocation
page read and write
D2E0000
unkown
page readonly
1146000
unkown
page readonly
55FE000
stack
page read and write
3C78000
direct allocation
page read and write
D7A3000
unkown
page write copy
EB10000
unkown
page readonly
448000
remote allocation
page execute and read and write
8B40000
unclassified section
page read and write
AEE0000
unkown
page readonly
37E0000
heap
page read and write
5A1F000
stack
page read and write
E05D000
heap
page read and write
1D00000
heap
page read and write
EE94000
heap
page read and write
368C000
stack
page read and write
1679000
unkown
page read and write
8CCB000
stack
page read and write
3BB0000
direct allocation
page read and write
11AC000
unkown
page readonly
3A7A000
heap
page read and write
391C000
direct allocation
page read and write
16E4000
unkown
page readonly
EEAA000
heap
page read and write
FD2C000
direct allocation
page read and write
D0CC000
direct allocation
page read and write
3ACE000
heap
page read and write
5A78000
direct allocation
page read and write
F054000
direct allocation
page read and write
A550000
direct allocation
page read and write
1182000
unkown
page readonly
C9D4000
direct allocation
page read and write
15F7000
unkown
page read and write
2F13000
heap
page read and write
D010000
unkown
page readonly
3ADD000
heap
page read and write
D0A8000
direct allocation
page execute read
EE95000
heap
page read and write
14AE000
unkown
page read and write
116FF000
stack
page read and write
EED6000
heap
page read and write
AB29000
stack
page read and write
C9C0000
direct allocation
page read and write
384E000
direct allocation
page read and write
3AE7000
heap
page read and write
3A72000
heap
page read and write
3A62000
heap
page read and write
3C90000
direct allocation
page read and write
3944000
direct allocation
page read and write
EE87000
heap
page read and write
50FF000
stack
page read and write
1CE0000
direct allocation
page read and write
CA00000
direct allocation
page execute read
EEAA000
heap
page read and write
E30000
unkown
page readonly
EE9F000
heap
page read and write
E88E000
stack
page read and write
DF44000
direct allocation
page read and write
D70F000
unkown
page write copy
D770000
unkown
page readonly
163E000
unkown
page read and write
F231000
direct allocation
page read and write
3A50000
heap
page read and write
E588000
unkown
page read and write
2F1B000
heap
page read and write
57EE000
stack
page read and write
3A62000
heap
page read and write
3AFB000
heap
page read and write
AFA8000
direct allocation
page execute read
E5F1000
unkown
page execute read
3890000
direct allocation
page read and write
E2C8000
direct allocation
page execute read
EEAA000
heap
page read and write
EE97000
heap
page read and write
14A9000
unkown
page write copy
117B0000
unkown
page readonly
5787000
direct allocation
page read and write
AD30000
direct allocation
page read and write
EEA5000
heap
page read and write
FD63000
direct allocation
page read and write
C9D0000
direct allocation
page execute read
CC1C000
direct allocation
page readonly
AF88000
direct allocation
page execute read
3C20000
direct allocation
page read and write
CAE7000
direct allocation
page readonly
E620000
direct allocation
page read and write
E31000
unkown
page execute read
3B64000
direct allocation
page read and write
D29C000
stack
page read and write
15F6000
unkown
page write copy
3C6C000
direct allocation
page read and write
E89C000
direct allocation
page read and write
3A7A000
heap
page read and write
EE00000
direct allocation
page execute read
E610000
unkown
page readonly
A4F0000
direct allocation
page read and write
E489000
stack
page read and write
390C000
direct allocation
page read and write
EB74000
direct allocation
page read and write
8AFE000
unkown
page read and write
DFD0000
heap
page read and write
8B1C000
direct allocation
page read and write
EEB4000
heap
page read and write
98D1000
unkown
page execute read
C9F0000
direct allocation
page execute read
3C3A000
direct allocation
page read and write
5AD7000
direct allocation
page read and write
584E000
stack
page read and write
EB94000
direct allocation
page read and write
D6C0000
unkown
page readonly
D0D0000
direct allocation
page execute read
E605000
direct allocation
page readonly
3B30000
direct allocation
page read and write
1187000
unkown
page readonly
EEB5000
heap
page read and write
3B86000
direct allocation
page read and write
3C92000
direct allocation
page read and write
E063000
heap
page read and write
EB70000
direct allocation
page execute read
C9F8000
direct allocation
page execute read
15F8000
unkown
page write copy
F060000
direct allocation
page read and write
DF90000
heap
page read and write
EBA8000
direct allocation
page execute read
14AC000
unkown
page write copy
EEB5000
heap
page read and write
E520000
unkown
page readonly
4BBD000
stack
page read and write
3830000
direct allocation
page read and write
EEAA000
heap
page read and write
EA5D000
stack
page read and write
EE38000
direct allocation
page execute read
E026000
heap
page read and write
EED4000
heap
page read and write
117F000
unkown
page readonly
3B2A000
direct allocation
page read and write
3AE7000
heap
page read and write
8AC000
stack
page read and write
3A7A000
heap
page read and write
9F62000
unkown
page execute read
39BC000
direct allocation
page read and write
D70E000
unkown
page read and write
3C64000
direct allocation
page read and write
A540000
direct allocation
page execute read
EF03000
heap
page read and write
2BF0000
remote allocation
page read and write
D09C000
direct allocation
page read and write
D710000
direct allocation
page readonly
3BCA000
direct allocation
page read and write
3B1A000
direct allocation
page read and write
3C9A000
direct allocation
page read and write
EB98000
direct allocation
page execute read
EB80000
direct allocation
page read and write
DF28000
direct allocation
page execute read
382C000
direct allocation
page read and write
8B10000
direct allocation
page execute read
CFC0000
direct allocation
page read and write
E894000
direct allocation
page read and write
D011000
unkown
page execute read
577F000
stack
page read and write
167D000
unkown
page write copy
D074000
direct allocation
page read and write
164A000
unkown
page read and write
CC30000
unkown
page readonly
2BCD000
stack
page read and write
AB30000
direct allocation
page execute read
A40000
heap
page read and write
EE65000
heap
page read and write
8CD0000
unkown
page readonly
EE94000
heap
page read and write
3C5E000
direct allocation
page read and write
3A5D000
heap
page read and write
E05F000
heap
page read and write
5A30000
direct allocation
page execute read
3B72000
direct allocation
page read and write
CF8F000
unkown
page read and write
3C30000
direct allocation
page read and write
EEAA000
heap
page read and write
1BE0000
heap
page read and write
E070000
direct allocation
page read and write
EEFA000
heap
page read and write
AED0000
direct allocation
page readonly
5A86000
direct allocation
page read and write
1B10000
heap
page read and write
4F10000
heap
page read and write
AB44000
direct allocation
page read and write
1673000
unkown
page read and write
EBC0000
direct allocation
page read and write
D2D0000
direct allocation
page readonly
E23A000
stack
page read and write
A4D0000
direct allocation
page read and write
23E3F000
stack
page read and write
3B34000
direct allocation
page read and write
D048000
direct allocation
page readonly
23D3D000
stack
page read and write
D6A1000
unkown
page execute read
AB40000
direct allocation
page execute read
AF5D000
unkown
page write copy
3BC4000
direct allocation
page read and write
E30D000
stack
page read and write
A54C000
direct allocation
page read and write
11B4000
unkown
page readonly
14B3000
unkown
page read and write
CC15000
unkown
page write copy
3B62000
direct allocation
page read and write
2397D000
stack
page read and write
1179000
unkown
page readonly
3A5F000
heap
page read and write
EF40000
heap
page read and write
1AFC000
stack
page read and write
3808000
stack
page read and write
DFC1000
heap
page read and write
3AD7000
heap
page read and write
EEE3000
heap
page read and write
2B30000
heap
page read and write
2E5E000
stack
page read and write
AD61000
unkown
page execute read
D66F000
stack
page read and write
A548000
direct allocation
page execute read
48BE000
stack
page read and write
AAE000
stack
page read and write
3C5A000
direct allocation
page read and write
3A8F000
heap
page read and write
CDD0000
unkown
page readonly
3A00000
direct allocation
page read and write
D4EE000
stack
page read and write
1D29000
heap
page read and write
D0C0000
direct allocation
page execute read
3A72000
heap
page read and write
EE55000
heap
page read and write
398E000
stack
page read and write
AD58000
direct allocation
page execute read
A520000
direct allocation
page read and write
136F000
unkown
page readonly
3B2E000
direct allocation
page read and write
E898000
direct allocation
page execute read
FD17000
direct allocation
page read and write
3B90000
direct allocation
page read and write
EB7C000
direct allocation
page read and write
EE97000
heap
page read and write
A530000
direct allocation
page execute read
5780000
direct allocation
page read and write
15FA000
unkown
page read and write
D4AF000
stack
page read and write
3A50000
heap
page read and write
3A67000
heap
page read and write
A504000
direct allocation
page read and write
3C2C000
direct allocation
page read and write
3930000
direct allocation
page read and write
3840000
heap
page read and write
DFE8000
heap
page read and write
3AC4000
direct allocation
page read and write
11700000
unkown
page readonly
23E44000
direct allocation
page read and write
D7A6000
direct allocation
page readonly
EE85000
heap
page read and write
950000
heap
page read and write
E061000
heap
page read and write
1CF0000
direct allocation
page read and write
DF71000
heap
page read and write
3C4A000
direct allocation
page read and write
8AF1000
unkown
page execute read
3A4A000
heap
page read and write
396E000
direct allocation
page read and write
D094000
direct allocation
page read and write
136F000
unkown
page readonly
5A40000
direct allocation
page execute read
D855000
unkown
page read and write
3936000
direct allocation
page read and write
EAA2000
unkown
page read and write
163A000
unkown
page read and write
3ABD000
heap
page read and write
3B96000
direct allocation
page read and write
3ACC000
heap
page read and write
3A6D000
heap
page read and write
1BD0000
direct allocation
page read and write
23E40000
direct allocation
page read and write
AF90000
direct allocation
page read and write
8AD0000
direct allocation
page read and write
3C32000
direct allocation
page read and write
AEE000
stack
page read and write
11B4000
unkown
page readonly
EB9C000
direct allocation
page read and write
5A71000
direct allocation
page read and write
3A66000
heap
page read and write
3A7A000
heap
page read and write
3862000
direct allocation
page read and write
14C3000
unkown
page readonly
E66E000
stack
page read and write
AD00000
unkown
page readonly
3AE7000
heap
page read and write
DF1C000
stack
page read and write
EF08000
heap
page read and write
E026000
heap
page read and write
24080000
direct allocation
page read and write
3A8F000
heap
page read and write
9829000
unkown
page readonly
DF50000
direct allocation
page read and write
1179F000
unkown
page read and write
A45000
heap
page read and write
5890000
heap
page read and write
1B8C000
direct allocation
page read and write
FD37000
direct allocation
page read and write
164F000
unkown
page read and write
E58E000
direct allocation
page readonly
1165000
unkown
page readonly
382A000
direct allocation
page read and write
EDE0000
heap
page read and write
3920000
heap
page read and write
3BA0000
direct allocation
page read and write
AF5F000
direct allocation
page readonly
E2BD000
stack
page read and write
EE30000
direct allocation
page execute read
3AB4000
direct allocation
page read and write
3910000
direct allocation
page read and write
D9D000
unkown
page readonly
3AC2000
direct allocation
page read and write
AD40000
direct allocation
page read and write
3928000
direct allocation
page read and write
EE41000
heap
page read and write
5A38000
direct allocation
page execute read
A46E000
direct allocation
page readonly
3A5D000
heap
page read and write
11760000
unkown
page readonly
9816000
unkown
page readonly
3A71000
heap
page read and write
A40A000
unkown
page read and write
D090000
direct allocation
page execute read
D05C000
direct allocation
page read and write
DFE8000
heap
page read and write
3A33000
heap
page read and write
A9AE000
stack
page read and write
E065000
heap
page read and write
382E000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
384C000
direct allocation
page read and write
A4EC000
direct allocation
page read and write
CE01000
unkown
page execute read
FD20000
direct allocation
page read and write
8AAE000
stack
page read and write
CB75000
unkown
page readonly
3C98000
direct allocation
page read and write
5A4C000
direct allocation
page read and write
3B9E000
direct allocation
page read and write
EB78000
direct allocation
page execute read
117C000
unkown
page readonly
9F64000
unkown
page execute read
EB03000
unkown
page write copy
3C60000
direct allocation
page read and write
9818000
unkown
page readonly
F05C000
direct allocation
page read and write
3F4C000
direct allocation
page read and write
3A74000
heap
page read and write
35A0000
direct allocation
page read and write
14C3000
unkown
page readonly
ACAD000
unkown
page readonly
EEE0000
heap
page read and write
3ADD000
heap
page read and write
EB60000
direct allocation
page execute read
2FA3000
heap
page read and write
EF4F000
heap
page read and write
117A3000
direct allocation
page readonly
3C8E000
direct allocation
page read and write
CFA2000
direct allocation
page readonly
23F3D000
stack
page read and write
DD5D000
stack
page read and write
163D000
unkown
page write copy
A4E8000
direct allocation
page execute read
3A72000
heap
page read and write
386A000
direct allocation
page read and write
15F0000
unkown
page write copy
D0D8000
direct allocation
page execute read
D6B2000
direct allocation
page readonly
EF5F000
heap
page read and write
AB4C000
direct allocation
page read and write
EE99000
heap
page read and write
3954000
direct allocation
page read and write
1B20000
heap
page read and write
EA90000
unkown
page readonly
39D0000
direct allocation
page execute read
4ABE000
stack
page read and write
1125D000
direct allocation
page read and write
9368000
unkown
page readonly
EE52000
heap
page read and write
4F00000
heap
page read and write
3C76000
direct allocation
page read and write
AD60000
unkown
page readonly
AFA0000
direct allocation
page execute read
EB70000
remote allocation
page read and write
EED6000
heap
page read and write
D674000
unkown
page readonly
3C00000
direct allocation
page read and write
680000
unkown
page readonly
5ACA000
direct allocation
page read and write
EC5E000
stack
page read and write
3B82000
direct allocation
page read and write
2B8D000
stack
page read and write
CC12000
unkown
page read and write
FD14000
direct allocation
page read and write
E5A0000
direct allocation
page execute read
17AC000
stack
page read and write
3A7A000
heap
page read and write
EEA5000
heap
page read and write
15F2000
unkown
page read and write
EAB0000
unkown
page readonly
CF95000
unkown
page write copy
3B78000
direct allocation
page read and write
D0A4000
direct allocation
page read and write
A4E4000
direct allocation
page read and write
3B26000
direct allocation
page read and write
3C66000
direct allocation
page read and write
EEFA000
heap
page read and write
3AC0000
heap
page read and write
3860000
direct allocation
page read and write
CAF0000
unkown
page readonly
3C96000
direct allocation
page read and write
D046000
unkown
page read and write
3C0E000
direct allocation
page read and write
EE59000
heap
page read and write
3824000
direct allocation
page read and write
CA18000
direct allocation
page execute read
39E7000
heap
page read and write
7A71000
direct allocation
page read and write
E026000
heap
page read and write
3A13000
direct allocation
page execute read
1165000
unkown
page readonly
39CE000
stack
page read and write
F05E000
heap
page read and write
3ADE000
heap
page read and write
E5A8000
direct allocation
page execute read
5A8A000
direct allocation
page read and write
D0B0000
direct allocation
page read and write
AD5C000
direct allocation
page read and write
3C7C000
direct allocation
page read and write
D0C8000
direct allocation
page execute read
F040000
direct allocation
page read and write
3A8F000
heap
page read and write
3B1C000
direct allocation
page read and write
D080000
direct allocation
page read and write
FD29000
direct allocation
page read and write
D078000
direct allocation
page execute read
3878000
direct allocation
page read and write
EE9B000
heap
page read and write
A508000
direct allocation
page execute read
8B00000
direct allocation
page read and write
EAE0000
unkown
page readonly
3920000
direct allocation
page read and write
E0BD000
stack
page read and write
EEC3000
heap
page read and write
2BF0000
remote allocation
page read and write
3C38000
direct allocation
page read and write
E7EF000
stack
page read and write
3B0E000
direct allocation
page read and write
DF70000
heap
page read and write
F04A000
heap
page read and write
EF1C000
heap
page read and write
CA10000
direct allocation
page execute read
D670000
unkown
page readonly
F045000
heap
page read and write
3820000
heap
page read and write
AFAC000
direct allocation
page read and write
5800000
direct allocation
page execute read
CB90000
unkown
page readonly
FD32000
direct allocation
page read and write
3ABC000
direct allocation
page read and write
CA91000
unkown
page execute read
A544000
direct allocation
page read and write
D820000
unkown
page readonly
3A14000
direct allocation
page read and write
EE20000
direct allocation
page read and write
EEFA000
heap
page read and write
AEBF000
unkown
page write copy
EBB0000
direct allocation
page execute read
D720000
unkown
page readonly
D098000
direct allocation
page execute read
DF68000
direct allocation
page execute read
CA20000
unkown
page readonly
586E000
direct allocation
page read and write
EB02000
unkown
page read and write
8B18000
direct allocation
page execute read
E31000
unkown
page execute read
ACB1000
unkown
page readonly
3AE1000
heap
page read and write
F058000
direct allocation
page execute read
D0AC000
direct allocation
page read and write
C9DC000
direct allocation
page read and write
EEF8000
heap
page read and write
1182000
unkown
page readonly
1146000
unkown
page readonly
2EFA000
heap
page read and write
3900000
direct allocation
page read and write
E5B0000
unkown
page readonly
D11E000
stack
page read and write
2F41000
heap
page read and write
1B88000
direct allocation
page read and write
A534000
direct allocation
page read and write
15F0000
unkown
page write copy
3A92000
heap
page read and write
D6B1000
unkown
page read and write
D7D0000
unkown
page readonly
E5AC000
direct allocation
page read and write
DF40000
direct allocation
page execute read
393C000
direct allocation
page read and write
8ACC000
direct allocation
page read and write
DF2C000
direct allocation
page read and write
8AF0000
unkown
page readonly
3A62000
heap
page read and write
EE95000
heap
page read and write
E30000
unkown
page readonly
E026000
heap
page read and write
55BF000
stack
page read and write
FCF6000
direct allocation
page read and write
DFA0000
heap
page read and write
EE40000
heap
page read and write
1BE5000
heap
page read and write
5804000
direct allocation
page read and write
8AFF000
direct allocation
page readonly
23CFF000
stack
page read and write
3A6D000
heap
page read and write
F050000
direct allocation
page execute read
EEA6000
heap
page read and write
3A71000
heap
page read and write
7A74000
direct allocation
page read and write
3A1D000
direct allocation
page execute read
AD54000
direct allocation
page read and write
1D0A000
heap
page read and write
936A000
unkown
page readonly
EEAA000
heap
page read and write
EEA4000
heap
page read and write
EB70000
remote allocation
page read and write
5A20000
direct allocation
page read and write
3C62000
direct allocation
page read and write
A538000
direct allocation
page execute read
3C22000
direct allocation
page read and write
A510000
direct allocation
page read and write
A30000
heap
page read and write
DF64000
direct allocation
page read and write
AB34000
direct allocation
page read and write
382B000
heap
page read and write
681000
unkown
page execute read
AF80000
direct allocation
page execute read
EEBA000
heap
page read and write
3A8F000
heap
page read and write
AD50000
direct allocation
page execute read
392C000
direct allocation
page read and write
E062000
heap
page read and write
AEBD000
unkown
page read and write
DFE8000
heap
page read and write
EB70000
remote allocation
page read and write
3870000
direct allocation
page read and write
AFA4000
direct allocation
page read and write
3B02000
heap
page read and write
EEA4000
heap
page read and write
D070000
direct allocation
page execute read
D050000
direct allocation
page execute read
CAE2000
unkown
page write copy
3B0C000
direct allocation
page read and write
E2C0000
direct allocation
page execute read
5A8C000
direct allocation
page read and write
CA14000
direct allocation
page read and write
E890000
direct allocation
page execute read
3B28000
direct allocation
page read and write
23E49000
direct allocation
page read and write
3C18000
direct allocation
page read and write
3C80000
direct allocation
page read and write
51FE000
stack
page read and write
E603000
unkown
page read and write
EBBC000
direct allocation
page read and write
D856000
unkown
page write copy
3C24000
direct allocation
page read and write
E8DE000
stack
page read and write
DFA1000
heap
page read and write
164D000
unkown
page write copy
C9D8000
direct allocation
page execute read
23BBF000
stack
page read and write
2EF0000
heap
page read and write
E7F0000
direct allocation
page read and write
9823000
unkown
page readonly
A4E0000
direct allocation
page execute read
C9E0000
direct allocation
page read and write
3AAE000
heap
page read and write
3A47000
heap
page read and write
3A5F000
heap
page read and write
3C94000
direct allocation
page read and write
EF4F000
heap
page read and write
117C000
unkown
page readonly
3B76000
direct allocation
page read and write
8AC8000
direct allocation
page execute read
8AC0000
direct allocation
page execute read
3A66000
heap
page read and write
3B20000
direct allocation
page read and write
11761000
unkown
page execute read
DF60000
direct allocation
page execute read
DBDD000
stack
page read and write
AB48000
direct allocation
page execute read
3859000
direct allocation
page read and write
EB42000
unkown
page read and write
23E93000
direct allocation
page read and write
EE85000
heap
page read and write
3C26000
direct allocation
page read and write
EE9F000
heap
page read and write
3B92000
direct allocation
page read and write
DD9E000
stack
page read and write
EEF8000
heap
page read and write
CFD0000
unkown
page readonly
391E000
direct allocation
page read and write
3B5A000
direct allocation
page read and write
8EC000
stack
page read and write
680000
unkown
page readonly
167D000
unkown
page write copy
6A71000
direct allocation
page read and write
D9D000
unkown
page readonly
3C14000
direct allocation
page read and write
DF80000
heap
page read and write
EE95000
heap
page read and write
D7C0000
direct allocation
page read and write
98D0000
unkown
page readonly
F05A000
heap
page read and write
3902000
direct allocation
page read and write
3B04000
direct allocation
page read and write
5859000
direct allocation
page read and write
AD10000
unkown
page readonly
D6A0000
unkown
page readonly
ACE0000
direct allocation
page read and write
2E9E000
stack
page read and write
16E4000
unkown
page readonly
3C48000
direct allocation
page read and write
2F15000
heap
page read and write
AB38000
direct allocation
page execute read
EBB4000
direct allocation
page read and write
3926000
direct allocation
page read and write
E27E000
stack
page read and write
EB43000
direct allocation
page readonly
8AE0000
direct allocation
page execute read
3A8F000
heap
page read and write
2BF0000
remote allocation
page read and write
2383E000
stack
page read and write
3ADA000
heap
page read and write
EAA3000
direct allocation
page readonly
D7A2000
unkown
page read and write
D32E000
stack
page read and write
EEF8000
heap
page read and write
3AE7000
heap
page read and write
EBA4000
direct allocation
page read and write
DFB0000
heap
page read and write
CA90000
unkown
page readonly
23E80000
direct allocation
page read and write
3A50000
heap
page read and write
AF5C000
unkown
page read and write
1184000
unkown
page readonly
2393F000
stack
page read and write
23ABD000
stack
page read and write
CB91000
unkown
page execute read
3844000
direct allocation
page read and write
A50C000
direct allocation
page read and write
5A50000
direct allocation
page execute read
F22D000
stack
page read and write
3EEC000
direct allocation
page read and write
EE9B000
heap
page read and write
8B20000
direct allocation
page execute read
2403E000
stack
page read and write
3B50000
direct allocation
page read and write
EF1C000
heap
page read and write
EE55000
heap
page read and write
39F5000
direct allocation
page read and write
D07C000
direct allocation
page read and write
8AB0000
unclassified section
page read and write
EDDF000
stack
page read and write
14BB000
unkown
page read and write
167E000
unkown
page readonly
D2A0000
unkown
page readonly
D0D4000
direct allocation
page read and write
3886000
direct allocation
page read and write
31A0000
heap
page read and write
C9FC000
direct allocation
page read and write
117A1000
unkown
page write copy
3A4D000
heap
page read and write
EEF8000
heap
page read and write
5850000
direct allocation
page read and write
E58A000
unkown
page write copy
E2C4000
direct allocation
page read and write
EB30000
unkown
page readonly
EA60000
unkown
page readonly
3A20000
heap
page read and write
AB50000
unkown
page readonly
1649000
unkown
page write copy
D2C1000
unkown
page execute read
5A60000
heap
page execute and read and write
11AC000
unkown
page readonly
CA1C000
direct allocation
page read and write
EED6000
heap
page read and write
EBAC000
direct allocation
page read and write
5ABE000
direct allocation
page read and write
14A9000
unkown
page read and write
EEF8000
heap
page read and write
3AE6000
heap
page read and write
EE41000
heap
page read and write
1179000
unkown
page readonly
681000
unkown
page execute read
5AD2000
direct allocation
page read and write
3B60000
direct allocation
page read and write
165B000
unkown
page read and write
543F000
stack
page read and write
AF31000
unkown
page execute read
3B15000
direct allocation
page read and write
EEAA000
heap
page read and write
3C6A000
direct allocation
page read and write
57F0000
heap
page readonly
167E000
unkown
page readonly
EB04000
direct allocation
page readonly
527F000
stack
page read and write
EBA0000
direct allocation
page execute read
3BAB000
direct allocation
page read and write
383F000
direct allocation
page read and write
E800000
unkown
page readonly
3A65000
heap
page read and write
CAE0000
unkown
page read and write
AEB7000
unkown
page read and write
EEB5000
heap
page read and write
F0AE000
stack
page read and write
3B88000
direct allocation
page read and write
C9F4000
direct allocation
page read and write
D2C0000
unkown
page readonly
DF24000
direct allocation
page read and write
23BFD000
stack
page read and write
3B6A000
direct allocation
page read and write
E490000
direct allocation
page read and write
3BC0000
direct allocation
page read and write
EEAA000
heap
page read and write
AF30000
unkown
page readonly
23E52000
direct allocation
page read and write
EF08000
heap
page read and write
D7B0000
direct allocation
page read and write
DF30000
direct allocation
page read and write
1B70000
heap
page read and write
EB90000
direct allocation
page execute read
3940000
direct allocation
page read and write
EEC3000
heap
page read and write
AF70000
unkown
page readonly
DFE8000
heap
page read and write
49BE000
stack
page read and write
3C34000
direct allocation
page read and write
39E0000
heap
page read and write
D060000
direct allocation
page read and write
3C5C000
direct allocation
page read and write
8AC4000
direct allocation
page read and write
3A65000
heap
page read and write
EE94000
heap
page read and write
EEA6000
heap
page read and write
EE97000
heap
page read and write
DFD0000
heap
page read and write
EB31000
unkown
page execute read
1184000
unkown
page readonly
523E000
stack
page read and write
3B7E000
direct allocation
page read and write
3A92000
heap
page read and write
D859000
direct allocation
page readonly
3B24000
direct allocation
page read and write
EEBA000
heap
page read and write
681000
unkown
page execute read
DF20000
direct allocation
page execute read
3820000
direct allocation
page read and write
39F0000
direct allocation
page read and write
E2CC000
direct allocation
page read and write
3AD0000
direct allocation
page read and write
E84E000
stack
page read and write
EA91000
unkown
page execute read
1B80000
direct allocation
page read and write
EB50000
direct allocation
page read and write
EF20000
heap
page read and write
D2CF000
unkown
page read and write
1D25000
heap
page read and write
3AEF000
heap
page read and write
23EA6000
direct allocation
page read and write
EED6000
heap
page read and write
3BA2000
direct allocation
page read and write
3A64000
heap
page read and write
5A3C000
direct allocation
page read and write
14B9000
unkown
page read and write
3876000
direct allocation
page read and write
D058000
direct allocation
page execute read
E5C0000
unkown
page readonly
EB64000
direct allocation
page read and write
There are 853 hidden memdumps, click here to show them.