IOC Report
Product Data Specifications_PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
Product Data Specifications_PDF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\635gG211
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified
C:\Users\user\AppData\Local\Temp\nonhazardousness
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Product Data Specifications_PDF.exe
"C:\Users\user\Desktop\Product Data Specifications_PDF.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Product Data Specifications_PDF.exe"
malicious
C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe
"C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe"
malicious
C:\Windows\SysWOW64\cmdl32.exe
"C:\Windows\SysWOW64\cmdl32.exe"
malicious
C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe
"C:\Program Files (x86)\NnIoZryBhEWtMulIQJDewMaljOmMStycHIiupvVKLGbAhpXXsqIzIaMRFWDavEHdVRuOhfVVZInD\EyHLOQmzGKBL.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
https://dts.gnpge.com
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.kevin-torkelson.info/__media__/js/trademark.php?d=kevin-torkelson.info&type=ns
unknown
http://www.qwefs.org/toq1/?Z0=uFBHOFjbtFvxqkces1RGqIZYNgmiur5XIDe+8RHTfxNdoahKRW8Ulx3EiPWAiOWTg+KGn77UKm1RYG+ByVGjA2HLhLGNIPNt7CZLxVcbhsRd+xmlQzDGNJYRcWCQEWce52MF6lNTmRQD&fRr0=tfAptZ
45.114.171.236
http://i3.cdn-image.com/__media__/pics/28903/search.png)
unknown
https://cdn.consentmanager.net
unknown
http://www.Kevin-torkelson.info
unknown
http://www.kevin-torkelson.info/Anti_Wrinkle_Creams.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaa
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.dfmagazine.shop/wc8m/
84.32.84.32
http://www.kevin-torkelson.info/High_Speed_Internet.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaa
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
http://i3.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
http://www.trapkitten.website/vzgx/?fRr0=tfAptZ&Z0=fAt7pIVPpGXAvBzcGITPA7OHGvP4drUtR0TDZSipM2iZbUNyxYUxCE+UHA0v6t9lkzzVyERFWiUA+TPVxmGbgZvp38A33fVcU72oeaDS2r7GjI1g6DEPKEsN3N2XW07UJj8EjHQ8jzqg
195.161.68.8
http://www.mandemj.top
unknown
http://www.kevin-torkelson.info/fashion_trends.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaaThZHr
unknown
http://www.kevin-torkelson.info/gekb/?Z0=5z2j4JvjBCmnxDGlKBgzTD3+HUD/dd2fumCOi9/ZiiqSem4bSPmiTeLNTUQRFOSACWspsHfkjQi2G8tl0kaRWA67inr6j8yvx+6PXqz9iyZ5+RA70tZ4RmMUT5lyJ2S3VdPbvKQVdTVJ&fRr0=tfAptZ
208.91.197.27
http://www.kevin-torkelson.info/Parental_Control.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2FSpdhuuZoiiaaThZ
unknown
http://www.kevin-torkelson.info/__media__/design/underconstructionnotice.php?d=kevin-torkelson.info
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
https://delivery.consentmanager.net
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://www.mandemj.top/to69/?Z0=jnxbIh9toY3Lk084faTvVBMEFxwUktgIZy5Q1YpSMvmzprTTtz9cwA3B/bTtN1ehZaJt7UsIXSNTUbHOXFDXB9gkhdqEj3u6wGNYEX9l8USgN38burlDvemyCHtOx57idtfraeuBs8os&fRr0=tfAptZ
162.0.238.43
http://i3.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
https://jino.ru
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://i3.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
http://www.kevin-torkelson.info/All_Inclusive_Vacation_Packages.cfm?fp=6j6oLwulZ3k544A1Hn3uTqUsRR%2F
unknown
https://www.ecosia.org/newtab/
unknown
http://www.disn-china.buzz/za6x/
161.97.168.245
http://i3.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://www.kevin-torkelson.info/gekb/
208.91.197.27
http://www.qwefs.org/toq1/
45.114.171.236
http://www.mandemj.top/to69/
162.0.238.43
http://www.disn-china.buzz/za6x/?fRr0=tfAptZ&Z0=EgAkyEJNK52+6mt0ZZzaOaTRCjAqhTrWwvgRo5oIQtO9ZSuXgOHTRb0W4iTGk1GYFMCByhdBFH2COuTwpe8yjCAk5/Of1W40SqKn8hyiq9h4asN2CcaU88uOnsZx5gwZ1TVihW9sV3GM
161.97.168.245
http://i3.cdn-image.com/__media__/js/min.js?v2.3
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.dfmagazine.shop
unknown
malicious
www.mktimediato.online
unknown
malicious
www.qwefs.org
45.114.171.236
www.mandemj.top
162.0.238.43
www.trapkitten.website
195.161.68.8
www.disn-china.buzz
161.97.168.245
dfmagazine.shop
84.32.84.32
www.kevin-torkelson.info
208.91.197.27

IPs

IP
Domain
Country
Malicious
162.0.238.43
www.mandemj.top
Canada
45.114.171.236
www.qwefs.org
Hong Kong
84.32.84.32
dfmagazine.shop
Lithuania
208.91.197.27
www.kevin-torkelson.info
Virgin Islands (BRITISH)
195.161.68.8
www.trapkitten.website
Russian Federation
161.97.168.245
www.disn-china.buzz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
30E0000
trusted library allocation
page read and write
malicious
33F0000
trusted library allocation
page read and write
malicious
3520000
unclassified section
page execute and read and write
malicious
3C00000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
3120000
unkown
page execute and read and write
malicious
2B90000
system
page execute and read and write
malicious
740000
system
page execute and read and write
malicious
3FF1000
heap
page read and write
4A61000
heap
page read and write
590000
unkown
page readonly
3FF1000
heap
page read and write
4D7E000
stack
page read and write
4C28000
unkown
page execute and read and write
4D3D000
heap
page read and write
31DF000
heap
page read and write
4EED000
direct allocation
page execute and read and write
4A61000
heap
page read and write
3400000
heap
page read and write
3FF1000
heap
page read and write
5628000
unkown
page execute and read and write
3017000
heap
page read and write
2B1B000
stack
page read and write
FF0000
heap
page read and write
2FB0000
heap
page read and write
3FF1000
heap
page read and write
406F000
heap
page read and write
FE0000
unkown
page readonly
8102000
heap
page read and write
F8A000
stack
page read and write
4A61000
heap
page read and write
3025000
heap
page read and write
2E13000
heap
page read and write
3005000
heap
page read and write
193E2421000
trusted library allocation
page read and write
2582000
unkown
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
193E0A4E000
heap
page read and write
4A61000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3A01000
heap
page read and write
3828000
unkown
page execute and read and write
193E25BE000
trusted library allocation
page read and write
23C4000
heap
page read and write
323A000
heap
page read and write
193E2500000
trusted library allocation
page read and write
4A61000
heap
page read and write
3024000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4AB000
unkown
page readonly
482000
unkown
page readonly
3187000
heap
page read and write
C37000
unkown
page readonly
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
34D0000
direct allocation
page read and write
4CCC000
stack
page read and write
490D000
direct allocation
page read and write
3FF1000
heap
page read and write
C2E000
unkown
page readonly
14E0000
heap
page read and write
1624000
heap
page read and write
4A61000
heap
page read and write
4DB2000
heap
page read and write
1651000
heap
page read and write
710000
unkown
page read and write
406E000
heap
page read and write
3FF1000
heap
page read and write
3168000
heap
page read and write
4A61000
heap
page read and write
3208000
heap
page read and write
47E0000
direct allocation
page read and write
4A61000
heap
page read and write
5091000
direct allocation
page execute and read and write
406D000
heap
page read and write
4A61000
heap
page read and write
20902000
system
page read and write
193E240E000
trusted library allocation
page read and write
3F5B000
heap
page read and write
55C000
stack
page read and write
2E13000
heap
page read and write
193E09B0000
heap
page read and write
5B0000
unkown
page readonly
F8A000
stack
page read and write
3030000
unkown
page readonly
700000
heap
page read and write
406F000
heap
page read and write
4308000
unclassified section
page execute and read and write
8105000
heap
page read and write
2E13000
heap
page read and write
C21000
unkown
page execute read
4763000
direct allocation
page read and write
3FF1000
heap
page read and write
3187000
heap
page read and write
362E000
stack
page read and write
3181000
heap
page read and write
3FF1000
heap
page read and write
3FF1000
heap
page read and write
80D5000
heap
page read and write
6E0000
unkown
page read and write
4A61000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4A61000
heap
page read and write
333F000
stack
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
193E2403000
trusted library allocation
page read and write
3440000
heap
page read and write
1F0000
unkown
page readonly
3192000
heap
page read and write
321C000
heap
page read and write
51D2000
unclassified section
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
FF0000
heap
page read and write
3FF1000
heap
page read and write
497E000
direct allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3F11000
heap
page read and write
8FE000
heap
page read and write
31B4000
heap
page read and write
1391000
heap
page read and write
4A61000
heap
page read and write
2F5F000
stack
page read and write
31D2000
heap
page read and write
3F51000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
45A000
stack
page read and write
C20000
unkown
page readonly
4A61000
heap
page read and write
876F000
stack
page read and write
4A61000
heap
page read and write
3228000
heap
page read and write
1E0000
unkown
page readonly
1351000
unkown
page readonly
193E25A6000
trusted library allocation
page read and write
3600000
direct allocation
page execute and read and write
4A61000
heap
page read and write
14E0000
heap
page read and write
4A61000
heap
page read and write
2F6F000
stack
page read and write
4A61000
heap
page read and write
24C2000
unkown
page read and write
279C000
unkown
page read and write
5102000
direct allocation
page execute and read and write
3FF1000
heap
page read and write
31E6000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
406E000
heap
page read and write
80B5000
heap
page read and write
2E13000
heap
page read and write
3FF1000
heap
page read and write
1A50000
unkown
page readonly
4A61000
heap
page read and write
3F5B000
heap
page read and write
1351000
unkown
page readonly
3FF1000
heap
page read and write
25DC000
unkown
page read and write
193E22E0000
trusted library allocation
page read and write
3FF1000
heap
page read and write
3000000
heap
page read and write
3FF1000
heap
page read and write
20F04000
system
page read and write
4A61000
heap
page read and write
2E13000
heap
page read and write
FD0000
unkown
page readonly
3101000
heap
page read and write
A21000
heap
page read and write
193E2400000
trusted library allocation
page read and write
80A3000
heap
page read and write
FD0000
unkown
page readonly
8AF000
stack
page read and write
3F5B000
heap
page read and write
590000
unkown
page readonly
2E00000
heap
page read and write
3CF0000
heap
page read and write
1730000
heap
page read and write
2FE0000
heap
page read and write
47E0000
direct allocation
page read and write
4A61000
heap
page read and write
3017000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
3200000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
2D10000
heap
page read and write
4A61000
heap
page read and write
3F1F000
heap
page read and write
4A61000
heap
page read and write
C35000
unkown
page read and write
1340000
unkown
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
133E000
stack
page read and write
2EA8000
unkown
page read and write
3FF1000
heap
page read and write
7D7000
system
page execute and read and write
10209FB000
stack
page read and write
406E000
heap
page read and write
6F1000
unkown
page readonly
4A61000
heap
page read and write
1360000
heap
page read and write
DE1000
unkown
page readonly
974000
heap
page read and write
31CD000
heap
page read and write
490D000
direct allocation
page read and write
4A61000
heap
page read and write
490000
unkown
page write copy
406D000
heap
page read and write
3729000
direct allocation
page execute and read and write
4A61000
heap
page read and write
193E0A30000
heap
page read and write
4A61000
heap
page read and write
C21000
unkown
page execute read
1700000
heap
page read and write
406D000
heap
page read and write
3FF1000
heap
page read and write
2E13000
heap
page read and write
4A61000
heap
page read and write
4F5E000
direct allocation
page execute and read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
6B08000
unclassified section
page execute and read and write
4A61000
heap
page read and write
953000
heap
page read and write
9D0000
unkown
page readonly
404C000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
160000
heap
page read and write
5A0000
unkown
page readonly
810F000
heap
page read and write
497E000
direct allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
8360000
heap
page read and write
4909000
direct allocation
page read and write
53EC000
unclassified section
page read and write
3178000
heap
page read and write
406E000
heap
page read and write
3F5B000
heap
page read and write
4A61000
heap
page read and write
38CD000
direct allocation
page execute and read and write
279C000
unkown
page read and write
883E000
stack
page read and write
4D3E000
stack
page read and write
4C14000
heap
page read and write
4A61000
heap
page read and write
193E25C4000
trusted library allocation
page read and write
406D000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
8A0000
unkown
page read and write
47E0000
direct allocation
page read and write
1368000
heap
page read and write
337E000
stack
page read and write
942000
heap
page read and write
301A000
heap
page read and write
4640000
direct allocation
page read and write
1460000
unkown
page read and write
3FAC000
heap
page read and write
4D41000
heap
page read and write
2E13000
heap
page read and write
4A61000
heap
page read and write
4640000
direct allocation
page read and write
3FF1000
heap
page read and write
90A000
heap
page read and write
407E000
heap
page read and write
1460000
unkown
page read and write
40E3000
heap
page read and write
11CF000
stack
page read and write
4763000
direct allocation
page read and write
4A61000
heap
page read and write
3FF1000
heap
page read and write
2E13000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
3201000
heap
page read and write
81A0000
trusted library allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
7E3000
system
page execute and read and write
15CF000
stack
page read and write
47E0000
direct allocation
page read and write
14D0000
unkown
page readonly
5AF8000
unclassified section
page read and write
2E13000
heap
page read and write
4A61000
heap
page read and write
90E000
heap
page read and write
40A7000
heap
page read and write
4A61000
heap
page read and write
359E000
heap
page read and write
160E000
stack
page read and write
4763000
direct allocation
page read and write
4A61000
heap
page read and write
401000
unkown
page execute read
2E10000
heap
page read and write
406D000
heap
page read and write
3942000
direct allocation
page execute and read and write
2CE0000
heap
page read and write
12FC000
stack
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
492000
unkown
page read and write
4A61000
heap
page read and write
9D0000
unkown
page readonly
4A61000
heap
page read and write
372D000
direct allocation
page execute and read and write
40E9000
heap
page read and write
3181000
heap
page read and write
1368000
heap
page read and write
4A61000
heap
page read and write
1D0000
unkown
page readonly
406D000
heap
page read and write
3A2F000
stack
page read and write
4B60000
trusted library allocation
page read and write
4909000
direct allocation
page read and write
323E000
stack
page read and write
3FF1000
heap
page read and write
3FF1000
heap
page read and write
809C000
heap
page read and write
406D000
heap
page read and write
1AE000
stack
page read and write
30C0000
trusted library allocation
page read and write
34F0000
unkown
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
995000
heap
page read and write
4763000
direct allocation
page read and write
FC0000
unkown
page readonly
4A61000
heap
page read and write
6108000
unclassified section
page execute and read and write
4CC0000
trusted library allocation
page read and write
31E6000
heap
page read and write
8115000
heap
page read and write
3FF1000
heap
page read and write
DE0000
unkown
page readonly
406D000
heap
page read and write
2095C000
system
page read and write
4ECF000
stack
page read and write
4763000
direct allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
C20000
unkown
page readonly
23C4000
heap
page read and write
490D000
direct allocation
page read and write
1E0000
unkown
page readonly
406D000
heap
page read and write
4A61000
heap
page read and write
900000
heap
page read and write
942000
heap
page read and write
193E09D0000
heap
page read and write
880000
unkown
page readonly
4A61000
heap
page read and write
4A61000
heap
page read and write
3240000
heap
page read and write
F20000
unkown
page readonly
4228000
unkown
page execute and read and write
C2E000
unkown
page readonly
4A61000
heap
page read and write
4A61000
heap
page read and write
3FF1000
heap
page read and write
2B58000
stack
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
16C0000
unkown
page readonly
4A61000
heap
page read and write
1360000
heap
page read and write
C21000
unkown
page execute read
4FCF000
stack
page read and write
193E2417000
trusted library allocation
page read and write
400000
unkown
page readonly
406D000
heap
page read and write
4A61000
heap
page read and write
9DF000
heap
page read and write
3FF1000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
20B1C000
system
page read and write
10221FE000
stack
page read and write
6E0000
unkown
page read and write
57D4000
unclassified section
page read and write
3F28000
heap
page read and write
1F0000
unkown
page readonly
193E0A20000
heap
page read and write
193E2410000
trusted library allocation
page read and write
80C2000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
31DC000
heap
page read and write
14C0000
heap
page read and write
55C000
stack
page read and write
3B38000
heap
page read and write
4A61000
heap
page read and write
958000
heap
page read and write
C37000
unkown
page readonly
335E000
unkown
page read and write
93A000
heap
page read and write
522C000
unclassified section
page read and write
7508000
unclassified section
page execute and read and write
40E4000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
406E000
heap
page read and write
F10000
unkown
page readonly
8B4000
stack
page read and write
1A51000
unkown
page readonly
3181000
heap
page read and write
3480000
direct allocation
page read and write
4A61000
heap
page read and write
3FF1000
heap
page read and write
193E240B000
trusted library allocation
page read and write
3020000
heap
page read and write
3FF1000
heap
page read and write
83A000
system
page execute and read and write
4A61000
heap
page read and write
193E0A00000
heap
page read and write
4A61000
heap
page read and write
3A48000
heap
page read and write
3181000
heap
page read and write
4A61000
heap
page read and write
80FC000
heap
page read and write
2DF0000
heap
page read and write
4A61000
heap
page read and write
400000
unkown
page readonly
4A61000
heap
page read and write
4A61000
heap
page read and write
4002000
heap
page execute and read and write
324A000
heap
page read and write
4AB000
unkown
page readonly
FC0000
unkown
page readonly
2FE4000
heap
page read and write
490D000
direct allocation
page read and write
80BA000
heap
page read and write
8190000
trusted library allocation
page read and write
3215000
heap
page read and write
8D8000
heap
page read and write
3FF1000
heap
page read and write
3212000
heap
page read and write
2E13000
heap
page read and write
14BE000
stack
page read and write
4A61000
heap
page read and write
31F3000
heap
page read and write
3203000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
2E13000
heap
page read and write
193E0A61000
heap
page read and write
406C000
heap
page read and write
406F000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3176000
heap
page read and write
1735000
heap
page read and write
5A0000
unkown
page readonly
1620000
heap
page read and write
C2E000
unkown
page readonly
45A000
stack
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
301B000
heap
page read and write
4A61000
heap
page read and write
482000
unkown
page readonly
4A61000
heap
page read and write
193E0A5D000
heap
page read and write
8125000
heap
page read and write
6A28000
unkown
page execute and read and write
4A61000
heap
page read and write
4909000
direct allocation
page read and write
3FF1000
heap
page read and write
3181000
heap
page read and write
3C20000
direct allocation
page read and write
4A60000
heap
page read and write
3FF1000
heap
page read and write
5E1C000
unclassified section
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
6DE000
stack
page read and write
406D000
heap
page read and write
320E000
heap
page read and write
974000
heap
page read and write
8EF000
heap
page read and write
3EF3000
heap
page read and write
406D000
heap
page read and write
C21000
unkown
page execute read
165000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
406E000
heap
page read and write
2E13000
heap
page read and write
497E000
direct allocation
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
34D0000
direct allocation
page read and write
4A61000
heap
page read and write
4909000
direct allocation
page read and write
3A30000
heap
page read and write
8A0000
unkown
page read and write
14C0000
heap
page read and write
3DF0000
heap
page read and write
193E0A41000
heap
page read and write
4066000
heap
page read and write
7BD000
system
page execute and read and write
4D08000
unclassified section
page execute and read and write
C0C000
stack
page read and write
4A61000
heap
page read and write
F00000
unkown
page readonly
3FF1000
heap
page read and write
4640000
direct allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
193E2501000
trusted library allocation
page read and write
4A61000
heap
page read and write
F20000
unkown
page readonly
406D000
heap
page read and write
4640000
direct allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3200000
direct allocation
page read and write
2CAA000
stack
page read and write
872E000
stack
page read and write
31D2000
heap
page read and write
4640000
direct allocation
page read and write
3FF1000
heap
page read and write
34D0000
direct allocation
page read and write
3FF1000
heap
page read and write
4A6B000
heap
page read and write
8FE000
stack
page read and write
347F000
stack
page read and write
2F2E000
stack
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3F2A000
heap
page read and write
4A61000
heap
page read and write
193E08B0000
system
page execute and read and write
4A61000
heap
page read and write
193E25CE000
trusted library allocation
page read and write
406D000
heap
page read and write
4640000
direct allocation
page read and write
490000
unkown
page read and write
5708000
unclassified section
page execute and read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
16C0000
unkown
page readonly
4EE9000
direct allocation
page execute and read and write
3030000
unkown
page readonly
497E000
direct allocation
page read and write
4A7000
unkown
page read and write
22EF000
stack
page read and write
3FF1000
heap
page read and write
406D000
heap
page read and write
406D000
heap
page read and write
10211FE000
stack
page read and write
1740000
heap
page read and write
3005000
heap
page read and write
4A61000
heap
page read and write
1630000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
379E000
direct allocation
page execute and read and write
4C10000
trusted library allocation
page execute and read and write
23D0000
unkown
page readonly
16BF000
stack
page read and write
406D000
heap
page read and write
406D000
heap
page read and write
110000
heap
page read and write
3FF1000
heap
page read and write
9E8000
heap
page read and write
4A61000
heap
page read and write
497E000
direct allocation
page read and write
1D0000
unkown
page readonly
3FF1000
heap
page read and write
4B8E000
heap
page read and write
3020000
heap
page read and write
47E0000
direct allocation
page read and write
4A61000
heap
page read and write
7C7000
system
page execute and read and write
887F000
stack
page read and write
C20000
unkown
page readonly
5966000
unclassified section
page read and write
2E13000
heap
page read and write
5FAE000
unclassified section
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
405E000
heap
page read and write
6028000
unkown
page execute and read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
4763000
direct allocation
page read and write
3FF1000
heap
page read and write
100000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
8D8000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
3FF0000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
31F3000
heap
page read and write
80CE000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
352D000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3FF1000
heap
page read and write
8D0000
heap
page read and write
10229FE000
stack
page read and write
491000
unkown
page write copy
3201000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
C20000
unkown
page readonly
3529000
heap
page read and write
4A61000
heap
page read and write
80DF000
heap
page read and write
2F70000
unkown
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
2B84000
unkown
page read and write
490D000
direct allocation
page read and write
730000
heap
page read and write
2FE4000
heap
page read and write
3FF1000
heap
page read and write
406D000
heap
page read and write
8D0000
heap
page read and write
4A61000
heap
page read and write
730000
heap
page read and write
2E13000
heap
page read and write
30C0000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
F10000
unkown
page readonly
4A61000
heap
page read and write
4026000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
2FE4000
heap
page read and write
3C29000
heap
page read and write
10219FE000
stack
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4037000
heap
page read and write
8112000
heap
page read and write
24C2000
unkown
page read and write
193E2300000
trusted library allocation
page read and write
193E0A64000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
23C0000
heap
page read and write
3160000
heap
page read and write
C35000
unkown
page read and write
4909000
direct allocation
page read and write
47E0000
direct allocation
page read and write
2E02000
heap
page read and write
C35000
unkown
page read and write
2F70000
unkown
page read and write
31DC000
heap
page read and write
497E000
direct allocation
page read and write
4A61000
heap
page read and write
5B0000
unkown
page readonly
23AE000
stack
page read and write
508D000
direct allocation
page execute and read and write
193E091F000
system
page execute and read and write
4A61000
heap
page read and write
4CC0000
trusted library allocation
page read and write
1C0000
heap
page read and write
2C6C000
stack
page read and write
4A61000
heap
page read and write
3181000
heap
page read and write
4A61000
heap
page read and write
44E7000
heap
page read and write
38D1000
direct allocation
page execute and read and write
80B0000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
80F3000
heap
page read and write
193E2415000
trusted library allocation
page read and write
15E000
stack
page read and write
C37000
unkown
page readonly
406D000
heap
page read and write
3FF1000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
5C0000
heap
page read and write
23D0000
unkown
page readonly
406D000
heap
page read and write
2E13000
heap
page read and write
700000
heap
page read and write
6140000
unclassified section
page read and write
3024000
heap
page read and write
4A61000
heap
page read and write
30B0000
heap
page read and write
7E10000
trusted library allocation
page read and write
3F0C000
heap
page read and write
2CC0000
heap
page read and write
4A61000
heap
page read and write
193E0A3A000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
4909000
direct allocation
page read and write
3FF1000
heap
page read and write
2E13000
heap
page read and write
4A61000
heap
page read and write
880000
unkown
page readonly
31CC000
unkown
page read and write
8109000
heap
page read and write
193E22E0000
trusted library allocation
page read and write
4A61000
heap
page read and write
4007000
heap
page read and write
5C0000
heap
page read and write
3FF1000
heap
page read and write
5112000
unclassified section
page read and write
966000
heap
page read and write
9E8000
heap
page read and write
80D9000
heap
page read and write
490D000
direct allocation
page read and write
14D0000
unkown
page readonly
3FF1000
heap
page read and write
4A61000
heap
page read and write
23C0000
heap
page read and write
3FF1000
heap
page read and write
C35000
unkown
page read and write
4A61000
heap
page read and write
FE0000
unkown
page readonly
4A61000
heap
page read and write
406E000
heap
page read and write
20842000
system
page read and write
43FF000
heap
page read and write
C37000
unkown
page readonly
4A61000
heap
page read and write
401000
unkown
page execute read
3FF1000
heap
page read and write
F00000
unkown
page readonly
80AB000
heap
page read and write
2D16000
unkown
page read and write
4036000
heap
page read and write
6F1000
unkown
page readonly
3176000
heap
page read and write
4A61000
heap
page read and write
710000
unkown
page read and write
1340000
unkown
page read and write
236E000
stack
page read and write
C2E000
unkown
page readonly
406F000
heap
page read and write
4A61000
heap
page read and write
3012000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
3245000
heap
page read and write
3C23000
heap
page read and write
9A000
stack
page read and write
12FC000
stack
page read and write
4A61000
heap
page read and write
3FF1000
heap
page read and write
406D000
heap
page read and write
4A61000
heap
page read and write
406D000
heap
page read and write
4CC0000
trusted library allocation
page read and write
4A61000
heap
page read and write
3323000
heap
page read and write
840000
unkown
page read and write
193E091D000
system
page execute and read and write
31DF000
heap
page read and write
There are 779 hidden memdumps, click here to show them.