IOC Report
8mmZ7Bkoj1.exe

loading gif

Files

File Path
Type
Category
Malicious
8mmZ7Bkoj1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\emboweling
data
dropped
C:\Users\user\AppData\Local\Temp\g6sPb5
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8mmZ7Bkoj1.exe
"C:\Users\user\Desktop\8mmZ7Bkoj1.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\8mmZ7Bkoj1.exe"
malicious
C:\Program Files (x86)\HBeYDbubOyqoARpYdxoNzPaqubIpqJxiZQYxmndjKe\eKxwLXHhqpgy.exe
"C:\Program Files (x86)\HBeYDbubOyqoARpYdxoNzPaqubIpqJxiZQYxmndjKe\eKxwLXHhqpgy.exe"
malicious
C:\Windows\SysWOW64\makecab.exe
"C:\Windows\SysWOW64\makecab.exe"
malicious
C:\Program Files (x86)\HBeYDbubOyqoARpYdxoNzPaqubIpqJxiZQYxmndjKe\eKxwLXHhqpgy.exe
"C:\Program Files (x86)\HBeYDbubOyqoARpYdxoNzPaqubIpqJxiZQYxmndjKe\eKxwLXHhqpgy.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.thepeatear.online/pt4m/?nrs8j=AzKTe9sU/un6FWh8J4Z/TBPHes/wm2VwkqZ8OIQkGxADXwK45dBXsHOALtRz338sDHJ9qmiySJX4ofZpl75YgKir24cXfpRpIxKZjJwadTshiHDArMKxe74=&Yp=eXMH4fkp
84.32.84.32
malicious
http://www.impo232rt.xyz/azcx/?nrs8j=irMYamRxHtj3NMD2tLgxvViSvpLqwhvn7ehZdObCxtX/sdDuQfcDsrOzu60Trx/UY7Wv4F1shT0OqKdZ6j2zU9VfvWpTmK3e9j1Z+5zsY7kVMmPgkcjeH9Y=&Yp=eXMH4fkp
176.32.38.141
malicious
http://www.crowsecurity.cloud/oigd/
3.33.130.190
malicious
http://www.nad5.shop/i70z/?Yp=eXMH4fkp&nrs8j=8fwlLwm+T0nphGhW7PHH3xFKB5SB8SFc9+r/t0QDCeclosptBaw61DZvImsaGCeeZR7Fl0K64LM59E0NLQ1vdm4QrRMTpos6Kj6ui5/Q8OeERMbnF/TN1fg=
156.226.22.233
malicious
http://www.digitalbloom.info/paa2/?Yp=eXMH4fkp&nrs8j=qDBzf3Em8FMnDuZYbVfiL5sknZWYhueoT0F4r09hh9DCbJoHqCNNB+hYoG1Us3VrdNJQeWmKv3CCTbgwH3NiU5qDwpXvlmSTPuYmawVAsPwUoUwLb74j9YI=
3.33.130.190
malicious
http://www.myjiorooms.services/tlbx/
3.33.130.190
malicious
http://www.cenfresh.life/6iok/?Yp=eXMH4fkp&nrs8j=Lr8I5vR8kZnO1BXwYoMTGZrf0zW9P9gXQAsQehgeDaNdyJVo64QKCUs+Z9VbQDUfL8+SUHVZNFYLvGD3PrMcSw81RdJBHrPngUHAq0ps+A4FRAxn/QrS6wg=
199.192.21.169
malicious
http://www.impo232rt.xyz/azcx/
176.32.38.141
malicious
http://www.digitalbloom.info/paa2/
3.33.130.190
malicious
http://www.thepeatear.online/pt4m/
84.32.84.32
malicious
http://www.cenfresh.life/6iok/
199.192.21.169
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.crowsecurity.cloud
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.impo232rt.xyz
176.32.38.141
malicious
crowsecurity.cloud
3.33.130.190
malicious
digitalbloom.info
3.33.130.190
malicious
www.cenfresh.life
199.192.21.169
malicious
thepeatear.online
84.32.84.32
malicious
www.nad5.shop
156.226.22.233
malicious
myjiorooms.services
3.33.130.190
malicious
www.thepeatear.online
unknown
malicious
www.mktimediato.online
unknown
malicious
www.digitalbloom.info
unknown
malicious
www.trafegomagico.shop
unknown
malicious
www.schoolsfrirstfcu.org
unknown
malicious
www.crowsecurity.cloud
unknown
malicious
www.myjiorooms.services
unknown
malicious
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
199.192.21.169
www.cenfresh.life
United States
malicious
156.226.22.233
www.nad5.shop
Seychelles
malicious
84.32.84.32
thepeatear.online
Lithuania
malicious
176.32.38.141
www.impo232rt.xyz
Russian Federation
malicious
3.33.130.190
crowsecurity.cloud
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2C90000
unclassified section
page execute and read and write
malicious
44E0000
trusted library allocation
page read and write
malicious
5C00000
unclassified section
page execute and read and write
malicious
2410000
system
page execute and read and write
malicious
5600000
system
page execute and read and write
malicious
2800000
system
page execute and read and write
malicious
4490000
trusted library allocation
page read and write
malicious
56D0000
unkown
page execute and read and write
malicious
10FD000
stack
page read and write
2613000
heap
page read and write
2613000
heap
page read and write
2E00000
unkown
page readonly
4406000
heap
page read and write
4046000
heap
page read and write
46BA000
heap
page read and write
4391000
heap
page read and write
1001000
unkown
page readonly
4391000
heap
page read and write
2469BF85000
system
page execute and read and write
2469DB0A000
trusted library allocation
page read and write
2469C170000
heap
page read and write
4D2C000
unclassified section
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
300C000
unkown
page read and write
4391000
heap
page read and write
2469DB12000
trusted library allocation
page read and write
2AC9000
heap
page read and write
2D5F000
stack
page read and write
38D0000
unkown
page execute and read and write
4402000
heap
page read and write
F80000
unkown
page readonly
2AB7000
heap
page read and write
282A000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
2AC9000
heap
page read and write
BB0000
unkown
page readonly
4391000
heap
page read and write
4391000
heap
page read and write
7A21000
heap
page read and write
46BE000
heap
page read and write
12B0000
unkown
page readonly
12C0000
heap
page read and write
7B10000
trusted library allocation
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
BB1000
unkown
page execute read
4391000
heap
page read and write
2469DCC4000
trusted library allocation
page read and write
12AE000
stack
page read and write
4391000
heap
page read and write
5676000
system
page execute and read and write
1175000
heap
page read and write
2469C020000
heap
page read and write
BB0000
unkown
page readonly
2B4D000
heap
page read and write
4409000
heap
page read and write
2B43000
heap
page read and write
4391000
heap
page read and write
46BE000
heap
page read and write
10E0000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
46B0000
heap
page read and write
40C4000
heap
page read and write
4046000
heap
page read and write
F3C000
stack
page read and write
4046000
heap
page read and write
46BD000
heap
page read and write
21DB000
stack
page read and write
440B000
heap
page read and write
4391000
heap
page read and write
440F000
heap
page read and write
DD0000
unkown
page readonly
3C02000
heap
page read and write
4391000
heap
page read and write
1BFB2000
system
page read and write
2613000
heap
page read and write
7D9F000
stack
page read and write
2914000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
FF0000
unkown
page read and write
BA0000
unkown
page readonly
2469C178000
heap
page read and write
40C4000
heap
page read and write
BC7000
unkown
page readonly
1030000
unkown
page readonly
46BE000
heap
page read and write
440A000
heap
page read and write
4391000
heap
page read and write
40C4000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4046000
heap
page read and write
2EF2000
unkown
page read and write
7A67000
heap
page read and write
4046000
heap
page read and write
2469DB10000
trusted library allocation
page read and write
4800000
unclassified section
page execute and read and write
4391000
heap
page read and write
111D000
heap
page read and write
4B12000
unclassified section
page read and write
40C4000
heap
page read and write
2B1C000
heap
page read and write
2613000
heap
page read and write
4391000
heap
page read and write
7A57000
heap
page read and write
4391000
heap
page read and write
2C90000
direct allocation
page read and write
4046000
heap
page read and write
12AE000
stack
page read and write
4670000
trusted library allocation
page read and write
E99FDFE000
stack
page read and write
2ABE000
heap
page read and write
4046000
heap
page read and write
4406000
heap
page read and write
46B1000
heap
page read and write
1050000
heap
page read and write
2B36000
heap
page read and write
40C4000
heap
page read and write
2D5F000
stack
page read and write
E3A000
stack
page read and write
4391000
heap
page read and write
46BA000
heap
page read and write
7A3E000
heap
page read and write
2469C140000
heap
page read and write
283C000
heap
page read and write
2613000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
7A36000
heap
page read and write
5AE3000
unkown
page execute and read and write
2B36000
heap
page read and write
2B31000
heap
page read and write
440D000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4405000
heap
page read and write
40C4000
heap
page read and write
4A42000
direct allocation
page execute and read and write
4391000
heap
page read and write
7A5E000
heap
page read and write
FEE000
stack
page read and write
46B1000
heap
page read and write
1100000
heap
page read and write
4391000
heap
page read and write
2800000
heap
page read and write
4391000
heap
page read and write
4B6C000
unclassified section
page read and write
BB1000
unkown
page execute read
4391000
heap
page read and write
2805000
heap
page read and write
1851000
unkown
page readonly
2817000
heap
page read and write
4046000
heap
page read and write
4046000
heap
page read and write
4404000
heap
page read and write
2DD0000
heap
page read and write
F90000
unkown
page readonly
4391000
heap
page read and write
46BA000
heap
page read and write
6013000
unclassified section
page execute and read and write
BBE000
unkown
page readonly
E5A000
unkown
page read and write
2F9E000
direct allocation
page execute and read and write
B80000
unkown
page readonly
2D9E000
heap
page read and write
2ACE000
heap
page read and write
4046000
heap
page read and write
2FB2000
unkown
page read and write
4391000
heap
page read and write
E54000
unkown
page read and write
2A50000
heap
page read and write
40C4000
heap
page read and write
D20000
unkown
page readonly
4391000
heap
page read and write
46B3000
heap
page read and write
290F000
stack
page read and write
1150000
unkown
page read and write
2C3F000
stack
page read and write
46EE000
stack
page read and write
4391000
heap
page read and write
2AC3000
heap
page read and write
2AE1000
heap
page read and write
2B2F000
heap
page read and write
2A00000
heap
page read and write
4244000
unkown
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
46BC000
heap
page read and write
2469BF60000
system
page execute and read and write
25C8000
stack
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
46BC000
heap
page read and write
4391000
heap
page read and write
489E000
direct allocation
page execute and read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
46B0000
heap
page read and write
4670000
trusted library allocation
page read and write
281B000
heap
page read and write
4700000
direct allocation
page execute and read and write
10A0000
unkown
page read and write
2D29000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
1C00C000
system
page read and write
4391000
heap
page read and write
10E7000
heap
page read and write
BBE000
unkown
page readonly
12B0000
unkown
page readonly
4391000
heap
page read and write
1851000
unkown
page readonly
4AB000
unkown
page readonly
2B31000
heap
page read and write
4391000
heap
page read and write
1170000
heap
page read and write
4046000
heap
page read and write
1001000
unkown
page readonly
2D2D000
heap
page read and write
4391000
heap
page read and write
2469DCA6000
trusted library allocation
page read and write
10E0000
heap
page read and write
3142000
direct allocation
page execute and read and write
4046000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
454C000
heap
page read and write
4CD0000
unkown
page execute and read and write
46BB000
heap
page read and write
40C4000
heap
page read and write
4046000
heap
page read and write
14C0000
unkown
page readonly
46B3000
heap
page read and write
440F000
heap
page read and write
4391000
heap
page read and write
46B1000
heap
page read and write
4391000
heap
page read and write
2B43000
heap
page read and write
46BA000
heap
page read and write
2613000
heap
page read and write
7A6B000
heap
page read and write
46B1000
heap
page read and write
4391000
heap
page read and write
4404000
heap
page read and write
12C7000
heap
page read and write
4391000
heap
page read and write
2C90000
direct allocation
page read and write
4407000
heap
page read and write
4403000
heap
page read and write
2C00000
heap
page read and write
46BE000
heap
page read and write
FA0000
heap
page read and write
4405000
heap
page read and write
4670000
trusted library allocation
page read and write
40C4000
heap
page read and write
2914000
heap
page read and write
40C4000
heap
page read and write
5680000
system
page execute and read and write
4391000
heap
page read and write
2ACF000
heap
page read and write
2469DA00000
trusted library allocation
page read and write
2613000
heap
page read and write
D10000
unkown
page readonly
440D000
heap
page read and write
2460000
heap
page read and write
4391000
heap
page read and write
4400000
heap
page read and write
1BEF2000
system
page read and write
2C40000
direct allocation
page read and write
14C0000
unkown
page readonly
490000
unkown
page write copy
D30000
unkown
page readonly
18C000
stack
page read and write
4391000
heap
page read and write
BB0000
unkown
page readonly
598F000
stack
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
DE0000
unkown
page readonly
4391000
heap
page read and write
E9A0DFF000
stack
page read and write
4391000
heap
page read and write
46B7000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
5DA4000
unclassified section
page read and write
1010000
unkown
page read and write
1170000
heap
page read and write
4391000
heap
page read and write
3FF8000
heap
page read and write
2914000
heap
page read and write
4391000
heap
page read and write
2817000
heap
page read and write
1C1CC000
system
page read and write
40C4000
heap
page read and write
D9A000
stack
page read and write
46BD000
heap
page read and write
4406000
heap
page read and write
4391000
heap
page read and write
2DD0000
heap
page read and write
4391000
heap
page read and write
2F2D000
direct allocation
page execute and read and write
4391000
heap
page read and write
2DED000
heap
page read and write
4391000
heap
page read and write
13AF000
stack
page read and write
2E00000
unkown
page readonly
E99F5FC000
stack
page read and write
F70000
unkown
page readonly
2469DB00000
trusted library allocation
page read and write
4391000
heap
page read and write
4408000
heap
page read and write
46BC000
heap
page read and write
40C4000
heap
page read and write
2469C18D000
heap
page read and write
31CC000
unkown
page read and write
4046000
heap
page read and write
6085000
unclassified section
page execute and read and write
4391000
heap
page read and write
4391000
heap
page read and write
4046000
heap
page read and write
2880000
heap
page read and write
14BF000
stack
page read and write
40C4000
heap
page read and write
4679000
heap
page read and write
4391000
heap
page read and write
2AB0000
heap
page read and write
4391000
heap
page read and write
2A70000
heap
page read and write
E57000
unkown
page read and write
588E000
stack
page read and write
4391000
heap
page read and write
4407000
heap
page read and write
4391000
heap
page read and write
2480000
heap
page read and write
46B1000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
5690000
system
page execute and read and write
2901000
heap
page read and write
DD0000
unkown
page readonly
569E000
system
page execute and read and write
40C4000
heap
page read and write
46B8000
heap
page read and write
46BD000
heap
page read and write
2805000
heap
page read and write
440C000
heap
page read and write
4391000
heap
page read and write
44BF000
heap
page read and write
114E000
stack
page read and write
2B59000
heap
page read and write
40C4000
heap
page read and write
569C000
system
page execute and read and write
2613000
heap
page read and write
40C4000
heap
page read and write
46BC000
heap
page read and write
24B0000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
2469C100000
heap
page read and write
40C4000
heap
page read and write
7A31000
heap
page read and write
4391000
heap
page read and write
575C000
unclassified section
page read and write
2EF2000
unkown
page read and write
5114000
unclassified section
page read and write
4391000
heap
page read and write
4390000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
46BB000
heap
page read and write
283C000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
35B4000
unkown
page read and write
4391000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
10A0000
unkown
page read and write
12DF000
heap
page read and write
46BE000
heap
page read and write
5200000
unclassified section
page execute and read and write
40C4000
heap
page read and write
4490000
trusted library allocation
page read and write
46B8000
heap
page read and write
4391000
heap
page read and write
46B4000
heap
page read and write
258B000
stack
page read and write
1C5B4000
system
page read and write
4407000
heap
page read and write
482D000
direct allocation
page execute and read and write
4391000
heap
page read and write
4403000
heap
page read and write
4406000
heap
page read and write
DE0000
unkown
page readonly
4391000
heap
page read and write
817E000
stack
page read and write
3BFC000
unkown
page read and write
46B3000
heap
page read and write
4391000
heap
page read and write
DF0000
unkown
page readonly
40C5000
heap
page read and write
7A38000
heap
page read and write
2DD4000
heap
page read and write
4046000
heap
page read and write
4046000
heap
page read and write
BBE000
unkown
page readonly
4391000
heap
page read and write
40C4000
heap
page read and write
400000
unkown
page readonly
4391000
heap
page read and write
46B2000
heap
page read and write
1150000
unkown
page read and write
46BA000
heap
page read and write
4391000
heap
page read and write
E9A05FE000
stack
page read and write
40C4000
heap
page read and write
1741000
unkown
page readonly
4391000
heap
page read and write
401000
unkown
page execute read
4391000
heap
page read and write
40C4000
heap
page read and write
3400000
unclassified section
page execute and read and write
4391000
heap
page read and write
2B21000
heap
page read and write
1250000
unkown
page read and write
4391000
heap
page read and write
7B20000
trusted library allocation
page read and write
7A3B000
heap
page read and write
2469DCBE000
trusted library allocation
page read and write
3E00000
unclassified section
page execute and read and write
4391000
heap
page read and write
4391000
heap
page read and write
440F000
heap
page read and write
7D5E000
stack
page read and write
4391000
heap
page read and write
2B2C000
heap
page read and write
13B0000
unkown
page readonly
12C0000
heap
page read and write
4391000
heap
page read and write
4407000
heap
page read and write
4391000
heap
page read and write
38D8000
unkown
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
2469DB21000
trusted library allocation
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
2B83000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
4046000
heap
page read and write
1030000
unkown
page readonly
109E000
stack
page read and write
40C4000
heap
page read and write
10E7000
heap
page read and write
2590000
heap
page read and write
FA0000
heap
page read and write
2AC9000
heap
page read and write
5B55000
unkown
page execute and read and write
D30000
unkown
page readonly
4046000
heap
page read and write
4046000
heap
page read and write
2B89000
heap
page read and write
40C4000
heap
page read and write
482000
unkown
page readonly
4391000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
4400000
heap
page read and write
4046000
heap
page read and write
40C4000
heap
page read and write
2469C1A0000
heap
page read and write
4391000
heap
page read and write
1100000
heap
page read and write
4046000
heap
page read and write
46BC000
heap
page read and write
4391000
heap
page read and write
46B7000
heap
page read and write
40C4000
heap
page read and write
46BA000
heap
page read and write
1161000
unkown
page readonly
BC5000
unkown
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
7A26000
heap
page read and write
4391000
heap
page read and write
56F3000
system
page execute and read and write
4391000
heap
page read and write
2469C1A2000
heap
page read and write
BBE000
unkown
page readonly
440E000
heap
page read and write
7A62000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
6A85000
unclassified section
page execute and read and write
584C000
unkown
page read and write
2469DB17000
trusted library allocation
page read and write
2469C19B000
heap
page read and write
4046000
heap
page read and write
2613000
heap
page read and write
2613000
heap
page read and write
2B3E000
stack
page read and write
40C4000
heap
page read and write
29F0000
heap
page read and write
1161000
unkown
page readonly
BC5000
unkown
page read and write
2613000
heap
page read and write
4391000
heap
page read and write
2ACF000
heap
page read and write
46BA000
heap
page read and write
7DF0000
heap
page read and write
4391000
heap
page read and write
1050000
heap
page read and write
46BC000
heap
page read and write
4409000
heap
page read and write
4046000
heap
page read and write
2B2F000
heap
page read and write
2469DC01000
trusted library allocation
page read and write
281A000
heap
page read and write
4391000
heap
page read and write
2B2C000
heap
page read and write
2469D9D0000
heap
page read and write
46B9000
heap
page read and write
7A2B000
heap
page read and write
BA0000
unkown
page readonly
4056000
heap
page read and write
4391000
heap
page read and write
2E00000
direct allocation
page execute and read and write
BC7000
unkown
page readonly
2B5C000
heap
page read and write
46B4000
heap
page read and write
440C000
heap
page read and write
2ABE000
heap
page read and write
4391000
heap
page read and write
2469DB03000
trusted library allocation
page read and write
2D90000
unkown
page read and write
2DE0000
unkown
page readonly
4A52000
unclassified section
page read and write
4046000
heap
page read and write
2613000
heap
page read and write
4391000
heap
page read and write
40C4000
heap
page read and write
2469DC00000
trusted library allocation
page read and write
4391000
heap
page read and write
440D000
heap
page read and write
40C4000
heap
page read and write
45D0000
trusted library allocation
page execute and read and write
2B23000
heap
page read and write
46B9000
heap
page read and write
4391000
heap
page read and write
440A000
heap
page read and write
DF0000
unkown
page readonly
BB0000
unkown
page readonly
40C4000
heap
page read and write
2DF0000
heap
page read and write
30D1000
direct allocation
page execute and read and write
F70000
unkown
page readonly
2AC9000
heap
page read and write
42D0000
unkown
page execute and read and write
4391000
heap
page read and write
13B0000
unkown
page readonly
4046000
heap
page read and write
49CD000
direct allocation
page execute and read and write
40C4000
heap
page read and write
3B17000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
2B1B000
heap
page read and write
4675000
heap
page read and write
4391000
heap
page read and write
4046000
heap
page read and write
2DB4000
heap
page read and write
4391000
heap
page read and write
25A0000
direct allocation
page read and write
46EA000
heap
page read and write
2B1C000
heap
page read and write
28CE000
stack
page read and write
4391000
heap
page read and write
4400000
heap
page read and write
2469DCCE000
trusted library allocation
page read and write
440D000
heap
page read and write
40C4000
heap
page read and write
4391000
heap
page read and write
46BE000
heap
page read and write
2C90000
direct allocation
page read and write
440C000
heap
page read and write
4391000
heap
page read and write
3201000
heap
page read and write
4391000
heap
page read and write
4405000
heap
page read and write
4530000
trusted library allocation
page read and write
2910000
heap
page read and write
2469DB0E000
trusted library allocation
page read and write
3D8E000
unkown
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
30CD000
direct allocation
page execute and read and write
40C4000
heap
page read and write
49D1000
direct allocation
page execute and read and write
4046000
heap
page read and write
4391000
heap
page read and write
40C4000
heap
page read and write
114E000
stack
page read and write
7A3F000
heap
page read and write
4046000
heap
page read and write
2600000
heap
page read and write
4405000
heap
page read and write
2DE0000
unkown
page readonly
4402000
heap
page read and write
2DD4000
heap
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
5438000
unclassified section
page read and write
2C00000
heap
page read and write
4046000
heap
page read and write
81BF000
stack
page read and write
2B6F000
heap
page read and write
4046000
heap
page read and write
40C4000
heap
page read and write
4046000
heap
page read and write
6555000
unkown
page execute and read and write
4391000
heap
page read and write
4391000
heap
page read and write
14BF000
stack
page read and write
46B0000
heap
page read and write
2DB4000
heap
page read and write
4391000
heap
page read and write
BB1000
unkown
page execute read
58EE000
unclassified section
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
BC5000
unkown
page read and write
4391000
heap
page read and write
40C4000
heap
page read and write
440F000
heap
page read and write
E3A000
stack
page read and write
4046000
heap
page read and write
4391000
heap
page read and write
25DE000
stack
page read and write
F90000
unkown
page readonly
2B8E000
heap
page read and write
4391000
heap
page read and write
2AC9000
heap
page read and write
F3C000
stack
page read and write
46B3000
heap
page read and write
BB1000
unkown
page execute read
2613000
heap
page read and write
2D70000
unkown
page read and write
4400000
heap
page read and write
440A000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
40C4000
heap
page read and write
40C4000
heap
page read and write
2D0F000
stack
page read and write
BC7000
unkown
page readonly
4408000
heap
page read and write
4391000
heap
page read and write
2BA2000
heap
page read and write
2D70000
unkown
page read and write
4046000
heap
page read and write
B90000
unkown
page readonly
4406000
heap
page read and write
40C4000
heap
page read and write
40C4000
heap
page read and write
1250000
unkown
page read and write
40C4000
heap
page read and write
2AFF000
stack
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
2469D9E0000
trusted library allocation
page read and write
D20000
unkown
page readonly
4829000
direct allocation
page execute and read and write
4391000
heap
page read and write
2ED0000
unkown
page execute and read and write
D9A000
stack
page read and write
4391000
heap
page read and write
7A4A000
heap
page read and write
10FD000
stack
page read and write
439C000
heap
page read and write
4409000
heap
page read and write
46BE000
heap
page read and write
440C000
heap
page read and write
7A0E000
stack
page read and write
2C00000
heap
page read and write
2602000
heap
page read and write
2613000
heap
page read and write
D10000
unkown
page readonly
7A1A000
heap
page read and write
4391000
heap
page read and write
2B94000
heap
page read and write
2F29000
direct allocation
page execute and read and write
4046000
heap
page read and write
2DF0000
heap
page read and write
2812000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
2613000
heap
page read and write
440F000
heap
page read and write
4391000
heap
page read and write
BC7000
unkown
page readonly
46B1000
heap
page read and write
2B63000
heap
page read and write
2DB0000
heap
page read and write
4405000
heap
page read and write
FF0000
unkown
page read and write
40C4000
heap
page read and write
40C4000
heap
page read and write
40C4000
heap
page read and write
2613000
heap
page read and write
440F000
heap
page read and write
BC5000
unkown
page read and write
4403000
heap
page read and write
4391000
heap
page read and write
4404000
heap
page read and write
46BE000
heap
page read and write
46BA000
heap
page read and write
4046000
heap
page read and write
31CC000
unkown
page read and write
4046000
heap
page read and write
1010000
unkown
page read and write
4391000
heap
page read and write
2469D9E0000
trusted library allocation
page read and write
2B06000
heap
page read and write
B80000
unkown
page readonly
4046000
heap
page read and write
F80000
unkown
page readonly
4391000
heap
page read and write
2DB0000
heap
page read and write
574C000
unkown
page read and write
40C4000
heap
page read and write
2D80000
unkown
page read and write
4046000
heap
page read and write
7750000
trusted library allocation
page read and write
4405000
heap
page read and write
1741000
unkown
page readonly
2469C180000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
40C4000
heap
page read and write
46B3000
heap
page read and write
B90000
unkown
page readonly
12C7000
heap
page read and write
There are 749 hidden memdumps, click here to show them.