IOC Report
enkJ6J7dAn.exe

loading gif

Files

File Path
Type
Category
Malicious
enkJ6J7dAn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\661035W
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\cacostomia
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\enkJ6J7dAn.exe
"C:\Users\user\Desktop\enkJ6J7dAn.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\enkJ6J7dAn.exe"
malicious
C:\Program Files (x86)\qMMscfYOaJVsvvwoxWKNjVjKgsZGdwzfiNkZOTOmcvHeNyaGgZTijVCYOWGYEWnlX\avmjQSNkeFbUoa.exe
"C:\Program Files (x86)\qMMscfYOaJVsvvwoxWKNjVjKgsZGdwzfiNkZOTOmcvHeNyaGgZTijVCYOWGYEWnlX\avmjQSNkeFbUoa.exe"
malicious
C:\Windows\SysWOW64\RmClient.exe
"C:\Windows\SysWOW64\RmClient.exe"
malicious
C:\Program Files (x86)\qMMscfYOaJVsvvwoxWKNjVjKgsZGdwzfiNkZOTOmcvHeNyaGgZTijVCYOWGYEWnlX\avmjQSNkeFbUoa.exe
"C:\Program Files (x86)\qMMscfYOaJVsvvwoxWKNjVjKgsZGdwzfiNkZOTOmcvHeNyaGgZTijVCYOWGYEWnlX\avmjQSNkeFbUoa.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.newdaydawning.net/7mju/?ntHx=DVDDWR70P4Ux&nV=n/a1XNlERIMSMkzeywaNMrPIuUD1rrysoFUi8ENskqLMFqSk/Fj/a6kaQHlAIjdrNEumw+uIAi046Spw4+rc6qM4fhKpxjqsp0T9dbSaLHAdgBuOtHQwGARxDApDg0JQqA==
44.213.25.70
malicious
http://www.zz82x.top/ak5l/
38.47.232.196
malicious
http://www.lurknlarkk.xyz/jqkr/?nV=j99yFPFWu1ukFCAkcsa1pdNTyzikS1cIw9CibMKFTP9vYaGLd9Ca8ZMxvCgy8ZIQlD5WNv+rF4xM8fWyLzqu8NEu/AkJhGyL6Y/IOsxIi9hhzm6Wfo2GHcU4TuRzIqeNlQ==&ntHx=DVDDWR70P4Ux
172.191.244.62
malicious
http://www.nakama2-sshl.xyz/ui3j/?nV=Ezegw1wupX22aLPkoEEv7/ZO5DjzGXXdsNrfcd+vuVznJDvywH1CwnPb30ViPb7vM8PbtSzEB5D6DwhwIFVA8/Tr/xM1b+8LUYxrC0lZhY3XVqHkHg9ScVh1/tZdAIFMag==&ntHx=DVDDWR70P4Ux
183.181.83.131
malicious
http://www.prj81oqde1.buzz/6wpo/?nV=s9KIkrkzrqTbzkMlvbBfjAUuuxKvGdewBa6qLgEcFDzVo4ZyZuXCeDvxdW3wzkiXZ/4dwHLmTrOaI9mNhjMAeSSUnznUnGrbhm47OZW7gX2VGBRmOyGjZmEPzG32fut7kA==&ntHx=DVDDWR70P4Ux
154.212.219.2
malicious
http://www.nakama2-sshl.xyz/ui3j/
183.181.83.131
malicious
http://www.healthyloveforall.net/u6k6/
3.33.130.190
malicious
http://www.polarmuseum.info/nuqv/?nV=cqR4daz/40w4b6rdKNYqvkeleB2fEiPhnuSAX3LrEIyAZ4914Ww4a7UdeW+JTGwq/HZWal2FK/CEDxgqbNyvyy/SGYyigH7HtG4hHq89KwpktbUpTg5pzo/PCicdM9eRug==&ntHx=DVDDWR70P4Ux
199.59.243.227
malicious
http://www.tukaari.shop/b8ih/
3.33.130.190
malicious
http://www.prj81oqde1.buzz/6wpo/
154.212.219.2
malicious
http://www.polarmuseum.info/nuqv/
199.59.243.227
malicious
http://www.komart.shop/p9u3/
133.130.35.90
malicious
http://www.healthyloveforall.net/u6k6/?nV=dY5LfBxT8+4OTYgXKtZbNifUsoDX+uWzLeRRn9zdsxFld7n68myH2Gd2W2FS03HPt+W/9NATFibZyiY45uryUTVD4Y8PctWQGLDO40gge8F8TAbPjM2Na57q5AxIn0qb9A==&ntHx=DVDDWR70P4Ux
3.33.130.190
malicious
http://www.mommymode.site/hya5/?ntHx=DVDDWR70P4Ux&nV=kBImd3s/QyLjHyq4SLIoEPo9gYVaCCo4aEwkxNbGH3XUM96sRoRP4M1J0fvTDuXIyYiaCoNXLmg3Qmdc8wSzXF+iMRPEX9kIPKmzrc+t3cVFLxWq6eg+2bNJjDDlhrBGZQ==
162.241.244.106
malicious
http://www.o731lh.vip/eruc/
3.33.130.190
malicious
http://www.40wxd.top/l8if/
206.119.82.134
malicious
http://www.o731lh.vip/eruc/?ntHx=DVDDWR70P4Ux&nV=0pHn1M2gwaL5mql+tyiDCW8+wEBXBUyoFGMXu3aa4qZIFhIZTp589V8RrAObS8se+RyZmJdkVQw9waSFdfaJSHRFZ9VRSgAmugrmpHJKo8BhJN8eoKLjgrj/d04fMg3yYg==
3.33.130.190
malicious
http://www.mommymode.site/hya5/
162.241.244.106
malicious
http://www.komart.shop/p9u3/?nV=D1Jc/C1nh+BZL85aQihK2StkCXQN9YWXqdphFMmfowbAWgC+evwb7cYTziaUWePLaVULTAuSiJlrRgQRJK1EyuYNuFTcIXqGngDeSQ6xB8eOEHekfFMT1fbVeuWDNHI3uA==&ntHx=DVDDWR70P4Ux
133.130.35.90
malicious
http://www.lurknlarkk.xyz/jqkr/
172.191.244.62
malicious
http://www.uburn.xyz/iqqs/
67.223.117.189
malicious
http://www.zz82x.top/ak5l/?ntHx=DVDDWR70P4Ux&nV=eH+SO6exUc8kNdksa1CSzQBVVc7aplBFnmpLKbW7uuUzt7F+3QY5ZMk8901G8pDK6ZYhQ7vTWV07p9++0dQhL3O0xstuwQMp3nW6pA5kKg3bBdr252Da+1tCwmPlqiVqcw==
38.47.232.196
malicious
http://www.tukaari.shop/b8ih/?nV=Odz4+FoaeIgH5S8BzuYjRriywjm3wUfEesAV9dDAx8uax8eIV9nl6gv+Nqhf7GxjMHuq3WRF/H9yecUAbTD81Bj6MrqplT1UHUL5zd01ssdakVPMNWHRSFmdvBITbtw3Bg==&ntHx=DVDDWR70P4Ux
3.33.130.190
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.polarmuseum.info
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://newdaydawning.net/7mju/?ntHx=DVDDWR70P4Ux&nV=n/a1XNlERIMSMkzeywaNMrPIuUD1rrysoFUi8ENskqLMFqSk
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://mommymode.site/hya5/?ntHx=DVDDWR70P4Ux&nV=kBImd3s/QyLjHyq4SLIoEPo9gYVaCCo4aEwkxNbGH3XUM96sRoR
unknown
http://nakama2-sshl.xyz/ui3j/?nV=Ezegw1wupX22aLPkoEEv7/ZO5DjzGXXdsNrfcd
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.polarmuseum.info
199.59.243.227
malicious
www.uburn.xyz
67.223.117.189
malicious
o731lh.vip
3.33.130.190
malicious
newdaydawning.net
44.213.25.70
malicious
zz82x.top
38.47.232.196
malicious
tukaari.shop
3.33.130.190
malicious
40wxd.top
206.119.82.134
malicious
komart.shop
133.130.35.90
malicious
www.nakama2-sshl.xyz
183.181.83.131
malicious
redirect.3dns.box
172.191.244.62
malicious
healthyloveforall.net
3.33.130.190
malicious
www.prj81oqde1.buzz
154.212.219.2
malicious
mommymode.site
162.241.244.106
malicious
www.tukaari.shop
unknown
malicious
www.zz82x.top
unknown
malicious
www.40wxd.top
unknown
malicious
www.o731lh.vip
unknown
malicious
www.newdaydawning.net
unknown
malicious
www.lurknlarkk.xyz
unknown
malicious
www.healthyloveforall.net
unknown
malicious
www.mommymode.site
unknown
malicious
www.komart.shop
unknown
malicious
www.i16zb920d.cfd
unknown
malicious
There are 13 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.191.244.62
redirect.3dns.box
United States
malicious
67.223.117.189
www.uburn.xyz
United States
malicious
154.212.219.2
www.prj81oqde1.buzz
Seychelles
malicious
44.213.25.70
newdaydawning.net
United States
malicious
133.130.35.90
komart.shop
Japan
malicious
38.47.232.196
zz82x.top
United States
malicious
199.59.243.227
www.polarmuseum.info
United States
malicious
183.181.83.131
www.nakama2-sshl.xyz
Japan
malicious
206.119.82.134
40wxd.top
United States
malicious
3.33.130.190
o731lh.vip
United States
malicious
162.241.244.106
mommymode.site
United States
malicious
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
680000
system
page execute and read and write
malicious
5AD0000
unclassified section
page execute and read and write
malicious
26F0000
unkown
page execute and read and write
malicious
3950000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
B60000
trusted library allocation
page read and write
malicious
BB0000
trusted library allocation
page read and write
malicious
3D33000
direct allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
2AC805AF000
heap
page read and write
400000
unkown
page readonly
13A4000
heap
page read and write
7935000
heap
page read and write
B50000
direct allocation
page read and write
19A1000
unkown
page readonly
4C6E000
unclassified section
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
2E13000
heap
page read and write
A61000
heap
page read and write
3996000
unclassified section
page read and write
2AC82010000
heap
page read and write
4680000
direct allocation
page read and write
400000
unkown
page readonly
97C000
heap
page read and write
3C10000
direct allocation
page read and write
498C000
unkown
page read and write
30C1000
direct allocation
page execute and read and write
A61000
heap
page read and write
9CF000
heap
page read and write
4ADC000
unclassified section
page read and write
97C000
heap
page read and write
A61000
heap
page read and write
AC4000
system
page read and write
2AC823C4000
trusted library allocation
page read and write
401000
unkown
page execute read
7938000
heap
page read and write
540000
unkown
page readonly
990000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
78DA000
heap
page read and write
38CD000
direct allocation
page execute and read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
4680000
direct allocation
page read and write
490000
unkown
page read and write
A61000
heap
page read and write
494D000
direct allocation
page read and write
976000
heap
page read and write
2CE0000
trusted library allocation
page execute and read and write
A61000
heap
page read and write
1518000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
2AC82218000
trusted library allocation
page read and write
A61000
heap
page read and write
1210000
heap
page read and write
8E0000
unkown
page read and write
A61000
heap
page read and write
2AC81E60000
trusted library allocation
page read and write
A61000
heap
page read and write
FAC000
stack
page read and write
3202000
unclassified section
page read and write
A61000
heap
page read and write
2E13000
heap
page read and write
3CFC000
unkown
page read and write
44D6000
unkown
page read and write
581C000
unkown
page read and write
976000
heap
page read and write
13A4000
heap
page read and write
8AF000
stack
page read and write
9CB000
heap
page read and write
33FF000
stack
page read and write
402000
system
page read and write
2F1D000
direct allocation
page execute and read and write
3401000
heap
page read and write
2EF0000
heap
page read and write
135000
heap
page read and write
A61000
heap
page read and write
359E000
heap
page read and write
420B000
heap
page read and write
101D000
unkown
page read and write
3132000
direct allocation
page execute and read and write
2AC82210000
trusted library allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
37BE000
stack
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
840000
heap
page read and write
98A000
heap
page read and write
3BC5000
heap
page read and write
2EAF000
stack
page read and write
2FF2000
unkown
page read and write
A61000
heap
page read and write
1390000
unkown
page read and write
3005000
heap
page read and write
A61000
heap
page read and write
1510000
heap
page read and write
2510000
heap
page read and write
2E13000
heap
page read and write
890000
heap
page read and write
A61000
heap
page read and write
132E000
stack
page read and write
41B2000
unkown
page read and write
412F000
heap
page read and write
40E000
unkown
page readonly
A61000
heap
page read and write
60BE000
stack
page read and write
F8961FF000
stack
page read and write
A08000
heap
page read and write
93A000
heap
page read and write
A11000
heap
page read and write
A61000
heap
page read and write
130000
heap
page read and write
49BE000
direct allocation
page read and write
A61000
heap
page read and write
5E00000
trusted library allocation
page read and write
2D6B000
heap
page read and write
A61000
heap
page read and write
47FA000
unkown
page read and write
EAA000
stack
page read and write
A34000
heap
page read and write
2D6F000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
5B0000
unkown
page read and write
A61000
heap
page read and write
2AC82200000
trusted library allocation
page read and write
405A000
heap
page read and write
2600000
unkown
page readonly
A61000
heap
page read and write
2AC8220E000
trusted library allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
350000
unkown
page readonly
5D0000
unkown
page read and write
150E000
stack
page read and write
FE0000
unkown
page readonly
A61000
heap
page read and write
1350000
unkown
page read and write
A61000
heap
page read and write
13C6000
heap
page read and write
F21000
unkown
page readonly
2E13000
heap
page read and write
38D1000
direct allocation
page execute and read and write
350000
unkown
page readonly
9FB000
heap
page read and write
8F0000
heap
page read and write
90E000
heap
page read and write
575F000
system
page execute and read and write
560000
heap
page read and write
A61000
heap
page read and write
2EE5000
heap
page read and write
3BC0000
direct allocation
page read and write
2E13000
heap
page read and write
408C000
heap
page read and write
79B3000
heap
page read and write
A61000
heap
page read and write
1341000
unkown
page readonly
B0E000
stack
page read and write
352D000
heap
page read and write
3DD0000
heap
page read and write
2AC80560000
heap
page read and write
A61000
heap
page read and write
2AC81E40000
heap
page read and write
78CB000
heap
page read and write
F8951FE000
stack
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
9E3000
heap
page read and write
A61000
heap
page read and write
1539000
heap
page read and write
482000
unkown
page readonly
A61000
heap
page read and write
FF0000
unkown
page readonly
A61000
heap
page read and write
400000
unkown
page readonly
52C000
stack
page read and write
A61000
heap
page read and write
2AC82301000
trusted library allocation
page read and write
17E000
stack
page read and write
A61000
heap
page read and write
494A000
unclassified section
page read and write
2EF0000
heap
page read and write
415000
unkown
page read and write
401000
unkown
page execute read
1200000
unkown
page readonly
32CC000
unkown
page read and write
4820000
direct allocation
page read and write
325C000
unclassified section
page read and write
A61000
heap
page read and write
A01000
heap
page read and write
844000
heap
page read and write
2AC80470000
system
page execute and read and write
A61000
heap
page read and write
A61000
heap
page read and write
1330000
unkown
page read and write
4820000
direct allocation
page read and write
4036000
heap
page read and write
4020000
unkown
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
9CF000
heap
page read and write
13B0000
unkown
page read and write
3017000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
301E000
heap
page read and write
88F000
stack
page read and write
57D2000
system
page execute and read and write
91C000
stack
page read and write
A61000
heap
page read and write
78B3000
heap
page read and write
1610000
unkown
page readonly
2C42000
heap
page read and write
2AC823A5000
trusted library allocation
page read and write
E20000
unkown
page readonly
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
971000
heap
page read and write
41F1000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
490000
unkown
page write copy
576F000
system
page execute and read and write
9DA000
heap
page read and write
7930000
heap
page read and write
1610000
heap
page read and write
93E000
stack
page read and write
1610000
unkown
page readonly
900000
heap
page read and write
A61000
heap
page read and write
5B0000
unkown
page read and write
3C85000
heap
page read and write
8FE000
stack
page read and write
844000
heap
page read and write
A61000
heap
page read and write
40F5000
heap
page read and write
79BD000
heap
page read and write
A61000
heap
page read and write
47A9000
direct allocation
page read and write
2AC82203000
trusted library allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
FE0000
unkown
page readonly
F8949FB000
stack
page read and write
52C000
stack
page read and write
A61000
heap
page read and write
81E000
stack
page read and write
4949000
direct allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
3ED0000
heap
page read and write
242F000
stack
page read and write
417000
unkown
page readonly
A61000
heap
page read and write
417000
unkown
page readonly
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
15CF000
stack
page read and write
3323000
heap
page read and write
A61000
heap
page read and write
100000
heap
page read and write
417000
unkown
page readonly
47AD000
direct allocation
page read and write
E30000
unkown
page readonly
550000
unkown
page readonly
40D0000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
340000
unkown
page readonly
2E02000
heap
page read and write
3942000
direct allocation
page execute and read and write
A61000
heap
page read and write
60FE000
stack
page read and write
A61000
heap
page read and write
4AB000
unkown
page readonly
A61000
heap
page read and write
13C0000
heap
page read and write
32FE000
stack
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
78A1000
heap
page read and write
400000
unkown
page readonly
2FF2000
unkown
page read and write
A61000
heap
page read and write
2AC804A6000
system
page execute and read and write
4302000
unclassified section
page read and write
78FE000
heap
page read and write
A61000
heap
page read and write
2AC804A8000
system
page execute and read and write
5F0000
unkown
page readonly
967000
heap
page read and write
16A4000
heap
page read and write
A61000
heap
page read and write
3729000
direct allocation
page execute and read and write
A61000
heap
page read and write
976000
heap
page read and write
4AB000
unkown
page readonly
A61000
heap
page read and write
9F0000
heap
page read and write
793A000
heap
page read and write
3804000
unclassified section
page read and write
401000
unkown
page execute read
A61000
heap
page read and write
3200000
heap
page read and write
3142000
unclassified section
page read and write
96D000
heap
page read and write
A61000
heap
page read and write
2510000
heap
page read and write
A61000
heap
page read and write
B8D000
heap
page read and write
96B000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
415000
unkown
page read and write
A61000
heap
page read and write
9CB000
heap
page read and write
A61000
heap
page read and write
E40000
unkown
page readonly
2F00000
unkown
page readonly
A61000
heap
page read and write
A61000
heap
page read and write
47A3000
direct allocation
page read and write
16A0000
heap
page read and write
400000
unkown
page readonly
3CA000
stack
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
7A60000
trusted library allocation
page read and write
F8959FF000
stack
page read and write
2AC82215000
trusted library allocation
page read and write
A3F000
heap
page read and write
13A0000
heap
page read and write
A61000
heap
page read and write
977000
heap
page read and write
78EE000
heap
page read and write
417000
unkown
page readonly
976000
heap
page read and write
3C10000
direct allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
530000
unkown
page readonly
A61000
heap
page read and write
A61000
heap
page read and write
1330000
unkown
page read and write
1370000
unkown
page readonly
2D80000
trusted library allocation
page read and write
40E000
unkown
page readonly
B90000
unkown
page readonly
78F9000
heap
page read and write
401000
unkown
page execute read
4344000
unkown
page read and write
2AC805B1000
heap
page read and write
78CE000
heap
page read and write
A61000
heap
page read and write
2A9D000
unkown
page execute and read and write
A61000
heap
page read and write
700000
heap
page read and write
47B8000
unclassified section
page read and write
415000
unkown
page read and write
7913000
heap
page read and write
A61000
heap
page read and write
160E000
stack
page read and write
3D33000
direct allocation
page read and write
A61000
heap
page read and write
4680000
direct allocation
page read and write
14CF000
stack
page read and write
2AC82221000
trusted library allocation
page read and write
1390000
unkown
page read and write
310C000
unkown
page read and write
803E000
stack
page read and write
2E13000
heap
page read and write
560000
heap
page read and write
A61000
heap
page read and write
4217000
heap
page read and write
A3A000
heap
page read and write
2E13000
heap
page read and write
A61000
heap
page read and write
2AC823BE000
trusted library allocation
page read and write
379E000
direct allocation
page execute and read and write
B4E000
stack
page read and write
A61000
heap
page read and write
4494000
unclassified section
page read and write
A61000
heap
page read and write
4680000
direct allocation
page read and write
132E000
stack
page read and write
1350000
unkown
page read and write
A61000
heap
page read and write
4C2000
system
page read and write
3012000
heap
page read and write
2AC80580000
heap
page read and write
530000
unkown
page readonly
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
2E13000
heap
page read and write
A61000
heap
page read and write
8C0000
heap
page read and write
360000
unkown
page readonly
990000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
491000
unkown
page write copy
32CC000
unkown
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
7922000
heap
page read and write
960000
heap
page read and write
A61000
heap
page read and write
8E0000
unkown
page read and write
1200000
unkown
page readonly
40A2000
heap
page read and write
341C000
unclassified section
page read and write
792C000
heap
page read and write
A61000
heap
page read and write
4207000
heap
page execute and read and write
2E13000
heap
page read and write
360000
unkown
page readonly
96B000
heap
page read and write
414F000
heap
page read and write
A61000
heap
page read and write
4208000
heap
page read and write
13A0000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
481E000
direct allocation
page read and write
A61000
heap
page read and write
1510000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
9E3000
heap
page read and write
3000000
heap
page read and write
2D80000
trusted library allocation
page read and write
3BC6000
heap
page read and write
807F000
stack
page read and write
A61000
heap
page read and write
2AC81E60000
trusted library allocation
page read and write
2F00000
unkown
page readonly
482000
unkown
page readonly
3075000
heap
page read and write
2BB0000
direct allocation
page read and write
2A2B000
unkown
page execute and read and write
78BC000
heap
page read and write
95B000
stack
page read and write
7C30000
heap
page read and write
3101000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
481E000
direct allocation
page read and write
110000
heap
page read and write
A61000
heap
page read and write
49BE000
direct allocation
page read and write
372D000
direct allocation
page execute and read and write
E20000
unkown
page readonly
3600000
direct allocation
page execute and read and write
EAA000
stack
page read and write
4668000
unkown
page read and write
7928000
heap
page read and write
F21000
unkown
page readonly
2514000
heap
page read and write
4170000
unclassified section
page read and write
3019000
heap
page read and write
78C8000
heap
page read and write
2F8E000
direct allocation
page execute and read and write
1BE000
stack
page read and write
2F19000
direct allocation
page execute and read and write
A61000
heap
page read and write
577D000
system
page execute and read and write
3070000
heap
page read and write
47AD000
direct allocation
page read and write
A61000
heap
page read and write
A60000
heap
page read and write
A61000
heap
page read and write
1730000
heap
page read and write
401000
unkown
page execute read
2514000
heap
page read and write
2DF0000
direct allocation
page execute and read and write
3846000
unkown
page read and write
A61000
heap
page read and write
FF0000
unkown
page readonly
3FDE000
unclassified section
page read and write
4949000
direct allocation
page read and write
40AF000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
2E00000
heap
page read and write
4820000
direct allocation
page read and write
25F0000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
591C000
unkown
page read and write
2EB0000
unkown
page read and write
1518000
heap
page read and write
11CF000
stack
page read and write
972000
heap
page read and write
4204000
heap
page read and write
A61000
heap
page read and write
3C10000
direct allocation
page read and write
2C40000
trusted library allocation
page read and write
AC0000
heap
page read and write
3BBF000
stack
page read and write
A61000
heap
page read and write
5C1000
unkown
page readonly
2D80000
trusted library allocation
page read and write
A61000
heap
page read and write
AD0000
direct allocation
page read and write
A45000
heap
page read and write
A61000
heap
page read and write
63B000
stack
page read and write
A61000
heap
page read and write
30BD000
direct allocation
page execute and read and write
4028000
heap
page read and write
A61000
heap
page read and write
2600000
unkown
page readonly
2E13000
heap
page read and write
3CFD000
unclassified section
page execute and read and write
494D000
direct allocation
page read and write
A61000
heap
page read and write
2E13000
heap
page read and write
B60000
trusted library allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
4949000
direct allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
36B4000
unkown
page read and write
540000
unkown
page readonly
9B4000
heap
page read and write
3B28000
unclassified section
page read and write
40E000
unkown
page readonly
4208000
heap
page read and write
401D000
heap
page read and write
2DE0000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
49BE000
direct allocation
page read and write
2AC8059C000
heap
page read and write
5C1000
unkown
page readonly
2E13000
heap
page read and write
998000
heap
page read and write
A61000
heap
page read and write
2E13000
heap
page read and write
2AC805AA000
heap
page read and write
990000
heap
page read and write
415000
unkown
page read and write
9E0000
heap
page read and write
791C000
heap
page read and write
2AC80589000
heap
page read and write
2AC8220C000
trusted library allocation
page read and write
3400000
heap
page read and write
E40000
unkown
page readonly
A6A000
heap
page read and write
3BC2000
heap
page read and write
5D0000
unkown
page read and write
A61000
heap
page read and write
3CA000
stack
page read and write
401000
unkown
page execute read
A61000
heap
page read and write
9DA000
heap
page read and write
47A9000
direct allocation
page read and write
A61000
heap
page read and write
3017000
heap
page read and write
14CF000
stack
page read and write
1341000
unkown
page readonly
96D000
heap
page read and write
2E13000
heap
page read and write
A61000
heap
page read and write
25F0000
heap
page read and write
2AC80540000
heap
page read and write
9DD000
heap
page read and write
1670000
heap
page read and write
1210000
heap
page read and write
79A0000
trusted library allocation
page read and write
47A3000
direct allocation
page read and write
A61000
heap
page read and write
152F000
heap
page read and write
A61000
heap
page read and write
3E8E000
unkown
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
4218000
heap
page read and write
4626000
unclassified section
page read and write
E30000
unkown
page readonly
B8F000
stack
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
1370000
unkown
page readonly
A1E000
heap
page read and write
A61000
heap
page read and write
19A1000
unkown
page readonly
820000
heap
page read and write
A61000
heap
page read and write
FAC000
stack
page read and write
4680000
direct allocation
page read and write
494D000
direct allocation
page read and write
7932000
heap
page read and write
A61000
heap
page read and write
30B2000
unkown
page read and write
492000
unkown
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
550000
unkown
page readonly
A61000
heap
page read and write
4680000
direct allocation
page read and write
998000
heap
page read and write
9DD000
heap
page read and write
78F4000
heap
page read and write
3D33000
direct allocation
page read and write
2AC81E60000
trusted library allocation
page read and write
1C0000
heap
page read and write
47A9000
direct allocation
page read and write
A0C000
heap
page read and write
2BB0000
direct allocation
page read and write
A61000
heap
page read and write
9A000
stack
page read and write
A61000
heap
page read and write
2AC823CE000
trusted library allocation
page read and write
3C8B000
unclassified section
page execute and read and write
39D8000
unkown
page read and write
4023000
heap
page read and write
A61000
heap
page read and write
4B1E000
unkown
page read and write
844000
heap
page read and write
6DC000
system
page read and write
A61000
heap
page read and write
8F0000
heap
page read and write
9B0000
heap
page read and write
2FD0000
heap
page read and write
976000
heap
page read and write
2AC82100000
trusted library allocation
page read and write
47A3000
direct allocation
page read and write
A61000
heap
page read and write
40E000
unkown
page readonly
40EB000
heap
page read and write
B90000
unkown
page readonly
678000
stack
page read and write
3529000
heap
page read and write
577B000
system
page execute and read and write
13C0000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
3005000
heap
page read and write
A61000
heap
page read and write
5F0000
unkown
page readonly
A61000
heap
page read and write
A61000
heap
page read and write
3E4C000
unclassified section
page read and write
340000
unkown
page readonly
5756000
system
page execute and read and write
8B4000
stack
page read and write
5AE000
stack
page read and write
2E13000
heap
page read and write
481E000
direct allocation
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
78C6000
heap
page read and write
2AC8058F000
heap
page read and write
2E13000
heap
page read and write
47AD000
direct allocation
page read and write
971000
heap
page read and write
5700000
system
page execute and read and write
A61000
heap
page read and write
A61000
heap
page read and write
9F0000
heap
page read and write
A61000
heap
page read and write
2BB0000
direct allocation
page read and write
A61000
heap
page read and write
78C1000
heap
page read and write
4187000
heap
page read and write
A61000
heap
page read and write
400000
unkown
page readonly
90A000
heap
page read and write
4A8000
unkown
page read and write
44D9000
heap
page read and write
A61000
heap
page read and write
A61000
heap
page read and write
There are 681 hidden memdumps, click here to show them.