IOC Report
PO-000041522.exe

loading gif

Files

File Path
Type
Category
Malicious
PO-000041522.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\709e7t17
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified
C:\Users\user\AppData\Local\Temp\iodization
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO-000041522.exe
"C:\Users\user\Desktop\PO-000041522.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\PO-000041522.exe"
malicious
C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe
"C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\SysWOW64\netsh.exe"
malicious
C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe
"C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.gcast.video/zt7d/?OReh1rq=gioIZrJHQSo5Twa9TT6znS2fp8FeqxYG9swkBqqgC+UipwurX93lliJtQqPWuIS6ZmF33XYXd2mTI6MGqYLGA7aepf23dKNnGtvBjHiHmMvjQtNcQ1gpkcMaXgjsQjVZxJ4sA2oNNTmX&CvQl=nrm0ZhFpzl
98.124.224.17
malicious
http://www.redlakedispensery.net/6u21/?OReh1rq=GVaOaFQ3d6G7AfxQOk7ieruxm+gnm5VVlXgM851fWwwgRz3TVn5fGEzA+wYxrv63HQoUWQChgi2b21NIV41GwDduJOaUHEyhnv8phiPJCKVCCwApj4Ws0eCXeq4Y+t0YLUqTKnAz4x3T&CvQl=nrm0ZhFpzl
217.70.184.50
malicious
http://www.kartal-nakliyat.xyz/m55w/
85.159.66.93
malicious
http://www.bybitexchange.click/13ne/?OReh1rq=5f/xJzU+yNg+ckMqn3hIiphO517DsQ6C3a9UOIr4Am4abyoaRTootrA/Lbkip0rySLyDMLCpGQATty8VEy6JVvIDO149vjHOqC6Vt6M5zWl7l6vPUmUwE3Hu2vtdv9tSmFj1n1eMQI0X&CvQl=nrm0ZhFpzl
45.252.249.43
malicious
http://www.launchdreamidea.xyz/2b9b/?CvQl=nrm0ZhFpzl&OReh1rq=cGufOJH0xlNic3+8ylCPTRRPYDBZneW0GcYDw7JK4Ijf+YRDc8nYj/foYKrurxlxMPIBZUG8OdJWDJilyjG8KsiFsJaKJojJJc8folsNnUfsqIHZ9MXgGXoTKP3Wf+FrY268bUo4cMTQ
188.114.97.3
malicious
http://www.bybitexchange.click/13ne/
45.252.249.43
malicious
http://www.freedietbuilder.online/nnla/
188.114.97.3
malicious
http://www.elektromontaze.online/2amq/
37.9.175.163
malicious
http://www.redlakedispensery.net/6u21/
217.70.184.50
malicious
http://www.elektromontaze.online/2amq/?OReh1rq=TrqYGwWaHxniF7eNSKDkgIUevCh1dc5tnDDYGpgsaE/mtn8diYV+ickL9IcoZLc+jgEWqYyaPiUJOg0jMzRcZMH4Po/VVtmSjhfWTZt8/sN4EXefuBThivk80qQven1R3gWiVtinhRVX&CvQl=nrm0ZhFpzl
37.9.175.163
malicious
http://www.kartal-nakliyat.xyz/m55w/?OReh1rq=9llqS7l5r2fZE2qKLahaIkLgunrNzhdfh2Fa8uGkHzeY69X6DmW7eYPfa18EH489ndWHoC7ISC9XGeCzxUHdefh+2UUEydNUM+R9LWmaUjMU6yBTHkWVZyPnnhgR6zjaK6ylcCAOGnqo&CvQl=nrm0ZhFpzl
85.159.66.93
malicious
http://www.launchdreamidea.xyz/2b9b/
188.114.97.3
malicious
http://www.freedietbuilder.online/nnla/?OReh1rq=CqIQGQ0o8+jhRdpyYLS2Ou54wXZmDhGBl2CfLfjcYft2NeK1a5UMcHptbiGPm/AWvx7/GdfV8RGwRyU2PymhnZZ7RowUctSqrqn8UFFkmP+DJHtVFd6xywEuosIKzWdoXOs+sf4OzNSo&CvQl=nrm0ZhFpzl
188.114.97.3
malicious
https://cdn.active24.eu/fonts/OTF/Active24-Bold.otf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.active24.cz/support/
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Regular.woff2
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.gandi.net/en/domain
unknown
https://www.ecosia.org/newtab/
unknown
https://admin.active24.cz/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://whois.gandi.net/en/results?search=redlakedispensery.net
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Medium.otf
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Bold.woff2
unknown
http://www.elektromontaze.online
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.active24.cz/
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Regular.otf
unknown
https://www.active24.cz/cart/domain-checker
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Medium.woff2
unknown
https://admin.active24.cz/en
unknown
https://cloudways-static-content.s3.us-east-1.amazonaws.com/error_page/maintenance-domain-mapping.ht
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.active24.eu
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.gcast.video
98.124.224.17
malicious
webredir.vip.gandi.net
217.70.184.50
malicious
www.elektromontaze.online
37.9.175.163
malicious
www.royapop.online
209.74.64.190
malicious
www.launchdreamidea.xyz
188.114.97.3
malicious
www.freedietbuilder.online
188.114.97.3
malicious
bybitexchange.click
45.252.249.43
malicious
www.18kwatch.com
202.87.223.248
malicious
natroredirect.natrocdn.com
85.159.66.93
malicious
www.redlakedispensery.net
unknown
malicious
www.bybitexchange.click
unknown
malicious
www.kartal-nakliyat.xyz
unknown
malicious
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
45.252.249.43
bybitexchange.click
Viet Nam
malicious
188.114.97.3
www.launchdreamidea.xyz
European Union
malicious
37.9.175.163
www.elektromontaze.online
Slovakia (SLOVAK Republic)
malicious
217.70.184.50
webredir.vip.gandi.net
France
malicious
85.159.66.93
natroredirect.natrocdn.com
Turkey
malicious
98.124.224.17
www.gcast.video
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
33E0000
unclassified section
page execute and read and write
malicious
1190000
trusted library allocation
page read and write
malicious
81F0000
unclassified section
page execute and read and write
malicious
2DF0000
unkown
page execute and read and write
malicious
3A0000
system
page execute and read and write
malicious
B00000
system
page execute and read and write
malicious
1140000
trusted library allocation
page read and write
malicious
BD0000
unkown
page readonly
47B9000
direct allocation
page read and write
C65000
heap
page read and write
C50000
heap
page read and write
163E000
stack
page read and write
1041000
heap
page read and write
3F0000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1030000
heap
page read and write
5AE000
unkown
page readonly
3E22000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
FA0000
unkown
page readonly
2A4A000
heap
page read and write
2A17000
heap
page read and write
2B4B9C1F000
heap
page read and write
1041000
heap
page read and write
11FB000
heap
page read and write
1041000
heap
page read and write
FC0000
unkown
page readonly
3E2F000
heap
page read and write
4453000
direct allocation
page read and write
1041000
heap
page read and write
4330000
direct allocation
page read and write
76E000
stack
page read and write
3E1C000
heap
page read and write
1041000
heap
page read and write
2CF4000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
319E000
direct allocation
page execute and read and write
C80000
heap
page read and write
1041000
heap
page read and write
2D00000
unkown
page readonly
4453000
direct allocation
page read and write
D3B000
heap
page read and write
1041000
heap
page read and write
4690000
direct allocation
page read and write
1041000
heap
page read and write
3E54000
unclassified section
page read and write
4690000
direct allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
3E2D000
heap
page read and write
5AE000
unkown
page readonly
2932000
unkown
page read and write
4505000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
C44000
heap
page read and write
2A4A000
heap
page read and write
E8C000
unkown
page read and write
1041000
heap
page read and write
3F31000
heap
page read and write
1310000
unkown
page readonly
C60000
heap
page read and write
100000
heap
page read and write
2B30000
unkown
page read and write
1041000
heap
page read and write
C80000
unkown
page readonly
FB0000
unkown
page readonly
FC0000
unkown
page readonly
7CB3000
heap
page read and write
E40000
heap
page read and write
39D5C000
system
page read and write
2813000
heap
page read and write
1041000
heap
page read and write
39B9C000
system
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
19E000
stack
page read and write
101E000
stack
page read and write
1041000
heap
page read and write
2813000
heap
page read and write
2B4BB6B0000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
47B9000
direct allocation
page read and write
EBF000
heap
page read and write
1041000
heap
page read and write
1040000
heap
page read and write
1041000
heap
page read and write
2F2D000
heap
page read and write
C69000
heap
page read and write
1041000
heap
page read and write
505C000
unclassified section
page execute and read and write
1670000
heap
page read and write
7C8B000
heap
page read and write
14D9000
direct allocation
page execute and read and write
13B0000
direct allocation
page execute and read and write
CE877FF000
stack
page read and write
1041000
heap
page read and write
2E01000
heap
page read and write
A0E000
heap
page read and write
9EE000
stack
page read and write
1041000
heap
page read and write
3EA7000
heap
page read and write
750000
unkown
page readonly
406C000
unkown
page execute and read and write
B20000
heap
page read and write
1041000
heap
page read and write
2813000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7D80000
trusted library allocation
page read and write
430A000
unclassified section
page read and write
1041000
heap
page read and write
401000
unkown
page execute read
2A2E000
heap
page read and write
110000
heap
page read and write
CA0000
heap
page read and write
FD0000
trusted library allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1681000
direct allocation
page execute and read and write
2B30000
unkown
page read and write
CB6000
heap
page read and write
2B4BB9C4000
trusted library allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1290000
trusted library allocation
page execute and read and write
2DFF000
stack
page read and write
2B4B9C3B000
heap
page read and write
4330000
direct allocation
page read and write
3DBF000
heap
page read and write
2B4B9C60000
heap
page read and write
1031000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
2CF0000
heap
page read and write
1041000
heap
page read and write
79B000
stack
page read and write
3ED9000
heap
page read and write
5A5C000
unclassified section
page execute and read and write
D31000
heap
page read and write
7D16000
heap
page read and write
150000
heap
page read and write
47BD000
direct allocation
page read and write
D2B000
heap
page read and write
7CE4000
heap
page read and write
C69000
heap
page read and write
3C30000
heap
page read and write
2B4BB80A000
trusted library allocation
page read and write
E40000
heap
page read and write
7CCA000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
C77000
heap
page read and write
130F000
stack
page read and write
108D000
unkown
page read and write
1041000
heap
page read and write
C6F000
heap
page read and write
16C0000
heap
page read and write
2AB0000
unkown
page read and write
47B9000
direct allocation
page read and write
FB0000
unkown
page readonly
1041000
heap
page read and write
5E6C000
unkown
page execute and read and write
E8F000
stack
page read and write
4AB000
unkown
page readonly
CB3000
heap
page read and write
EA8000
heap
page read and write
CE857FC000
stack
page read and write
C40000
unkown
page read and write
D36000
heap
page read and write
5B5000
unkown
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
AFC000
stack
page read and write
3E20000
heap
page read and write
4690000
direct allocation
page read and write
882F000
stack
page read and write
C5E000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
2B4BB9AB000
trusted library allocation
page read and write
1041000
heap
page read and write
2B01000
heap
page read and write
1041000
heap
page read and write
3342000
direct allocation
page execute and read and write
1330000
unkown
page readonly
C60000
unkown
page read and write
7D06000
heap
page read and write
1020000
unkown
page read and write
4A6C000
unkown
page execute and read and write
1041000
heap
page read and write
3DC2000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7D0B000
heap
page read and write
4453000
direct allocation
page read and write
B00000
unkown
page readonly
2B4B9C10000
heap
page read and write
1041000
heap
page read and write
2813000
heap
page read and write
1041000
heap
page read and write
2B4B9B82000
system
page execute and read and write
39B42000
system
page read and write
CC4000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
C80000
unkown
page readonly
47BD000
direct allocation
page read and write
4330000
direct allocation
page read and write
5A0000
unkown
page readonly
2F5C000
heap
page read and write
1041000
heap
page read and write
2B4BB540000
trusted library allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
EA0000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
15FF000
stack
page read and write
2B10000
unkown
page readonly
2E75000
heap
page read and write
C40000
unkown
page read and write
CE867FE000
stack
page read and write
382E000
stack
page read and write
4AB000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
1DE000
stack
page read and write
4453000
direct allocation
page read and write
482E000
direct allocation
page read and write
1041000
heap
page read and write
750000
unkown
page readonly
FD0000
heap
page read and write
2932000
unkown
page read and write
1040000
heap
page read and write
2A12000
heap
page read and write
2813000
heap
page read and write
2CFE000
stack
page read and write
1041000
heap
page read and write
2B4BB813000
trusted library allocation
page read and write
482000
unkown
page readonly
3F31000
heap
page read and write
2C0C000
unkown
page read and write
1041000
heap
page read and write
105B000
heap
page read and write
482E000
direct allocation
page read and write
312D000
direct allocation
page execute and read and write
3E28000
heap
page read and write
1310000
unkown
page readonly
A0A000
heap
page read and write
5040000
system
page execute and read and write
1041000
heap
page read and write
7D09000
heap
page read and write
47BD000
direct allocation
page read and write
1041000
heap
page read and write
5B5000
unkown
page read and write
740000
unkown
page readonly
1041000
heap
page read and write
C30000
heap
page read and write
2F45000
heap
page read and write
1041000
heap
page read and write
2813000
heap
page read and write
4690000
direct allocation
page read and write
1041000
heap
page read and write
482000
unkown
page readonly
7F0000
unkown
page readonly
1041000
heap
page read and write
EA0000
heap
page read and write
1040000
heap
page read and write
E10000
unkown
page read and write
E00000
unkown
page read and write
1041000
heap
page read and write
EA8000
heap
page read and write
1041000
heap
page read and write
C69000
heap
page read and write
F90000
unkown
page readonly
16A0000
unkown
page readonly
CFE000
heap
page read and write
1041000
heap
page read and write
3F3E000
heap
page read and write
283F000
stack
page read and write
1041000
heap
page read and write
7CA8000
heap
page read and write
2C00000
heap
page read and write
7CED000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
3BEA000
unclassified section
page execute and read and write
1041000
heap
page read and write
2B40000
heap
page read and write
2813000
heap
page read and write
5AE000
unkown
page readonly
1041000
heap
page read and write
E5A000
stack
page read and write
DFE000
stack
page read and write
1041000
heap
page read and write
C5E000
heap
page read and write
7CFA000
heap
page read and write
3186000
unkown
page read and write
2B4B9C42000
heap
page read and write
462E000
unclassified section
page read and write
3E24000
heap
page read and write
482E000
direct allocation
page read and write
1041000
heap
page read and write
A00000
heap
page read and write
1041000
heap
page read and write
2B4BB9CE000
trusted library allocation
page read and write
30E4000
heap
page read and write
720000
heap
page read and write
7BA000
stack
page read and write
2B40000
heap
page read and write
7D11000
heap
page read and write
34AA000
unkown
page read and write
CCE000
heap
page read and write
1041000
heap
page read and write
3960000
unkown
page read and write
3E0F000
heap
page read and write
1041000
heap
page read and write
4330000
direct allocation
page read and write
1041000
heap
page read and write
FD0000
heap
page read and write
4330000
direct allocation
page read and write
1041000
heap
page read and write
2FF4000
unkown
page read and write
2D00000
unkown
page readonly
1324000
heap
page read and write
490000
unkown
page write copy
50D9000
system
page execute and read and write
5B5000
unkown
page read and write
35FA000
unkown
page execute and read and write
2D23000
heap
page read and write
730000
direct allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1048000
heap
page read and write
2840000
unkown
page readonly
C6F000
heap
page read and write
108A000
heap
page read and write
7D16000
heap
page read and write
490000
unkown
page read and write
8AF000
stack
page read and write
1041000
heap
page read and write
32C000
stack
page read and write
3129000
direct allocation
page execute and read and write
1041000
heap
page read and write
1041000
heap
page read and write
FA0000
unkown
page readonly
2F9E000
heap
page read and write
D18000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
C3E000
stack
page read and write
4330000
direct allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
BE0000
unkown
page readonly
47BD000
direct allocation
page read and write
47BD000
direct allocation
page read and write
2813000
heap
page read and write
2B4BB821000
trusted library allocation
page read and write
47B9000
direct allocation
page read and write
2800000
heap
page read and write
47BD000
direct allocation
page read and write
4330000
direct allocation
page read and write
2813000
heap
page read and write
730000
unkown
page readonly
F90000
unkown
page readonly
5A1000
unkown
page execute read
CE86FFE000
stack
page read and write
2B4BB700000
trusted library allocation
page read and write
AFC000
stack
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
167D000
direct allocation
page execute and read and write
1041000
heap
page read and write
1330000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
2B10000
unkown
page readonly
3E11000
heap
page read and write
D8E000
stack
page read and write
11FF000
stack
page read and write
2B4BB901000
trusted library allocation
page read and write
1041000
heap
page read and write
C63000
heap
page read and write
1041000
heap
page read and write
512D000
system
page execute and read and write
1041000
heap
page read and write
1041000
heap
page read and write
47BD000
direct allocation
page read and write
CC4000
heap
page read and write
1041000
heap
page read and write
1020000
unkown
page read and write
1041000
heap
page read and write
2B4BB540000
trusted library allocation
page read and write
3F5C000
heap
page read and write
1041000
heap
page read and write
2A47000
heap
page read and write
1041000
heap
page read and write
3F32000
heap
page execute and read and write
B00000
unkown
page readonly
BD0000
unkown
page readonly
366C000
unkown
page execute and read and write
3000000
direct allocation
page execute and read and write
2B4BB9BE000
trusted library allocation
page read and write
43FA000
heap
page read and write
401000
unkown
page execute read
1041000
heap
page read and write
2B0E000
stack
page read and write
5A1000
unkown
page execute read
2A05000
heap
page read and write
7D00000
heap
page read and write
7D09000
heap
page read and write
CE5000
heap
page read and write
FA0000
heap
page read and write
2E00000
heap
page read and write
C40000
heap
page read and write
155000
heap
page read and write
4178000
unclassified section
page read and write
1041000
heap
page read and write
2B4B9C42000
heap
page read and write
5A1000
unkown
page execute read
1041000
heap
page read and write
3C2F000
stack
page read and write
3F36000
heap
page read and write
5A1000
unkown
page execute read
5B5000
unkown
page read and write
8B4000
stack
page read and write
3A144000
system
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
8E0000
unkown
page read and write
C44000
heap
page read and write
C60000
unkown
page read and write
CA0000
heap
page read and write
2F29000
heap
page read and write
449C000
unclassified section
page read and write
1165000
heap
page read and write
1041000
heap
page read and write
E5A000
stack
page read and write
3792000
unclassified section
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
F5C000
stack
page read and write
C3E000
stack
page read and write
5B7000
unkown
page readonly
1041000
heap
page read and write
2B4BB817000
trusted library allocation
page read and write
E00000
unkown
page read and write
400000
unkown
page readonly
89F000
stack
page read and write
1041000
heap
page read and write
1048000
heap
page read and write
482E000
direct allocation
page read and write
2813000
heap
page read and write
3E3A000
heap
page read and write
1041000
heap
page read and write
526C000
unkown
page read and write
27EE000
stack
page read and write
50CA000
system
page execute and read and write
1041000
heap
page read and write
C51000
unkown
page readonly
1041000
heap
page read and write
2813000
heap
page read and write
E44000
heap
page read and write
33A0000
direct allocation
page read and write
1041000
heap
page read and write
2B4B9D50000
heap
page read and write
482E000
direct allocation
page read and write
33A0000
direct allocation
page read and write
C6A000
heap
page read and write
A3A000
heap
page read and write
400000
unkown
page readonly
1041000
heap
page read and write
2A1A000
heap
page read and write
2B4B9C2C000
heap
page read and write
5A0000
unkown
page readonly
2813000
heap
page read and write
130000
heap
page read and write
5B7000
unkown
page readonly
FD0000
heap
page read and write
1041000
heap
page read and write
16F2000
direct allocation
page execute and read and write
465C000
unclassified section
page execute and read and write
3F30000
heap
page read and write
5A0000
unkown
page readonly
4453000
direct allocation
page read and write
50B1000
system
page execute and read and write
1041000
heap
page read and write
137D000
stack
page read and write
3FE6000
unclassified section
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7D90000
trusted library allocation
page read and write
1041000
heap
page read and write
2813000
heap
page read and write
9A000
stack
page read and write
CD1000
heap
page read and write
740000
unkown
page readonly
5AE000
unkown
page readonly
2813000
heap
page read and write
1041000
heap
page read and write
3E75000
heap
page read and write
37CE000
unkown
page read and write
2B4BB803000
trusted library allocation
page read and write
2802000
heap
page read and write
3D30000
heap
page read and write
11E0000
trusted library allocation
page read and write
2C4F000
stack
page read and write
1041000
heap
page read and write
6160000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
3E19000
heap
page read and write
C51000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
CE5000
heap
page read and write
3E76000
heap
page read and write
2CF4000
heap
page read and write
1041000
heap
page read and write
DBE000
stack
page read and write
CF3000
heap
page read and write
106E000
heap
page read and write
1041000
heap
page read and write
E44000
heap
page read and write
1087000
heap
page read and write
7CAB000
heap
page read and write
7CF3000
heap
page read and write
645C000
unclassified section
page execute and read and write
1041000
heap
page read and write
1041000
heap
page read and write
2A05000
heap
page read and write
2B4BB520000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7FE0000
heap
page read and write
1041000
heap
page read and write
BF0000
unkown
page readonly
3C5C000
unclassified section
page execute and read and write
5A0000
unkown
page readonly
B50000
heap
page read and write
2C0C000
unkown
page read and write
4690000
direct allocation
page read and write
1041000
heap
page read and write
47B9000
direct allocation
page read and write
CB0000
heap
page read and write
1041000
heap
page read and write
D02000
heap
page read and write
2A47000
heap
page read and write
5B7000
unkown
page readonly
47B9000
direct allocation
page read and write
7C93000
heap
page read and write
1041000
heap
page read and write
FA0000
heap
page read and write
AF8000
stack
page read and write
7BA000
stack
page read and write
CCE000
heap
page read and write
106B000
heap
page read and write
4A7000
unkown
page read and write
1041000
heap
page read and write
CB0000
heap
page read and write
1041000
heap
page read and write
2F40000
heap
page read and write
1041000
heap
page read and write
7CFD000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7CFB000
heap
page read and write
4690000
direct allocation
page read and write
1041000
heap
page read and write
36B000
stack
page read and write
2A00000
heap
page read and write
64DE000
stack
page read and write
CD1000
heap
page read and write
3F31000
heap
page read and write
2B4BB540000
trusted library allocation
page read and write
1041000
heap
page read and write
FF0000
trusted library allocation
page read and write
2A17000
heap
page read and write
7F0000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
2B4BB800000
trusted library allocation
page read and write
7C9B000
heap
page read and write
3F4F000
heap
page read and write
1399000
heap
page read and write
4453000
direct allocation
page read and write
7CCE000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
DBF000
stack
page read and write
47C0000
unclassified section
page read and write
7CC5000
heap
page read and write
3350000
direct allocation
page read and write
2840000
unkown
page readonly
1041000
heap
page read and write
BF0000
unkown
page readonly
730000
unkown
page readonly
1041000
heap
page read and write
7CA1000
heap
page read and write
1041000
heap
page read and write
546C000
unkown
page execute and read and write
7CF6000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
DC0000
stack
page read and write
1041000
heap
page read and write
CF8000
heap
page read and write
CE85FFE000
stack
page read and write
1041000
heap
page read and write
29F2000
unkown
page read and write
50BA000
system
page execute and read and write
1041000
heap
page read and write
1087000
heap
page read and write
BE0000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
990000
heap
page read and write
3852000
unclassified section
page read and write
3ED8000
heap
page read and write
3E76000
heap
page read and write
1041000
heap
page read and write
C69000
heap
page read and write
C69000
heap
page read and write
108A000
heap
page read and write
872E000
stack
page read and write
363C000
unkown
page read and write
32D1000
direct allocation
page execute and read and write
640000
heap
page read and write
1041000
heap
page read and write
FF0000
trusted library allocation
page read and write
CBF000
heap
page read and write
1031000
unkown
page readonly
2813000
heap
page read and write
2B4B9AF0000
system
page execute and read and write
1328000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
4453000
direct allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
2AB0000
unkown
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7CE7000
heap
page read and write
B20000
heap
page read and write
1041000
heap
page read and write
E20000
unkown
page read and write
5B7000
unkown
page readonly
610000
heap
page read and write
16A0000
unkown
page readonly
482E000
direct allocation
page read and write
7CAE000
heap
page read and write
4690000
direct allocation
page read and write
CD8000
heap
page read and write
1041000
heap
page read and write
2A1B000
heap
page read and write
2CF0000
heap
page read and write
1041000
heap
page read and write
154E000
direct allocation
page execute and read and write
1041000
heap
page read and write
F5C000
stack
page read and write
CD8000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
2A2B000
heap
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
7CA6000
heap
page read and write
3A6C000
unclassified section
page read and write
2B4B9C1A000
heap
page read and write
D06000
heap
page read and write
32CD000
direct allocation
page execute and read and write
C5B000
heap
page read and write
50D6000
system
page execute and read and write
14DD000
direct allocation
page execute and read and write
47B9000
direct allocation
page read and write
C44000
heap
page read and write
2B4BB80F000
trusted library allocation
page read and write
1041000
heap
page read and write
3318000
unkown
page read and write
1041000
heap
page read and write
39A82000
system
page read and write
7CBF000
heap
page read and write
2EF0000
direct allocation
page read and write
2813000
heap
page read and write
33A0000
direct allocation
page read and write
482E000
direct allocation
page read and write
1041000
heap
page read and write
1041000
heap
page read and write
1042000
heap
page read and write
1041000
heap
page read and write
B10000
unkown
page readonly
1041000
heap
page read and write
B10000
unkown
page readonly
1041000
heap
page read and write
1041000
heap
page read and write
D0C000
heap
page read and write
30E0000
heap
page read and write
4339000
heap
page read and write
1041000
heap
page read and write
7D03000
heap
page read and write
There are 709 hidden memdumps, click here to show them.