IOC Report
QUOTE2342534.exe

loading gif

Files

File Path
Type
Category
Malicious
QUOTE2342534.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QUOTE2342534.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\4-4-J4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fn3xrnc.cr0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b00qpjmh.qhf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvw54zey.ku1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ztmdjh4q.hu2.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTE2342534.exe
"C:\Users\user\Desktop\QUOTE2342534.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTE2342534.exe"
malicious
C:\Users\user\Desktop\QUOTE2342534.exe
"C:\Users\user\Desktop\QUOTE2342534.exe"
malicious
C:\Program Files (x86)\nwdHBqGyECJMAInuUlrdrCMOzEsZYrLMweXEyIPPnrlSQJvgJCDwLXrPoElJJdIExiptznTA\qnPyaKsYTE.exe
"C:\Program Files (x86)\nwdHBqGyECJMAInuUlrdrCMOzEsZYrLMweXEyIPPnrlSQJvgJCDwLXrPoElJJdIExiptznTA\qnPyaKsYTE.exe"
malicious
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\SysWOW64\mshta.exe"
malicious
C:\Program Files (x86)\nwdHBqGyECJMAInuUlrdrCMOzEsZYrLMweXEyIPPnrlSQJvgJCDwLXrPoElJJdIExiptznTA\qnPyaKsYTE.exe
"C:\Program Files (x86)\nwdHBqGyECJMAInuUlrdrCMOzEsZYrLMweXEyIPPnrlSQJvgJCDwLXrPoElJJdIExiptznTA\qnPyaKsYTE.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://www.bandukchi.com/4nqw/?7Bohe=TM4wmIiUDmnTKniklQ90uhNUhJ9wAlE9nf/Yl9jXXOP3K1JO7ypWLJJbcPRG/mn1E4sifjVCDcv63SEcY+fHR48yBI63+DhGjujcAAYsRe1/gzF87OhGQiowvZSxcJ02Hg==&vD=h0e85v
3.33.130.190
malicious
http://www.huwin.club/cvus/?7Bohe=L6/IgR7jnWgHAqCUWtdTnyQ3KOMoF6iy/gVxl52J0nU+SVs5srMG6NDyylAnxUOxWBqWqLnFW3nZioCT6UqXKC7zbsKc4BTPzCMAY+nXmzAcPovgamuSI2ghdEMnHjenpA==&vD=h0e85v
3.33.130.190
malicious
http://www.huwin.club/cvus/
3.33.130.190
malicious
http://www.bandukchi.com/4nqw/
3.33.130.190
malicious
http://www.livpure-grab.online/r966/
84.32.84.32
malicious
http://www.mcse.top/djad/
154.9.228.56
malicious
http://www.b-ambu.com/deo6/
84.32.84.32
malicious
http://www.nieuws-july202491.sbs/4bpc/
162.0.215.33
malicious
http://www.livpure-grab.online/r966/?vD=h0e85v&7Bohe=St0zOmS57JvxXHngaoKRrYwJhw67SG7V3FAZs2TYvCYNXtW49c+AatXE2ZBTP/KNdGCD9DmtL2naWYac77vyUP4q1YSJ6U5Kf8MwRQ43aJ1o9SgGH2ER+UvSNI1J5J1sVQ==
84.32.84.32
malicious
http://www.coba168.info/o55g/
118.139.178.37
malicious
http://www.xueerr.xyz/vhqd/?7Bohe=WoZBIA9oyl+J2b4VfTP9l9A782ZII/35uSr01551g8NzakXtA+Pa5+JAPkHp6kowgs8acnK71ZwIZDZByVYOuYH08N3N2lAmC4I9AOVCDFEu0aUC6s+F7cMMpoEI61JPvA==&vD=h0e85v
129.226.176.90
malicious
http://www.royapop.online/elh0/?7Bohe=pzF/mZhnV0GSmLX+GycMwU6WT06CzqVGvQudBfY4Dqjs/3KtcpfJYGVadgWONk/4osLjzgZwgHUQ0ZwKAvTdTnbY8Qd/xTrHuaQfE1OzRfvOWlfeun0LuB51rXnhStJusg==&vD=h0e85v
209.74.64.190
malicious
http://www.xueerr.xyz/vhqd/
129.226.176.90
malicious
http://www.onlineblikje.online/z0t0/?7Bohe=9B/xOqaHJLGzhK9+asydflyTnlILmfDyrXYYsxrw44oQhSljsJ3AUyXQia4yxUul1qSv48mAxItuxzOnZ7dQ4iYj8ngc1biNZhlnUORZPI7XnMKBVwak16kasN63mT84/Q==&vD=h0e85v
213.249.67.10
malicious
http://www.voidzero.tech/2vbz/?7Bohe=qlAZWX/ch455H6hDeAWyjxeCoVjeFLImmNyoFLJZcRWWfOSwb/dYbmE5Lo+ESXiDiuCMQOi3bdztXr54sGaKYuw5X5+G7ZC+wzrMILyG35q/IsHjv6ziuhAlYbb1UGsQUw==&vD=h0e85v
84.32.84.32
malicious
http://www.dxfwrc2h.sbs/28kl/?7Bohe=ZkKAB6qSK6F5HsjBEzwiMizWOSJwTbSi5er0Koahj7mpnIIYqRoLKzbDk71u2k+MO6tmUyIoyOO9F/o0RCIBFZEb81/8BfbGrnNiAiZNS4xvfhhZvRECGHuLoGBIxYjXhw==&vD=h0e85v
129.226.56.200
malicious
http://www.onlineblikje.online/z0t0/
213.249.67.10
malicious
http://www.mcse.top/djad/?7Bohe=OgBIZAb3K3QVmDSyooTSIAO5Tll+jwwdUI93t9cTrZTAkguQuNIIHt4CXXwiEPUK7V7i0FBLQRxFESBesMpHDzV+LIhV5qbZyNO4rVJKeHZqQ73AKCfxWCZcLIU2txA0ig==&vD=h0e85v
154.9.228.56
malicious
http://www.putizhong.homes/oacu/?vD=h0e85v&7Bohe=QyeFQ+FiMQKSKdq/BKxG+5Ov1bwmlN3FnlPZyKM2ZYbXsZFvV/O3NTv6ZfeubWU6jSKaxDXQpId5DKUlUVN54eSFHJCOrp//l7em+zpeeu1iGig/Io/KcJQlUpo44DFlsQ==
154.7.176.67
malicious
http://www.royapop.online/elh0/
209.74.64.190
malicious
http://www.everyone.golf/kb53/
3.33.130.190
malicious
http://www.coba168.info/o55g/?7Bohe=SntAYgquUuF8cmTqKgeHt96czNjKbI7walrzfjn5MBbpbz0DMUAQT5TGmaCmCOcjM4ET7TOvVUXTFF/O6lHSx5C+s9iWJ/mgfg63citE2SV2GP/8IEdknZeeY7ynAeJL4g==&vD=h0e85v
118.139.178.37
malicious
http://www.b-ambu.com/deo6/?7Bohe=NByBCVC4fvk3zNlObrJyagJtuzfI3YQ4Ad7pkV0ATPDcP1/VdlZwhks7LZ4Zlk95UTsGsfg9gVB7u8RemM4hoUvK2Ig2OY9rZRI88AWKe5yd8pSEv6a6wulMHxqZW9lecA==&vD=h0e85v
84.32.84.32
malicious
http://www.voidzero.tech/2vbz/
84.32.84.32
malicious
http://www.putizhong.homes/oacu/
154.7.176.67
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.coba168.info/%e0%b8%9a%e0%b8%97%e0%b8%84%e0%b8%a7%e0%b8%b2%e0%b8%a1/
unknown
http://www.coba168.info/wp-content/uploads/elementor/css/post-51.css?ver=1728540719
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/widget-image.min.css?ver=3.24.7
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/lib/font-awesome/css/brands.css?ver=5.15
unknown
http://www.coba168.info/wp-content/plugins/elementor-pro/assets/css/widget-blockquote.min.css?ver=3.
unknown
http://www.coba168.info/wp-content/plugins/elementor-pro/assets/js/frontend.min.js?ver=3.23.2
unknown
https://line.me/R/ti/p/
unknown
https://www.coba168.info/wp-content/uploads/2024/10/COBA-168-
unknown
https://www.coba168.info/
unknown
https://www.coba168.info/#website
unknown
https://www.coba168.info/sitemap_index.xml
unknown
https://www.coba168.info/#organization
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/widget-text-editor.min.css?ver=3.24.
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.coba168.info/?s=
unknown
http://www.coba168.info/wp-content/themes/hello-elementor/theme.min.css?ver=3.1.1
unknown
https://www.coba168.info
unknown
http://www.coba168.info/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=3.24.7
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.coba168.info/wp-content/plugins/header-footer-elementor/assets/css/header-footer-elemento
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=3.24.7
unknown
https://schema.org
unknown
https://www.ecosia.org/newtab/
unknown
https://onlineblikjes.nl/?7Bohe=9B/xOqaHJLGzhK9
unknown
http://gmpg.org/xfn/11
unknown
http://www.coba168.info/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2
unknown
https://schema.org/WPHeader
unknown
https://www.coba168.info/#/schema/logo/image/
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=3.24
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/widget-icon-box.min.css?ver=3.24.7
unknown
http://www.coba168.info/wp-includes/js/dist/hooks.min.js?ver=2810c76e705dd1a53b18
unknown
https://www.coba168.info/about-us/
unknown
https://www.coba168.info/wp-content/uploads/2024/08/5.png
unknown
https://www.coba168.info/slot-online/
unknown
https://www.coba168.info/comments/feed/
unknown
http://www.rtpsilva4d.click
unknown
https://www.coba168.info/login/
unknown
https://schema.org/WPFooter
unknown
https://yoast.com/wordpress/plugins/seo/
unknown
https://www.coba168.info/privacy-policy-2/
unknown
http://www.coba168.info/xmlrpc.php
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/lib/font-awesome/css/solid.css?ver=5.15.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.coba168.info/wp-content/plugins/header-footer-elementor/inc/widgets-css/frontend.css?ver=
unknown
http://www.coba168.info/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
unknown
https://www.coba168.info/wp-content/uploads/2024/10/cropped-COBA-168-
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=3.24.7
unknown
http://www.coba168.info/wp-content/themes/hello-elementor/header-footer.min.css?ver=3.1.1
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/conditionals/e-swiper.min.css?ver=3.
unknown
https://www.coba168.info/register
unknown
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
http://www.coba168.info/wp-content/plugins/elementor-pro/assets/js/webpack-pro.runtime.min.js?ver=3.
unknown
http://www.coba168.info/wp-content/uploads/elementor/css/global.css?ver=1728530365
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.coba168.info/promotion/
unknown
https://www.coba168.info/xmlrpc.php?rsd
unknown
https://www.coba168.info/feed/
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=3.24.3
unknown
http://www.coba168.info/wp-content/themes/hello-elementor/style.min.css?ver=3.1.1
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.coba168.info/wp-content/uploads/elementor/css/post-12.css?ver=1728540809
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=3.24.7
unknown
http://www.coba168.info/wp-content/plugins/wp-staging/assets/js/dist/wpstg-blank-loader.min.js?ver=6
unknown
https://app.ddgame168.online/utm-source/coba168-info
unknown
https://api.w.org/
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/lib/animations/styles/bounce.min.css?ver
unknown
http://www.coba168.info/wp-content/plugins/elementor-pro/assets/css/frontend.min.css?ver=3.23.2
unknown
http://www.coba168.info/wp-content/plugins/elementor/assets/lib/font-awesome/css/fontawesome.css?ver
unknown
https://www.coba168.info/wp-json/
unknown
http://www.coba168.info/wp-content/plugins/header-footer-elementor/inc/js/frontend.js?ver=1.6.44
unknown
http://www.coba168.info/wp-content/uploads/elementor/css/post-8.css?ver=1728530364
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.royapop.online
209.74.64.190
malicious
voidzero.tech
84.32.84.32
malicious
nieuws-july202491.sbs
162.0.215.33
malicious
rtpsilva4d.click
67.223.117.169
malicious
b1-3-r111.kunlundns.top
129.226.56.200
malicious
www.xueerr.xyz
129.226.176.90
malicious
coba168.info
118.139.178.37
malicious
livpure-grab.online
84.32.84.32
malicious
huwin.club
3.33.130.190
malicious
everyone.golf
3.33.130.190
malicious
www.mcse.top
154.9.228.56
malicious
www.putizhong.homes
154.7.176.67
malicious
www.onlineblikje.online
213.249.67.10
malicious
bandukchi.com
3.33.130.190
malicious
b-ambu.com
84.32.84.32
malicious
www.coba168.info
unknown
malicious
www.huwin.club
unknown
malicious
www.jy58gdwf7t.skin
unknown
malicious
www.rtpsilva4d.click
unknown
malicious
www.everyone.golf
unknown
malicious
www.dxfwrc2h.sbs
unknown
malicious
www.livpure-grab.online
unknown
malicious
www.b-ambu.com
unknown
malicious
www.bandukchi.com
unknown
malicious
www.voidzero.tech
unknown
malicious
www.nieuws-july202491.sbs
unknown
malicious
There are 16 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.0.215.33
nieuws-july202491.sbs
Canada
malicious
118.139.178.37
coba168.info
Singapore
malicious
129.226.176.90
www.xueerr.xyz
Singapore
malicious
213.249.67.10
www.onlineblikje.online
Netherlands
malicious
67.223.117.169
rtpsilva4d.click
United States
malicious
154.9.228.56
www.mcse.top
United States
malicious
129.226.56.200
b1-3-r111.kunlundns.top
Singapore
malicious
154.7.176.67
www.putizhong.homes
United States
malicious
84.32.84.32
voidzero.tech
Lithuania
malicious
209.74.64.190
www.royapop.online
United States
malicious
3.33.130.190
huwin.club
United States
malicious
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3680000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3340000
trusted library allocation
page read and write
malicious
4CB0000
system
page execute and read and write
malicious
2F40000
unclassified section
page execute and read and write
malicious
3FD0000
unkown
page execute and read and write
malicious
2F20000
system
page execute and read and write
malicious
1620000
unclassified section
page execute and read and write
malicious
C40000
trusted library allocation
page read and write
21D29313000
heap
page read and write
3012000
heap
page read and write
21D2AC0A000
trusted library allocation
page read and write
E70000
heap
page read and write
4F10000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
710000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
8A3E000
stack
page read and write
FB0000
heap
page read and write
E8E000
stack
page read and write
31B2000
unclassified section
page execute and read and write
21D2AC10000
trusted library allocation
page read and write
960000
unkown
page readonly
D30000
unkown
page readonly
3CD2000
unclassified section
page read and write
34B1000
heap
page read and write
135000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
B56E000
stack
page read and write
188E000
direct allocation
page execute and read and write
311A000
unkown
page read and write
120000
unkown
page readonly
34B1000
heap
page read and write
700000
unkown
page readonly
34B1000
heap
page read and write
EA2E000
stack
page read and write
2AE0000
unkown
page readonly
834A000
heap
page read and write
82F2000
heap
page read and write
34B1000
heap
page read and write
21D2AAC0000
trusted library allocation
page read and write
34B1000
heap
page read and write
4D57000
system
page execute and read and write
EE0C000
stack
page read and write
21D2930C000
heap
page read and write
34B1000
heap
page read and write
2FB3000
heap
page read and write
4DAE000
system
page execute and read and write
B30000
unkown
page readonly
75E000
stack
page read and write
835B000
heap
page read and write
4E00000
trusted library allocation
page execute and read and write
21D292EF000
heap
page read and write
3015000
heap
page read and write
135000
unkown
page read and write
5215000
heap
page read and write
34B1000
heap
page read and write
6ACE000
heap
page read and write
4E50000
heap
page read and write
4466000
unclassified section
page read and write
4AAE000
unclassified section
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
3780000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
2390000
heap
page read and write
6CFE000
stack
page read and write
3029000
heap
page read and write
34B1000
heap
page read and write
C70000
trusted library allocation
page read and write
34B1000
heap
page read and write
340000
unkown
page readonly
21D2AC00000
trusted library allocation
page read and write
34B1000
heap
page read and write
75E000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
82D0000
trusted library allocation
page read and write
34B0000
heap
page read and write
16B0000
heap
page read and write
3AA000
stack
page read and write
3D2C000
unclassified section
page read and write
181D000
direct allocation
page execute and read and write
C7A000
trusted library allocation
page execute and read and write
88EE000
stack
page read and write
34B1000
heap
page read and write
30B4000
heap
page read and write
4117000
trusted library allocation
page read and write
320000
unkown
page readonly
8360000
heap
page read and write
34B1000
heap
page read and write
8214000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
980000
unkown
page readonly
B2F000
stack
page read and write
115E000
stack
page read and write
FD1000
heap
page read and write
82F5000
heap
page read and write
D20000
unkown
page readonly
21D2AC03000
trusted library allocation
page read and write
770000
heap
page read and write
8369000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
937000
stack
page read and write
970000
heap
page read and write
6AC0000
heap
page read and write
C90000
heap
page read and write
F00000
trusted library allocation
page read and write
4D3B000
system
page execute and read and write
4E40000
trusted library allocation
page read and write
EC1000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
1197000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
2FA0000
heap
page read and write
32D0000
heap
page read and write
59D0000
heap
page read and write
304F000
heap
page read and write
34B1000
heap
page read and write
305C000
heap
page read and write
5A62000
unclassified section
page read and write
B2F000
stack
page read and write
3049000
heap
page read and write
8356000
heap
page read and write
8344000
heap
page read and write
34B1000
heap
page read and write
25A2000
unkown
page read and write
700000
unkown
page readonly
12E000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
8224000
heap
page read and write
831C000
heap
page read and write
21D29313000
heap
page read and write
FB8000
heap
page read and write
2FBC000
heap
page read and write
21D2ADAF000
trusted library allocation
page read and write
34B1000
heap
page read and write
3042000
heap
page read and write
4260000
unkown
page read and write
F7F000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
D20000
unkown
page readonly
34B1000
heap
page read and write
B39D000
stack
page read and write
34B1000
heap
page read and write
21D292E7000
heap
page read and write
34B1000
heap
page read and write
6E60000
heap
page read and write
34B1000
heap
page read and write
A9E000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
2FBC000
heap
page read and write
5400000
trusted library allocation
page read and write
21D29020000
system
page execute and read and write
30B4000
heap
page read and write
832B000
heap
page read and write
D89000
heap
page read and write
3046000
heap
page read and write
4DE0000
heap
page read and write
28C1000
trusted library allocation
page read and write
4F70000
heap
page read and write
4F80000
heap
page read and write
21D2ADBE000
trusted library allocation
page read and write
A50000
heap
page read and write
3AA000
stack
page read and write
34B1000
heap
page read and write
35D8000
heap
page read and write
B919FFE000
stack
page read and write
34B1000
heap
page read and write
15CE000
stack
page read and write
4FB0000
trusted library allocation
page execute and read and write
38C9000
trusted library allocation
page read and write
D40000
unkown
page readonly
34B1000
heap
page read and write
491C000
unclassified section
page read and write
303C000
heap
page read and write
34B1000
heap
page read and write
21D2AD00000
trusted library allocation
page read and write
822F000
heap
page read and write
970000
unkown
page readonly
C54000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
28FB2000
system
page read and write
3810000
direct allocation
page execute and read and write
B30000
unkown
page readonly
EF0000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
C53000
trusted library allocation
page execute and read and write
1441000
unkown
page readonly
2EF8000
stack
page read and write
8C0000
unkown
page readonly
B3DD000
stack
page read and write
16F0000
direct allocation
page execute and read and write
34B1000
heap
page read and write
B10000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
28D9000
trusted library allocation
page read and write
835B000
heap
page read and write
34B1000
heap
page read and write
938000
heap
page read and write
4D5A000
system
page execute and read and write
6D3E000
stack
page read and write
28C0000
unkown
page read and write
851000
unkown
page readonly
2C64000
unkown
page read and write
4D4B000
system
page execute and read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
301C000
heap
page read and write
34B5000
heap
page read and write
34B1000
heap
page read and write
8360000
heap
page read and write
34B1000
heap
page read and write
3F0000
unkown
page readonly
4F64000
unclassified section
page read and write
21D2AC14000
trusted library allocation
page read and write
B520000
trusted library allocation
page read and write
34B1000
heap
page read and write
4D31000
system
page execute and read and write
28F0000
heap
page read and write
2540000
unclassified section
page execute and read and write
8500000
heap
page read and write
34B1000
heap
page read and write
8C0000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
2FB8000
heap
page read and write
30A0000
heap
page read and write
CFC000
stack
page read and write
38C1000
trusted library allocation
page read and write
34B1000
heap
page read and write
275E000
trusted library allocation
page read and write
34B1000
heap
page read and write
8B3E000
stack
page read and write
70E2000
trusted library allocation
page read and write
4F5B000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
4E10000
heap
page execute and read and write
21D2ADCE000
trusted library allocation
page read and write
34B1000
heap
page read and write
28F0000
heap
page read and write
53E0000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
2394000
heap
page read and write
66C0000
trusted library allocation
page read and write
120000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
307F000
heap
page read and write
851000
unkown
page readonly
366A000
heap
page read and write
307F000
heap
page read and write
760000
unkown
page read and write
4C0000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
B15000
heap
page read and write
137000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
8E0000
unkown
page read and write
301C000
heap
page read and write
12E000
unkown
page readonly
2AE0000
unkown
page readonly
34B1000
heap
page read and write
3003000
heap
page read and write
21D292FD000
heap
page read and write
70A0000
trusted library allocation
page read and write
34B1000
heap
page read and write
F91000
unkown
page readonly
121000
unkown
page execute read
CFC000
stack
page read and write
330000
unkown
page readonly
10B0000
unkown
page readonly
E70000
heap
page read and write
D86000
heap
page read and write
21D292A0000
heap
page read and write
CC4000
heap
page read and write
8364000
heap
page read and write
C63000
trusted library allocation
page read and write
6EC0000
heap
page read and write
3075000
heap
page read and write
121000
unkown
page execute read
34B1000
heap
page read and write
29FF000
stack
page read and write
2FB1000
heap
page read and write
6F7E000
stack
page read and write
2710000
trusted library allocation
page read and write
3DAA000
unkown
page read and write
C50000
trusted library allocation
page read and write
2DF6000
unkown
page read and write
B29D000
stack
page read and write
7FC60000
trusted library allocation
page execute and read and write
135000
unkown
page read and write
3320000
trusted library allocation
page read and write
34B1000
heap
page read and write
10B7000
heap
page read and write
95C000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
6EC9000
heap
page read and write
FA0000
unkown
page read and write
34B1000
heap
page read and write
2FC3000
heap
page read and write
34B1000
heap
page read and write
37FE000
stack
page read and write
82E0000
heap
page read and write
3ADD000
direct allocation
page execute and read and write
4155000
trusted library allocation
page read and write
770000
heap
page read and write
34B1000
heap
page read and write
40CE000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
41D0000
unkown
page execute and read and write
2FA8000
heap
page read and write
2FB1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
3939000
direct allocation
page execute and read and write
24A0000
heap
page read and write
35B6000
heap
page read and write
34B1000
heap
page read and write
C72000
trusted library allocation
page read and write
34B1000
heap
page read and write
289E000
stack
page read and write
34B1000
heap
page read and write
839000
stack
page read and write
707E000
stack
page read and write
34B1000
heap
page read and write
573E000
unclassified section
page read and write
42D4000
unclassified section
page read and write
34B1000
heap
page read and write
12E000
unkown
page readonly
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
4C2000
unkown
page readonly
B91A7FF000
stack
page read and write
D50000
heap
page read and write
3762000
unkown
page read and write
2790000
trusted library allocation
page read and write
34B1000
heap
page read and write
2FB3000
heap
page read and write
3B60000
trusted library allocation
page execute and read and write
D30000
unkown
page readonly
2785000
trusted library allocation
page read and write
121000
unkown
page execute read
4DA0000
trusted library allocation
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
82F0000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
E6E000
stack
page read and write
930000
heap
page read and write
34B1000
heap
page read and write
10B0000
unkown
page readonly
4F90000
trusted library allocation
page read and write
137000
unkown
page readonly
3780000
trusted library allocation
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
FA0000
unkown
page read and write
1B40000
unclassified section
page execute and read and write
34B1000
heap
page read and write
2394000
heap
page read and write
287C000
unkown
page read and write
48C8000
trusted library allocation
page read and write
2F88000
unkown
page read and write
4EBC000
unkown
page read and write
34B1000
heap
page read and write
28A0000
unkown
page readonly
38F4000
unkown
page read and write
34B1000
heap
page read and write
8210000
trusted library allocation
page read and write
34B1000
heap
page read and write
AF0000
heap
page read and write
D71000
heap
page read and write
832D000
heap
page read and write
89EE000
stack
page read and write
8304000
heap
page read and write
34B1000
heap
page read and write
21D2AC0E000
trusted library allocation
page read and write
59C0000
heap
page read and write
158F000
stack
page read and write
287C000
unkown
page read and write
29072000
system
page read and write
34B1000
heap
page read and write
2AD0000
heap
page read and write
320000
unkown
page readonly
304F000
heap
page read and write
34B1000
heap
page read and write
3046000
heap
page read and write
2FBC000
heap
page read and write
EB2E000
stack
page read and write
12E000
unkown
page readonly
8E0000
unkown
page read and write
34B1000
heap
page read and write
19A1000
direct allocation
page execute and read and write
8F0000
unkown
page read and write
EC6E000
stack
page read and write
5F9000
unkown
page read and write
39AE000
direct allocation
page execute and read and write
3008000
heap
page read and write
3094000
heap
page read and write
6FC000
stack
page read and write
D47000
heap
page read and write
3A86000
unkown
page read and write
C5D000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
82EB000
heap
page read and write
2BD0000
unkown
page execute and read and write
34B1000
heap
page read and write
2AD4000
heap
page read and write
24A0000
heap
page read and write
34B1000
heap
page read and write
710000
heap
page read and write
34B1000
heap
page read and write
4F60000
trusted library section
page readonly
3140000
unclassified section
page execute and read and write
3042000
heap
page read and write
2FBC000
heap
page read and write
343E000
unkown
page read and write
1A38000
direct allocation
page execute and read and write
21D2ADC4000
trusted library allocation
page read and write
306F000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
860000
unkown
page read and write
531E000
stack
page read and write
274B000
trusted library allocation
page read and write
4FC0000
heap
page read and write
34B1000
heap
page read and write
6E3E000
stack
page read and write
F91000
unkown
page readonly
137000
unkown
page readonly
1110000
heap
page read and write
89F0000
trusted library allocation
page execute and read and write
82E6000
heap
page read and write
D40000
unkown
page readonly
EA0000
trusted library allocation
page read and write
3012000
heap
page read and write
50F6000
unclassified section
page read and write
2662000
unkown
page read and write
34B1000
heap
page read and write
1190000
heap
page read and write
34B1000
heap
page read and write
B918FFB000
stack
page read and write
3C12000
unclassified section
page read and write
FB8000
heap
page read and write
6A3E000
stack
page read and write
2730000
heap
page execute and read and write
C76000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
3F3C000
unkown
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
306F000
heap
page read and write
30B4000
heap
page read and write
82FA000
heap
page read and write
30B0000
heap
page read and write
28BE000
stack
page read and write
B160000
heap
page read and write
980000
unkown
page readonly
3797000
heap
page read and write
478A000
unclassified section
page read and write
27B0000
heap
page read and write
10FA000
stack
page read and write
EB6D000
stack
page read and write
C8B000
trusted library allocation
page execute and read and write
6BFE000
stack
page read and write
24B0000
unkown
page readonly
330000
unkown
page readonly
ADD000
stack
page read and write
3780000
trusted library allocation
page read and write
34B1000
heap
page read and write
2390000
heap
page read and write
3EEC000
unclassified section
page read and write
EEE000
stack
page read and write
24B0000
unkown
page readonly
26BC000
unkown
page read and write
900000
unkown
page read and write
34B1000
heap
page read and write
938000
heap
page read and write
249F000
stack
page read and write
34B1000
heap
page read and write
2FC2000
heap
page read and write
276D000
trusted library allocation
page read and write
1160000
heap
page read and write
4242000
unkown
page execute and read and write
34B1000
heap
page read and write
21D2908D000
system
page execute and read and write
21D2AC21000
trusted library allocation
page read and write
D50000
heap
page read and write
25A2000
unkown
page read and write
8BE000
stack
page read and write
34B1000
heap
page read and write
2FC2000
heap
page read and write
2740000
trusted library allocation
page read and write
121000
unkown
page execute read
34B1000
heap
page read and write
3037000
heap
page read and write
8B9E000
stack
page read and write
1B3F000
stack
page read and write
DAC000
stack
page read and write
2FF7000
heap
page read and write
2772000
trusted library allocation
page read and write
C1E000
stack
page read and write
EC1000
unkown
page readonly
36D0000
trusted library allocation
page read and write
34B1000
heap
page read and write
82E1000
heap
page read and write
860000
unkown
page read and write
55AC000
unclassified section
page read and write
3008000
heap
page read and write
C9E000
heap
page read and write
10B0000
heap
page read and write
4DF0000
trusted library allocation
page read and write
C6D000
trusted library allocation
page execute and read and write
21D29200000
heap
page read and write
34B1000
heap
page read and write
2761000
trusted library allocation
page read and write
8341000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
760000
unkown
page read and write
E9EE000
stack
page read and write
34B1000
heap
page read and write
21D29120000
heap
page read and write
960000
unkown
page readonly
34B1000
heap
page read and write
12B0000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
9EA000
stack
page read and write
34B1000
heap
page read and write
21D2AAC0000
trusted library allocation
page read and write
21D29240000
heap
page read and write
8351000
heap
page read and write
21D292E0000
heap
page read and write
2FBC000
heap
page read and write
2FED000
heap
page read and write
3F0000
unkown
page readonly
34B1000
heap
page read and write
3320000
heap
page read and write
1819000
direct allocation
page execute and read and write
34B1000
heap
page read and write
2780000
trusted library allocation
page read and write
9EA000
stack
page read and write
F80000
unkown
page read and write
2BEB000
stack
page read and write
4A5C000
stack
page read and write
34B1000
heap
page read and write
45F8000
unclassified section
page read and write
776000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
B4DE000
stack
page read and write
F80000
unkown
page read and write
340000
unkown
page readonly
8369000
heap
page read and write
34B1000
heap
page read and write
2AD0000
heap
page read and write
3B52000
direct allocation
page execute and read and write
4E53000
heap
page read and write
34B1000
heap
page read and write
3075000
heap
page read and write
2AD4000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
3015000
heap
page read and write
34B1000
heap
page read and write
3E0000
unkown
page readonly
B9197FD000
stack
page read and write
34B1000
heap
page read and write
3049000
heap
page read and write
19BD000
direct allocation
page execute and read and write
34B1000
heap
page read and write
393D000
direct allocation
page execute and read and write
34B1000
heap
page read and write
305C000
heap
page read and write
15D0000
direct allocation
page read and write
8C9F000
stack
page read and write
307A000
heap
page read and write
3029000
heap
page read and write
35D0000
unkown
page execute and read and write
34B1000
heap
page read and write
6EF2000
heap
page read and write
135000
unkown
page read and write
2FBC000
heap
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
82F8000
heap
page read and write
34B1000
heap
page read and write
137000
unkown
page readonly
21D2AB00000
trusted library allocation
page read and write
303C000
heap
page read and write
29674000
system
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
C60000
trusted library allocation
page read and write
11A7000
heap
page read and write
8357000
heap
page read and write
34B1000
heap
page read and write
21D2AD01000
trusted library allocation
page read and write
34B1000
heap
page read and write
5210000
heap
page read and write
2928C000
system
page read and write
34B1000
heap
page read and write
FB0000
heap
page read and write
3808000
heap
page read and write
34B1000
heap
page read and write
3793000
heap
page read and write
120000
unkown
page readonly
CD1000
heap
page read and write
59F0000
heap
page read and write
6FC000
stack
page read and write
34B1000
heap
page read and write
3AE1000
direct allocation
page execute and read and write
C87000
trusted library allocation
page execute and read and write
34B1000
heap
page read and write
EF40000
trusted library allocation
page execute and read and write
4FA0000
trusted library allocation
page read and write
2766000
trusted library allocation
page read and write
59F8000
heap
page read and write
21D29310000
heap
page read and write
F10000
heap
page read and write
D4C000
heap
page read and write
34B1000
heap
page read and write
120000
unkown
page readonly
34B1000
heap
page read and write
4E20000
trusted library allocation
page read and write
34B1000
heap
page read and write
2B60000
trusted library allocation
page read and write
3094000
heap
page read and write
34B1000
heap
page read and write
230C000
unkown
page read and write
34B1000
heap
page read and write
1441000
unkown
page readonly
541A000
unclassified section
page read and write
B860000
trusted library section
page read and write
28C0000
unkown
page read and write
34B1000
heap
page read and write
19B6000
direct allocation
page execute and read and write
1390000
heap
page read and write
34B1000
heap
page read and write
836F000
heap
page read and write
970000
unkown
page readonly
7080000
trusted library section
page read and write
3E0000
unkown
page readonly
43F2000
unkown
page read and write
2B57000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
34B1000
heap
page read and write
32AC000
unkown
page read and write
4DD2000
unclassified section
page read and write
8366000
heap
page read and write
8322000
heap
page read and write
930000
heap
page read and write
28A0000
unkown
page readonly
C82000
trusted library allocation
page read and write
270C000
stack
page read and write
34B1000
heap
page read and write
34B1000
heap
page read and write
8327000
heap
page read and write
307A000
heap
page read and write
70B0000
trusted library allocation
page read and write
EF0C000
stack
page read and write
3037000
heap
page read and write
34B1000
heap
page read and write
33A0000
heap
page read and write
34B1000
heap
page read and write
94F000
heap
page read and write
293A000
trusted library allocation
page read and write
58D0000
unclassified section
page read and write
There are 698 hidden memdumps, click here to show them.