IOC Report
Payment&WarantyBonds.bat

loading gif

Files

File Path
Type
Category
Malicious
Payment&WarantyBonds.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment&WarantyBonds.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4648H9mUM
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment&WarantyBonds.exe
"C:\Users\user\Desktop\Payment&WarantyBonds.exe"
malicious
C:\Users\user\Desktop\Payment&WarantyBonds.exe
"C:\Users\user\Desktop\Payment&WarantyBonds.exe"
malicious
C:\Program Files (x86)\kKRezLukEtomJldoeFBChjEQtNlvuMkWmhpzdXhqjzhwuAoylANH\oDnyHukDVUZk.exe
"C:\Program Files (x86)\kKRezLukEtomJldoeFBChjEQtNlvuMkWmhpzdXhqjzhwuAoylANH\oDnyHukDVUZk.exe"
malicious
C:\Windows\SysWOW64\systeminfo.exe
"C:\Windows\SysWOW64\systeminfo.exe"
malicious
C:\Program Files (x86)\kKRezLukEtomJldoeFBChjEQtNlvuMkWmhpzdXhqjzhwuAoylANH\oDnyHukDVUZk.exe
"C:\Program Files (x86)\kKRezLukEtomJldoeFBChjEQtNlvuMkWmhpzdXhqjzhwuAoylANH\oDnyHukDVUZk.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.030002059.xyz/2sun/?ZT=HFv57CWzV4D1L9ubGrUw/N+LZZ6BniYLjcS4cRbGENzhA3BKZjtgqnC6wzdpxcsL4M445YXmdmOqKzt/9+uXSXCfKbs+tX0lmfcjUf3N9oWc/wvfMeYS2jQ=&mTkD=Gj2Ti2T0g4
161.97.142.144
malicious
http://www.extrime1.shop/jr4j/
152.42.255.48
malicious
http://www.xipowerplay.xyz/akxn/
13.248.169.48
malicious
http://www.xipowerplay.xyz/akxn/?ZT=bVCpbCQOZK8RJSSOpbtjW6178FykoGhXFODVqYypnT+nS+pakzyDZ3G2gJzbbKB5bmDBooJSbxoFgw5n88RQ4gN+spy4B3V2SPR8yfMM1NLM4EIxe0ofqks=&mTkD=Gj2Ti2T0g4
13.248.169.48
malicious
http://www.091210.xyz/jwed/
172.67.154.67
malicious
http://www.adsa6c.top/wr26/
20.2.249.7
malicious
http://www.cotti.club/3ej6/?ZT=Gf4n60vPMxeL0A+d5GBWdueSYaV7AAF6sYlT7O2otcMNGwtil4ITBlU9iT/EVO+vtwlhWFB1C/mfTw8URcWhMQgTObTwj1m/ib0JAzzbicsZX3cTLGstzzo=&mTkD=Gj2Ti2T0g4
103.120.80.111
malicious
http://www.cotti.club/3ej6/
103.120.80.111
malicious
http://www.030002059.xyz/2sun/
161.97.142.144
malicious
http://www.cesach.net/dma3/?mTkD=Gj2Ti2T0g4&ZT=IhPPRAmDChEnx8G5Mk3wYKJVvliqClSy7lT3/i9hniKwN2WP3nmtzIAyaYX2MoR3jQRU/NaT7iTCvd3O/fPSuEFMVnQWNGAOAVxjgpJaGw2AUh+P10Czoew=
217.76.156.252
malicious
http://www.basicreviews.online/3xn5/
144.76.190.39
malicious
http://www.solarand.online/diem/?mTkD=Gj2Ti2T0g4&ZT=6kQoSQEqBTKFeIgPWItcwMtJ6+nSmUORx6o6L7StlLAM0wJa+kMHFj5rDbCqKJO5phAeVuacSteB2VMr/yCaTx+wFCn7HbSrd9uZdvfw4QtNwXqKd1ZsMRg=
217.160.0.60
malicious
http://www.091210.xyz/jwed/?ZT=BP+RnxL4kRmCbJis2H94uci3abF0xOX/uWRdW7IS0nQn3eBqrLGhokpRAgB0njlljCrnZN3jlOJi4UAaeIXlep/T+OgRPR3ifAipJWCHkORcjZ0KtUFfU2c=&mTkD=Gj2Ti2T0g4
172.67.154.67
malicious
http://www.297676.com/xyex/
199.59.243.227
malicious
http://www.iampinky.info/nhtq/?ZT=0+mU6fX4mGgH3aI4KvnZ0Dnt9NN9uhfQ4WQLoO9YJQq1rLkiV3mWe/ShpiWb6GRwN8XKSHyyPlz1ODC2MK0vYsx4EzdsG0j0QesGBnWjRvygBOdKdkC21k4=&mTkD=Gj2Ti2T0g4
3.33.130.190
malicious
http://www.solarand.online/diem/
217.160.0.60
malicious
http://www.basicreviews.online/3xn5/?ZT=hLX784qEA4n55Q1oGw1olOPE1jv2cb5vRwpnfGUpuE0YTY8y9L6/CN63cm0behm+qDJgSuJj8e8DxEJz6zH1lBsEYFc4WGfLLcwXK2bqtXGi64JZ82gh2/U=&mTkD=Gj2Ti2T0g4
144.76.190.39
malicious
http://www.adsa6c.top/wr26/?ZT=8UnATjvfTpQ77jvixFCgWVUX2yh4jGZbjC17bXoElnpRCxInjgnE/2IqsqXHODoNl6OiDfBQBXM7D7XvNANc8/XGVjRwEyGKTULZaqlRQkXooaUfX5GSz0A=&mTkD=Gj2Ti2T0g4
20.2.249.7
malicious
http://www.stationseek.online/wd23/
198.251.84.200
malicious
http://www.297676.com/xyex/?ZT=GRv8gXQeeb2Gl8ts68dy26JEIDOFTPQDU1Y3CPEivIL54q3aRuVfXNser16Tn8T/OBl4IICKxXKXWQiZ2Uzn7HwRtVNzQ2FbKXtno3vR39Y/zqEhWKkV0ww=&mTkD=Gj2Ti2T0g4
199.59.243.227
malicious
http://www.stationseek.online/wd23/?ZT=hRp9+v2en7tRz1flyqG17kFmttLc1zOskyKd0ztIjTxyYqd810hmijNQE9yj6BxK05vUksKTuuJXofOYLi9PR6uwuESMYbomdUS7hY3ZEsqPIlhTOHkKZSQ=&mTkD=Gj2Ti2T0g4
198.251.84.200
malicious
http://www.cesach.net/dma3/
217.76.156.252
malicious
http://www.simplek.top/ep69/?ZT=1FIMhSJhU8+lHAAmrS+FlWYlLXz7aIiZYVZCfaZw4D7e7Ym+VFULEmTMy/HAB+T+rsRxHszMTzww+hC5XQWyLoZ+L/5l/vKoQeg/i8EmIWt3MnVCcXzM6O0=&mTkD=Gj2Ti2T0g4
203.161.49.193
malicious
http://www.simplek.top/ep69/
203.161.49.193
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://piensasolutions.com/css/parking2.css
unknown
http://www.fontbureau.com/designers?
unknown
https://www.west.cn/services/mail/
unknown
http://www.tiro.com
unknown
https://piensasolutions.com/imgs/parking/icon-desplegar.jpg
unknown
http://www.stationseek.online/wd23?ZT=hRp9
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.piensasolutions.com/ssl?utm_source=parking&utm_medium=link&utm_campaign=correo
unknown
https://www.piensasolutions.com/certificado-ssl?utm_source=parking&utm_medium=link&utm_campa
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://www.google.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)
unknown
http://www.sgland06.online/33ib/?ZT=AYOfApeu9cghctp2i/KTSy5LkW4tz9x7+arej5d+r0NkQieZykYOddwLhoh5ni50J8Z5WiAS8Adn1ZwJ2laV/jmSd394ohUQohZCg1IJ+kicD56x/bghldI=&mTkD=Gj2Ti2T0g4
34.92.128.59
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://hm.baidu.com/hm.js?352bf0fb165ca7ab634d3cea879c7a72
unknown
https://www.west.cn/cloudhost/
unknown
https://www.west.cn/ykj/view.asp?domain=cotti.club
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://www.piensasolutions.com?utm_source=parking&utm_medium=link&utm_campaign=piensa
unknown
http://www.sakkal.com
unknown
https://www.piensasolutions.com/crear-web?utm_source=parking&utm_medium=link&utm_campaign=we
unknown
https://shop.piensasolutions.com/search-ajax.php?utm_source=parking&utm_medium=link&utm_camp
unknown
http://www.extrime1.shop
unknown
https://www.strato.de
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://piensasolutions.com/imgs/parking/icon-ssl-parking.png
unknown
https://www.west.cn/services/webhosting/
unknown
http://www.basicreviews.online/cgi-sys/suspendedpage.cgi?ZT=hLX784qEA4n55Q1oGw1olOPE1jv2cb5vRwpnfGUp
unknown
https://plus.google.com/u/0/102310483732773374239
unknown
https://www.west.cn/services/domain/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)
unknown
https://www.ecosia.org/newtab/
unknown
http://www.sgland06.online/33ib/
34.92.128.59
https://piensasolutions.com/imgs/parking/icon-hosting.png
unknown
https://piensasolutions.com/imgs/parking/icon-web.png
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
https://www.piensasolutions.com/web-sencilla?utm_source=parking&utm_medium=link&utm_campaign
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.piensasolutions.com/dominios?utm_source=parking&utm_medium=link&utm_campaign=dom
unknown
https://www.piensasolutions.com/hosting?utm_source=parking&utm_medium=link&utm_campaign=host
unknown
https://piensasolutions.com/imgs/parking/icon-parking.png
unknown
https://www.west.cn/jiaoyi/
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://piensasolutions.com/imgs/parking/icon-facebook-small.png
unknown
http://www.fontbureau.com/designers8
unknown
https://piensasolutions.com/imgs/parking/icon-twitter-small.png
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://twitter.com/piensasolutions
unknown
https://piensasolutions.com/imgs/parking/icon-web-sencilla.png
unknown
There are 82 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.cotti.club
103.120.80.111
malicious
solarand.online
217.160.0.60
malicious
www.simplek.top
203.161.49.193
malicious
extrime1.shop
152.42.255.48
malicious
www.cesach.net
217.76.156.252
malicious
basicreviews.online
144.76.190.39
malicious
www.091210.xyz
172.67.154.67
malicious
www.adsa6c.top
20.2.249.7
malicious
www.297676.com
199.59.243.227
malicious
www.xipowerplay.xyz
13.248.169.48
malicious
www.030002059.xyz
161.97.142.144
malicious
iampinky.info
3.33.130.190
malicious
stationseek.online
198.251.84.200
malicious
www.sgland06.online
34.92.128.59
www.solarand.online
unknown
www.extrime1.shop
unknown
www.stationseek.online
unknown
www.iampinky.info
unknown
www.basicreviews.online
unknown
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.154.67
www.091210.xyz
United States
malicious
13.248.169.48
www.xipowerplay.xyz
United States
malicious
20.2.249.7
www.adsa6c.top
United States
malicious
144.76.190.39
basicreviews.online
Germany
malicious
199.59.243.227
www.297676.com
United States
malicious
217.160.0.60
solarand.online
Germany
malicious
198.251.84.200
stationseek.online
United States
malicious
161.97.142.144
www.030002059.xyz
United States
malicious
203.161.49.193
www.simplek.top
Malaysia
malicious
103.120.80.111
www.cotti.club
Hong Kong
malicious
3.33.130.190
iampinky.info
United States
malicious
152.42.255.48
extrime1.shop
United States
malicious
217.76.156.252
www.cesach.net
Spain
malicious
34.92.128.59
www.sgland06.online
United States
There are 4 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B70000
trusted library allocation
page read and write
malicious
1740000
unclassified section
page execute and read and write
malicious
B20000
trusted library allocation
page read and write
malicious
2EC0000
unkown
page execute and read and write
malicious
550000
system
page execute and read and write
malicious
21E0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4A70000
system
page execute and read and write
malicious
43D1000
heap
page read and write
16C60010000
trusted library allocation
page read and write
4F70000
trusted library allocation
page execute and read and write
B0FD000
stack
page read and write
306C000
unkown
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
CC4000
heap
page read and write
7090000
heap
page read and write
907000
heap
page read and write
620000
unkown
page readonly
43D1000
heap
page read and write
5AE0000
heap
page read and write
2362000
unkown
page read and write
289D000
trusted library allocation
page read and write
B19E000
stack
page read and write
CA7000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
518000
stack
page read and write
43D1000
heap
page read and write
1167000
heap
page read and write
7FE000
stack
page read and write
A0E000
unkown
page readonly
36B4000
unkown
page read and write
912000
heap
page read and write
E3E000
stack
page read and write
43D1000
heap
page read and write
E9E000
stack
page read and write
BD0000
heap
page read and write
E50000
heap
page read and write
23D0000
unkown
page readonly
12527FE000
stack
page read and write
50C0000
trusted library allocation
page read and write
EB0000
heap
page read and write
4A72000
direct allocation
page execute and read and write
5350000
heap
page read and write
43D1000
heap
page read and write
2860000
heap
page execute and read and write
7FDE000
stack
page read and write
54D0000
trusted library allocation
page read and write
278A000
trusted library allocation
page execute and read and write
960000
heap
page read and write
1E5CC000
system
page read and write
29BE000
stack
page read and write
43D1000
heap
page read and write
A17000
unkown
page readonly
C10000
heap
page read and write
907000
heap
page read and write
43D1000
heap
page read and write
50D0000
trusted library allocation
page execute and read and write
CB1000
heap
page read and write
4FC000
stack
page read and write
810000
heap
page read and write
3CC000
stack
page read and write
5A90000
heap
page read and write
43D1000
heap
page read and write
127F000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
B136000
trusted library allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
4AF0000
system
page execute and read and write
969000
heap
page read and write
E7E000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
48CE000
direct allocation
page execute and read and write
918000
heap
page read and write
43D1000
heap
page read and write
5E0000
heap
page read and write
43D1000
heap
page read and write
17E0000
unclassified section
page execute and read and write
E8EE000
stack
page read and write
4AD4000
system
page execute and read and write
E66E000
stack
page read and write
78CE000
heap
page read and write
240000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
8F0000
heap
page read and write
16C60000000
trusted library allocation
page read and write
78C4000
heap
page read and write
918000
heap
page read and write
818000
heap
page read and write
B2F000
stack
page read and write
43D1000
heap
page read and write
3CFC000
unkown
page read and write
16C601A5000
trusted library allocation
page read and write
4DB000
stack
page read and write
1F0000
unkown
page read and write
9D0000
unkown
page read and write
784E000
stack
page read and write
43D1000
heap
page read and write
16C5FF00000
trusted library allocation
page read and write
1251FFD000
stack
page read and write
610000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
9E0000
unkown
page read and write
A30000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
E8AF000
stack
page read and write
4724000
heap
page read and write
C83000
heap
page read and write
4ACA000
system
page execute and read and write
7590000
trusted library allocation
page read and write
16C60100000
trusted library allocation
page read and write
43D1000
heap
page read and write
5144000
unclassified section
page read and write
4F60000
trusted library allocation
page read and write
247C000
unkown
page read and write
43D1000
heap
page read and write
A00000
unkown
page readonly
CE8000
heap
page read and write
E0000
unkown
page readonly
9A4000
heap
page read and write
78A6000
heap
page read and write
43D1000
heap
page read and write
70BD000
heap
page read and write
1E40C000
system
page read and write
976000
heap
page read and write
28B0000
heap
page read and write
5DD4000
unclassified section
page read and write
114D000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
8F8000
heap
page read and write
578C000
unclassified section
page read and write
5C42000
unclassified section
page read and write
E76E000
stack
page read and write
2C4F000
trusted library allocation
page read and write
43D1000
heap
page read and write
734E000
stack
page read and write
3390000
unkown
page read and write
A01000
unkown
page execute read
4B5C000
stack
page read and write
16C60013000
trusted library allocation
page read and write
A0E000
unkown
page readonly
44F3000
heap
page read and write
43D1000
heap
page read and write
78AB000
heap
page read and write
29DB000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
77E000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
818000
heap
page read and write
270C000
unclassified section
page execute and read and write
2786000
trusted library allocation
page execute and read and write
9D0000
unkown
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
4F50000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
4859000
direct allocation
page execute and read and write
43D1000
heap
page read and write
485D000
direct allocation
page execute and read and write
AFBE000
stack
page read and write
90D000
heap
page read and write
4FA0000
trusted library allocation
page read and write
E80000
heap
page read and write
2270000
unkown
page readonly
31FE000
unkown
page read and write
9D4000
heap
page read and write
43D1000
heap
page read and write
78B5000
heap
page read and write
E4F000
stack
page read and write
43D1000
heap
page read and write
16C601C4000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
4FC0000
heap
page read and write
A01000
unkown
page execute read
43D1000
heap
page read and write
55FA000
unclassified section
page read and write
16C60021000
trusted library allocation
page read and write
43D1000
heap
page read and write
780000
unkown
page read and write
2362000
unkown
page read and write
4A82000
unclassified section
page read and write
4586000
heap
page read and write
A9C000
stack
page read and write
1E2F2000
system
page read and write
43D1000
heap
page read and write
43D0000
heap
page read and write
C30000
unkown
page readonly
43D1000
heap
page read and write
1C0000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
16BD000
direct allocation
page execute and read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
250000
unkown
page readonly
7F0000
heap
page read and write
78DF000
heap
page read and write
628A000
unclassified section
page read and write
E0000
unkown
page readonly
951000
heap
page read and write
65AE000
unclassified section
page read and write
9DA000
heap
page read and write
7A0000
unkown
page readonly
980000
heap
page read and write
4F62000
trusted library allocation
page read and write
39C1000
trusted library allocation
page read and write
945000
heap
page read and write
A0E000
unkown
page readonly
78E3000
heap
page read and write
6F9E000
heap
page read and write
43D1000
heap
page read and write
2896000
trusted library allocation
page read and write
180000
unkown
page readonly
7890000
trusted library allocation
page read and write
4405000
trusted library allocation
page read and write
12517FB000
stack
page read and write
23CF000
stack
page read and write
20BC000
unkown
page read and write
DD0000
trusted library allocation
page read and write
7F0F0000
trusted library allocation
page execute and read and write
180000
unkown
page readonly
E7AE000
stack
page read and write
944000
heap
page read and write
730000
heap
page read and write
4217000
trusted library allocation
page read and write
1D0000
unkown
page read and write
C0000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
78A000
stack
page read and write
2CA000
stack
page read and write
A15000
unkown
page read and write
976000
heap
page read and write
43D1000
heap
page read and write
C0000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
C18000
heap
page read and write
16C5E3DD000
system
page execute and read and write
1A0000
unkown
page readonly
2792000
trusted library allocation
page read and write
72CE000
stack
page read and write
9C2000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
D0000
unkown
page readonly
46AF000
heap
page read and write
630000
heap
page read and write
DD0000
trusted library allocation
page read and write
43D1000
heap
page read and write
2EDA000
unkown
page read and write
43D1000
heap
page read and write
8A4000
heap
page read and write
43D1000
heap
page read and write
158E000
direct allocation
page execute and read and write
16C5E360000
system
page execute and read and write
4AF2000
system
page execute and read and write
43D1000
heap
page read and write
A00000
unkown
page readonly
43D1000
heap
page read and write
4ED0000
trusted library allocation
page read and write
43D1000
heap
page read and write
E90000
heap
page read and write
43D1000
heap
page read and write
4730000
direct allocation
page execute and read and write
5130000
heap
page read and write
2782000
trusted library allocation
page read and write
B150000
trusted library allocation
page execute and read and write
16C6000E000
trusted library allocation
page read and write
43D1000
heap
page read and write
7300000
trusted library allocation
page execute and read and write
A30000
unkown
page readonly
43D1000
heap
page read and write
620000
unkown
page readonly
620000
unkown
page readonly
A17000
unkown
page readonly
43D1000
heap
page read and write
16C5E5A0000
heap
page read and write
5D0000
heap
page read and write
919000
heap
page read and write
190000
unkown
page readonly
43D1000
heap
page read and write
640000
heap
page read and write
43D1000
heap
page read and write
2BB6000
unkown
page read and write
A15000
unkown
page read and write
9C8000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
16C5E4A3000
heap
page read and write
EC1000
unkown
page readonly
710000
unkown
page read and write
B9B000
stack
page read and write
43D1000
heap
page read and write
A0E000
unkown
page readonly
4F20000
heap
page read and write
43D1000
heap
page read and write
721000
unkown
page readonly
263C000
unkown
page read and write
52D6000
unclassified section
page read and write
789E000
heap
page read and write
240000
unkown
page readonly
648000
heap
page read and write
43D1000
heap
page read and write
912000
heap
page read and write
4EC0000
trusted library allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
D0000
unkown
page readonly
910000
unkown
page read and write
43D0000
heap
page read and write
16C5E470000
heap
page read and write
49FD000
direct allocation
page execute and read and write
3B6A000
unkown
page read and write
710000
unkown
page read and write
CB9000
heap
page read and write
16C601BE000
trusted library allocation
page read and write
780000
unkown
page read and write
263C000
unkown
page read and write
43D1000
heap
page read and write
B480000
trusted library section
page read and write
955000
heap
page read and write
1130000
trusted library allocation
page read and write
50B0000
heap
page read and write
A17000
unkown
page readonly
13F0000
direct allocation
page execute and read and write
A17000
unkown
page readonly
721000
unkown
page readonly
20E4000
heap
page read and write
43D1000
heap
page read and write
98D000
heap
page read and write
72D0000
trusted library section
page read and write
16C5E4A3000
heap
page read and write
2870000
trusted library allocation
page read and write
16C60003000
trusted library allocation
page read and write
1E9B4000
system
page read and write
43D1000
heap
page read and write
4EB0000
trusted library allocation
page read and write
A01000
unkown
page execute read
8A0000
heap
page read and write
591E000
unclassified section
page read and write
630000
heap
page read and write
E610000
heap
page read and write
43D1000
heap
page read and write
1150000
trusted library allocation
page read and write
1738000
direct allocation
page execute and read and write
4B42000
unclassified section
page read and write
4D5C000
unclassified section
page read and write
744E000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
C38000
heap
page read and write
70CC000
heap
page read and write
43D1000
heap
page read and write
2891000
trusted library allocation
page read and write
BF0000
heap
page read and write
2A24000
unkown
page read and write
2A28000
trusted library allocation
page read and write
43D1000
heap
page read and write
A15000
unkown
page read and write
17D0000
heap
page read and write
B00000
heap
page read and write
6FC000
unkown
page readonly
964000
heap
page read and write
43D1000
heap
page read and write
16C5FD70000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
1380000
direct allocation
page read and write
43D1000
heap
page read and write
24C0000
unkown
page execute and read and write
2840000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
600000
unkown
page readonly
5AA9000
heap
page read and write
137F000
stack
page read and write
9D4000
heap
page read and write
1143000
trusted library allocation
page execute and read and write
B30000
unkown
page readonly
43D1000
heap
page read and write
CCD000
heap
page read and write
70D5000
heap
page read and write
14A000
stack
page read and write
909000
heap
page read and write
43D1000
heap
page read and write
16C5FE00000
heap
page read and write
71CE000
stack
page read and write
640000
heap
page read and write
287B000
trusted library allocation
page read and write
4B9C000
unclassified section
page read and write
43D1000
heap
page read and write
29C1000
trusted library allocation
page read and write
1D0000
unkown
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
1C0000
heap
page read and write
4650000
trusted library allocation
page execute and read and write
4F23000
heap
page read and write
279B000
trusted library allocation
page execute and read and write
997000
heap
page read and write
43D1000
heap
page read and write
1519000
direct allocation
page execute and read and write
72F0000
trusted library allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
3E8E000
unkown
page read and write
43D1000
heap
page read and write
78A0000
heap
page read and write
E9EF000
stack
page read and write
70B6000
heap
page read and write
1252FFF000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
20E0000
heap
page read and write
2270000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
545E000
stack
page read and write
600000
unkown
page readonly
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
E60F000
stack
page read and write
27B0000
trusted library allocation
page read and write
8A4000
heap
page read and write
70E1000
heap
page read and write
5120000
trusted library allocation
page read and write
6BB2000
trusted library allocation
page read and write
EB8000
heap
page read and write
20E4000
heap
page read and write
CB3000
heap
page read and write
43D1000
heap
page read and write
16C601CE000
trusted library allocation
page read and write
43D1000
heap
page read and write
C45000
heap
page read and write
78C9000
heap
page read and write
2790000
trusted library allocation
page read and write
16C5E47F000
heap
page read and write
277E000
unclassified section
page execute and read and write
6F90000
heap
page read and write
2797000
trusted library allocation
page execute and read and write
5AA0000
heap
page read and write
640000
unkown
page readonly
7D0000
heap
page read and write
4EC5000
trusted library allocation
page read and write
1160000
heap
page read and write
43D1000
heap
page read and write
EE5000
heap
page read and write
620000
unkown
page readonly
5F66000
unclassified section
page read and write
207E000
stack
page read and write
43D1000
heap
page read and write
990000
heap
page read and write
16C5E479000
heap
page read and write
288E000
trusted library allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
C52000
heap
page read and write
9D0000
heap
page read and write
16C5FE10000
trusted library allocation
page read and write
16C5E48C000
heap
page read and write
9B7000
heap
page read and write
2160000
heap
page read and write
43D1000
heap
page read and write
912000
heap
page read and write
758E000
stack
page read and write
78B8000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
7B0000
heap
page read and write
5AB0000
unclassified section
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
60E000
stack
page read and write
283B000
stack
page read and write
7450000
heap
page read and write
43D1000
heap
page read and write
3CC000
stack
page read and write
78DA000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
648000
heap
page read and write
1144000
trusted library allocation
page read and write
1A0000
unkown
page readonly
60F8000
unclassified section
page read and write
A00000
unkown
page readonly
90D000
heap
page read and write
16C5E49C000
heap
page read and write
EC0000
unkown
page readonly
912000
heap
page read and write
1153000
trusted library allocation
page read and write
49C8000
trusted library allocation
page read and write
2CA000
stack
page read and write
D4E000
stack
page read and write
4C6C000
unkown
page read and write
A15000
unkown
page read and write
7A0000
unkown
page readonly
43D1000
heap
page read and write
250000
unkown
page readonly
43D1000
heap
page read and write
16C60017000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
4EF0000
heap
page execute and read and write
23D0000
unkown
page readonly
912000
heap
page read and write
CA5000
heap
page read and write
78D5000
heap
page read and write
890000
heap
page read and write
641C000
unclassified section
page read and write
4AE4000
system
page execute and read and write
65F000
heap
page read and write
5355000
heap
page read and write
16C60101000
trusted library allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
20E0000
heap
page read and write
45A0000
trusted library allocation
page read and write
969000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
642000
unkown
page readonly
260000
unkown
page readonly
1F0000
unkown
page read and write
2780000
trusted library allocation
page read and write
43D1000
heap
page read and write
730000
heap
page read and write
43D1000
heap
page read and write
788E000
stack
page read and write
2422000
unkown
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
16B6000
direct allocation
page execute and read and write
B00000
trusted library allocation
page read and write
9AE000
heap
page read and write
C1E000
heap
page read and write
78A1000
heap
page read and write
43D1000
heap
page read and write
5468000
unclassified section
page read and write
43D1000
heap
page read and write
960000
heap
page read and write
951000
heap
page read and write
50E0000
trusted library allocation
page read and write
44DE000
heap
page read and write
964000
heap
page read and write
16C5E4A0000
heap
page read and write
3846000
unkown
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
78EE000
heap
page read and write
43D1000
heap
page read and write
4B47000
system
page execute and read and write
2160000
heap
page read and write
B130000
trusted library allocation
page read and write
345E000
unkown
page execute and read and write
78DA000
heap
page read and write
43D1000
heap
page read and write
A00000
unkown
page readonly
7B0000
heap
page read and write
16A1000
direct allocation
page execute and read and write
7D5000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
4A01000
direct allocation
page execute and read and write
43D1000
heap
page read and write
AF7000
stack
page read and write
43D1000
heap
page read and write
2D48000
unkown
page read and write
43D1000
heap
page read and write
912000
heap
page read and write
4FC000
stack
page read and write
A01000
unkown
page execute read
27FE000
stack
page read and write
4EA0000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
5ACE000
heap
page read and write
810000
heap
page read and write
16C5FE10000
trusted library allocation
page read and write
43D1000
heap
page read and write
AFFD000
stack
page read and write
43D1000
heap
page read and write
4F00000
trusted library allocation
page read and write
260000
unkown
page readonly
43D1000
heap
page read and write
9BD000
heap
page read and write
1B0000
heap
page read and write
39D8000
unkown
page read and write
115D000
trusted library allocation
page execute and read and write
C31000
unkown
page readonly
151D000
direct allocation
page execute and read and write
3522000
unkown
page read and write
4FB0000
trusted library section
page readonly
43D1000
heap
page read and write
F9F000
stack
page read and write
84F000
heap
page read and write
3C9000
unkown
page read and write
1E3B2000
system
page read and write
97B000
heap
page read and write
43D1000
heap
page read and write
8A4000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
190000
unkown
page readonly
14A000
stack
page read and write
6B90000
trusted library allocation
page read and write
78B0000
heap
page read and write
226F000
stack
page read and write
43D1000
heap
page read and write
801F000
stack
page read and write
910000
unkown
page read and write
46B3000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
16C5E3DA000
system
page execute and read and write
BC0000
heap
page read and write
33EC000
unkown
page execute and read and write
1B0000
heap
page read and write
1E1000
unkown
page readonly
9D0000
heap
page read and write
43D1000
heap
page read and write
78E1000
heap
page read and write
610000
unkown
page readonly
43D1000
heap
page read and write
DD0000
trusted library allocation
page read and write
955000
heap
page read and write
1E1000
unkown
page readonly
16C5E4B0000
heap
page read and write
83F000
stack
page read and write
43D1000
heap
page read and write
50AC000
stack
page read and write
B30000
unkown
page readonly
43D1000
heap
page read and write
There are 639 hidden memdumps, click here to show them.