IOC Report
Mandatory Notice for all December Leave and Vacation application.exe

loading gif

Files

File Path
Type
Category
Malicious
Mandatory Notice for all December Leave and Vacation application.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\40473HJ96
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\autB2CC.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\biopsies
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Mandatory Notice for all December Leave and Vacation application.exe
"C:\Users\user\Desktop\Mandatory Notice for all December Leave and Vacation application.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Mandatory Notice for all December Leave and Vacation application.exe"
malicious
C:\Program Files (x86)\MUFnPpuRrYrwfjUjfKAuYHwNYEImJSfvrGiLWOEybpPmG\eAdBvdCMNQkVZK.exe
"C:\Program Files (x86)\MUFnPpuRrYrwfjUjfKAuYHwNYEImJSfvrGiLWOEybpPmG\eAdBvdCMNQkVZK.exe"
malicious
C:\Windows\SysWOW64\Utilman.exe
"C:\Windows\SysWOW64\Utilman.exe"
malicious
C:\Program Files (x86)\MUFnPpuRrYrwfjUjfKAuYHwNYEImJSfvrGiLWOEybpPmG\eAdBvdCMNQkVZK.exe
"C:\Program Files (x86)\MUFnPpuRrYrwfjUjfKAuYHwNYEImJSfvrGiLWOEybpPmG\eAdBvdCMNQkVZK.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.rgenerousrs.store/zr8v/
172.67.167.146
malicious
http://www.tals.xyz/stx5/
13.248.169.48
malicious
http://www.hobbihub.info/i5gf/
209.74.77.108
malicious
http://www.conansog.shop/us5e/
104.21.41.74
malicious
http://www.76kdd.top/6rpr/
38.47.232.194
malicious
http://www.sipdontshoot.net/ejy6/
216.40.34.41
malicious
https://www.hover.com/domain_pricing?source=parked
unknown
https://www.hover.com/privacy?source=parked
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://twitter.com/hover
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.instagram.com/hover_domains
unknown
https://www.hover.com/transfer_in?source=parked
unknown
https://www.hover.com/renew?source=parked
unknown
https://login.live.c
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://www.hover.com/email?source=parked
unknown
https://www.hover.com/about?source=parked
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.hover.com/domains/results
unknown
https://www.hover.com/tos?source=parked
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.76kdd.top
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.hover.com/tools?source=parked
unknown
https://help.hover.com/home?source=parked
unknown
https://www.hover.com/?source=parked
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hobbihub.info
209.74.77.108
malicious
76kdd.top
38.47.232.194
malicious
www.conansog.shop
104.21.41.74
malicious
www.sipdontshoot.net
216.40.34.41
malicious
www.tals.xyz
13.248.169.48
malicious
www.rgenerousrs.store
172.67.167.146
malicious
www.7261ltajbc.bond
154.12.28.184
malicious
www.76kdd.top
unknown

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.tals.xyz
United States
malicious
209.74.77.108
www.hobbihub.info
United States
malicious
172.67.167.146
www.rgenerousrs.store
United States
malicious
154.12.28.184
www.7261ltajbc.bond
United States
malicious
38.47.232.194
76kdd.top
United States
malicious
104.21.41.74
www.conansog.shop
United States
malicious
216.40.34.41
www.sipdontshoot.net
Canada
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
37A0000
unclassified section
page execute and read and write
malicious
2A00000
system
page execute and read and write
malicious
6800000
unclassified section
page execute and read and write
malicious
5940000
unkown
page execute and read and write
malicious
46C0000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
4710000
trusted library allocation
page read and write
malicious
13D0000
unkown
page read and write
D5E000
unkown
page readonly
D65000
unkown
page read and write
45A1000
heap
page read and write
13B0000
heap
page read and write
1390000
unkown
page read and write
186C000
heap
page read and write
487A000
heap
page read and write
3BD1000
direct allocation
page execute and read and write
4D12000
unclassified section
page read and write
45A1000
heap
page read and write
2CAF000
stack
page read and write
1410000
unkown
page readonly
D51000
unkown
page execute read
17A1000
unkown
page readonly
2BA8000
heap
page read and write
1310000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
2BB3000
heap
page read and write
7CE5000
heap
page read and write
193F1E3C000
heap
page read and write
4C42000
direct allocation
page execute and read and write
45A1000
heap
page read and write
4F2C000
unclassified section
page read and write
C8C000
stack
page read and write
45A1000
heap
page read and write
13F8000
heap
page read and write
45A1000
heap
page read and write
41DD000
direct allocation
page read and write
3013000
heap
page read and write
45A1000
heap
page read and write
103A000
unkown
page read and write
45A1000
heap
page read and write
4BCD000
direct allocation
page execute and read and write
10E0000
unkown
page read and write
1A4E000
heap
page read and write
3013000
heap
page read and write
5400000
unclassified section
page execute and read and write
45A1000
heap
page read and write
54A6000
unclassified section
page read and write
2BD6000
heap
page read and write
45A1000
heap
page read and write
1888000
heap
page read and write
B10000
unkown
page readonly
55B1000
system
page execute and read and write
2B32000
heap
page read and write
45A1000
heap
page read and write
2B91000
heap
page read and write
2B37000
heap
page read and write
102E000
unkown
page readonly
193F39CE000
trusted library allocation
page read and write
45A1000
heap
page read and write
2EDE000
stack
page read and write
3040000
heap
page read and write
13C0000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
2B37000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
1380000
heap
page read and write
F90000
unkown
page readonly
45A1000
heap
page read and write
4900000
direct allocation
page execute and read and write
2DC0000
heap
page read and write
1580000
direct allocation
page read and write
1284000
heap
page read and write
45A1000
heap
page read and write
57CA000
unclassified section
page read and write
45A1000
heap
page read and write
2B2E000
heap
page read and write
45A1000
heap
page read and write
3F10000
direct allocation
page read and write
133C000
stack
page read and write
CD0000
unkown
page readonly
B20000
unkown
page readonly
2BF2000
heap
page read and write
424E000
direct allocation
page read and write
4033000
direct allocation
page read and write
45A1000
heap
page read and write
F089FE000
stack
page read and write
193F380F000
trusted library allocation
page read and write
1280000
heap
page read and write
13A1000
unkown
page readonly
2B76000
heap
page read and write
F81000
unkown
page execute read
193F1C74000
system
page execute and read and write
13B0000
heap
page read and write
193F3620000
heap
page read and write
3217000
heap
page read and write
F0A1FE000
stack
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
D5E000
unkown
page readonly
45A1000
heap
page read and write
1885000
heap
page read and write
193F1E10000
heap
page read and write
324A000
heap
page read and write
3013000
heap
page read and write
45A1000
heap
page read and write
7D59000
heap
page read and write
2AE0000
heap
page read and write
2B3D000
heap
page read and write
3CCE000
unkown
page read and write
3BC0000
heap
page read and write
2D90000
heap
page read and write
6344000
unkown
page execute and read and write
45A1000
heap
page read and write
48D0000
trusted library allocation
page read and write
7204000
unclassified section
page execute and read and write
41DD000
direct allocation
page read and write
1A4A000
heap
page read and write
2EF2000
unkown
page read and write
45A1000
heap
page read and write
102E000
unkown
page readonly
193F1E43000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
2B6F000
heap
page read and write
4A29000
direct allocation
page execute and read and write
1390000
unkown
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
3F10000
direct allocation
page read and write
45A1000
heap
page read and write
7D54000
heap
page read and write
18D1000
heap
page read and write
7D22000
heap
page read and write
4751000
heap
page read and write
45A1000
heap
page read and write
1A56000
heap
page read and write
40B0000
direct allocation
page read and write
45A1000
heap
page read and write
13D0000
unkown
page read and write
45A1000
heap
page read and write
48EF000
heap
page read and write
3829000
heap
page read and write
133C000
stack
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
193F1E43000
heap
page read and write
193F3901000
trusted library allocation
page read and write
45A1000
heap
page read and write
1120000
heap
page read and write
45A1000
heap
page read and write
1410000
unkown
page readonly
D51000
unkown
page execute read
45A1000
heap
page read and write
45A1000
heap
page read and write
2D5A000
stack
page read and write
41D9000
direct allocation
page read and write
DEE000
stack
page read and write
13C0000
heap
page read and write
7D46000
heap
page read and write
31C42000
system
page read and write
1310000
heap
page read and write
D5E000
unkown
page readonly
45A1000
heap
page read and write
2B2C000
heap
page read and write
3700000
heap
page read and write
BF0000
heap
page read and write
3217000
heap
page read and write
2B95000
heap
page read and write
203E000
stack
page read and write
45A1000
heap
page read and write
40B0000
direct allocation
page read and write
45A1000
heap
page read and write
3205000
heap
page read and write
1889000
heap
page read and write
2B32000
heap
page read and write
1700000
unkown
page readonly
193F3900000
trusted library allocation
page read and write
45A1000
heap
page read and write
3013000
heap
page read and write
5638000
unclassified section
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
3B3C000
unkown
page read and write
193F3700000
trusted library allocation
page read and write
148B000
stack
page read and write
13F8000
heap
page read and write
D65000
unkown
page read and write
122F000
stack
page read and write
7D5B000
heap
page read and write
1125000
heap
page read and write
39AA000
unkown
page read and write
45A1000
heap
page read and write
3013000
heap
page read and write
2B82000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
D81000
unkown
page readonly
3E01000
heap
page read and write
10F0000
unkown
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
4033000
direct allocation
page read and write
45A0000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
2D1F000
stack
page read and write
193F39C4000
trusted library allocation
page read and write
3F10000
direct allocation
page read and write
45A1000
heap
page read and write
193F39A7000
trusted library allocation
page read and write
2A94000
heap
page read and write
424E000
direct allocation
page read and write
45A1000
heap
page read and write
3000000
unkown
page read and write
D3E000
stack
page read and write
7D4B000
heap
page read and write
2D30000
heap
page read and write
45A1000
heap
page read and write
7C8E000
stack
page read and write
F099FE000
stack
page read and write
122F000
stack
page read and write
45A1000
heap
page read and write
5AEE000
unclassified section
page read and write
45A1000
heap
page read and write
5592000
system
page execute and read and write
1889000
heap
page read and write
45A1000
heap
page read and write
1840000
heap
page read and write
2FE0000
unkown
page readonly
46A0000
heap
page read and write
1284000
heap
page read and write
45A1000
heap
page read and write
1044000
unkown
page readonly
45A1000
heap
page read and write
3BCD000
direct allocation
page execute and read and write
2D30000
heap
page read and write
45A1000
heap
page read and write
3200000
heap
page read and write
187C000
heap
page read and write
40B0000
direct allocation
page read and write
D67000
unkown
page readonly
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
1936000
heap
page read and write
364E000
stack
page read and write
243E000
stack
page read and write
BE0000
heap
page read and write
1370000
unkown
page readonly
2DD0000
heap
page read and write
4810000
trusted library allocation
page execute and read and write
37A0000
direct allocation
page read and write
126C000
unkown
page read and write
45A1000
heap
page read and write
1350000
unkown
page readonly
5540000
system
page execute and read and write
45A1000
heap
page read and write
2D70000
heap
page read and write
45A1000
heap
page read and write
193F1D10000
heap
page read and write
7D3F000
heap
page read and write
45A1000
heap
page read and write
3000000
heap
page read and write
27E8000
stack
page read and write
3013000
heap
page read and write
45A1000
heap
page read and write
3044000
heap
page read and write
DF0000
unkown
page readonly
4033000
direct allocation
page read and write
2E32000
unkown
page read and write
F80000
unkown
page readonly
3500000
heap
page read and write
1280000
heap
page read and write
D65000
unkown
page read and write
7D36000
heap
page read and write
3C42000
direct allocation
page execute and read and write
D50000
unkown
page readonly
45A1000
heap
page read and write
D90000
unkown
page read and write
193F3800000
trusted library allocation
page read and write
100D000
unkown
page readonly
45A1000
heap
page read and write
D65000
unkown
page read and write
2BC4000
heap
page read and write
45A1000
heap
page read and write
1690000
heap
page read and write
45A1000
heap
page read and write
7E60000
trusted library allocation
page read and write
321B000
heap
page read and write
1350000
unkown
page readonly
45A1000
heap
page read and write
7CE1000
heap
page read and write
123A000
stack
page read and write
487E000
heap
page read and write
193F1C72000
system
page execute and read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
3750000
direct allocation
page read and write
2F4C000
unkown
page read and write
45A1000
heap
page read and write
1937000
heap
page read and write
45A1000
heap
page read and write
41DD000
direct allocation
page read and write
F90000
unkown
page readonly
3F10000
direct allocation
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
4A9E000
direct allocation
page execute and read and write
2B9B000
heap
page read and write
1A4E000
heap
page read and write
2F80000
heap
page read and write
41DD000
direct allocation
page read and write
D40000
unkown
page read and write
3245000
heap
page read and write
193F1E40000
heap
page read and write
2B87000
heap
page read and write
3000000
unkown
page read and write
4A2D000
direct allocation
page execute and read and write
1044000
unkown
page readonly
45A1000
heap
page read and write
40B0000
direct allocation
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
48C0000
trusted library allocation
page read and write
E9B000
unkown
page read and write
2BA8000
heap
page read and write
CE0000
unkown
page readonly
D50000
unkown
page readonly
3044000
heap
page read and write
2A94000
heap
page read and write
4760000
trusted library allocation
page read and write
D51000
unkown
page execute read
45A1000
heap
page read and write
7CEA000
heap
page read and write
45A1000
heap
page read and write
CE0000
unkown
page readonly
4F40000
unkown
page execute and read and write
2B37000
heap
page read and write
389E000
heap
page read and write
CF0000
heap
page read and write
847E000
stack
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
100D000
unkown
page readonly
45A1000
heap
page read and write
5605000
system
page execute and read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
424E000
direct allocation
page read and write
45A1000
heap
page read and write
7990000
trusted library allocation
page read and write
3818000
unkown
page read and write
FA0000
unkown
page readonly
2FE0000
unkown
page readonly
CC0000
unkown
page readonly
7277000
unclassified section
page execute and read and write
7D12000
heap
page read and write
2BFD000
heap
page read and write
D81000
unkown
page readonly
45A1000
heap
page read and write
193F3814000
trusted library allocation
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
1889000
heap
page read and write
5314000
unclassified section
page read and write
147E000
stack
page read and write
1318000
heap
page read and write
2D40000
unkown
page readonly
17A1000
unkown
page readonly
C8C000
stack
page read and write
45A1000
heap
page read and write
3BC4000
heap
page read and write
F80000
unkown
page readonly
D67000
unkown
page readonly
1600000
heap
page read and write
7DCB000
heap
page read and write
4033000
direct allocation
page read and write
3245000
heap
page read and write
350E000
stack
page read and write
310C000
unkown
page read and write
424E000
direct allocation
page read and write
34F4000
unkown
page read and write
45A1000
heap
page read and write
3050000
unkown
page readonly
45A1000
heap
page read and write
3F10000
direct allocation
page read and write
2B95000
heap
page read and write
37A0000
direct allocation
page read and write
424E000
direct allocation
page read and write
2A94000
heap
page read and write
2B2E000
heap
page read and write
374F000
stack
page read and write
7CFA000
heap
page read and write
382D000
heap
page read and write
3F10000
direct allocation
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
F081FC000
stack
page read and write
2BC2000
heap
page read and write
CF0000
heap
page read and write
7D1D000
heap
page read and write
2B3D000
heap
page read and write
FA0000
unkown
page readonly
2BBF000
heap
page read and write
45A1000
heap
page read and write
1700000
unkown
page readonly
46C3000
heap
page read and write
84BF000
stack
page read and write
4033000
direct allocation
page read and write
3002000
heap
page read and write
2BEC000
heap
page read and write
CD0000
unkown
page readonly
45A1000
heap
page read and write
193F1E50000
heap
page read and write
45A1000
heap
page read and write
D40000
unkown
page read and write
1A4A000
heap
page read and write
360F000
stack
page read and write
1100000
unkown
page read and write
D67000
unkown
page readonly
1A49000
heap
page execute and read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
14AC000
stack
page read and write
D5E000
unkown
page readonly
187B000
heap
page read and write
3140000
unkown
page execute and read and write
3013000
heap
page read and write
45A1000
heap
page read and write
2E32000
unkown
page read and write
48C0000
trusted library allocation
page read and write
2B18000
heap
page read and write
F0E000
stack
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
4540000
unkown
page execute and read and write
1380000
heap
page read and write
2BF7000
heap
page read and write
3040000
heap
page read and write
2B37000
heap
page read and write
45A1000
heap
page read and write
2B9B000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
193F3640000
trusted library allocation
page read and write
45A1000
heap
page read and write
2B4A000
heap
page read and write
B8A000
stack
page read and write
7CD3000
heap
page read and write
3013000
heap
page read and write
41D9000
direct allocation
page read and write
3686000
unkown
page read and write
41D9000
direct allocation
page read and write
B20000
unkown
page readonly
45A1000
heap
page read and write
7D18000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
B00000
unkown
page readonly
2B37000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
2A80000
heap
page read and write
46A0000
trusted library allocation
page read and write
45A1000
heap
page read and write
123A000
stack
page read and write
3013000
heap
page read and write
4A00000
unclassified section
page execute and read and write
B8A000
stack
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
324A000
heap
page read and write
193F3821000
trusted library allocation
page read and write
45A1000
heap
page read and write
FB0000
unkown
page readonly
45A1000
heap
page read and write
424E000
direct allocation
page read and write
41D9000
direct allocation
page read and write
3623000
heap
page read and write
3B40000
unkown
page execute and read and write
55AE000
system
page execute and read and write
2ADE000
stack
page read and write
13A1000
unkown
page readonly
4033000
direct allocation
page read and write
2BCC000
heap
page read and write
45A1000
heap
page read and write
1A91000
unkown
page readonly
7C4E000
stack
page read and write
2B91000
heap
page read and write
3A9E000
direct allocation
page execute and read and write
193F1C70000
system
page execute and read and write
40B0000
direct allocation
page read and write
2B37000
heap
page read and write
45A0000
heap
page read and write
D50000
unkown
page readonly
1370000
unkown
page readonly
1560000
heap
page read and write
3900000
direct allocation
page execute and read and write
45A1000
heap
page read and write
310C000
unkown
page read and write
55A2000
system
page execute and read and write
7CC1000
heap
page read and write
1936000
heap
page read and write
2BB9000
heap
page read and write
45A1000
heap
page read and write
2A90000
heap
page read and write
2D40000
unkown
page readonly
2D1C000
stack
page read and write
1A91000
unkown
page readonly
45A1000
heap
page read and write
3013000
heap
page read and write
3A2D000
direct allocation
page execute and read and write
1120000
heap
page read and write
48C0000
trusted library allocation
page read and write
45A1000
heap
page read and write
B00000
unkown
page readonly
CC0000
unkown
page readonly
63B7000
unkown
page execute and read and write
45A1000
heap
page read and write
7DC1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
41D9000
direct allocation
page read and write
184A000
heap
page read and write
76B000
stack
page read and write
4D6C000
unclassified section
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
3212000
heap
page read and write
45A1000
heap
page read and write
41DD000
direct allocation
page read and write
D90000
unkown
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
3013000
heap
page read and write
184E000
heap
page read and write
D3E000
stack
page read and write
16FF000
stack
page read and write
2FDF000
stack
page read and write
D67000
unkown
page readonly
10E0000
unkown
page read and write
31B82000
system
page read and write
193F3812000
trusted library allocation
page read and write
34D0000
direct allocation
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
3205000
heap
page read and write
193F1BF0000
system
page execute and read and write
45A1000
heap
page read and write
4C52000
unclassified section
page read and write
1A4A000
heap
page read and write
4000000
unclassified section
page execute and read and write
3013000
heap
page read and write
F81000
unkown
page execute read
321A000
heap
page read and write
3232000
heap
page read and write
45A1000
heap
page read and write
2BC9000
heap
page read and write
45A1000
heap
page read and write
146B000
stack
page read and write
2B33000
heap
page read and write
1360000
unkown
page readonly
45A1000
heap
page read and write
41DD000
direct allocation
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
15FE000
stack
page read and write
45A1000
heap
page read and write
B10000
unkown
page readonly
45A1000
heap
page read and write
3A29000
direct allocation
page execute and read and write
193F39BE000
trusted library allocation
page read and write
5589000
system
page execute and read and write
595C000
unclassified section
page read and write
13F0000
heap
page read and write
2B10000
heap
page read and write
193F1E2D000
heap
page read and write
3013000
heap
page read and write
45A1000
heap
page read and write
193F3640000
trusted library allocation
page read and write
37A0000
direct allocation
page read and write
3219000
heap
page read and write
1360000
unkown
page readonly
FB0000
unkown
page readonly
40B0000
direct allocation
page read and write
4BD1000
direct allocation
page execute and read and write
80B0000
heap
page read and write
D50000
unkown
page readonly
3050000
unkown
page readonly
31E5C000
system
page read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
193F380A000
trusted library allocation
page read and write
F4E000
stack
page read and write
13F0000
heap
page read and write
45A1000
heap
page read and write
193F1E19000
heap
page read and write
3013000
heap
page read and write
193F3610000
heap
page read and write
F091FE000
stack
page read and write
7D50000
heap
page read and write
7CDB000
heap
page read and write
103A000
unkown
page write copy
45A1000
heap
page read and write
103F000
unkown
page write copy
41D9000
direct allocation
page read and write
5E00000
unclassified section
page execute and read and write
45A1000
heap
page read and write
45A1000
heap
page read and write
193F3803000
trusted library allocation
page read and write
DF0000
unkown
page readonly
570C000
unkown
page read and write
3301000
heap
page read and write
132F000
heap
page read and write
D51000
unkown
page execute read
45A1000
heap
page read and write
1318000
heap
page read and write
2B2C000
heap
page read and write
B79000
stack
page read and write
There are 623 hidden memdumps, click here to show them.