IOC Report
Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\72Z53078
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\autD8D5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\carryover
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation.exe
"C:\Users\user\Desktop\Quotation.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Quotation.exe"
malicious
C:\Program Files (x86)\evLZhTKsSoJaTeHwunreBLQaAdAFHannUBEkMPXIArxtpoioKKpnXKStzIBMzS\iEbayRsPzr.exe
"C:\Program Files (x86)\evLZhTKsSoJaTeHwunreBLQaAdAFHannUBEkMPXIArxtpoioKKpnXKStzIBMzS\iEbayRsPzr.exe"
malicious
C:\Windows\SysWOW64\pcaui.exe
"C:\Windows\SysWOW64\pcaui.exe"
malicious
C:\Program Files (x86)\evLZhTKsSoJaTeHwunreBLQaAdAFHannUBEkMPXIArxtpoioKKpnXKStzIBMzS\iEbayRsPzr.exe
"C:\Program Files (x86)\evLZhTKsSoJaTeHwunreBLQaAdAFHannUBEkMPXIArxtpoioKKpnXKStzIBMzS\iEbayRsPzr.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
http://www.mrpokrovskii.pro/2pji/?GzeXFT7=67iA4TPPdQ9nEroy4uzQwLjmbdlqhQsEvI1Cgt9ewFwChBdA65DXjWpTSdFtRBveCaF8GV/HBCb4pJoPY3YT7wZt3N4B7jiHnWlWePCYt+UXdYLjL0ZgeX4=&aJZ=OnOxa0A0n0BXj0
194.85.61.76
https://dts.gnpge.com
unknown
https://duckduckgo.com/ac/?q=
unknown
http://i1.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
http://www.3kw40881107247y.click/6wln/
172.67.192.207
http://www.ampsamkok88.shop/huvt/?aJZ=OnOxa0A0n0BXj0&GzeXFT7=yxXU4HpAbhaf+Ok3Aej6zxGwiCQCqWNYYa9VbkZ8i0eD7fFgPye8gqdK566WGP/XcS8CMkxomySFTtdD4uVPbkXZZc5h44QYxsw3x5GAutS7NMZYCP3hSt0=
172.67.209.48
http://www.70kdd.top/klhq/?GzeXFT7=AHY/rhT5FAaHaOQvyjmolPV0Gci6vpbrO2rEekNoUo4JX0G52JlH+4AuLBXgGUSDwTLgniL6s02sZcl+Gf8+kcDBiU8NkZcujbIB4aDN0RaZvptmL2rjFAE=&aJZ=OnOxa0A0n0BXj0
38.47.232.124
https://cdn.consentmanager.net
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
http://www.matteicapital.online/Funds.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1SZmvSimxwvd
unknown
http://www.questmatch.pro/z3ox/
172.67.138.37
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.bser101pp.buzz/crrp/?GzeXFT7=upjfZKq4/ZGfoF/MvQQxhfVT264zV9bCPxdbSO05fQ4zSiP5+UGAxJqZOtAYqZWCOef+BeM6z+3JdRqWgtx/nGZJ+pHk7Nqqe9OIf3jZd8YCzRO5KH2eHFc=&aJZ=OnOxa0A0n0BXj0
104.21.58.90
https://www.bt.cn/?from=404
unknown
http://www.matteicapital.online/hyyd/?aJZ=OnOxa0A0n0BXj0&GzeXFT7=fqlLWWUWU+rKW3Ee0UVO0B/wSDzUS5U2hpWkksgzCQayp6WkBROPj8SoyGxHGehCRFG0wA/ATtWP72Uz33qXwTX1CxmsRTufMD7rgZabFSEYAFPL6HYYC58=
208.91.197.27
http://www.smartcongress.net/11t3/
146.88.233.115
http://www.llljjjiii.shop/rsvy/?GzeXFT7=r8TqL8lVmKhCyKgitQBFywHntQnNTxsH+3nLHstVk9be2gQWJEXa9NKMMz87e0tjGxvoPEvy6SLnfdtsmt5rXvvnrxwIlwzliiyA/L7dY/WJb14Y701b98g=&aJZ=OnOxa0A0n0BXj0
8.210.114.150
http://www.gogawithme.live/6gtt/?GzeXFT7=SGA0vAB7ljjiJZB705auu5nMqwjvdcjZK6uCbLTCC3HP5ur0cn6Abe6/hzp/g4dh4YOAUYGeqr6sPYYs6bnbZvGne3nysZQrZ3blxXWxNHaQaYJ6iy4iy6k=&aJZ=OnOxa0A0n0BXj0
209.74.77.109
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://i1.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
unknown
https://www.google.com
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
http://www.ytsd88.top/egqi/?GzeXFT7=b73RclDzsQx9LNfKXEn0LSRo1QZueGUUZl7U/15lM3StUAJAIINJCW5I+z7gQYXdXqIUVixe3UGJ61mgF9Q8iuZq94lDlsrAFGhvrGfR3NsOl2e42KNKrIU=&aJZ=OnOxa0A0n0BXj0
47.76.213.197
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
http://www.matteicapital.online/Capital.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1SZmvSimxw
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
http://www.acond-22-mvr.click/w9z4/?GzeXFT7=68uIQ7XuXrYyzH3jGwxTrPeynRmH3PyAWnVnC6Q+cYkMiUv2YFR7SOjLNBcUXcnE4X2lRQ1sPBZfnUN4AIhfdceGGDC9QtpScRVRYhm/IS5VlT3jRiR+euo=&aJZ=OnOxa0A0n0BXj0
199.59.243.227
http://i1.cdn-image.com/__media__/pics/28903/search.png)
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://i1.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
http://www.matteicapital.online/Home_Equity_Rates.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP
unknown
http://www.questmatch.pro/z3ox/?GzeXFT7=XRVN9XS8GrL3N+/zP5xupTrPTPxZEWj65QayKB69AEGBKWegVMYG7P4Sa4h2i8A2rJx8M9mN63brSxfD4lNhTkfYyaZjFsNsjC0F7uv9kyVhrOa9L+DA6gc=&aJZ=OnOxa0A0n0BXj0
172.67.138.37
http://www.3kw40881107247y.click/6wln/?aJZ=OnOxa0A0n0BXj0&GzeXFT7=gk6EUi6sTSAX9bdw0FF5qpRAaiCMK60Ih0859QLLBHNHxoVqcUaJ5GMhXvTh6fdanKOBrZcLB2201dVdXc1CFZPk2QWw1QtBA7h//Mif1prUBHwa19uPi+o=
172.67.192.207
https://delivery.consentmanager.net
unknown
http://www.canadavinreport.site/cvhb/?GzeXFT7=eb9ahS5GFYDOhq0WWSJwR0pgVyjGk3ZRXDTXF/EDnGWOAiF9jJHx+uvzEaHIq78+HHS43fAza3sJA+7AAuSe3+c8RKpZ8QdwyK2YX5FHCjlm36TVHFBRCwU=&aJZ=OnOxa0A0n0BXj0
185.27.134.206
http://www.mrpokrovskii.pro/2pji/
194.85.61.76
http://i1.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
unknown
http://www.70kdd.top/klhq/
38.47.232.124
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
http://www.matteicapital.online/Interest.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1SZmvSimx
unknown
http://www.bser101pp.buzz/crrp/
104.21.58.90
http://www.acond-22-mvr.click/w9z4/
199.59.243.227
http://www.llljjjiii.shop/rsvy/
8.210.114.150
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.smartcongress.net/11t3/?GzeXFT7=BoXQYlgPFtFW2+QFcsMkz8ZnQyv1gPD9OGXhxFZv9pg5w5kxRGgY33EbCKURTw9NMXrcECQepab13HCWL01336IGNy75YpYvoXliURpgNXuxXH/BaJU0H7s=&aJZ=OnOxa0A0n0BXj0
146.88.233.115
https://www.ecosia.org/newtab/
unknown
http://www.matteicapital.online/__media__/js/trademark.php?d=matteicapital.online&type=ns
unknown
http://www.rtpterbaruwaktu3.xyz/7yx4/?aJZ=OnOxa0A0n0BXj0&GzeXFT7=m5A4fx9ZIvMjycGTXvyw9uJmE8MC06yi7dKiWry0Mz65334dxjvJlwP/oWrLHd67Yf3RW+voxQmVQwC1SSJQczXh8T6WPeXIwty/TEDOHxdjdmbI+7yKQjQ=
103.21.221.87
https://ac.ecosia.org/autocomplete?q=
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://www.ampsamkok88.shop/huvt/
172.67.209.48
http://www.canadavinreport.site/cvhb/?GzeXFT7=eb9ahS5GFYDOhq0WWSJwR0pgVyjGk3ZRXDTXF/EDnGWOAiF9jJHx
unknown
http://www.matteicapital.online/Angel_Investors.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1S
unknown
http://www.3kw40881107247y.click
unknown
http://www.gogawithme.live/6gtt/
209.74.77.109
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
http://www.ytsd88.top/egqi/
47.76.213.197
http://www.54248711.xyz/jm2l/?aJZ=OnOxa0A0n0BXj0&GzeXFT7=M21ir/NSFfGrmB4sne/SCCGX/e/txCX4RaXyCSFwSSwtaZs5yH0UEptpPba+9Px3pipv0aZDZRRy+Xo/jJmyn/BAme0mP+U7kiozXG5r1hn7yWn0dKNvWy4=
161.97.142.144
http://www.Matteicapital.online
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.canadavinreport.site/cvhb/
185.27.134.206
http://www.54248711.xyz/jm2l/
161.97.142.144
http://www.matteicapital.online/__media__/design/underconstructionnotice.php?d=matteicapital.online
unknown
http://i1.cdn-image.com/__media__/js/min.js?v2.3
unknown
http://www.matteicapital.online/hyyd/
208.91.197.27
There are 62 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.54248711.xyz
161.97.142.144
malicious
rtpterbaruwaktu3.xyz
103.21.221.87
malicious
www.rtpterbaruwaktu3.xyz
unknown
malicious
www.llljjjiii.shop
8.210.114.150
www.ampsamkok88.shop
172.67.209.48
www.gogawithme.live
209.74.77.109
www.7261ltajbc.bond
154.12.28.184
www.canadavinreport.site
185.27.134.206
www.3kw40881107247y.click
172.67.192.207
www.questmatch.pro
172.67.138.37
www.acond-22-mvr.click
199.59.243.227
www.mrpokrovskii.pro
194.85.61.76
smartcongress.net
146.88.233.115
www.matteicapital.online
208.91.197.27
70kdd.top
38.47.232.124
www.bser101pp.buzz
104.21.58.90
www.ytsd88.top
47.76.213.197
www.70kdd.top
unknown
www.smartcongress.net
unknown
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
161.97.142.144
www.54248711.xyz
United States
malicious
103.21.221.87
rtpterbaruwaktu3.xyz
unknown
malicious
209.74.77.109
www.gogawithme.live
United States
146.88.233.115
smartcongress.net
France
8.210.114.150
www.llljjjiii.shop
Singapore
104.21.58.90
www.bser101pp.buzz
United States
199.59.243.227
www.acond-22-mvr.click
United States
208.91.197.27
www.matteicapital.online
Virgin Islands (BRITISH)
38.47.232.124
70kdd.top
United States
172.67.192.207
www.3kw40881107247y.click
United States
172.67.138.37
www.questmatch.pro
United States
47.76.213.197
www.ytsd88.top
United States
185.27.134.206
www.canadavinreport.site
United Kingdom
194.85.61.76
www.mrpokrovskii.pro
Russian Federation
172.67.209.48
www.ampsamkok88.shop
United States
There are 5 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2350000
system
page execute and read and write
malicious
3600000
unclassified section
page execute and read and write
malicious
2DF0000
trusted library allocation
page read and write
malicious
4700000
trusted library allocation
page read and write
malicious
58C0000
system
page execute and read and write
malicious
720000
system
page execute and read and write
malicious
2D80000
unkown
page execute and read and write
malicious
2E00000
unclassified section
page execute and read and write
malicious
B3F000
heap
page read and write
2C54000
heap
page read and write
4601000
heap
page read and write
48E8000
heap
page read and write
3272000
unkown
page read and write
ACB000
heap
page read and write
4601000
heap
page read and write
11B0000
heap
page read and write
4601000
heap
page read and write
B39000
heap
page read and write
2C50000
heap
page read and write
14D0000
unkown
page read and write
1B675FA6000
trusted library allocation
page read and write
5912000
system
page execute and read and write
67E000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
7DE000
unkown
page readonly
3EBC000
unkown
page read and write
1150000
unkown
page read and write
11B4000
heap
page read and write
127A000
stack
page read and write
30FF000
unkown
page execute and read and write
30B0000
heap
page read and write
3940000
direct allocation
page read and write
2F00000
direct allocation
page execute and read and write
2EF0000
unkown
page readonly
B23000
heap
page read and write
665C000
unclassified section
page read and write
3070000
unkown
page read and write
4601000
heap
page read and write
AC1000
heap
page read and write
4601000
heap
page read and write
4A9D000
direct allocation
page execute and read and write
3C0D000
direct allocation
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
1357000
heap
page execute and read and write
711000
unkown
page execute read
710000
unkown
page readonly
5930000
system
page execute and read and write
4601000
heap
page read and write
4601000
heap
page read and write
404E000
unkown
page read and write
14D0000
unkown
page read and write
3940000
direct allocation
page read and write
4601000
heap
page read and write
3A63000
direct allocation
page read and write
680000
heap
page read and write
31B2000
unkown
page read and write
4C3D000
direct allocation
page execute and read and write
AC6000
heap
page read and write
4601000
heap
page read and write
4A9000
stack
page read and write
7A11000
heap
page read and write
1130000
unkown
page readonly
31D1000
direct allocation
page execute and read and write
4601000
heap
page read and write
3D2A000
unkown
page read and write
59CC000
unclassified section
page read and write
7750000
trusted library allocation
page read and write
1B6742B0000
system
page execute and read and write
3C7E000
direct allocation
page read and write
ABD000
heap
page read and write
5985000
system
page execute and read and write
7A1B000
heap
page read and write
30B4000
heap
page read and write
4601000
heap
page read and write
35F4000
heap
page read and write
1B675E00000
trusted library allocation
page read and write
23F0000
heap
page read and write
4F9C000
unclassified section
page read and write
302D000
direct allocation
page execute and read and write
47BF000
heap
page read and write
2DB0000
direct allocation
page read and write
1B674390000
heap
page read and write
63E000
stack
page read and write
1B6742FD000
system
page execute and read and write
4601000
heap
page read and write
3A63000
direct allocation
page read and write
2EF0000
unkown
page readonly
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
6338000
unclassified section
page read and write
121E000
heap
page read and write
135B000
heap
page read and write
B27000
heap
page read and write
4601000
heap
page read and write
397F000
unclassified section
page execute and read and write
4601000
heap
page read and write
4601000
heap
page read and write
7A5B000
heap
page read and write
71E000
unkown
page readonly
5516000
unclassified section
page read and write
6AB000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
14F8000
heap
page read and write
4601000
heap
page read and write
FF0000
unkown
page readonly
4750000
trusted library allocation
page read and write
1B675D00000
trusted library allocation
page read and write
348C000
unkown
page read and write
FDB000
stack
page read and write
BB0000
unkown
page readonly
4601000
heap
page read and write
4601000
heap
page read and write
3060000
unkown
page read and write
1B6744BB000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
162E000
stack
page read and write
2DA0000
trusted library allocation
page read and write
2F5E000
stack
page read and write
2817000
heap
page read and write
1180000
heap
page read and write
13B5000
heap
page read and write
5F0000
heap
page read and write
7A57000
heap
page read and write
1380000
unkown
page readonly
1B674499000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
2C80000
heap
page read and write
725000
unkown
page read and write
4601000
heap
page read and write
2E2D000
heap
page read and write
6628BFE000
stack
page read and write
510000
heap
page read and write
10B0000
unkown
page read and write
3C09000
direct allocation
page read and write
4601000
heap
page read and write
305F000
stack
page read and write
31CD000
direct allocation
page execute and read and write
1120000
heap
page read and write
3940000
direct allocation
page read and write
4601000
heap
page read and write
112E000
stack
page read and write
2AD0000
heap
page read and write
4601000
heap
page read and write
4828000
unkown
page read and write
3874000
unkown
page read and write
B2C000
heap
page read and write
3C09000
direct allocation
page read and write
4601000
heap
page read and write
AC6000
heap
page read and write
A3F000
stack
page read and write
48B0000
trusted library allocation
page read and write
4601000
heap
page read and write
1D1E000
stack
page read and write
6980000
unclassified section
page read and write
1180000
heap
page read and write
1130000
unkown
page readonly
31B2000
unkown
page read and write
3AE0000
direct allocation
page read and write
4601000
heap
page read and write
1180000
heap
page read and write
4601000
heap
page read and write
1730000
unkown
page readonly
13E0000
unkown
page readonly
3C0D000
direct allocation
page read and write
4601000
heap
page read and write
F80000
heap
page read and write
4601000
heap
page read and write
4970000
direct allocation
page execute and read and write
285E000
heap
page read and write
4B0E000
direct allocation
page execute and read and write
1B675E03000
trusted library allocation
page read and write
2F10000
heap
page read and write
14F0000
heap
page read and write
1B675FCE000
trusted library allocation
page read and write
5B5E000
unclassified section
page read and write
2C1F000
stack
page read and write
4601000
heap
page read and write
3940000
direct allocation
page read and write
7FE000
stack
page read and write
4601000
heap
page read and write
1B675FBE000
trusted library allocation
page read and write
4601000
heap
page read and write
4B4C000
unkown
page read and write
4600000
heap
page read and write
2613000
heap
page read and write
4504000
unkown
page read and write
71E000
unkown
page readonly
ACB000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
B14000
heap
page read and write
2800000
heap
page read and write
FF0000
unkown
page readonly
4601000
heap
page read and write
1210000
unkown
page readonly
2613000
heap
page read and write
4601000
heap
page read and write
B5A000
heap
page read and write
3A63000
direct allocation
page read and write
5E82000
unclassified section
page read and write
3AE0000
direct allocation
page read and write
2C54000
heap
page read and write
437F000
unclassified section
page execute and read and write
3A63000
direct allocation
page read and write
B90000
unkown
page readonly
4601000
heap
page read and write
44FF000
unkown
page execute and read and write
2613000
heap
page read and write
4601000
heap
page read and write
730000
unkown
page readonly
2E40000
trusted library allocation
page read and write
4800000
trusted library allocation
page execute and read and write
4601000
heap
page read and write
34904000
system
page read and write
3C0D000
direct allocation
page read and write
8E0000
direct allocation
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
14E1000
unkown
page readonly
7A4E000
heap
page read and write
390D000
unclassified section
page execute and read and write
4601000
heap
page read and write
309E000
direct allocation
page execute and read and write
4601000
heap
page read and write
14F8000
heap
page read and write
348C000
unkown
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3AFF000
unkown
page execute and read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
1730000
unkown
page readonly
4601000
heap
page read and write
E3A000
stack
page read and write
4601000
heap
page read and write
2819000
heap
page read and write
B23000
heap
page read and write
774000
heap
page read and write
2E50000
heap
page read and write
B86000
heap
page read and write
7A65000
heap
page read and write
4601000
heap
page read and write
3401000
heap
page read and write
813E000
stack
page read and write
731000
unkown
page execute read
4601000
heap
page read and write
727000
unkown
page readonly
2805000
heap
page read and write
7A2B000
heap
page read and write
4601000
heap
page read and write
F90000
heap
page read and write
137D000
stack
page read and write
1356000
heap
page read and write
7B0000
heap
page read and write
4601000
heap
page read and write
4E70000
unkown
page read and write
4DDC000
unclassified section
page read and write
3451C000
system
page read and write
3060000
unkown
page read and write
F60000
unkown
page readonly
3C09000
direct allocation
page read and write
121F000
heap
page read and write
F3C000
stack
page read and write
1B675C90000
heap
page read and write
59CC000
unkown
page read and write
3A63000
direct allocation
page read and write
1380000
unkown
page readonly
7F4000
unkown
page readonly
116A000
heap
page read and write
2613000
heap
page read and write
2805000
heap
page read and write
4601000
heap
page read and write
13F0000
heap
page read and write
B5E000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
ABA000
heap
page read and write
4A99000
direct allocation
page execute and read and write
5CF0000
unclassified section
page read and write
1356000
heap
page read and write
10C1000
unkown
page readonly
4601000
heap
page read and write
4601000
heap
page read and write
71E000
unkown
page readonly
7EF000
unkown
page write copy
B55000
heap
page read and write
41E0000
unkown
page read and write
10B0000
unkown
page read and write
3C09000
direct allocation
page read and write
13D0000
unkown
page readonly
F70000
unkown
page readonly
725000
unkown
page read and write
1AC0000
unkown
page readonly
AA8000
heap
page read and write
4601000
heap
page read and write
2613000
heap
page read and write
1B675E12000
trusted library allocation
page read and write
774000
heap
page read and write
7A26000
heap
page read and write
4601000
heap
page read and write
2AE0000
direct allocation
page read and write
7EA000
unkown
page write copy
30B0000
heap
page read and write
2901000
heap
page read and write
23C0000
heap
page read and write
172F000
stack
page read and write
2613000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
710000
unkown
page readonly
30C0000
unkown
page readonly
281A000
heap
page read and write
2613000
heap
page read and write
4601000
heap
page read and write
116A000
heap
page read and write
4601000
heap
page read and write
492E000
stack
page read and write
7A03000
heap
page read and write
67EE000
unclassified section
page read and write
711000
unkown
page execute read
2C50000
heap
page read and write
308D000
unkown
page execute and read and write
13C0000
unkown
page readonly
7A52000
heap
page read and write
731000
unkown
page execute read
3C0D000
direct allocation
page read and write
34242000
system
page read and write
2613000
heap
page read and write
2D5F000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
583A000
unclassified section
page read and write
4601000
heap
page read and write
B90000
unkown
page readonly
6627BFB000
stack
page read and write
3940000
direct allocation
page read and write
3C0D000
direct allocation
page read and write
4601000
heap
page read and write
112E000
heap
page read and write
4696000
unkown
page read and write
3AE0000
direct allocation
page read and write
F90000
heap
page read and write
4601000
heap
page read and write
BA0000
unkown
page readonly
2DB0000
direct allocation
page read and write
4601000
heap
page read and write
1710000
unkown
page readonly
7EA000
unkown
page read and write
4601000
heap
page read and write
592E000
system
page execute and read and write
FFC000
stack
page read and write
7A42000
heap
page read and write
4601000
heap
page read and write
3B98000
unkown
page read and write
4601000
heap
page read and write
5908000
system
page execute and read and write
10AE000
stack
page read and write
B68000
heap
page read and write
10C1000
unkown
page readonly
2C90000
unkown
page readonly
48B0000
trusted library allocation
page read and write
7F4000
unkown
page readonly
285E000
heap
page read and write
1B675CC0000
trusted library allocation
page read and write
4D7F000
unclassified section
page execute and read and write
172F000
stack
page read and write
4601000
heap
page read and write
1188000
heap
page read and write
127A000
stack
page read and write
ABC000
heap
page read and write
4601000
heap
page read and write
2613000
heap
page read and write
2600000
heap
page read and write
4601000
heap
page read and write
13C0000
unkown
page readonly
48B0000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
1B6744D0000
heap
page read and write
2E29000
heap
page read and write
4601000
heap
page read and write
1188000
heap
page read and write
5384000
unclassified section
page read and write
34302000
system
page read and write
3940000
direct allocation
page read and write
3C7E000
direct allocation
page read and write
64CA000
unclassified section
page read and write
14F0000
heap
page read and write
817F000
stack
page read and write
BA0000
unkown
page readonly
116A000
heap
page read and write
1B675E0F000
trusted library allocation
page read and write
191E000
stack
page read and write
48EC000
heap
page read and write
B2C000
heap
page read and write
2D60000
direct allocation
page read and write
2613000
heap
page read and write
F3C000
stack
page read and write
4601000
heap
page read and write
1200000
unkown
page readonly
7A21000
heap
page read and write
4372000
unkown
page read and write
3C7E000
direct allocation
page read and write
4601000
heap
page read and write
1B675CA0000
heap
page read and write
590A000
system
page execute and read and write
14E1000
unkown
page readonly
4601000
heap
page read and write
1150000
unkown
page read and write
115D000
heap
page read and write
10D0000
unkown
page read and write
730000
unkown
page readonly
2B1E000
stack
page read and write
4601000
heap
page read and write
B51000
heap
page read and write
4601000
heap
page read and write
114E000
heap
page read and write
1B675E0A000
trusted library allocation
page read and write
1B6744C0000
heap
page read and write
4601000
heap
page read and write
7A5B000
heap
page read and write
711000
unkown
page execute read
4601000
heap
page read and write
3940000
direct allocation
page read and write
2E9E000
heap
page read and write
150F000
heap
page read and write
30B4000
heap
page read and write
4601000
heap
page read and write
AA0000
heap
page read and write
4601000
heap
page read and write
135B000
heap
page read and write
4601000
heap
page read and write
AC0000
heap
page read and write
F80000
heap
page read and write
4601000
heap
page read and write
13B0000
heap
page read and write
FBB000
stack
page read and write
2DB0000
direct allocation
page read and write
4601000
heap
page read and write
AC6000
heap
page read and write
AC6000
heap
page read and write
3A63000
direct allocation
page read and write
1B674490000
heap
page read and write
727000
unkown
page readonly
1B675CC0000
trusted library allocation
page read and write
1200000
unkown
page readonly
1B6744C2000
heap
page read and write
710000
unkown
page readonly
A40000
heap
page read and write
3C0D000
direct allocation
page read and write
22DC000
stack
page read and write
B27000
heap
page read and write
1B675E14000
trusted library allocation
page read and write
4601000
heap
page read and write
283C000
heap
page read and write
F60000
unkown
page readonly
2602000
heap
page read and write
2D00000
heap
page read and write
5922000
system
page execute and read and write
4601000
heap
page read and write
1366000
heap
page read and write
2ED0000
unkown
page read and write
AC6000
heap
page read and write
4CC2000
unclassified section
page read and write
727000
unkown
page readonly
4601000
heap
page read and write
3AE0000
direct allocation
page read and write
4601000
heap
page read and write
3029000
direct allocation
page execute and read and write
1129000
heap
page read and write
13E0000
unkown
page readonly
727000
unkown
page readonly
4C41000
direct allocation
page execute and read and write
4601000
heap
page read and write
6F0000
heap
page read and write
4601000
heap
page read and write
121E000
heap
page read and write
4601000
heap
page read and write
495D000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
B8B000
heap
page read and write
283C000
heap
page read and write
4CB2000
direct allocation
page execute and read and write
711000
unkown
page execute read
E3A000
stack
page read and write
2613000
heap
page read and write
7A47000
heap
page read and write
162E000
stack
page read and write
13B0000
heap
page read and write
1B6744C2000
heap
page read and write
23A0000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
1210000
unkown
page readonly
6E8000
stack
page read and write
3C7E000
direct allocation
page read and write
2613000
heap
page read and write
1B675F00000
trusted library allocation
page read and write
66283FD000
stack
page read and write
13F0000
heap
page read and write
F50000
unkown
page readonly
2B00000
heap
page read and write
4601000
heap
page read and write
1B6742FB000
system
page execute and read and write
2DE0000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
7DE000
unkown
page readonly
4601000
heap
page read and write
3AE0000
direct allocation
page read and write
B44000
heap
page read and write
B81000
heap
page read and write
4601000
heap
page read and write
10E6000
unkown
page read and write
4601000
heap
page read and write
7CF0000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
F50000
unkown
page readonly
710000
unkown
page readonly
4601000
heap
page read and write
774000
heap
page read and write
2C80000
heap
page read and write
4601000
heap
page read and write
35F0000
heap
page read and write
3242000
direct allocation
page execute and read and write
10D0000
unkown
page read and write
56A8000
unclassified section
page read and write
66293FE000
stack
page read and write
2613000
heap
page read and write
4601000
heap
page read and write
2613000
heap
page read and write
4601000
heap
page read and write
1B675F01000
trusted library allocation
page read and write
AD9000
heap
page read and write
AC0000
heap
page read and write
4601000
heap
page read and write
B00000
heap
page read and write
231B000
stack
page read and write
AC6000
heap
page read and write
4601000
heap
page read and write
7A54000
heap
page read and write
4601000
heap
page read and write
BB0000
unkown
page readonly
4601000
heap
page read and write
137F000
stack
page read and write
B39000
heap
page read and write
4601000
heap
page read and write
980000
heap
page read and write
2ED0000
unkown
page read and write
F70000
unkown
page readonly
1168000
heap
page read and write
1B675FC4000
trusted library allocation
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
1B67449F000
heap
page read and write
4601000
heap
page read and write
6014000
unclassified section
page read and write
4601000
heap
page read and write
137D000
stack
page read and write
AFB000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3C09000
direct allocation
page read and write
2C23000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3AE0000
direct allocation
page read and write
3A63000
direct allocation
page read and write
2F10000
heap
page read and write
2C90000
unkown
page readonly
B7B000
heap
page read and write
4D82000
unclassified section
page read and write
4601000
heap
page read and write
3C7E000
direct allocation
page read and write
3080000
unkown
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
7A3A000
heap
page read and write
32CC000
unkown
page read and write
2613000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3AE0000
direct allocation
page read and write
2817000
heap
page read and write
4601000
heap
page read and write
1B6744AD000
heap
page read and write
116A000
heap
page read and write
2DA0000
heap
page read and write
FCE000
stack
page read and write
B03000
heap
page read and write
4601000
heap
page read and write
496E000
stack
page read and write
7BD000
unkown
page readonly
4601000
heap
page read and write
3C0D000
direct allocation
page read and write
ABA000
heap
page read and write
4601000
heap
page read and write
71E000
unkown
page readonly
30C0000
unkown
page readonly
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
725000
unkown
page read and write
3C7E000
direct allocation
page read and write
5ACC000
unkown
page read and write
61A6000
unclassified section
page read and write
4601000
heap
page read and write
770000
heap
page read and write
3A06000
unkown
page read and write
2812000
heap
page read and write
13D0000
unkown
page readonly
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3C7E000
direct allocation
page read and write
49BA000
unkown
page read and write
1711000
unkown
page readonly
2C5E000
stack
page read and write
4601000
heap
page read and write
7BD000
unkown
page readonly
1AC1000
unkown
page readonly
2C1F000
stack
page read and write
725000
unkown
page read and write
4601000
heap
page read and write
2613000
heap
page read and write
3C09000
direct allocation
page read and write
4CDE000
unkown
page read and write
4601000
heap
page read and write
1B675E21000
trusted library allocation
page read and write
B18000
heap
page read and write
4601000
heap
page read and write
3C09000
direct allocation
page read and write
4601000
heap
page read and write
4724000
heap
page read and write
There are 637 hidden memdumps, click here to show them.