IOC Report
3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe

loading gif

Files

File Path
Type
Category
Malicious
3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\6p1225E
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe
"C:\Users\user\Desktop\3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe"
malicious
C:\Users\user\Desktop\3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe
"C:\Users\user\Desktop\3500 ADUM1401ARWZ-RL ANALOG DEVICES.exe"
malicious
C:\Program Files (x86)\YIUoDKDalyNySmUaBEWPfRGPQysDByVsVJAZfqYZkMSLQRyciXgWRUw\cvSKtqilyhlQ.exe
"C:\Program Files (x86)\YIUoDKDalyNySmUaBEWPfRGPQysDByVsVJAZfqYZkMSLQRyciXgWRUw\cvSKtqilyhlQ.exe"
malicious
C:\Windows\SysWOW64\bitsadmin.exe
"C:\Windows\SysWOW64\bitsadmin.exe"
malicious
C:\Program Files (x86)\YIUoDKDalyNySmUaBEWPfRGPQysDByVsVJAZfqYZkMSLQRyciXgWRUw\cvSKtqilyhlQ.exe
"C:\Program Files (x86)\YIUoDKDalyNySmUaBEWPfRGPQysDByVsVJAZfqYZkMSLQRyciXgWRUw\cvSKtqilyhlQ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.rtp189z.lat/tt36/?BXc8V=7XRN4ZBNuxsgsz85WwF8d5RVD19EzJb4JnIab8u1JoWwH5zq0g0l+ZcBEWO33waNPxeiCBvzmGaSpdMTI8OJtChGzZiriz+EVcp1nviLXn5OzCwSP0UMhIk=&f898=D4YHodiH3rXTfZ
68.65.122.71
malicious
http://www.activeusers.tech/s76m/?BXc8V=5+vWPd9X0wSWPJRdjPK4htAFucAo2VruY7NWHsZJjc93W8tV5J/CvgfDxHaReh/JOtz7+f35BLAy5HXA0CqVvOWOdVDklARjVuGkQkqqALzufSU8AevfCiY=&f898=D4YHodiH3rXTfZ
199.59.243.228
malicious
http://www.oequ8s1l.vip/izrj/
149.104.185.93
malicious
http://www.boldjourn.website/6qnn/?BXc8V=jZjCtW5Z35UjZn8TZsrAhfuPzAvLvIn1UqsIYqvINL5GRqKd5l5cN7nY2f+SbBmC2WETDruk6ZGN6IqYT24Zv1a8PLIHAmXFEvfhPzClF16HpP7M54iZiSM=&f898=D4YHodiH3rXTfZ
209.74.64.189
malicious
http://www.rpa.asia/5blw/
160.25.166.123
malicious
http://www.givvjn.info/e4zw/?BXc8V=vBV+S5Q8h7Cl09PJqQteIVoPn0WMDxyCQPiiXTQrjiV2j0wk8nAmuATUOuyLShoOecv/N06oacatEhkR7UdQnNX8vYYfl5KO9EIWGMCepu/511PNPsKoGB8=&f898=D4YHodiH3rXTfZ
47.83.1.90
malicious
http://www.lugao.xyz/qixh/?BXc8V=1RMEcCmOa+NBnL2H42a1any5QtiTZ5BG62LeNlaTxkSavmi+Sr/0k147vVBI8c7b7ZvrdBlJEtVahWNDtgmsFIs/6lOYP2MHU69GVvy+6ALSisvzm9a+ML0=&f898=D4YHodiH3rXTfZ
172.67.147.28
malicious
http://www.lugao.xyz/qixh/
172.67.147.28
malicious
http://www.oequ8s1l.vip/izrj/?f898=D4YHodiH3rXTfZ&BXc8V=j50sR9qwIfHSiYtxTFFp7g89UJFry+rQTe0kZ9YXVPGo3xxAz/jXuWZxuk+F1xvQPOoZdxLEIBdogShtQlOGjR8qYGUmJGoMkDNaZ33tU1jJrtqR7YIPhnQ=
149.104.185.93
malicious
http://www.givvjn.info/e4zw/
47.83.1.90
malicious
http://www.rtp189z.lat/tt36/
68.65.122.71
malicious
http://www.activeusers.tech/s76m/
199.59.243.228
malicious
http://www.boldjourn.website/6qnn/
209.74.64.189
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://server/get.asp
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://www.google.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.littlecarseats.shop/vngz/?BXc8V=BywAvqZrlXCPypxowigGU/RMQqJ+aFEu4r9fzmpnpak2vS64kVBA8ZUuc20d6AYdHHbV7T9IEXhUPkXJmH12l+9kSAAe2W5CHPw/a2fo9vOL4zfBkwpEEo8=&f898=D4YHodiH3rXTfZ
104.21.83.145
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.rpa.asia
unknown
https://www.ecosia.org/newtab/
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
2xieerbi.dun899.com
149.104.185.93
malicious
www.lugao.xyz
172.67.147.28
malicious
rtp189z.lat
68.65.122.71
malicious
www.rpa.asia
160.25.166.123
malicious
www.givvjn.info
47.83.1.90
malicious
www.boldjourn.website
209.74.64.189
malicious
www.activeusers.tech
199.59.243.228
malicious
www.littlecarseats.shop
104.21.83.145
www.oequ8s1l.vip
unknown
www.rtp189z.lat
unknown
www.juiceem.shop
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
160.25.166.123
www.rpa.asia
unknown
malicious
47.83.1.90
www.givvjn.info
United States
malicious
172.67.147.28
www.lugao.xyz
United States
malicious
149.104.185.93
2xieerbi.dun899.com
United States
malicious
199.59.243.228
www.activeusers.tech
United States
malicious
209.74.64.189
www.boldjourn.website
United States
malicious
68.65.122.71
rtp189z.lat
United States
malicious
104.21.83.145
www.littlecarseats.shop
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
C40000
trusted library allocation
page read and write
malicious
2E90000
unkown
page execute and read and write
malicious
1600000
unclassified section
page execute and read and write
malicious
6A0000
system
page execute and read and write
malicious
2B80000
system
page execute and read and write
malicious
CE0000
trusted library allocation
page read and write
malicious
2520000
unclassified section
page execute and read and write
malicious
3C4E000
unkown
page read and write
5200000
heap
page execute and read and write
C90000
trusted library allocation
page read and write
243B70BE000
trusted library allocation
page read and write
8DB000
heap
page read and write
77F5000
heap
page read and write
1B1F000
stack
page read and write
7851000
heap
page read and write
1195E000
stack
page read and write
44F2000
unclassified section
page read and write
A31000
heap
page read and write
CED000
stack
page read and write
7851000
heap
page read and write
129C000
heap
page read and write
17F9000
direct allocation
page execute and read and write
867000
heap
page read and write
A31000
heap
page read and write
C6E000
stack
page read and write
3B51000
unclassified section
page execute and read and write
A31000
heap
page read and write
3D0000
unkown
page read and write
A31000
heap
page read and write
5150000
trusted library allocation
page read and write
243B6CB0000
heap
page read and write
85B000
heap
page read and write
1C0000
unkown
page readonly
A31000
heap
page read and write
2CC0000
unkown
page readonly
1340000
heap
page read and write
3B0000
unkown
page readonly
32B1000
direct allocation
page execute and read and write
A31000
heap
page read and write
1010000
heap
page read and write
7B50000
trusted library allocation
page execute and read and write
16D0000
direct allocation
page execute and read and write
A31000
heap
page read and write
DE0000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
800F000
stack
page read and write
F8E000
stack
page read and write
2E32000
trusted library allocation
page read and write
1290000
heap
page read and write
7862000
heap
page read and write
270000
unkown
page readonly
960000
heap
page read and write
760000
unkown
page readonly
A31000
heap
page read and write
A31000
heap
page read and write
317E000
direct allocation
page execute and read and write
2ADD000
trusted library allocation
page read and write
7BBF000
stack
page read and write
2AD1000
trusted library allocation
page read and write
243B70C4000
trusted library allocation
page read and write
3798000
unkown
page read and write
39C000
stack
page read and write
A31000
heap
page read and write
DE0000
heap
page read and write
D8D000
heap
page read and write
9E66000
heap
page read and write
4360000
unclassified section
page read and write
8AA000
stack
page read and write
A31000
heap
page read and write
5160000
trusted library allocation
page read and write
8B5000
heap
page read and write
7856000
heap
page read and write
5190000
trusted library allocation
page read and write
DAC000
stack
page read and write
7880000
heap
page read and write
8E0000
heap
page read and write
589F000
stack
page read and write
F27000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
1B0000
unkown
page readonly
3E1000
unkown
page readonly
243B54D0000
heap
page read and write
2B74000
heap
page read and write
786A000
heap
page read and write
BD7000
heap
page read and write
A31000
heap
page read and write
1370000
unkown
page readonly
1B0000
unkown
page readonly
A31000
heap
page read and write
9EA000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
243B5503000
heap
page read and write
760000
unkown
page readonly
A31000
heap
page read and write
30C1000
unkown
page execute and read and write
A31000
heap
page read and write
C90000
trusted library allocation
page read and write
243B70CE000
trusted library allocation
page read and write
A31000
heap
page read and write
41CE000
unclassified section
page read and write
271000
unkown
page execute read
9E92000
heap
page read and write
86B000
heap
page read and write
A31000
heap
page read and write
C10000
heap
page read and write
862000
heap
page read and write
7850000
heap
page read and write
DF0000
heap
page read and write
A60000
unkown
page readonly
1270000
heap
page read and write
7840000
trusted library allocation
page read and write
2C20000
system
page execute and read and write
A31000
heap
page read and write
788D000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
2C0F000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
968000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
EF0000
trusted library allocation
page read and write
1370000
unkown
page readonly
F16000
trusted library allocation
page execute and read and write
8CA000
heap
page read and write
54C0000
unkown
page read and write
3F0000
unkown
page read and write
93A000
heap
page read and write
A31000
heap
page read and write
D10000
heap
page read and write
788A000
heap
page read and write
7851000
heap
page read and write
A31000
heap
page read and write
8C0000
heap
page read and write
1010000
heap
page read and write
7740000
trusted library allocation
page read and write
A31000
heap
page read and write
2A5B000
stack
page read and write
22FF000
stack
page read and write
344C000
unclassified section
page read and write
7B0000
heap
page read and write
8210000
heap
page read and write
1260000
unkown
page read and write
2AD6000
trusted library allocation
page read and write
3B86000
unclassified section
page read and write
27E000
unkown
page readonly
A31000
heap
page read and write
7F4E000
stack
page read and write
128F000
heap
page read and write
784B000
stack
page read and write
134A000
heap
page read and write
2B30000
heap
page read and write
271000
unkown
page execute read
860000
heap
page read and write
2B20000
unkown
page readonly
2C11000
trusted library allocation
page read and write
7851000
heap
page read and write
C20000
heap
page read and write
3071000
trusted library allocation
page read and write
35342000
system
page read and write
CA5000
heap
page read and write
A31000
heap
page read and write
579E000
stack
page read and write
7851000
heap
page read and write
EF3000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
D30000
trusted library allocation
page read and write
271000
unkown
page execute read
2B50000
unkown
page read and write
243B6F0C000
trusted library allocation
page read and write
243B6F03000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
A31000
heap
page read and write
1181F000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
2A10000
heap
page read and write
871000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
F2B000
trusted library allocation
page execute and read and write
243B7000000
trusted library allocation
page read and write
7851000
heap
page read and write
B30000
trusted library allocation
page read and write
2751000
unclassified section
page execute and read and write
243B6D40000
trusted library allocation
page read and write
7AB0000
trusted library section
page readonly
A31000
heap
page read and write
2C19000
trusted library allocation
page read and write
63B000
stack
page read and write
7F2A0000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
8C0000
heap
page read and write
243B7001000
trusted library allocation
page read and write
35944000
system
page read and write
DF0000
unkown
page readonly
7851000
heap
page read and write
99E0000
trusted library allocation
page read and write
1130000
unkown
page read and write
A31000
heap
page read and write
CD0000
heap
page read and write
A31000
heap
page read and write
D7C000
stack
page read and write
8D6000
heap
page read and write
A31000
heap
page read and write
575F000
stack
page read and write
A31000
heap
page read and write
1170000
heap
page read and write
A60000
unkown
page readonly
86B000
heap
page read and write
1177000
heap
page read and write
2B50000
unkown
page read and write
15AE000
stack
page read and write
A31000
heap
page read and write
7A30000
heap
page read and write
9E1E000
stack
page read and write
2A60000
trusted library allocation
page read and write
77E0000
heap
page read and write
7851000
heap
page read and write
86B000
heap
page read and write
287000
unkown
page readonly
70E000
stack
page read and write
8A4000
heap
page read and write
3C11000
trusted library allocation
page read and write
A31000
heap
page read and write
7851000
heap
page read and write
D04000
heap
page read and write
7B7E000
stack
page read and write
9E5C000
heap
page read and write
EFD000
trusted library allocation
page execute and read and write
866000
heap
page read and write
32AD000
direct allocation
page execute and read and write
2320000
heap
page read and write
2AB0000
trusted library allocation
page read and write
1140000
heap
page read and write
1130000
unkown
page read and write
7FCE000
stack
page read and write
271000
unkown
page execute read
A31000
heap
page read and write
270000
unkown
page readonly
3C0000
heap
page read and write
1171E000
stack
page read and write
7851000
heap
page read and write
A31000
heap
page read and write
7B4000
heap
page read and write
8D6000
heap
page read and write
3151000
unclassified section
page execute and read and write
EE0000
trusted library allocation
page read and write
7ABD000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
186E000
direct allocation
page execute and read and write
A31000
heap
page read and write
199D000
direct allocation
page execute and read and write
8264000
heap
page read and write
7851000
heap
page read and write
10FA000
stack
page read and write
A31000
heap
page read and write
8CA000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
730000
unkown
page readonly
A31000
heap
page read and write
A31000
heap
page read and write
285000
unkown
page read and write
A31000
heap
page read and write
787B000
heap
page read and write
A31000
heap
page read and write
287000
unkown
page readonly
A31000
heap
page read and write
A31000
heap
page read and write
1A0000
unkown
page readonly
1199E000
stack
page read and write
7B40000
heap
page read and write
23A0000
unkown
page readonly
260000
unkown
page readonly
9360000
trusted library allocation
page read and write
2B00000
heap
page execute and read and write
1278000
heap
page read and write
2AAE000
stack
page read and write
9310000
trusted library allocation
page read and write
A31000
heap
page read and write
243B5500000
heap
page read and write
119E000
stack
page read and write
8F7000
heap
page read and write
A31000
heap
page read and write
392A000
unkown
page read and write
8F2000
heap
page read and write
243B6E00000
trusted library allocation
page read and write
1C0000
unkown
page readonly
A31000
heap
page read and write
51E0000
heap
page read and write
788F000
heap
page read and write
2DB2000
unkown
page read and write
7847000
heap
page read and write
2324000
heap
page read and write
904000
heap
page read and write
551C000
stack
page read and write
C90000
trusted library allocation
page read and write
A31000
heap
page read and write
8C3000
heap
page read and write
7851000
heap
page read and write
A31000
heap
page read and write
732000
unkown
page readonly
C40000
unkown
page readonly
D1E000
heap
page read and write
7860000
heap
page read and write
873000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
17FD000
direct allocation
page execute and read and write
310D000
direct allocation
page execute and read and write
3059000
unkown
page execute and read and write
27E000
unkown
page readonly
A31000
heap
page read and write
C80000
heap
page read and write
B32000
heap
page read and write
F1A000
trusted library allocation
page execute and read and write
243B6F16000
trusted library allocation
page read and write
A31000
heap
page read and write
7A90000
trusted library section
page read and write
99E7000
trusted library allocation
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
565E000
stack
page read and write
1B20000
unclassified section
page execute and read and write
86B000
heap
page read and write
1996000
direct allocation
page execute and read and write
A31000
heap
page read and write
7894000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
8ED000
heap
page read and write
87F000
stack
page read and write
3DE0000
unkown
page read and write
5220000
heap
page read and write
8AF000
heap
page read and write
F12000
trusted library allocation
page read and write
A31000
heap
page read and write
960000
heap
page read and write
27E000
unkown
page readonly
A31000
heap
page read and write
A31000
heap
page read and write
4D0C000
stack
page read and write
8F7000
heap
page read and write
7887000
heap
page read and write
929000
heap
page read and write
2B20000
unkown
page readonly
2B74000
heap
page read and write
9CD0000
trusted library allocation
page execute and read and write
D75000
heap
page read and write
860000
heap
page read and write
2C49000
system
page execute and read and write
A31000
heap
page read and write
33F2000
unclassified section
page read and write
A31000
heap
page read and write
287000
unkown
page readonly
7874000
heap
page read and write
C30000
unkown
page readonly
A31000
heap
page read and write
7851000
heap
page read and write
C40000
unkown
page readonly
9392000
trusted library allocation
page read and write
DF0000
unkown
page readonly
A31000
heap
page read and write
2490000
unkown
page execute and read and write
308C000
unkown
page read and write
A31000
heap
page read and write
A30000
heap
page read and write
A31000
heap
page read and write
825E000
heap
page read and write
1A0000
unkown
page readonly
7A2D000
stack
page read and write
243B54DA000
heap
page read and write
243B54EC000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
1650000
heap
page read and write
A31000
heap
page read and write
156F000
stack
page read and write
3EAA000
unclassified section
page read and write
109F000
stack
page read and write
DE0000
unkown
page readonly
DAC000
stack
page read and write
770000
heap
page read and write
113E000
stack
page read and write
2DB2000
unkown
page read and write
A31000
heap
page read and write
2E72000
unkown
page read and write
871000
heap
page read and write
9D1E000
stack
page read and write
2B60000
unkown
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
D6C000
heap
page read and write
1270000
heap
page read and write
270000
unkown
page readonly
A31000
heap
page read and write
789E000
heap
page read and write
44C1000
unkown
page execute and read and write
3322000
direct allocation
page execute and read and write
A31000
heap
page read and write
F0E000
stack
page read and write
A31000
heap
page read and write
8B5000
heap
page read and write
7893000
heap
page read and write
1251000
unkown
page readonly
B240000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
C20000
heap
page read and write
5170000
trusted library allocation
page read and write
A31000
heap
page read and write
35282000
system
page read and write
243B5322000
system
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
3E1000
unkown
page readonly
4415000
trusted library allocation
page read and write
3109000
direct allocation
page execute and read and write
7851000
heap
page read and write
1140000
heap
page read and write
7851000
heap
page read and write
22A000
stack
page read and write
9A7000
stack
page read and write
243B6D40000
trusted library allocation
page read and write
4419000
trusted library allocation
page read and write
7868000
heap
page read and write
8F2000
heap
page read and write
4C2EDFF000
stack
page read and write
840000
heap
page read and write
A31000
heap
page read and write
7A7C000
stack
page read and write
8B5000
heap
page read and write
2C9D000
system
page execute and read and write
1981000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
DE0000
unkown
page readonly
7851000
heap
page read and write
2B70000
heap
page read and write
308C000
unkown
page read and write
7851000
heap
page read and write
243B54A0000
heap
page read and write
A31000
heap
page read and write
1260000
unkown
page read and write
A31000
heap
page read and write
26E9000
unclassified section
page execute and read and write
287000
unkown
page readonly
360C000
unclassified section
page read and write
A31000
heap
page read and write
F00000
trusted library allocation
page read and write
514F000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
8AF000
heap
page read and write
91E000
heap
page read and write
8ED000
heap
page read and write
3606000
unkown
page read and write
A31000
heap
page read and write
820E000
stack
page read and write
1700000
unkown
page readonly
CAA000
stack
page read and write
7A8E000
stack
page read and write
A31000
heap
page read and write
E0A000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
2ACE000
trusted library allocation
page read and write
7851000
heap
page read and write
22A000
stack
page read and write
77F0000
heap
page read and write
816000
unkown
page readonly
4C2CDFB000
stack
page read and write
3474000
unkown
page read and write
A31000
heap
page read and write
1A18000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
243B531E000
system
page execute and read and write
243B6F0E000
trusted library allocation
page read and write
1700000
unkown
page readonly
86B000
heap
page read and write
7851000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
77C0000
trusted library allocation
page read and write
1000000
unkown
page readonly
7B4000
heap
page read and write
7850000
trusted library allocation
page read and write
8AF000
heap
page read and write
243B53B0000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
DF0000
unkown
page readonly
8C3000
heap
page read and write
2C1C000
trusted library allocation
page read and write
968000
heap
page read and write
7BC0000
heap
page read and write
A31000
heap
page read and write
8220000
heap
page read and write
1330000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
850000
heap
page read and write
2AF0000
trusted library allocation
page read and write
890000
unkown
page read and write
1278000
heap
page read and write
2320000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
F0D000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
3D18000
unclassified section
page read and write
75E000
stack
page read and write
A31000
heap
page read and write
243B6F10000
trusted library allocation
page read and write
243B6F00000
trusted library allocation
page read and write
A31000
heap
page read and write
9E58000
heap
page read and write
A31000
heap
page read and write
720000
heap
page read and write
260000
unkown
page readonly
A31000
heap
page read and write
862000
heap
page read and write
12A0000
heap
page read and write
A31000
heap
page read and write
3F0000
unkown
page read and write
A31000
heap
page read and write
2CC0000
unkown
page readonly
9C40000
trusted library section
page read and write
A31000
heap
page read and write
2C3A000
system
page execute and read and write
23A0000
unkown
page readonly
8C3000
heap
page read and write
A31000
heap
page read and write
5165000
trusted library allocation
page read and write
11A9E000
stack
page read and write
285000
unkown
page read and write
A31000
heap
page read and write
7950000
trusted library allocation
page read and write
7865000
heap
page read and write
15B0000
direct allocation
page read and write
7851000
heap
page read and write
A31000
heap
page read and write
112E000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
4C2D5FE000
stack
page read and write
A31000
heap
page read and write
3539C000
system
page read and write
39C000
stack
page read and write
243B52F0000
system
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
890000
unkown
page read and write
2C46000
system
page execute and read and write
A31000
heap
page read and write
770000
heap
page read and write
2ABB000
trusted library allocation
page read and write
7B4000
heap
page read and write
F90000
heap
page read and write
2324000
heap
page read and write
2390000
heap
page read and write
3A0000
unkown
page readonly
5E20000
trusted library allocation
page read and write
3332000
unclassified section
page read and write
3555C000
system
page read and write
9370000
trusted library allocation
page read and write
1251000
unkown
page readonly
A31000
heap
page read and write
A31000
heap
page read and write
243B54FC000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
7851000
heap
page read and write
285000
unkown
page read and write
27E000
unkown
page readonly
ECE000
stack
page read and write
CA0000
heap
page read and write
3A0000
unkown
page readonly
124F000
stack
page read and write
2B30000
heap
page read and write
7F8F000
stack
page read and write
A31000
heap
page read and write
243B70A5000
trusted library allocation
page read and write
9E7000
heap
page read and write
7AFE000
stack
page read and write
D00000
heap
page read and write
C20000
unkown
page readonly
243B6F12000
trusted library allocation
page read and write
A31000
heap
page read and write
CAA000
stack
page read and write
A31000
heap
page read and write
B4E000
heap
page read and write
F40000
trusted library allocation
page read and write
1145000
heap
page read and write
4C2DDFE000
stack
page read and write
A31000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
A31000
heap
page read and write
A31000
heap
page read and write
8C0000
heap
page read and write
EF4000
trusted library allocation
page read and write
2390000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
3AC1000
unkown
page execute and read and write
7851000
heap
page read and write
A31000
heap
page read and write
9350000
trusted library allocation
page read and write
1000000
unkown
page readonly
7851000
heap
page read and write
A31000
heap
page read and write
7851000
heap
page read and write
A31000
heap
page read and write
8CA000
heap
page read and write
39F4000
unclassified section
page read and write
678000
stack
page read and write
1370000
heap
page read and write
5223000
heap
page read and write
2B70000
heap
page read and write
A31000
heap
page read and write
4C2E5FE000
stack
page read and write
A31000
heap
page read and write
270000
unkown
page readonly
285000
unkown
page read and write
C20000
unkown
page readonly
86B000
heap
page read and write
2ECC000
unkown
page read and write
3C0000
heap
page read and write
1185E000
stack
page read and write
A31000
heap
page read and write
243B6D30000
heap
page read and write
D52000
heap
page read and write
923000
heap
page read and write
243B54E0000
heap
page read and write
F10000
trusted library allocation
page read and write
3B0000
unkown
page readonly
A31000
heap
page read and write
A31000
heap
page read and write
3F72000
unkown
page read and write
785B000
heap
page read and write
A31000
heap
page read and write
C30000
unkown
page readonly
866000
heap
page read and write
A31000
heap
page read and write
F22000
trusted library allocation
page read and write
9770000
heap
page read and write
A31000
heap
page read and write
7851000
heap
page read and write
243B6F21000
trusted library allocation
page read and write
904000
heap
page read and write
8D6000
heap
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
77D0000
trusted library allocation
page read and write
3D0000
unkown
page read and write
A31000
heap
page read and write
51F0000
trusted library allocation
page execute and read and write
7B3F000
stack
page read and write
A31000
heap
page read and write
A31000
heap
page read and write
A2B000
heap
page read and write
918000
heap
page read and write
2C2A000
system
page execute and read and write
A31000
heap
page read and write
774A000
trusted library allocation
page read and write
DF0000
unkown
page readonly
A31000
heap
page read and write
561C000
stack
page read and write
There are 686 hidden memdumps, click here to show them.