IOC Report
SecuriteInfo.com.Win32.PWSX-gen.5935.26892.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.5935.26892.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.5935.26892.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\0100I4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.5935.26892.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.5935.26892.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Program Files (x86)\ZdaPUhlzBlXbWOwBxOnWpBGfYGMYcyBBWJfcIoTArBuWqqgNCw\TEDSEqbHCFz.exe
"C:\Program Files (x86)\ZdaPUhlzBlXbWOwBxOnWpBGfYGMYcyBBWJfcIoTArBuWqqgNCw\TEDSEqbHCFz.exe"
malicious
C:\Windows\SysWOW64\newdev.exe
"C:\Windows\SysWOW64\newdev.exe"
malicious
C:\Program Files (x86)\ZdaPUhlzBlXbWOwBxOnWpBGfYGMYcyBBWJfcIoTArBuWqqgNCw\TEDSEqbHCFz.exe
"C:\Program Files (x86)\ZdaPUhlzBlXbWOwBxOnWpBGfYGMYcyBBWJfcIoTArBuWqqgNCw\TEDSEqbHCFz.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.d4ffo73dz.sbs/e368/?Sp8=G2cdR0jX&fvqX7=RsYuaOawKy9vS81D7CKVJnGoeaAllKIKhr9XJJ/S+mJuCvSw92sWp5j4s1XOQelKVLakNLLG7iqri0hQnwBJ2AhSCsxB62zvpcqqBaohDQsMOt1/2IbRVMY61ZaJ20eZbYZMa20=
47.238.180.222
malicious
http://www.tianrui8.com/e368/?Sp8=G2cdR0jX&fvqX7=MQdyyEC6m5kVGj7p7Va1tZ90zxFuJQszXvv65samv4yx5CBA6mKKM7MxcgmOYHNx3gSE4cdf4z30LTYhNXlRaqeT16yhr/81xHuAnllTUmwocXaCHhNxZIzL5WnQ7t4ave6LxF0=
43.249.78.89
malicious
http://www.hoolgroup.com/e368/?Sp8=G2cdR0jX&fvqX7=eR4rPiW2MNE2/ANOqx7lq75qsL2/c7XOn0/ULjEZza3RAkLfBDjJaNgrdsyyjd0H7UOFm/tTzmyUZ5aJH0SqycUkZ8C5ySDTDL3wN5dIZIUkVb/vVReVmWCiNrxOVbhWeXeXR8c=
198.54.126.45
malicious
http://www.hisako.store/e368/?fvqX7=20kN1moJCTooD9mJcf5MvFcw3nT58gvL5lbbntzpVKEH5Sl3IH4Irl/5c421e5jy/hK+67sXSRWRnwaJyMQtNf0pPmwlO+kVNV7IUnytvE1VsXTemTA4l587dAzl30kN4zZ+q08=&Sp8=G2cdR0jX
18.139.62.226
malicious
http://www.grupoponiente.net/e368/
185.123.204.78
malicious
http://www.d4ffo73dz.sbs/e368/
47.238.180.222
malicious
http://www.dxgsf.shop/e368/?fvqX7=MPU+kkSLVmNlE6BiFT4mStbCjEKUAEZIJueR/SB7iQamDznHT5GXcmHCl6vfHo2zl4dcbern6KprCOm8xLfDV471oWxjGpEdYgUbDiCmKDy3vqqr9NO4qUH6kySzQ7KEuST0zmo=&Sp8=G2cdR0jX
103.197.25.241
malicious
http://www.pro-ecoproduct.com/e368/?fvqX7=SuW14oMrBIWiwopbsk+MLEtBSHCOaZgUesr57Wy3OWovetoPxjpHPnXLNalogi/6/sRAUB2WjNquvASuAfx5qEidc+bd9r+D5EUzSYZ4ylfLbX/4Rj9rKdPGuqyyBQVAodLQVBc=&Sp8=G2cdR0jX
87.236.19.107
malicious
http://www.hisako.store/e368/
18.139.62.226
malicious
http://www.vertilehub.xyz/e368/
203.161.49.220
malicious
http://www.tianrui8.com/e368/
43.249.78.89
malicious
http://www.pro-ecoproduct.com/e368/
87.236.19.107
malicious
http://www.grupoponiente.net/e368/?fvqX7=s/z+67gP/RYKJPPLVZ/HIqPFHZ+jgTwgRT1ec80e1OHXjJVMbb2mdn1iH/lwoW7yk2QIwX89OHUDGCb21foawzSnG9D1R2TJCGmyHyAw4T59OeJKSWjVFSFiRzBxQa2XFbe7DS8=&Sp8=G2cdR0jX
185.123.204.78
malicious
http://www.hentai778899.icu/e368/?fvqX7=PJg6uLytHSnHUgCyhCZrvk2KQod7huDSWNdMIp6u1jpk3Zp5nvPD9JtaHQdgEHTZ413qx2Ljg1KQ/BTmwec2J9ZX7DKTO5W5GEYcITXzgggUhen9dz/ya+56FR1bFBNTIrch78k=&Sp8=G2cdR0jX
172.67.156.246
malicious
http://www.hoolgroup.com/e368/
198.54.126.45
malicious
http://www.hentai778899.icu/e368/
172.67.156.246
malicious
http://www.vertilehub.xyz/e368/?fvqX7=rSe+HMCwXrjVe+ZzMEJlkoqxGqWutH10wJTe2ACC0gzkMhLDbvLCPZO2odIDfWg9zJlRpsb7rrPXsATRNKt3DejmWCn5u1P75cTg/F/idUcCE28LwwNnSuqg7jWOTZmIx/igRYs=&Sp8=G2cdR0jX
203.161.49.220
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://hoolrealestate.com/wp-includes/css/dist/block-library/style.min.css?ver=6.4.3
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
https://hoolrealestate.com/wp-content/uploads/2024/01/ico-150x150.jpg
unknown
https://hoolrealestate.com/wp-json/
unknown
http://hoolrealestate.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.14.0
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/public/js/public.
unknown
http://hoolrealestate.com/wp-content/plugins/elementor-pro/assets/lib/smartmenus/jquery.smartmenus.m
unknown
https://hoolrealestate.com/wp-content/uploads/2024/01/logo-hool-300x139.jpg
unknown
http://hoolrealestate.com/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=3.18.3
unknown
http://hoolrealestate.com/wp-content/uploads/elementor/css/post-7.css?ver=1707842149
unknown
https://static.addtoany.com/menu/page.js?ver=6.4.3
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/public/css/public
unknown
https://fburl.com
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/common/magnific-p
unknown
http://hoolrealestate.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
unknown
http://hoolrealestate.com/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=3.18.3
unknown
https://hoolgroup.com/en-renta/
unknown
https://hoolrealestate.com/wp-content/uploads/2024/01/ico-300x300.jpg
unknown
https://hoolrealestate.com/
unknown
http://hoolrealestate.com/wp-content/plugins/elementor/assets/lib/animations/animations.min.css?ver=
unknown
https://hoolgroup.com/wp-content/plugins/elementor-pro/assets/css/widget-nav-menu.min.css
unknown
https://mozilla.org0/
unknown
http://hoolrealestate.com/wp-content/uploads/elementor/css/global.css?ver=1707842150
unknown
https://hoolgroup.com/property-category/de-oportunidad/
unknown
http://hoolrealestate.com/wp-content/themes/astra/assets/js/minified/frontend.min.js?ver=4.6.3
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/includes/classes/
unknown
http://hoolrealestate.com/wp-content/plugins/premium-addons-for-elementor/assets/frontend/min-js/pre
unknown
http://hoolrealestate.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
unknown
http://www.grupoponiente.net
unknown
http://hoolrealestate.com/wp-content/uploads/elementor/css/post-195.css?ver=1708107525
unknown
https://www.googleanalytics.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://hoolrealestate.com/wp-includes/js/wp-util.min.js?ver=6.4.3
unknown
https://hoolrealestate.com/wp-admin/admin-ajax.php?action=uwac_dynamic_themes&ver=1.1.0
unknown
https://www.ecosia.org/newtab/
unknown
http://hoolrealestate.com/wp-content/plugins/elementor-pro/assets/lib/sticky/jquery.sticky.min.js?ve
unknown
https://hoolgroup.com/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css
unknown
http://hoolrealestate.com/wp-includes/js/dist/i18n.min.js?ver=7701b0c3857f914212ef
unknown
http://hoolrealestate.com/wp-content/plugins/elementor-pro/assets/js/frontend.min.js?ver=3.18.2
unknown
http://hoolrealestate.com/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/cs
unknown
http://hoolrealestate.com/wp-content/plugins/elementor-pro/assets/css/frontend-lite.min.css?ver=3.18
unknown
http://hoolrealestate.com/wp-includes/js/clipboard.min.js?ver=2.0.11
unknown
http://hoolrealestate.com/wp-content/plugins/uwac-7-1610815802/public/css/uwac-public.css?ver=1.1.0
unknown
https://w.ladicdn.com/v2/source/respond.min.js?v=1569310222693
unknown
https://hoolrealestate.com/wp-content/uploads/2024/01/JTUHjIg1_i6t8kCHKm4532VJOt5-QNFgpCtr6Ew-Y3tcoq
unknown
http://hoolrealestate.com/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=3.18.3
unknown
http://hoolrealestate.com/wp-content/plugins/elementor-pro/assets/js/elements-handlers.min.js?ver=3.
unknown
http://hoolrealestate.com/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js?ver=3.1.2
unknown
https://hoolgroup.com/quienes-somos/
unknown
https://optimize.google.com
unknown
http://hoolrealestate.com/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.6.3
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.tygavpn.com/e368/?Sp8=G2cdR0jX&fvqX7=wn3MJKjdQG1FkzNk7nSQLeBmNgZKITo5jH0P6Kf/gPQiWAQ/siH
unknown
https://hoolgroup.com/perfil/
unknown
http://push.zhanzhang.baidu.com/push.js
unknown
https://gmpg.org/xfn/11
unknown
https://hoolrealestate.com/wp-content/uploads/2024/01/JTUHjIg1_i6t8kCHKm4532VJOt5-QNFgpCs16Ew-Y3tcoq
unknown
https://hoolrealestate.com/wp-content/uploads/2024/01/JTUHjIg1_i6t8kCHKm4532VJOt5-QNFgpCuM70w-Y3tcoq
unknown
https://www.instagram.com/hoolgroup?igsh=MWtybjVzMTF1YXBwOQ%3D%3D
unknown
https://api.whatsapp.com/send?phone=528116609849&text=Me%20puedes%20dar%20m%C3%A1s%20informaci%
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/public/js/gm-popu
unknown
https://www.googleoptimize.com
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/common/select2/se
unknown
https://hoolrealestate.com/contacto/
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/public/js/markerc
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://hoolrealestate.com/wp-content/plugins/uwac-7-1610815802/public/js/uwac-public.js?ver=1.1.0
unknown
http://hoolrealestate.com/wp-includes/js/jquery/ui/mouse.min.js?ver=1.13.2
unknown
http://hoolrealestate.com/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js
unknown
http://hoolrealestate.com/wp-content/plugins/elementor/assets/lib/waypoints/waypoints.min.js?ver=4.0
unknown
http://hoolrealestate.com/wp-content/plugins/premium-addons-for-elementor/assets/frontend/min-css/pr
unknown
https://schema.org/WebPage
unknown
http://hoolrealestate.com/wp-includes/js/underscore.min.js?ver=1.13.4
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/public/js/osm.min
unknown
https://crash-reports.mozilla.com/submit?id=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://hoolrealestate.com/wp-content/plugins/Estatik-estatik-plugin-4-20000a1bbdeb/common/slick/slic
unknown
http://www.litespeedtech.com/error-page
unknown
https://hoolrealestate.com/feed/
unknown
https://api.w.org/
unknown
https://zz.bdstatic.com/linksubmit/push.js
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tianrui8.com
43.249.78.89
malicious
dns.ladipage.com
18.139.62.226
malicious
www.pro-ecoproduct.com
87.236.19.107
malicious
grupoponiente.net
185.123.204.78
malicious
dxgsf.shop
103.197.25.241
malicious
www.hentai778899.icu
172.67.156.246
malicious
xiaoyue.zhuangkou.com
47.238.180.222
malicious
www.vertilehub.xyz
203.161.49.220
malicious
www.tygavpn.com
212.227.172.253
malicious
hoolgroup.com
198.54.126.45
malicious
www.chil-a-keel.online
unknown
malicious
www.hisako.store
unknown
malicious
www.d4ffo73dz.sbs
unknown
malicious
www.tstailai.cyou
unknown
malicious
www.walluchile.com
unknown
malicious
www.shrh3c6v9.sbs
unknown
malicious
www.dxgsf.shop
unknown
malicious
www.hoolgroup.com
unknown
malicious
www.grupoponiente.net
unknown
malicious
www.todosneaker.com
unknown
malicious
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
87.236.19.107
www.pro-ecoproduct.com
Russian Federation
malicious
172.67.156.246
www.hentai778899.icu
United States
malicious
198.54.126.45
hoolgroup.com
United States
malicious
103.197.25.241
dxgsf.shop
Hong Kong
malicious
18.139.62.226
dns.ladipage.com
United States
malicious
185.123.204.78
grupoponiente.net
Spain
malicious
203.161.49.220
www.vertilehub.xyz
Malaysia
malicious
212.227.172.253
www.tygavpn.com
Germany
malicious
43.249.78.89
www.tianrui8.com
Hong Kong
malicious
47.238.180.222
xiaoyue.zhuangkou.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7A00000
trusted library section
page read and write
malicious
5540000
system
page execute and read and write
malicious
720000
system
page execute and read and write
malicious
10D0000
unclassified section
page execute and read and write
malicious
2761000
trusted library allocation
page read and write
malicious
2C40000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2C00000
trusted library allocation
page read and write
malicious
4880000
unclassified section
page execute and read and write
malicious
6290000
unkown
page execute and read and write
malicious
79DC000
heap
page read and write
5400000
trusted library allocation
page execute and read and write
45B1000
heap
page read and write
2D33000
heap
page read and write
281E000
trusted library allocation
page read and write
7976000
heap
page read and write
158F000
stack
page read and write
7D0000
heap
page read and write
FD0000
unkown
page readonly
4E00000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
479E000
stack
page read and write
92F000
stack
page read and write
F00000
unkown
page readonly
CB0000
trusted library allocation
page read and write
4750000
trusted library allocation
page execute and read and write
4BDD000
direct allocation
page execute and read and write
2E20000
heap
page read and write
56A000
stack
page read and write
45B1000
heap
page read and write
F8A000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
1060000
unkown
page read and write
45B1000
heap
page read and write
561D000
system
page execute and read and write
45B1000
heap
page read and write
7966000
heap
page read and write
45B1000
heap
page read and write
5180000
heap
page read and write
6DAE000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
48FE000
heap
page read and write
2DB5000
heap
page read and write
12D9000
direct allocation
page execute and read and write
108F000
stack
page read and write
12FC000
stack
page read and write
45B1000
heap
page read and write
15CE000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
1440000
unkown
page read and write
8A7000
unkown
page readonly
2D33000
heap
page read and write
45B0000
heap
page read and write
2DAE000
heap
page read and write
B80000
unkown
page readonly
45B1000
heap
page read and write
27D1000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
77C000
stack
page read and write
BDE000
stack
page read and write
2C40000
heap
page read and write
2D65000
heap
page read and write
2CB0000
heap
page read and write
52DE000
stack
page read and write
45B1000
heap
page read and write
7D4000
heap
page read and write
B6E000
heap
page read and write
2D22000
heap
page read and write
2D18000
heap
page read and write
45B1000
heap
page read and write
CAD000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
4E73000
heap
page read and write
45B1000
heap
page read and write
C9E000
stack
page read and write
45B1000
heap
page read and write
A2E000
stack
page read and write
45B1000
heap
page read and write
79BD000
heap
page read and write
B70000
unkown
page readonly
45B1000
heap
page read and write
79CF000
heap
page read and write
45B1000
heap
page read and write
D10000
heap
page read and write
6AB2000
unclassified section
page read and write
2EB02000
system
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2D9D000
heap
page read and write
2866000
trusted library allocation
page read and write
1410000
unkown
page read and write
2A80000
unclassified section
page execute and read and write
2DE0000
heap
page read and write
7D4000
heap
page read and write
5324000
unclassified section
page read and write
4910000
direct allocation
page execute and read and write
89E000
unkown
page readonly
45B1000
heap
page read and write
7A30000
heap
page read and write
B90000
heap
page read and write
2D2D000
heap
page read and write
4E50000
trusted library allocation
page read and write
45B1000
heap
page read and write
2E32000
unkown
page read and write
AC0000
unkown
page readonly
F4F000
stack
page read and write
27B2000
trusted library allocation
page read and write
5B00000
heap
page read and write
891000
unkown
page execute read
45B1000
heap
page read and write
3AAD000
trusted library allocation
page read and write
8EE000
stack
page read and write
2D22000
heap
page read and write
D76000
heap
page read and write
45B1000
heap
page read and write
BE0000
unkown
page read and write
1110000
heap
page read and write
CC2000
trusted library allocation
page read and write
4E90000
unkown
page execute and read and write
8A5000
unkown
page read and write
4C62000
unclassified section
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
1410000
unkown
page read and write
78FE000
stack
page read and write
1A60000
unkown
page readonly
FD0000
unkown
page read and write
51A0000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
891000
unkown
page execute read
45B1000
heap
page read and write
3853000
trusted library allocation
page read and write
4D7C000
unclassified section
page read and write
45B9000
heap
page read and write
45B1000
heap
page read and write
B90000
heap
page read and write
45B1000
heap
page read and write
1480000
heap
page read and write
1035000
heap
page read and write
45B1000
heap
page read and write
16A0000
unkown
page readonly
45B1000
heap
page read and write
B2A000
stack
page read and write
45B1000
heap
page read and write
34F4000
unkown
page read and write
112F000
heap
page read and write
CF0000
trusted library allocation
page read and write
3A90000
unkown
page execute and read and write
45B1000
heap
page read and write
53F0000
trusted library section
page read and write
45B1000
heap
page read and write
D50000
heap
page read and write
515B000
stack
page read and write
5AE5000
heap
page read and write
2DE6000
heap
page read and write
45B1000
heap
page read and write
5D0000
heap
page read and write
1060000
unkown
page read and write
51B0000
trusted library allocation
page read and write
5170000
heap
page read and write
B40000
heap
page read and write
55C9000
system
page execute and read and write
1040000
unkown
page readonly
D58000
heap
page read and write
B9F000
heap
page read and write
79EA000
heap
page read and write
45B1000
heap
page read and write
2E20000
heap
page read and write
B2F000
stack
page read and write
89E000
unkown
page readonly
45B1000
heap
page read and write
2EBC2000
system
page read and write
45B1000
heap
page read and write
BF3000
heap
page read and write
BDE000
stack
page read and write
BE0000
unkown
page read and write
45B1000
heap
page read and write
B70000
unkown
page readonly
A35E000
stack
page read and write
102E000
stack
page read and write
78BD000
stack
page read and write
16D0000
unkown
page readonly
CBD000
trusted library allocation
page execute and read and write
1118000
heap
page read and write
D20000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
89E000
unkown
page readonly
2D3A000
heap
page read and write
D40000
heap
page execute and read and write
4C84000
trusted library allocation
page read and write
7986000
heap
page read and write
AFB000
stack
page read and write
45B1000
heap
page read and write
4889000
heap
page read and write
2D6D000
heap
page read and write
1972ED70000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2DDC000
heap
page read and write
1421000
unkown
page readonly
45B1000
heap
page read and write
1430000
heap
page read and write
2080000
unclassified section
page execute and read and write
483B000
stack
page read and write
15D0000
heap
page read and write
79CC000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2F1C4000
system
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
79C0000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
5000000
heap
page execute and read and write
2D7C000
heap
page read and write
45B1000
heap
page read and write
8F7000
stack
page read and write
45B1000
heap
page read and write
1030000
heap
page read and write
45B1000
heap
page read and write
2DD5000
heap
page read and write
4E5F000
trusted library allocation
page read and write
2D2D000
heap
page read and write
265E000
stack
page read and write
45B1000
heap
page read and write
55BA000
system
page execute and read and write
39AA000
unkown
page read and write
80CB000
heap
page read and write
2C80000
trusted library allocation
page read and write
79D3000
heap
page read and write
45B1000
heap
page read and write
7950000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
5890000
unkown
page execute and read and write
4D22000
unclassified section
page read and write
45B1000
heap
page read and write
1070000
unkown
page read and write
7972000
heap
page read and write
CDB000
trusted library allocation
page execute and read and write
1310000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
6DFE000
stack
page read and write
1421000
unkown
page readonly
2D85000
heap
page read and write
45B1000
heap
page read and write
2D5C000
heap
page read and write
4C9E000
trusted library allocation
page read and write
16D0000
unkown
page readonly
45B1000
heap
page read and write
510F000
stack
page read and write
47ED000
stack
page read and write
45B1000
heap
page read and write
D00000
trusted library allocation
page execute and read and write
2F94000
heap
page read and write
890000
unkown
page readonly
805E000
stack
page read and write
4490000
unkown
page execute and read and write
45B1000
heap
page read and write
CA3000
trusted library allocation
page execute and read and write
45B1000
heap
page read and write
FD0000
unkown
page read and write
422000
unkown
page readonly
45B1000
heap
page read and write
B80000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
EFC000
stack
page read and write
4AAE000
direct allocation
page execute and read and write
1461000
direct allocation
page execute and read and write
2E32000
unkown
page read and write
45B1000
heap
page read and write
2D2D000
heap
page read and write
6FD77FD000
stack
page read and write
79DF000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
EFC000
stack
page read and write
45B1000
heap
page read and write
D30000
trusted library allocation
page read and write
55A2000
system
page execute and read and write
4E38000
unclassified section
page execute and read and write
1972EB70000
system
page execute and read and write
7999000
heap
page read and write
45B1000
heap
page read and write
F20000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
FC0000
unkown
page readonly
79E1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2C80000
trusted library allocation
page read and write
4FAE000
stack
page read and write
FD0000
unkown
page readonly
45B1000
heap
page read and write
5AE0000
heap
page read and write
79C6000
heap
page read and write
4E70000
heap
page read and write
4A3D000
direct allocation
page execute and read and write
3E80000
unclassified section
page execute and read and write
2BAF000
stack
page read and write
6DB0000
trusted library allocation
page read and write
45B1000
heap
page read and write
890000
unkown
page readonly
2F90000
heap
page read and write
4DCA000
unclassified section
page execute and read and write
2D28000
heap
page read and write
46B0000
trusted library allocation
page read and write
7372000
trusted library allocation
page read and write
45B1000
heap
page read and write
55C6000
system
page execute and read and write
CA4000
trusted library allocation
page read and write
45B1000
heap
page read and write
B6B000
heap
page read and write
47A0000
trusted library allocation
page read and write
1480000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2D6C000
heap
page read and write
62D8000
unclassified section
page read and write
275F000
stack
page read and write
1040000
unkown
page readonly
45B1000
heap
page read and write
A120000
heap
page read and write
45B1000
heap
page read and write
B60000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
2CC0000
heap
page read and write
5420000
trusted library allocation
page execute and read and write
6C70000
heap
page read and write
4CAD000
trusted library allocation
page read and write
726F000
stack
page read and write
2C00000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
2F70000
unkown
page read and write
CC6000
trusted library allocation
page execute and read and write
45B1000
heap
page read and write
5AFE000
unclassified section
page read and write
45B1000
heap
page read and write
7961000
heap
page read and write
AB0000
unkown
page readonly
7F0000
heap
page read and write
C55000
heap
page read and write
57DA000
unclassified section
page read and write
76D0000
trusted library allocation
page read and write
7953000
heap
page read and write
55AA000
system
page execute and read and write
45B1000
heap
page read and write
AB0000
unkown
page readonly
1460000
unkown
page readonly
B2A000
stack
page read and write
5E0000
heap
page read and write
7960000
heap
page read and write
130F000
stack
page read and write
FE0000
unkown
page readonly
BA1000
heap
page read and write
2C80000
trusted library allocation
page read and write
67DA000
unkown
page execute and read and write
53DE000
stack
page read and write
7978000
heap
page read and write
79D9000
heap
page read and write
BF1000
unkown
page readonly
2D2D000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
6DA0000
trusted library allocation
page read and write
14F8000
direct allocation
page execute and read and write
45B1000
heap
page read and write
1110000
heap
page read and write
5190000
trusted library allocation
page execute and read and write
7D4000
heap
page read and write
572C000
unkown
page read and write
3805000
trusted library allocation
page read and write
45B1000
heap
page read and write
F10000
unkown
page readonly
2D2D000
heap
page read and write
678E000
unclassified section
page read and write
4FEE000
stack
page read and write
A45E000
stack
page read and write
CD2000
trusted library allocation
page read and write
45B1000
heap
page read and write
2C50000
unkown
page readonly
16A0000
unkown
page readonly
AC0000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
CA0000
trusted library allocation
page read and write
45B1000
heap
page read and write
130F000
stack
page read and write
45B1000
heap
page read and write
891000
unkown
page execute read
2DA4000
heap
page read and write
45B1000
heap
page read and write
D70000
heap
page read and write
488D000
heap
page read and write
F8E000
stack
page read and write
6AB000
stack
page read and write
4760000
heap
page read and write
45B1000
heap
page read and write
2FA0000
unkown
page readonly
51C0000
trusted library allocation
page execute and read and write
C00000
heap
page read and write
809F000
stack
page read and write
12FC000
stack
page read and write
2D28000
heap
page read and write
46DC000
heap
page read and write
495E000
unkown
page read and write
2F90000
heap
page read and write
79E2000
heap
page read and write
D4E000
stack
page read and write
4A39000
direct allocation
page execute and read and write
9E0000
heap
page read and write
45B1000
heap
page read and write
4CB0000
trusted library allocation
page read and write
43E9000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
4D40000
trusted library allocation
page read and write
AA0000
unkown
page readonly
70E0000
trusted library section
page read and write
6848000
unkown
page execute and read and write
4C82000
unkown
page read and write
BF1000
unkown
page readonly
D78000
heap
page read and write
3A71000
trusted library allocation
page read and write
79E4000
heap
page read and write
2D7F000
heap
page read and write
45B1000
heap
page read and write
1440000
unkown
page read and write
45B1000
heap
page read and write
2C50000
unkown
page readonly
45B1000
heap
page read and write
D01000
unkown
page read and write
4D20000
heap
page read and write
5C90000
unclassified section
page read and write
15D8000
heap
page read and write
45B1000
heap
page read and write
C18000
heap
page read and write
E7E000
stack
page read and write
45B1000
heap
page read and write
4CA1000
trusted library allocation
page read and write
890000
unkown
page readonly
10DC000
unkown
page read and write
7961000
heap
page read and write
45B1000
heap
page read and write
1080000
unkown
page read and write
45B1000
heap
page read and write
482E000
stack
page read and write
797B000
heap
page read and write
8A5000
unkown
page read and write
8A5000
unkown
page read and write
7A60000
trusted library allocation
page read and write
8A5000
unkown
page read and write
45B1000
heap
page read and write
4316000
unkown
page read and write
B60000
heap
page read and write
2FA0000
unkown
page readonly
3480000
unclassified section
page execute and read and write
1600000
heap
page read and write
3FF2000
unkown
page read and write
2D2D000
heap
page read and write
79A9000
heap
page read and write
6146000
unclassified section
page read and write
45B1000
heap
page read and write
1090000
direct allocation
page read and write
2F4C000
unkown
page read and write
CD7000
trusted library allocation
page execute and read and write
4C52000
direct allocation
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
8A7000
unkown
page readonly
51D0000
heap
page read and write
4CA6000
trusted library allocation
page read and write
45B1000
heap
page read and write
7A20000
heap
page read and write
799F000
heap
page read and write
2D28000
heap
page read and write
45B1000
heap
page read and write
5410000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
F00000
unkown
page readonly
B94000
heap
page read and write
45B1000
heap
page read and write
4E07000
trusted library allocation
page read and write
2D71000
heap
page read and write
4184000
unkown
page read and write
45B1000
heap
page read and write
55A0000
system
page execute and read and write
45B1000
heap
page read and write
15D0000
heap
page read and write
45B1000
heap
page read and write
15D8000
heap
page read and write
D50000
trusted library allocation
page read and write
C06000
heap
page read and write
45B1000
heap
page read and write
1310000
unkown
page readonly
F10000
unkown
page readonly
790000
heap
page read and write
1680000
unclassified section
page execute and read and write
2D10000
heap
page read and write
45B1000
heap
page read and write
5FB4000
unclassified section
page read and write
1030000
heap
page read and write
FF0000
heap
page read and write
C10000
heap
page read and write
8B38000
trusted library allocation
page read and write
45B1000
heap
page read and write
79D4000
heap
page read and write
45B1000
heap
page read and write
44A8000
unkown
page read and write
45B1000
heap
page read and write
4FF0000
trusted library allocation
page execute and read and write
45B1000
heap
page read and write
2EF2000
unkown
page read and write
A31E000
stack
page read and write
79FF000
stack
page read and write
7971000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
420000
unkown
page readonly
7A0000
heap
page read and write
D65000
trusted library allocation
page read and write
AA0000
unkown
page readonly
4BE1000
direct allocation
page execute and read and write
F20000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
FF0000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
8A7000
unkown
page readonly
4CE0000
trusted library allocation
page read and write
147D000
direct allocation
page execute and read and write
2E24000
heap
page read and write
79D6000
heap
page read and write
45B1000
heap
page read and write
3E60000
unkown
page read and write
2DC1000
heap
page read and write
C14000
heap
page read and write
2F6F000
stack
page read and write
6E8000
stack
page read and write
5AF0000
heap
page read and write
3CCE000
unkown
page read and write
45B1000
heap
page read and write
5160000
trusted library section
page readonly
FE0000
unkown
page readonly
1A60000
unkown
page readonly
2DAB000
heap
page read and write
8A7000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
FC0000
unkown
page readonly
12DD000
direct allocation
page execute and read and write
1476000
direct allocation
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
5E22000
unclassified section
page read and write
4CB2000
trusted library allocation
page read and write
45B1000
heap
page read and write
1118000
heap
page read and write
2E24000
heap
page read and write
2D0D000
stack
page read and write
4E4E000
stack
page read and write
79A3000
heap
page read and write
4E60000
trusted library allocation
page read and write
134E000
direct allocation
page execute and read and write
1670000
heap
page read and write
891000
unkown
page execute read
45B1000
heap
page read and write
45B1000
heap
page read and write
4CC0000
trusted library allocation
page read and write
45B1000
heap
page read and write
B60000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
3761000
trusted library allocation
page read and write
140E000
stack
page read and write
1460000
unkown
page readonly
F8A000
stack
page read and write
2C40000
heap
page read and write
5ADD000
stack
page read and write
2F94000
heap
page read and write
CC0000
trusted library allocation
page read and write
45B1000
heap
page read and write
493C000
stack
page read and write
11B0000
direct allocation
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
4D30000
trusted library allocation
page execute and read and write
45B1000
heap
page read and write
7A79000
heap
page read and write
3090000
unkown
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2DFA000
heap
page read and write
29D0000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2F70000
unkown
page read and write
393E000
trusted library allocation
page read and write
45B1000
heap
page read and write
1430000
heap
page read and write
796B000
heap
page read and write
37B7000
trusted library allocation
page read and write
45B1000
heap
page read and write
3769000
trusted library allocation
page read and write
890000
unkown
page readonly
45B1000
heap
page read and write
89E000
unkown
page readonly
45B1000
heap
page read and write
2D93000
heap
page read and write
CCA000
trusted library allocation
page execute and read and write
5B25000
heap
page read and write
797E000
heap
page read and write
There are 623 hidden memdumps, click here to show them.