IOC Report
Axis Bank - 67 Account Pending Bank Receipt.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Axis Bank - 67 Account Pending Bank Receipt.pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp566C.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OkLsTLaTTZVp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\85664-rN9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c01resdk.iss.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmuyol4a.dkt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkpcntnf.pmb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qxnguqcf.zc0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ra5p0myq.ild.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_se0ahuvf.lvo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tskaq5hl.gpl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xgtp5uoc.le4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6A22.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe
"C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OkLsTLaTTZVp" /XML "C:\Users\user\AppData\Local\Temp\tmp566C.tmp"
malicious
C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe
"C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe"
malicious
C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe
"C:\Users\user\Desktop\Axis Bank - 67 Account Pending Bank Receipt.pdf.exe"
malicious
C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe
C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe
malicious
C:\Program Files (x86)\lMrsFaZtIHxsydIteCamjNxAcldBeoDWTXWtXDtyOrcuniOBQzOlkosufHKzhKUlRkaqQ\IiPvZGpNYiTIbQIQLaPZIDOIY.exe
"C:\Program Files (x86)\lMrsFaZtIHxsydIteCamjNxAcldBeoDWTXWtXDtyOrcuniOBQzOlkosufHKzhKUlRkaqQ\IiPvZGpNYiTIbQIQLaPZIDOIY.exe"
malicious
C:\Windows\SysWOW64\sc.exe
"C:\Windows\SysWOW64\sc.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OkLsTLaTTZVp" /XML "C:\Users\user\AppData\Local\Temp\tmp6A22.tmp"
malicious
C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe
"C:\Users\user\AppData\Roaming\OkLsTLaTTZVp.exe"
malicious
C:\Program Files (x86)\lMrsFaZtIHxsydIteCamjNxAcldBeoDWTXWtXDtyOrcuniOBQzOlkosufHKzhKUlRkaqQ\IiPvZGpNYiTIbQIQLaPZIDOIY.exe
"C:\Program Files (x86)\lMrsFaZtIHxsydIteCamjNxAcldBeoDWTXWtXDtyOrcuniOBQzOlkosufHKzhKUlRkaqQ\IiPvZGpNYiTIbQIQLaPZIDOIY.exe"
malicious
C:\Windows\SysWOW64\sc.exe
"C:\Windows\SysWOW64\sc.exe"
malicious
C:\Program Files (x86)\lMrsFaZtIHxsydIteCamjNxAcldBeoDWTXWtXDtyOrcuniOBQzOlkosufHKzhKUlRkaqQ\IiPvZGpNYiTIbQIQLaPZIDOIY.exe
"C:\Program Files (x86)\lMrsFaZtIHxsydIteCamjNxAcldBeoDWTXWtXDtyOrcuniOBQzOlkosufHKzhKUlRkaqQ\IiPvZGpNYiTIbQIQLaPZIDOIY.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.maiilchannels.net/i9if/
91.195.240.19
malicious
http://www.oyoing.com/i9if/
91.195.240.19
malicious
http://www.dreamdriss.lol/i9if/
91.195.240.19
malicious
http://www.lucathicke.com/i9if/
91.195.240.19
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://jnkinteractive.co.kr/i9if/?_jePv=J/ZdKhwjcPNgkYWK8nNQGDYuFg//K8kO
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.ojaitangerines.com/__media__/design/underconstructionnotice.php?d=ojaitangerines.com
unknown
http://i1.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
https://cdn.consentmanager.net
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
http://img.sedoparking.com
unknown
https://www.namecheap.com/domains/registration/results/?domain=oyoing.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://i1.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
unknown
https://www.namecheap.com/domains/registration/results/?domain=dreamdriss.lol
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
https://www.namecheap.com/domains/registration/results/?domain=lucathicke.com
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
http://www.ojaitangerines.com/10_Best_Plants_to_Grow_Under_Trees.cfm?fp=K0%2F962KgYemrl7hnegkWVe6c3A
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.ruplome.store/i9if/
91.195.240.117
http://www.Ojaitangerines.com
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
http://www.maiilchannels.net
unknown
http://i1.cdn-image.com/__media__/pics/28903/search.png)
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://www.ojaitangerines.com/Grow_Avocado_Tree_Quickly.cfm?fp=K0%2F962KgYemrl7hnegkWVe6c3AwnTGYbKX7
unknown
http://i1.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ojaitangerines.com/Grow_a_Cinnamon_Tree.cfm?fp=K0%2F962KgYemrl7hnegkWVe6c3AwnTGYbKX7wP35i
unknown
http://www.heolty.xyz/i9if/
162.0.238.43
https://delivery.consentmanager.net
unknown
https://mozilla.org0/
unknown
http://i1.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
unknown
https://crash-reports.mozilla.com/submit?id=
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
http://www.ojaitangerines.com/__media__/js/trademark.php?d=ojaitangerines.com&type=ns
unknown
http://www.litespeedtech.com/error-page
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
http://www.gamesun.website/i9if/
84.32.84.32
http://www.brandprome.com/i9if/
136.0.69.78
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://www.ozenmoda.com/i9if/
94.73.151.78
https://www.tucowsdomains.com/
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
http://www.ojaitangerines.com/Plants_That_Grow_Under_Trees.cfm?fp=K0%2F962KgYemrl7hnegkWVe6c3AwnTGYb
unknown
http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
http://www.jnkinteractive.co.kr/i9if/
183.111.183.31
https://img.sedoparking.com/templates/images/hero_nc.svg
unknown
http://www.alpinalpes.com/i9if/
89.252.183.131
http://www.cr-pos.com/i9if/
198.38.83.196
http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.ojaitangerines.com/Fruit_Trees_That_Are_Easy_to_Grow.cfm?fp=K0%2F962KgYemrl7hnegkWVe6c3Aw
unknown
http://www.ojaitangerines.com/i9if/
208.91.197.27
http://i1.cdn-image.com/__media__/js/min.js?v2.3
unknown
http://www.rprostranstvo.ru/i9if/
185.72.146.135
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hardtables.store
87.236.16.168
malicious
www.heolty.xyz
162.0.238.43
malicious
www.alpinalpes.com
unknown
malicious
www.oyoing.com
unknown
malicious
www.ozenmoda.com
unknown
malicious
www.rprostranstvo.ru
unknown
malicious
www.jnkinteractive.co.kr
unknown
malicious
www.dreamdriss.lol
unknown
malicious
www.gamesun.website
unknown
malicious
www.maiilchannels.net
unknown
malicious
www.lucathicke.com
unknown
malicious
www.cr-pos.com
198.38.83.196
gamesun.website
84.32.84.32
alpinalpes.com
89.252.183.131
jnkinteractive.co.kr
183.111.183.31
parkingpage.namecheap.com
91.195.240.19
www.ojaitangerines.com
208.91.197.27
ozenmoda.com
94.73.151.78
rprostranstvo.ru
185.72.146.135
www.brandprome.com
136.0.69.78
www.ruplome.store
91.195.240.117
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.0.238.43
www.heolty.xyz
Canada
malicious
87.236.16.168
www.hardtables.store
Russian Federation
malicious
91.195.240.117
www.ruplome.store
Germany
94.73.151.78
ozenmoda.com
Turkey
89.252.183.131
alpinalpes.com
Turkey
185.72.146.135
rprostranstvo.ru
Russian Federation
198.38.83.196
www.cr-pos.com
United States
208.91.197.27
www.ojaitangerines.com
Virgin Islands (BRITISH)
84.32.84.32
gamesun.website
Lithuania
91.195.240.19
parkingpage.namecheap.com
Germany
183.111.183.31
jnkinteractive.co.kr
Korea Republic of
136.0.69.78
www.brandprome.com
United States
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2030000
unclassified section
page execute and read and write
malicious
2B30000
system
page execute and read and write
malicious
27A0000
unclassified section
page execute and read and write
malicious
6A70000
trusted library section
page read and write
malicious
4AE0000
system
page execute and read and write
malicious
2E51000
trusted library allocation
page read and write
malicious
2D20000
unkown
page execute and read and write
malicious
18A0000
unclassified section
page execute and read and write
malicious
2471000
trusted library allocation
page read and write
malicious
3110000
unkown
page execute and read and write
malicious
3330000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
800000
system
page execute and read and write
malicious
3100000
trusted library allocation
page read and write
malicious
6DF0000
trusted library allocation
page read and write
6F7000
unkown
page readonly
800D000
heap
page read and write
3F0000
unkown
page readonly
6EE000
unkown
page readonly
5570000
trusted library allocation
page read and write
19C0000
heap
page read and write
3019000
heap
page read and write
6A90000
trusted library allocation
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
2157000
trusted library allocation
page execute and read and write
6D00000
trusted library section
page read and write
7C0000
heap
page read and write
23D2000
unkown
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
5F0000
heap
page read and write
2CD3000
heap
page read and write
4C10000
heap
page read and write
3171000
heap
page read and write
D6F000
unkown
page read and write
3171000
heap
page read and write
2FE0000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
CE0000
heap
page read and write
6E1000
unkown
page execute read
6F7000
unkown
page readonly
140000
unkown
page readonly
3820000
trusted library allocation
page read and write
660000
unkown
page read and write
6EE000
unkown
page readonly
1D16000
direct allocation
page execute and read and write
566E000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
5B0000
heap
page read and write
3171000
heap
page read and write
6F5000
unkown
page read and write
3171000
heap
page read and write
FDE000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
6E30000
trusted library section
page read and write
58C0000
heap
page read and write
6BEE000
stack
page read and write
3171000
heap
page read and write
65E000
stack
page read and write
7770000
heap
page read and write
3171000
heap
page read and write
3454000
heap
page read and write
3E51000
trusted library allocation
page read and write
E89000
stack
page read and write
6B4000
heap
page read and write
3471000
trusted library allocation
page read and write
9F7E000
stack
page read and write
1621000
heap
page read and write
3410000
trusted library allocation
page execute and read and write
4B9B000
stack
page read and write
1A39000
system
page execute and read and write
3171000
heap
page read and write
1B30000
direct allocation
page execute and read and write
5E0000
heap
page read and write
510000
unkown
page readonly
A15F000
stack
page read and write
690000
unkown
page read and write
5470000
heap
page read and write
3171000
heap
page read and write
2362C4B0000
heap
page read and write
2FC7000
heap
page read and write
4C11000
unclassified section
page execute and read and write
464C000
stack
page read and write
F70000
unkown
page readonly
3171000
heap
page read and write
16C0000
heap
page read and write
F2A000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
67FE000
stack
page read and write
3171000
heap
page read and write
2FCD000
heap
page read and write
12FC000
stack
page read and write
49C0000
heap
page read and write
6B4000
heap
page read and write
3171000
heap
page read and write
3A48000
unkown
page read and write
3171000
heap
page read and write
53C6000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
7F5000
heap
page read and write
4AA0000
heap
page read and write
2FB5000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
42D9000
trusted library allocation
page read and write
402E000
trusted library allocation
page read and write
5370000
heap
page read and write
490000
heap
page read and write
2FA6000
heap
page read and write
2FB3000
heap
page read and write
21E0000
trusted library allocation
page read and write
3171000
heap
page read and write
520000
heap
page read and write
3171000
heap
page read and write
502C000
stack
page read and write
2300000
trusted library allocation
page read and write
37A1000
direct allocation
page execute and read and write
4BF0000
unkown
page read and write
3171000
heap
page read and write
2C71000
heap
page read and write
5670000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
77B4000
heap
page read and write
1D1D000
direct allocation
page execute and read and write
3171000
heap
page read and write
3171000
heap
page read and write
49D4000
trusted library allocation
page read and write
6BF0000
heap
page read and write
2C80000
trusted library allocation
page read and write
1DE1000
direct allocation
page execute and read and write
2F4A000
unkown
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
4E8E000
stack
page read and write
D90000
heap
page read and write
3EFE000
unkown
page read and write
220000
unkown
page readonly
3171000
heap
page read and write
110E000
heap
page read and write
1440000
unkown
page readonly
3171000
heap
page read and write
34C7000
trusted library allocation
page read and write
13BD000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
880000
heap
page read and write
24F2000
trusted library allocation
page read and write
3171000
heap
page read and write
161F000
heap
page read and write
14DE000
stack
page read and write
2E9A000
trusted library allocation
page read and write
2F58000
heap
page read and write
2020000
heap
page read and write
68E000
stack
page read and write
2FE8000
heap
page read and write
7FEF000
heap
page read and write
123E000
stack
page read and write
6F5000
unkown
page read and write
2F47000
heap
page read and write
4C4C000
unkown
page read and write
4BB4000
unclassified section
page read and write
3171000
heap
page read and write
874000
trusted library allocation
page read and write
EB0000
unkown
page readonly
55C0000
heap
page execute and read and write
3171000
heap
page read and write
2114000
heap
page read and write
3D91000
unkown
page execute and read and write
6F7000
unkown
page readonly
3171000
heap
page read and write
3171000
heap
page read and write
894000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
EC0000
unkown
page readonly
53CD000
trusted library allocation
page read and write
120000
unkown
page readonly
3171000
heap
page read and write
4B76000
system
page execute and read and write
541000
unkown
page readonly
3171000
heap
page read and write
1120000
heap
page read and write
DDE000
stack
page read and write
564E000
stack
page read and write
5560000
trusted library allocation
page execute and read and write
2CA0000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
868000
heap
page read and write
2CC0000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
5780000
heap
page read and write
49FD000
trusted library allocation
page read and write
2BE4000
heap
page read and write
21D0000
heap
page read and write
5925000
heap
page read and write
65E000
stack
page read and write
3171000
heap
page read and write
86DE000
stack
page read and write
6F5000
unkown
page read and write
61F000
unkown
page read and write
3171000
heap
page read and write
6F5000
unkown
page read and write
4B66000
system
page execute and read and write
3171000
heap
page read and write
9D0000
heap
page read and write
3171000
heap
page read and write
779B000
heap
page read and write
2CA2000
trusted library allocation
page read and write
A30D000
unkown
page read and write
530000
unkown
page read and write
397C000
unclassified section
page read and write
3171000
heap
page read and write
2310000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
3322000
direct allocation
page execute and read and write
2AC0000
heap
page read and write
317E000
direct allocation
page execute and read and write
5191000
unkown
page execute and read and write
2F50000
heap
page read and write
3171000
heap
page read and write
587D000
stack
page read and write
2F0E000
stack
page read and write
3171000
heap
page read and write
30C0000
heap
page read and write
7380000
heap
page read and write
15F0000
heap
page read and write
132000
unkown
page readonly
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
500000
unkown
page readonly
670000
heap
page read and write
2ECE000
trusted library allocation
page read and write
2F40000
heap
page read and write
2FB5000
heap
page read and write
8E2E000
stack
page read and write
3171000
heap
page read and write
8DEF000
stack
page read and write
3171000
heap
page read and write
2210000
heap
page read and write
6BF000
stack
page read and write
3171000
heap
page read and write
21C0000
unkown
page read and write
10EC000
stack
page read and write
7500000
trusted library allocation
page execute and read and write
143E000
stack
page read and write
860000
heap
page read and write
6F5000
unkown
page read and write
3391000
unkown
page execute and read and write
6EE000
unkown
page readonly
4D46000
unclassified section
page read and write
3171000
heap
page read and write
96A000
stack
page read and write
2CE0000
heap
page read and write
5650000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
130000
unkown
page readonly
7FA8000
heap
page read and write
6CF0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
8016000
heap
page read and write
3E0000
unkown
page readonly
3020000
unkown
page readonly
3171000
heap
page read and write
2210000
heap
page read and write
3171000
heap
page read and write
2AA000
stack
page read and write
6D0000
unkown
page read and write
3171000
heap
page read and write
566F000
trusted library section
page readonly
3171000
heap
page read and write
2EE4000
trusted library allocation
page read and write
3171000
heap
page read and write
21F0000
heap
page read and write
3171000
heap
page read and write
2315000
trusted library allocation
page read and write
6E0000
unkown
page readonly
15C0000
heap
page read and write
3171000
heap
page read and write
6D10000
trusted library allocation
page execute and read and write
7510000
trusted library allocation
page read and write
3171000
heap
page read and write
902E000
stack
page read and write
1DFD000
direct allocation
page execute and read and write
4FC000
stack
page read and write
7FC8000
heap
page read and write
3479000
trusted library allocation
page read and write
2E11000
unclassified section
page execute and read and write
4ED8000
unclassified section
page read and write
6D20000
trusted library allocation
page read and write
3171000
heap
page read and write
F80000
unkown
page readonly
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
5576000
trusted library allocation
page read and write
30CB000
heap
page read and write
3171000
heap
page read and write
1DA0000
unclassified section
page execute and read and write
1F0000
unkown
page readonly
2CD0000
heap
page read and write
1A10000
system
page execute and read and write
310D000
direct allocation
page execute and read and write
3171000
heap
page read and write
690000
unkown
page read and write
4F75000
trusted library allocation
page read and write
13B4000
trusted library allocation
page read and write
3171000
heap
page read and write
FF0000
heap
page read and write
4F1E000
stack
page read and write
3171000
heap
page read and write
2FE4000
heap
page read and write
28CF000
unclassified section
page execute and read and write
22E0000
unkown
page readonly
80B0000
trusted library allocation
page read and write
14E0000
heap
page read and write
1137000
heap
page read and write
317D000
heap
page read and write
558000
heap
page read and write
58D5000
trusted library allocation
page read and write
2ACA000
heap
page read and write
230000
unkown
page readonly
49D0000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
3171000
heap
page read and write
6E0000
unkown
page readonly
327E000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
40BD000
trusted library allocation
page read and write
4B56000
trusted library allocation
page read and write
213D000
trusted library allocation
page execute and read and write
7FC0000
heap
page read and write
7FBB000
heap
page read and write
2C83000
trusted library allocation
page read and write
6B0000
heap
page read and write
2C2A2000
system
page read and write
F90000
heap
page read and write
2F4A000
heap
page read and write
1DF6000
direct allocation
page execute and read and write
2362C250000
system
page execute and read and write
44AE000
stack
page read and write
16D0000
unkown
page readonly
6C03000
heap
page read and write
7FB1000
heap
page read and write
246F000
stack
page read and write
2F6F000
stack
page read and write
88CE000
stack
page read and write
231F000
stack
page read and write
71F000
heap
page read and write
87D000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
F60000
unkown
page readonly
24EC000
unkown
page read and write
1A31000
system
page execute and read and write
32B1000
direct allocation
page execute and read and write
51FC000
unclassified section
page read and write
2AD0000
heap
page read and write
3327000
heap
page read and write
8DE000
stack
page read and write
2150000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
2ABE000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
408000
unkown
page read and write
588000
heap
page read and write
FE0000
unkown
page read and write
2AF8000
stack
page read and write
13D0000
heap
page read and write
3171000
heap
page read and write
2F54000
heap
page read and write
5940000
trusted library allocation
page read and write
6E0000
unkown
page readonly
6C07000
heap
page read and write
49B0000
trusted library allocation
page read and write
4890000
unclassified section
page read and write
3171000
heap
page read and write
2E30000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
17F0000
direct allocation
page read and write
3171000
heap
page read and write
2F4E000
heap
page read and write
2142000
trusted library allocation
page read and write
3171000
heap
page read and write
120000
unkown
page readonly
3171000
heap
page read and write
3171000
heap
page read and write
1ED000
stack
page read and write
690000
unkown
page read and write
8E8000
heap
page read and write
3171000
heap
page read and write
2FBA000
heap
page read and write
6DF6000
trusted library allocation
page read and write
83E000
stack
page read and write
3171000
heap
page read and write
10E0000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
2114000
heap
page read and write
6F5000
unkown
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
6AEE000
stack
page read and write
3BDA000
unkown
page read and write
2E2E000
stack
page read and write
3171000
heap
page read and write
44F0000
trusted library allocation
page read and write
2D2E000
stack
page read and write
38B6000
unkown
page read and write
19BF000
stack
page read and write
3171000
heap
page read and write
3F43000
trusted library allocation
page read and write
F90000
heap
page read and write
65E000
stack
page read and write
4A70000
trusted library allocation
page read and write
21D0000
heap
page read and write
3171000
heap
page read and write
5480000
trusted library allocation
page execute and read and write
738E000
heap
page read and write
5930000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
860000
heap
page read and write
7FD4000
heap
page read and write
1E0000
heap
page read and write
F60000
unkown
page readonly
9D80000
heap
page read and write
3171000
heap
page read and write
1B7D000
direct allocation
page execute and read and write
776F000
stack
page read and write
40B6000
unclassified section
page read and write
6AA0000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
EB0000
unkown
page readonly
3171000
heap
page read and write
149E000
stack
page read and write
F87000
stack
page read and write
3AC000
stack
page read and write
3171000
heap
page read and write
2E40000
heap
page execute and read and write
5405000
trusted library allocation
page read and write
3171000
heap
page read and write
2110000
heap
page read and write
2C71000
heap
page read and write
2FBA000
heap
page read and write
307F000
stack
page read and write
4F2C000
stack
page read and write
1BEE000
direct allocation
page execute and read and write
2120000
unkown
page readonly
140000
unkown
page readonly
1E0000
heap
page read and write
5390000
trusted library allocation
page read and write
FE0000
unkown
page read and write
133E000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
53F0000
trusted library allocation
page read and write
13B3000
trusted library allocation
page execute and read and write
802F000
heap
page read and write
30DC000
unkown
page read and write
3171000
heap
page read and write
3592000
unkown
page read and write
EA0000
unkown
page readonly
15F7000
heap
page read and write
3171000
heap
page read and write
2152000
trusted library allocation
page read and write
14BE000
stack
page read and write
3171000
heap
page read and write
2ACF000
heap
page read and write
3171000
heap
page read and write
23D2000
unkown
page read and write
3171000
heap
page read and write
2FE0000
heap
page read and write
2F45000
heap
page read and write
8E0000
unkown
page readonly
35FD000
direct allocation
page execute and read and write
5770000
heap
page read and write
3171000
heap
page read and write
98F000
stack
page read and write
3171000
heap
page read and write
3170000
heap
page read and write
24BA000
trusted library allocation
page read and write
3171000
heap
page read and write
927B000
stack
page read and write
12FC000
stack
page read and write
3171000
heap
page read and write
2FA1000
heap
page read and write
3171000
heap
page read and write
19D0000
direct allocation
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
A1CB000
stack
page read and write
4BE0000
unkown
page read and write
7CB000
heap
page read and write
1BB6000
direct allocation
page execute and read and write
215B000
trusted library allocation
page execute and read and write
1E2000
unkown
page readonly
4F5E000
stack
page read and write
3F0000
unkown
page readonly
2EB9000
trusted library allocation
page read and write
3171000
heap
page read and write
2C71000
heap
page read and write
2BE4000
heap
page read and write
2C8D000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
890000
heap
page read and write
850000
trusted library allocation
page read and write
2FA1000
heap
page read and write
7FA0000
trusted library allocation
page read and write
3171000
heap
page read and write
3370000
trusted library allocation
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
57A4000
heap
page read and write
FF1000
unkown
page readonly
4184000
trusted library allocation
page read and write
F2A000
stack
page read and write
2AA000
stack
page read and write
14D8000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
2320000
unkown
page execute and read and write
FF1000
unkown
page readonly
2C60000
heap
page read and write
538E000
unclassified section
page read and write
1A3F000
stack
page read and write
3171000
heap
page read and write
35F9000
direct allocation
page execute and read and write
9C7E000
stack
page read and write
3171000
heap
page read and write
49EE000
trusted library allocation
page read and write
550000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
1930000
heap
page read and write
4248000
unclassified section
page read and write
F80000
unkown
page readonly
3020000
unkown
page readonly
3171000
heap
page read and write
7FB0000
heap
page read and write
681000
unkown
page readonly
937C000
stack
page read and write
68F0000
heap
page read and write
44B0000
trusted library allocation
page read and write
600000
unkown
page readonly
541000
unkown
page readonly
3171000
heap
page read and write
900000
heap
page read and write
24D9000
trusted library allocation
page read and write
3009000
heap
page read and write
2FC9000
heap
page read and write
78D000
heap
page read and write
4209000
trusted library allocation
page read and write
73F000
heap
page read and write
26AC000
unkown
page read and write
13B0000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
13D0000
unkown
page read and write
14D0000
heap
page read and write
6E0000
unkown
page readonly
214A000
trusted library allocation
page execute and read and write
A05E000
stack
page read and write
21BE000
stack
page read and write
20BE000
stack
page read and write
53E0000
trusted library allocation
page read and write
530000
unkown
page read and write
3171000
heap
page read and write
56D000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
13A0000
trusted library allocation
page read and write
22FE000
stack
page read and write
1C53000
direct allocation
page execute and read and write
2C8A4000
system
page read and write
24F0000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
2FB3000
heap
page read and write
4A40000
heap
page read and write
558000
heap
page read and write
EC0000
unkown
page readonly
80C9000
heap
page read and write
8032000
heap
page read and write
871F000
stack
page read and write
2140000
trusted library allocation
page read and write
2FC7000
heap
page read and write
3171000
heap
page read and write
610000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
6EE000
unkown
page readonly
2FE2000
heap
page read and write
700000
heap
page read and write
1A1B000
system
page execute and read and write
3171000
heap
page read and write
577000
stack
page read and write
6C09000
heap
page read and write
49C3000
heap
page read and write
D2E000
unkown
page read and write
6D0000
unkown
page read and write
220000
unkown
page readonly
3171000
heap
page read and write
4B5D000
system
page execute and read and write
3171000
heap
page read and write
3109000
direct allocation
page execute and read and write
670000
heap
page read and write
1440000
unkown
page readonly
13C0000
heap
page read and write
22DF000
stack
page read and write
2FE4000
heap
page read and write
58D0000
trusted library allocation
page read and write
2FDF000
heap
page read and write
850000
heap
page read and write
5FFE000
stack
page read and write
77A2000
heap
page read and write
A2CC000
stack
page read and write
726000
heap
page read and write
53D0000
trusted library allocation
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
6E0000
unkown
page readonly
8E0000
unkown
page readonly
17EF000
stack
page read and write
3171000
heap
page read and write
9E0000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
2133000
trusted library allocation
page read and write
C70000
unkown
page readonly
5920000
heap
page read and write
1176000
heap
page read and write
7FB6000
heap
page read and write
766E000
stack
page read and write
53C1000
trusted library allocation
page read and write
18BF000
stack
page read and write
4BD9000
system
page execute and read and write
3010000
heap
page read and write
741000
heap
page read and write
4F60000
heap
page read and write
7FF9000
heap
page read and write
454B000
stack
page read and write
13F0000
heap
page read and write
3171000
heap
page read and write
1A60000
unkown
page readonly
43DA000
unclassified section
page read and write
26AC000
unkown
page read and write
1D01000
direct allocation
page execute and read and write
3171000
heap
page read and write
2FB0000
heap
page read and write
690000
unkown
page read and write
4EA0000
trusted library allocation
page execute and read and write
3F24000
unclassified section
page read and write
6E1000
unkown
page execute read
2BE4000
heap
page read and write
F70000
unkown
page readonly
8E8000
heap
page read and write
13F0000
heap
page read and write
3171000
heap
page read and write
C70000
unkown
page readonly
3171000
heap
page read and write
2C26000
unkown
page read and write
3811000
unclassified section
page execute and read and write
2170000
trusted library allocation
page read and write
1BF2000
direct allocation
page execute and read and write
230000
unkown
page readonly
3171000
heap
page read and write
3400000
unkown
page read and write
4BA0000
trusted library allocation
page execute and read and write
1B79000
direct allocation
page execute and read and write
579000
heap
page read and write
E1F000
stack
page read and write
4990000
trusted library allocation
page read and write
240000
unkown
page readonly
6C0000
unkown
page readonly
8DF000
stack
page read and write
68FE000
heap
page read and write
8E0000
heap
page read and write
3171000
heap
page read and write
6F7000
unkown
page readonly
8023000
heap
page read and write
3171000
heap
page read and write
D70000
unkown
page readonly
34D0000
direct allocation
page execute and read and write
130000
unkown
page readonly
3862000
unclassified section
page read and write
510000
unkown
page readonly
8DF000
stack
page read and write
3812000
direct allocation
page execute and read and write
6E1000
unkown
page execute read
6C0000
unkown
page readonly
16CF000
stack
page read and write
6E1000
unkown
page execute read
3171000
heap
page read and write
3171000
heap
page read and write
9E0000
unkown
page readonly
2FD2000
heap
page read and write
7FC5000
heap
page read and write
364E000
trusted library allocation
page read and write
236E000
stack
page read and write
70B000
heap
page read and write
13C7000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
801C000
heap
page read and write
3171000
heap
page read and write
520000
heap
page read and write
41C7000
trusted library allocation
page read and write
3450000
heap
page read and write
137E000
stack
page read and write
300F000
heap
page read and write
1100000
heap
page read and write
5430000
trusted library allocation
page read and write
912E000
stack
page read and write
3171000
heap
page read and write
5660000
trusted library section
page readonly
660000
unkown
page read and write
14D8000
heap
page read and write
5490000
trusted library allocation
page read and write
39AF000
unkown
page execute and read and write
1005000
heap
page read and write
56B000
heap
page read and write
3171000
heap
page read and write
5AD000
stack
page read and write
3171000
heap
page read and write
873C000
heap
page read and write
562E000
stack
page read and write
13A0000
heap
page read and write
8628000
trusted library allocation
page read and write
2C96000
trusted library allocation
page execute and read and write
14C0000
heap
page read and write
21C0000
trusted library allocation
page execute and read and write
2FF5000
heap
page read and write
4141000
trusted library allocation
page read and write
70E000
heap
page read and write
8DF000
stack
page read and write
34C5000
heap
page read and write
3100000
trusted library allocation
page read and write
801F000
heap
page read and write
4AA5000
heap
page read and write
1108000
heap
page read and write
6E0000
unkown
page readonly
3160000
heap
page read and write
EA0000
unkown
page readonly
3171000
heap
page read and write
670000
heap
page read and write
3171000
heap
page read and write
5942000
trusted library allocation
page read and write
1C59000
direct allocation
page execute and read and write
560E000
stack
page read and write
7FF4000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
55BB000
stack
page read and write
14DE000
stack
page read and write
67BD000
stack
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
366E000
direct allocation
page execute and read and write
3171000
heap
page read and write
2F5F000
heap
page read and write
3171000
heap
page read and write
3941000
unkown
page execute and read and write
4211000
unclassified section
page execute and read and write
7FE9000
heap
page read and write
2861000
unclassified section
page execute and read and write
3171000
heap
page read and write
3D6C000
unkown
page read and write
58BE000
stack
page read and write
1F0000
unkown
page readonly
1142000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
D70000
unkown
page readonly
3171000
heap
page read and write
61FE000
stack
page read and write
2FD8000
heap
page read and write
1508000
heap
page read and write
4A22000
unclassified section
page read and write
4F70000
trusted library allocation
page read and write
7610000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
133B000
stack
page read and write
8E0000
heap
page read and write
5AE000
unkown
page read and write
3171000
heap
page read and write
870000
trusted library allocation
page read and write
5680000
heap
page read and write
3E0000
unkown
page readonly
53A4000
trusted library allocation
page read and write
3171000
heap
page read and write
2DB8000
unkown
page read and write
123C000
stack
page read and write
22E0000
unkown
page readonly
588000
heap
page read and write
94BE000
stack
page read and write
3171000
heap
page read and write
2CAB000
trusted library allocation
page execute and read and write
5400000
trusted library allocation
page read and write
873000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
2E2B000
heap
page read and write
6FF2000
trusted library allocation
page read and write
3171000
heap
page read and write
2505000
trusted library allocation
page read and write
500000
unkown
page readonly
3171000
heap
page read and write
3171000
heap
page read and write
4A50000
heap
page read and write
8E6D000
stack
page read and write
1D98000
direct allocation
page execute and read and write
240000
unkown
page readonly
92D000
stack
page read and write
13D0000
unkown
page read and write
734000
heap
page read and write
1460000
unkown
page read and write
6B0000
unkown
page readonly
3820000
trusted library allocation
page read and write
326E000
unkown
page read and write
75E6000
trusted library allocation
page read and write
16C8000
heap
page read and write
82C0000
heap
page read and write
14D0000
heap
page read and write
550000
heap
page read and write
3171000
heap
page read and write
2BB0000
heap
page read and write
2320000
heap
page execute and read and write
2BC0000
heap
page read and write
777F000
heap
page read and write
2F50000
heap
page read and write
BE7E7FD000
stack
page read and write
456C000
unclassified section
page read and write
3820000
trusted library allocation
page read and write
2A7E000
stack
page read and write
6EE000
unkown
page readonly
1BB0000
direct allocation
page execute and read and write
3171000
heap
page read and write
49F1000
trusted library allocation
page read and write
14F9000
heap
page read and write
2130000
trusted library allocation
page read and write
2110000
heap
page read and write
6E1000
unkown
page execute read
21C0000
unkown
page read and write
3171000
heap
page read and write
2AC7000
heap
page read and write
46FE000
unclassified section
page read and write
3013000
heap
page read and write
3171000
heap
page read and write
576E000
stack
page read and write
6EE000
unkown
page readonly
14EB000
heap
page read and write
3010000
heap
page read and write
4C20000
heap
page execute and read and write
3171000
heap
page read and write
2BC0000
trusted library allocation
page read and write
3B3C000
unclassified section
page read and write
2FB0000
heap
page read and write
3171000
heap
page read and write
49F6000
trusted library allocation
page read and write
3171000
heap
page read and write
2F4F000
heap
page read and write
53E6000
trusted library allocation
page read and write
2BA0000
heap
page read and write
8B57000
trusted library allocation
page read and write
4D4C000
unkown
page read and write
60FE000
stack
page read and write
3171000
heap
page read and write
600000
heap
page read and write
1508000
heap
page read and write
44C0000
trusted library allocation
page execute and read and write
802C000
heap
page read and write
3171000
heap
page read and write
53A0000
trusted library allocation
page read and write
3171000
heap
page read and write
4FC000
stack
page read and write
3171000
heap
page read and write
379D000
direct allocation
page execute and read and write
2120000
unkown
page readonly
6E1000
unkown
page execute read
1460000
unkown
page read and write
3922000
unclassified section
page read and write
2A94000
unkown
page read and write
2FBD000
heap
page read and write
16D0000
unkown
page readonly
3171000
heap
page read and write
32A0000
heap
page read and write
11F7000
heap
page read and write
1B37000
direct allocation
page execute and read and write
6210000
heap
page read and write
4B50000
trusted library allocation
page read and write
3171000
heap
page read and write
15D0000
heap
page read and write
506A000
unclassified section
page read and write
681000
unkown
page readonly
3171000
heap
page read and write
2FBD000
heap
page read and write
5910000
trusted library allocation
page read and write
1AA000
stack
page read and write
2AC5000
heap
page read and write
600000
unkown
page readonly
2492000
unkown
page read and write
2AD0000
heap
page read and write
1A50000
direct allocation
page execute and read and write
3724000
unkown
page read and write
3171000
heap
page read and write
130000
unkown
page readonly
3171000
heap
page read and write
3AC000
stack
page read and write
2ABB000
stack
page read and write
93BE000
stack
page read and write
1A60000
unkown
page readonly
4A60000
trusted library allocation
page execute and read and write
2FA6000
heap
page read and write
3171000
heap
page read and write
19DB000
direct allocation
page read and write
610000
heap
page read and write
3171000
heap
page read and write
4255000
trusted library allocation
page read and write
4E1D000
stack
page read and write
2C92000
trusted library allocation
page read and write
3171000
heap
page read and write
3171000
heap
page read and write
777000
heap
page read and write
3171000
heap
page read and write
2BE0000
heap
page read and write
4BEE000
stack
page read and write
4791000
unkown
page execute and read and write
A40E000
stack
page read and write
4E90000
trusted library allocation
page read and write
6F7000
unkown
page readonly
3171000
heap
page read and write
21BE000
stack
page read and write
91F000
stack
page read and write
11EA000
stack
page read and write
2C4BC000
system
page read and write
3171000
heap
page read and write
9E0000
unkown
page readonly
302E000
heap
page read and write
3563000
trusted library allocation
page read and write
3171000
heap
page read and write
6B0000
unkown
page readonly
43A000
stack
page read and write
1144000
heap
page read and write
3E59000
trusted library allocation
page read and write
4B82000
system
page execute and read and write
1AA000
stack
page read and write
8029000
heap
page read and write
2BE4000
heap
page read and write
3171000
heap
page read and write
6F7000
unkown
page readonly
3171000
heap
page read and write
2C1E2000
system
page read and write
189E000
stack
page read and write
2146000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
47A000
stack
page read and write
6B0000
heap
page read and write
5D0000
heap
page read and write
3171000
heap
page read and write
676000
heap
page read and write
3171000
heap
page read and write
6200000
heap
page read and write
53BE000
trusted library allocation
page read and write
4C00000
trusted library section
page readonly
3171000
heap
page read and write
1450000
heap
page read and write
803F000
heap
page read and write
3171000
heap
page read and write
6500000
trusted library allocation
page read and write
32AD000
direct allocation
page execute and read and write
1B56000
direct allocation
page execute and read and write
2C70000
heap
page read and write
3171000
heap
page read and write
2D94000
heap
page read and write
There are 976 hidden memdumps, click here to show them.