IOC Report
PO0424024.exe

loading gif

Files

File Path
Type
Category
Malicious
PO0424024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO0424024.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\43PI9J
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO0424024.exe
"C:\Users\user\Desktop\PO0424024.exe"
malicious
C:\Users\user\Desktop\PO0424024.exe
"C:\Users\user\Desktop\PO0424024.exe"
malicious
C:\Program Files (x86)\jfLWIrNvBdXUZqKTstLPidJuesjIeBIFNQYCGaQUpAbARGedGUlMKIlGqKpEAySWKlETcTxWvVYd\tAFcdstzdUTfkmQlByDmlLl.exe
"C:\Program Files (x86)\jfLWIrNvBdXUZqKTstLPidJuesjIeBIFNQYCGaQUpAbARGedGUlMKIlGqKpEAySWKlETcTxWvVYd\tAFcdstzdUTfkmQlByDmlLl.exe"
malicious
C:\Windows\SysWOW64\takeown.exe
"C:\Windows\SysWOW64\takeown.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.kakaobrain.us/pq0o/
91.195.240.19
malicious
http://www.kakaobrain.us/pq0o/?F49hs=BhpYg4yoBpmopPUlJaseZ9A32WKe1CLsx7T3vymtgFCfsO9mDgtC+XcLrPQxM3XDzIUIWI4YDMWjav9FDMEzU1DT6w46OubC82AXo7xlEXtHI7IZbAZeHk0=&9ZZXx=T6kxVZuXAVuH9J
91.195.240.19
malicious
http://www.luckydomainz.shop/pq0o/
91.195.240.19
malicious
http://www.luckydomainz.shop/pq0o/?F49hs=zlo+FGSBhCkM5GVJsyQNaVbtL67WnJg88Yj7BD8zO0hDA+Ttp+tE7JQXtFhQSzjU/FmrV36xGrNmbpUbkD9mLWK1UOLjaHYQ4bVPRZ9N4YEmnoiYZJFdoy8=&9ZZXx=T6kxVZuXAVuH9J
91.195.240.19
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mail.365.com/login.html
unknown
https://www.marksmile.com/
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.threesomeapps.com/pq0o/
3.33.130.190
http://www.fontbureau.com/designers?
unknown
http://www.unchainedventure.com/pq0o/
195.242.88.141
http://tempuri.org/DataSet1.xsd
unknown
https://www.fasthosts.co.uk/domain-names/search/?domain=$
unknown
http://www.shun-yamagata.com/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=b2qFmWlReUJu6citZAtbwrrOSkIcZF9V2+9XddDidwLqjCK16JlrjYTgkvrAjFAj/kbk/ZD/H0dWxyKKd1m8GF0arunEMZ5tvTjrHaUhlNNo1MItznWZgp0=
162.43.104.164
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://fasthosts.co.uk/
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://www.fasthosts.co.uk/get-online?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.marksmile.com/asset/lp_qrcode.png
unknown
https://www.namecheap.com/domains/registration/results/?domain=luckydomainz.shop
unknown
http://www.klconstructions.net/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=p2Os9DL/ZxMFxY/q2Ap/Yp5OBLYS19DXFnG8XGpKHfd79mzMsmb8450rEHnCTj1drUgFrotC1uV7Mqyg6tK80c0eBV3oPBtu8fCz/gVC+CE8Jn7lRxODf9w=
74.208.236.153
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.celebration24.co.uk/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=NMNyNvSWAQl+XC9g7rBusjWgWNBgohatDhvK1KIHhjj0aHE/UrTu3yYXFvlKPRx40FckhBe9K4BGmhcAc+bYC4VcVVEG0KUeJFitahxkTU5y9cpDhM+xwHc=
103.168.172.37
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.celebration24.co.uk/pq0o/
103.168.172.37
http://www.happymarts.top/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=4UCjKZAQgLnMxNicE9pqcHmXIZhn5ynD4ggafyrMLg7tBb5+FldYarQ4uWITApeKqaBZVuXxHE31Fdk4aV2tLvZQCfORxMIFcNC7KFHj2TQuLtYW7VfXj0w=
203.161.46.103
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.cd14j.us/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=zdIBKqN9oP3plxVQyNgvYq0mMKrvq5q/57+iRklTGjPKULzejm8MTR3zmbqN1d/mp0y1+1mzyQU/+H24oE5uDnI7sp5jy5UFN+aaU0u6oQX+YH9icEJ0mm4=
91.195.240.123
http://www.unchainedventure.com/pq0o/?F49hs=oyw/nBwJ61bGycTt7MUH34VrSoK42dIQz9F/9DQxJwbLEg40x6X3ShxK/IPLtNyuGmfUrEEfHvul1hK0yfa95YoddznUFYR7i1LwCbVe0J8wy+lXuD76n/g=&9ZZXx=T6kxVZuXAVuH9J
195.242.88.141
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.xn--yzyp76d.com/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=J8WC84xruYdLZ+87Afe3OqqbMOMBhnRcdnGo6AhEflv3qioXWy6Vm5wGjKWjZFBj5bzfVwWaJCB72b3lEpkTXSJ8T31vhIsUx1l9uwIaTYdZUjGlsKsX5ww=
47.76.62.167
https://www.ecosia.org/newtab/
unknown
http://www.shun-yamagata.com/pq0o/
162.43.104.164
http://www.threesomeapps.com
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.happymarts.top/pq0o/
203.161.46.103
https://www.fastmail.help/hc/en-us/articles/1500000280141
unknown
http://www.carterandcone.coml
unknown
http://www.carsinmultan.com/pq0o/?F49hs=ERhh1Wv2i17OvleZDVlPuLV8FPLSNlSjgSFKCO/E5FvVDH88mB+A3XwhrFKA0T7u6+xnysJANU3lpyUswnu1e2FhmydoRAv58fVG4PjZmouhcgICZXbhSfU=&9ZZXx=T6kxVZuXAVuH9J
84.32.84.32
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.marksmile.com/asset/lp_style.css
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://www.fastmailusercontent.com/filestorage/css/main.css
unknown
https://img.sedoparking.com/templates/images/hero_nc.svg
unknown
https://static.fasthosts.co.uk/icons/favicon.ico
unknown
http://www.fontbureau.com/designers8
unknown
http://www.klconstructions.net/pq0o/
74.208.236.153
http://www.cd14j.us/pq0o/
91.195.240.123
http://www.carsinmultan.com/pq0o/
84.32.84.32
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.namecheap.com/domains/registration/results/?domain=kakaobrain.us
unknown
http://www.holein1sa.com/pq0o/
213.171.195.105
http://www.threesomeapps.com/pq0o/?9ZZXx=T6kxVZuXAVuH9J&F49hs=mRVcZEOhq89+MGHBKj9OIc/04Av6T2wEhyk9HpRK9pO5sVzjQ2X+QIoGEwrX8lym3PQN8R/kDgsMd57+ef1OrGKEsTU4CFRzLSC8xo47mPR0FpBjSaDhnxk=
3.33.130.190
https://www.fasthosts.co.uk/contact?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_par
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.kakaobrain.us
unknown
malicious
www.fashionagencylab.com
unknown
malicious
www.carsinmultan.com
unknown
malicious
www.threesomeapps.com
unknown
malicious
www.luckydomainz.shop
unknown
malicious
www.jrksa.info
unknown
malicious
www.unchainedventure.com
unknown
malicious
carsinmultan.com
84.32.84.32
www.xn--yzyp76d.com
47.76.62.167
www.klconstructions.net
74.208.236.153
unchainedventure.com
195.242.88.141
www.holein1sa.com
213.171.195.105
threesomeapps.com
3.33.130.190
parkingpage.namecheap.com
91.195.240.19
www.celebration24.co.uk
103.168.172.37
www.cd14j.us
91.195.240.123
www.happymarts.top
203.161.46.103
www.shun-yamagata.com
162.43.104.164
There are 8 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
103.168.172.37
www.celebration24.co.uk
unknown
162.43.104.164
www.shun-yamagata.com
United States
84.32.84.32
carsinmultan.com
Lithuania
74.208.236.153
www.klconstructions.net
United States
91.195.240.123
www.cd14j.us
Germany
47.76.62.167
www.xn--yzyp76d.com
United States
91.195.240.19
parkingpage.namecheap.com
Germany
203.161.46.103
www.happymarts.top
Malaysia
3.33.130.190
threesomeapps.com
United States
195.242.88.141
unchainedventure.com
Romania
213.171.195.105
www.holein1sa.com
United Kingdom
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
34D0000
trusted library allocation
page read and write
malicious
1470000
unclassified section
page execute and read and write
malicious
12C0000
unclassified section
page execute and read and write
malicious
3490000
trusted library allocation
page read and write
malicious
6E70000
trusted library section
page read and write
malicious
2F00000
system
page execute and read and write
malicious
36F9000
trusted library allocation
page read and write
malicious
8660000
system
page execute and read and write
malicious
2800000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
316E000
heap
page read and write
5C0000
unkown
page readonly
4CA0000
heap
page read and write
3670000
trusted library allocation
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
46F0000
trusted library section
page read and write
FB51DFD000
stack
page read and write
32A1000
heap
page read and write
2570000
trusted library allocation
page execute and read and write
105D000
direct allocation
page execute and read and write
3B22000
unclassified section
page read and write
C00000
unkown
page readonly
5F0000
heap
page read and write
32A1000
heap
page read and write
24C10600000
trusted library allocation
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
67A6000
system
page read and write
7FDB000
heap
page read and write
32A1000
heap
page read and write
24C10703000
trusted library allocation
page read and write
317C000
heap
page read and write
E9B2000
system
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
31D9000
heap
page read and write
24C10716000
trusted library allocation
page read and write
32A1000
heap
page read and write
86D8000
system
page execute and read and write
DA3000
unkown
page read and write
3177000
heap
page read and write
86F0000
system
page execute and read and write
32A1000
heap
page read and write
F30000
direct allocation
page execute and read and write
32A1000
heap
page read and write
230000
unkown
page readonly
32A1000
heap
page read and write
36F1000
trusted library allocation
page read and write
7FE0000
heap
page read and write
C10000
trusted library allocation
page read and write
2EC8000
stack
page read and write
32A1000
heap
page read and write
D78000
heap
page read and write
6F7000
stack
page read and write
2F94000
heap
page read and write
9CE000
stack
page read and write
4F20000
heap
page read and write
32A1000
heap
page read and write
4F46000
unclassified section
page read and write
24C0E960000
system
page execute and read and write
31E6000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
3F0000
heap
page read and write
32A1000
heap
page read and write
507D000
stack
page read and write
71E0000
trusted library allocation
page read and write
6E90000
heap
page read and write
32A1000
heap
page read and write
C04000
trusted library allocation
page read and write
CF7F000
stack
page read and write
32A1000
heap
page read and write
E70000
unkown
page readonly
6530000
trusted library allocation
page read and write
32A1000
heap
page read and write
24C0EA92000
heap
page read and write
7FE5000
heap
page read and write
520000
unkown
page readonly
32A1000
heap
page read and write
94F000
stack
page read and write
2F94000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
476C000
unclassified section
page read and write
1059000
direct allocation
page execute and read and write
33B0000
trusted library allocation
page read and write
6FFE000
stack
page read and write
D78000
heap
page read and write
24C0EA7C000
heap
page read and write
25D0000
trusted library allocation
page read and write
31E6000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
24C1070A000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4DB4000
unclassified section
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
AD0000
heap
page read and write
36EE000
stack
page read and write
31FF000
heap
page read and write
CB4000
heap
page read and write
3177000
heap
page read and write
A18000
heap
page read and write
5E0000
unkown
page readonly
31FF000
heap
page read and write
4F05000
heap
page read and write
24C0EA60000
heap
page read and write
5200000
heap
page read and write
D70000
heap
page read and write
CD0000
heap
page read and write
6012000
system
page read and write
8010000
heap
page read and write
34D6000
heap
page read and write
2ACD000
trusted library allocation
page read and write
C32000
trusted library allocation
page read and write
71F0000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
50D8000
unclassified section
page read and write
322A000
heap
page read and write
8014000
heap
page read and write
6E6F000
stack
page read and write
1200000
unkown
page readonly
32A1000
heap
page read and write
32A1000
heap
page read and write
317D000
heap
page read and write
A30000
unkown
page read and write
D8F000
stack
page read and write
2F94000
heap
page read and write
7110000
trusted library allocation
page read and write
31D9000
heap
page read and write
36A0000
heap
page read and write
845000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4CB0000
trusted library allocation
page read and write
D1FE000
stack
page read and write
32A1000
heap
page read and write
3177000
heap
page read and write
232000
unkown
page readonly
4F70000
heap
page execute and read and write
C0E000
unkown
page readonly
31D9000
heap
page read and write
32A1000
heap
page read and write
D0BF000
stack
page read and write
BC0000
unkown
page read and write
4D90000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4C30000
trusted library allocation
page read and write
A21000
unkown
page readonly
32A1000
heap
page read and write
32A1000
heap
page read and write
950000
heap
page read and write
24C10370000
trusted library allocation
page read and write
CC7D000
stack
page read and write
32A1000
heap
page read and write
4BF1000
trusted library allocation
page read and write
32A1000
heap
page read and write
5D0000
unkown
page readonly
D70000
heap
page read and write
E8F2000
system
page read and write
80D0000
trusted library allocation
page read and write
32A1000
heap
page read and write
FB52DFF000
stack
page read and write
50BE000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
C26000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
9F0000
heap
page read and write
32A1000
heap
page read and write
31CF000
heap
page read and write
7FF4000
heap
page read and write
3670000
trusted library allocation
page read and write
32A1000
heap
page read and write
3206000
heap
page read and write
FB515FC000
stack
page read and write
3213000
heap
page read and write
31F0000
heap
page read and write
32A1000
heap
page read and write
7FD1000
heap
page read and write
EFB4000
system
page read and write
4C60000
trusted library allocation
page read and write
7FD6000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
9F8000
heap
page read and write
BEE000
stack
page read and write
BBE000
stack
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4DB3000
heap
page read and write
32A1000
heap
page read and write
234B000
unclassified section
page execute and read and write
3691000
heap
page read and write
622C000
system
page read and write
24C0EA6F000
heap
page read and write
9E0000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
3177000
heap
page read and write
5F52000
system
page read and write
33A0000
heap
page read and write
3F60000
trusted library allocation
page read and write
32A1000
heap
page read and write
48FE000
unclassified section
page read and write
2580000
heap
page read and write
2868000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
3213000
heap
page read and write
800B000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4D70000
trusted library allocation
page read and write
18DD000
unclassified section
page execute and read and write
86FF000
system
page execute and read and write
3160000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
C20000
trusted library allocation
page read and write
488B000
stack
page read and write
6920000
trusted library allocation
page read and write
31DC000
heap
page read and write
4CB2000
trusted library allocation
page read and write
86FE000
stack
page read and write
32A1000
heap
page read and write
24C0E9B4000
system
page execute and read and write
24C0EA50000
heap
page read and write
32A1000
heap
page read and write
36DB000
unkown
page execute and read and write
31D4000
heap
page read and write
270F000
stack
page read and write
9FE000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4EEB000
stack
page read and write
B7F000
stack
page read and write
E0E000
stack
page read and write
8FC000
stack
page read and write
31CF000
heap
page read and write
7FC0000
heap
page read and write
2710000
unkown
page readonly
32A1000
heap
page read and write
C0E000
unkown
page readonly
C01000
unkown
page execute read
32A1000
heap
page read and write
4124000
unclassified section
page read and write
4BDE000
trusted library allocation
page read and write
4BEE000
trusted library allocation
page read and write
526A000
unclassified section
page read and write
A90000
heap
page read and write
4BD0000
trusted library allocation
page read and write
24C10370000
trusted library allocation
page read and write
5D0000
unkown
page readonly
75C8000
system
page read and write
1278000
direct allocation
page execute and read and write
32A1000
heap
page read and write
C1D000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
A30000
unkown
page read and write
32A1000
heap
page read and write
4C10000
trusted library allocation
page read and write
AD7000
heap
page read and write
6FA0000
trusted library section
page read and write
67EE000
stack
page read and write
5E0000
unkown
page readonly
2AE6000
trusted library allocation
page read and write
32A1000
heap
page read and write
1201000
unkown
page readonly
4C20000
trusted library allocation
page read and write
6614000
system
page read and write
32A1000
heap
page read and write
5C0000
unkown
page readonly
32A1000
heap
page read and write
4F50000
trusted library allocation
page read and write
4C22000
unclassified section
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
3710000
direct allocation
page execute and read and write
39DD000
direct allocation
page execute and read and write
7112000
system
page read and write
32A1000
heap
page read and write
7FD0000
heap
page read and write
2D4B000
unclassified section
page execute and read and write
32A1000
heap
page read and write
32A0000
heap
page read and write
32A1000
heap
page read and write
7436000
system
page read and write
4BF6000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
24C0EA8A000
heap
page read and write
BD0000
unkown
page read and write
1280000
direct allocation
page read and write
A70000
heap
page read and write
24C10713000
trusted library allocation
page read and write
323A000
heap
page read and write
273F000
trusted library allocation
page read and write
8753000
system
page execute and read and write
BF0000
trusted library allocation
page read and write
32A1000
heap
page read and write
285B000
trusted library allocation
page read and write
32A1000
heap
page read and write
5F0000
heap
page read and write
32A1000
heap
page read and write
510000
unkown
page readonly
3568000
heap
page read and write
A86000
heap
page read and write
31FC000
heap
page read and write
6C5C000
system
page read and write
7100000
trusted library allocation
page execute and read and write
58A000
stack
page read and write
7D0000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
CB4000
heap
page read and write
32A1000
heap
page read and write
31C5000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
A0E000
stack
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
31F0000
heap
page read and write
81E000
stack
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
C00000
trusted library allocation
page read and write
32A1000
heap
page read and write
A30000
heap
page read and write
31D2000
heap
page read and write
194B000
unclassified section
page execute and read and write
A70000
heap
page read and write
2F90000
heap
page read and write
8005000
heap
page read and write
24C1070F000
trusted library allocation
page read and write
4448000
unclassified section
page read and write
11F6000
direct allocation
page execute and read and write
71E5000
trusted library allocation
page read and write
3FAE000
trusted library allocation
page read and write
70FF000
stack
page read and write
6938000
system
page read and write
CD0000
heap
page read and write
24C0EA92000
heap
page read and write
C6C000
unkown
page read and write
4B4B000
unclassified section
page execute and read and write
32A1000
heap
page read and write
38A000
stack
page read and write
32A1000
heap
page read and write
6EA8000
heap
page read and write
32A1000
heap
page read and write
50D0000
heap
page read and write
CFBE000
stack
page read and write
32A1000
heap
page read and write
317D000
heap
page read and write
24C10370000
trusted library allocation
page read and write
31D4000
heap
page read and write
32A1000
heap
page read and write
DA8000
heap
page read and write
32A1000
heap
page read and write
CCBE000
stack
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
C01000
unkown
page execute read
1460000
heap
page read and write
7FE8000
heap
page read and write
32A1000
heap
page read and write
A0E000
stack
page read and write
5080000
heap
page read and write
4C02000
trusted library allocation
page read and write
6EA2000
heap
page read and write
2C6D000
unkown
page execute and read and write
24C108C4000
trusted library allocation
page read and write
5FC000
stack
page read and write
31AA000
heap
page read and write
A21000
unkown
page readonly
24C10700000
trusted library allocation
page read and write
32A1000
heap
page read and write
2CDB000
unkown
page execute and read and write
32A1000
heap
page read and write
2F80000
heap
page read and write
3201000
heap
page read and write
25CB000
stack
page read and write
32A1000
heap
page read and write
35C0000
trusted library allocation
page execute and read and write
40E7000
trusted library allocation
page read and write
889C000
unkown
page read and write
C60000
heap
page read and write
72A4000
system
page read and write
383D000
direct allocation
page execute and read and write
24C10721000
trusted library allocation
page read and write
32A1000
heap
page read and write
39E1000
direct allocation
page execute and read and write
7FFE000
heap
page read and write
24C10718000
trusted library allocation
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
CE7E000
stack
page read and write
32A1000
heap
page read and write
31FC000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
86FC000
system
page execute and read and write
A50000
unkown
page readonly
6DEE000
system
page read and write
32A1000
heap
page read and write
3209000
heap
page read and write
500000
unkown
page readonly
CB0000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4F00000
heap
page read and write
32A1000
heap
page read and write
520E000
heap
page read and write
8FA000
stack
page read and write
32A1000
heap
page read and write
24C10350000
heap
page read and write
D0FE000
stack
page read and write
3206000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
970000
heap
page read and write
F0F000
stack
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4A90000
unclassified section
page read and write
31D2000
heap
page read and write
3A52000
direct allocation
page execute and read and write
24C0EA8F000
heap
page read and write
873F000
stack
page read and write
38AE000
direct allocation
page execute and read and write
8FC000
stack
page read and write
C15000
unkown
page read and write
324C000
heap
page read and write
3A62000
unclassified section
page read and write
32A1000
heap
page read and write
24C10540000
heap
page read and write
C00000
unkown
page readonly
4EF0000
trusted library section
page readonly
5090000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
C15000
unkown
page read and write
C37000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
7F800000
trusted library allocation
page execute and read and write
C17000
unkown
page readonly
32A1000
heap
page read and write
C50000
trusted library allocation
page read and write
C03000
trusted library allocation
page execute and read and write
71EE000
trusted library allocation
page read and write
4BDB000
trusted library allocation
page read and write
32A1000
heap
page read and write
724000
unkown
page read and write
58A000
stack
page read and write
26EE000
stack
page read and write
32A1000
heap
page read and write
FB525FE000
stack
page read and write
32A1000
heap
page read and write
4C40000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
30AE000
stack
page read and write
32A1000
heap
page read and write
3839000
direct allocation
page execute and read and write
32A1000
heap
page read and write
3130000
heap
page read and write
3670000
trusted library allocation
page read and write
A10000
unkown
page read and write
BD0000
heap
page read and write
32A1000
heap
page read and write
3168000
heap
page read and write
32A1000
heap
page read and write
31D4000
heap
page read and write
C22000
trusted library allocation
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
D8E000
heap
page read and write
24C0E9B1000
system
page execute and read and write
2E8B000
stack
page read and write
32A1000
heap
page read and write
3510000
trusted library allocation
page read and write
31D2000
heap
page read and write
520000
unkown
page readonly
256E000
stack
page read and write
32A1000
heap
page read and write
3177000
heap
page read and write
30EF000
stack
page read and write
775A000
system
page read and write
3FFC000
trusted library allocation
page read and write
32A1000
heap
page read and write
B7F000
stack
page read and write
4CC0000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
DCF000
stack
page read and write
32A1000
heap
page read and write
7150000
trusted library allocation
page read and write
33B3000
heap
page read and write
4F40000
heap
page read and write
32A1000
heap
page read and write
6F90000
trusted library allocation
page execute and read and write
86D6000
system
page execute and read and write
32A1000
heap
page read and write
4F60000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
C2A000
trusted library allocation
page execute and read and write
AB2000
heap
page read and write
510000
unkown
page readonly
32A1000
heap
page read and write
24C108CE000
trusted library allocation
page read and write
54DB000
unkown
page execute and read and write
24C108BE000
trusted library allocation
page read and write
32A1000
heap
page read and write
317E000
heap
page read and write
10CE000
direct allocation
page execute and read and write
4CB5000
trusted library allocation
page read and write
32A1000
heap
page read and write
96EF000
trusted library allocation
page read and write
32A1000
heap
page read and write
374B000
unclassified section
page execute and read and write
32A1000
heap
page read and write
4BFD000
trusted library allocation
page read and write
32A1000
heap
page read and write
3234000
heap
page read and write
24C10801000
trusted library allocation
page read and write
24C0EB70000
heap
page read and write
32A1000
heap
page read and write
11FD000
direct allocation
page execute and read and write
840000
heap
page read and write
3706000
heap
page read and write
6942000
trusted library allocation
page read and write
33BB000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
A10000
unkown
page read and write
C3B000
trusted library allocation
page execute and read and write
31DC000
heap
page read and write
3695000
heap
page read and write
4ADB000
unkown
page execute and read and write
4BD4000
trusted library allocation
page read and write
25E0000
heap
page execute and read and write
86E0000
system
page execute and read and write
32A1000
heap
page read and write
6F80000
system
page read and write
316C000
heap
page read and write
C17000
unkown
page readonly
3D3C000
unclassified section
page read and write
2F70000
heap
page read and write
EBCC000
system
page read and write
3230000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
A32000
heap
page read and write
801E000
heap
page read and write
A8E000
stack
page read and write
D8F000
unkown
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
3201000
heap
page read and write
32A1000
heap
page read and write
CB0000
heap
page read and write
32A1000
heap
page read and write
40DB000
unkown
page execute and read and write
98E000
stack
page read and write
32A1000
heap
page read and write
31C0000
heap
page read and write
24C108AE000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
31DC000
heap
page read and write
31CF000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
42B6000
unclassified section
page read and write
414B000
unclassified section
page execute and read and write
11E1000
direct allocation
page execute and read and write
316C000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
BC0000
unkown
page read and write
3209000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
DA6000
unkown
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
4C35000
trusted library allocation
page read and write
32A1000
heap
page read and write
A50000
unkown
page readonly
A25000
heap
page read and write
32A1000
heap
page read and write
C80000
heap
page read and write
5EDB000
unkown
page execute and read and write
4F10000
heap
page read and write
7FC0000
trusted library allocation
page read and write
E70000
unkown
page readonly
24C0EA67000
heap
page read and write
6D6E000
stack
page read and write
32A1000
heap
page read and write
5099000
heap
page read and write
500000
unkown
page readonly
C0D000
trusted library allocation
page execute and read and write
32A1000
heap
page read and write
31E6000
heap
page read and write
2710000
unkown
page readonly
4DB0000
heap
page read and write
C87000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
A94000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
32A1000
heap
page read and write
There are 631 hidden memdumps, click here to show them.