IOC Report
150-425-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
150-425-2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Clinton
ASCII text, with very long lines (29744), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\F56GKLK7U4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\aut52A6.tmp
AmigaOS bitmap font (TFCH) "\2512FV4\001\261\273Q\311\220\310\205}\271FU\365\332\362{[J\247\252\325A2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV\214Y2SV]\342EE\365;\213w\214X~\236y\0260"6aB49S+S>x!9%+.Ff4Qy@&6b1%e\005}\025vY6V6vOUAaA2FV4Y2*YK", tfc_TagCount 21336, tfc_YSize 16984, 3607 elements, 2nd "A\022BV4[2SXBXKGAr\307V4I2SHBXKEQ2FF4Y2SXBHKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXB"
dropped
C:\Users\user\AppData\Local\Temp\aut5333.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nonsubmerged
AmigaOS bitmap font (TFCH) "\2512FV4\001\261\273Q\311\220\310\205}\271FU\365\332\362{[J\247\252\325A2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV\214Y2SV]\342EE\365;\213w\214X~\236y\0260"6aB49S+S>x!9%+.Ff4Qy@&6b1%e\005}\025vY6V6vOUAaA2FV4Y2*YK", tfc_TagCount 21336, tfc_YSize 16984, 3607 elements, 2nd "A\022BV4[2SXBXKGAr\307V4I2SHBXKEQ2FF4Y2SXBHKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXBXKEA2FV4Y2SXB"
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\150-425-2024.exe
"C:\Users\user\Desktop\150-425-2024.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\150-425-2024.exe"
malicious
C:\Program Files (x86)\LUpEpNstrNffBeNYFcbfFVhZpuWxeFRvbSQkVbtmUHMryQmCSEsxQ\ZzbhPSZTdqrAcRrzRCcDatTxZKV.exe
"C:\Program Files (x86)\LUpEpNstrNffBeNYFcbfFVhZpuWxeFRvbSQkVbtmUHMryQmCSEsxQ\ZzbhPSZTdqrAcRrzRCcDatTxZKV.exe"
malicious
C:\Windows\SysWOW64\netbtugc.exe
"C:\Windows\SysWOW64\netbtugc.exe"
malicious
C:\Program Files (x86)\LUpEpNstrNffBeNYFcbfFVhZpuWxeFRvbSQkVbtmUHMryQmCSEsxQ\ZzbhPSZTdqrAcRrzRCcDatTxZKV.exe
"C:\Program Files (x86)\LUpEpNstrNffBeNYFcbfFVhZpuWxeFRvbSQkVbtmUHMryQmCSEsxQ\ZzbhPSZTdqrAcRrzRCcDatTxZKV.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.kasegitai.tokyo/fo8o/?OVFPBtpp=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ89eOK51Mgi6ytQL9yeTtlbiBUAmNTsA==&-LXd8=qhq0rNepS
202.172.28.202
https://duckduckgo.com/chrome_newtab
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
https://duckduckgo.com/ac/?q=
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
http://www.empowermedeco.com/fo8o/
217.196.55.202
http://www.goldenjade-travel.com/fo8o/?OVFPBtpp=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFgSElgiguhIU1cq+9C59UXHMaDdPWVQ==&-LXd8=qhq0rNepS
116.50.37.244
https://track.uc.cn/collect
unknown
https://musee.mobi/vivaldi/fo8o/?OVFPBtpp=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://musee.mobi/vivaldi/fo8o/?OVFPBtpp=PTl5gU/3CD/Xhg5Nd1HWi
unknown
http://www.660danm.top/fo8o/
34.111.148.214
http://www.magmadokum.com/fo8o/
85.159.66.93
https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
unknown
https://www.shopify.com/admin/settings/domains
unknown
https://cdn.shopify.com/s/files/1/0458/4836/3030/files/ShopifySans-Medium.woff2?v=1674610916
unknown
http://www.rssnewscast.com/fo8o/
91.195.240.94
http://www.kasegitai.tokyo/fo8o/
202.172.28.202
https://hm.baidu.com/hm.js?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.antonio-vivaldi.mobi/fo8o/?OVFPBtpp=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZLGRXwZUnYA2j0639iiTYeQFS7gKg6A==&-LXd8=qhq0rNepS
46.30.213.191
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
http://www.rssnewscast.com/fo8o/?OVFPBtpp=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdN4JwRnXK0Z16Z0RVxT0NpaHfOGkEn8Q==&-LXd8=qhq0rNepS
91.195.240.94
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
http://www.goldenjade-travel.com/fo8o/
116.50.37.244
https://login.live
unknown
http://www.magmadokum.com/fo8o/?OVFPBtpp=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjckokWPFlpLgmRSSw2BhiETUwcdg1EQ==&-LXd8=qhq0rNepS
85.159.66.93
http://www.donnavariedades.com/fo8o/?OVFPBtpp=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pThujZncl+tVTqRpQa58ob5uovzcVfw==&-LXd8=qhq0rNepS
23.227.38.74
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.antonio-vivaldi.mobi/fo8o/
46.30.213.191
http://www.3xfootball.com/fo8o/?OVFPBtpp=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnj6KtR967KJkZjHO4n68kz2fsmRVZ8Q==&-LXd8=qhq0rNepS
154.215.72.110
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.elettrosistemista.zip/fo8o/
195.110.124.133
http://www.empowermedeco.com
unknown
https://www.ecosia.org/newtab/
unknown
https://accounts.shopify.com/recovery/stores?utm_source=gurucopy&utm_medium=link&utm_campaign=Gurus
unknown
http://www.donnavariedades.com/fo8o/
23.227.38.74
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
https://www.empowermedeco.com/fo8o/?OVFPBtpp=mxnR
unknown
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://codepen.io/uzcho_/pens/popular/?grid_type=list
unknown
https://www.goldenjade-travel.com/fo8o/?OVFPBtpp=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4ds
unknown
https://codepen.io/uzcho_/pen/eYdmdXw.css
unknown
http://www.elettrosistemista.zip/fo8o/?OVFPBtpp=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMdSNhe6OmyHrxid8+dZ6jJ+tsZTLp5A==&-LXd8=qhq0rNepS
195.110.124.133
http://www.660danm.top/fo8o/?OVFPBtpp=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrY/D+TcC9TMB/RoFCEllCpPhJWUqMeQ==&-LXd8=qhq0rNepS
34.111.148.214
https://cdn.shopify.com/s/files/1/0458/4836/3030/files/ShopifySans-Regular.woff2?v=1674610915
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.empowermedeco.com/fo8o/?OVFPBtpp=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKJgdY6IPBFaQuYrbCSDzxJjPROalSnA==&-LXd8=qhq0rNepS
217.196.55.202
http://www.techchains.info/fo8o/
66.29.149.46
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.joyesi.xyz
185.237.107.49
malicious
www.magmadokum.com
unknown
malicious
www.donnavariedades.com
unknown
malicious
www.liangyuen528.com
unknown
malicious
www.empowermedeco.com
unknown
malicious
www.elettrosistemista.zip
unknown
malicious
elettrosistemista.zip
195.110.124.133
www.660danm.top
34.111.148.214
empowermedeco.com
217.196.55.202
www.3xfootball.com
154.215.72.110
www.antonio-vivaldi.mobi
46.30.213.191
www.goldenjade-travel.com
116.50.37.244
www.rssnewscast.com
91.195.240.94
www.techchains.info
66.29.149.46
shops.myshopify.com
23.227.38.74
natroredirect.natrocdn.com
85.159.66.93
www.kasegitai.tokyo
202.172.28.202
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.237.107.49
www.joyesi.xyz
Ukraine
malicious
91.195.240.94
www.rssnewscast.com
Germany
154.215.72.110
www.3xfootball.com
Seychelles
195.110.124.133
elettrosistemista.zip
Italy
34.111.148.214
www.660danm.top
United States
116.50.37.244
www.goldenjade-travel.com
Taiwan; Republic of China (ROC)
23.227.38.74
shops.myshopify.com
Canada
85.159.66.93
natroredirect.natrocdn.com
Turkey
202.172.28.202
www.kasegitai.tokyo
Japan
46.30.213.191
www.antonio-vivaldi.mobi
Denmark
66.29.149.46
www.techchains.info
United States
217.196.55.202
empowermedeco.com
Norway
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F50000
unclassified section
page execute and read and write
malicious
600000
system
page execute and read and write
malicious
2F10000
trusted library allocation
page read and write
malicious
A00000
system
page execute and read and write
malicious
2EB0000
trusted library allocation
page read and write
malicious
2930000
unclassified section
page execute and read and write
malicious
3230000
unkown
page execute and read and write
malicious
2DB1000
heap
page read and write
42CC000
unclassified section
page read and write
36DC000
unclassified section
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
A9E000
stack
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
1FD7864E000
system
page execute and read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
4020000
direct allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
6C7000
unkown
page readonly
71A000
stack
page read and write
3000000
heap
page read and write
4149000
direct allocation
page read and write
3FD0000
direct allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
15AE000
heap
page read and write
2C12000
heap
page read and write
2DB1000
heap
page read and write
3001000
heap
page read and write
1D0E000
stack
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2BEE000
heap
page read and write
40F9000
direct allocation
page read and write
7D92000
heap
page read and write
B60000
heap
page read and write
750000
unkown
page readonly
1FD7A30D000
trusted library allocation
page read and write
3E80000
direct allocation
page read and write
13CE000
stack
page read and write
ADF000
stack
page read and write
7D05000
heap
page read and write
3887C000
system
page read and write
2A13000
heap
page read and write
2DB1000
heap
page read and write
1FD7885C000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
29DC000
unkown
page read and write
2C51000
heap
page read and write
2F00000
heap
page read and write
2DB1000
heap
page read and write
2A13000
heap
page read and write
332D000
direct allocation
page execute and read and write
1FD7A300000
trusted library allocation
page read and write
2A13000
heap
page read and write
1FD7886B000
heap
page read and write
7C86000
heap
page read and write
E6F000
heap
page read and write
2DB1000
heap
page read and write
2BFD000
heap
page read and write
3F53000
direct allocation
page read and write
2DB1000
heap
page read and write
4149000
direct allocation
page read and write
2DB1000
heap
page read and write
3542000
direct allocation
page execute and read and write
7D15000
heap
page read and write
16C7000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
640000
unkown
page readonly
16D7000
heap
page read and write
B3E000
stack
page read and write
2C00000
heap
page read and write
34D1000
direct allocation
page execute and read and write
1FD78872000
heap
page read and write
2C65000
heap
page read and write
2DB1000
heap
page read and write
E00000
unkown
page read and write
7D0000
unkown
page read and write
2A10000
heap
page read and write
2DB1000
heap
page read and write
2C36000
heap
page read and write
1500000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7CD0000
heap
page read and write
DF0000
heap
page read and write
B6C000
unkown
page read and write
E9F000
stack
page read and write
2DB1000
heap
page read and write
340E000
direct allocation
page execute and read and write
2CBA000
heap
page read and write
2BF7000
heap
page read and write
2930000
direct allocation
page read and write
7D0000
unkown
page read and write
4782000
unclassified section
page read and write
2960000
unkown
page read and write
2DB1000
heap
page read and write
3C84000
unclassified section
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
162D000
heap
page read and write
3200000
direct allocation
page execute and read and write
3B4E000
unkown
page read and write
2EB0000
trusted library allocation
page read and write
76B000
stack
page read and write
413A000
unclassified section
page read and write
2D01000
heap
page read and write
2BEE000
heap
page read and write
13BE000
stack
page read and write
2DB1000
heap
page read and write
C10000
unkown
page readonly
1510000
heap
page read and write
3541000
direct allocation
page execute and read and write
2C72000
heap
page read and write
414D000
direct allocation
page read and write
2A13000
heap
page read and write
1FD7A310000
trusted library allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
16C7000
heap
page read and write
3399000
direct allocation
page execute and read and write
2A10000
heap
page read and write
EA0000
unkown
page readonly
2DB1000
heap
page read and write
3F53000
direct allocation
page read and write
7CB0000
heap
page read and write
3FA3000
direct allocation
page read and write
2BB0000
heap
page read and write
7D08000
heap
page read and write
339E000
direct allocation
page execute and read and write
2DB1000
heap
page read and write
15AD000
heap
page read and write
115F000
stack
page read and write
660000
unkown
page readonly
2A13000
heap
page read and write
2A13000
heap
page read and write
416E000
direct allocation
page read and write
15BA000
heap
page read and write
2DB1000
heap
page read and write
416E000
direct allocation
page read and write
C20000
unkown
page readonly
1FD7884F000
heap
page read and write
312D000
heap
page read and write
2DB1000
heap
page read and write
1518000
heap
page read and write
2DB1000
heap
page read and write
445E000
unclassified section
page read and write
2DB1000
heap
page read and write
41BE000
direct allocation
page read and write
2A13000
heap
page read and write
273F000
stack
page read and write
293E000
stack
page read and write
2DB1000
heap
page read and write
7CCA000
heap
page read and write
3550000
unclassified section
page execute and read and write
730000
unkown
page readonly
41BE000
direct allocation
page read and write
16A8000
heap
page read and write
C88000
unkown
page readonly
2CBA000
heap
page read and write
154F000
heap
page read and write
5436000
system
page execute and read and write
7E30000
trusted library allocation
page read and write
B50000
unkown
page read and write
115F000
stack
page read and write
2BF7000
heap
page read and write
2FF0000
trusted library allocation
page execute and read and write
B14000
heap
page read and write
2C5B000
heap
page read and write
2DB1000
heap
page read and write
40FD000
direct allocation
page read and write
2DB1000
heap
page read and write
414D000
direct allocation
page read and write
35C2000
unclassified section
page read and write
2C9B000
heap
page read and write
2DB1000
heap
page read and write
2CB2000
unkown
page read and write
740000
unkown
page readonly
2C60000
heap
page read and write
154F000
heap
page read and write
14F1000
unkown
page readonly
2DB1000
heap
page read and write
C8A000
stack
page read and write
DF0000
heap
page read and write
2DB1000
heap
page read and write
3374000
unkown
page read and write
16B8000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2BB4000
heap
page read and write
2960000
unkown
page read and write
2A13000
heap
page read and write
3FD0000
direct allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
416E000
direct allocation
page read and write
C4F000
unkown
page readonly
319E000
heap
page read and write
2BEC000
heap
page read and write
3329000
direct allocation
page execute and read and write
1FD7A020000
trusted library allocation
page read and write
2DB1000
heap
page read and write
3270000
direct allocation
page execute and read and write
CC0000
heap
page read and write
B60000
heap
page read and write
2C4B000
heap
page read and write
1FD78870000
heap
page read and write
AE0000
heap
page read and write
3035000
heap
page read and write
2DCC000
unkown
page read and write
2DB1000
heap
page read and write
1FD786E0000
heap
page read and write
B90000
heap
page read and write
E11000
unkown
page readonly
389C000
unclassified section
page read and write
2DB1000
heap
page read and write
2C60000
heap
page read and write
DC0000
unkown
page readonly
15BA000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
16A8000
heap
page read and write
6B0000
unkown
page readonly
310E000
stack
page read and write
15AC000
heap
page read and write
6BE000
unkown
page readonly
2C91000
heap
page read and write
545F000
system
page execute and read and write
2C87000
heap
page read and write
2DB1000
heap
page read and write
34CD000
direct allocation
page execute and read and write
C4F000
unkown
page readonly
2DB1000
heap
page read and write
6B1000
unkown
page execute read
2BE0000
heap
page read and write
30C1000
heap
page read and write
1FD7A303000
trusted library allocation
page read and write
2A13000
heap
page read and write
31EA000
heap
page read and write
E30000
heap
page read and write
2BC0000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
B90000
heap
page read and write
2C4B000
heap
page read and write
2DB1000
heap
page read and write
640000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
31EE000
heap
page read and write
2C8D000
heap
page read and write
7CFE000
heap
page read and write
2DB1000
heap
page read and write
E58000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7C93000
heap
page read and write
2DB1000
heap
page read and write
DC0000
unkown
page readonly
4AA6000
unclassified section
page read and write
BC0000
unkown
page readonly
2DB1000
heap
page read and write
2CCA000
heap
page read and write
6B0000
unkown
page readonly
7C1000
unkown
page readonly
2C96000
heap
page read and write
1FD7A020000
trusted library allocation
page read and write
2DB1000
heap
page read and write
C00000
unkown
page readonly
1160000
unkown
page readonly
2DB1000
heap
page read and write
325F000
heap
page read and write
2DB1000
heap
page read and write
78E000
stack
page read and write
1231000
unkown
page readonly
2C91000
heap
page read and write
6C5000
unkown
page read and write
2DB1000
heap
page read and write
3FD0000
direct allocation
page read and write
2EFF000
stack
page read and write
4C38000
unclassified section
page read and write
4149000
direct allocation
page read and write
2DB1000
heap
page read and write
B90000
heap
page read and write
382A000
unkown
page read and write
41BE000
direct allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7CE000
stack
page read and write
7D08000
heap
page read and write
34C000
stack
page read and write
2C96000
heap
page read and write
E20000
unkown
page read and write
2DB1000
heap
page read and write
3698000
unkown
page read and write
2DB1000
heap
page read and write
D7E000
stack
page read and write
2DB1000
heap
page read and write
7FBF000
stack
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7D0D000
heap
page read and write
22B0000
heap
page read and write
2DB1000
heap
page read and write
3090000
trusted library allocation
page read and write
2BF7000
heap
page read and write
3506000
unkown
page read and write
2A13000
heap
page read and write
3E30000
direct allocation
page read and write
2DB1000
heap
page read and write
4328000
unkown
page read and write
2BF8000
heap
page read and write
8020000
heap
page read and write
2CC0000
heap
page read and write
4DCA000
unclassified section
page read and write
A50000
heap
page read and write
2F23000
heap
page read and write
2DB1000
heap
page read and write
C75000
unkown
page readonly
1FD7A200000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
1FD78610000
system
page execute and read and write
2C51000
heap
page read and write
2940000
unkown
page readonly
71A000
stack
page read and write
7D03000
heap
page read and write
3F53000
direct allocation
page read and write
7CA6000
heap
page read and write
2C94000
heap
page read and write
7D0E000
heap
page read and write
1FD7A180000
heap
page read and write
C7F000
unkown
page write copy
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2C05000
heap
page read and write
2DB1000
heap
page read and write
3FA8000
unclassified section
page read and write
2DB1000
heap
page read and write
385A2000
system
page read and write
2A13000
heap
page read and write
4196000
unkown
page read and write
2CB2000
unkown
page read and write
2DB1000
heap
page read and write
3920000
heap
page read and write
B39000
stack
page read and write
40FD000
direct allocation
page read and write
7CF8000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
38C64000
system
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
1690000
heap
page read and write
2DB1000
heap
page read and write
54B3000
system
page execute and read and write
660000
heap
page read and write
7B0000
unkown
page read and write
2C17000
heap
page read and write
2DB1000
heap
page read and write
339D000
direct allocation
page execute and read and write
2C60000
heap
page read and write
2BF7000
heap
page read and write
2DB1000
heap
page read and write
1FD78840000
heap
page read and write
38662000
system
page read and write
1FD7A4C4000
trusted library allocation
page read and write
7D16000
heap
page read and write
2DB1000
heap
page read and write
6BE000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2930000
direct allocation
page read and write
B50000
unkown
page read and write
6C5000
unkown
page read and write
2DB1000
heap
page read and write
7D80000
trusted library allocation
page read and write
3E72000
unkown
page read and write
2B1F000
stack
page read and write
3B8F000
unkown
page execute and read and write
2DB1000
heap
page read and write
414D000
direct allocation
page read and write
2DB1000
heap
page read and write
C88000
unkown
page readonly
3E30000
direct allocation
page read and write
3E30000
direct allocation
page read and write
2DB1000
heap
page read and write
7CD4000
heap
page read and write
2940000
unkown
page readonly
2DB1000
heap
page read and write
2BB4000
heap
page read and write
15AD000
heap
page read and write
C00000
unkown
page readonly
2DB1000
heap
page read and write
1FD7A317000
trusted library allocation
page read and write
7F0000
unkown
page readonly
4914000
unclassified section
page read and write
2CA7000
heap
page read and write
2DB1000
heap
page read and write
314E000
stack
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
545C000
system
page execute and read and write
750000
unkown
page readonly
7F0000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
C8A000
stack
page read and write
2C5E000
heap
page read and write
1548000
heap
page read and write
E00000
unkown
page read and write
C7F000
unkown
page read and write
B10000
heap
page read and write
2DB1000
heap
page read and write
C10000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
3E16000
unclassified section
page read and write
2DB1000
heap
page read and write
39BC000
unkown
page read and write
35B2000
direct allocation
page execute and read and write
55CC000
unkown
page read and write
2DB1000
heap
page read and write
BC0000
unkown
page readonly
E50000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7CA1000
heap
page read and write
2A00000
heap
page read and write
210E000
stack
page read and write
53C0000
system
page execute and read and write
16D7000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
4020000
direct allocation
page read and write
5440000
system
page execute and read and write
2C1A000
heap
page read and write
2DB1000
heap
page read and write
14F1000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2BEC000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2C94000
heap
page read and write
2DB1000
heap
page read and write
2740000
unkown
page readonly
1FD7A321000
trusted library allocation
page read and write
2C65000
heap
page read and write
C3971FE000
stack
page read and write
D8C000
stack
page read and write
E20000
unkown
page read and write
6BE000
unkown
page readonly
2DB1000
heap
page read and write
2740000
unkown
page readonly
7C1000
unkown
page readonly
DE0000
unkown
page readonly
2930000
direct allocation
page read and write
3E0000
heap
page read and write
105E000
stack
page read and write
2CC0000
heap
page read and write
3FD0000
direct allocation
page read and write
2A13000
heap
page read and write
650000
unkown
page readonly
105E000
stack
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
B14000
heap
page read and write
2DB1000
heap
page read and write
38D0000
direct allocation
page execute and read and write
EA0000
unkown
page readonly
2C5B000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
DD0000
unkown
page readonly
C3961FB000
stack
page read and write
7CEF000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
740000
heap
page read and write
2DB1000
heap
page read and write
CC0000
heap
page read and write
2DB1000
heap
page read and write
7F7E000
stack
page read and write
4841000
unclassified section
page execute and read and write
40F9000
direct allocation
page read and write
40FD000
direct allocation
page read and write
2DB1000
heap
page read and write
6B1000
unkown
page execute read
3FA3000
direct allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7C96000
heap
page read and write
2C51000
heap
page read and write
E30000
heap
page read and write
2DB1000
heap
page read and write
2C05000
heap
page read and write
2DB1000
heap
page read and write
2C72000
heap
page read and write
E36000
heap
page read and write
2A02000
heap
page read and write
2F8C000
unkown
page read and write
2CC5000
heap
page read and write
760000
heap
page read and write
1FD7A4BE000
trusted library allocation
page read and write
13FC000
stack
page read and write
2DB1000
heap
page read and write
E50000
heap
page read and write
3E80000
direct allocation
page read and write
2A13000
heap
page read and write
660000
unkown
page readonly
7CAE000
heap
page read and write
7CA8000
heap
page read and write
16A7000
heap
page read and write
2CCA000
heap
page read and write
730000
unkown
page readonly
4020000
direct allocation
page read and write
2BB0000
heap
page read and write
2DB1000
heap
page read and write
4004000
unkown
page read and write
1FD7A4A5000
trusted library allocation
page read and write
7CBA000
heap
page read and write
B98000
heap
page read and write
3C0000
heap
page read and write
6C5000
unkown
page read and write
6C7000
unkown
page readonly
2DB1000
heap
page read and write
353D000
direct allocation
page execute and read and write
650000
unkown
page readonly
40F9000
direct allocation
page read and write
C75000
unkown
page readonly
1545000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
7CAB000
heap
page read and write
6BE000
unkown
page readonly
44BA000
unkown
page read and write
760000
heap
page read and write
2DB1000
heap
page read and write
154F000
heap
page read and write
DD0000
unkown
page readonly
2E00000
heap
page read and write
2DB1000
heap
page read and write
C20000
unkown
page readonly
E58000
heap
page read and write
167C000
heap
page read and write
2C9B000
heap
page read and write
2A13000
heap
page read and write
2DB1000
heap
page read and write
416E000
direct allocation
page read and write
2DB1000
heap
page read and write
2C5B000
heap
page read and write
B64000
heap
page read and write
7CDA000
heap
page read and write
740000
unkown
page readonly
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2C20000
heap
page read and write
2DB1000
heap
page read and write
1FD78800000
heap
page read and write
2CC5000
heap
page read and write
DE0000
unkown
page readonly
D8C000
stack
page read and write
2DB1000
heap
page read and write
6C5000
unkown
page read and write
48AF000
unclassified section
page execute and read and write
2DB1000
heap
page read and write
B64000
heap
page read and write
7D0000
direct allocation
page read and write
15AF000
heap
page read and write
292F000
stack
page read and write
2F12000
heap
page read and write
3E30000
direct allocation
page read and write
7D1C000
heap
page read and write
1FD7A401000
trusted library allocation
page read and write
2DB1000
heap
page read and write
2A13000
heap
page read and write
38B000
stack
page read and write
B98000
heap
page read and write
2DB1000
heap
page read and write
C3969FE000
stack
page read and write
2DB1000
heap
page read and write
6C7000
unkown
page readonly
3090000
trusted library allocation
page read and write
2DB1000
heap
page read and write
C3979FF000
stack
page read and write
2F50000
trusted library allocation
page read and write
2DB1000
heap
page read and write
2980000
unkown
page read and write
2830000
unkown
page execute and read and write
2DB1000
heap
page read and write
15BB000
heap
page read and write
2C17000
heap
page read and write
3E80000
direct allocation
page read and write
40F9000
direct allocation
page read and write
2DB1000
heap
page read and write
13DB000
stack
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
3FA3000
direct allocation
page read and write
B14000
heap
page read and write
2DB1000
heap
page read and write
3B21000
unkown
page execute and read and write
1669000
heap
page read and write
2970000
unkown
page read and write
2DB1000
heap
page read and write
3924000
heap
page read and write
1FD7A020000
trusted library allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
1FD787D0000
heap
page read and write
6B0000
unkown
page readonly
2DB1000
heap
page read and write
2C72000
heap
page read and write
BC1000
unkown
page execute read
1160000
unkown
page readonly
BC1000
unkown
page execute read
7D14000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
15BA000
heap
page read and write
7A8000
stack
page read and write
2C5E000
heap
page read and write
2DB1000
heap
page read and write
2C82000
heap
page read and write
1FD7884A000
heap
page read and write
6B0000
unkown
page readonly
16C7000
heap
page read and write
5450000
system
page execute and read and write
6B1000
unkown
page execute read
15BA000
heap
page read and write
2DB1000
heap
page read and write
7D11000
heap
page read and write
DBE000
stack
page read and write
2DB1000
heap
page read and write
3129000
heap
page read and write
15DA000
heap
page read and write
B70000
heap
page read and write
6C7000
unkown
page readonly
2D72000
unkown
page read and write
7AE000
stack
page read and write
3090000
trusted library allocation
page read and write
40FD000
direct allocation
page read and write
7C9B000
heap
page read and write
2F8C000
unkown
page read and write
2DB1000
heap
page read and write
7CF2000
heap
page read and write
2CA7000
heap
page read and write
2BF7000
heap
page read and write
AF0000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
2BF3000
heap
page read and write
2C0B000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
3F53000
direct allocation
page read and write
AFC000
stack
page read and write
6B1000
unkown
page execute read
1FD7A313000
trusted library allocation
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
BB0000
heap
page read and write
750000
direct allocation
page read and write
3DE0000
direct allocation
page read and write
2BE8000
heap
page read and write
1FD78872000
heap
page read and write
7B0000
unkown
page read and write
2DB1000
heap
page read and write
3682000
unclassified section
page read and write
2DB0000
heap
page read and write
2BFD000
heap
page read and write
2DB1000
heap
page read and write
C83000
unkown
page write copy
2BC0000
unkown
page readonly
2DB1000
heap
page read and write
E11000
unkown
page readonly
7D99000
heap
page read and write
2DB1000
heap
page read and write
1543000
heap
page read and write
2A13000
heap
page read and write
2DB1000
heap
page read and write
1231000
unkown
page readonly
DC0000
heap
page read and write
2C65000
heap
page read and write
15BA000
heap
page read and write
2DB1000
heap
page read and write
2DB1000
heap
page read and write
B70000
heap
page read and write
2C5E000
heap
page read and write
AFC000
stack
page read and write
There are 697 hidden memdumps, click here to show them.