IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\17-EIW25
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\rgGVtZHsFDmobUiUfhFQeaCpbrDOXlmOrOIcCUcMChxsmEv\LHmmkoXQgKLVlTwFJILFF.exe
"C:\Program Files (x86)\rgGVtZHsFDmobUiUfhFQeaCpbrDOXlmOrOIcCUcMChxsmEv\LHmmkoXQgKLVlTwFJILFF.exe"
malicious
C:\Windows\SysWOW64\unlodctr.exe
"C:\Windows\SysWOW64\unlodctr.exe"
malicious
C:\Program Files (x86)\rgGVtZHsFDmobUiUfhFQeaCpbrDOXlmOrOIcCUcMChxsmEv\LHmmkoXQgKLVlTwFJILFF.exe
"C:\Program Files (x86)\rgGVtZHsFDmobUiUfhFQeaCpbrDOXlmOrOIcCUcMChxsmEv\LHmmkoXQgKLVlTwFJILFF.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.gattosat.icu/qruc/
109.123.121.243
malicious
http://www.gattosat.icu/qruc/?oB1d=UAq9CzGRql0qbxLGxVHqg5bf0CZ8rOmIoC7W/FPBEpHWNGr0R1xACLnBcwEc3ZkTuU45ULwzGu2M7+E0XrmRMVrUBL+8Gy/k2I5T6z62CfhcpnnIk8mA5gg=&K0J=ebDTRVV8VZr
109.123.121.243
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.linbreoffice.org/qruc/?K0J=ebDTRVV8VZr&oB1d=Xmo1lInOanbZEZR2FfqxILRU2WQsGTgTYIBV9i+RFmbCb5D19+w35N1Is2bkZ42QIXmVJTObgj0BeJUqj9w3UH0zQRfJBsE/jQutHm2oMvc1KqjOm02x0DQ=
64.225.91.73
https://duckduckgo.com/chrome_newtab
unknown
https://domaincntrol.com/?orighost=
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.klingerlumberltd.com/qruc/?K0J=ebDTRVV8VZr&oB1d=4y8JdVmVqWeea5bUJhnZt7XNxRE24icx9gyDCHl5L7QB29ig52mkDYCfyusGnjDf+1nAg1jN2XuDrRbFj9LrT3fa2hcokdL8Q9MgXuVmgdyCbuMpnnH80A0=
109.70.148.57
https://nojs.domaincntrol.com
unknown
http://www.quantumboulevard.xyz
unknown
http://www.litespeedtech.com/error-page
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.linbreoffice.org/qruc/
64.225.91.73
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.quantumboulevard.xyz/qruc/?oB1d=TKQjCngekOUXb4wXltIPy/Q8yQpui0ExkVDYFHPguHHgtawi326eHXwL5/LbdhSUHl1rH91YHPKtuSAwSH4DtV2YStFMFWvJ0j7VceHyQH2xgQtUsq8+akA=&K0J=ebDTRVV8VZr
66.29.135.159
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.quantumboulevard.xyz/qruc/
66.29.135.159
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.quantumboulevard.xyz
66.29.135.159
malicious
www.gattosat.icu
109.123.121.243
malicious
www.klingerlumberltd.com
unknown
malicious
www.linbreoffice.org
64.225.91.73
klingerlumberltd.com
109.70.148.57

IPs

IP
Domain
Country
Malicious
66.29.135.159
www.quantumboulevard.xyz
United States
malicious
109.123.121.243
www.gattosat.icu
United Kingdom
malicious
64.225.91.73
www.linbreoffice.org
United States
109.70.148.57
klingerlumberltd.com
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
18C0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
850000
trusted library allocation
page read and write
malicious
350000
system
page execute and read and write
malicious
2BE1000
trusted library allocation
page read and write
malicious
2D58000
trusted library allocation
page read and write
malicious
7060000
trusted library section
page read and write
malicious
810000
trusted library allocation
page read and write
malicious
2F10000
unkown
page execute and read and write
malicious
C00000
system
page execute and read and write
malicious
1DF0000
unclassified section
page execute and read and write
malicious
9A1000
heap
page read and write
650000
unkown
page readonly
538C000
stack
page read and write
9B0000
unkown
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
772E000
heap
page read and write
9A1000
heap
page read and write
815000
unkown
page read and write
7C0000
heap
page read and write
9A1000
heap
page read and write
1170000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
3725000
unkown
page execute and read and write
51B0000
heap
page read and write
26D0000
heap
page read and write
30E6000
unkown
page read and write
9A1000
heap
page read and write
7DBE000
stack
page read and write
76C5000
heap
page read and write
26CF000
stack
page read and write
6BA000
stack
page read and write
7731000
heap
page read and write
9A1000
heap
page read and write
7C4000
heap
page read and write
5100000
trusted library allocation
page execute and read and write
9A1000
heap
page read and write
990000
heap
page read and write
9A1000
heap
page read and write
5041000
trusted library allocation
page read and write
D4F000
heap
page read and write
55E0000
trusted library allocation
page read and write
9A1000
heap
page read and write
801000
unkown
page execute read
1B3E000
direct allocation
page execute and read and write
11CE000
stack
page read and write
1170000
heap
page read and write
9A1000
heap
page read and write
B1E000
stack
page read and write
E4D000
trusted library allocation
page execute and read and write
113C000
stack
page read and write
5090000
trusted library allocation
page read and write
7840000
heap
page read and write
2597000
unclassified section
page execute and read and write
5050000
trusted library allocation
page read and write
26D0000
heap
page read and write
783C000
stack
page read and write
E43000
trusted library allocation
page execute and read and write
1B96B912000
trusted library allocation
page read and write
76B0000
heap
page read and write
7D4F000
stack
page read and write
9A1000
heap
page read and write
7050000
trusted library allocation
page execute and read and write
8B7000
heap
page read and write
7040000
trusted library allocation
page execute and read and write
9A1000
heap
page read and write
1280000
heap
page read and write
9A1000
heap
page read and write
B48000
heap
page read and write
2892000
unkown
page read and write
9A1000
heap
page read and write
817000
unkown
page readonly
FA0000
heap
page read and write
850000
heap
page read and write
9A1000
heap
page read and write
1CE8000
direct allocation
page execute and read and write
2CF0000
heap
page read and write
AA0000
trusted library allocation
page read and write
D20000
unkown
page read and write
9A1000
heap
page read and write
EEF000
heap
page read and write
B6DE3FD000
stack
page read and write
9A1000
heap
page read and write
E66000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
14EF000
stack
page read and write
B6DF3FF000
stack
page read and write
E8E000
heap
page read and write
26D4000
heap
page read and write
E90000
trusted library allocation
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
773C000
heap
page read and write
AA0000
trusted library allocation
page read and write
B6DDBFC000
stack
page read and write
E30000
unkown
page readonly
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
7BC000
stack
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
2CE0000
heap
page read and write
2952000
unkown
page read and write
9A1000
heap
page read and write
11C1000
unkown
page readonly
9A1000
heap
page read and write
70D0000
trusted library allocation
page execute and read and write
5110000
trusted library allocation
page execute and read and write
9A1000
heap
page read and write
800000
unkown
page readonly
3362000
unclassified section
page read and write
9A1000
heap
page read and write
2A30000
trusted library allocation
page read and write
32DD000
direct allocation
page execute and read and write
9A1000
heap
page read and write
8B7000
heap
page read and write
50F0000
heap
page read and write
9A1000
heap
page read and write
F51000
heap
page read and write
9A1000
heap
page read and write
C6D000
heap
page read and write
8AC000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
E6A000
trusted library allocation
page execute and read and write
EA7000
heap
page read and write
1B969FA0000
heap
page read and write
96E000
stack
page read and write
183F000
stack
page read and write
9A1000
heap
page read and write
1B96BA00000
trusted library allocation
page read and write
103A000
stack
page read and write
5085000
trusted library allocation
page read and write
9A1000
heap
page read and write
801000
unkown
page execute read
9A1000
heap
page read and write
275E000
stack
page read and write
815000
unkown
page read and write
10C0000
heap
page read and write
9A1000
heap
page read and write
76A0000
trusted library allocation
page read and write
2B6C000
unkown
page read and write
12D0000
unkown
page read and write
1B96B7E0000
trusted library allocation
page read and write
1C66000
direct allocation
page execute and read and write
9A1000
heap
page read and write
7728000
heap
page read and write
9A1000
heap
page read and write
772E000
heap
page read and write
9A1000
heap
page read and write
7718000
heap
page read and write
1B96BAAB000
trusted library allocation
page read and write
9A1000
heap
page read and write
52DF000
stack
page read and write
2A324000
system
page read and write
9A1000
heap
page read and write
5020000
trusted library allocation
page read and write
B30000
heap
page read and write
9A1000
heap
page read and write
917000
heap
page read and write
E0E000
stack
page read and write
76B6000
heap
page read and write
76F5000
heap
page read and write
32E1000
direct allocation
page execute and read and write
2F00000
unkown
page read and write
2B6C000
unkown
page read and write
8AE000
heap
page read and write
9A1000
heap
page read and write
EBE000
heap
page read and write
9A1000
heap
page read and write
EA0000
heap
page read and write
9A1000
heap
page read and write
830000
unkown
page readonly
55CD000
stack
page read and write
9A1000
heap
page read and write
A22E000
stack
page read and write
D30000
heap
page read and write
9A1000
heap
page read and write
840000
unkown
page readonly
1AC9000
direct allocation
page execute and read and write
318000
stack
page read and write
9A1000
heap
page read and write
9C6E000
stack
page read and write
2CE4000
heap
page read and write
9A1000
heap
page read and write
9DAD000
stack
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
574E000
stack
page read and write
9A1000
heap
page read and write
7CCF000
stack
page read and write
801000
unkown
page execute read
4867000
trusted library allocation
page read and write
9A1000
heap
page read and write
1B96B900000
trusted library allocation
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
2CD0000
unkown
page readonly
7601000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9FB0000
heap
page read and write
640000
unkown
page readonly
5052000
trusted library allocation
page read and write
1B96B90D000
trusted library allocation
page read and write
5600000
heap
page read and write
2F00000
unkown
page read and write
9A1000
heap
page read and write
1840000
direct allocation
page read and write
5750000
trusted library section
page read and write
271C000
stack
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
1B96BA01000
trusted library allocation
page read and write
9A1000
heap
page read and write
509C000
stack
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
2790000
heap
page read and write
E44000
trusted library allocation
page read and write
9A1000
heap
page read and write
970000
unkown
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
5160000
trusted library allocation
page read and write
7D0E000
stack
page read and write
D90000
unkown
page readonly
E77000
trusted library allocation
page execute and read and write
A0ED000
stack
page read and write
76F9000
heap
page read and write
2CE4000
heap
page read and write
9A1000
heap
page read and write
948000
heap
page read and write
9A1000
heap
page read and write
E62000
trusted library allocation
page read and write
1640000
heap
page read and write
1270000
unkown
page readonly
9A1000
heap
page read and write
5140000
trusted library allocation
page read and write
9A1000
heap
page read and write
1B96BACE000
trusted library allocation
page read and write
9A1000
heap
page read and write
1280000
heap
page read and write
5760000
trusted library allocation
page read and write
1B969ED0000
heap
page read and write
1470000
heap
page read and write
8A0000
heap
page read and write
19A0000
direct allocation
page execute and read and write
CF0000
heap
page read and write
103A000
stack
page read and write
DB0000
unkown
page readonly
9A1000
heap
page read and write
9A1000
heap
page read and write
2CF0000
heap
page read and write
9A1000
heap
page read and write
1B969D48000
system
page execute and read and write
9A1000
heap
page read and write
14F0000
unkown
page readonly
7E2000
unkown
page readonly
7F0000
unkown
page readonly
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
11C1000
unkown
page readonly
981000
heap
page read and write
13DE000
stack
page read and write
93E000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
E7B000
trusted library allocation
page execute and read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
8BD000
heap
page read and write
3C0000
heap
page read and write
E72000
trusted library allocation
page read and write
13E0000
heap
page read and write
9EB0000
heap
page read and write
7BCC000
stack
page read and write
2F54000
unkown
page read and write
D38000
heap
page read and write
815000
unkown
page read and write
3010000
direct allocation
page execute and read and write
80E000
unkown
page readonly
76BB000
heap
page read and write
9A1000
heap
page read and write
2A8B000
stack
page read and write
9A1000
heap
page read and write
7BC000
stack
page read and write
9A1000
heap
page read and write
3DBE000
trusted library allocation
page read and write
9A1000
heap
page read and write
815000
unkown
page read and write
92A000
heap
page read and write
9F5000
heap
page read and write
9A1000
heap
page read and write
29C62000
system
page read and write
FA3000
heap
page read and write
CC0000
trusted library allocation
page execute and read and write
3A24000
unclassified section
page read and write
504D000
trusted library allocation
page read and write
2892000
unkown
page read and write
3278000
unkown
page read and write
7C8E000
stack
page read and write
9A1000
heap
page read and write
7C4000
heap
page read and write
4CDC000
stack
page read and write
650000
unkown
page readonly
C82000
system
page execute and read and write
3422000
unclassified section
page read and write
800000
unkown
page readonly
18BE000
stack
page read and write
2DFF000
stack
page read and write
9A1000
heap
page read and write
1B969F79000
heap
page read and write
76FB000
heap
page read and write
80E000
unkown
page readonly
80E000
unkown
page readonly
A32E000
stack
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
76EA000
heap
page read and write
97B000
heap
page read and write
123C000
stack
page read and write
7601000
heap
page read and write
50B0000
trusted library allocation
page read and write
7737000
heap
page read and write
810000
trusted library allocation
page read and write
512D000
trusted library allocation
page read and write
9A1000
heap
page read and write
7C4000
heap
page read and write
9A1000
heap
page read and write
1430000
heap
page read and write
9A1000
heap
page read and write
1ACD000
direct allocation
page execute and read and write
981000
unkown
page readonly
9A1000
heap
page read and write
D20000
unkown
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
D90000
unkown
page readonly
994000
heap
page read and write
9A1000
heap
page read and write
6BA000
stack
page read and write
DA0000
unkown
page readonly
C7F000
system
page execute and read and write
2E00000
unkown
page readonly
B4A000
heap
page read and write
76F0000
heap
page read and write
1B96B916000
trusted library allocation
page read and write
9A1000
heap
page read and write
7C4F000
stack
page read and write
1B969F8D000
heap
page read and write
10AE000
stack
page read and write
8AC000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
8B3000
heap
page read and write
9A1000
heap
page read and write
503E000
trusted library allocation
page read and write
990000
unkown
page read and write
9A1000
heap
page read and write
1B969FA3000
heap
page read and write
6F90000
trusted library section
page read and write
9A1000
heap
page read and write
2D56000
trusted library allocation
page read and write
D38000
heap
page read and write
9A1000
heap
page read and write
7724000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
29EE000
stack
page read and write
363C000
unclassified section
page read and write
8B8000
heap
page read and write
5605000
heap
page read and write
2C7B000
trusted library allocation
page read and write
630000
unkown
page readonly
A1EE000
stack
page read and write
1160000
unkown
page readonly
9A1000
heap
page read and write
E60000
trusted library allocation
page read and write
9A1000
heap
page read and write
27A0000
unkown
page readonly
29AE000
stack
page read and write
1310000
heap
page read and write
13F0000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
3EDA000
unclassified section
page read and write
14F0000
unkown
page readonly
9A1000
heap
page read and write
9A1000
heap
page read and write
5420000
heap
page read and write
8A7000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
5620000
heap
page read and write
9A1000
heap
page read and write
870E000
stack
page read and write
7734000
heap
page read and write
800000
unkown
page readonly
10B0000
trusted library allocation
page execute and read and write
9A1000
heap
page read and write
E30000
trusted library allocation
page read and write
9A1000
heap
page read and write
5610000
heap
page read and write
9A1000
heap
page read and write
970000
heap
page read and write
AA0000
trusted library allocation
page read and write
9A1000
heap
page read and write
D00000
unkown
page readonly
1DEF000
stack
page read and write
9A1000
heap
page read and write
2CE0000
heap
page read and write
C63000
system
page execute and read and write
FAD000
heap
page read and write
CD6000
system
page execute and read and write
5060000
trusted library allocation
page read and write
9A1000
heap
page read and write
E1D000
heap
page read and write
970000
unkown
page read and write
7E0000
unkown
page readonly
9A1000
heap
page read and write
5080000
trusted library allocation
page read and write
9A1000
heap
page read and write
1B969DE0000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
76D4000
heap
page read and write
12D0000
unkown
page read and write
850000
heap
page read and write
2BC0000
trusted library allocation
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
94B000
heap
page read and write
830000
unkown
page readonly
76C8000
heap
page read and write
9A1000
heap
page read and write
8B7000
heap
page read and write
DB0000
unkown
page readonly
70B0000
trusted library allocation
page read and write
1160000
unkown
page readonly
9A1000
heap
page read and write
E19000
heap
page read and write
7DFF000
stack
page read and write
7F0000
unkown
page readonly
E53000
trusted library allocation
page read and write
133A000
stack
page read and write
27A0000
unkown
page readonly
9A1000
heap
page read and write
7725000
heap
page read and write
E30000
unkown
page readonly
9A1000
heap
page read and write
1270000
unkown
page readonly
8AE000
heap
page read and write
9A1000
heap
page read and write
5B90000
trusted library allocation
page read and write
9A1000
heap
page read and write
817000
unkown
page readonly
640000
unkown
page readonly
6F8E000
stack
page read and write
26D4000
heap
page read and write
9A1000
heap
page read and write
5E4E000
stack
page read and write
1B96B903000
trusted library allocation
page read and write
2B9E000
stack
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
2790000
heap
page read and write
9A1000
heap
page read and write
12F0000
unkown
page read and write
9A1000
heap
page read and write
9F0000
heap
page read and write
1B96BAC4000
trusted library allocation
page read and write
9A1000
heap
page read and write
1B96B7E0000
trusted library allocation
page read and write
981000
unkown
page readonly
939000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
1B969D4C000
system
page execute and read and write
12E1000
unkown
page readonly
9A1000
heap
page read and write
2BA0000
heap
page read and write
5046000
trusted library allocation
page read and write
817000
unkown
page readonly
1B969D4A000
system
page execute and read and write
D30000
heap
page read and write
6D20000
heap
page read and write
2A90000
heap
page read and write
29D22000
system
page read and write
2DB000
stack
page read and write
3352000
direct allocation
page execute and read and write
711E000
stack
page read and write
9A1000
heap
page read and write
12F0000
unkown
page read and write
9A1000
heap
page read and write
929000
stack
page read and write
2CCE000
stack
page read and write
9A1000
heap
page read and write
7C0E000
stack
page read and write
76C0000
heap
page read and write
5024000
trusted library allocation
page read and write
1477000
heap
page read and write
976000
heap
page read and write
EB0000
heap
page read and write
5120000
trusted library allocation
page read and write
9A1000
heap
page read and write
E50000
trusted library allocation
page read and write
9A1000
heap
page read and write
3EF0000
trusted library allocation
page read and write
9A1000
heap
page read and write
75F4000
heap
page read and write
8496000
trusted library allocation
page read and write
2605000
unclassified section
page execute and read and write
9A1000
heap
page read and write
9B2E000
stack
page read and write
1881000
unkown
page readonly
9A0000
heap
page read and write
9A1000
heap
page read and write
1B969F00000
heap
page read and write
9A1000
heap
page read and write
1881000
unkown
page readonly
12CE000
stack
page read and write
770F000
heap
page read and write
29F3C000
system
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
1B96BABE000
trusted library allocation
page read and write
1C51000
direct allocation
page execute and read and write
9A1000
heap
page read and write
980000
heap
page read and write
2E00000
unkown
page readonly
3D48000
unclassified section
page read and write
1B96B800000
trusted library allocation
page read and write
9A1000
heap
page read and write
2A2E000
stack
page read and write
E40000
trusted library allocation
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
29D7C000
system
page read and write
913000
heap
page read and write
D00000
unkown
page readonly
1B969F70000
heap
page read and write
1B96B921000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
1B96B7D0000
heap
page read and write
944000
heap
page read and write
E5D000
trusted library allocation
page execute and read and write
9DE000
stack
page read and write
ED8000
heap
page read and write
95E000
heap
page read and write
9A1000
heap
page read and write
C73000
system
page execute and read and write
F59000
heap
page read and write
31AE000
direct allocation
page execute and read and write
9A1000
heap
page read and write
2CD0000
unkown
page readonly
1178000
heap
page read and write
771E000
heap
page read and write
1C6D000
direct allocation
page execute and read and write
3D0000
heap
page read and write
3BE1000
trusted library allocation
page read and write
9A1000
heap
page read and write
12E1000
unkown
page readonly
B6DEBFE000
stack
page read and write
EB8000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9C2E000
stack
page read and write
3139000
direct allocation
page execute and read and write
9A1000
heap
page read and write
5190000
heap
page read and write
8F8000
heap
page read and write
113C000
stack
page read and write
9A1000
heap
page read and write
8B7000
heap
page read and write
7712000
heap
page read and write
9EAD000
stack
page read and write
800000
unkown
page readonly
990000
unkown
page read and write
1390000
heap
page read and write
9A1000
heap
page read and write
3E0000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
502B000
trusted library allocation
page read and write
2BD0000
heap
page execute and read and write
8BD000
heap
page read and write
951000
heap
page read and write
9F0000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
1178000
heap
page read and write
7070000
trusted library allocation
page read and write
9A1000
heap
page read and write
FA9000
heap
page read and write
3F2D000
trusted library allocation
page read and write
7736000
heap
page read and write
75F0000
trusted library allocation
page read and write
9A1000
heap
page read and write
29AC000
unkown
page read and write
3BB6000
unclassified section
page read and write
9A1000
heap
page read and write
801000
unkown
page execute read
2D10000
trusted library allocation
page read and write
51A0000
heap
page read and write
347C000
unclassified section
page read and write
80E000
unkown
page readonly
840000
unkown
page readonly
9A1000
heap
page read and write
51B3000
heap
page read and write
630000
unkown
page readonly
CF6000
stack
page read and write
1B969F9B000
heap
page read and write
9A1000
heap
page read and write
1150000
unkown
page readonly
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
DA0000
unkown
page readonly
313D000
direct allocation
page execute and read and write
73F0000
trusted library section
page read and write
519F000
stack
page read and write
51DE000
stack
page read and write
91D000
heap
page read and write
9A1000
heap
page read and write
1B969FA3000
heap
page read and write
1B969CD0000
system
page execute and read and write
9A1000
heap
page read and write
909000
heap
page read and write
C10000
trusted library allocation
page read and write
9D6E000
stack
page read and write
1B96B910000
trusted library allocation
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
C5A000
system
page execute and read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
1150000
unkown
page readonly
7729000
heap
page read and write
5170000
heap
page execute and read and write
1310000
heap
page read and write
8B7000
heap
page read and write
5180000
trusted library section
page readonly
EF2000
heap
page read and write
9A1000
heap
page read and write
70C0000
trusted library allocation
page read and write
8C1000
heap
page read and write
9A1000
heap
page read and write
9A1000
heap
page read and write
817000
unkown
page readonly
36B7000
unkown
page execute and read and write
340A000
unkown
page read and write
3CD4000
trusted library allocation
page read and write
There are 668 hidden memdumps, click here to show them.