IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\17-EIW25
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\LKVbfviIbyWIajZxIWpzywuiobTbckkYAurOVHOOlucIslpavLXAFuOIDsRwGHO\SIsaiIITJVPvUAG.exe
"C:\Program Files (x86)\LKVbfviIbyWIajZxIWpzywuiobTbckkYAurOVHOOlucIslpavLXAFuOIDsRwGHO\SIsaiIITJVPvUAG.exe"
malicious
C:\Windows\SysWOW64\unlodctr.exe
"C:\Windows\SysWOW64\unlodctr.exe"
malicious
C:\Program Files (x86)\LKVbfviIbyWIajZxIWpzywuiobTbckkYAurOVHOOlucIslpavLXAFuOIDsRwGHO\SIsaiIITJVPvUAG.exe
"C:\Program Files (x86)\LKVbfviIbyWIajZxIWpzywuiobTbckkYAurOVHOOlucIslpavLXAFuOIDsRwGHO\SIsaiIITJVPvUAG.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.gattosat.icu/qruc/?4VDXm=UAq9CzGRql0qbxLGxVHqg5bf0CZ8rOmIoC7W/FPBEpHWNGr0R1xACLnBcwEc3ZkTuU45ULwzGu2M7+E0XrmRMVrUBJG+On2qg8sZ5zOyCuxckVT6s8La+RBpo44QBKfh6A==&aZE=WvFLSf2X7P
109.123.121.243
malicious
http://www.gattosat.icu/qruc/
109.123.121.243
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://domaincntrol.com/?orighost=
unknown
http://www.linbreoffice.org/qruc/?4VDXm=Xmo1lInOanbZEZR2FfqxILRU2WQsGTgTYIBV9i+RFmbCb5D19+w35N1Is2bkZ42QIXmVJTObgj0BeJUqj9w3UH0zQTnLJ5Nx1k7nEmCsMeM1HYX8u0brzyzcJ4xyaMAl3g==&aZE=WvFLSf2X7P
64.225.91.73
https://duckduckgo.com/ac/?q=
unknown
https://nojs.domaincntrol.com
unknown
http://www.quantumboulevard.xyz
unknown
http://www.litespeedtech.com/error-page
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.quantumboulevard.xyz/qruc/?4VDXm=TKQjCngekOUXb4wXltIPy/Q8yQpui0ExkVDYFHPguHHgtawi326eHXwL5/LbdhSUHl1rH91YHPKtuSAwSH4DtV2YSv9ONDmHiXuffez2Q2mxtiZmkqRkdVgep2kYHtBckg==&aZE=WvFLSf2X7P
66.29.135.159
http://www.klingerlumberltd.com/qruc/?4VDXm=4y8JdVmVqWeea5bUJhnZt7XNxRE24icx9gyDCHl5L7QB29ig52mkDYCfyusGnjDf+1nAg1jN2XuDrRbFj9LrT3fa2jkqsICyGJZqUuhigsiCWc4bvnqmzxVZ7jHa9xib4Q==&aZE=WvFLSf2X7P
109.70.148.57
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.linbreoffice.org/qruc/
64.225.91.73
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.quantumboulevard.xyz/qruc/
66.29.135.159
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.quantumboulevard.xyz
66.29.135.159
malicious
www.gattosat.icu
109.123.121.243
malicious
www.klingerlumberltd.com
unknown
malicious
www.linbreoffice.org
64.225.91.73
klingerlumberltd.com
109.70.148.57

IPs

IP
Domain
Country
Malicious
66.29.135.159
www.quantumboulevard.xyz
United States
malicious
109.123.121.243
www.gattosat.icu
United Kingdom
malicious
64.225.91.73
www.linbreoffice.org
United States
109.70.148.57
klingerlumberltd.com
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
2FC1000
trusted library allocation
page read and write
malicious
BC0000
trusted library allocation
page read and write
malicious
3236000
trusted library allocation
page read and write
malicious
34A0000
unclassified section
page execute and read and write
malicious
820000
system
page execute and read and write
malicious
1580000
system
page execute and read and write
malicious
7D70000
trusted library section
page read and write
malicious
C00000
trusted library allocation
page read and write
malicious
41E0000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
D10000
unclassified section
page execute and read and write
malicious
C81000
heap
page read and write
C81000
heap
page read and write
3997000
unclassified section
page execute and read and write
50BC000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
2AA0000
unclassified section
page execute and read and write
C81000
heap
page read and write
DE1000
unkown
page readonly
C330000
heap
page read and write
3184000
heap
page read and write
2AEF3210000
heap
page read and write
C81000
heap
page read and write
160000
unkown
page readonly
1336000
direct allocation
page execute and read and write
3030000
heap
page read and write
3110000
direct allocation
page execute and read and write
C81000
heap
page read and write
2F99000
trusted library allocation
page read and write
2AEF4C0F000
trusted library allocation
page read and write
1141000
heap
page read and write
9E6000
heap
page read and write
7B49000
heap
page read and write
797000
unkown
page readonly
C81000
heap
page read and write
740000
unkown
page read and write
A3F000
heap
page read and write
30C5000
trusted library allocation
page read and write
48B3000
trusted library allocation
page read and write
2AEF4DC4000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
2F5C000
heap
page read and write
C81000
heap
page read and write
C26000
unkown
page execute and read and write
C81000
heap
page read and write
7BF6000
heap
page read and write
8590000
trusted library allocation
page read and write
C81000
heap
page read and write
1070000
direct allocation
page execute and read and write
C81000
heap
page read and write
15B0000
heap
page read and write
107E000
stack
page read and write
C81000
heap
page read and write
820E000
stack
page read and write
740000
unkown
page read and write
A50000
unkown
page readonly
127A000
stack
page read and write
30BE000
stack
page read and write
3000000
trusted library allocation
page read and write
2AEF4C11000
trusted library allocation
page read and write
B62000
unkown
page execute and read and write
C81000
heap
page read and write
15A3000
trusted library allocation
page execute and read and write
C3EAFFE000
stack
page read and write
C81000
heap
page read and write
2CEA000
trusted library allocation
page execute and read and write
7C55000
heap
page read and write
16E8000
heap
page read and write
313F000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
2AEF4C21000
trusted library allocation
page read and write
C81000
heap
page read and write
1520000
unkown
page read and write
2CE6000
trusted library allocation
page execute and read and write
1576000
heap
page read and write
2AEF30A1000
system
page execute and read and write
780000
unkown
page readonly
C81000
heap
page read and write
5572000
trusted library allocation
page read and write
330C2000
system
page read and write
1B71000
unkown
page readonly
C81000
heap
page read and write
1570000
heap
page read and write
C81000
heap
page read and write
119D000
direct allocation
page execute and read and write
C81000
heap
page read and write
2FA0000
trusted library allocation
page read and write
C81000
heap
page read and write
780000
unkown
page readonly
A19000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
797000
unkown
page readonly
C81000
heap
page read and write
781000
unkown
page execute read
C81000
heap
page read and write
818E000
stack
page read and write
16C0000
unkown
page read and write
553E000
stack
page read and write
2DE0000
trusted library allocation
page read and write
530000
unkown
page readonly
16E0000
heap
page read and write
2AEF4DBE000
trusted library allocation
page read and write
96F000
heap
page read and write
FF0000
unkown
page readonly
C81000
heap
page read and write
5A8C000
stack
page read and write
13CE000
stack
page read and write
C81000
heap
page read and write
110E000
heap
page read and write
C81000
heap
page read and write
1540000
unkown
page readonly
4FC000
stack
page read and write
FF0000
unkown
page readonly
C81000
heap
page read and write
2D9B000
stack
page read and write
2AEF4DCE000
trusted library allocation
page read and write
84CC000
stack
page read and write
2AEF4A70000
heap
page read and write
2CE0000
trusted library allocation
page read and write
C81000
heap
page read and write
795000
unkown
page read and write
C81000
heap
page read and write
950000
heap
page read and write
10E0000
heap
page read and write
5561000
trusted library allocation
page read and write
C81000
heap
page read and write
4D28000
trusted library allocation
page read and write
7BFF000
heap
page read and write
781000
unkown
page execute read
824F000
stack
page read and write
B60000
unkown
page execute and read and write
967000
heap
page read and write
7DEF000
stack
page read and write
2AEF3272000
heap
page read and write
2AEF4D01000
trusted library allocation
page read and write
111F000
heap
page read and write
C81000
heap
page read and write
7ACE000
stack
page read and write
C46E000
stack
page read and write
C81000
heap
page read and write
137C000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C5AE000
stack
page read and write
3180000
heap
page read and write
C81000
heap
page read and write
3944000
unkown
page read and write
C1EE000
stack
page read and write
BDAE000
stack
page read and write
7C62000
heap
page read and write
7C73000
heap
page read and write
C81000
heap
page read and write
968000
heap
page read and write
71E000
stack
page read and write
C81000
heap
page read and write
10E5000
heap
page read and write
7C6E000
heap
page read and write
8C4000
heap
page read and write
C81000
heap
page read and write
23E0000
unkown
page execute and read and write
3089000
heap
page read and write
828E000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
9D6000
heap
page read and write
C81000
heap
page read and write
7B39000
heap
page read and write
C81000
heap
page read and write
97C000
heap
page read and write
16A0000
unclassified section
page execute and read and write
3180000
heap
page read and write
9A4000
heap
page read and write
C81000
heap
page read and write
78E000
unkown
page readonly
C81000
heap
page read and write
C81000
heap
page read and write
78E000
unkown
page readonly
C81000
heap
page read and write
1127000
heap
page read and write
680000
heap
page read and write
C3EA7FE000
stack
page read and write
7D80000
heap
page read and write
DAE000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
310B000
trusted library allocation
page read and write
170000
unkown
page readonly
85A0000
heap
page read and write
3AD6000
unkown
page read and write
C81000
heap
page read and write
C3E9FFB000
stack
page read and write
95E000
heap
page read and write
7C73000
heap
page read and write
7BE0000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
5E8000
stack
page read and write
C81000
heap
page read and write
5145000
unkown
page execute and read and write
967000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
5C8F000
stack
page read and write
B8E000
stack
page read and write
339C000
unkown
page read and write
7C4C000
heap
page read and write
720000
unkown
page readonly
C81000
heap
page read and write
6BC000
stack
page read and write
13C0000
unkown
page readonly
3184000
heap
page read and write
7C66000
heap
page read and write
16E8000
heap
page read and write
30FC000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
6B0000
heap
page read and write
C81000
heap
page read and write
82CF000
stack
page read and write
C81000
heap
page read and write
32AE000
direct allocation
page execute and read and write
C81000
heap
page read and write
958000
heap
page read and write
7BF0000
heap
page read and write
161A000
system
page execute and read and write
9D6000
heap
page read and write
C81000
heap
page read and write
BDEE000
stack
page read and write
C81000
heap
page read and write
E60000
trusted library allocation
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
691000
unkown
page readonly
C81000
heap
page read and write
7C38000
heap
page read and write
2AEF4C00000
trusted library allocation
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
2AEF4A80000
trusted library allocation
page read and write
160000
unkown
page readonly
33E1000
direct allocation
page execute and read and write
520000
unkown
page readonly
780000
unkown
page readonly
C81000
heap
page read and write
C81000
heap
page read and write
C0EE000
stack
page read and write
C81000
heap
page read and write
2AEF4D00000
trusted library allocation
page read and write
9C2000
heap
page read and write
46D7000
unkown
page execute and read and write
1EA000
stack
page read and write
C81000
heap
page read and write
6A0000
unkown
page read and write
13B8000
direct allocation
page execute and read and write
C81000
heap
page read and write
1EA000
stack
page read and write
C81000
heap
page read and write
7C2E000
heap
page read and write
2FDC000
stack
page read and write
8A0000
heap
page read and write
2F9D000
trusted library allocation
page read and write
3522000
unclassified section
page read and write
7930000
trusted library allocation
page read and write
DC0000
heap
page read and write
7B30000
trusted library allocation
page read and write
2AEF324F000
heap
page read and write
2DC0000
trusted library allocation
page read and write
3462000
unclassified section
page read and write
958000
heap
page read and write
C81000
heap
page read and write
1108000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
4817000
trusted library allocation
page read and write
9C2000
heap
page read and write
C81000
heap
page read and write
1200000
unkown
page readonly
C81000
heap
page read and write
323D000
direct allocation
page execute and read and write
7C65000
heap
page read and write
C81000
heap
page read and write
C28000
unkown
page readonly
9E0000
heap
page read and write
78E000
unkown
page readonly
C81000
heap
page read and write
2D10000
trusted library allocation
page read and write
C81000
heap
page read and write
2F80000
unkown
page read and write
C81000
heap
page read and write
BA0000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
7E80000
trusted library allocation
page read and write
C81000
heap
page read and write
797000
unkown
page readonly
2DA0000
trusted library allocation
page execute and read and write
336C4000
system
page read and write
4CEA000
trusted library allocation
page read and write
DE1000
unkown
page readonly
2AEF326A000
heap
page read and write
2EFF000
stack
page read and write
3C68000
unkown
page read and write
1511000
unkown
page readonly
2AEF4C03000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1210000
unkown
page readonly
C81000
heap
page read and write
15AD000
trusted library allocation
page execute and read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
1520000
unkown
page read and write
3342000
unkown
page read and write
66E000
stack
page read and write
C22D000
stack
page read and write
2AEF4A80000
trusted library allocation
page read and write
C81000
heap
page read and write
7C4F000
heap
page read and write
7DAE000
stack
page read and write
A50000
unkown
page readonly
A04000
heap
page read and write
720000
unkown
page readonly
3452000
direct allocation
page execute and read and write
C81000
heap
page read and write
180000
unkown
page readonly
C81000
heap
page read and write
118D000
heap
page read and write
79A0000
trusted library allocation
page read and write
8C4000
heap
page read and write
22F0000
unkown
page readonly
22F0000
unkown
page readonly
317E000
stack
page read and write
967000
heap
page read and write
7940000
trusted library allocation
page execute and read and write
680000
heap
page read and write
B40000
heap
page read and write
C81000
heap
page read and write
4865000
trusted library allocation
page read and write
CBA000
stack
page read and write
22EF000
stack
page read and write
9C9000
heap
page read and write
C81000
heap
page read and write
7D40000
trusted library section
page read and write
A24000
heap
page read and write
C81000
heap
page read and write
3E48000
unclassified section
page read and write
C81000
heap
page read and write
1200000
unkown
page readonly
2AEF4C15000
trusted library allocation
page read and write
7AD0000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
7D3E000
stack
page read and write
7EC0000
trusted library allocation
page execute and read and write
180000
unkown
page readonly
170000
unkown
page readonly
C0AE000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
BC0000
heap
page read and write
1B71000
unkown
page readonly
5580000
trusted library allocation
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
6B0000
heap
page read and write
C81000
heap
page read and write
1560000
unkown
page read and write
C81000
heap
page read and write
2CCE000
stack
page read and write
950000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
795000
unkown
page read and write
1321000
direct allocation
page execute and read and write
C8B000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
17E0000
unkown
page readonly
7C28000
heap
page read and write
499E000
trusted library allocation
page read and write
9C9000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
2AEF4B00000
trusted library allocation
page read and write
C81000
heap
page read and write
DE1000
heap
page read and write
13C0000
unkown
page readonly
3A05000
unclassified section
page execute and read and write
C81000
heap
page read and write
9EE000
heap
page read and write
55A3000
heap
page read and write
C81000
heap
page read and write
7C79000
heap
page read and write
4FC000
stack
page read and write
16FF000
heap
page read and write
9B5000
heap
page read and write
2DEF000
trusted library allocation
page read and write
A2A000
heap
page read and write
47C9000
trusted library allocation
page read and write
C70000
heap
page read and write
2F90000
trusted library allocation
page read and write
C81000
heap
page read and write
7D6D000
stack
page read and write
86AE000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
9F7000
heap
page read and write
7C00000
heap
page read and write
C81000
heap
page read and write
17E0000
unkown
page readonly
13F0000
heap
page read and write
2CD0000
trusted library allocation
page read and write
95C000
heap
page read and write
30FA000
heap
page read and write
1030000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
1500000
unkown
page read and write
C81000
heap
page read and write
B60000
unkown
page readonly
C81000
heap
page read and write
79B0000
trusted library allocation
page read and write
13D0000
unkown
page readonly
BFAE000
stack
page read and write
C81000
heap
page read and write
96D000
heap
page read and write
9B0000
heap
page read and write
556D000
trusted library allocation
page read and write
797000
unkown
page readonly
8C0000
heap
page read and write
3CB6000
unclassified section
page read and write
1622000
system
page execute and read and write
A20000
heap
page read and write
963000
heap
page read and write
C6AE000
stack
page read and write
A20000
heap
page read and write
C81000
heap
page read and write
540000
unkown
page readonly
530000
unkown
page readonly
950000
heap
page read and write
C81000
heap
page read and write
2AEF3070000
system
page execute and read and write
795000
unkown
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
B62000
unkown
page readonly
C81000
heap
page read and write
C81000
heap
page read and write
20A0000
unclassified section
page execute and read and write
2AEF326F000
heap
page read and write
C81000
heap
page read and write
1540000
unkown
page readonly
2DD0000
trusted library allocation
page read and write
7C71000
heap
page read and write
C81000
heap
page read and write
355C000
unkown
page read and write
81CF000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
958000
heap
page read and write
C81000
heap
page read and write
967000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
550000
heap
page read and write
2AEF4A30000
heap
page read and write
2CE2000
trusted library allocation
page read and write
691000
unkown
page readonly
C81000
heap
page read and write
C81000
heap
page read and write
37E0000
unkown
page execute and read and write
3282000
unkown
page read and write
780000
unkown
page readonly
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
13B0000
unkown
page readonly
7BB000
stack
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
670000
unkown
page read and write
7C5B000
heap
page read and write
96D000
heap
page read and write
2FA5000
trusted library allocation
page read and write
8C4000
heap
page read and write
13D0000
unkown
page readonly
C81000
heap
page read and write
543E000
stack
page read and write
2CF7000
trusted library allocation
page execute and read and write
C81000
heap
page read and write
3190000
unkown
page readonly
C81000
heap
page read and write
16E0000
heap
page read and write
7C05000
heap
page read and write
C81000
heap
page read and write
1560000
unkown
page read and write
2AEF309F000
system
page execute and read and write
2FB0000
heap
page execute and read and write
5AB000
stack
page read and write
7C6B000
heap
page read and write
47C5000
trusted library allocation
page read and write
13E0000
heap
page read and write
2AEF325C000
heap
page read and write
3085000
heap
page read and write
332DC000
system
page read and write
2F50000
trusted library allocation
page execute and read and write
C81000
heap
page read and write
550000
heap
page read and write
1500000
unkown
page read and write
7EB0000
trusted library allocation
page execute and read and write
2AEF4DB2000
trusted library allocation
page read and write
4E05000
unclassified section
page execute and read and write
2F00000
trusted library section
page read and write
120E000
direct allocation
page execute and read and write
95E000
heap
page read and write
C81000
heap
page read and write
6D0000
heap
page read and write
7A70000
trusted library allocation
page execute and read and write
FBF000
stack
page read and write
C81000
heap
page read and write
13B0000
unkown
page readonly
C81000
heap
page read and write
357C000
unclassified section
page read and write
2DF0000
heap
page read and write
3B24000
unclassified section
page read and write
5DCF000
stack
page read and write
10CE000
stack
page read and write
7EA0000
trusted library allocation
page read and write
7C33000
heap
page read and write
2DE0000
unkown
page execute and read and write
C81000
heap
page read and write
127A000
stack
page read and write
2AEF3240000
heap
page read and write
2AEF309D000
system
page execute and read and write
9F1000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
7C61000
heap
page read and write
3282000
unkown
page read and write
113E000
heap
page read and write
C80000
heap
page read and write
6A0000
unkown
page read and write
15A0000
trusted library allocation
page read and write
373C000
unclassified section
page read and write
7D60000
trusted library allocation
page execute and read and write
781000
unkown
page execute read
2CDD000
trusted library allocation
page execute and read and write
C81000
heap
page read and write
2CF0000
trusted library allocation
page read and write
1511000
unkown
page readonly
C81000
heap
page read and write
670000
unkown
page read and write
2AEF3272000
heap
page read and write
7990000
heap
page read and write
5CCE000
stack
page read and write
7C6B000
heap
page read and write
C81000
heap
page read and write
DC7000
heap
page read and write
BD0000
heap
page read and write
C32D000
stack
page read and write
1695000
system
page execute and read and write
C81000
heap
page read and write
33DD000
direct allocation
page execute and read and write
1632000
system
page execute and read and write
7970000
heap
page execute and read and write
133D000
direct allocation
page execute and read and write
C81000
heap
page read and write
540000
unkown
page readonly
33002000
system
page read and write
4405000
unclassified section
page execute and read and write
6D0000
heap
page read and write
555E000
trusted library allocation
page read and write
8AF000
stack
page read and write
C81000
heap
page read and write
307E000
stack
page read and write
3000000
trusted library allocation
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
3239000
direct allocation
page execute and read and write
C81000
heap
page read and write
5B45000
unkown
page execute and read and write
C81000
heap
page read and write
967000
heap
page read and write
C81000
heap
page read and write
6110000
trusted library allocation
page read and write
2AEF3130000
heap
page read and write
C81000
heap
page read and write
11F2000
heap
page read and write
781000
unkown
page execute read
C81000
heap
page read and write
C81000
heap
page read and write
163E000
system
page execute and read and write
C81000
heap
page read and write
C81000
heap
page read and write
78E000
unkown
page readonly
1590000
trusted library allocation
page read and write
6D4000
heap
page read and write
13D0000
heap
page read and write
3153000
trusted library allocation
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
3000000
trusted library allocation
page read and write
C81000
heap
page read and write
55A0000
heap
page read and write
C81000
heap
page read and write
5540000
trusted library allocation
page read and write
7C08000
heap
page read and write
795000
unkown
page read and write
2D5E000
stack
page read and write
7BFB000
heap
page read and write
14BF000
stack
page read and write
6D4000
heap
page read and write
137C000
stack
page read and write
7C14000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
CD0000
direct allocation
page read and write
7E00000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
5566000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
9BF000
heap
page read and write
3FC1000
trusted library allocation
page read and write
C81000
heap
page read and write
B3E000
stack
page read and write
15A4000
trusted library allocation
page read and write
1570000
heap
page read and write
C81000
heap
page read and write
1690000
heap
page read and write
3030000
heap
page read and write
C3EB7FE000
stack
page read and write
C81000
heap
page read and write
3071000
trusted library allocation
page read and write
554B000
trusted library allocation
page read and write
890000
heap
page read and write
C81000
heap
page read and write
14FE000
stack
page read and write
BA0000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
3190000
unkown
page readonly
4745000
unkown
page execute and read and write
7ED0000
trusted library allocation
page read and write
95C000
heap
page read and write
1020000
heap
page read and write
9BF000
heap
page read and write
DB7000
stack
page read and write
1199000
direct allocation
page execute and read and write
C81000
heap
page read and write
C81000
heap
page read and write
1100000
heap
page read and write
1640000
system
page execute and read and write
520000
unkown
page readonly
D87000
heap
page read and write
2AEF4C0C000
trusted library allocation
page read and write
C56E000
stack
page read and write
1210000
unkown
page readonly
C17000
unkown
page execute and read and write
7D50000
trusted library allocation
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
C81000
heap
page read and write
355C000
unkown
page read and write
8594000
trusted library allocation
page read and write
2AEF3247000
heap
page read and write
C81000
heap
page read and write
There are 669 hidden memdumps, click here to show them.