IOC Report
PO Copy_7854569.exe

loading gif

Files

File Path
Type
Category
Malicious
PO Copy_7854569.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO Copy_7854569.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\HH-71hzM
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4yycnsf.aqw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ckr1lotl.uif.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbsyqs0r.n3f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ka1khkkz.gxq.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO Copy_7854569.exe
"C:\Users\user\Desktop\PO Copy_7854569.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO Copy_7854569.exe"
malicious
C:\Users\user\Desktop\PO Copy_7854569.exe
"C:\Users\user\Desktop\PO Copy_7854569.exe"
malicious
C:\Users\user\Desktop\PO Copy_7854569.exe
"C:\Users\user\Desktop\PO Copy_7854569.exe"
malicious
C:\Program Files (x86)\WYnqDTcohWTLuYGfHVXqPgPPjvyizBZlKphwPdgHrUSvPXmyFbVimH\sXAKgqpSAiGEzhyDsUSKBxPWz.exe
"C:\Program Files (x86)\WYnqDTcohWTLuYGfHVXqPgPPjvyizBZlKphwPdgHrUSvPXmyFbVimH\sXAKgqpSAiGEzhyDsUSKBxPWz.exe"
malicious
C:\Windows\SysWOW64\openfiles.exe
"C:\Windows\SysWOW64\openfiles.exe"
malicious
C:\Program Files (x86)\WYnqDTcohWTLuYGfHVXqPgPPjvyizBZlKphwPdgHrUSvPXmyFbVimH\sXAKgqpSAiGEzhyDsUSKBxPWz.exe
"C:\Program Files (x86)\WYnqDTcohWTLuYGfHVXqPgPPjvyizBZlKphwPdgHrUSvPXmyFbVimH\sXAKgqpSAiGEzhyDsUSKBxPWz.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.xn--bb55rtp-9va2p.store/a42m/?R0nl4=f64p&vH5=SpRmwiWWWie0LiCX9EyQXvy6lxMcCKfTuTRukl4i+K/mOSJ9++mgtoeJyEwnF13dco3p6AsQh3ikhhdZe62TUGOhYKvcqIkBTBlrJzQRtlxjx1oX6jajL6xfb2K92Bka0g==
84.32.84.32
malicious
http://www.crimsoncascade.xyz/a42m/
162.0.237.22
malicious
http://www.xn--bb55rtp-9va2p.store/a42m/
84.32.84.32
malicious
http://www.gregoriusalvin.com/a42m/?R0nl4=f64p&vH5=6CH/YRMAK7aydmoZX4rE3aHTO96gtIC3593I/qH1Euv5gdtO1aVIaIsEnNz/XwGPewRjk6ONG4Ys+seqd2cELhY1N+SfeluTEbHos+Hkwv+a06EBMG8yJcZA+l8yWcOKFg==
103.247.10.164
malicious
http://www.tintasmaiscor.com/a42m/?R0nl4=f64p&vH5=BaBbynwG2FaMiw+m+oe/pVgQl9HtQpBnPsDfKOVNrs70A5vduIAG3AN1jPdCIStIA9EjWNWwwUOGmupZW6v0AZj8SPVeonrFiOinbxCwnOWiWMOKy28ccO1L5nk/mSSCeg==
162.240.81.18
malicious
http://www.crimsoncascade.xyz/a42m/?vH5=OaCxij+az8CWZkVSgZ9BvYP+nrAHPzHJsZdPmSHU0RFVoK/pLfrBJ2MjeSz+pAxrgiF9enqzkwmMWhrDz0ZQ4sIJ7tOHf1xt78d5/aV4E0eta/TI3w61kMO4VihKAD9uew==&R0nl4=f64p
162.0.237.22
malicious
http://www.tintasmaiscor.com/a42m/
162.240.81.18
malicious
http://www.fidyart.com/a42m/
63.250.43.147
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.6whebx.cyou/a42m/?R0nl4=f64p&vH5=nLiHY6ZlzAe25GxlmAxaMXLPD/QIkKTmL2k396ng4hoKCGGx5/R6Lgv+VE3CAus50oYKw0M+CtaS1Cqyitq9Qy6dvHCDxXkEGnRvDu59ECZqrIMOmhT00aeob0V7fCoJ5Q==
192.74.233.3
http://www.litespeedtech.com/error-page
unknown
https://browsehappy.com/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.digitoxmarketing.com/a42m/
104.194.9.31
http://www.ratulunabet78.xyz/a42m/
66.29.137.43
http://www.p65cq675did.shop/a42m/
154.55.135.138
https://www.ecosia.org/newtab/
unknown
http://digitoxmarketing.com/a42m/?R0nl4=f64p&vH5=R4g0iLEn
unknown
http://www.p65cq675did.shop/a42m/?vH5=vQQIiwhFgpVoGnhhtc2P1VILfyaWtEv7qbiLczs1d6+poiTW6QrgALxDe+CMs+NuEeSHyk/V30WhMaxjncGhKZCgCMKVtFum7SXMM5CUlA+qFcg/x36UpY0MC+LaLW6wHA==&R0nl4=f64p
154.55.135.138
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.ratulunabet78.xyz
unknown
http://nginx.net/
unknown
http://www.leaflearn.store/a42m/
89.31.143.90
http://fedoraproject.org/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.ratulunabet78.xyz/a42m/?vH5=98dQgeI97PpkPBwDNVDdt2fIP/8t+dN1kUHbH7cCS7ph4DK0k1WK4KE3/58PmNJa+S2FnMy9XFHjKVdPS0wRAwevARZLL3+cVCGRrbGhBpDtYSzj3TCwpxccczld+77x/A==&R0nl4=f64p
66.29.137.43
http://www.6whebx.cyou/a42m/
192.74.233.3
http://www.fidyart.com/a42m/?vH5=TRa47sC0zg9DwlJApIa9TKXT0LmdSyPROaHr8XI2UWJs85O5KJ5vgIdD5G7YtksjxwnhYTkQf9KJFjTFonbd3AHZxsuWNHNjjLjlx6sM8JLXfuIwaQjmht/eByOeQ7cAZg==&R0nl4=f64p
63.250.43.147
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.leaflearn.store/a42m/?R0nl4=f64p&vH5=q82ug4hJ4iMW1QeZ+GCgoJbZS3jVtW+Vvu2ntYvjkNah5D8fKd1XYREKBHF28ngiXJtWR4/9FoDVe0EJ2zKZXh/HzsdFhnk2W05Rc4EGYuWHBokuuF9nEMUprlqBVZ4vog==
89.31.143.90
https://support.hostinger.com/en/articles/1696789-how-to-change-nameservers-at-hostinger
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gregoriusalvin.com
103.247.10.164
malicious
ratulunabet78.xyz
66.29.137.43
malicious
www.crimsoncascade.xyz
162.0.237.22
malicious
tintasmaiscor.com
162.240.81.18
malicious
xn--bb55rtp-9va2p.store
84.32.84.32
malicious
www.designsbysruly.com
unknown
malicious
www.p65cq675did.shop
unknown
malicious
www.gcashservice247.com
unknown
malicious
www.gregoriusalvin.com
unknown
malicious
www.transformthedorm.com
unknown
malicious
www.infomail.website
unknown
malicious
www.digitoxmarketing.com
unknown
malicious
www.tintasmaiscor.com
unknown
malicious
www.xn--bb55rtp-9va2p.store
unknown
malicious
www.fidyart.com
unknown
malicious
www.weeveno.com
unknown
malicious
www.italiangreyhounds.online
unknown
malicious
www.ratulunabet78.xyz
unknown
malicious
www.6whebx.cyou
192.74.233.3
k2-ld.wakak1.shop
154.55.135.138
fidyart.com
63.250.43.147
digitoxmarketing.com
104.194.9.31
www.leaflearn.store
89.31.143.90
There are 13 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.240.81.18
tintasmaiscor.com
United States
malicious
162.0.237.22
www.crimsoncascade.xyz
Canada
malicious
103.247.10.164
gregoriusalvin.com
Indonesia
malicious
84.32.84.32
xn--bb55rtp-9va2p.store
Lithuania
malicious
66.29.137.43
ratulunabet78.xyz
United States
malicious
192.74.233.3
www.6whebx.cyou
United States
104.194.9.31
digitoxmarketing.com
United States
154.55.135.138
k2-ld.wakak1.shop
United States
63.250.43.147
fidyart.com
United States
89.31.143.90
www.leaflearn.store
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
3810000
unkown
page execute and read and write
malicious
2AC0000
trusted library allocation
page read and write
malicious
45A0000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
14E0000
unclassified section
page execute and read and write
malicious
2810000
system
page execute and read and write
malicious
2E50000
unclassified section
page execute and read and write
malicious
55C0000
system
page execute and read and write
malicious
12EF000
heap
page read and write
4680000
trusted library allocation
page execute and read and write
2880000
heap
page read and write
259B000
stack
page read and write
75B9000
heap
page read and write
2C21000
heap
page read and write
A6C0000
heap
page read and write
3223000
trusted library allocation
page read and write
29B4000
heap
page read and write
2C21000
heap
page read and write
469F000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
76F8000
trusted library allocation
page read and write
2CA0000
heap
page read and write
45E0000
trusted library allocation
page read and write
44ED000
heap
page read and write
7B41000
heap
page read and write
170000
unkown
page readonly
7A14000
heap
page read and write
3949000
unkown
page execute and read and write
30FE000
stack
page read and write
2C21000
heap
page read and write
10E0000
heap
page read and write
2C21000
heap
page read and write
7B38000
heap
page read and write
AFBF000
stack
page read and write
7B3E000
heap
page read and write
5720000
heap
page read and write
2BAE000
heap
page read and write
137E000
heap
page read and write
F60000
unkown
page readonly
2B28000
heap
page read and write
2C21000
heap
page read and write
2B98000
heap
page read and write
5749000
unkown
page execute and read and write
7B22000
heap
page read and write
10B0000
unkown
page read and write
2C21000
heap
page read and write
F9371FC000
stack
page read and write
10E0000
heap
page read and write
14A0000
heap
page read and write
2C21000
heap
page read and write
2F72000
unkown
page read and write
2B20000
heap
page read and write
231F000
stack
page read and write
2C21000
heap
page read and write
F9391FE000
stack
page read and write
2B94000
heap
page read and write
B10000
unkown
page readonly
2C21000
heap
page read and write
2B9D000
heap
page read and write
2C21000
heap
page read and write
F3C000
stack
page read and write
4BA2000
unclassified section
page read and write
2C21000
heap
page read and write
4850000
direct allocation
page execute and read and write
2C21000
heap
page read and write
2EB2000
unkown
page read and write
6B8000
unkown
page read and write
2BC5000
heap
page read and write
25D8000
stack
page read and write
16B0000
trusted library allocation
page execute and read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
14A5000
heap
page read and write
2C6F000
stack
page read and write
4720000
trusted library allocation
page read and write
31C0000
heap
page execute and read and write
16E0000
heap
page read and write
1857000
heap
page read and write
2C21000
heap
page read and write
265B9DE0000
heap
page read and write
2C21000
heap
page read and write
38DB000
unkown
page execute and read and write
2B3E000
heap
page read and write
540000
unkown
page readonly
AFFC000
stack
page read and write
2C21000
heap
page read and write
1490000
trusted library allocation
page read and write
F90000
heap
page read and write
2C21000
heap
page read and write
7A11000
heap
page read and write
BA0000
unkown
page readonly
F80000
unkown
page readonly
265BB690000
heap
page read and write
10FE000
heap
page read and write
E3A000
stack
page read and write
265BB7C0000
heap
page read and write
2C21000
heap
page read and write
AE1000
unkown
page execute read
265BB6B0000
trusted library allocation
page read and write
922E000
stack
page read and write
2B98000
heap
page read and write
5C1000
unkown
page readonly
18B1000
direct allocation
page execute and read and write
11EF000
stack
page read and write
7AB0000
trusted library allocation
page read and write
2C21000
heap
page read and write
1600000
direct allocation
page execute and read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
6BC000
unkown
page read and write
5A0000
unkown
page read and write
FF0000
heap
page read and write
17EF000
stack
page read and write
2C21000
heap
page read and write
3160000
trusted library allocation
page read and write
149F000
stack
page read and write
147D000
trusted library allocation
page execute and read and write
2EA0000
heap
page read and write
2C21000
heap
page read and write
12F7000
stack
page read and write
1761000
unkown
page readonly
10AE000
stack
page read and write
1270000
unkown
page read and write
2C21000
heap
page read and write
265BB6B0000
trusted library allocation
page read and write
DC2000
unkown
page readonly
10D0000
unkown
page read and write
5A90000
heap
page read and write
D11000
unkown
page readonly
57DC000
unkown
page read and write
39BF2000
system
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
1496000
trusted library allocation
page execute and read and write
F70000
unkown
page readonly
1260000
unkown
page read and write
AEE000
unkown
page readonly
7FD20000
trusted library allocation
page execute and read and write
2C21000
heap
page read and write
2410000
unkown
page execute and read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
F90000
heap
page read and write
18C6000
direct allocation
page execute and read and write
1360000
trusted library allocation
page read and write
2D30000
heap
page read and write
62E000
stack
page read and write
2C21000
heap
page read and write
F9381FE000
stack
page read and write
5631000
system
page execute and read and write
F8B000
stack
page read and write
31B0000
trusted library allocation
page read and write
149A000
trusted library allocation
page execute and read and write
BB0000
unkown
page readonly
2C21000
heap
page read and write
13AF000
heap
page read and write
650000
unkown
page read and write
F9389FE000
stack
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
13A4000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7B04000
heap
page read and write
2C21000
heap
page read and write
16A0000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
2C21000
heap
page read and write
323D000
trusted library allocation
page read and write
2C21000
heap
page read and write
7B3B000
heap
page read and write
7AD0000
heap
page read and write
2C21000
heap
page read and write
7ACB000
heap
page read and write
BA0000
unkown
page readonly
318C000
unkown
page read and write
5DB4000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
A9BF000
stack
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
13D0000
unkown
page readonly
21E4000
heap
page read and write
AF7000
unkown
page readonly
2C21000
heap
page read and write
812F000
stack
page read and write
7B1C000
heap
page read and write
4E7C000
unclassified section
page read and write
47DE000
stack
page read and write
3A8FC000
system
page read and write
593B000
stack
page read and write
AF5000
unkown
page read and write
2AA0000
trusted library allocation
page read and write
550000
heap
page read and write
265BB916000
trusted library allocation
page read and write
5700000
trusted library allocation
page execute and read and write
31D1000
trusted library allocation
page read and write
7B38000
heap
page read and write
2C21000
heap
page read and write
5800000
heap
page read and write
265BB913000
trusted library allocation
page read and write
2B9D000
heap
page read and write
3BBC000
unkown
page read and write
680000
heap
page read and write
265B9E0F000
heap
page read and write
4720000
trusted library allocation
page read and write
F3C000
stack
page read and write
3454000
trusted library allocation
page read and write
7B2F000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7690000
trusted library allocation
page read and write
AE0000
unkown
page readonly
56A4000
system
page execute and read and write
75A1000
heap
page read and write
4979000
direct allocation
page execute and read and write
3989000
unclassified section
page execute and read and write
E3A000
stack
page read and write
12D8000
heap
page read and write
160000
unkown
page readonly
DC0000
unkown
page readonly
2C21000
heap
page read and write
5A40000
trusted library section
page readonly
AF7000
unkown
page readonly
2C21000
heap
page read and write
265BBABE000
trusted library allocation
page read and write
5730000
heap
page execute and read and write
7B32000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
180000
unkown
page readonly
7972000
trusted library allocation
page read and write
2C21000
heap
page read and write
2CB0000
unkown
page readonly
265B9CE3000
system
page execute and read and write
2BFD000
heap
page read and write
1948000
direct allocation
page execute and read and write
2C21000
heap
page read and write
5B0000
heap
page read and write
4389000
unclassified section
page execute and read and write
2B49000
heap
page read and write
1470000
trusted library allocation
page read and write
2C21000
heap
page read and write
4D89000
unclassified section
page execute and read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
AF7000
unkown
page readonly
2B89000
heap
page read and write
688000
heap
page read and write
2C21000
heap
page read and write
5641000
system
page execute and read and write
10C1000
unkown
page readonly
520C000
stack
page read and write
AD3F000
stack
page read and write
2C21000
heap
page read and write
74B0000
trusted library section
page read and write
2B43000
heap
page read and write
41D1000
trusted library allocation
page read and write
1550000
heap
page read and write
2C21000
heap
page read and write
B10000
unkown
page readonly
AF5000
unkown
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
5EF4000
unclassified section
page read and write
1840000
trusted library allocation
page read and write
F70000
heap
page read and write
12A0000
heap
page read and write
7560000
trusted library section
page read and write
1EA000
stack
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
47CC000
heap
page read and write
2AA0000
heap
page read and write
5D0000
unkown
page read and write
7B19000
heap
page read and write
2C21000
heap
page read and write
B13E000
stack
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
1301000
heap
page read and write
2B43000
heap
page read and write
69B000
unkown
page read and write
2BF2000
heap
page read and write
2C21000
heap
page read and write
29B4000
heap
page read and write
4396000
unkown
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7AC6000
heap
page read and write
31A5000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
1480000
trusted library allocation
page read and write
5650000
system
page execute and read and write
AE1000
unkown
page execute read
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
FCE000
stack
page read and write
5BD0000
unclassified section
page read and write
680000
heap
page read and write
56A0000
trusted library allocation
page read and write
265BB6B0000
trusted library allocation
page read and write
2BB3000
heap
page read and write
4204000
unkown
page read and write
2C21000
heap
page read and write
540000
unkown
page readonly
5676000
trusted library allocation
page read and write
AF7000
unkown
page readonly
5D0000
unkown
page read and write
AEE000
unkown
page readonly
483D000
heap
page read and write
8F97000
trusted library allocation
page read and write
2C21000
heap
page read and write
B0FC000
stack
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
566E000
trusted library allocation
page read and write
2C21000
heap
page read and write
76E0000
trusted library allocation
page execute and read and write
133E000
stack
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7B31000
heap
page read and write
F80000
unkown
page readonly
630000
unkown
page readonly
4072000
unkown
page read and write
2BAA000
heap
page read and write
160000
unkown
page readonly
167E000
stack
page read and write
2C21000
heap
page read and write
10C1000
unkown
page readonly
1682000
trusted library allocation
page read and write
4B21000
direct allocation
page execute and read and write
688000
heap
page read and write
2BF7000
heap
page read and write
2C21000
heap
page read and write
564D000
system
page execute and read and write
265BB90F000
trusted library allocation
page read and write
E8C000
stack
page read and write
773E000
stack
page read and write
5A3D000
stack
page read and write
5627000
system
page execute and read and write
2C21000
heap
page read and write
265B9DFC000
heap
page read and write
AE1000
unkown
page execute read
76A0000
trusted library allocation
page read and write
2C21000
heap
page read and write
5AB0000
heap
page read and write
94F000
stack
page read and write
2C21000
heap
page read and write
12D8000
heap
page read and write
4B92000
direct allocation
page execute and read and write
1761000
unkown
page readonly
1280000
unkown
page read and write
4FC000
stack
page read and write
2C21000
heap
page read and write
630000
unkown
page readonly
2C21000
heap
page read and write
2BD6000
heap
page read and write
567D000
trusted library allocation
page read and write
42C3000
trusted library allocation
page read and write
13D0000
unkown
page readonly
2B43000
heap
page read and write
2C21000
heap
page read and write
21E0000
heap
page read and write
2C21000
heap
page read and write
265BBAC4000
trusted library allocation
page read and write
7AFA000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7AD8000
heap
page read and write
265BBAB4000
trusted library allocation
page read and write
2C21000
heap
page read and write
265B9CE7000
system
page execute and read and write
7590000
heap
page read and write
2CB0000
unkown
page readonly
265BBA01000
trusted library allocation
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7B2F000
heap
page read and write
2C21000
heap
page read and write
357B000
trusted library allocation
page read and write
2450000
unclassified section
page execute and read and write
10D8000
heap
page read and write
AE7F000
stack
page read and write
2C21000
heap
page read and write
1850000
heap
page read and write
59E000
stack
page read and write
2C21000
heap
page read and write
7AE4000
heap
page read and write
AE0000
unkown
page readonly
F70000
unkown
page readonly
7D40000
heap
page read and write
18CD000
direct allocation
page execute and read and write
75E8000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
5C20000
heap
page read and write
2EA0000
heap
page read and write
2C21000
heap
page read and write
2BAA000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7B34000
heap
page read and write
2C21000
heap
page read and write
12D0000
heap
page read and write
10B0000
unkown
page read and write
73AE000
stack
page read and write
4720000
trusted library allocation
page read and write
BC0000
unkown
page readonly
41D9000
trusted library allocation
page read and write
7680000
trusted library section
page read and write
2C21000
heap
page read and write
5A50000
heap
page read and write
AEE000
unkown
page readonly
2C21000
heap
page read and write
530C000
stack
page read and write
1473000
trusted library allocation
page execute and read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2B38000
heap
page read and write
10BE000
stack
page read and write
29B0000
heap
page read and write
2B43000
heap
page read and write
2C11000
heap
page read and write
2C21000
heap
page read and write
7B40000
heap
page read and write
7AC0000
heap
page read and write
2C21000
heap
page read and write
2B3E000
heap
page read and write
1729000
direct allocation
page execute and read and write
47C8000
heap
page read and write
530000
unkown
page readonly
4275000
trusted library allocation
page read and write
168B000
trusted library allocation
page execute and read and write
2C21000
heap
page read and write
6086000
unclassified section
page read and write
4D02000
unkown
page read and write
2BCA000
heap
page read and write
16D0000
trusted library allocation
page read and write
1EA000
stack
page read and write
7A01000
heap
page read and write
265B9D80000
heap
page read and write
AE0000
unkown
page readonly
43AE000
trusted library allocation
page read and write
1040000
heap
page read and write
39CB2000
system
page read and write
29A0000
heap
page read and write
7AD5000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2B38000
heap
page read and write
4D49000
unkown
page execute and read and write
1260000
unkown
page read and write
A8BE000
stack
page read and write
103E000
stack
page read and write
4FC000
stack
page read and write
5A95000
heap
page read and write
7A00000
trusted library allocation
page read and write
75E5000
heap
page read and write
265B9C60000
system
page execute and read and write
2C21000
heap
page read and write
C28000
unkown
page read and write
2B49000
heap
page read and write
170000
unkown
page readonly
F60000
unkown
page readonly
10D0000
heap
page read and write
F09000
stack
page read and write
530000
unkown
page readonly
6BD000
unkown
page read and write
2C21000
heap
page read and write
ABFE000
stack
page read and write
1070000
heap
page read and write
265B9E12000
heap
page read and write
2B6B000
heap
page read and write
2C21000
heap
page read and write
10D0000
unkown
page read and write
2C21000
heap
page read and write
182E000
stack
page read and write
759D000
heap
page read and write
7B28000
heap
page read and write
2CA0000
heap
page read and write
5650000
trusted library allocation
page read and write
2C21000
heap
page read and write
7AF4000
heap
page read and write
1680000
trusted library allocation
page read and write
2B79000
heap
page read and write
2B43000
heap
page read and write
5710000
trusted library allocation
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
650000
unkown
page read and write
5A60000
heap
page read and write
A5BD000
stack
page read and write
5B0000
heap
page read and write
460E000
heap
page read and write
4528000
unkown
page read and write
F9379FF000
stack
page read and write
2C21000
heap
page read and write
AF5000
unkown
page read and write
44EB000
heap
page read and write
AEBE000
stack
page read and write
520000
unkown
page readonly
265B9E0B000
heap
page read and write
2C21000
heap
page read and write
AE0000
unkown
page readonly
2C20000
heap
page read and write
2C21000
heap
page read and write
D11000
unkown
page readonly
318C000
unkown
page read and write
5C2E000
heap
page read and write
B23E000
stack
page read and write
265B9DA0000
heap
page read and write
2C21000
heap
page read and write
1474000
trusted library allocation
page read and write
5AA0000
heap
page read and write
21E0000
heap
page read and write
39ECC000
system
page read and write
76F0000
trusted library allocation
page read and write
2C21000
heap
page read and write
5803000
heap
page read and write
2C21000
heap
page read and write
14A0000
direct allocation
page read and write
265BB90A000
trusted library allocation
page read and write
AAFE000
stack
page read and write
565B000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
179E000
direct allocation
page execute and read and write
265BB903000
trusted library allocation
page read and write
265BB800000
trusted library allocation
page read and write
2C21000
heap
page read and write
1830000
trusted library allocation
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
12D0000
heap
page read and write
2210000
heap
page read and write
265B9DEA000
heap
page read and write
2C21000
heap
page read and write
1240000
unkown
page readonly
80EE000
stack
page read and write
1240000
unkown
page readonly
2B3A000
heap
page read and write
13B1000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
7EF0000
trusted library section
page read and write
2BEC000
heap
page read and write
2EA4000
heap
page read and write
1370000
heap
page read and write
180000
unkown
page readonly
2C21000
heap
page read and write
56F2000
trusted library allocation
page read and write
123E000
stack
page read and write
69F2000
unclassified section
page read and write
1397000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
58AC000
unclassified section
page read and write
4C62000
unclassified section
page read and write
5A0000
unkown
page read and write
2B85000
heap
page read and write
5AD0000
heap
page read and write
2C21000
heap
page read and write
653C000
unclassified section
page read and write
4B1D000
direct allocation
page execute and read and write
10E6000
heap
page read and write
520000
unkown
page readonly
2C21000
heap
page read and write
AC3E000
stack
page read and write
2F89000
unclassified section
page execute and read and write
56F0000
trusted library allocation
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
AD7E000
stack
page read and write
AF5000
unkown
page read and write
2C21000
heap
page read and write
75B3000
heap
page read and write
2C21000
heap
page read and write
3EE0000
unkown
page read and write
2C21000
heap
page read and write
172D000
direct allocation
page execute and read and write
2210000
heap
page read and write
2B94000
heap
page read and write
5DB0000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
4227000
trusted library allocation
page read and write
5654000
trusted library allocation
page read and write
BB0000
unkown
page readonly
2C21000
heap
page read and write
2EB2000
unkown
page read and write
265BBACE000
trusted library allocation
page read and write
5D62000
unclassified section
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
2EA4000
heap
page read and write
AEE000
unkown
page readonly
1A4F000
stack
page read and write
7B46000
heap
page read and write
21E4000
heap
page read and write
74AE000
stack
page read and write
BC0000
unkown
page readonly
2320000
unkown
page readonly
2C21000
heap
page read and write
AE1000
unkown
page execute read
2BC3000
heap
page read and write
16C0000
heap
page read and write
2B43000
heap
page read and write
1A50000
unclassified section
page execute and read and write
2BC0000
heap
page read and write
2B4A000
heap
page read and write
3542000
trusted library allocation
page read and write
29B4000
heap
page read and write
2C21000
heap
page read and write
1426000
heap
page read and write
479E000
stack
page read and write
2C21000
heap
page read and write
2F1B000
unclassified section
page execute and read and write
497D000
direct allocation
page execute and read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
484C000
unkown
page read and write
2C21000
heap
page read and write
265BB921000
trusted library allocation
page read and write
F80000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
56E0000
heap
page read and write
2DDC000
unkown
page read and write
2320000
unkown
page readonly
5A70000
trusted library allocation
page execute and read and write
1492000
trusted library allocation
page read and write
FE0000
heap
page read and write
1687000
trusted library allocation
page execute and read and write
6218000
unclassified section
page read and write
550000
heap
page read and write
7AFE000
heap
page read and write
2E10000
unkown
page execute and read and write
2C21000
heap
page read and write
5C1000
unkown
page readonly
49EE000
direct allocation
page execute and read and write
313E000
stack
page read and write
2C21000
heap
page read and write
265BB900000
trusted library allocation
page read and write
4349000
unkown
page execute and read and write
2BB9000
heap
page read and write
2C21000
heap
page read and write
2C21000
heap
page read and write
There are 649 hidden memdumps, click here to show them.