IOC Report
Purchase Order_20240528.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order_20240528.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order_20240528.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7--93mK-
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order_20240528.exe
"C:\Users\user\Desktop\Purchase Order_20240528.exe"
malicious
C:\Users\user\Desktop\Purchase Order_20240528.exe
"C:\Users\user\Desktop\Purchase Order_20240528.exe"
malicious
C:\Program Files (x86)\SLBLxrBaueDpSQjBcAhvhoNXasTGWYvVGGNtaxzwFQAKDovaY\qFrNDyfVqdmmFLBeyXwBmuB.exe
"C:\Program Files (x86)\SLBLxrBaueDpSQjBcAhvhoNXasTGWYvVGGNtaxzwFQAKDovaY\qFrNDyfVqdmmFLBeyXwBmuB.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
"C:\Windows\SysWOW64\nslookup.exe"
malicious
C:\Program Files (x86)\SLBLxrBaueDpSQjBcAhvhoNXasTGWYvVGGNtaxzwFQAKDovaY\qFrNDyfVqdmmFLBeyXwBmuB.exe
"C:\Program Files (x86)\SLBLxrBaueDpSQjBcAhvhoNXasTGWYvVGGNtaxzwFQAKDovaY\qFrNDyfVqdmmFLBeyXwBmuB.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.allgiftedmalaysia.com/dkdj/?5L0=2bCPy0&jTZPp=U2MbIDwYObql7+StDszk2IWvOqKP49Y4LLLXxrmKfStKROUY/qK9Zw3EJYAbIJoej5+11dDiuiwrzCxekQQ2SsNjLcEghxbMGsQSE4hdcQPQTWeOxMh44mhCIwJzKEDB4Xq2erE=
216.40.34.41
malicious
http://www.cuddle-paws.co.uk/zzbw/?5L0=2bCPy0&jTZPp=SYw/9+A27wDBBFVE9oOer+iKSaxo18ff/QICalIUdVK4tpmTGYvTJqWTGl/IZc6vUKz9bMfWLss6gerKkQ1b4agtfT85HThTdgJ4Gv37GO/tiVjy/t6jt5abgYoy/lcD8efQawI=
185.229.21.229
malicious
http://www.adhdphotography.com/3gap/?jTZPp=25XBmjk0rqRaZkTkTD33T4OKGuWwQ/SEWL7mpnFDJER+MbRh/i2897KjaMR3WmWzMQOMItzOUFcJjK77+ET6PAxFDluhudTDf5JDha8/kN27L+7nUHVdmuvgnjQrBoWJDdvnsqo=&5L0=2bCPy0
76.223.67.189
malicious
http://www.etrading.cloud/gy0x/
199.59.243.225
malicious
http://www.vpachurch.org.uk/hx08/
3.33.130.190
malicious
http://www.etrading.cloud/gy0x/?5L0=2bCPy0&jTZPp=q3tVqQVST/58pKcjgu6vzl4r/mjx+/3v5p1oiGGfWC80c0QmTZc7sue0joIh5TaOhvctfB+I4hP6RP0S+zGuZLn5ZOGHWIzMGtqXZLXUxKwwwvK+KKFBFwNnv8XJAo+gt0xcEPY=
199.59.243.225
malicious
http://www.home-stroi0m.ru/l7wc/?jTZPp=rG0gXsVcMKnwL95DCAGLkXtixogTaqlVvgNhyV5MOQBbV9UvRUrQqDi5YjTtkNY5nkWwRtE2kxMBrn6VhlI+Nig16EK01wjkMFHIaUG8fjlX1oi4FBapVJcXf+AOShDHzPE0tCU=&5L0=2bCPy0
178.63.50.103
malicious
http://www.mavonorm-global.uk/ia1k/
92.205.15.157
malicious
http://www.mavonorm-global.uk/ia1k/?5L0=2bCPy0&jTZPp=N7K37PwQwyq8WtMjD63BMb0ZEyGwsNHc8DxE6cCELPJHzMSs3RHBfzipjgIXVLm7nNAJX0ce6IW46RQAVIH59zJ0Pe4NazJJs+xz0T8fA0+K0n7VQeZLcDOWBXiB3y7ehLtrmgc=
92.205.15.157
malicious
http://www.shopnaya.fr/9rbi/
212.227.172.254
malicious
http://www.home-stroi0m.ru/l7wc/
178.63.50.103
malicious
http://www.ceo-retreats.co.uk/5s1a/
46.30.215.104
malicious
http://www.cuddle-paws.co.uk/zzbw/
185.229.21.229
malicious
http://www.vpachurch.org.uk/hx08/?jTZPp=+oCaj1A6qEgI197rJOt7Ie8wsT2QuaXvROrTbUaj/j401+U4/uihyXQLAHBQaX+oDSz5ZwQ8h3X94ZPhTrAPuKUxKp/Iu26MuBlEIc7q5Ez/5s4fDAcFIXmEd7qvwqTcBaCACgU=&5L0=2bCPy0
3.33.130.190
malicious
http://www.shortput.top/05xu/?jTZPp=ReZNC8TX9gJaOIK/BvITh+0FGwzFHm92bQvbNg62F2J0R8z5SuhCGDe2HN2Byu0BC7BKvHjRxIjSR8MFICml92wEl2DsCCajGT/6l7iIm8MBifF7wDoE5bE7ZGx4kkh6K6rbsW4=&5L0=2bCPy0
203.161.43.227
malicious
http://www.futurereadyteaming.com/d42u/
3.33.130.190
malicious
http://www.shortput.top/05xu/
203.161.43.227
malicious
http://www.allgiftedmalaysia.com/dkdj/
216.40.34.41
malicious
http://www.shopnaya.fr/9rbi/?5L0=2bCPy0&jTZPp=UlNdZMK3GDRCBA0gS3f3uv0iXo+GpLYhxRIJfHdOWu/UoVzLYqkjSevahCA40rp7GDeAe0gS/eGNqMgOt0FXhd7M6VrSAWuVtivoglmtHt75iy7sMY8OQO52M7HjA3SJMCHiGMs=
212.227.172.254
malicious
http://www.futurereadyteaming.com/d42u/?5L0=2bCPy0&jTZPp=Ze7qbULGym30DRtQWsDfUIjVKpc2N+ML3rKw6d8OwfGV5TB4Wy1SHsGQ3DzxzCIAckJPchaY62h3E/MXdBzELEbBfEli2wFapMH+8i0kZSl6sSBwn68EdR90A4BAIxslEVvZhZo=
3.33.130.190
malicious
http://www.bade.ink/hsw0/
149.88.84.60
malicious
http://www.adhdphotography.com/3gap/
76.223.67.189
malicious
http://www.betopfloor.com/qy3g/
108.179.192.228
malicious
http://www.ceo-retreats.co.uk/5s1a/?jTZPp=0jq67MNPRq4g2+jjEmEFgdmxU9xn3lZuU82S2yL3jkWaNmBkMCuTzs1oACp+jQZQfFcSAdfVUnty14PGpb+cvJdHxRsAacQFCcCRXvTpLBxg40F9NDu9hRQlsdpJQY/jGZexiU8=&5L0=2bCPy0
46.30.215.104
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://twitter.com/hover
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.instagram.com/hover_domains
unknown
https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.js
unknown
https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.js
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cdnjs.cloudflare.com/ajax/libs/gsap/1.20.2/TweenMax.min.js
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://gmpg.org/xfn/11
unknown
https://www.shopnaya.fr/9rbi/?5L0=2bCPy0&jTZPp=UlNdZMK3GDRCBA0gS3f3uv0iXo
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://www.futurereadyteaming.com
unknown
http://home-stroi0m.ru/l7wc/?jTZPp=rG0gXsVcMKnwL95DCAGLkXtixogTaqlVvgNhyV5MOQBbV9UvRUrQqDi5YjTtkNY5n
unknown
https://www.hover.com/domains/results
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://mavonorm-global.uk/ia1k/?5L0=2bCPy0&jTZPp=N7K37PwQwyq8WtMjD63BMb0ZEyGwsNHc8DxE6cCELPJHzMSs3RH
unknown
https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css
unknown
http://www.ilodezu.com/07pn/?5L0=2bCPy0&jTZPp=CkfhBQ0terXRm+kmFpR39GSw1qHfnjo/tEzZ3zV38o+ejGSQGyq9lQZrlkGU0XQ7mu5ow3wpwcVqSHGJiQ9hplKQ2SOdF7l7JcVc6ChkY2r17h/XM0ANapemWrr0lME50EL+8pQ=
188.114.97.3
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://code.jquery.com/jquery-3.3.1.min.js
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.bade.ink
149.88.84.60
malicious
vpachurch.org.uk
3.33.130.190
malicious
www.shopnaya.fr
212.227.172.254
malicious
www.ceo-retreats.co.uk
46.30.215.104
malicious
mavonorm-global.uk
92.205.15.157
malicious
www.allgiftedmalaysia.com
216.40.34.41
malicious
cuddle-paws.co.uk
185.229.21.229
malicious
www.shortput.top
203.161.43.227
malicious
www.home-stroi0m.ru
178.63.50.103
malicious
betopfloor.com
108.179.192.228
malicious
adhdphotography.com
76.223.67.189
malicious
94950.bodis.com
199.59.243.225
malicious
futurereadyteaming.com
3.33.130.190
malicious
www.mavonorm-global.uk
unknown
malicious
www.dolcegusto-quiz.fun
unknown
malicious
www.betopfloor.com
unknown
malicious
www.cuddle-paws.co.uk
unknown
malicious
www.futurereadyteaming.com
unknown
malicious
www.adhdphotography.com
unknown
malicious
www.etrading.cloud
unknown
malicious
www.vpachurch.org.uk
unknown
malicious
www.ilodezu.com
188.114.97.3
There are 12 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
76.223.67.189
adhdphotography.com
United States
malicious
46.30.215.104
www.ceo-retreats.co.uk
Denmark
malicious
92.205.15.157
mavonorm-global.uk
Germany
malicious
199.59.243.225
94950.bodis.com
United States
malicious
149.88.84.60
www.bade.ink
United States
malicious
185.229.21.229
cuddle-paws.co.uk
United Kingdom
malicious
108.179.192.228
betopfloor.com
United States
malicious
203.161.43.227
www.shortput.top
Malaysia
malicious
178.63.50.103
www.home-stroi0m.ru
Germany
malicious
3.33.130.190
vpachurch.org.uk
United States
malicious
212.227.172.254
www.shopnaya.fr
Germany
malicious
216.40.34.41
www.allgiftedmalaysia.com
Canada
malicious
188.114.97.3
www.ilodezu.com
European Union
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1510000
unclassified section
page execute and read and write
malicious
401000
remote allocation
page execute and read and write
malicious
3020000
trusted library allocation
page read and write
malicious
2FE0000
trusted library allocation
page read and write
malicious
2A50000
system
page execute and read and write
malicious
4F30000
system
page execute and read and write
malicious
2DB0000
unkown
page execute and read and write
malicious
1900000
unclassified section
page execute and read and write
malicious
2E21000
heap
page read and write
1F110D03000
trusted library allocation
page read and write
3F58000
unclassified section
page read and write
2BCC000
heap
page read and write
10E0000
unkown
page read and write
2E21000
heap
page read and write
3E98000
unkown
page read and write
4CD0000
heap
page read and write
BDF2FFB000
stack
page read and write
2E21000
heap
page read and write
810000
unkown
page readonly
2E21000
heap
page read and write
2B84000
heap
page read and write
D10000
unkown
page read and write
2F4E000
heap
page read and write
B92000
trusted library allocation
page read and write
1F10F06D000
system
page execute and read and write
4D00000
heap
page read and write
EB0000
heap
page read and write
2650000
unkown
page read and write
2680000
unkown
page readonly
483D000
stack
page read and write
2E21000
heap
page read and write
825E000
stack
page read and write
E0E000
stack
page read and write
4F10000
trusted library section
page readonly
4CD3000
heap
page read and write
2E21000
heap
page read and write
D0F000
stack
page read and write
BF0000
unkown
page readonly
1060000
unkown
page read and write
2BF4000
heap
page read and write
2E21000
heap
page read and write
7B52000
heap
page read and write
BDF37FD000
stack
page read and write
440E000
unclassified section
page read and write
A34000
heap
page read and write
2E21000
heap
page read and write
2B27000
heap
page read and write
2E21000
heap
page read and write
27B1000
trusted library allocation
page read and write
1F110A00000
heap
page read and write
2AD0000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
38A3000
trusted library allocation
page read and write
2E21000
heap
page read and write
1330000
unkown
page readonly
2BC8000
heap
page read and write
3A1000
unkown
page execute read
749E000
stack
page read and write
2E21000
heap
page read and write
16D9000
direct allocation
page execute and read and write
D20000
unkown
page readonly
A95000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
1876000
direct allocation
page execute and read and write
F00000
unkown
page readonly
2E21000
heap
page read and write
2B9B000
heap
page read and write
507E000
stack
page read and write
2E21000
heap
page read and write
27AF000
stack
page read and write
2E21000
heap
page read and write
7B89000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2B1E000
stack
page read and write
2E21000
heap
page read and write
3100000
trusted library allocation
page read and write
7B1B000
heap
page read and write
9B0000
heap
page read and write
5280000
trusted library section
page read and write
5270000
trusted library allocation
page execute and read and write
1F110B40000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
293C000
unkown
page read and write
87A000
stack
page read and write
2E21000
heap
page read and write
1F110A20000
trusted library allocation
page read and write
9C0000
unkown
page readonly
10C0000
unkown
page readonly
2E21000
heap
page read and write
7BA6000
heap
page read and write
2E21000
heap
page read and write
32AD000
direct allocation
page execute and read and write
6080000
trusted library allocation
page read and write
3850000
unkown
page read and write
739E000
stack
page read and write
2E21000
heap
page read and write
10C0000
unkown
page readonly
EF2000
trusted library allocation
page read and write
34C2000
direct allocation
page execute and read and write
2E21000
heap
page read and write
4F20000
heap
page read and write
2CBF000
stack
page read and write
2DB0000
heap
page read and write
EFD000
stack
page read and write
2AD4000
heap
page read and write
494B000
stack
page read and write
7B11000
heap
page read and write
2C05000
heap
page read and write
4FC3000
system
page execute and read and write
2C03000
heap
page read and write
3F2000
unkown
page readonly
2BBD000
heap
page read and write
2E21000
heap
page read and write
10F0000
heap
page read and write
2670000
heap
page read and write
2BFF000
heap
page read and write
2A38000
stack
page read and write
97C000
stack
page read and write
187D000
direct allocation
page execute and read and write
2680000
unkown
page readonly
2B98000
heap
page read and write
2E21000
heap
page read and write
9C0000
unkown
page readonly
13CE000
stack
page read and write
2E21000
heap
page read and write
B8A000
trusted library allocation
page execute and read and write
103E000
stack
page read and write
2E21000
heap
page read and write
7B80000
heap
page read and write
97C000
stack
page read and write
2E21000
heap
page read and write
7B4E000
heap
page read and write
124B000
heap
page read and write
24D0000
unkown
page read and write
E40000
heap
page execute and read and write
2E21000
heap
page read and write
625000
unkown
page read and write
1158000
heap
page read and write
2814000
heap
page read and write
3B5000
unkown
page read and write
2E21000
heap
page read and write
B70000
trusted library allocation
page read and write
2B27000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
7DA0000
heap
page read and write
F70000
heap
page read and write
2E21000
heap
page read and write
252E000
stack
page read and write
126F000
heap
page read and write
2E21000
heap
page read and write
A31000
heap
page read and write
2E21000
heap
page read and write
3B7000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
2BCF000
heap
page read and write
2E21000
heap
page read and write
B86000
trusted library allocation
page execute and read and write
2E21000
heap
page read and write
2630000
unkown
page readonly
9FE000
heap
page read and write
7B8E000
heap
page read and write
5F0000
heap
page read and write
1060000
unkown
page read and write
E8B000
stack
page read and write
2B40000
heap
page read and write
2E21000
heap
page read and write
1F10F220000
heap
page read and write
10C1000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
EFD000
stack
page read and write
1F10F020000
system
page execute and read and write
AE1000
heap
page read and write
2E21000
heap
page read and write
4D50000
heap
page execute and read and write
4F30000
heap
page read and write
2E21000
heap
page read and write
2947000
unclassified section
page execute and read and write
2FD4000
heap
page read and write
2E21000
heap
page read and write
1861000
direct allocation
page execute and read and write
2D2F000
stack
page read and write
2B32000
heap
page read and write
A9A000
heap
page read and write
2BD6000
heap
page read and write
3AE000
unkown
page readonly
3B5000
unkown
page read and write
2E21000
heap
page read and write
47F7000
unkown
page execute and read and write
2E21000
heap
page read and write
F674000
system
page read and write
BDF47FE000
stack
page read and write
2E21000
heap
page read and write
7B20000
heap
page read and write
2822000
unkown
page read and write
77CE000
stack
page read and write
2E21000
heap
page read and write
9E0000
unkown
page readonly
2E21000
heap
page read and write
B3E000
heap
page read and write
2E21000
heap
page read and write
3A1000
unkown
page execute read
2B9D000
heap
page read and write
1051000
unkown
page readonly
2B2F000
heap
page read and write
2E21000
heap
page read and write
5095000
heap
page read and write
1330000
unkown
page readonly
1F10F11E000
heap
page read and write
2E21000
heap
page read and write
5A0000
heap
page read and write
2E21000
heap
page read and write
2BD9000
heap
page read and write
2E21000
heap
page read and write
24D0000
unkown
page read and write
1F110A20000
trusted library allocation
page read and write
402A000
unkown
page read and write
2B38000
heap
page read and write
2BBD000
heap
page read and write
4A56000
unclassified section
page read and write
2800000
trusted library allocation
page read and write
5F0000
unkown
page readonly
2E21000
heap
page read and write
126F000
heap
page read and write
8F7000
stack
page read and write
829F000
stack
page read and write
5B0000
heap
page read and write
2E21000
heap
page read and write
F20000
heap
page read and write
F60000
heap
page read and write
1F110D11000
trusted library allocation
page read and write
7B25000
heap
page read and write
EE6000
trusted library allocation
page read and write
1230000
heap
page read and write
3A0000
unkown
page readonly
33F7000
unkown
page execute and read and write
2BA2000
heap
page read and write
2B84000
heap
page read and write
2E21000
heap
page read and write
5230000
unclassified section
page read and write
3807000
trusted library allocation
page read and write
1F110EC4000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
2BFF000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2822000
unkown
page read and write
2660000
unkown
page read and write
2E21000
heap
page read and write
522C000
trusted library allocation
page read and write
3572000
unclassified section
page read and write
E90000
trusted library allocation
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
BBA000
stack
page read and write
2E21000
heap
page read and write
1F10F125000
heap
page read and write
B08E000
stack
page read and write
2E21000
heap
page read and write
2BC2000
heap
page read and write
1F10F0F0000
heap
page read and write
6F42000
trusted library allocation
page read and write
F50000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2AD4000
heap
page read and write
2E21000
heap
page read and write
1ED9000
unclassified section
page execute and read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
B10000
heap
page read and write
125D000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
7B6D000
heap
page read and write
3B7000
unkown
page readonly
1051000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
47F0000
trusted library allocation
page read and write
2E21000
heap
page read and write
128E000
stack
page read and write
2E21000
heap
page read and write
800000
unkown
page readonly
1185000
heap
page read and write
4F9C000
system
page execute and read and write
2E21000
heap
page read and write
4CB0000
trusted library allocation
page read and write
B18000
heap
page read and write
2B80000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
32A9000
direct allocation
page execute and read and write
2E21000
heap
page read and write
2B8E000
heap
page read and write
1F110EA7000
trusted library allocation
page read and write
1F110ECE000
trusted library allocation
page read and write
4732000
unclassified section
page read and write
2E21000
heap
page read and write
B2E000
stack
page read and write
6E1F000
stack
page read and write
2E21000
heap
page read and write
B97000
trusted library allocation
page execute and read and write
3347000
unclassified section
page execute and read and write
3172000
heap
page read and write
2E21000
heap
page read and write
2BD1000
heap
page read and write
2E21000
heap
page read and write
1150000
heap
page read and write
7B34000
heap
page read and write
2E21000
heap
page read and write
2BFA000
heap
page read and write
2E21000
heap
page read and write
1230000
heap
page read and write
2AC0000
heap
page read and write
2E21000
heap
page read and write
2BC2000
heap
page read and write
9E0000
unkown
page readonly
7B91000
heap
page read and write
B40000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
2810000
heap
page read and write
F07000
heap
page read and write
3060000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
2E21000
heap
page read and write
1F110D00000
trusted library allocation
page read and write
2E21000
heap
page read and write
F0CC000
system
page read and write
2E21000
heap
page read and write
3A1000
unkown
page execute read
2B32000
heap
page read and write
2DC0000
heap
page read and write
2805000
trusted library allocation
page read and write
2E21000
heap
page read and write
87A000
stack
page read and write
2E21000
heap
page read and write
1F110D0F000
trusted library allocation
page read and write
2BE2000
heap
page read and write
7FA30000
trusted library allocation
page execute and read and write
2814000
heap
page read and write
3B5000
unkown
page read and write
3AE000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
BEC000
stack
page read and write
B0E000
stack
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
4F9E000
system
page execute and read and write
EDE000
trusted library allocation
page read and write
2E21000
heap
page read and write
3451000
direct allocation
page execute and read and write
2E21000
heap
page read and write
7B7B000
heap
page read and write
B80000
trusted library allocation
page read and write
2BA5000
heap
page read and write
2E21000
heap
page read and write
10BE000
stack
page read and write
2E21000
heap
page read and write
48C4000
unclassified section
page read and write
3AE000
unkown
page readonly
EED000
trusted library allocation
page read and write
2E21000
heap
page read and write
B9B000
trusted library allocation
page execute and read and write
4D7A000
unclassified section
page read and write
9F0000
heap
page read and write
4F0C000
unclassified section
page read and write
2E21000
heap
page read and write
2CC0000
unkown
page readonly
27AC000
unkown
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
3A0000
unkown
page readonly
2BCC000
heap
page read and write
3100000
trusted library allocation
page read and write
2B6D000
heap
page read and write
AF8E000
stack
page read and write
F20000
heap
page read and write
2E21000
heap
page read and write
6AEE000
stack
page read and write
ECB000
trusted library allocation
page read and write
B40000
unkown
page readonly
7B85000
heap
page read and write
2E21000
heap
page read and write
6C70000
trusted library section
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
1F10F101000
heap
page read and write
1F10F140000
heap
page read and write
2E21000
heap
page read and write
3DF7000
unkown
page execute and read and write
7B75000
heap
page read and write
AD6000
heap
page read and write
5080000
heap
page read and write
EC0000
trusted library allocation
page read and write
6C00000
trusted library section
page read and write
7B06000
heap
page read and write
6D10000
trusted library allocation
page execute and read and write
D0F000
stack
page read and write
800000
unkown
page readonly
2E21000
heap
page read and write
3D47000
unclassified section
page execute and read and write
2E21000
heap
page read and write
1F110D15000
trusted library allocation
page read and write
1187000
heap
page read and write
2E21000
heap
page read and write
735E000
stack
page read and write
2BAF000
heap
page read and write
3B7000
unkown
page readonly
2BB0000
heap
page read and write
2E21000
heap
page read and write
810000
unkown
page readonly
7B28000
heap
page read and write
2E21000
heap
page read and write
1238000
heap
page read and write
2E21000
heap
page read and write
2B9D000
heap
page read and write
2E21000
heap
page read and write
3A1000
unkown
page execute read
2630000
unkown
page readonly
2E21000
heap
page read and write
368C000
unclassified section
page read and write
7B10000
heap
page read and write
1F10F0F7000
heap
page read and write
2E21000
heap
page read and write
9E3000
trusted library allocation
page execute and read and write
B6E000
stack
page read and write
7B58000
heap
page read and write
37B9000
trusted library allocation
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
B2F000
heap
page read and write
4D60000
trusted library allocation
page execute and read and write
3F0000
unkown
page readonly
1040000
unkown
page read and write
2B89000
heap
page read and write
2B9B000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2C19000
heap
page read and write
BB0000
trusted library allocation
page read and write
BBA000
stack
page read and write
3B74000
unkown
page read and write
2AFC000
unkown
page read and write
3B5000
unkown
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
69E8000
heap
page read and write
2AFC000
unkown
page read and write
2891000
trusted library allocation
page read and write
262F000
stack
page read and write
2BB0000
heap
page read and write
2B36000
heap
page read and write
2E21000
heap
page read and write
6BEF000
stack
page read and write
3101000
heap
page read and write
3100000
trusted library allocation
page read and write
A0F000
heap
page read and write
2E21000
heap
page read and write
9D0000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
1189000
heap
page read and write
174E000
direct allocation
page execute and read and write
B30000
unkown
page readonly
7B16000
heap
page read and write
3D06000
unkown
page read and write
2E21000
heap
page read and write
51F7000
unkown
page execute and read and write
2E21000
heap
page read and write
74DC000
trusted library allocation
page read and write
2E21000
heap
page read and write
9ED000
trusted library allocation
page execute and read and write
352C000
unkown
page read and write
633E000
stack
page read and write
2E21000
heap
page read and write
1F110D21000
trusted library allocation
page read and write
2E21000
heap
page read and write
47EE000
stack
page read and write
2E2B000
heap
page read and write
2E21000
heap
page read and write
2B98000
heap
page read and write
14CF000
stack
page read and write
2E21000
heap
page read and write
1F10F10F000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2BD6000
heap
page read and write
27DB000
stack
page read and write
9B0000
heap
page read and write
EFB000
stack
page read and write
44E0000
unkown
page read and write
4FB7000
system
page execute and read and write
5220000
trusted library allocation
page read and write
2CC0000
unkown
page readonly
18F8000
direct allocation
page execute and read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2C03000
heap
page read and write
1F110E01000
trusted library allocation
page read and write
2E21000
heap
page read and write
B50000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
2670000
heap
page read and write
1F10F069000
system
page execute and read and write
2E21000
heap
page read and write
F072000
system
page read and write
4A0000
unkown
page readonly
2E21000
heap
page read and write
2810000
heap
page read and write
14D0000
direct allocation
page read and write
2B31000
heap
page read and write
1275000
unkown
page read and write
2E21000
heap
page read and write
36BE000
unkown
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
53A000
stack
page read and write
2E21000
heap
page read and write
3DC6000
unclassified section
page read and write
9D0000
unkown
page readonly
9F8000
heap
page read and write
4D10000
trusted library allocation
page read and write
2BCF000
heap
page read and write
F10000
unkown
page readonly
EA0000
trusted library allocation
page read and write
CCF000
stack
page read and write
2E21000
heap
page read and write
E20000
trusted library allocation
page read and write
AD3000
heap
page read and write
2E21000
heap
page read and write
2BD9000
heap
page read and write
138F000
stack
page read and write
D20000
unkown
page readonly
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
9F0000
heap
page read and write
2B32000
heap
page read and write
3C34000
unclassified section
page read and write
2EE4000
unkown
page read and write
2E21000
heap
page read and write
16C1000
unkown
page readonly
2B32000
heap
page read and write
2E21000
heap
page read and write
3B7000
unkown
page readonly
F00000
heap
page read and write
2BFA000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
39E2000
unkown
page read and write
501A000
system
page execute and read and write
69E4000
heap
page read and write
50D0000
heap
page read and write
2B84000
heap
page read and write
2BA2000
heap
page read and write
1550000
heap
page read and write
2AD4000
heap
page read and write
5F0000
unkown
page readonly
45A0000
unclassified section
page read and write
BC0000
heap
page read and write
5090000
heap
page read and write
9E4000
trusted library allocation
page read and write
10F0000
heap
page read and write
28E2000
unkown
page read and write
317E000
stack
page read and write
11FF000
stack
page read and write
2650000
unkown
page read and write
4FA7000
system
page execute and read and write
EFB2000
system
page read and write
1F110D0A000
trusted library allocation
page read and write
4F7C000
stack
page read and write
2E21000
heap
page read and write
1F47000
unclassified section
page execute and read and write
EA5000
trusted library allocation
page read and write
A9D000
heap
page read and write
1F110A20000
trusted library allocation
page read and write
2F23000
heap
page read and write
1238000
heap
page read and write
2E21000
heap
page read and write
B10000
heap
page read and write
2E21000
heap
page read and write
4C90000
trusted library allocation
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2BE2000
heap
page read and write
3A0000
unkown
page readonly
2E21000
heap
page read and write
10C1000
unkown
page readonly
2E21000
heap
page read and write
3A0000
unkown
page readonly
F28C000
system
page read and write
6840000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
E30000
trusted library allocation
page read and write
16C1000
unkown
page readonly
30FD000
heap
page read and write
2E21000
heap
page read and write
2E10000
heap
page read and write
B0E000
stack
page read and write
2E20000
heap
page read and write
331E000
direct allocation
page execute and read and write
B18000
heap
page read and write
2C05000
heap
page read and write
D10000
unkown
page read and write
1F110C00000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
BF0000
unkown
page readonly
F21000
unkown
page readonly
BDF3FFE000
stack
page read and write
B82000
trusted library allocation
page read and write
3AE000
unkown
page readonly
7B48000
heap
page read and write
9D0000
unkown
page readonly
2E21000
heap
page read and write
3208000
unkown
page read and write
6C30000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
2E21000
heap
page read and write
5250000
trusted library allocation
page read and write
2C19000
heap
page read and write
2DB0000
trusted library allocation
page read and write
B50000
unkown
page readonly
1040000
unkown
page read and write
1050000
heap
page read and write
427C000
unclassified section
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
B73000
trusted library allocation
page read and write
9F0000
heap
page read and write
2E21000
heap
page read and write
B7D000
trusted library allocation
page execute and read and write
2E21000
heap
page read and write
3632000
unclassified section
page read and write
2E21000
heap
page read and write
DCE000
stack
page read and write
34D0000
trusted library allocation
page execute and read and write
2E21000
heap
page read and write
7C10000
trusted library allocation
page read and write
2E21000
heap
page read and write
69F8000
heap
page read and write
5BF7000
unkown
page execute and read and write
2E21000
heap
page read and write
F21000
unkown
page readonly
2E21000
heap
page read and write
69B0000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
125A000
heap
page read and write
2E21000
heap
page read and write
3180000
direct allocation
page execute and read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
1F10F122000
heap
page read and write
2BA5000
heap
page read and write
B30000
unkown
page readonly
2E21000
heap
page read and write
4D30000
trusted library allocation
page read and write
2E21000
heap
page read and write
344D000
direct allocation
page execute and read and write
2E21000
heap
page read and write
15B0000
direct allocation
page execute and read and write
3855000
trusted library allocation
page read and write
F10000
unkown
page readonly
6D00000
trusted library allocation
page read and write
2BC8000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
F00000
unkown
page readonly
3389000
unkown
page execute and read and write
2E21000
heap
page read and write
2B20000
heap
page read and write
1F110EBE000
trusted library allocation
page read and write
2E21000
heap
page read and write
2BAF000
heap
page read and write
6C10000
trusted library section
page read and write
2B80000
heap
page read and write
47FF000
trusted library allocation
page read and write
384C000
unclassified section
page read and write
2BD1000
heap
page read and write
50B0000
heap
page read and write
4747000
unclassified section
page execute and read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
E10000
trusted library allocation
page execute and read and write
3076000
unkown
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
1170000
heap
page read and write
2BF4000
heap
page read and write
2B38000
heap
page read and write
2B29000
heap
page read and write
2E21000
heap
page read and write
2B8E000
heap
page read and write
41BC000
unkown
page read and write
50A0000
heap
page read and write
2E21000
heap
page read and write
AA1000
heap
page read and write
4BE8000
unclassified section
page read and write
1F110D13000
trusted library allocation
page read and write
16DD000
direct allocation
page execute and read and write
B18E000
stack
page read and write
2E21000
heap
page read and write
514C000
unkown
page read and write
398E000
trusted library allocation
page read and write
2E21000
heap
page read and write
2E21000
heap
page read and write
47F5000
trusted library allocation
page read and write
10E0000
unkown
page read and write
2E21000
heap
page read and write
69F6000
heap
page read and write
A25000
heap
page read and write
There are 721 hidden memdumps, click here to show them.