IOC Report
OPEN BALANCE.exe

loading gif

Files

File Path
Type
Category
Malicious
OPEN BALANCE.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Temp\51688324h
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\autB109.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autB148.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\fascinatress
data
dropped
C:\Users\user\AppData\Local\Temp\unjust
ASCII text, with very long lines (28674), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OPEN BALANCE.exe
"C:\Users\user\Desktop\OPEN BALANCE.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\OPEN BALANCE.exe"
malicious
C:\Program Files (x86)\sMQvFCIpuVKheCCWkklQgFifQTZdvVtZruHXTKMPcQjwkCrgA\VnZdrTcLqvUA.exe
"C:\Program Files (x86)\sMQvFCIpuVKheCCWkklQgFifQTZdvVtZruHXTKMPcQjwkCrgA\VnZdrTcLqvUA.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"C:\Windows\SysWOW64\attrib.exe"
malicious
C:\Program Files (x86)\sMQvFCIpuVKheCCWkklQgFifQTZdvVtZruHXTKMPcQjwkCrgA\VnZdrTcLqvUA.exe
"C:\Program Files (x86)\sMQvFCIpuVKheCCWkklQgFifQTZdvVtZruHXTKMPcQjwkCrgA\VnZdrTcLqvUA.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.gzlxdj1921.com/ggr3/?JNx8tTw=+ulKtzjhC/pF9uoDIL96mS+Q2gVwjVfYnGC5dhxw+14/MHoXjYhMFpwJCtX2zxSL+1u8Kqx4aLSiOAPYuX8wC92mPQi5Iz3Ed95V/6CV65glQfCAW8c6AwGpbOMtcs+eTg==&F0a=DDvTXr_Hk
47.238.77.168
http://www.counseloratlaw1806.xyz/lxy9/
199.59.243.226
http://www.corbincodes.tech/m0g5/
3.33.244.179
http://www.worldheadline.xyz/index.php?page=categories
unknown
http://www.michaelstutorgroup.com/bk2c/?JNx8tTw=fyR/dS20qv8EXSd8u+Bcgvv3xf0q4er0Bfje+Rii9aayzDLrig5kNBZNNidIJWoLGG2wTsvUDg8b8pJZ+WjXr6oyts3SJgHwjkutIwVayIFFDsRDIWHfWbE9GGLqUV2/ag==&F0a=DDvTXr_Hk
84.32.84.65
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.worldheadline.xyz/index.php
unknown
http://www.kawambwa-sugar.com/gjm3/
3.33.130.190
https://www.ecosia.org/newtab/
unknown
http://www.worldheadline.xyz/t7vt/?JNx8tTw=uDGK8VjmNJjS9S78Zu3fjPk+qbPTeN8FCtxt9GSvaaiUOHuM2RHrw8XoT9PDXAl+CqF8gx2YQ/m+f5qIVb5xWNdhTtWiVvoVTDqmbClT5EaAJa6SCw+I3UYWCEeU2WlC1g==&F0a=DDvTXr_Hk
192.236.177.190
http://www.michaelstutorgroup.com/bk2c/
84.32.84.65
http://www.by8991.vip/0190/
65.181.134.177
http://www.by8991.vip/0190/?F0a=DDvTXr_Hk&JNx8tTw=Z6ERJFoDCUfQsIq8ofQDjrU1/9I1+MRHON9wFl6H5eE5mUn/k+ER1FqTfAe8nYNZ1iEuv5/EQNBLECXnnxN4D66rqY36fh1KhKiNJpoJ9uKwS3VDPLljB2Epzr3xCgB2gg==
65.181.134.177
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://www.worldheadline.xyz/index.php?page=contact
unknown
http://www.worldheadline.xyz/index.php?page=most-read
unknown
http://www.worldheadline.xyz/index.php?page=terms
unknown
https://www.by3393.com:35522/register?i_code=2867599
unknown
http://www.worldheadline.xyz/index.php?page=latest
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.yp78w.top/uum0/
38.181.21.136
http://www.kawambwa-sugar.com/gjm3/?JNx8tTw=PeXQ/0fKICzM5BJz6p9ArJpLN7UVrkFd1P+d/QKATQOsfeoG8d5Si8/kOzzLJ6xWOh7b+xseW4maj8a6yNy3oL5cFlzPj7mwU9Y3C34E4mLKEtfNI6H114erhWwp1eiAVA==&F0a=DDvTXr_Hk
3.33.130.190
http://www.counseloratlaw1806.xyz/lxy9/?JNx8tTw=aMYCWBWby78cu2Pg5kxC7/s+ledqG+yLUHOKH+0jK4PAR/gCFqdm34ajEirZUZfXHWNx+XxCFLbhto71FEYU7CwGQbfx96/8sGe6uy0dOdRuFla+tLr5WY0xGsTDrvD3UQ==&F0a=DDvTXr_Hk
199.59.243.226
http://www.gzlxdj1921.com/ggr3/
47.238.77.168
http://www.corbincodes.tech
unknown
https://www.michaelstutorgroup.com/bk2c/?JNx8tTw=fyR/dS20qv8EXSd8u
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.worldheadline.xyz.
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.counseloratlaw1806.xyz
199.59.243.226
malicious
worldheadline.xyz
192.236.177.190
malicious
www.by8991.vip
unknown
malicious
www.michaelstutorgroup.com
unknown
malicious
www.worldheadline.xyz
unknown
malicious
www.yp78w.top
unknown
malicious
www.kawambwa-sugar.com
unknown
malicious
86f894fb.by8991.vip.cname.scname.com
65.181.134.177
www.corbincodes.tech
3.33.244.179
yp78w.top
38.181.21.136
www.gzlxdj1921.com
47.238.77.168
www.michaelstutorgroup.com.cdn.hstgr.net
84.32.84.65
kawambwa-sugar.com
3.33.130.190
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.236.177.190
worldheadline.xyz
United States
malicious
199.59.243.226
www.counseloratlaw1806.xyz
United States
malicious
47.238.77.168
www.gzlxdj1921.com
United States
65.181.134.177
86f894fb.by8991.vip.cname.scname.com
United States
84.32.84.65
www.michaelstutorgroup.com.cdn.hstgr.net
Lithuania
38.181.21.136
yp78w.top
United States
3.33.130.190
kawambwa-sugar.com
United States
3.33.244.179
www.corbincodes.tech
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
62C0000
unclassified section
page execute and read and write
malicious
2CE0000
trusted library allocation
page read and write
malicious
2D60000
unkown
page execute and read and write
malicious
2C90000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
630000
system
page execute and read and write
malicious
3DA0000
unclassified section
page execute and read and write
malicious
2550000
system
page execute and read and write
malicious
3213000
heap
page read and write
3CCD000
direct allocation
page execute and read and write
10F8000
heap
page read and write
20F0000
unkown
page readonly
3EF3000
direct allocation
page read and write
29A4000
unkown
page read and write
33AB3FF000
stack
page read and write
222E000
stack
page read and write
2B91000
heap
page read and write
70000
unkown
page readonly
2E7C000
heap
page read and write
A90000
unkown
page readonly
19CFA9F0000
trusted library allocation
page read and write
B1A000
stack
page read and write
1524000
heap
page read and write
10F8000
heap
page read and write
2EAE000
stack
page read and write
3600000
heap
page read and write
33AA3FB000
stack
page read and write
39062000
system
page read and write
2B91000
heap
page read and write
2947000
heap
page read and write
19CF9032000
system
page execute and read and write
2902000
heap
page read and write
2B91000
heap
page read and write
CBE000
unkown
page readonly
7A38000
heap
page read and write
2B91000
heap
page read and write
C70000
unkown
page readonly
352C000
unclassified section
page read and write
2B91000
heap
page read and write
12F0000
unkown
page readonly
2B91000
heap
page read and write
19CFAD21000
trusted library allocation
page read and write
2B64000
heap
page read and write
DF0000
heap
page read and write
2B91000
heap
page read and write
22D0000
heap
page read and write
3200000
heap
page read and write
2B91000
heap
page read and write
981000
unkown
page readonly
840000
unkown
page readonly
CC5000
unkown
page read and write
2B91000
heap
page read and write
797E000
heap
page read and write
2B91000
heap
page read and write
CE1000
unkown
page readonly
22E2000
unkown
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
12EF000
stack
page read and write
19CF91C0000
heap
page read and write
3242000
direct allocation
page execute and read and write
399E000
heap
page read and write
2B91000
heap
page read and write
126F000
stack
page read and write
3914000
unclassified section
page read and write
2B91000
heap
page read and write
19CFAD15000
trusted library allocation
page read and write
2B91000
heap
page read and write
97E000
unkown
page execute and read and write
3273000
unkown
page execute and read and write
3A20000
direct allocation
page read and write
2B91000
heap
page read and write
4099000
direct allocation
page read and write
3213000
heap
page read and write
2B91000
heap
page read and write
3180000
direct allocation
page read and write
409D000
direct allocation
page read and write
3000000
heap
page read and write
2E5A000
unkown
page read and write
2C70000
unkown
page readonly
80AF000
stack
page read and write
CC7000
unkown
page readonly
2B91000
heap
page read and write
2D30000
trusted library allocation
page read and write
770000
unkown
page read and write
409D000
direct allocation
page read and write
C50000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
3B2D000
direct allocation
page execute and read and write
2B91000
heap
page read and write
3AA6000
unclassified section
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
3FC0000
direct allocation
page read and write
33AABFE000
stack
page read and write
123E000
stack
page read and write
2B91000
heap
page read and write
DA000
stack
page read and write
3929000
heap
page read and write
19CFA9F0000
trusted library allocation
page read and write
1080000
heap
page read and write
540000
heap
page read and write
2992000
heap
page read and write
760000
unkown
page read and write
430000
heap
page read and write
19CFAEC4000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2B91000
heap
page read and write
19CF91F1000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
29CB000
heap
page read and write
15D6000
heap
page read and write
793B000
heap
page read and write
226E000
stack
page read and write
10F0000
heap
page read and write
3213000
heap
page read and write
3252000
unclassified section
page read and write
2B91000
heap
page read and write
3400000
heap
page read and write
C80000
heap
page read and write
2907000
heap
page read and write
290C000
heap
page read and write
29A3000
heap
page read and write
530000
unkown
page readonly
780000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
430000
heap
page read and write
2B91000
heap
page read and write
420000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
19CFAEA6000
trusted library allocation
page read and write
69D000
system
page execute and read and write
1DC000
stack
page read and write
15C6000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2CC8000
unkown
page read and write
296A000
heap
page read and write
341A000
heap
page read and write
3F5C000
unclassified section
page read and write
2906000
heap
page read and write
6B8000
system
page execute and read and write
3213000
heap
page read and write
2B91000
heap
page read and write
171B000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
CB0000
unkown
page readonly
841000
unkown
page execute and read and write
19CF91F4000
heap
page read and write
2B91000
heap
page read and write
C90000
heap
page read and write
298C000
heap
page read and write
CA1000
unkown
page readonly
40ED000
direct allocation
page read and write
2EED000
heap
page read and write
79B7000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
985000
unkown
page write copy
2B91000
heap
page read and write
2B91000
heap
page read and write
4099000
direct allocation
page read and write
1681000
unkown
page readonly
1522000
heap
page read and write
6C7000
system
page execute and read and write
19CF90D0000
heap
page read and write
2B91000
heap
page read and write
6A0000
system
page execute and read and write
2B91000
heap
page read and write
19CF9010000
system
page execute and read and write
2B91000
heap
page read and write
290C000
heap
page read and write
2B91000
heap
page read and write
2FEC000
unkown
page read and write
2B91000
heap
page read and write
7A20000
trusted library allocation
page read and write
2B91000
heap
page read and write
23FC000
unkown
page read and write
24DB000
stack
page read and write
144E000
stack
page read and write
125B000
stack
page read and write
3213000
heap
page read and write
2B91000
heap
page read and write
29AF000
heap
page read and write
CE1000
unkown
page readonly
2B91000
heap
page read and write
3412000
heap
page read and write
50000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
C1C000
stack
page read and write
2F00000
direct allocation
page execute and read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
3D50000
direct allocation
page read and write
981000
unkown
page readonly
2B91000
heap
page read and write
40E9000
direct allocation
page read and write
25BC000
unkown
page read and write
2B91000
heap
page read and write
3CD1000
direct allocation
page execute and read and write
2B91000
heap
page read and write
4BEF000
stack
page read and write
2B91000
heap
page read and write
3FC0000
direct allocation
page read and write
795A000
heap
page read and write
28FB000
heap
page read and write
984000
unkown
page execute and write copy
2B91000
heap
page read and write
CB1000
unkown
page execute read
42B3000
unclassified section
page execute and read and write
3312000
unclassified section
page read and write
3B29000
direct allocation
page execute and read and write
2B90000
heap
page read and write
3A84000
heap
page read and write
2B91000
heap
page read and write
C1C000
stack
page read and write
4AEC000
stack
page read and write
25BC000
unkown
page read and write
3310000
unkown
page read and write
291E000
heap
page read and write
C70000
unkown
page readonly
415E000
direct allocation
page read and write
CC7000
unkown
page readonly
7933000
heap
page read and write
2D8C000
stack
page read and write
12F0000
unkown
page readonly
CB1000
unkown
page execute read
28B0000
heap
page read and write
AB0000
unkown
page readonly
28F7000
heap
page read and write
2B91000
heap
page read and write
CC5000
unkown
page read and write
3F70000
direct allocation
page read and write
1090000
unkown
page read and write
2B91000
heap
page read and write
29C5000
heap
page read and write
2B91000
heap
page read and write
19CF9200000
heap
page read and write
7D20000
heap
page read and write
3202000
heap
page read and write
14F0000
heap
page read and write
296F000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
10F0000
heap
page read and write
7AD0000
trusted library allocation
page read and write
2900000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
22D0000
heap
page read and write
28B4000
heap
page read and write
12E0000
heap
page read and write
6C4000
system
page execute and read and write
CC7000
unkown
page readonly
2B91000
heap
page read and write
985000
unkown
page read and write
2B40000
trusted library allocation
page read and write
4CEF000
stack
page read and write
2B91000
heap
page read and write
40ED000
direct allocation
page read and write
3417000
heap
page read and write
B20000
unkown
page read and write
28FD000
heap
page read and write
410E000
direct allocation
page read and write
1450000
heap
page read and write
23A2000
unkown
page read and write
19CFAC00000
trusted library allocation
page read and write
799D000
heap
page read and write
DF0000
heap
page read and write
2B91000
heap
page read and write
3F43000
direct allocation
page read and write
296F000
heap
page read and write
2B91000
heap
page read and write
797A000
heap
page read and write
2B91000
heap
page read and write
1000000
unkown
page read and write
3213000
heap
page read and write
7A30000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
22E2000
unkown
page read and write
3213000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
438000
heap
page read and write
2B91000
heap
page read and write
CBE000
unkown
page readonly
1528000
heap
page read and write
296D000
heap
page read and write
1DC000
stack
page read and write
3213000
heap
page read and write
20EE000
stack
page read and write
33ABBFF000
stack
page read and write
20F0000
unkown
page readonly
2B91000
heap
page read and write
C90000
unkown
page read and write
3213000
heap
page read and write
7980000
heap
page read and write
C80000
unkown
page readonly
22D4000
heap
page read and write
79B9000
heap
page read and write
15C5000
heap
page read and write
2B91000
heap
page read and write
1CEE000
stack
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
C80000
heap
page read and write
2B91000
heap
page read and write
780000
unkown
page readonly
928000
unkown
page execute and write copy
2B91000
heap
page read and write
3501000
heap
page read and write
1119000
unkown
page read and write
31C0000
direct allocation
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
25D0000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
4099000
direct allocation
page read and write
3B9E000
direct allocation
page execute and read and write
1758000
heap
page read and write
2B91000
heap
page read and write
299C000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
31C0000
direct allocation
page read and write
336C000
unclassified section
page read and write
2B91000
heap
page read and write
7D1E000
stack
page read and write
3801000
heap
page read and write
341F000
heap
page read and write
AA0000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
2B40000
trusted library allocation
page read and write
16AB000
heap
page read and write
19CFAD0F000
trusted library allocation
page read and write
2B91000
heap
page read and write
60000
unkown
page readonly
91A000
unkown
page execute and read and write
38FA2000
system
page read and write
3029000
direct allocation
page execute and read and write
2906000
heap
page read and write
B20000
unkown
page read and write
2B91000
heap
page read and write
132E000
stack
page read and write
CB1000
unkown
page execute read
2C70000
unkown
page readonly
15C5000
heap
page read and write
1769000
heap
page read and write
3213000
heap
page read and write
2987000
heap
page read and write
E7A000
stack
page read and write
2B91000
heap
page read and write
28FB000
heap
page read and write
14E0000
direct allocation
page execute and read and write
DEE000
stack
page read and write
7C7E000
stack
page read and write
C60000
unkown
page readonly
840000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
3213000
heap
page read and write
DA000
stack
page read and write
2974000
heap
page read and write
7945000
heap
page read and write
3419000
heap
page read and write
2B95000
heap
page read and write
175A000
heap
page read and write
2B91000
heap
page read and write
530000
unkown
page readonly
152C000
heap
page read and write
3F70000
direct allocation
page read and write
2B91000
heap
page read and write
79B2000
heap
page read and write
2B91000
heap
page read and write
AA0000
unkown
page readonly
2B91000
heap
page read and write
7941000
heap
page read and write
415E000
direct allocation
page read and write
2B91000
heap
page read and write
409D000
direct allocation
page read and write
2B91000
heap
page read and write
152C000
heap
page read and write
2B36000
unkown
page read and write
31BE000
stack
page read and write
2B91000
heap
page read and write
19CF91ED000
heap
page read and write
79A9000
heap
page read and write
3927C000
system
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
C90000
unkown
page read and write
3A80000
heap
page read and write
50000
unkown
page readonly
3DCA000
unclassified section
page read and write
2B91000
heap
page read and write
40E9000
direct allocation
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
1080000
heap
page read and write
302D000
direct allocation
page execute and read and write
2B91000
heap
page read and write
19CF91C9000
heap
page read and write
CC7000
unkown
page readonly
3417000
heap
page read and write
2974000
heap
page read and write
1594000
heap
page read and write
796F000
heap
page read and write
3A00000
direct allocation
page execute and read and write
2B91000
heap
page read and write
C90000
heap
page read and write
2B91000
heap
page read and write
7975000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
19CFAB30000
heap
page read and write
40E9000
direct allocation
page read and write
2DD0000
trusted library allocation
page execute and read and write
3F43000
direct allocation
page read and write
2B60000
heap
page read and write
2B91000
heap
page read and write
28B4000
heap
page read and write
3EF3000
direct allocation
page read and write
2B91000
heap
page read and write
296A000
heap
page read and write
1595000
heap
page read and write
3F70000
direct allocation
page read and write
2518000
stack
page read and write
CB0000
unkown
page readonly
2B91000
heap
page read and write
70000
unkown
page readonly
1114000
unkown
page read and write
2B91000
heap
page read and write
2DCA000
stack
page read and write
3213000
heap
page read and write
2B91000
heap
page read and write
2981000
heap
page read and write
2B91000
heap
page read and write
2B40000
trusted library allocation
page read and write
14C0000
heap
page read and write
153B000
heap
page read and write
19CFAD00000
trusted library allocation
page read and write
2B80000
heap
page read and write
2B91000
heap
page read and write
28B4000
heap
page read and write
2B91000
heap
page read and write
550000
heap
page read and write
2B91000
heap
page read and write
C50000
unkown
page readonly
2B91000
heap
page read and write
29D6000
heap
page read and write
902000
unkown
page execute and read and write
410000
unkown
page readonly
2B91000
heap
page read and write
792B000
heap
page read and write
36FF000
stack
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
B1A000
stack
page read and write
174C000
heap
page read and write
C60000
unkown
page readonly
3E20000
direct allocation
page read and write
40ED000
direct allocation
page read and write
71B000
system
page execute and read and write
410000
unkown
page readonly
15F5000
heap
page read and write
CB0000
unkown
page readonly
39664000
system
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
410E000
direct allocation
page read and write
C80000
unkown
page readonly
29D0000
heap
page read and write
295B000
heap
page read and write
CC5000
unkown
page read and write
2B91000
heap
page read and write
1330000
heap
page read and write
2960000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
1118000
unkown
page read and write
79A4000
heap
page read and write
770000
unkown
page read and write
1060000
unkown
page readonly
2880000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
7995000
heap
page read and write
3DD0000
direct allocation
page read and write
19CFAD11000
trusted library allocation
page read and write
2B91000
heap
page read and write
3213000
heap
page read and write
31D1000
direct allocation
page execute and read and write
127F000
stack
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
1060000
unkown
page readonly
19CF91DD000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
19CF9036000
system
page execute and read and write
153B000
heap
page read and write
1681000
unkown
page readonly
60000
unkown
page readonly
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
37FF000
stack
page read and write
3213000
heap
page read and write
CA1000
unkown
page readonly
5F00000
trusted library allocation
page read and write
3DD0000
direct allocation
page read and write
16B7000
heap
page read and write
2B91000
heap
page read and write
110B000
unkown
page read and write
2B91000
heap
page read and write
410E000
direct allocation
page read and write
415E000
direct allocation
page read and write
3C38000
unclassified section
page read and write
44F000
heap
page read and write
2B91000
heap
page read and write
3050000
heap
page read and write
31C0000
direct allocation
page read and write
2B91000
heap
page read and write
3EF3000
direct allocation
page read and write
2B91000
heap
page read and write
21E0000
unkown
page read and write
2B91000
heap
page read and write
21E0000
unkown
page read and write
2B64000
heap
page read and write
2B91000
heap
page read and write
AB0000
unkown
page readonly
19CFAEBE000
trusted library allocation
page read and write
2B60000
heap
page read and write
CC5000
unkown
page read and write
3E20000
direct allocation
page read and write
28F0000
heap
page read and write
22D4000
heap
page read and write
3D42000
direct allocation
page execute and read and write
40EE000
unclassified section
page read and write
C7C000
stack
page read and write
2B91000
heap
page read and write
3DD0000
direct allocation
page read and write
2B91000
heap
page read and write
28FA000
heap
page read and write
2999000
heap
page read and write
2B91000
heap
page read and write
309E000
direct allocation
page execute and read and write
2B91000
heap
page read and write
2290000
heap
page read and write
2E78000
heap
page read and write
540000
heap
page read and write
3405000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2C6F000
stack
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
CB0000
unkown
page readonly
2B91000
heap
page read and write
124E000
stack
page read and write
7CBF000
stack
page read and write
2B91000
heap
page read and write
3723000
heap
page read and write
2B91000
heap
page read and write
3020000
heap
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
CB1000
unkown
page execute read
25E0000
heap
page read and write
19CFAD03000
trusted library allocation
page read and write
3213000
heap
page read and write
317E000
unkown
page read and write
2B91000
heap
page read and write
317E000
stack
page read and write
CBE000
unkown
page readonly
550000
heap
page read and write
6A8000
system
page execute and read and write
CBE000
unkown
page readonly
19CFAE01000
trusted library allocation
page read and write
1000000
unkown
page read and write
420000
unkown
page readonly
14F8000
heap
page read and write
2B91000
heap
page read and write
438000
heap
page read and write
2B91000
heap
page read and write
2981000
heap
page read and write
31CD000
direct allocation
page execute and read and write
3213000
heap
page read and write
A90000
unkown
page readonly
1769000
heap
page read and write
3405000
heap
page read and write
2B91000
heap
page read and write
19CF91C7000
heap
page read and write
2B91000
heap
page read and write
4280000
unclassified section
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
19CFA9D0000
heap
page read and write
1090000
unkown
page read and write
2B91000
heap
page read and write
2906000
heap
page read and write
392D000
heap
page read and write
79AE000
heap
page read and write
3F43000
direct allocation
page read and write
19CFAECE000
trusted library allocation
page read and write
19CFA9F0000
trusted library allocation
page read and write
2B91000
heap
page read and write
2B91000
heap
page read and write
2EEE000
stack
page read and write
90C000
unkown
page execute and read and write
3FC0000
direct allocation
page read and write
3E20000
direct allocation
page read and write
79BC000
heap
page read and write
794A000
heap
page read and write
2B40000
trusted library allocation
page read and write
2D4F000
heap
page read and write
105E000
stack
page read and write
3800000
heap
page read and write
157C000
heap
page read and write
2B91000
heap
page read and write
3130000
heap
page read and write
296D000
heap
page read and write
There are 639 hidden memdumps, click here to show them.