IOC Report
ORIGINAL INVOICE COAU7230734298.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
ORIGINAL INVOICE COAU7230734298.pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORIGINAL INVOICE COAU7230734298.pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\297268BLQ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734298.pdf.exe
"C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734298.pdf.exe"
malicious
C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734298.pdf.exe
"C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734298.pdf.exe"
malicious
C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734298.pdf.exe
"C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734298.pdf.exe"
malicious
C:\Program Files (x86)\eWtDAGowqdSGFXEYThrsFkCQDEZMRkYQPWNKxqwoIJHoNBCwAJaL\fFUkGixTNm.exe
"C:\Program Files (x86)\eWtDAGowqdSGFXEYThrsFkCQDEZMRkYQPWNKxqwoIJHoNBCwAJaL\fFUkGixTNm.exe"
malicious
C:\Windows\SysWOW64\RpcPing.exe
"C:\Windows\SysWOW64\RpcPing.exe"
malicious
C:\Program Files (x86)\eWtDAGowqdSGFXEYThrsFkCQDEZMRkYQPWNKxqwoIJHoNBCwAJaL\fFUkGixTNm.exe
"C:\Program Files (x86)\eWtDAGowqdSGFXEYThrsFkCQDEZMRkYQPWNKxqwoIJHoNBCwAJaL\fFUkGixTNm.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.kartal-nakliyat.xyz/n8ew/
85.159.66.93
malicious
http://www.kartal-nakliyat.xyz/n8ew/?-L=YrE+HYcRTJ/OeXavXWmi0WsMxqp/Qj1TC8eaJJaWkX68lODBlWDwQ18bVJjKs/Cf7bGV7reziuqKeQkAFQFGt8cheHN72b7qcqvkvKEYShiE16kKqs7vQFQ=&5lFl=AhoHbVV8w8Fhov
85.159.66.93
malicious
http://www.sidqwdf.fun/c6mm/?-L=605lt7jFydoU7JlJmLmlR3MPZVvrIrf93PMCsOoFpo6XmjZ52y5IXJzTkSO6xf5k8c4UHFGKgBYSwhM4U1695pryhegOugHUsMzW6k0CmFF9ZZ6niG5/hdc=&5lFl=AhoHbVV8w8Fhov
185.106.176.204
malicious
http://www.resellnexa.shop/sfpe/
52.223.13.41
malicious
http://www.sidqwdf.fun/c6mm/
185.106.176.204
malicious
http://www.resellnexa.shop/sfpe/?-L=sfhD9ka1f7Zl+qNrDMj9KQZnnhuUSPArAKQ60GHQT7zGoqr1MFveBg7/TQ1R28eaU1mFht6SOS1vYGyl5v5sWa+Vgmcag1rYJ6bZGh78paZg7QH5mUVjdRg=&5lFl=AhoHbVV8w8Fhov
52.223.13.41
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.fontbureau.com/designers?
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.yippie.world/pyhp/?5lFl=AhoHbVV8w8Fhov&-L=acxrSkAeFAn+c73u09IRBa4IAQi5A1z7ZI6dwDB31LKHDk9U9aCGF5xgW/dUXTEZ5HtK9ZQYYeKWJ5O00arwvLVjsQ/IAPNwWm6am1xvCJN+TihMUZXrkzI=
3.33.130.190
http://www.goodfont.co.kr
unknown
https://www.ecosia.org/newtab/
unknown
http://www.carterandcone.coml
unknown
http://www.resellnexa.shop
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.ascendercorp.com/typedesigners.htmlru-ru
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.sidqwdf.fun
185.106.176.204
malicious
www.resellnexa.shop
52.223.13.41
malicious
natroredirect.natrocdn.com
85.159.66.93
malicious
www.yippie.world
unknown
malicious
www.kartal-nakliyat.xyz
unknown
malicious
yippie.world
3.33.130.190

IPs

IP
Domain
Country
Malicious
52.223.13.41
www.resellnexa.shop
United States
malicious
185.106.176.204
www.sidqwdf.fun
United Kingdom
malicious
85.159.66.93
natroredirect.natrocdn.com
Turkey
malicious
3.33.130.190
yippie.world
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2830000
unclassified section
page execute and read and write
malicious
3610000
trusted library allocation
page read and write
malicious
5870000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
18D0000
unclassified section
page execute and read and write
malicious
36F0000
unkown
page execute and read and write
malicious
3260000
system
page execute and read and write
malicious
3840000
trusted library allocation
page read and write
malicious
70D0000
trusted library allocation
page read and write
3CB1000
direct allocation
page execute and read and write
B20000
unkown
page read and write
473C000
stack
page read and write
3641000
trusted library allocation
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
9F0000
unkown
page readonly
382F000
heap
page read and write
3671000
heap
page read and write
88E000
stack
page read and write
7A6E000
stack
page read and write
1DEF1D39000
heap
page read and write
3671000
heap
page read and write
1B0D000
direct allocation
page execute and read and write
3300000
heap
page read and write
8511000
heap
page read and write
FD0000
unkown
page readonly
3671000
heap
page read and write
33E6000
heap
page read and write
340E000
heap
page read and write
3433000
heap
page read and write
4BAD000
trusted library allocation
page read and write
76F0000
heap
page read and write
2E8C000
stack
page read and write
3671000
heap
page read and write
58BE000
stack
page read and write
3671000
heap
page read and write
3DE2000
unclassified section
page read and write
33C0000
heap
page read and write
8BFE000
stack
page read and write
84D5000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3409000
heap
page read and write
3671000
heap
page read and write
344F000
heap
page read and write
344F000
heap
page read and write
3672000
heap
page read and write
8AFE000
stack
page read and write
8E0000
heap
page read and write
33FA000
heap
page read and write
4C87000
trusted library allocation
page read and write
3671000
heap
page read and write
33BF000
heap
page read and write
3671000
heap
page read and write
33C5000
heap
page read and write
1DEF3700000
trusted library allocation
page read and write
3671000
heap
page read and write
4FF0000
trusted library allocation
page execute and read and write
3671000
heap
page read and write
3671000
heap
page read and write
340E000
heap
page read and write
33D4000
heap
page read and write
3671000
heap
page read and write
84F1000
heap
page read and write
33D2000
heap
page read and write
3660000
heap
page read and write
ADF000
stack
page read and write
84D2000
heap
page read and write
AE0000
unkown
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
3438000
heap
page read and write
782E000
stack
page read and write
343C000
unkown
page read and write
33D9000
heap
page read and write
8A0000
trusted library allocation
page read and write
3671000
heap
page read and write
33D9000
heap
page read and write
33E6000
heap
page read and write
3671000
heap
page read and write
3404000
heap
page read and write
341B000
heap
page read and write
3671000
heap
page read and write
1490000
heap
page read and write
EF0000
unkown
page readonly
3409000
heap
page read and write
8B7E000
stack
page read and write
1498000
heap
page read and write
33D4000
heap
page read and write
FF0000
unkown
page read and write
4C60000
heap
page read and write
342D000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
B31000
unkown
page execute read
8BD000
trusted library allocation
page execute and read and write
84F8000
heap
page read and write
8CA000
trusted library allocation
page execute and read and write
3671000
heap
page read and write
1DEF39C4000
trusted library allocation
page read and write
1D28000
direct allocation
page execute and read and write
3409000
heap
page read and write
3CAD000
direct allocation
page execute and read and write
3433000
heap
page read and write
3EA2000
unclassified section
page read and write
1DEF1D62000
heap
page read and write
84C1000
heap
page read and write
F10000
unkown
page readonly
4E9C000
stack
page read and write
39B6000
unkown
page read and write
1DEF39BE000
trusted library allocation
page read and write
B9E000
stack
page read and write
37AE000
unkown
page execute and read and write
1B7E000
direct allocation
page execute and read and write
3670000
heap
page read and write
337B000
heap
page read and write
8A3000
trusted library allocation
page execute and read and write
1DEF3900000
trusted library allocation
page read and write
B3E000
stack
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
31B9C000
system
page read and write
343D000
heap
page read and write
3671000
heap
page read and write
3433000
heap
page read and write
3404000
heap
page read and write
2C00000
unkown
page readonly
4BAE000
unkown
page execute and read and write
343D000
heap
page read and write
3671000
heap
page read and write
133E000
stack
page read and write
1350000
unkown
page read and write
340E000
heap
page read and write
59BE000
stack
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
B31000
unkown
page execute read
5929000
system
page execute and read and write
3671000
heap
page read and write
59D0000
heap
page read and write
3671000
heap
page read and write
3CEE000
unclassified section
page execute and read and write
4C10000
heap
page read and write
10D0000
heap
page read and write
3671000
heap
page read and write
B30000
unkown
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
B47000
unkown
page readonly
1DEF1D00000
heap
page read and write
70E0000
trusted library allocation
page execute and read and write
495A000
unclassified section
page read and write
B11000
unkown
page readonly
1E30000
unclassified section
page execute and read and write
1498000
heap
page read and write
168F000
stack
page read and write
84C1000
heap
page read and write
33E6000
heap
page read and write
306C000
stack
page read and write
3671000
heap
page read and write
2980000
unkown
page read and write
2DE000
unkown
page readonly
3671000
heap
page read and write
1DEF1D5B000
heap
page read and write
12FC000
stack
page read and write
1430000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3381000
heap
page read and write
3671000
heap
page read and write
33D4000
heap
page read and write
3671000
heap
page read and write
A00000
unkown
page readonly
344F000
heap
page read and write
3D30000
trusted library allocation
page execute and read and write
343D000
heap
page read and write
8B3F000
stack
page read and write
6FAE000
heap
page read and write
3671000
heap
page read and write
8502000
heap
page read and write
37A000
stack
page read and write
33E6000
heap
page read and write
33D9000
heap
page read and write
4EB0000
trusted library section
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3404000
heap
page read and write
8FF000
heap
page read and write
3649000
trusted library allocation
page read and write
84B3000
heap
page read and write
3404000
heap
page read and write
3671000
heap
page read and write
B3E000
unkown
page readonly
14AF000
heap
page read and write
3671000
heap
page read and write
5980000
system
page execute and read and write
3433000
heap
page read and write
3671000
heap
page read and write
1C91000
direct allocation
page execute and read and write
342D000
heap
page read and write
3671000
heap
page read and write
3D22000
direct allocation
page execute and read and write
33D4000
heap
page read and write
342D000
heap
page read and write
3438000
heap
page read and write
342D000
heap
page read and write
3671000
heap
page read and write
263F000
stack
page read and write
3795000
heap
page read and write
6BC2000
trusted library allocation
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
343D000
heap
page read and write
33CF000
heap
page read and write
1395000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
344F000
heap
page read and write
6A20000
trusted library allocation
page read and write
33CF000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
6B90000
trusted library allocation
page read and write
3433000
heap
page read and write
47C8000
unclassified section
page read and write
B31000
unkown
page execute read
3407000
heap
page read and write
2641000
trusted library allocation
page read and write
B11000
unkown
page readonly
337B000
heap
page read and write
D30000
heap
page execute and read and write
4BA6000
trusted library allocation
page read and write
A10000
unkown
page readonly
32144000
system
page read and write
A7A000
stack
page read and write
8BBF000
stack
page read and write
39CD000
heap
page read and write
AD0000
unkown
page readonly
3940000
trusted library allocation
page read and write
FF0000
unkown
page read and write
33BF000
heap
page read and write
1CA6000
direct allocation
page execute and read and write
343D000
heap
page read and write
33D4000
heap
page read and write
AB0000
unkown
page readonly
3890000
trusted library allocation
page read and write
3671000
heap
page read and write
33E6000
heap
page read and write
3940000
trusted library allocation
page read and write
32E0000
heap
page read and write
3162000
unkown
page read and write
4C20000
trusted library allocation
page read and write
137A000
stack
page read and write
337B000
heap
page read and write
33D2000
heap
page read and write
4BD0000
trusted library allocation
page read and write
1DEF3800000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
F10000
unkown
page readonly
84CB000
heap
page read and write
3671000
heap
page read and write
5BAF000
stack
page read and write
1350000
unkown
page read and write
2BFF000
stack
page read and write
3E9A000
trusted library allocation
page read and write
1DEF39CE000
trusted library allocation
page read and write
84C1000
heap
page read and write
31A82000
system
page read and write
3409000
heap
page read and write
84E4000
heap
page read and write
33CF000
heap
page read and write
4BF0000
trusted library allocation
page read and write
33C5000
heap
page read and write
3407000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
33CF000
heap
page read and write
32F0000
heap
page read and write
50B0000
heap
page read and write
340E000
heap
page read and write
3372000
heap
page read and write
3438000
heap
page read and write
3671000
heap
page read and write
3409000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
796E000
stack
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
2AF0000
heap
page read and write
14B0000
heap
page read and write
B3E000
unkown
page readonly
995000
heap
page read and write
AD0000
unkown
page readonly
342D000
heap
page read and write
3671000
heap
page read and write
84C0000
heap
page read and write
33D2000
heap
page read and write
33CF000
heap
page read and write
B31000
unkown
page execute read
3671000
heap
page read and write
922000
heap
page read and write
4636000
unclassified section
page read and write
B30000
unkown
page readonly
33D4000
heap
page read and write
33D2000
heap
page read and write
713D000
stack
page read and write
3671000
heap
page read and write
8504000
heap
page read and write
33C5000
heap
page read and write
33C5000
heap
page read and write
8507000
heap
page read and write
33D2000
heap
page read and write
AF0000
heap
page read and write
84C1000
heap
page read and write
84C1000
heap
page read and write
3671000
heap
page read and write
11D0000
unkown
page readonly
84C1000
heap
page read and write
3671000
heap
page read and write
340E000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
337B000
heap
page read and write
342D000
heap
page read and write
4BB2000
trusted library allocation
page read and write
3407000
heap
page read and write
AB0000
unkown
page readonly
3671000
heap
page read and write
1DEF1C10000
heap
page read and write
840000
heap
page read and write
3671000
heap
page read and write
33C5000
heap
page read and write
3671000
heap
page read and write
3824000
unkown
page read and write
2A54000
heap
page read and write
33D9000
heap
page read and write
3671000
heap
page read and write
792F000
stack
page read and write
33D4000
heap
page read and write
3671000
heap
page read and write
B47000
unkown
page readonly
3438000
heap
page read and write
3404000
heap
page read and write
33D2000
heap
page read and write
44A4000
unclassified section
page read and write
3671000
heap
page read and write
51BE000
stack
page read and write
337B000
heap
page read and write
3671000
heap
page read and write
340E000
heap
page read and write
AF0000
trusted library allocation
page read and write
A10000
unkown
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
503E000
stack
page read and write
8B3000
trusted library allocation
page read and write
8A4000
trusted library allocation
page read and write
3438000
heap
page read and write
B47000
unkown
page readonly
3671000
heap
page read and write
5A07000
heap
page read and write
914000
heap
page read and write
3407000
heap
page read and write
3671000
heap
page read and write
1E2F000
stack
page read and write
3671000
heap
page read and write
3433000
heap
page read and write
3671000
heap
page read and write
342D000
heap
page read and write
1DEF39A5000
trusted library allocation
page read and write
1DEF1AF0000
system
page execute and read and write
33E6000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3409000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
2F20000
heap
page read and write
80D000
stack
page read and write
1370000
unkown
page readonly
2A50000
heap
page read and write
33C5000
heap
page read and write
4C90000
trusted library allocation
page execute and read and write
3671000
heap
page read and write
B45000
unkown
page read and write
1DEF3640000
trusted library allocation
page read and write
341B000
heap
page read and write
33BF000
heap
page read and write
3671000
heap
page read and write
19E0000
direct allocation
page execute and read and write
1341000
unkown
page readonly
3671000
heap
page read and write
1370000
unkown
page readonly
142E000
stack
page read and write
50B5000
heap
page read and write
3671000
heap
page read and write
8C2000
trusted library allocation
page read and write
3958000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3E0000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
343D000
heap
page read and write
3070000
unkown
page readonly
84C1000
heap
page read and write
84C1000
heap
page read and write
8EE000
heap
page read and write
341B000
heap
page read and write
8ABD000
stack
page read and write
AC0000
heap
page read and write
33CF000
heap
page read and write
33BF000
heap
page read and write
327C000
unkown
page read and write
FB0000
unkown
page readonly
4EC0000
heap
page read and write
4C70000
heap
page read and write
3671000
heap
page read and write
3B48000
unkown
page read and write
3407000
heap
page read and write
340E000
heap
page read and write
341B000
heap
page read and write
33D2000
heap
page read and write
3671000
heap
page read and write
1DEF1D62000
heap
page read and write
3671000
heap
page read and write
1390000
heap
page read and write
50A0000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
33D9000
heap
page read and write
258E7FD000
stack
page read and write
8C6000
trusted library allocation
page execute and read and write
3671000
heap
page read and write
4B84000
trusted library allocation
page read and write
AE0000
unkown
page readonly
2F24000
heap
page read and write
84C1000
heap
page read and write
3671000
heap
page read and write
340E000
heap
page read and write
1A20000
unkown
page readonly
84C1000
heap
page read and write
4B9E000
trusted library allocation
page read and write
3671000
heap
page read and write
6B70000
trusted library section
page read and write
B30000
unkown
page readonly
26EB000
trusted library allocation
page read and write
3671000
heap
page read and write
14B7000
heap
page read and write
1460000
heap
page read and write
33E6000
heap
page read and write
84C1000
heap
page read and write
1DEF1D5F000
heap
page read and write
1560000
unkown
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
592C000
system
page execute and read and write
3671000
heap
page read and write
373C000
unkown
page execute and read and write
3370000
heap
page read and write
10CF000
stack
page read and write
84C1000
heap
page read and write
B45000
unkown
page read and write
3671000
heap
page read and write
344F000
heap
page read and write
33BD000
heap
page read and write
33D2000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
39E0000
direct allocation
page execute and read and write
2A54000
heap
page read and write
84C1000
heap
page read and write
3671000
heap
page read and write
6FA0000
heap
page read and write
84D8000
heap
page read and write
3438000
heap
page read and write
343C000
unkown
page read and write
258F7FE000
stack
page read and write
3671000
heap
page read and write
3B09000
direct allocation
page execute and read and write
F00000
unkown
page readonly
33C5000
heap
page read and write
84C1000
heap
page read and write
3671000
heap
page read and write
33BF000
heap
page read and write
84C1000
heap
page read and write
3671000
heap
page read and write
343D000
heap
page read and write
84C1000
heap
page read and write
3671000
heap
page read and write
4B80000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
B3E000
unkown
page readonly
84FD000
heap
page read and write
3304000
heap
page read and write
33D9000
heap
page read and write
341B000
heap
page read and write
1DEF1B7B000
system
page execute and read and write
3671000
heap
page read and write
187F000
stack
page read and write
84C1000
heap
page read and write
341B000
heap
page read and write
3671000
heap
page read and write
BEE000
stack
page read and write
3671000
heap
page read and write
4C80000
trusted library allocation
page read and write
342D000
heap
page read and write
4CA0000
trusted library allocation
page read and write
31B42000
system
page read and write
D60000
trusted library allocation
page execute and read and write
3671000
heap
page read and write
33CF000
heap
page read and write
3671000
heap
page read and write
86FC000
stack
page read and write
FC0000
unkown
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
B00000
unkown
page read and write
3671000
heap
page read and write
926000
heap
page read and write
1470000
unkown
page read and write
3407000
heap
page read and write
3372000
heap
page read and write
EFC000
stack
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
D80000
trusted library allocation
page read and write
84FD000
heap
page read and write
F7A000
stack
page read and write
9AD000
heap
page read and write
341B000
heap
page read and write
3671000
heap
page read and write
2F0E000
stack
page read and write
B47000
unkown
page readonly
33C5000
heap
page read and write
3671000
heap
page read and write
3368000
heap
page read and write
13E0000
heap
page read and write
3404000
heap
page read and write
341B000
heap
page read and write
3671000
heap
page read and write
3940000
trusted library allocation
page read and write
3409000
heap
page read and write
6F7000
stack
page read and write
3671000
heap
page read and write
890000
trusted library allocation
page read and write
33D9000
heap
page read and write
1DEF1B79000
system
page execute and read and write
33D4000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
33E6000
heap
page read and write
1970000
heap
page read and write
33D2000
heap
page read and write
10D8000
heap
page read and write
1560000
unkown
page readonly
3B0D000
direct allocation
page execute and read and write
1DEF1D4C000
heap
page read and write
2C00000
unkown
page readonly
3671000
heap
page read and write
31D5C000
system
page read and write
3671000
heap
page read and write
3404000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
1DEF1D30000
heap
page read and write
39BE000
stack
page read and write
33BF000
heap
page read and write
3774000
heap
page read and write
92A000
heap
page read and write
3F0000
heap
page read and write
2CF0000
unkown
page execute and read and write
3671000
heap
page read and write
33CF000
heap
page read and write
EFC000
stack
page read and write
3671000
heap
page read and write
1DEF3901000
trusted library allocation
page read and write
3671000
heap
page read and write
1490000
heap
page read and write
4BE5000
trusted library allocation
page read and write
28BB000
trusted library allocation
page read and write
B00000
unkown
page read and write
85C0000
trusted library allocation
page read and write
84D0000
heap
page read and write
1DEF3630000
heap
page read and write
8C3F000
stack
page read and write
343D000
heap
page read and write
9F0000
unkown
page readonly
3671000
heap
page read and write
3671000
heap
page read and write
344F000
heap
page read and write
4C85000
trusted library allocation
page read and write
1690000
unkown
page readonly
1DEF380B000
trusted library allocation
page read and write
3377000
heap
page read and write
8DB000
trusted library allocation
page execute and read and write
A7A000
stack
page read and write
3671000
heap
page read and write
2FEB000
stack
page read and write
33D9000
heap
page read and write
395C000
heap
page read and write
33D4000
heap
page read and write
3407000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
84C6000
heap
page read and write
258DFFB000
stack
page read and write
FE0000
heap
page read and write
33E6000
heap
page read and write
84C1000
heap
page read and write
33D9000
heap
page read and write
33CF000
heap
page read and write
C58000
trusted library allocation
page read and write
D2C000
stack
page read and write
3671000
heap
page read and write
BF0000
unkown
page readonly
587F000
stack
page read and write
3671000
heap
page read and write
D90000
heap
page read and write
341B000
heap
page read and write
40BC000
unclassified section
page read and write
3409000
heap
page read and write
3CDA000
unkown
page read and write
3671000
heap
page read and write
3438000
heap
page read and write
3360000
heap
page read and write
337B000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
B20000
unkown
page read and write
33BF000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3433000
heap
page read and write
258EFFE000
stack
page read and write
84C1000
heap
page read and write
1680000
heap
page read and write
344F000
heap
page read and write
6CDE000
stack
page read and write
1341000
unkown
page readonly
9BE000
heap
page read and write
222000
unkown
page readonly
D40000
heap
page read and write
84C1000
heap
page read and write
1CAD000
direct allocation
page execute and read and write
3162000
unkown
page read and write
127C000
stack
page read and write
3671000
heap
page read and write
B3E000
unkown
page readonly
3671000
heap
page read and write
33C0000
heap
page read and write
1DEF3803000
trusted library allocation
page read and write
3370000
heap
page read and write
84C1000
heap
page read and write
340E000
heap
page read and write
1DEF3815000
trusted library allocation
page read and write
B40000
heap
page read and write
33C5000
heap
page read and write
32EE000
unclassified section
page execute and read and write
2A50000
heap
page read and write
3304000
heap
page read and write
33E6000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
BF0000
unkown
page readonly
3404000
heap
page read and write
10D8000
heap
page read and write
B30000
unkown
page readonly
84C1000
heap
page read and write
4ED0000
heap
page execute and read and write
C4E000
stack
page read and write
84EC000
heap
page read and write
3671000
heap
page read and write
33CF000
heap
page read and write
A00000
unkown
page readonly
33C5000
heap
page read and write
33CF000
heap
page read and write
2AF0000
heap
page read and write
33F5000
heap
page read and write
5904000
system
page execute and read and write
B45000
unkown
page read and write
3438000
heap
page read and write
84B0000
trusted library allocation
page read and write
2E30000
unkown
page read and write
41AE000
unkown
page execute and read and write
D16E000
stack
page read and write
3671000
heap
page read and write
8D7000
trusted library allocation
page execute and read and write
1DEF1D3F000
heap
page read and write
1690000
unkown
page readonly
4C82000
trusted library allocation
page read and write
3409000
heap
page read and write
70F0000
trusted library allocation
page read and write
3671000
heap
page read and write
1DEF380E000
trusted library allocation
page read and write
2980000
unkown
page read and write
3671000
heap
page read and write
8AD000
trusted library allocation
page execute and read and write
FC0000
unkown
page readonly
3671000
heap
page read and write
5080000
trusted library allocation
page read and write
4C13000
heap
page read and write
33D4000
heap
page read and write
33D9000
heap
page read and write
3671000
heap
page read and write
12FC000
stack
page read and write
343D000
heap
page read and write
6BA0000
trusted library allocation
page read and write
3671000
heap
page read and write
1480000
unkown
page read and write
84C1000
heap
page read and write
3409000
heap
page read and write
3671000
heap
page read and write
14AE000
stack
page read and write
84C1000
heap
page read and write
33E6000
heap
page read and write
3407000
heap
page read and write
35F0000
heap
page read and write
3671000
heap
page read and write
D98000
heap
page read and write
3671000
heap
page read and write
1470000
unkown
page read and write
AF0000
heap
page read and write
3407000
heap
page read and write
3671000
heap
page read and write
845000
heap
page read and write
3671000
heap
page read and write
11D0000
unkown
page readonly
2F60000
heap
page read and write
10D0000
heap
page read and write
8D2000
trusted library allocation
page read and write
3671000
heap
page read and write
1B09000
direct allocation
page execute and read and write
344F000
heap
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
FD0000
unkown
page readonly
3671000
heap
page read and write
907000
heap
page read and write
3222000
unkown
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
3B7E000
direct allocation
page execute and read and write
8730000
heap
page read and write
5CEF000
stack
page read and write
B45000
unkown
page read and write
590D000
system
page execute and read and write
3433000
heap
page read and write
97E000
heap
page read and write
3238000
stack
page read and write
1DEF3510000
heap
page read and write
F7A000
stack
page read and write
5090000
trusted library allocation
page execute and read and write
33D2000
heap
page read and write
3671000
heap
page read and write
F00000
unkown
page readonly
2F60000
heap
page read and write
3671000
heap
page read and write
33D9000
heap
page read and write
3671000
heap
page read and write
507E000
stack
page read and write
4FE0000
heap
page read and write
3671000
heap
page read and write
1DEF3821000
trusted library allocation
page read and write
3404000
heap
page read and write
1880000
direct allocation
page read and write
3671000
heap
page read and write
3671000
heap
page read and write
EF0000
unkown
page readonly
3671000
heap
page read and write
344F000
heap
page read and write
33D4000
heap
page read and write
4BA1000
trusted library allocation
page read and write
FB0000
unkown
page readonly
1DEF3640000
trusted library allocation
page read and write
340E000
heap
page read and write
3671000
heap
page read and write
4A80000
heap
page read and write
3EFC000
unclassified section
page read and write
3404000
heap
page read and write
3671000
heap
page read and write
59C0000
heap
page read and write
287C000
unclassified section
page execute and read and write
4EA0000
trusted library allocation
page read and write
5BEE000
stack
page read and write
3407000
heap
page read and write
3304000
heap
page read and write
342D000
heap
page read and write
220000
unkown
page readonly
84DA000
heap
page read and write
591D000
system
page execute and read and write
3671000
heap
page read and write
3671000
heap
page read and write
33D2000
heap
page read and write
3381000
heap
page read and write
FE0000
heap
page read and write
3671000
heap
page read and write
4BC0000
trusted library allocation
page read and write
4FDE000
stack
page read and write
3671000
heap
page read and write
1DEF3810000
trusted library allocation
page read and write
3671000
heap
page read and write
1A20000
unkown
page readonly
7420000
trusted library section
page read and write
341B000
heap
page read and write
28EE000
unclassified section
page execute and read and write
3671000
heap
page read and write
3433000
heap
page read and write
33C5000
heap
page read and write
D70000
heap
page read and write
2F20000
heap
page read and write
2F24000
heap
page read and write
35F0000
trusted library allocation
page read and write
1390000
heap
page read and write
3381000
heap
page read and write
3070000
unkown
page readonly
3671000
heap
page read and write
AC0000
heap
page read and write
3438000
heap
page read and write
3671000
heap
page read and write
There are 823 hidden memdumps, click here to show them.