IOC Report
NF_Payment_Ref_FAN930276.exe

loading gif

Files

File Path
Type
Category
Malicious
NF_Payment_Ref_FAN930276.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NF_Payment_Ref_FAN930276.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ea64OHKq
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NF_Payment_Ref_FAN930276.exe
"C:\Users\user\Desktop\NF_Payment_Ref_FAN930276.exe"
malicious
C:\Users\user\Desktop\NF_Payment_Ref_FAN930276.exe
"C:\Users\user\Desktop\NF_Payment_Ref_FAN930276.exe"
malicious
C:\Users\user\Desktop\NF_Payment_Ref_FAN930276.exe
"C:\Users\user\Desktop\NF_Payment_Ref_FAN930276.exe"
malicious
C:\Program Files (x86)\eROVoFobOWKuBHetsTIgsKlDQIveGpUTdpiHQSbYAGLQaaUshtCAvQAnzb\xIrbjTuvDXL.exe
"C:\Program Files (x86)\eROVoFobOWKuBHetsTIgsKlDQIveGpUTdpiHQSbYAGLQaaUshtCAvQAnzb\xIrbjTuvDXL.exe"
malicious
C:\Windows\SysWOW64\colorcpl.exe
"C:\Windows\SysWOW64\colorcpl.exe"
malicious
C:\Program Files (x86)\eROVoFobOWKuBHetsTIgsKlDQIveGpUTdpiHQSbYAGLQaaUshtCAvQAnzb\xIrbjTuvDXL.exe
"C:\Program Files (x86)\eROVoFobOWKuBHetsTIgsKlDQIveGpUTdpiHQSbYAGLQaaUshtCAvQAnzb\xIrbjTuvDXL.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.gucciqueen.shop/x3by/?nl=Gq0m/cYr7UOoL/rfxlXcWcb0PFgu3v+6IQg5KkZ1GbFCfXnP9OdFnXsg+153ZunkN9E3pnQymCUHBFpvF3MPrj7bwNIl4rM9hQX9D40sB8Q0fvNSVLrWgvNkuIucpqHerw==&dbL=d8WX_v0PGVHXAtK
178.79.184.196
malicious
http://www.givora.site/855d/?nl=2B0ERzH0P28lwthSCfczi4+l4RSaGiycEDtAIyO4xBEaITWb1iLHHs/q7NYM0I/g8MkSYcfxzku7nIYL4eoS8eZDgAyht6z65PzZnN779aUYRwuiIRWQuovW44/rxTRHXQ==&dbL=d8WX_v0PGVHXAtK
162.0.231.203
malicious
http://www.college-help.info/lk0h/
38.88.82.56
malicious
http://www.roopiedutech.online/f01d/
103.191.208.137
malicious
http://www.prediksipreman.fyi/3lre/?nl=/6Vdp+1Y21llHWrnJFgTkMelxgdakbST517P2ezUMEZQpYm2I4KB95g+5G1ZwATxC5oRicPrlKz7UaUXu7WnWVF0YU8xlLcjqFiWcTqSDyUhRRfYLZXOVM1ZwNUIzk+NCQ==&dbL=d8WX_v0PGVHXAtK
162.0.215.244
malicious
http://www.7fh27o.vip/l5ty/
3.33.130.190
malicious
http://www.jexiz.shop/li8d/?nl=sm+xvlFNJ8Jn1MAvBLHfFbmpWDRmMBXnhYuDtN4QDuuoOIQ72IBR7vtXSrP0imT8uQD+i024Jy05gJvrsmbroocsQ5/sNLlweHoyZNleSM2rCzfY5hv0qSgJrhCITOEEHg==&dbL=d8WX_v0PGVHXAtK
8.210.3.99
malicious
http://www.owinvip.net/17h7/
3.33.130.190
malicious
http://www.givora.site/855d/
162.0.231.203
malicious
http://www.2925588.com/jx6k/
103.71.154.12
malicious
http://www.owinvip.net/17h7/?nl=+i5q+uzPXmftyZtNZWFr8MC7YoCmvyBt3jjX/X3oRNPJ70eO25N0w4zqWgP4747OpVXsIhnZv7nMmjeXISBtoaIRC/e00OgY88L+a0UDDIyF3kq1BSJhp/lI21Ai+QA6UQ==&dbL=d8WX_v0PGVHXAtK
3.33.130.190
malicious
http://www.2925588.com/jx6k/?nl=beqWGJ7SP2hkLKuH8Xmdr/HDPWeS3cMOlVU3zrC7D+GWWG+2bEVKgJQW/9jqYGl3wiT++u8kPbwe1lvFRaGrQmwW5G4wa8+lbGyMUfdWvdM0+8z00F7HMhpKv8gPeACQcQ==&dbL=d8WX_v0PGVHXAtK
103.71.154.12
malicious
http://www.ila.beauty/izfe/?nl=ZqR1VSau/njxt8ya9FYdrisRnPwESR8PWK+oFQcVqsUu7dENmwaUoGLSs5vyS4FhQGGlB6r8hHtwTYfK8h1233SUSY5+fAIxnLEAPxNpmpufjlKG3bng8CVsKsGNybcU1g==&dbL=d8WX_v0PGVHXAtK
13.248.169.48
malicious
http://www.meanttobebroken.org/9g6s/
141.193.213.10
malicious
http://www.prediksipreman.fyi/3lre/
162.0.215.244
malicious
http://www.timizoasisey.shop/3p0l/?dbL=d8WX_v0PGVHXAtK&nl=4Jzo6X1Gluc/SF20pEVAyAZrEiE76xvvY+EfZYFlmMajnWRT/uq2dkdTzHDiVdaw3QhDvVFcv5rBuyftUViEMVRHp90uGCn944ajrH63wHv4zzWs5+CZDXB+Ld7sX0D68A==
188.114.96.3
malicious
http://www.timizoasisey.shop/3p0l/
188.114.96.3
malicious
http://www.roopiedutech.online/f01d/?nl=BGh1WRbt41ta6S2FBwbFkSvU00HbY3eh/tMOUMfhmAze8NROyFh0EV68tSphjf8OeMOb/ck28qXApfwtDELR0J5SPWkS+xOxljfz11yABU5EX0aP/5qC9r+4s36BWCggxQ==&dbL=d8WX_v0PGVHXAtK
103.191.208.137
malicious
http://www.jexiz.shop/li8d/
8.210.3.99
malicious
http://www.wrl-llc.net/6o8s/
3.33.130.190
malicious
http://www.rebel.tienda/7n9v/
199.59.243.227
malicious
http://www.gucciqueen.shop/x3by/
178.79.184.196
malicious
http://www.ila.beauty/izfe/
13.248.169.48
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://meanttobebroken.org/9g6s/?nl=l/X
unknown
http://www.roopiedutech.online
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.jexiz.shop/li8d/?nl=sm
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.rebel.tienda
199.59.243.227
malicious
www.timizoasisey.shop
188.114.96.3
malicious
jexiz.shop
8.210.3.99
malicious
7fh27o.vip
3.33.130.190
malicious
prediksipreman.fyi
162.0.215.244
malicious
roopiedutech.online
103.191.208.137
malicious
www.ila.beauty
13.248.169.48
malicious
www.givora.site
162.0.231.203
malicious
www.college-help.info
38.88.82.56
malicious
owinvip.net
3.33.130.190
malicious
ladylawher.org
3.33.130.190
malicious
gucciqueen.shop
178.79.184.196
malicious
www.meanttobebroken.org
141.193.213.10
malicious
www.2925588.com
103.71.154.12
malicious
wrl-llc.net
3.33.130.190
malicious
www.prediksipreman.fyi
unknown
www.7fh27o.vip
unknown
www.ladylawher.org
unknown
www.wrl-llc.net
unknown
www.gucciqueen.shop
unknown
www.jexiz.shop
unknown
www.roopiedutech.online
unknown
www.xtelify.tech
unknown
www.owinvip.net
unknown
There are 14 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
141.193.213.10
www.meanttobebroken.org
United States
malicious
162.0.215.244
prediksipreman.fyi
Canada
malicious
13.248.169.48
www.ila.beauty
United States
malicious
162.0.231.203
www.givora.site
Canada
malicious
38.88.82.56
www.college-help.info
United States
malicious
178.79.184.196
gucciqueen.shop
United Kingdom
malicious
188.114.96.3
www.timizoasisey.shop
European Union
malicious
103.191.208.137
roopiedutech.online
unknown
malicious
103.71.154.12
www.2925588.com
Hong Kong
malicious
199.59.243.227
www.rebel.tienda
United States
malicious
3.33.130.190
7fh27o.vip
United States
malicious
8.210.3.99
jexiz.shop
Singapore
malicious
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
50A0000
trusted library allocation
page read and write
malicious
2AA0000
unkown
page execute and read and write
malicious
1E20000
unclassified section
page execute and read and write
malicious
4E20000
unclassified section
page execute and read and write
malicious
3040000
system
page execute and read and write
malicious
3770000
trusted library allocation
page read and write
malicious
2790000
unkown
page read and write
1D5D000
direct allocation
page execute and read and write
284C000
trusted library allocation
page read and write
37C0000
heap
page read and write
261B000
trusted library allocation
page execute and read and write
4ED2000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
328C000
unkown
page read and write
4ED1000
heap
page read and write
113C000
stack
page read and write
37E2000
heap
page read and write
385A000
heap
page read and write
29EB391F000
heap
page read and write
797000
unkown
page readonly
DEF000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
85D8000
heap
page read and write
37E6000
heap
page read and write
DA0000
unkown
page readonly
1160000
unkown
page readonly
3774000
unkown
page execute and read and write
4ED1000
heap
page read and write
37E6000
heap
page read and write
6C1E000
unkown
page read and write
15CE000
stack
page read and write
67F2000
unclassified section
page read and write
97E000
heap
page read and write
2EB4000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
E50000
unkown
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4D70000
heap
page read and write
59DD000
stack
page read and write
1D56000
direct allocation
page execute and read and write
4E02000
trusted library allocation
page read and write
30CC000
unkown
page read and write
4ED1000
heap
page read and write
27E0000
heap
page execute and read and write
29AF000
stack
page read and write
37E1000
heap
page read and write
9A5000
heap
page read and write
4ED1000
heap
page read and write
64CE000
unclassified section
page read and write
4096000
trusted library allocation
page read and write
5CF4000
unclassified section
page read and write
4ED1000
heap
page read and write
E0B000
unkown
page read and write
5255000
heap
page read and write
A51000
heap
page read and write
8690000
heap
page read and write
1620000
heap
page read and write
4ED1000
heap
page read and write
4DD0000
heap
page execute and read and write
86FF000
heap
page read and write
2801000
trusted library allocation
page read and write
4ED1000
heap
page read and write
795000
unkown
page read and write
B0E000
stack
page read and write
20F4000
unclassified section
page execute and read and write
4ED1000
heap
page read and write
5572000
direct allocation
page execute and read and write
125E000
heap
page read and write
4ED1000
heap
page read and write
27F0000
heap
page read and write
4ED1000
heap
page read and write
797000
unkown
page readonly
7F200000
trusted library allocation
page execute and read and write
71E2000
trusted library allocation
page read and write
E4F000
stack
page read and write
8670000
trusted library allocation
page read and write
A1B000
heap
page read and write
797000
unkown
page readonly
4ED1000
heap
page read and write
CEF000
stack
page read and write
27C0000
heap
page read and write
868B000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
5359000
direct allocation
page execute and read and write
1500000
unkown
page readonly
4ED1000
heap
page read and write
1238000
heap
page read and write
2EB0000
heap
page read and write
86CA000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
30C0000
heap
page read and write
8BA000
stack
page read and write
51D0000
trusted library allocation
page read and write
2E9F000
stack
page read and write
1460000
heap
page read and write
25ED000
trusted library allocation
page execute and read and write
5E86000
unclassified section
page read and write
6AE0000
heap
page read and write
4DA0000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
33762000
system
page read and write
E50000
unkown
page read and write
4E10000
trusted library allocation
page execute and read and write
4D2D000
trusted library allocation
page read and write
85DB000
heap
page read and write
4ED1000
heap
page read and write
797000
unkown
page readonly
86F6000
heap
page read and write
86F9000
heap
page read and write
3397C000
system
page read and write
1321000
unkown
page readonly
4ED1000
heap
page read and write
3998000
unkown
page read and write
86F5000
heap
page read and write
4ED1000
heap
page read and write
3869000
heap
page read and write
4ED1000
heap
page read and write
385F000
heap
page read and write
33D64000
system
page read and write
978000
heap
page read and write
1220000
unkown
page readonly
B360000
trusted library section
page read and write
4ED1000
heap
page read and write
5739000
system
page execute and read and write
51A0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
850000
unkown
page readonly
37DD000
heap
page read and write
70DE000
stack
page read and write
5090000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
8BA000
stack
page read and write
2600000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
52F0000
trusted library allocation
page read and write
86BB000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
11E0000
unkown
page read and write
35D4000
heap
page read and write
4ED1000
heap
page read and write
34F4000
unclassified section
page execute and read and write
4ED1000
heap
page read and write
8719000
heap
page read and write
78E000
unkown
page readonly
2CF0000
unkown
page read and write
4ED1000
heap
page read and write
2AF4000
unclassified section
page execute and read and write
487D000
stack
page read and write
11E0000
unkown
page read and write
6FCC000
unclassified section
page read and write
1470000
heap
page read and write
1220000
unkown
page readonly
2630000
trusted library allocation
page read and write
59E0000
heap
page read and write
8709000
heap
page read and write
4ED1000
heap
page read and write
15D0000
heap
page read and write
4ED1000
heap
page read and write
343F000
stack
page read and write
4ED1000
heap
page read and write
5230000
trusted library section
page read and write
2845000
trusted library allocation
page read and write
4ED1000
heap
page read and write
D90000
unkown
page readonly
5730000
system
page execute and read and write
35D4000
heap
page read and write
86C1000
heap
page read and write
B10000
heap
page read and write
2FB2000
unkown
page read and write
29EB391A000
heap
page read and write
4ED1000
heap
page read and write
E90000
heap
page read and write
5749000
system
page execute and read and write
4ED1000
heap
page read and write
590C000
unclassified section
page read and write
29EB3950000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
85CE000
stack
page read and write
4ED1000
heap
page read and write
2770000
unkown
page readonly
86CC000
heap
page read and write
11F1000
unkown
page readonly
DB0000
unkown
page readonly
2FB2000
unkown
page read and write
4ED1000
heap
page read and write
3809000
trusted library allocation
page read and write
389C000
heap
page read and write
4ED1000
heap
page read and write
5060000
heap
page read and write
89C0000
heap
page read and write
8686000
heap
page read and write
1230000
heap
page read and write
25E4000
trusted library allocation
page read and write
6F20000
heap
page read and write
494C000
unkown
page read and write
2790000
unkown
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
3826000
heap
page read and write
780000
unkown
page readonly
6F1E000
stack
page read and write
1200000
unkown
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4628000
unkown
page read and write
2D00000
unkown
page read and write
8882000
heap
page read and write
4ED1000
heap
page read and write
4D60000
trusted library allocation
page read and write
DA0000
unkown
page readonly
37C8000
heap
page read and write
709E000
stack
page read and write
51A0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
29B0000
unkown
page readonly
29EB5190000
trusted library allocation
page read and write
58AC000
unkown
page read and write
37DB000
heap
page read and write
29EB5120000
heap
page read and write
6660000
unclassified section
page read and write
56F2000
unclassified section
page read and write
521E000
stack
page read and write
3E4E000
unkown
page read and write
8C1E000
stack
page read and write
11CE000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
3839000
heap
page read and write
4ED1000
heap
page read and write
1170000
unkown
page readonly
29EB3820000
heap
page read and write
124F000
heap
page read and write
3FE0000
unkown
page read and write
86E0000
heap
page read and write
FAB000
stack
page read and write
29EB3785000
system
page execute and read and write
F3D0BFE000
stack
page read and write
2602000
trusted library allocation
page read and write
4ED1000
heap
page read and write
28A4000
heap
page read and write
960000
heap
page read and write
840000
unkown
page readonly
9B1000
heap
page read and write
11F1000
unkown
page readonly
4D26000
trusted library allocation
page read and write
F90000
unkown
page readonly
E98000
heap
page read and write
28A0000
heap
page read and write
8695000
heap
page read and write
3839000
heap
page read and write
4ED1000
heap
page read and write
337BC000
system
page read and write
3897000
heap
page read and write
4B2000
unkown
page readonly
4D1E000
trusted library allocation
page read and write
28A4000
heap
page read and write
B11D000
stack
page read and write
35D0000
heap
page read and write
29EB54BE000
trusted library allocation
page read and write
C10000
unkown
page readonly
DB0000
unkown
page readonly
382A000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
1500000
unkown
page readonly
5580000
trusted library allocation
page execute and read and write
37EC000
heap
page read and write
4ED1000
heap
page read and write
386C000
heap
page read and write
113C000
stack
page read and write
FE8000
stack
page read and write
4ED1000
heap
page read and write
B15000
heap
page read and write
336A2000
system
page read and write
37E6000
heap
page read and write
781000
unkown
page execute read
4ED1000
heap
page read and write
9B3000
heap
page read and write
1200000
unkown
page read and write
37E6000
heap
page read and write
4B0000
unkown
page readonly
1BB9000
direct allocation
page execute and read and write
11D0000
heap
page read and write
5250000
heap
page read and write
52D0000
trusted library allocation
page read and write
78E000
unkown
page readonly
795000
unkown
page read and write
C20000
heap
page read and write
4ED1000
heap
page read and write
277E000
stack
page read and write
830000
unkown
page readonly
1720000
heap
page read and write
29EB3910000
heap
page read and write
11CE000
stack
page read and write
4DF0000
heap
page read and write
37DB000
heap
page read and write
4D80000
trusted library allocation
page read and write
2D10000
unkown
page read and write
4ED1000
heap
page read and write
4FE0000
trusted library allocation
page execute and read and write
29EB5303000
trusted library allocation
page read and write
850000
unkown
page readonly
4FD0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
29EB54CE000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4ED1000
heap
page read and write
8820000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
11D5000
heap
page read and write
4ED1000
heap
page read and write
4D73000
heap
page read and write
27BC000
stack
page read and write
D3E000
stack
page read and write
9BC000
stack
page read and write
29EB54C4000
trusted library allocation
page read and write
3834000
heap
page read and write
29EB3942000
heap
page read and write
78E000
unkown
page readonly
4ED1000
heap
page read and write
2612000
trusted library allocation
page read and write
1D41000
direct allocation
page execute and read and write
2A91000
trusted library allocation
page read and write
4ED1000
heap
page read and write
E98000
heap
page read and write
F3CFBFE000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
2606000
trusted library allocation
page execute and read and write
1160000
unkown
page readonly
A70000
heap
page read and write
37E1000
heap
page read and write
4ED1000
heap
page read and write
29EB5300000
trusted library allocation
page read and write
E70000
unkown
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
86A4000
heap
page read and write
4ED1000
heap
page read and write
27D0000
heap
page read and write
37EB000
heap
page read and write
29B0000
unkown
page readonly
4D50000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
6E3A000
unclassified section
page read and write
51B4000
heap
page read and write
535D000
direct allocation
page execute and read and write
8D1F000
stack
page read and write
2D90000
heap
page read and write
2770000
unkown
page readonly
4ED1000
heap
page read and write
4ED1000
heap
page read and write
27D0000
heap
page read and write
4CE0000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
86FA000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
970000
heap
page read and write
10FC000
stack
page read and write
8705000
heap
page read and write
4ED1000
heap
page read and write
387F000
heap
page read and write
781000
unkown
page execute read
85D4000
heap
page read and write
4ED1000
heap
page read and write
795000
unkown
page read and write
14FF000
stack
page read and write
5310000
trusted library allocation
page read and write
4057000
trusted library allocation
page read and write
1150000
unkown
page readonly
1A1F000
stack
page read and write
52E0000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
C00000
unkown
page readonly
840000
unkown
page readonly
29EB5321000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
870D000
heap
page read and write
780000
unkown
page readonly
61AA000
unclassified section
page read and write
F3CF3FE000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
D40000
heap
page read and write
9F0000
unkown
page readonly
4ED1000
heap
page read and write
830000
unkown
page readonly
37DD000
heap
page read and write
86C6000
heap
page read and write
6984000
unclassified section
page read and write
38A1000
heap
page read and write
4ED1000
heap
page read and write
29EB5400000
trusted library allocation
page read and write
1600000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
3834000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
29EB3710000
system
page execute and read and write
38B5000
heap
page read and write
4ED1000
heap
page read and write
29EB54B0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
C10000
unkown
page readonly
1DD8000
direct allocation
page execute and read and write
2839000
trusted library allocation
page read and write
3072000
unkown
page read and write
8D4F000
stack
page read and write
25F3000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
E61000
unkown
page readonly
780000
unkown
page readonly
4ED1000
heap
page read and write
47BA000
unkown
page read and write
59F0000
heap
page read and write
4ED1000
heap
page read and write
1170000
unkown
page readonly
4D0B000
trusted library allocation
page read and write
5050000
trusted library section
page readonly
4ED1000
heap
page read and write
2D74000
unkown
page execute and read and write
328C000
unkown
page read and write
D40000
heap
page read and write
6018000
unclassified section
page read and write
14FF000
stack
page read and write
4ED1000
heap
page read and write
11D0000
heap
page read and write
4D65000
trusted library allocation
page read and write
72F0000
unclassified section
page read and write
4C70000
unkown
page read and write
4ED1000
heap
page read and write
C20000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
78E000
unkown
page readonly
3674000
unkown
page read and write
29EB5190000
trusted library allocation
page read and write
4ED1000
heap
page read and write
3570000
heap
page read and write
29EB530B000
trusted library allocation
page read and write
4ED1000
heap
page read and write
11FB000
stack
page read and write
3872000
heap
page read and write
ACE000
stack
page read and write
103A000
stack
page read and write
4FDD000
heap
page read and write
50F0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
5FA000
stack
page read and write
4ED1000
heap
page read and write
2617000
trusted library allocation
page execute and read and write
3806000
unkown
page read and write
3770000
trusted library allocation
page read and write
383E000
heap
page read and write
56C0000
system
page execute and read and write
29EB5180000
heap
page read and write
4ED1000
heap
page read and write
9F0000
unkown
page readonly
574C000
unclassified section
page read and write
31E0000
heap
page read and write
4ED1000
heap
page read and write
6D1E000
stack
page read and write
4ED1000
heap
page read and write
2CF0000
unkown
page read and write
4ED1000
heap
page read and write
29EB5200000
trusted library allocation
page read and write
4ED1000
heap
page read and write
383E000
heap
page read and write
4ED1000
heap
page read and write
9BC000
stack
page read and write
5087000
heap
page read and write
29EB393B000
heap
page read and write
6B16000
unclassified section
page read and write
1150000
unkown
page readonly
780000
unkown
page readonly
5230000
direct allocation
page execute and read and write
8698000
heap
page read and write
4FF5000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
E61000
unkown
page readonly
51B0000
heap
page read and write
4ED1000
heap
page read and write
5210000
trusted library allocation
page execute and read and write
2EB0000
heap
page read and write
86EF000
heap
page read and write
5755000
system
page execute and read and write
2EC0000
unkown
page readonly
4ED1000
heap
page read and write
1A20000
direct allocation
page read and write
4ED0000
heap
page read and write
AB58000
trusted library allocation
page read and write
8B1E000
stack
page read and write
1A90000
direct allocation
page execute and read and write
25D0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
86FF000
heap
page read and write
795000
unkown
page read and write
1180000
heap
page read and write
1628000
heap
page read and write
1238000
heap
page read and write
4ED1000
heap
page read and write
5080000
trusted library allocation
page read and write
4ED1000
heap
page read and write
8702000
heap
page read and write
89AE000
stack
page read and write
103A000
stack
page read and write
4ED1000
heap
page read and write
5070000
heap
page read and write
1180000
heap
page read and write
25FD000
trusted library allocation
page execute and read and write
86E3000
heap
page read and write
29EB393F000
heap
page read and write
3590000
heap
page read and write
A80000
heap
page read and write
3865000
heap
page read and write
4ED1000
heap
page read and write
86E9000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
781000
unkown
page execute read
4ED1000
heap
page read and write
998000
heap
page read and write
25E3000
trusted library allocation
page execute and read and write
8848000
heap
page read and write
A1F000
heap
page read and write
158E000
stack
page read and write
4ED1000
heap
page read and write
4172000
unkown
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
6C9D000
unkown
page read and write
8F7000
stack
page read and write
29EB5401000
trusted library allocation
page read and write
382A000
heap
page read and write
4174000
unkown
page execute and read and write
781000
unkown
page execute read
57AC000
system
page execute and read and write
54FD000
direct allocation
page execute and read and write
2610000
trusted library allocation
page read and write
3B2A000
unkown
page read and write
29EB392C000
heap
page read and write
53CE000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
2D90000
heap
page read and write
50B0000
heap
page read and write
6E1E000
stack
page read and write
F3CEBFC000
stack
page read and write
5225000
heap
page read and write
C00000
unkown
page readonly
4D32000
trusted library allocation
page read and write
4304000
unkown
page read and write
1C2E000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
4D21000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
260A000
trusted library allocation
page execute and read and write
504B000
stack
page read and write
705E000
stack
page read and write
8707000
heap
page read and write
A2B000
heap
page read and write
4ED1000
heap
page read and write
29EB5316000
trusted library allocation
page read and write
4ED1000
heap
page read and write
37E6000
heap
page read and write
D90000
unkown
page readonly
4ED1000
heap
page read and write
2EB4000
heap
page read and write
5501000
direct allocation
page execute and read and write
8680000
heap
page read and write
633C000
unclassified section
page read and write
1230000
heap
page read and write
50A0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
F90000
unkown
page readonly
4ED1000
heap
page read and write
4D00000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
4ED1000
heap
page read and write
E07000
heap
page read and write
1BBD000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
5A11000
heap
page read and write
8A1E000
stack
page read and write
4ED1000
heap
page read and write
6C5D000
unkown
page read and write
4CF0000
trusted library allocation
page read and write
E00000
heap
page read and write
4830000
trusted library allocation
page execute and read and write
3891000
heap
page read and write
499C000
stack
page read and write
267E000
stack
page read and write
4496000
unkown
page read and write
384B000
heap
page read and write
1321000
unkown
page readonly
4ED1000
heap
page read and write
8310000
trusted library allocation
page read and write
191F000
stack
page read and write
2D6C000
unkown
page read and write
4ED1000
heap
page read and write
29EB530F000
trusted library allocation
page read and write
4ED1000
heap
page read and write
31DE000
stack
page read and write
4ED1000
heap
page read and write
1891000
unkown
page readonly
4ED1000
heap
page read and write
51E0000
trusted library allocation
page read and write
37EC000
heap
page read and write
4D40000
trusted library allocation
page read and write
2CDE000
stack
page read and write
29EB5313000
trusted library allocation
page read and write
E90000
heap
page read and write
28A0000
heap
page read and write
E70000
unkown
page read and write
35D4000
heap
page read and write
6CA8000
unclassified section
page read and write
276E000
stack
page read and write
1891000
unkown
page readonly
B01D000
stack
page read and write
384B000
heap
page read and write
5632000
unclassified section
page read and write
4ED1000
heap
page read and write
25F0000
trusted library allocation
page read and write
37E6000
heap
page read and write
4ED1000
heap
page read and write
3CBC000
unkown
page read and write
F3D03FF000
stack
page read and write
4ED1000
heap
page read and write
2EC0000
unkown
page readonly
There are 646 hidden memdumps, click here to show them.