IOC Report
Purchase order.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps108642010010Label

Files

File Path
Type
Category
Malicious
Download
Purchase order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\3X4eGJ0_
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 9
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase order.exe
"C:\Users\user\Desktop\Purchase order.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Program Files (x86)\pHedyemeNrsKAMVOMFAyjfTDLetAXNIioubijYnxnSIUMKQotDHpFrTlUUpSWArsrYsOAOl\iveUJ72crs3yyPj.exe
"C:\Program Files (x86)\pHedyemeNrsKAMVOMFAyjfTDLetAXNIioubijYnxnSIUMKQotDHpFrTlUUpSWArsrYsOAOl\O0YtQ5uRw9IF.exe"
malicious
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\SysWOW64\forfiles.exe"
malicious
C:\Program Files (x86)\pHedyemeNrsKAMVOMFAyjfTDLetAXNIioubijYnxnSIUMKQotDHpFrTlUUpSWArsrYsOAOl\iveUJ72crs3yyPj.exe
"C:\Program Files (x86)\pHedyemeNrsKAMVOMFAyjfTDLetAXNIioubijYnxnSIUMKQotDHpFrTlUUpSWArsrYsOAOl\SNNqTZgVgu.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.mslgdkor.xyz/v65o/?PJHp9d=VqSAL9WTV7zchNt/0oSiL6Nu4I33Tdmkfhtz7fksE6sNrHQ8gHPIdfTZPfapnvCf2ySdC7NSRvCAaHzRgotZC8MEAkSWPQHwkIzkhdJVEMoG87S7evgDDAoJKAHwSzvonkDGBYo=&9v0d3=Mp0DRHEP
172.67.205.132
malicious
http://www.v153cbo9xcl49.buzz/7y0v/
199.59.243.228
malicious
http://www.bolaemas88.online/5k0h/
199.59.243.228
malicious
https://duckduckgo.com/ac/?q=
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://duckduckgo.com/?q=
unknown
https://duckduckgo.com/chrome_newtabv20-
unknown
https://github.com/mgravell/protobuf-net
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.v153cbo9xcl49.buzz
unknown
http://nuget.org/packages/ES5
unknown
https://www.google.com
unknown
http://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference
unknown
https://www.ecosia.org/newtab/v20
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://blog.stevenlevithan.com/archives/cross-browser-split
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.mslgdkor.xyz
172.67.205.132
malicious
www.bolaemas88.online
199.59.243.228
94950.bodis.com
199.59.243.228
www.v153cbo9xcl49.buzz
unknown

IPs

IP
Domain
Country
Malicious
172.67.205.132
www.mslgdkor.xyz
United States
malicious
199.59.243.228
www.bolaemas88.online
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
8C0000
trusted library allocation
page read and write
malicious
3481000
trusted library allocation
page read and write
malicious
3980000
unclassified section
page execute and read and write
malicious
4320000
trusted library allocation
page read and write
malicious
5000000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
6500000
trusted library section
page read and write
malicious
600000
system
page execute and read and write
malicious
63C0000
unclassified section
page execute and read and write
malicious
AE0000
system
page execute and read and write
malicious
3956000
trusted library allocation
page read and write
20F4410D000
trusted library allocation
page read and write
43DD000
heap
page read and write
3971000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
39A3000
trusted library allocation
page read and write
1220000
heap
page read and write
39AA000
trusted library allocation
page read and write
4221000
heap
page read and write
3A54000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
5D0000
unkown
page read and write
3A88000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
39DC000
trusted library allocation
page read and write
4221000
heap
page read and write
970000
heap
page read and write
3855000
trusted library allocation
page read and write
454E000
stack
page read and write
450E000
stack
page read and write
30BF000
stack
page read and write
4481000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
3683000
trusted library allocation
page read and write
38F5000
trusted library allocation
page read and write
A14000
heap
page read and write
3664000
trusted library allocation
page read and write
38A6000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
4221000
heap
page read and write
372C000
trusted library allocation
page read and write
4BBC000
unclassified section
page read and write
8A9000
unkown
page readonly
A28000
heap
page read and write
3719000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
20F442A5000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
371E000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
1822000
heap
page read and write
36DD000
trusted library allocation
page read and write
891000
unkown
page execute read
C19000
heap
page read and write
B76000
system
page execute and read and write
4221000
heap
page read and write
4221000
heap
page read and write
1574000
heap
page read and write
28B2000
unkown
page read and write
37F9000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
4221000
heap
page read and write
3639000
trusted library allocation
page read and write
4221000
heap
page read and write
A34000
heap
page read and write
4221000
heap
page read and write
3765000
trusted library allocation
page read and write
20F442BE000
trusted library allocation
page read and write
4221000
heap
page read and write
1570000
heap
page read and write
27F2000
unkown
page read and write
35D5000
trusted library allocation
page read and write
4221000
heap
page read and write
3AEB000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
4221000
heap
page read and write
1170000
heap
page read and write
142E000
stack
page read and write
11A0000
heap
page read and write
AB0000
unkown
page read and write
3631000
trusted library allocation
page read and write
4221000
heap
page read and write
4E0000
unkown
page readonly
38D4000
trusted library allocation
page read and write
3609000
trusted library allocation
page read and write
4221000
heap
page read and write
890000
unkown
page readonly
16D0000
heap
page read and write
4221000
heap
page read and write
4E0000
unkown
page readonly
1820000
unkown
page readonly
37B3000
trusted library allocation
page read and write
4221000
heap
page read and write
3732000
trusted library allocation
page read and write
4346000
heap
page read and write
4221000
heap
page read and write
20F442CE000
trusted library allocation
page read and write
20F426D0000
heap
page read and write
36B7000
trusted library allocation
page read and write
76A1000
heap
page read and write
A23000
heap
page read and write
1A11000
direct allocation
page execute and read and write
4221000
heap
page read and write
36A2000
trusted library allocation
page read and write
7D5F000
stack
page read and write
3A99000
trusted library allocation
page read and write
7706000
heap
page read and write
7E6F000
stack
page read and write
DFC000
stack
page read and write
3B28000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
E74C5FB000
stack
page read and write
3715000
trusted library allocation
page read and write
996000
heap
page read and write
36BF000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
20F44201000
trusted library allocation
page read and write
369A000
trusted library allocation
page read and write
3100000
heap
page read and write
606E000
stack
page read and write
399D000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
37CB000
trusted library allocation
page read and write
1BB1000
unkown
page readonly
4221000
heap
page read and write
36FC000
trusted library allocation
page read and write
20F44000000
trusted library allocation
page read and write
9E8000
heap
page read and write
76B3000
heap
page read and write
37FF000
trusted library allocation
page read and write
4221000
heap
page read and write
37AD000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
7696000
heap
page read and write
A51000
heap
page read and write
1B10000
trusted library allocation
page read and write
4221000
heap
page read and write
3760000
trusted library allocation
page read and write
4221000
heap
page read and write
9CD000
heap
page read and write
20F44200000
trusted library allocation
page read and write
992000
heap
page read and write
472E000
direct allocation
page execute and read and write
38DE000
trusted library allocation
page read and write
3908000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
13F0000
heap
page read and write
16D5000
heap
page read and write
3A27000
trusted library allocation
page read and write
680000
heap
page read and write
51FF000
stack
page read and write
3A77000
trusted library allocation
page read and write
987000
heap
page read and write
6880000
heap
page read and write
1A2D000
direct allocation
page execute and read and write
39F1000
trusted library allocation
page read and write
13C0000
unkown
page readonly
372E000
trusted library allocation
page read and write
5ADE000
stack
page read and write
7719000
heap
page read and write
39E4000
trusted library allocation
page read and write
1431000
unkown
page readonly
3670000
trusted library allocation
page read and write
4221000
heap
page read and write
36E3000
trusted library allocation
page read and write
5C0000
heap
page read and write
3AAC000
trusted library allocation
page read and write
89F000
unkown
page readonly
38FB000
trusted library allocation
page read and write
38A2000
trusted library allocation
page read and write
37A7000
trusted library allocation
page read and write
1A70000
trusted library allocation
page read and write
37ED000
trusted library allocation
page read and write
46BD000
direct allocation
page execute and read and write
3814000
trusted library allocation
page read and write
4221000
heap
page read and write
3C8000
stack
page read and write
1570000
heap
page read and write
374E000
trusted library allocation
page read and write
4221000
heap
page read and write
890000
unkown
page readonly
271C000
system
page read and write
7707000
heap
page read and write
3734000
trusted library allocation
page read and write
4221000
heap
page read and write
45B7000
trusted library allocation
page read and write
37AB000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
770F000
heap
page read and write
162A000
heap
page read and write
1A2D000
trusted library allocation
page execute and read and write
1B80000
unclassified section
page execute and read and write
3C00000
unkown
page execute and read and write
20F42742000
heap
page read and write
6360000
trusted library allocation
page execute and read and write
3982000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
4221000
heap
page read and write
45B5000
trusted library allocation
page read and write
3200000
unkown
page execute and read and write
4221000
heap
page read and write
36D9000
trusted library allocation
page read and write
A57000
heap
page read and write
3780000
trusted library allocation
page read and write
76DC000
heap
page read and write
1820000
unkown
page readonly
7701000
heap
page read and write
1AD0000
trusted library allocation
page read and write
1440000
unkown
page read and write
36DF000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
36F4000
trusted library allocation
page read and write
89F000
unkown
page readonly
4221000
heap
page read and write
18FE000
direct allocation
page execute and read and write
359A000
trusted library allocation
page read and write
4221000
heap
page read and write
47E7000
trusted library allocation
page read and write
394C000
trusted library allocation
page read and write
13D0000
heap
page read and write
769C000
heap
page read and write
378E000
trusted library allocation
page read and write
1815000
heap
page read and write
3792000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
24CC000
stack
page read and write
4221000
heap
page read and write
35E4000
trusted library allocation
page read and write
3808000
trusted library allocation
page read and write
3711000
trusted library allocation
page read and write
8A9000
unkown
page readonly
4221000
heap
page read and write
4221000
heap
page read and write
A51000
heap
page read and write
7D1E000
stack
page read and write
38EF000
trusted library allocation
page read and write
25F4000
heap
page read and write
3EB5000
unclassified section
page execute and read and write
3618000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
4221000
heap
page read and write
3110000
unkown
page readonly
4221000
heap
page read and write
399F000
trusted library allocation
page read and write
3976000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
4223000
heap
page read and write
4221000
heap
page read and write
3622000
trusted library allocation
page read and write
3605000
trusted library allocation
page read and write
4221000
heap
page read and write
611E000
stack
page read and write
20F42717000
heap
page read and write
37B5000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
4221000
heap
page read and write
1245000
heap
page read and write
37E2000
trusted library allocation
page read and write
17E0000
heap
page read and write
3954000
trusted library allocation
page read and write
7716000
heap
page read and write
358B000
trusted library allocation
page read and write
35B3000
trusted library allocation
page read and write
8A6000
unkown
page read and write
6380000
trusted library allocation
page execute and read and write
AB0000
unkown
page read and write
981000
heap
page read and write
1574000
heap
page read and write
35FF000
trusted library allocation
page read and write
13E0000
unkown
page read and write
4221000
heap
page read and write
37E0000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
3687000
trusted library allocation
page read and write
4221000
heap
page read and write
3959000
trusted library allocation
page read and write
1A57000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
1081000
unkown
page readonly
4221000
heap
page read and write
3762000
trusted library allocation
page read and write
4221000
heap
page read and write
15BE000
stack
page read and write
7DDF000
stack
page read and write
37CD000
trusted library allocation
page read and write
361E000
trusted library allocation
page read and write
A1A000
heap
page read and write
2EB4000
unkown
page read and write
39DA000
trusted library allocation
page read and write
A3F000
heap
page read and write
6420000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
9BC000
stack
page read and write
3A1A000
trusted library allocation
page read and write
4221000
heap
page read and write
7693000
heap
page read and write
4221000
heap
page read and write
389E000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
4221000
heap
page read and write
55A000
stack
page read and write
366A000
trusted library allocation
page read and write
362D000
trusted library allocation
page read and write
362B000
trusted library allocation
page read and write
16B0000
heap
page read and write
37FB000
trusted library allocation
page read and write
76F1000
heap
page read and write
38B000
stack
page read and write
13E0000
unkown
page read and write
38A4000
trusted library allocation
page read and write
3B2A000
trusted library allocation
page read and write
1540000
unkown
page readonly
3ACB000
trusted library allocation
page read and write
392D000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
35E8000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
20F442C4000
trusted library allocation
page read and write
35A2000
trusted library allocation
page read and write
3637000
trusted library allocation
page read and write
4221000
heap
page read and write
390E000
trusted library allocation
page read and write
20F43FA0000
trusted library allocation
page read and write
392B000
trusted library allocation
page read and write
9EC000
heap
page read and write
4221000
heap
page read and write
1A00000
trusted library allocation
page read and write
26FF000
stack
page read and write
67D8000
trusted library section
page read and write
361C000
trusted library allocation
page read and write
1AA8000
direct allocation
page execute and read and write
20F42516000
system
page execute and read and write
38DC000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
B67000
system
page execute and read and write
20F42710000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
3944000
trusted library allocation
page read and write
3A12000
trusted library allocation
page read and write
797D000
stack
page read and write
3973000
trusted library allocation
page read and write
48D2000
direct allocation
page execute and read and write
14FC000
stack
page read and write
5488000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4221000
heap
page read and write
15EF000
stack
page read and write
19DF000
stack
page read and write
5C1E000
stack
page read and write
A1F000
heap
page read and write
369C000
trusted library allocation
page read and write
11EE000
stack
page read and write
5136000
unclassified section
page read and write
4221000
heap
page read and write
76A8000
heap
page read and write
CF0000
unkown
page readonly
379B000
trusted library allocation
page read and write
1AF0000
heap
page read and write
4221000
heap
page read and write
83E000
stack
page read and write
25F0000
heap
page read and write
891000
unkown
page execute read
35A7000
trusted library allocation
page read and write
4797000
trusted library allocation
page read and write
4221000
heap
page read and write
1BB1000
unkown
page readonly
7710000
heap
page read and write
76CC000
heap
page read and write
186B000
heap
page read and write
3A6F000
trusted library allocation
page read and write
162E000
heap
page read and write
5EEE000
stack
page read and write
63E0000
trusted library allocation
page execute and read and write
8A6000
unkown
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
1228000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
3ACD000
trusted library allocation
page read and write
25F4000
heap
page read and write
39E0000
trusted library allocation
page read and write
8A0000
heap
page read and write
3967000
trusted library allocation
page read and write
35A9000
trusted library allocation
page read and write
4221000
heap
page read and write
8A9000
unkown
page readonly
375C000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
63C1000
trusted library allocation
page read and write
4221000
heap
page read and write
770B000
heap
page read and write
9FF000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
49A2000
unclassified section
page read and write
8A9000
unkown
page readonly
20F44100000
trusted library allocation
page read and write
3AC7000
trusted library allocation
page read and write
3E4D000
unclassified section
page execute and read and write
5A90000
heap
page execute and read and write
E74CDFE000
stack
page read and write
1450000
heap
page read and write
76D2000
heap
page read and write
375A000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
3739000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
27F2000
unkown
page read and write
4221000
heap
page read and write
390C000
trusted library allocation
page read and write
3A93000
trusted library allocation
page read and write
363B000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
814000
heap
page read and write
3B19000
trusted library allocation
page read and write
7990000
heap
page read and write
A4D000
heap
page read and write
3984000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
3AE8000
trusted library allocation
page read and write
36A8000
trusted library allocation
page read and write
38DA000
trusted library allocation
page read and write
17EE000
heap
page read and write
A90000
unkown
page readonly
4221000
heap
page read and write
35EE000
trusted library allocation
page read and write
35A5000
trusted library allocation
page read and write
76BA000
heap
page read and write
3110000
unkown
page readonly
36BD000
trusted library allocation
page read and write
172F000
stack
page read and write
188D000
direct allocation
page execute and read and write
4221000
heap
page read and write
860000
unkown
page read and write
930000
trusted library allocation
page read and write
FF0000
unkown
page readonly
39E2000
trusted library allocation
page read and write
A3F000
heap
page read and write
13C0000
unkown
page readonly
6220000
trusted library section
page read and write
39FF000
trusted library allocation
page read and write
4221000
heap
page read and write
37E8000
trusted library allocation
page read and write
590000
unkown
page readonly
162A000
heap
page read and write
3A14000
trusted library allocation
page read and write
4221000
heap
page read and write
37AF000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
98C000
heap
page read and write
3A56000
trusted library allocation
page read and write
4221000
heap
page read and write
1A23000
trusted library allocation
page execute and read and write
3866000
trusted library allocation
page read and write
39D6000
trusted library allocation
page read and write
BF0000
heap
page read and write
4F0000
unkown
page readonly
36B5000
trusted library allocation
page read and write
39C5000
trusted library allocation
page read and write
A57000
heap
page read and write
4221000
heap
page read and write
5D1F000
stack
page read and write
814000
heap
page read and write
3885000
trusted library allocation
page read and write
4221000
heap
page read and write
390A000
trusted library allocation
page read and write
37A9000
trusted library allocation
page read and write
4221000
heap
page read and write
3AB2000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
13A0000
unkown
page readonly
37C3000
trusted library allocation
page read and write
7714000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
35D1000
trusted library allocation
page read and write
4221000
heap
page read and write
7400000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
37C7000
trusted library allocation
page read and write
162E000
stack
page read and write
4221000
heap
page read and write
3A75000
trusted library allocation
page read and write
18C4000
heap
page read and write
39DE000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
396D000
trusted library allocation
page read and write
BFE000
heap
page read and write
347E000
stack
page read and write
987000
heap
page read and write
36BB000
trusted library allocation
page read and write
136C000
stack
page read and write
89F000
unkown
page readonly
1440000
unkown
page read and write
369E000
trusted library allocation
page read and write
37C5000
trusted library allocation
page read and write
4420000
trusted library allocation
page execute and read and write
20F4410F000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
20F44103000
trusted library allocation
page read and write
1A10000
heap
page read and write
1540000
unkown
page readonly
4221000
heap
page read and write
3952000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
37B1000
trusted library allocation
page read and write
1A26000
direct allocation
page execute and read and write
AD0000
heap
page read and write
335E000
stack
page read and write
3775000
trusted library allocation
page read and write
1610000
heap
page read and write
4221000
heap
page read and write
5D0000
unkown
page read and write
9DE000
heap
page read and write
6800000
trusted library allocation
page read and write
920000
heap
page read and write
35A0000
trusted library allocation
page read and write
38A8000
trusted library allocation
page read and write
4221000
heap
page read and write
384F000
trusted library allocation
page read and write
3790000
trusted library allocation
page read and write
1620000
heap
page read and write
3831000
trusted library allocation
page read and write
76A6000
heap
page read and write
4655000
trusted library allocation
page read and write
1A20000
trusted library allocation
page read and write
3837000
trusted library allocation
page read and write
5F35000
unkown
page execute and read and write
3A79000
trusted library allocation
page read and write
3633000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
4221000
heap
page read and write
3AB5000
trusted library allocation
page read and write
4221000
heap
page read and write
770B000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
5F6D000
stack
page read and write
5DAD000
stack
page read and write
5A0000
unkown
page readonly
3B1B000
trusted library allocation
page read and write
6645000
trusted library allocation
page read and write
FD2000
unkown
page readonly
4221000
heap
page read and write
1852000
heap
page read and write
184A000
heap
page read and write
3883000
trusted library allocation
page read and write
388D000
trusted library allocation
page read and write
98C000
heap
page read and write
37EB000
trusted library allocation
page read and write
54CD000
unkown
page execute and read and write
9E8000
heap
page read and write
39D8000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
561E000
stack
page read and write
3679000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
3835000
trusted library allocation
page read and write
7E2E000
stack
page read and write
35B5000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
37BF000
trusted library allocation
page read and write
20F4273F000
heap
page read and write
4D0000
unkown
page readonly
36A0000
trusted library allocation
page read and write
4221000
heap
page read and write
257E000
stack
page read and write
4221000
heap
page read and write
3A31000
trusted library allocation
page read and write
1A30000
trusted library allocation
page read and write
4221000
heap
page read and write
6840000
trusted library allocation
page execute and read and write
4221000
heap
page read and write
644B000
trusted library allocation
page read and write
4221000
heap
page read and write
1620000
heap
page read and write
BFA000
heap
page read and write
A23000
heap
page read and write
4221000
heap
page read and write
6450000
trusted library allocation
page execute and read and write
46F9000
trusted library allocation
page read and write
3709000
trusted library allocation
page read and write
35F5000
trusted library allocation
page read and write
4221000
heap
page read and write
3889000
trusted library allocation
page read and write
4221000
heap
page read and write
35B7000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
9F2000
heap
page read and write
38F9000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
3AE6000
trusted library allocation
page read and write
38ED000
trusted library allocation
page read and write
3AF9000
trusted library allocation
page read and write
4221000
heap
page read and write
13D0000
heap
page read and write
126A000
stack
page read and write
368D000
trusted library allocation
page read and write
3A58000
trusted library allocation
page read and write
4221000
heap
page read and write
1A50000
trusted library allocation
page read and write
39F5000
trusted library allocation
page read and write
457B000
heap
page read and write
3AA8000
trusted library allocation
page read and write
46BB000
trusted library allocation
page read and write
5E1000
unkown
page readonly
A0F000
heap
page read and write
3AFB000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
4221000
heap
page read and write
1A4A000
trusted library allocation
page execute and read and write
3673000
trusted library allocation
page read and write
372A000
trusted library allocation
page read and write
981000
heap
page read and write
68C6000
heap
page read and write
A34000
heap
page read and write
1AC0000
trusted library allocation
page execute and read and write
35D3000
trusted library allocation
page read and write
485D000
direct allocation
page execute and read and write
2700000
unkown
page readonly
3988000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
A14000
heap
page read and write
3818000
trusted library allocation
page read and write
3705000
trusted library allocation
page read and write
3853000
trusted library allocation
page read and write
3A5A000
trusted library allocation
page read and write
366C000
trusted library allocation
page read and write
126A000
stack
page read and write
39A5000
trusted library allocation
page read and write
331C000
stack
page read and write
3594000
trusted library allocation
page read and write
20F44121000
trusted library allocation
page read and write
20F42690000
heap
page read and write
1530000
heap
page read and write
6650000
trusted library allocation
page execute and read and write
3986000
trusted library allocation
page read and write
771E000
heap
page read and write
20F42742000
heap
page read and write
A4D000
heap
page read and write
5B0000
unkown
page readonly
4221000
heap
page read and write
384B000
trusted library allocation
page read and write
3603000
trusted library allocation
page read and write
136C000
stack
page read and write
13B0000
unkown
page readonly
3A5C000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
7683000
heap
page read and write
BCA000
system
page execute and read and write
3AE4000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
35CF000
trusted library allocation
page read and write
3656000
trusted library allocation
page read and write
20F424B0000
system
page execute and read and write
3B17000
trusted library allocation
page read and write
381C000
trusted library allocation
page read and write
17DF000
stack
page read and write
371B000
trusted library allocation
page read and write
A0F000
heap
page read and write
398A000
trusted library allocation
page read and write
4221000
heap
page read and write
1081000
unkown
page readonly
2580000
unclassified section
page execute and read and write
4221000
heap
page read and write
13B0000
unkown
page readonly
891000
unkown
page execute read
9D9000
heap
page read and write
2F80000
unclassified section
page execute and read and write
37E4000
trusted library allocation
page read and write
3A18000
trusted library allocation
page read and write
76F4000
heap
page read and write
6410000
trusted library allocation
page execute and read and write
3914000
trusted library allocation
page read and write
3A97000
trusted library allocation
page read and write
BFE000
heap
page read and write
4600000
unkown
page execute and read and write
4221000
heap
page read and write
5A0000
unkown
page readonly
1200000
unkown
page readonly
4221000
heap
page read and write
E74DDFF000
stack
page read and write
2502000
system
page read and write
366E000
trusted library allocation
page read and write
1450000
heap
page read and write
4221000
heap
page read and write
3ABF000
trusted library allocation
page read and write
3887000
trusted library allocation
page read and write
1AB0000
direct allocation
page read and write
793C000
stack
page read and write
B4D000
system
page execute and read and write
4221000
heap
page read and write
4221000
heap
page read and write
3801000
trusted library allocation
page read and write
4221000
heap
page read and write
36E6000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
4861000
direct allocation
page execute and read and write
250E000
stack
page read and write
3713000
trusted library allocation
page read and write
A90000
unkown
page readonly
165D000
stack
page read and write
5535000
unkown
page execute and read and write
3720000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
5F0000
unkown
page read and write
AD6000
heap
page read and write
377D000
trusted library allocation
page read and write
169E000
stack
page read and write
B57000
system
page execute and read and write
3624000
trusted library allocation
page read and write
38D8000
trusted library allocation
page read and write
4221000
heap
page read and write
AD0000
heap
page read and write
450A000
heap
page read and write
3607000
trusted library allocation
page read and write
4F0000
unkown
page readonly
4221000
heap
page read and write
4221000
heap
page read and write
5C0000
heap
page read and write
38D6000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
35EA000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
4221000
heap
page read and write
10FA000
stack
page read and write
4221000
heap
page read and write
3890000
trusted library allocation
page read and write
9DE000
heap
page read and write
2530000
heap
page read and write
20F425B0000
heap
page read and write
184D000
heap
page read and write
9FF000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
67AE000
stack
page read and write
384D000
trusted library allocation
page read and write
5F2E000
stack
page read and write
36B9000
trusted library allocation
page read and write
4221000
heap
page read and write
18D6000
heap
page read and write
3AED000
trusted library allocation
page read and write
9BC000
stack
page read and write
98C000
heap
page read and write
590000
unkown
page readonly
3370000
heap
page execute and read and write
4221000
heap
page read and write
3717000
trusted library allocation
page read and write
4FA4000
unclassified section
page read and write
5E1000
unkown
page readonly
5F0000
unkown
page read and write
4221000
heap
page read and write
BFA000
heap
page read and write
98C000
heap
page read and write
13A0000
unkown
page readonly
1ABE000
stack
page read and write
36A6000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
3A2F000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
890000
unkown
page readonly
4221000
heap
page read and write
35AF000
trusted library allocation
page read and write
3A6D000
trusted library allocation
page read and write
814000
heap
page read and write
4221000
heap
page read and write
38F3000
trusted library allocation
page read and write
65A0000
trusted library section
page read and write
6460000
trusted library section
page read and write
181F000
stack
page read and write
621F000
stack
page read and write
8A6000
unkown
page read and write
290C000
unkown
page read and write
1A40000
trusted library allocation
page read and write
1B30000
heap
page read and write
398C000
trusted library allocation
page read and write
2ACC000
unkown
page read and write
2442000
system
page read and write
6660000
trusted library allocation
page read and write
20F4272C000
heap
page read and write
3ACF000
trusted library allocation
page read and write
BF0000
heap
page read and write
9F2000
heap
page read and write
A1A000
heap
page read and write
4221000
heap
page read and write
46B9000
direct allocation
page execute and read and write
1200000
unkown
page readonly
3681000
trusted library allocation
page read and write
4221000
heap
page read and write
3756000
trusted library allocation
page read and write
6980000
heap
page read and write
5A60000
trusted library allocation
page read and write
9EC000
heap
page read and write
3A29000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
3A0E000
trusted library allocation
page read and write
37CF000
trusted library allocation
page read and write
3796000
trusted library allocation
page read and write
5A5F000
stack
page read and write
FE0000
unkown
page readonly
810000
heap
page read and write
48B5000
unclassified section
page execute and read and write
5B0000
unkown
page readonly
FF0000
unkown
page readonly
1A46000
trusted library allocation
page execute and read and write
4221000
heap
page read and write
76FA000
heap
page read and write
20F42518000
system
page execute and read and write
4221000
heap
page read and write
36DB000
trusted library allocation
page read and write
890000
unkown
page readonly
4221000
heap
page read and write
1A52000
trusted library allocation
page read and write
8A6000
unkown
page read and write
4221000
heap
page read and write
20F43F90000
heap
page read and write
37F1000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
3AC5000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
1A42000
trusted library allocation
page read and write
36AF000
trusted library allocation
page read and write
4FFC000
stack
page read and write
381E000
trusted library allocation
page read and write
1AE0000
trusted library allocation
page read and write
76D6000
heap
page read and write
3AAE000
trusted library allocation
page read and write
370F000
trusted library allocation
page read and write
44D5000
trusted library allocation
page read and write
4221000
heap
page read and write
3806000
trusted library allocation
page read and write
3046000
unkown
page read and write
4220000
heap
page read and write
4221000
heap
page read and write
37FD000
trusted library allocation
page read and write
A46000
heap
page read and write
4221000
heap
page read and write
3AC9000
trusted library allocation
page read and write
3923000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
3AC3000
trusted library allocation
page read and write
3965000
trusted library allocation
page read and write
20F4273B000
heap
page read and write
3AD1000
trusted library allocation
page read and write
1560000
unkown
page read and write
63D0000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
2530000
heap
page read and write
6430000
trusted library allocation
page read and write
7718000
heap
page read and write
1A3D000
trusted library allocation
page execute and read and write
359E000
trusted library allocation
page read and write
3803000
trusted library allocation
page read and write
4221000
heap
page read and write
3A8F000
trusted library allocation
page read and write
4221000
heap
page read and write
3925000
trusted library allocation
page read and write
1B30000
heap
page read and write
3AF1000
trusted library allocation
page read and write
4221000
heap
page read and write
3653000
trusted library allocation
page read and write
B73000
system
page execute and read and write
398F000
trusted library allocation
page read and write
1A5B000
trusted library allocation
page execute and read and write
1A24000
trusted library allocation
page read and write
20F43FA0000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
3736000
trusted library allocation
page read and write
76AB000
heap
page read and write
7E0000
heap
page read and write
18BE000
heap
page read and write
50FF000
stack
page read and write
985000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
394E000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
FD0000
unkown
page readonly
3701000
trusted library allocation
page read and write
4506000
heap
page read and write
3685000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
66AE000
stack
page read and write
4221000
heap
page read and write
36B1000
trusted library allocation
page read and write
3773000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
360C000
trusted library allocation
page read and write
1431000
unkown
page readonly
98C000
heap
page read and write
3881000
trusted library allocation
page read and write
48E2000
unclassified section
page read and write
978000
heap
page read and write
CF0000
unkown
page readonly
3816000
trusted library allocation
page read and write
3929000
trusted library allocation
page read and write
89F000
unkown
page readonly
25F0000
heap
page read and write
7D9E000
stack
page read and write
5EA6000
stack
page read and write
4221000
heap
page read and write
11CC000
stack
page read and write
3668000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
1560000
unkown
page read and write
3A10000
trusted library allocation
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
36FA000
trusted library allocation
page read and write
4221000
heap
page read and write
850000
unkown
page read and write
377B000
trusted library allocation
page read and write
4221000
heap
page read and write
17E8000
heap
page read and write
891000
unkown
page execute read
39F9000
trusted library allocation
page read and write
36F8000
trusted library allocation
page read and write
3100000
heap
page read and write
930000
trusted library allocation
page read and write
4221000
heap
page read and write
36E1000
trusted library allocation
page read and write
39FB000
trusted library allocation
page read and write
2700000
unkown
page readonly
49FC000
unclassified section
page read and write
3AAA000
trusted library allocation
page read and write
3A2D000
trusted library allocation
page read and write
4221000
heap
page read and write
2ACC000
unkown
page read and write
A46000
heap
page read and write
3A52000
trusted library allocation
page read and write
4221000
heap
page read and write
98C000
heap
page read and write
A1F000
heap
page read and write
A28000
heap
page read and write
1760000
direct allocation
page execute and read and write
4D0000
unkown
page readonly
5BDE000
stack
page read and write
162E000
heap
page read and write
4221000
heap
page read and write
4221000
heap
page read and write
992000
heap
page read and write
55A000
stack
page read and write
76AE000
heap
page read and write
1889000
direct allocation
page execute and read and write
385A000
trusted library allocation
page read and write
4221000
heap
page read and write
3A7B000
trusted library allocation
page read and write
E74D5FE000
stack
page read and write
4590000
direct allocation
page execute and read and write
3598000
trusted library allocation
page read and write
35F1000
trusted library allocation
page read and write
FE0000
unkown
page readonly
6600000
trusted library allocation
page execute and read and write
There are 983 hidden memdumps, click here to show them.