IOC Report
LETTERA DI CONFERMA DEL PAGAMENTO.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps108642010010Label

Files

File Path
Type
Category
Malicious
Download
LETTERA DI CONFERMA DEL PAGAMENTO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\sqlite-dll-win32-x86-3360000[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\1n61p-
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Temp\aut28B6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cxex2xx0.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\isochronally
data
dropped
C:\Users\user\AppData\Local\Temp\sqlite3.def
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LETTERA DI CONFERMA DEL PAGAMENTO.exe
"C:\Users\user\Desktop\LETTERA DI CONFERMA DEL PAGAMENTO.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\LETTERA DI CONFERMA DEL PAGAMENTO.exe"
malicious
C:\Program Files (x86)\EMNJeTTlkQkIIjjKIvaMmQrOemPJNTPsEGuuejKdptDmhgjWVyz\rGdWid9z.exe
"C:\Program Files (x86)\EMNJeTTlkQkIIjjKIvaMmQrOemPJNTPsEGuuejKdptDmhgjWVyz\rGdWid9z.exe"
malicious
C:\Windows\SysWOW64\net1.exe
"C:\Windows\SysWOW64\net1.exe"
malicious
C:\Program Files (x86)\EMNJeTTlkQkIIjjKIvaMmQrOemPJNTPsEGuuejKdptDmhgjWVyz\BupJjuMCJB.exe
"C:\Program Files (x86)\EMNJeTTlkQkIIjjKIvaMmQrOemPJNTPsEGuuejKdptDmhgjWVyz\BupJjuMCJB.exe"
malicious
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
"C:\Program Files (x86)\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.morpakampus.com/3lf9/?Up5Dxd=5GxzxjzYtuQVaXKi96wJQlL5jVVVED3gsqLy8xSnFJL9Njv/LCMj1519KCJv/YXWDbEHwXyFpdS6CdsXIHJjWfKOpLe5XFlJMx8QFerMn32IswyHn8LLdrliT4lw&RtRt=H2TxDP-0yx
104.26.0.177
malicious
http://www.viatotor.cfd/awht/?Up5Dxd=8WWHC7wWqzabLylEqC4h4xSUa5Q1ERPluRInRnvP6aHLJY6FsD1in5Ba6ce0RJeZH7zN6VIqS0duX3wRoykHaMJocpJ8Lyik8tyRvKfKAYeOrifkhUVyVr4B9LR1&RtRt=H2TxDP-0yx
104.21.94.162
malicious
http://www.viatotor.cfd/awht/
104.21.94.162
malicious
http://www.hypehike.buzz/j7vq/?Up5Dxd=Bcl9cp41dlHcDC4N7AFqYtSrkG8XSNj0Dw08raKVYGNnS8Fk0dwOiPOkXhtRLsFmQzGgwtyTAOUIspu4tmMliVEfuoO5YMFyI/UM7bEFhyYTRsu/qMC3INXijMdt&RtRt=H2TxDP-0yx
199.59.243.228
malicious
http://www.hypehike.buzz/j7vq/
199.59.243.228
malicious
http://www.streartex.live/qmo0/
162.254.38.217
malicious
http://www.ambitiouswomen.net/tskx/?Up5Dxd=3FZsyYtvHJrwTHHvKE69JLGDZnzKmCnrMuqRAlJnKL7t2F6wJjOvapVJjCl/gRiWQVTLflE3WPZwa5xfwkUpPmC6JxN15cgxThe6GU7HJW2U+NF71xQUQBXCRD3d&RtRt=H2TxDP-0yx
76.223.54.146
malicious
http://www.morpakampus.com/3lf9/
104.26.0.177
malicious
http://www.streartex.live/qmo0/?Up5Dxd=s/riq2Gjc84WkOXIPYK3MDRDBcdtSPFB6JhYX0OHrW5JrEb3J4m1Tdn1DtTVCNN6q5y0/nExmx/pVjwhpLktH0ipuaSv5IUB3fbV39kfxE7kNJsXW33X5BidtZsd&RtRt=H2TxDP-0yx
162.254.38.217
malicious
http://www.777assistant.xyz/s1k7/?RtRt=H2TxDP-0yx&Up5Dxd=zKlqO7QNcfetDPpTJRNWr1IyWy9Pz553WMXns1xrbNYpuLFGGplxzK50t++Wm/Dpu5XCEj5cJoLsJvwgvv1H2BlHGmx6spHmojpwT52SXD2CVd9QciE69D6Wx6Ed
76.223.54.146
malicious
http://www.ambitiouswomen.net/tskx/
76.223.54.146
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.sqlite.org/2021/sqlite-dll-win32-x86-3360000.zip
45.33.6.223
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://www.streartex.live
unknown
https://www.google.com/favicon.ico
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
https://www.morpakampus.com/3lf9/?Up5Dxd=5GxzxjzYtuQVaXKi96wJQlL5jVVVED3gsqLy8xSnFJL9Njv/LCMj1519KCJ
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.sqlite.org/copyright.html.
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.ambitiouswomen.net
76.223.54.146
malicious
www.viatotor.cfd
104.21.94.162
malicious
031232899.xyz
144.76.229.203
malicious
www.streartex.live
162.254.38.217
malicious
www.777assistant.xyz
76.223.54.146
malicious
www.morpakampus.com
104.26.0.177
malicious
www.031232899.xyz
unknown
malicious
94950.bodis.com
199.59.243.228
www.sqlite.org
45.33.6.223
www.hypehike.buzz
unknown

IPs

IP
Domain
Country
Malicious
76.223.54.146
www.ambitiouswomen.net
United States
malicious
104.21.94.162
www.viatotor.cfd
United States
malicious
104.26.0.177
www.morpakampus.com
United States
malicious
162.254.38.217
www.streartex.live
United States
malicious
45.33.6.223
www.sqlite.org
United States
199.59.243.228
94950.bodis.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1FB0000
unclassified section
page execute and read and write
malicious
1E0000
trusted library allocation
page read and write
malicious
290000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
190000
trusted library allocation
page read and write
malicious
560000
system
page execute and read and write
malicious
210000
system
page execute and read and write
malicious
3E60000
unkown
page execute and read and write
malicious
80000
system
page execute and read and write
malicious
6D7000
heap
page read and write
C48000
heap
page read and write
494000
heap
page read and write
2D84000
direct allocation
page read and write
579E000
stack
page read and write
8C0000
heap
page read and write
2D84000
direct allocation
page read and write
CD1000
direct allocation
page execute and read and write
16B000
stack
page read and write
83D000
heap
page read and write
1070000
unkown
page readonly
642000
heap
page read and write
20000
unkown
page read and write
1040000
unkown
page readonly
6F4000
heap
page read and write
FB000
stack
page read and write
1041000
unkown
page execute read
52D000
heap
page read and write
6D3000
heap
page read and write
4E00000
trusted library allocation
page read and write
1261000
unkown
page execute read
593E000
stack
page read and write
60F0000
heap
page read and write
FB000
stack
page read and write
20000
unkown
page read and write
6130000
trusted library allocation
page read and write
6D0000
heap
page read and write
950000
unkown
page readonly
2B3D000
direct allocation
page read and write
5CFF000
stack
page read and write
69E000
heap
page read and write
104F000
unkown
page readonly
1056000
unkown
page read and write
59A0000
heap
page read and write
5830000
trusted library allocation
page read and write
118F000
stack
page read and write
5FCF000
stack
page read and write
6A4000
heap
page read and write
131E000
unkown
page read and write
62E0000
heap
page read and write
892000
heap
page read and write
307C000
unkown
page read and write
2D70000
direct allocation
page read and write
300000
heap
page read and write
391A000
unkown
page read and write
61ECE000
unkown
page readonly
D50000
direct allocation
page execute and read and write
6529000
heap
page read and write
66E000
stack
page read and write
480000
heap
page read and write
346000
heap
page read and write
1392000
system
page read and write
9D0000
heap
page read and write
180000
direct allocation
page read and write
1A18000
unclassified section
page read and write
61ECA000
unkown
page read and write
2D81000
direct allocation
page read and write
130C000
unclassified section
page read and write
219000
unkown
page readonly
55FE000
stack
page read and write
6551000
heap
page read and write
2D90000
direct allocation
page read and write
2D87000
direct allocation
page read and write
4556000
unkown
page execute and read and write
705000
heap
page read and write
B80000
unkown
page readonly
2DF0000
direct allocation
page read and write
6D7000
heap
page read and write
2D84000
direct allocation
page read and write
10000
heap
page read and write
CD4000
direct allocation
page execute and read and write
9C4000
heap
page read and write
20000
trusted library allocation
page read and write
9B7000
direct allocation
page execute and read and write
6103000
heap
page read and write
2C80000
direct allocation
page read and write
B57000
direct allocation
page execute and read and write
2AB000
stack
page read and write
6532000
heap
page read and write
8D0000
heap
page read and write
2D87000
direct allocation
page read and write
5A3C000
stack
page read and write
6130000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
7D0000
unkown
page readonly
4F56000
unkown
page execute and read and write
2DF0000
direct allocation
page read and write
1322000
unkown
page write copy
4E0000
heap
page read and write
5C4000
heap
page read and write
18B000
stack
page read and write
2B3D000
direct allocation
page read and write
2C40000
heap
page read and write
5CAE000
stack
page read and write
667000
heap
page read and write
2D90000
direct allocation
page read and write
20000
trusted library allocation
page read and write
20000
direct allocation
page read and write
E50000
heap
page read and write
200000
unkown
page readonly
114C000
unclassified section
page read and write
624000
heap
page read and write
6130000
trusted library allocation
page read and write
201000
unkown
page execute read
6539000
heap
page read and write
6130000
trusted library allocation
page read and write
2D84000
direct allocation
page read and write
1056000
unkown
page read and write
230000
unkown
page readonly
10F2000
unclassified section
page read and write
20000
unkown
page read and write
840000
heap
page read and write
837000
direct allocation
page execute and read and write
CC0000
direct allocation
page execute and read and write
20F0000
heap
page read and write
9B1000
direct allocation
page execute and read and write
6CE000
stack
page read and write
6550000
heap
page read and write
6B0000
heap
page read and write
3BF0000
trusted library allocation
page read and write
2C80000
direct allocation
page read and write
30E000
heap
page read and write
2D84000
direct allocation
page read and write
2E62000
unkown
page read and write
5C0000
heap
page read and write
67C0000
heap
page read and write
2B3D000
direct allocation
page read and write
820000
direct allocation
page execute and read and write
1314000
unkown
page readonly
307C000
unkown
page read and write
2D81000
direct allocation
page read and write
2DF0000
direct allocation
page read and write
30A6000
unclassified section
page execute and read and write
1D3C000
unclassified section
page read and write
20000
trusted library allocation
page read and write
600000
heap
page read and write
6E7000
heap
page read and write
690000
heap
page read and write
700000
unkown
page readonly
6539000
heap
page read and write
2DA2000
unkown
page read and write
15B0000
unclassified section
page execute and read and write
2EF000
system
page execute and read and write
10000
heap
page read and write
6420000
heap
page read and write
2D84000
direct allocation
page read and write
DE0000
unkown
page read and write
6524000
heap
page read and write
1327000
unkown
page readonly
700000
trusted library allocation
page read and write
20000
unkown
page read and write
5D4000
system
page execute and read and write
17D000
stack
page read and write
A60000
direct allocation
page execute and read and write
8F7000
heap
page read and write
A50000
direct allocation
page execute and read and write
4B2000
heap
page read and write
219000
unkown
page readonly
D40000
direct allocation
page execute and read and write
9A0000
direct allocation
page execute and read and write
20000
direct allocation
page read and write
6541000
heap
page read and write
3464000
unkown
page read and write
C44000
heap
page read and write
A20000
direct allocation
page execute and read and write
652F000
heap
page read and write
5B0000
heap
page read and write
CE0000
direct allocation
page execute and read and write
880000
unkown
page readonly
72B000
heap
page read and write
23E000
stack
page read and write
4DE0000
trusted library allocation
page read and write
880000
unkown
page readonly
2D90000
direct allocation
page read and write
36D000
stack
page read and write
2C80000
direct allocation
page read and write
BAE000
stack
page read and write
324000
heap
page read and write
730000
direct allocation
page execute and read and write
587D000
unkown
page read and write
61EC7000
unkown
page readonly
2D81000
direct allocation
page read and write
2B7000
stack
page read and write
B80000
unkown
page readonly
684000
heap
page read and write
2B3D000
direct allocation
page read and write
6130000
trusted library allocation
page read and write
BE0000
direct allocation
page execute and read and write
6534000
heap
page read and write
4DE0000
trusted library allocation
page read and write
485000
heap
page read and write
7CD000
heap
page read and write
6539000
heap
page read and write
BEC000
unkown
page read and write
778000
heap
page read and write
6130000
heap
page read and write
380000
heap
page read and write
830000
direct allocation
page execute and read and write
8A0000
direct allocation
page execute and read and write
A30000
heap
page read and write
591C000
stack
page read and write
2D70000
direct allocation
page read and write
5DE000
stack
page read and write
190000
heap
page read and write
1041000
unkown
page execute read
5B8000
system
page execute and read and write
48D000
stack
page read and write
20000
direct allocation
page read and write
2D70000
direct allocation
page read and write
940000
heap
page read and write
5B0F000
stack
page read and write
9B4000
direct allocation
page execute and read and write
FB4000
heap
page read and write
777000
heap
page read and write
1261000
unkown
page execute read
4E13000
trusted library allocation
page read and write
20F4000
heap
page read and write
1360000
system
page read and write
2C90000
direct allocation
page read and write
2D81000
direct allocation
page read and write
4E19000
trusted library allocation
page read and write
62A0000
heap
page read and write
12D2000
system
page read and write
3460000
unkown
page execute and read and write
6528000
heap
page read and write
5D10000
heap
page read and write
10000
heap
page read and write
52A000
heap
page read and write
190000
heap
page read and write
2C90000
direct allocation
page read and write
370000
unkown
page readonly
2C90000
direct allocation
page read and write
13EC000
system
page read and write
6130000
trusted library allocation
page read and write
5400000
heap
page read and write
6130000
trusted library allocation
page read and write
2D87000
direct allocation
page read and write
804000
heap
page read and write
914000
heap
page read and write
20000
direct allocation
page read and write
2D87000
direct allocation
page read and write
C80000
heap
page read and write
6130000
trusted library allocation
page read and write
B54000
direct allocation
page execute and read and write
680000
heap
page read and write
6130000
trusted library allocation
page read and write
7D0000
unkown
page readonly
9C1000
heap
page read and write
FB0000
heap
page read and write
D30000
heap
page read and write
6A7000
heap
page read and write
5C2E000
stack
page read and write
2D90000
direct allocation
page read and write
2D70000
direct allocation
page read and write
1032000
unclassified section
page read and write
3AAC000
unkown
page read and write
20C000
stack
page read and write
545F000
heap
page read and write
686000
heap
page read and write
5EA000
stack
page read and write
100F000
stack
page read and write
5443000
heap
page read and write
5476000
heap
page read and write
2B3A000
direct allocation
page read and write
60D000
stack
page read and write
C48000
heap
page read and write
72B000
heap
page read and write
696000
heap
page read and write
6130000
trusted library allocation
page read and write
600000
heap
page read and write
4D3000
heap
page read and write
61E00000
unkown
page readonly
36D000
stack
page read and write
2EBC000
unkown
page read and write
DA0000
heap
page read and write
2A60000
direct allocation
page read and write
760000
heap
page read and write
10C0000
unclassified section
page read and write
5520000
heap
page read and write
5CB000
heap
page read and write
680000
heap
page read and write
494000
heap
page read and write
370000
unkown
page readonly
BC0000
direct allocation
page execute and read and write
1070000
unkown
page readonly
541D000
heap
page read and write
2D81000
direct allocation
page read and write
5A0000
heap
page read and write
3A0000
trusted library allocation
page execute and read and write
467000
heap
page read and write
4C0000
heap
page read and write
2C90000
direct allocation
page read and write
10000
heap
page read and write
30F000
heap
page read and write
8F0000
heap
page read and write
1886000
unclassified section
page read and write
1C6000
heap
page read and write
606F000
stack
page read and write
704000
heap
page read and write
19B000
stack
page read and write
6130000
trusted library allocation
page read and write
58BF000
stack
page read and write
131E000
unkown
page write copy
660000
heap
page read and write
DFD000
unkown
page read and write
680000
heap
page read and write
A30000
direct allocation
page execute and read and write
1D0000
heap
page read and write
778000
heap
page read and write
2D90000
direct allocation
page read and write
729000
heap
page read and write
2D87000
direct allocation
page read and write
834000
direct allocation
page execute and read and write
740000
direct allocation
page execute and read and write
2B3A000
direct allocation
page read and write
610000
direct allocation
page read and write
490000
heap
page read and write
8C0000
direct allocation
page execute and read and write
6541000
heap
page read and write
1C0000
heap
page read and write
6130000
trusted library allocation
page read and write
2E30000
unkown
page read and write
2B3D000
direct allocation
page read and write
7AD000
heap
page read and write
201000
unkown
page execute read
1059000
unkown
page readonly
2D87000
direct allocation
page read and write
1A0000
direct allocation
page read and write
9B0000
heap
page read and write
1260000
unkown
page readonly
61EC6000
unkown
page read and write
309000
heap
page read and write
9C7000
heap
page read and write
C4B000
heap
page read and write
5E4F000
stack
page read and write
230000
unkown
page readonly
272000
system
page execute and read and write
210000
heap
page read and write
1260000
unkown
page readonly
8B6000
heap
page read and write
2B3A000
direct allocation
page read and write
4B2000
heap
page read and write
6545000
heap
page read and write
6130000
trusted library allocation
page read and write
628F000
stack
page read and write
8B0000
direct allocation
page execute and read and write
216000
unkown
page read and write
1D0000
heap
page read and write
26A6000
unclassified section
page execute and read and write
1D6000
heap
page read and write
840000
direct allocation
page execute and read and write
61EB2000
unkown
page readonly
6541000
heap
page read and write
2B3A000
direct allocation
page read and write
10000
heap
page read and write
5C8000
system
page execute and read and write
16F4000
unclassified section
page read and write
5C0000
heap
page read and write
580E000
stack
page read and write
5FAD000
stack
page read and write
44ED000
unkown
page execute and read and write
6130000
trusted library allocation
page read and write
950000
unkown
page readonly
2DA2000
unkown
page read and write
BD0000
direct allocation
page execute and read and write
2D70000
direct allocation
page read and write
216000
unkown
page read and write
914000
heap
page read and write
8F0000
heap
page read and write
807000
heap
page read and write
2DF0000
direct allocation
page read and write
FD2000
heap
page read and write
20F000
unkown
page readonly
36A000
heap
page read and write
6A1000
heap
page read and write
5580000
heap
page read and write
460000
heap
page read and write
5C8000
heap
page read and write
2B3A000
direct allocation
page read and write
20F000
unkown
page readonly
74F000
heap
page read and write
61E01000
unkown
page execute read
5C4000
heap
page read and write
2DF0000
direct allocation
page read and write
CD7000
direct allocation
page execute and read and write
777000
heap
page read and write
2A60000
direct allocation
page read and write
16B000
stack
page read and write
2C90000
direct allocation
page read and write
6130000
trusted library allocation
page read and write
2C80000
direct allocation
page read and write
1314000
unkown
page readonly
963000
heap
page read and write
1059000
unkown
page readonly
5F1F000
stack
page read and write
B60000
direct allocation
page execute and read and write
2A60000
unkown
page execute and read and write
83A000
heap
page read and write
B40000
direct allocation
page execute and read and write
731000
heap
page execute and read and write
732000
heap
page read and write
7BC000
stack
page read and write
200000
unkown
page readonly
6541000
heap
page read and write
6550000
heap
page read and write
6520000
heap
page read and write
6539000
heap
page read and write
450000
heap
page read and write
700000
unkown
page readonly
10000
heap
page read and write
96B000
heap
page read and write
6E0000
heap
page read and write
52D000
heap
page read and write
1327000
unkown
page readonly
2A60000
direct allocation
page read and write
263D000
unclassified section
page execute and read and write
CCF000
stack
page read and write
708000
heap
page read and write
6E0000
heap
page read and write
570000
heap
page read and write
499000
heap
page read and write
2B3A000
direct allocation
page read and write
2A60000
direct allocation
page read and write
2A60000
direct allocation
page read and write
12EF000
unkown
page readonly
2B3D000
direct allocation
page read and write
C40000
heap
page read and write
5BD000
stack
page read and write
5C8000
heap
page read and write
2DF0000
direct allocation
page read and write
20000
trusted library allocation
page read and write
15AC000
system
page read and write
10000
heap
page read and write
6130000
trusted library allocation
page read and write
20F0000
heap
page read and write
35F6000
unkown
page read and write
7AE000
heap
page read and write
71B000
heap
page read and write
8B0000
heap
page read and write
2D70000
direct allocation
page read and write
68C000
heap
page read and write
620000
heap
page read and write
CC000
stack
page read and write
510000
heap
page read and write
12EF000
unkown
page readonly
2112000
heap
page read and write
1BAA000
unclassified section
page read and write
307000
heap
page read and write
2D81000
direct allocation
page read and write
72A000
heap
page execute and read and write
759000
heap
page read and write
59ED000
stack
page read and write
5DEE000
stack
page read and write
61EAF000
unkown
page read and write
5CE000
stack
page read and write
5469000
heap
page read and write
F0000
unkown
page read and write
490000
heap
page read and write
61ECD000
unkown
page write copy
2112000
heap
page read and write
5AD000
system
page execute and read and write
710000
heap
page read and write
20F4000
heap
page read and write
6130000
trusted library allocation
page read and write
BB0000
unclassified section
page execute and read and write
6130000
trusted library allocation
page read and write
372000
heap
page read and write
3788000
unkown
page read and write
1994000
system
page read and write
10000
heap
page read and write
9C0000
direct allocation
page execute and read and write
72A000
heap
page read and write
4E0000
heap
page read and write
980000
heap
page read and write
62B000
system
page execute and read and write
48D000
stack
page read and write
C4B000
heap
page read and write
104F000
unkown
page readonly
5CB000
heap
page read and write
2C90000
direct allocation
page read and write
9A000
stack
page read and write
800000
heap
page read and write
2C80000
direct allocation
page read and write
2C0000
trusted library allocation
page read and write
8F7000
heap
page read and write
C40000
heap
page read and write
6D0000
heap
page read and write
C44000
heap
page read and write
B50000
direct allocation
page execute and read and write
1040000
unkown
page readonly
68C000
heap
page read and write
6F4000
heap
page read and write
5570000
trusted library allocation
page read and write
2C80000
direct allocation
page read and write
2D90000
direct allocation
page read and write
340000
heap
page read and write
There are 495 hidden memdumps, click here to show them.