IOC Report
invoice.exe

loading gif

Files

File Path
Type
Category
Malicious
invoice.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\prespecialist
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\invoice.exe
"C:\Users\user\Desktop\invoice.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\invoice.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\invoice.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
204.10.160.224:27667
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.sakkal.comar
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
206.23.85.13.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
A28000
heap
page read and write
9F0000
heap
page read and write
401000
unkown
page execute read
2AFF000
trusted library allocation
page read and write
425B000
heap
page read and write
4480000
heap
page read and write
3D98000
heap
page read and write
47EE000
heap
page read and write
1630000
heap
page read and write
29E6000
trusted library allocation
page read and write
3CA4000
heap
page read and write
4480000
heap
page read and write
3C10000
heap
page read and write
423F000
heap
page read and write
2A63000
trusted library allocation
page read and write
3C70000
heap
page read and write
4480000
heap
page read and write
6F70000
heap
page read and write
4480000
heap
page read and write
3C18000
heap
page read and write
4AB000
unkown
page readonly
4401000
heap
page read and write
3C73000
heap
page read and write
A90000
heap
page read and write
A68000
heap
page read and write
3D05000
heap
page read and write
425B000
heap
page read and write
3C71000
heap
page read and write
937000
stack
page read and write
A1D000
heap
page read and write
3D04000
heap
page read and write
2AF0000
trusted library allocation
page read and write
3915000
trusted library allocation
page read and write
482000
unkown
page readonly
3D00000
heap
page read and write
CFC11FE000
stack
page read and write
2AB2000
trusted library allocation
page read and write
3CAB000
heap
page read and write
3D0A000
heap
page read and write
425B000
heap
page read and write
2A95000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
3D08000
heap
page read and write
425B000
heap
page read and write
2A49000
trusted library allocation
page read and write
423F000
heap
page read and write
4480000
heap
page read and write
29D9000
trusted library allocation
page read and write
EAB000
trusted library allocation
page execute and read and write
425B000
heap
page read and write
4480000
heap
page read and write
E1F000
stack
page read and write
4480000
heap
page read and write
AC0000
heap
page read and write
C97000
trusted library allocation
page execute and read and write
423F000
heap
page read and write
425B000
heap
page read and write
4401000
heap
page read and write
2A2B000
trusted library allocation
page read and write
3D07000
heap
page read and write
29F6000
trusted library allocation
page read and write
425B000
heap
page read and write
2A66000
trusted library allocation
page read and write
3CAE000
heap
page read and write
3C73000
heap
page read and write
4401000
heap
page read and write
4401000
heap
page read and write
2A2F000
trusted library allocation
page read and write
423F000
heap
page read and write
425B000
heap
page read and write
4480000
heap
page read and write
3C1D000
heap
page read and write
4C76000
trusted library allocation
page read and write
2900000
heap
page execute and read and write
423F000
heap
page read and write
40B0000
heap
page read and write
4401000
heap
page read and write
29ED000
trusted library allocation
page read and write
4F30000
heap
page read and write
42BE000
heap
page read and write
2A76000
trusted library allocation
page read and write
286F000
stack
page read and write
425B000
heap
page read and write
2AE6000
trusted library allocation
page read and write
4480000
heap
page read and write
3D91000
heap
page read and write
5360000
trusted library allocation
page read and write
3D03000
heap
page read and write
425B000
heap
page read and write
2A80000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
4F4E000
heap
page read and write
2A55000
trusted library allocation
page read and write
7B0000
system
page execute and read and write
414C000
heap
page read and write
4480000
heap
page read and write
29BB000
trusted library allocation
page read and write
3C1B000
heap
page read and write
3CA1000
heap
page read and write
4216000
heap
page read and write
425B000
heap
page read and write
2A34000
trusted library allocation
page read and write
4C5B000
trusted library allocation
page read and write
11EF000
stack
page read and write
CFC10FE000
stack
page read and write
4401000
heap
page read and write
425B000
heap
page read and write
4CD0000
trusted library allocation
page execute and read and write
6DB0000
heap
page read and write
3BE4000
heap
page read and write
3C10000
heap
page read and write
3C76000
heap
page read and write
3CAF000
heap
page read and write
CFC16FD000
stack
page read and write
425B000
heap
page read and write
E8D000
trusted library allocation
page execute and read and write
425B000
heap
page read and write
4401000
heap
page read and write
3B60000
direct allocation
page read and write
C64000
trusted library allocation
page read and write
A00000
heap
page read and write
506C000
stack
page read and write
3CAA000
heap
page read and write
4401000
heap
page read and write
42BD000
heap
page read and write
3CA5000
heap
page read and write
2A00000
trusted library allocation
page read and write
423F000
heap
page read and write
425B000
heap
page read and write
2B07000
trusted library allocation
page read and write
5240000
heap
page read and write
423F000
heap
page read and write
896E000
stack
page read and write
42BD000
heap
page read and write
2A1B000
trusted library allocation
page read and write
425B000
heap
page read and write
2966000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
425B000
heap
page read and write
2AB9000
trusted library allocation
page read and write
FB8000
trusted library allocation
page read and write
4401000
heap
page read and write
2A8F000
trusted library allocation
page read and write
AD2000
heap
page read and write
3D99000
heap
page read and write
423F000
heap
page read and write
41DD000
heap
page read and write
3CA4000
heap
page read and write
4480000
heap
page read and write
5050000
trusted library allocation
page execute and read and write
2745000
trusted library allocation
page read and write
4401000
heap
page read and write
3C7C000
heap
page read and write
2A8F000
trusted library allocation
page read and write
1650000
heap
page read and write
3BE6000
heap
page read and write
8D5000
heap
page read and write
AC5000
heap
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
3C7C000
heap
page read and write
41DD000
heap
page read and write
162E000
stack
page read and write
5340000
trusted library allocation
page execute and read and write
2EA5000
heap
page read and write
4480000
heap
page read and write
21CEFC45000
heap
page read and write
3C77000
heap
page read and write
21CEFAF0000
heap
page read and write
3D0C000
heap
page read and write
3891000
trusted library allocation
page read and write
4401000
heap
page read and write
3C13000
heap
page read and write
42BD000
heap
page read and write
5330000
trusted library allocation
page read and write
3C1C000
heap
page read and write
423F000
heap
page read and write
3CAF000
heap
page read and write
425B000
heap
page read and write
3C75000
heap
page read and write
3D09000
heap
page read and write
4C54000
trusted library allocation
page read and write
8BE000
stack
page read and write
2A51000
trusted library allocation
page read and write
D17000
heap
page read and write
2A59000
trusted library allocation
page read and write
423F000
heap
page read and write
870000
heap
page read and write
3C19000
heap
page read and write
401000
unkown
page execute read
425B000
heap
page read and write
2710000
trusted library allocation
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
4401000
heap
page read and write
4480000
heap
page read and write
2A7F000
trusted library allocation
page read and write
3BE5000
heap
page read and write
2AE4000
trusted library allocation
page read and write
425B000
heap
page read and write
2A7D000
trusted library allocation
page read and write
3C7D000
heap
page read and write
3BE6000
heap
page read and write
3C7D000
heap
page read and write
4480000
heap
page read and write
425B000
heap
page read and write
F60000
trusted library allocation
page read and write
3C18000
heap
page read and write
3C7D000
heap
page read and write
3C10000
heap
page read and write
3BF0000
direct allocation
page read and write
3E3F000
heap
page read and write
2AE2000
trusted library allocation
page read and write
4480000
heap
page read and write
3C15000
heap
page read and write
423F000
heap
page read and write
3D9D000
heap
page read and write
58EE000
heap
page read and write
3D08000
heap
page read and write
6F7C000
heap
page read and write
42BD000
heap
page read and write
42BD000
heap
page read and write
CFE000
stack
page read and write
2A62000
trusted library allocation
page read and write
58B0000
heap
page read and write
83A000
stack
page read and write
2A64000
trusted library allocation
page read and write
3D04000
heap
page read and write
42BD000
heap
page read and write
3BE8000
heap
page read and write
3C13000
heap
page read and write
425B000
heap
page read and write
3C14000
heap
page read and write
5900000
heap
page read and write
ADD000
heap
page read and write
400000
unkown
page readonly
3BE0000
heap
page read and write
3C11000
heap
page read and write
42BD000
heap
page read and write
3D0D000
heap
page read and write
413B000
heap
page read and write
709E000
stack
page read and write
425B000
heap
page read and write
491000
unkown
page write copy
3C73000
heap
page read and write
3C19000
heap
page read and write
425B000
heap
page read and write
2AD3000
trusted library allocation
page read and write
3CAA000
heap
page read and write
F0E000
stack
page read and write
46DC000
heap
page read and write
CB0000
trusted library allocation
page read and write
3BEB000
heap
page read and write
5334000
trusted library allocation
page read and write
5070000
trusted library section
page readonly
21CEF920000
heap
page read and write
3CAB000
heap
page read and write
3C74000
heap
page read and write
21CEF956000
heap
page read and write
F94000
trusted library allocation
page read and write
423F000
heap
page read and write
3CA6000
heap
page read and write
A50000
heap
page read and write
423F000
heap
page read and write
EA2000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
425B000
heap
page read and write
3C71000
heap
page read and write
2937000
trusted library allocation
page read and write
425B000
heap
page read and write
3D0D000
heap
page read and write
A57000
heap
page read and write
425B000
heap
page read and write
3BEB000
heap
page read and write
4401000
heap
page read and write
719F000
stack
page read and write
CFC0D49000
stack
page read and write
4480000
heap
page read and write
3CA4000
heap
page read and write
3D95000
heap
page read and write
3D08000
heap
page read and write
3D03000
heap
page read and write
3C7F000
heap
page read and write
21CEF96F000
heap
page read and write
6DBE000
heap
page read and write
3C1C000
heap
page read and write
425B000
heap
page read and write
3BEA000
heap
page read and write
E7D000
trusted library allocation
page execute and read and write
3BE4000
heap
page read and write
A12000
heap
page read and write
425B000
heap
page read and write
42BD000
heap
page read and write
425B000
heap
page read and write
2A99000
trusted library allocation
page read and write
425B000
heap
page read and write
3C70000
heap
page read and write
425C000
heap
page read and write
26BE000
stack
page read and write
3CA8000
heap
page read and write
423F000
heap
page read and write
425B000
heap
page read and write
2A7A000
trusted library allocation
page read and write
CFC19FB000
stack
page read and write
425B000
heap
page read and write
423F000
heap
page read and write
2A11000
trusted library allocation
page read and write
3CA7000
heap
page read and write
3BEC000
heap
page read and write
3D99000
heap
page read and write
997000
heap
page read and write
3D98000
heap
page read and write
4480000
heap
page read and write
3D9E000
heap
page read and write
3CA0000
heap
page read and write
3D01000
heap
page read and write
42BD000
heap
page read and write
3C7E000
heap
page read and write
41D2000
heap
page read and write
4D8E000
trusted library allocation
page read and write
425B000
heap
page read and write
2891000
trusted library allocation
page read and write
4480000
heap
page read and write
3C75000
heap
page read and write
892F000
stack
page read and write
4D10000
trusted library allocation
page read and write
777000
stack
page read and write
3C16000
heap
page read and write
2ACC000
trusted library allocation
page read and write
3B67000
heap
page read and write
3C7E000
heap
page read and write
425B000
heap
page read and write
3CA5000
heap
page read and write
2A2D000
trusted library allocation
page read and write
42BD000
heap
page read and write
4F10000
heap
page read and write
29DF000
trusted library allocation
page read and write
21CEFB10000
heap
page read and write
2A6E000
trusted library allocation
page read and write
3D0E000
heap
page read and write
3BE7000
heap
page read and write
C92000
trusted library allocation
page read and write
423F000
heap
page read and write
4F20000
heap
page execute and read and write
3D04000
heap
page read and write
4401000
heap
page read and write
2AA2000
trusted library allocation
page read and write
42BD000
heap
page read and write
3D01000
heap
page read and write
425B000
heap
page read and write
3C18000
heap
page read and write
3D92000
heap
page read and write
9FE000
heap
page read and write
4299000
heap
page read and write
451C000
heap
page read and write
490000
unkown
page write copy
15E000
stack
page read and write
401000
unkown
page execute read
3C77000
heap
page read and write
2ACD000
trusted library allocation
page read and write
4401000
heap
page read and write
423F000
heap
page read and write
4DF0000
heap
page read and write
69D2000
trusted library allocation
page read and write
3BE0000
heap
page read and write
297A000
trusted library allocation
page read and write
3BE8000
heap
page read and write
3B6A000
heap
page read and write
B24000
heap
page read and write
C86000
trusted library allocation
page execute and read and write
A2F000
heap
page read and write
4480000
heap
page read and write
2B47000
trusted library allocation
page read and write
B02000
heap
page read and write
28FD000
stack
page read and write
3C76000
heap
page read and write
A40000
trusted library allocation
page read and write
3CA5000
heap
page read and write
4401000
heap
page read and write
425B000
heap
page read and write
3CA2000
heap
page read and write
42BD000
heap
page read and write
3D00000
heap
page read and write
425B000
heap
page read and write
51AD000
stack
page read and write
3BE8000
heap
page read and write
2A13000
trusted library allocation
page read and write
9F4000
heap
page read and write
4401000
heap
page read and write
42BD000
heap
page read and write
423F000
heap
page read and write
425B000
heap
page read and write
42BD000
heap
page read and write
425B000
heap
page read and write
3BE4000
heap
page read and write
E73000
trusted library allocation
page execute and read and write
4D70000
trusted library allocation
page read and write
4480000
heap
page read and write
29E3000
trusted library allocation
page read and write
4480000
heap
page read and write
3C18000
heap
page read and write
3D96000
heap
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
8AAE000
stack
page read and write
42C000
system
page execute and read and write
47EF000
heap
page read and write
3C19000
heap
page read and write
3D9A000
heap
page read and write
4401000
heap
page read and write
3E2D000
heap
page read and write
2A4B000
trusted library allocation
page read and write
42BD000
heap
page read and write
A16000
heap
page read and write
8BAE000
stack
page read and write
2AC7000
trusted library allocation
page read and write
4DA2000
trusted library allocation
page read and write
425B000
heap
page read and write
3C76000
heap
page read and write
42BD000
heap
page read and write
4AB000
unkown
page readonly
2A65000
trusted library allocation
page read and write
42BD000
heap
page read and write
3BEA000
heap
page read and write
425B000
heap
page read and write
42CF000
heap
page read and write
42BD000
heap
page read and write
15EE000
stack
page read and write
6F6C000
heap
page read and write
2A87000
trusted library allocation
page read and write
3CC7000
heap
page read and write
42BE000
heap
page read and write
3BE7000
heap
page read and write
28B9000
trusted library allocation
page read and write
EA7000
trusted library allocation
page execute and read and write
3C7B000
heap
page read and write
423F000
heap
page read and write
9CA000
heap
page read and write
3B3A000
heap
page read and write
3B38000
heap
page read and write
3CA0000
heap
page read and write
3C12000
heap
page read and write
400000
unkown
page readonly
3C1A000
heap
page read and write
F4C000
stack
page read and write
490000
unkown
page write copy
482000
unkown
page readonly
3BEC000
heap
page read and write
6960000
heap
page read and write
3D04000
heap
page read and write
423F000
heap
page read and write
3DA5000
heap
page read and write
4480000
heap
page read and write
58C0000
heap
page read and write
3C7F000
heap
page read and write
3CA1000
heap
page read and write
425B000
heap
page read and write
E70000
trusted library allocation
page read and write
3DB0000
heap
page read and write
425B000
heap
page read and write
4D43000
heap
page read and write
4132000
heap
page read and write
2B05000
trusted library allocation
page read and write
B2E000
heap
page read and write
2985000
trusted library allocation
page read and write
3D07000
heap
page read and write
8D0000
heap
page read and write
4401000
heap
page read and write
423F000
heap
page read and write
42BD000
heap
page read and write
44B1000
heap
page read and write
425B000
heap
page read and write
2FCA000
heap
page read and write
4AB000
unkown
page readonly
47ED000
heap
page read and write
3C76000
heap
page read and write
3BE7000
heap
page read and write
425B000
heap
page read and write
3BE2000
heap
page read and write
3C17000
heap
page read and write
423F000
heap
page read and write
3D97000
heap
page read and write
4480000
heap
page read and write
3C73000
heap
page read and write
4401000
heap
page read and write
3CA5000
heap
page read and write
3D9E000
heap
page read and write
3D94000
heap
page read and write
4401000
heap
page read and write
423F000
heap
page read and write
2AC7000
trusted library allocation
page read and write
42BD000
heap
page read and write
425B000
heap
page read and write
2AB6000
trusted library allocation
page read and write
425B000
heap
page read and write
A48000
heap
page read and write
3CAC000
heap
page read and write
42D1000
heap
page read and write
9FE000
heap
page read and write
3E2E000
heap
page read and write
3C11000
heap
page read and write
4A2C000
stack
page read and write
423F000
heap
page read and write
2730000
trusted library allocation
page read and write
7DE000
system
page execute and read and write
42BD000
heap
page read and write
3CAF000
heap
page read and write
3BE0000
heap
page read and write
3D9B000
heap
page read and write
425C000
heap
page read and write
E96000
trusted library allocation
page execute and read and write
425B000
heap
page read and write
4C5E000
trusted library allocation
page read and write
4401000
heap
page read and write
3CAC000
heap
page read and write
B16000
heap
page read and write
425B000
heap
page read and write
423F000
heap
page read and write
2A05000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
423F000
heap
page read and write
2A15000
trusted library allocation
page read and write
A39000
heap
page read and write
423F000
heap
page read and write
3D9D000
heap
page read and write
4480000
heap
page read and write
4480000
heap
page read and write
2A74000
trusted library allocation
page read and write
4480000
heap
page read and write
C82000
trusted library allocation
page read and write
3C73000
heap
page read and write
BDE000
stack
page read and write
3D09000
heap
page read and write
3CA8000
heap
page read and write
490000
unkown
page write copy
425B000
heap
page read and write
3DA3000
heap
page read and write
425B000
heap
page read and write
3CA7000
heap
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
2ABB000
trusted library allocation
page read and write
42C1000
heap
page read and write
A2F000
heap
page read and write
42BD000
heap
page read and write
42BD000
heap
page read and write
3BE6000
heap
page read and write
E90000
trusted library allocation
page read and write
9CE000
stack
page read and write
2A02000
trusted library allocation
page read and write
3C71000
heap
page read and write
21CEFC40000
heap
page read and write
28FA000
trusted library allocation
page read and write
960000
heap
page read and write
4401000
heap
page read and write
3C7B000
heap
page read and write
C8A000
trusted library allocation
page execute and read and write
3CA6000
heap
page read and write
4401000
heap
page read and write
3C16000
heap
page read and write
42D0000
heap
page read and write
3895000
trusted library allocation
page read and write
2ACB000
trusted library allocation
page read and write
4401000
heap
page read and write
39EF000
stack
page read and write
4D7B000
trusted library allocation
page read and write
21CEFC4E000
heap
page read and write
42D8000
heap
page read and write
29E5000
trusted library allocation
page read and write
42BD000
heap
page read and write
492000
unkown
page read and write
3D9A000
heap
page read and write
3CA6000
heap
page read and write
425B000
heap
page read and write
B0D000
heap
page read and write
2A0F000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
4401000
heap
page read and write
42BD000
heap
page read and write
425B000
heap
page read and write
868E000
stack
page read and write
3C16000
heap
page read and write
4480000
heap
page read and write
3D0C000
heap
page read and write
3BE2000
heap
page read and write
47ED000
heap
page read and write
3D99000
heap
page read and write
3C17000
heap
page read and write
522E000
stack
page read and write
29F8000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page execute and read and write
C5F000
stack
page read and write
71DE000
stack
page read and write
482000
unkown
page readonly
4401000
heap
page read and write
3CA7000
heap
page read and write
3D09000
heap
page read and write
4F52000
heap
page read and write
D4E000
stack
page read and write
3D07000
heap
page read and write
3BE0000
heap
page read and write
3C17000
heap
page read and write
3C7E000
heap
page read and write
50AB000
stack
page read and write
3D97000
heap
page read and write
86CF000
stack
page read and write
4D74000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
425B000
heap
page read and write
3D92000
heap
page read and write
3D95000
heap
page read and write
2A81000
trusted library allocation
page read and write
3BE6000
heap
page read and write
2750000
heap
page read and write
58C9000
heap
page read and write
425B000
heap
page read and write
3C85000
direct allocation
page read and write
4480000
heap
page read and write
4C71000
trusted library allocation
page read and write
4480000
heap
page read and write
3D90000
heap
page read and write
3BE5000
heap
page read and write
29FA000
trusted library allocation
page read and write
425B000
heap
page read and write
3C15000
heap
page read and write
3CAB000
heap
page read and write
4401000
heap
page read and write
4480000
heap
page read and write
3C18000
heap
page read and write
4A8000
unkown
page read and write
42BD000
heap
page read and write
2A85000
trusted library allocation
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
3D08000
heap
page read and write
4D00000
heap
page read and write
3D9F000
heap
page read and write
3C74000
heap
page read and write
2720000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
21CEF983000
heap
page read and write
400000
unkown
page readonly
3D0F000
heap
page read and write
3CAD000
heap
page read and write
7B2000
system
page execute and read and write
4F78000
heap
page read and write
401000
unkown
page execute read
3BEA000
heap
page read and write
3CA4000
heap
page read and write
4C50000
trusted library allocation
page read and write
4C7D000
trusted library allocation
page read and write
3BE8000
heap
page read and write
3C10000
heap
page read and write
3BEA000
heap
page read and write
3C16000
heap
page read and write
4401000
heap
page read and write
C80000
trusted library allocation
page read and write
4401000
heap
page read and write
42BD000
heap
page read and write
A80000
heap
page read and write
E80000
trusted library allocation
page read and write
3CAB000
heap
page read and write
4401000
heap
page read and write
A60000
heap
page read and write
3E3E000
heap
page read and write
3D07000
heap
page read and write
3D04000
heap
page read and write
3EB0000
heap
page read and write
2A4D000
trusted library allocation
page read and write
4401000
heap
page read and write
4401000
heap
page read and write
41DD000
heap
page read and write
423F000
heap
page read and write
B40000
heap
page read and write
21CEF929000
heap
page read and write
4480000
heap
page read and write
4480000
heap
page read and write
FAF000
trusted library allocation
page read and write
3BE1000
heap
page read and write
42BD000
heap
page read and write
C9B000
trusted library allocation
page execute and read and write
425B000
heap
page read and write
989000
heap
page read and write
425B000
heap
page read and write
87EE000
stack
page read and write
CE0000
heap
page read and write
425B000
heap
page read and write
423F000
heap
page read and write
3B6C000
heap
page read and write
425B000
heap
page read and write
2A17000
trusted library allocation
page read and write
3C72000
heap
page read and write
35EE000
stack
page read and write
2EA0000
heap
page read and write
1B0000
heap
page read and write
A53000
heap
page read and write
3BE4000
heap
page read and write
412C000
heap
page read and write
3D07000
heap
page read and write
5110000
heap
page read and write
2A5D000
trusted library allocation
page read and write
3D08000
heap
page read and write
2A47000
trusted library allocation
page read and write
882E000
stack
page read and write
4401000
heap
page read and write
3CAC000
heap
page read and write
3D02000
heap
page read and write
3E2F000
heap
page read and write
3D05000
heap
page read and write
4480000
heap
page read and write
3D93000
heap
page read and write
2A43000
trusted library allocation
page read and write
41DD000
heap
page read and write
42BD000
heap
page read and write
A7E000
heap
page read and write
482000
unkown
page readonly
2ACF000
trusted library allocation
page read and write
3BE3000
heap
page read and write
CFC17FE000
stack
page read and write
423F000
heap
page read and write
4480000
heap
page read and write
1B5000
heap
page read and write
2A3B000
trusted library allocation
page read and write
9A000
stack
page read and write
3D98000
heap
page read and write
5255000
heap
page read and write
4D96000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
4480000
heap
page read and write
8A6E000
stack
page read and write
F50000
trusted library allocation
page execute and read and write
3C17000
heap
page read and write
3C15000
heap
page read and write
3C74000
heap
page read and write
3D9E000
heap
page read and write
F70000
heap
page read and write
3D0E000
heap
page read and write
3D0B000
heap
page read and write
2F05000
heap
page read and write
3BE9000
heap
page read and write
2A78000
trusted library allocation
page read and write
423F000
heap
page read and write
29BB000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
423F000
heap
page read and write
42BD000
heap
page read and write
423F000
heap
page read and write
52DE000
stack
page read and write
4DD0000
trusted library allocation
page read and write
3CA0000
heap
page read and write
425B000
heap
page read and write
44B3000
heap
page read and write
425B000
heap
page read and write
2A6C000
trusted library allocation
page read and write
42BD000
heap
page read and write
A98000
heap
page read and write
2A70000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
423F000
heap
page read and write
2B4C000
trusted library allocation
page read and write
425B000
heap
page read and write
3E2F000
heap
page read and write
4106000
heap
page read and write
3CA7000
heap
page read and write
3CA2000
heap
page read and write
2B01000
trusted library allocation
page read and write
3C14000
heap
page read and write
5230000
heap
page read and write
3C16000
heap
page read and write
4401000
heap
page read and write
2AEE000
trusted library allocation
page read and write
423F000
heap
page read and write
3BE4000
heap
page read and write
423F000
heap
page read and write
2E47000
heap
page read and write
2A91000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
B00000
heap
page read and write
4401000
heap
page read and write
3BE9000
heap
page read and write
3BE8000
heap
page read and write
3D00000
heap
page read and write
3C73000
heap
page read and write
1F0000
heap
page read and write
2AEA000
trusted library allocation
page read and write
3D90000
heap
page read and write
3D9D000
heap
page read and write
2A82000
trusted library allocation
page read and write
4401000
heap
page read and write
3CA5000
heap
page read and write
4480000
heap
page read and write
1C0000
heap
page read and write
423F000
heap
page read and write
3D0A000
heap
page read and write
3D0C000
heap
page read and write
273F000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
854F000
stack
page read and write
3C7F000
heap
page read and write
C6D000
trusted library allocation
page execute and read and write
4401000
heap
page read and write
42BD000
heap
page read and write
4401000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
425B000
heap
page read and write
3C18000
heap
page read and write
5100000
heap
page read and write
26FC000
stack
page read and write
42BD000
heap
page read and write
4480000
heap
page read and write
2991000
trusted library allocation
page read and write
D00000
heap
page read and write
3D93000
heap
page read and write
B37000
heap
page read and write
3BE3000
heap
page read and write
3BEC000
heap
page read and write
423F000
heap
page read and write
100000
heap
page read and write
4E30000
heap
page read and write
4401000
heap
page read and write
C7D000
trusted library allocation
page execute and read and write
ACD000
heap
page read and write
4401000
heap
page read and write
2A9B000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
D00000
trusted library allocation
page execute and read and write
4CC0000
trusted library allocation
page read and write
8B4000
stack
page read and write
3D08000
heap
page read and write
E4E000
stack
page read and write
29E2000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
21CF1550000
heap
page read and write
2870000
trusted library allocation
page read and write
3D1F000
heap
page read and write
E60000
trusted library allocation
page read and write
4401000
heap
page read and write
21CEF900000
heap
page read and write
6FA2000
heap
page read and write
3D02000
heap
page read and write
3C17000
heap
page read and write
5030000
heap
page read and write
3CA4000
heap
page read and write
2A4F000
trusted library allocation
page read and write
3C1C000
heap
page read and write
3C7F000
heap
page read and write
3D92000
heap
page read and write
B1F000
heap
page read and write
F80000
trusted library allocation
page read and write
42BD000
heap
page read and write
47ED000
heap
page read and write
4480000
heap
page read and write
3D9D000
heap
page read and write
3D94000
heap
page read and write
FA0000
trusted library allocation
page read and write
3D93000
heap
page read and write
3B32000
heap
page read and write
423F000
heap
page read and write
4401000
heap
page read and write
423F000
heap
page read and write
FB5000
trusted library allocation
page read and write
2AEC000
trusted library allocation
page read and write
425B000
heap
page read and write
4F80000
heap
page read and write
425B000
heap
page read and write
2AB4000
trusted library allocation
page read and write
425B000
heap
page read and write
3C7E000
heap
page read and write
4F36000
heap
page read and write
858E000
stack
page read and write
B35000
heap
page read and write
3C14000
heap
page read and write
3D0A000
heap
page read and write
FC7000
heap
page read and write
2AC3000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
2A9B000
trusted library allocation
page read and write
9D9000
heap
page read and write
414F000
heap
page read and write
425B000
heap
page read and write
42BD000
heap
page read and write
3D0E000
heap
page read and write
3C18000
heap
page read and write
425B000
heap
page read and write
4208000
heap
page read and write
3D98000
heap
page read and write
4480000
heap
page read and write
2981000
trusted library allocation
page read and write
4E10000
heap
page read and write
CDF000
stack
page read and write
42BD000
heap
page read and write
3C74000
heap
page read and write
FB0000
trusted library allocation
page read and write
8C0000
heap
page read and write
3D0A000
heap
page read and write
3C17000
heap
page read and write
4480000
heap
page read and write
3911000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
293B000
trusted library allocation
page read and write
425B000
heap
page read and write
21CEF9BE000
heap
page read and write
4401000
heap
page read and write
3BE2000
heap
page read and write
2A91000
trusted library allocation
page read and write
3BE7000
heap
page read and write
3E0A000
heap
page read and write
3D9D000
heap
page read and write
3E2D000
heap
page read and write
3C19000
heap
page read and write
4077000
heap
page read and write
3BE1000
heap
page read and write
9FA000
heap
page read and write
400000
unkown
page readonly
5250000
heap
page read and write
3BEC000
heap
page read and write
2A39000
trusted library allocation
page read and write
5060000
heap
page read and write
4480000
heap
page read and write
28B7000
trusted library allocation
page read and write
1F4000
heap
page read and write
4281000
heap
page read and write
CFC13FF000
stack
page read and write
3D00000
heap
page read and write
490000
unkown
page read and write
A8B000
heap
page read and write
4480000
heap
page read and write
2A93000
trusted library allocation
page read and write
3D04000
heap
page read and write
3D06000
heap
page read and write
3C7C000
heap
page read and write
3D98000
heap
page read and write
3C1C000
heap
page read and write
E9A000
trusted library allocation
page execute and read and write
3D97000
heap
page read and write
3E2F000
heap
page read and write
425B000
heap
page read and write
2A22000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4401000
heap
page read and write
CFC14FF000
stack
page read and write
F96000
trusted library allocation
page read and write
4D91000
trusted library allocation
page read and write
425B000
heap
page read and write
3D9C000
heap
page read and write
425B000
heap
page read and write
42BD000
heap
page execute and read and write
3C74000
heap
page read and write
3CA3000
heap
page read and write
3CA0000
heap
page read and write
425B000
heap
page read and write
39F5000
heap
page read and write
425B000
heap
page read and write
9DD000
heap
page read and write
4C90000
trusted library allocation
page read and write
3D07000
heap
page read and write
425B000
heap
page read and write
4E70000
trusted library allocation
page read and write
425B000
heap
page read and write
423F000
heap
page read and write
47EE000
heap
page read and write
3FC3000
heap
page read and write
2A53000
trusted library allocation
page read and write
4114000
heap
page read and write
3C18000
heap
page read and write
E92000
trusted library allocation
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
3C16000
heap
page read and write
2A5B000
trusted library allocation
page read and write
42BD000
heap
page read and write
298E000
trusted library allocation
page read and write
3D92000
heap
page read and write
29D5000
trusted library allocation
page read and write
4480000
heap
page read and write
D10000
heap
page read and write
4E50000
trusted library allocation
page execute and read and write
2A5F000
trusted library allocation
page read and write
3CA1000
heap
page read and write
42BD000
heap
page read and write
3CA6000
heap
page read and write
42BD000
heap
page read and write
29DB000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
3C78000
heap
page read and write
411C000
heap
page read and write
3C74000
heap
page read and write
9EE000
stack
page read and write
3BED000
heap
page read and write
A08000
heap
page read and write
A12000
heap
page read and write
A18000
heap
page read and write
425B000
heap
page read and write
CFC18FF000
stack
page read and write
AE6000
heap
page read and write
42D0000
heap
page read and write
4D40000
heap
page read and write
8AF000
stack
page read and write
425B000
heap
page read and write
3C77000
heap
page read and write
9E2000
heap
page read and write
21CF1450000
heap
page read and write
42BD000
heap
page read and write
4AB000
unkown
page readonly
3CAD000
heap
page read and write
2A8B000
trusted library allocation
page read and write
3D90000
heap
page read and write
423F000
heap
page read and write
423F000
heap
page read and write
42BD000
heap
page read and write
2A36000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
3D03000
heap
page read and write
3D0C000
heap
page read and write
110000
heap
page read and write
B06000
heap
page read and write
C70000
trusted library allocation
page read and write
2E30000
heap
page read and write
4401000
heap
page read and write
2AC9000
trusted library allocation
page read and write
4E85000
heap
page read and write
423F000
heap
page read and write
42BD000
heap
page read and write
4F00000
trusted library section
page readonly
5040000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
3BE9000
heap
page read and write
2B03000
trusted library allocation
page read and write
42BD000
heap
page read and write
29F4000
trusted library allocation
page read and write
67A000
stack
page read and write
2A32000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
4C6E000
trusted library allocation
page read and write
6F74000
heap
page read and write
423F000
heap
page read and write
3D93000
heap
page read and write
3C72000
heap
page read and write
423F000
heap
page read and write
423F000
heap
page read and write
FC0000
heap
page read and write
9EC000
heap
page read and write
3D0F000
heap
page read and write
2880000
heap
page execute and read and write
2700000
trusted library allocation
page read and write
3D06000
heap
page read and write
3CA9000
heap
page read and write
4DF3000
heap
page read and write
3D91000
heap
page read and write
425B000
heap
page read and write
4480000
heap
page read and write
42BD000
heap
page read and write
4401000
heap
page read and write
3BE3000
heap
page read and write
3C7C000
heap
page read and write
5074000
trusted library section
page readonly
3C76000
heap
page read and write
4227000
heap
page read and write
4401000
heap
page read and write
3BE7000
heap
page read and write
4D9D000
trusted library allocation
page read and write
3BE9000
heap
page read and write
42BE000
heap
page read and write
3D0D000
heap
page read and write
2A0E000
trusted library allocation
page read and write
4D7E000
trusted library allocation
page read and write
3D9F000
heap
page read and write
47EE000
heap
page read and write
29E1000
trusted library allocation
page read and write
42A1000
heap
page read and write
C63000
trusted library allocation
page execute and read and write
19E000
stack
page read and write
423F000
heap
page read and write
4480000
heap
page read and write
4E80000
heap
page read and write
3C17000
heap
page read and write
3D9E000
heap
page read and write
2A97000
trusted library allocation
page read and write
4126000
heap
page read and write
5120000
heap
page execute and read and write
9EA000
heap
page read and write
3C12000
heap
page read and write
425B000
heap
page read and write
425B000
heap
page read and write
3D04000
heap
page read and write
425B000
heap
page read and write
3C19000
heap
page read and write
2962000
trusted library allocation
page read and write
3BE3000
heap
page read and write
There are 1084 hidden memdumps, click here to show them.