IOC Report
NVOICE FOR THE MONTH OF AUG-24.exe

loading gif

Files

File Path
Type
Category
Malicious
NVOICE FOR THE MONTH OF AUG-24.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\H05Y8H-I
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\pyogenesis
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
"C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"
malicious
C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
"C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe"
malicious
C:\Windows\SysWOW64\TapiUnattend.exe
"C:\Windows\SysWOW64\TapiUnattend.exe"
malicious
C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
"C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.crowsecurity.cloud/jvjp/
3.33.130.190
https://duckduckgo.com/ac/?q=
unknown
http://www.lanxuanz.tech/ivo1/?IH=BP3PrJvHc6MXcF&wrRLLPUh=fL7FGqwZgFyeKETJ58v2LpmodVM6vZtD0XO9xnYIy5nXxzuHXVLl0+u5SqQtPDeu0FT/+Cn/ojl8jT3mUhnhpKNreTIBn1GsPPCO7XuNhO+zSMbYdoB0rmQ=
136.143.186.12
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.newdaydawning.net/72tr/
44.213.25.70
http://www.selftip.top/85su/?wrRLLPUh=+3B6fjGs9Z40sbhWxh4Olw8ODpxTfKIF4isjbFYKdetJPWg+iKgIwujGEU5yKjzj4BkeFS8xvi4EjdbOtsLgFdPJH1ajNMdDlKenjZRhD3fwrVi0trMy8bo=&IH=BP3PrJvHc6MXcF
199.192.21.169
https://www.zoho.com/sites/images/professionally-crafted-themes.png
unknown
http://www.inspireplay.live/p8sm/
3.33.130.190
http://www.o731lh.vip/2mtz/?IH=BP3PrJvHc6MXcF&wrRLLPUh=IfYyAdGVqG15+W1eWJCxS0ORt4nu6IY1D62BdBAlUg+344eMNCzJLfy5jwznGJhpNs/P9siyZSS4xk9tvxK5ee8p4hJaGD9LflzCx/QbEnNrt30eVgRceG0=
3.33.130.190
http://www.turbonotes.app/yvck/
217.70.184.50
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6+hRUKDDRrrjNlIlSQ84SzFoivqKQb5yDyJKTfd8P5RA0nco9Gqas/wnYV+AlJk=&IH=BP3PrJvHc6MXcF
44.213.25.70
https://www.ecosia.org/newtab/
unknown
http://www.lanxuanz.tech/ivo1/
136.143.186.12
https://www.zoho.com/sites/?src=parkeddomain&dr=www.lanxuanz.tech
unknown
http://www.aaavvejibej.bond/lpl9/?wrRLLPUh=e8lWkFdpBI8fMqvrlwy/onG3BcZVz7zQmYaHg/xvgOUuLw6B3kGtYYWM8/CK9QzH2IDr1kJuLXtu8i/nZF8LLdKb2VMPvKTLf5QxvZUWo2Nd+FhaQzJMI4o=&IH=BP3PrJvHc6MXcF
172.67.181.150
http://www.wajf.net/zl4r/?wrRLLPUh=qAyzze+7Xxv+wA09CtJQAc1N08fgxsYjMF3PXk0d3f7QX0q4Jz2C7sJqIlEgcTB+GqBDI184c5mD0TMdCmIzOUWEYKg5UaPGXuwVBW400SE67lweB1cXDRo=&IH=BP3PrJvHc6MXcF
44.207.39.65
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.o731lh.vip/2mtz/
3.33.130.190
http://www.selftip.top/85su/
199.192.21.169
http://www.crowsecurity.cloud/jvjp/?wrRLLPUh=4b5MqvIelA8yeSWKDPRIdHesNV5XUrpBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqCv57Hh5Ivk5Sj0mDZDuer/ujvu4zkb6QZi8=&IH=BP3PrJvHc6MXcF
3.33.130.190
http://www.turbonotes.app
unknown
http://www.weatherbook.live/4hiy/
3.33.130.190
http://newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6
unknown
http://www.wajf.net/zl4r/
44.207.39.65
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.whats-in-the-box.org/30jd/
3.33.130.190
https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumb
unknown
http://www.weatherbook.live/4hiy/?wrRLLPUh=x7+2I8SGsUecCMiSjTFbl5lp6Hdc+2w1VtibsJt/MsyL3kCUaBIR7/SGJ6EjRkH0LM2kKQMRMq/OnwKr8gWiX4rGIBeWvoECrZmU86sauZftBWicToOcLZk=&IH=BP3PrJvHc6MXcF
3.33.130.190
http://www.shanhaiguan.net/p2q3/
156.242.132.82
http://www.inspireplay.live/p8sm/?IH=BP3PrJvHc6MXcF&wrRLLPUh=gudxXcfIjfM6RSgjlHSXwEEWc2+zEXg0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjubt2jusNNuut2QLx2iafcYqdrxcPN6iJJGks=
3.33.130.190
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.inspireplay.live
unknown
malicious
www.kfowks.site
unknown
malicious
www.o731lh.vip
unknown
malicious
www.turbonotes.app
unknown
malicious
www.weatherbook.live
unknown
malicious
www.crowsecurity.cloud
unknown
malicious
www.newdaydawning.net
unknown
malicious
www.whats-in-the-box.org
unknown
malicious
www.lanxuanz.tech
unknown
malicious
www.wajf.net
unknown
malicious
webredir.vip.gandi.net
217.70.184.50
crowsecurity.cloud
3.33.130.190
inspireplay.live
3.33.130.190
zhs.zohosites.com
136.143.186.12
o731lh.vip
3.33.130.190
www.aaavvejibej.bond
172.67.181.150
weatherbook.live
3.33.130.190
newdaydawning.net
44.213.25.70
www.selftip.top
199.192.21.169
whats-in-the-box.org
3.33.130.190
www.shanhaiguan.net
156.242.132.82
cdl-lb-1356093980.us-east-1.elb.amazonaws.com
44.207.39.65
There are 12 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
156.242.132.82
www.shanhaiguan.net
Seychelles
136.143.186.12
zhs.zohosites.com
United States
199.192.21.169
www.selftip.top
United States
44.213.25.70
newdaydawning.net
United States
44.207.39.65
cdl-lb-1356093980.us-east-1.elb.amazonaws.com
United States
172.67.181.150
www.aaavvejibej.bond
United States
217.70.184.50
webredir.vip.gandi.net
France
3.33.130.190
crowsecurity.cloud
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2ED0000
trusted library allocation
page read and write
malicious
3130000
trusted library allocation
page read and write
malicious
4A90000
unclassified section
page execute and read and write
malicious
3730000
unkown
page execute and read and write
malicious
8C40000
unclassified section
page execute and read and write
malicious
2C30000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
52B0000
system
page execute and read and write
malicious
334E000
stack
page read and write
3031000
heap
page read and write
9BE000
stack
page read and write
40BB000
heap
page read and write
403D000
heap
page read and write
4880000
direct allocation
page read and write
2FA2000
heap
page read and write
3031000
heap
page read and write
29A0000
heap
page read and write
6E5000
unkown
page read and write
3000000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
E31000
unkown
page readonly
3014000
heap
page read and write
3031000
heap
page read and write
3690000
unclassified section
page execute and read and write
105000
heap
page read and write
19D6B770000
trusted library allocation
page read and write
2D94000
heap
page read and write
3031000
heap
page read and write
430000
unkown
page readonly
3031000
heap
page read and write
3031000
heap
page read and write
110000
heap
page read and write
332D000
direct allocation
page execute and read and write
6310000
trusted library allocation
page read and write
3A91000
heap
page read and write
3031000
heap
page read and write
40F1000
heap
page read and write
490000
unkown
page read and write
40BB000
heap
page read and write
9C4000
heap
page read and write
4803000
direct allocation
page read and write
7D86000
heap
page read and write
6D1000
unkown
page execute read
3C03000
heap
page read and write
50000
unkown
page readonly
2FB1000
heap
page read and write
401D000
heap
page read and write
FDF000
stack
page read and write
2F4D000
heap
page read and write
99A000
stack
page read and write
40BB000
heap
page read and write
2A13000
heap
page read and write
403D000
heap
page read and write
4072000
heap
page read and write
19D69EF3000
heap
page read and write
403D000
heap
page read and write
7D46000
heap
page read and write
4A02000
unclassified section
page read and write
2A13000
heap
page read and write
3650000
direct allocation
page read and write
3B1C000
unclassified section
page read and write
283C000
stack
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
4542000
heap
page read and write
2A13000
heap
page read and write
B90000
unkown
page readonly
2330000
unkown
page execute and read and write
2FB1000
heap
page read and write
3031000
heap
page read and write
A70000
heap
page read and write
19D6BA0E000
trusted library allocation
page read and write
400000
unkown
page readonly
3031000
heap
page read and write
3329000
direct allocation
page execute and read and write
3031000
heap
page read and write
1DC000
stack
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
CFC000
stack
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
9E0000
unkown
page readonly
403D000
heap
page read and write
3031000
heap
page read and write
128E000
stack
page read and write
215F000
stack
page read and write
3031000
heap
page read and write
454C000
unclassified section
page read and write
3031000
heap
page read and write
287B000
stack
page read and write
403D000
heap
page read and write
8B4000
stack
page read and write
3031000
heap
page read and write
2890000
heap
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
9F0000
unkown
page readonly
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
6E7000
unkown
page readonly
4EB8000
unclassified section
page read and write
2F4D000
heap
page read and write
34F0000
direct allocation
page execute and read and write
7D4B000
heap
page read and write
4096000
unclassified section
page read and write
54DC000
unkown
page read and write
5E0000
heap
page read and write
7E30000
trusted library allocation
page read and write
319E000
heap
page read and write
3031000
heap
page read and write
37BD000
direct allocation
page execute and read and write
403D000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
3129000
heap
page read and write
ED0000
heap
page read and write
40BA000
heap
page read and write
3001000
heap
page read and write
2E00000
direct allocation
page read and write
6D0000
unkown
page readonly
403D000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
46E0000
direct allocation
page read and write
59CE000
unclassified section
page execute and read and write
3C0A000
heap
page read and write
2E1F000
stack
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
3EF4000
unkown
page read and write
19D69D86000
system
page execute and read and write
29F6C000
system
page read and write
2A13000
heap
page read and write
1078000
heap
page read and write
60000
unkown
page readonly
2E00000
heap
page read and write
2A13000
heap
page read and write
1070000
heap
page read and write
19D69E70000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2F3F000
stack
page read and write
46E0000
direct allocation
page read and write
2FEA000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
7D84000
heap
page read and write
3031000
heap
page read and write
2FD7000
heap
page read and write
8FE000
stack
page read and write
420000
unkown
page readonly
3031000
heap
page read and write
3F53000
heap
page read and write
40BB000
heap
page read and write
DA000
stack
page read and write
3031000
heap
page read and write
2FC3000
heap
page read and write
2FA2000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
40BB000
heap
page read and write
420000
unkown
page readonly
1F0000
heap
page read and write
3031000
heap
page read and write
49AD000
direct allocation
page read and write
3031000
heap
page read and write
412B000
heap
page read and write
43843FB000
stack
page read and write
4880000
direct allocation
page read and write
2DDE000
stack
page read and write
19D6BBC4000
trusted library allocation
page read and write
E1E000
stack
page read and write
3031000
heap
page read and write
2A00000
heap
page read and write
5D0000
unkown
page readonly
5322000
system
page execute and read and write
4015000
heap
page read and write
29A4000
heap
page read and write
4A1E000
direct allocation
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2BA2000
unkown
page read and write
40BB000
heap
page read and write
403D000
heap
page read and write
2FAD000
heap
page read and write
9C0000
heap
page read and write
3F29000
heap
page read and write
3031000
heap
page read and write
2F42000
heap
page read and write
4880000
direct allocation
page read and write
19D6B900000
trusted library allocation
page read and write
2FAD000
heap
page read and write
466E000
unkown
page execute and read and write
2A13000
heap
page read and write
3542000
direct allocation
page execute and read and write
2D94000
heap
page read and write
2C12000
heap
page read and write
6E5000
unkown
page read and write
2EB0000
heap
page read and write
3031000
heap
page read and write
E40000
unkown
page read and write
3264000
unkown
page read and write
2230000
heap
page read and write
3031000
heap
page read and write
2F86000
heap
page read and write
3480000
heap
page read and write
3031000
heap
page read and write
7D8E000
heap
page read and write
3650000
direct allocation
page read and write
40B4000
heap
page read and write
4228000
unclassified section
page read and write
7E40000
trusted library allocation
page read and write
3A8F000
stack
page read and write
3031000
heap
page read and write
19D69E40000
heap
page read and write
3031000
heap
page read and write
40B9000
heap
page read and write
49AD000
direct allocation
page read and write
2F23000
heap
page read and write
3031000
heap
page read and write
4803000
direct allocation
page read and write
3031000
heap
page read and write
2CB0000
heap
page read and write
49A9000
direct allocation
page read and write
4FCE000
unclassified section
page execute and read and write
43BA000
unclassified section
page read and write
3031000
heap
page read and write
2EB0000
trusted library allocation
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
401000
unkown
page execute read
412B000
heap
page read and write
2CBC000
unkown
page read and write
3031000
heap
page read and write
A90000
heap
page read and write
29DAC000
system
page read and write
403D000
heap
page read and write
482000
unkown
page readonly
2050000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
5A1000
unkown
page readonly
6D1000
unkown
page execute read
6D1000
unkown
page execute read
1FE0000
unkown
page read and write
3031000
heap
page read and write
4A0000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
490000
unkown
page read and write
4118000
heap
page execute and read and write
40BB000
heap
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
4A1E000
direct allocation
page read and write
40BB000
heap
page read and write
5348000
system
page execute and read and write
19D6BA21000
trusted library allocation
page read and write
3031000
heap
page read and write
19D6B770000
trusted library allocation
page read and write
1500000
unkown
page readonly
842F000
stack
page read and write
40BB000
heap
page read and write
D00000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
1FDE000
stack
page read and write
2F49000
heap
page read and write
EA0000
unkown
page read and write
40BB000
heap
page read and write
4097000
heap
page read and write
3031000
heap
page read and write
32D0000
trusted library allocation
page read and write
2230000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
29A0000
heap
page read and write
A9E000
heap
page read and write
4073000
heap
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
9E0000
heap
page read and write
2FAD000
heap
page read and write
3619000
direct allocation
page execute and read and write
3031000
heap
page read and write
19D69EF3000
heap
page read and write
1170000
unkown
page readonly
A9A000
heap
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
539F000
system
page execute and read and write
19D69D83000
system
page execute and read and write
FDF000
stack
page read and write
3014000
heap
page read and write
3031000
heap
page read and write
910000
unkown
page readonly
800000
unkown
page readonly
19D69EC0000
heap
page read and write
2F44000
heap
page read and write
29BB000
stack
page read and write
49A9000
direct allocation
page read and write
4880000
direct allocation
page read and write
9F0000
unkown
page readonly
3031000
heap
page read and write
4870000
unclassified section
page read and write
2A13000
heap
page read and write
4020000
heap
page read and write
3E20000
heap
page read and write
3031000
heap
page read and write
2F7E000
stack
page read and write
2A13000
heap
page read and write
40BB000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
40E0000
heap
page read and write
7D5F000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3902000
unclassified section
page read and write
E40000
unkown
page read and write
ED5000
heap
page read and write
2C1E000
heap
page read and write
29D52000
system
page read and write
3832000
direct allocation
page execute and read and write
2C05000
heap
page read and write
E20000
unkown
page read and write
2E7C000
unkown
page read and write
410000
unkown
page readonly
4A1E000
direct allocation
page read and write
19D69ECF000
heap
page read and write
40BB000
heap
page read and write
1170000
unkown
page readonly
3031000
heap
page read and write
40BB000
heap
page read and write
3180000
heap
page read and write
40BB000
heap
page read and write
910000
unkown
page readonly
4803000
direct allocation
page read and write
534B000
system
page execute and read and write
3031000
heap
page read and write
19D69EDC000
heap
page read and write
E60000
unkown
page readonly
7D6A000
heap
page read and write
4803000
direct allocation
page read and write
19D6BA13000
trusted library allocation
page read and write
5D0000
unkown
page readonly
400000
unkown
page readonly
403D000
heap
page read and write
2A02000
heap
page read and write
2240000
unkown
page readonly
49A9000
direct allocation
page read and write
3031000
heap
page read and write
40BB000
heap
page read and write
40BB000
heap
page read and write
492000
unkown
page read and write
300F000
heap
page read and write
3842000
unclassified section
page read and write
3031000
heap
page read and write
3BFC000
unkown
page execute and read and write
2234000
heap
page read and write
403D000
heap
page read and write
2AB0000
unkown
page readonly
7D81000
heap
page read and write
29C92000
system
page read and write
361D000
direct allocation
page execute and read and write
40BB000
heap
page read and write
19D6B770000
trusted library allocation
page read and write
3031000
heap
page read and write
4880000
direct allocation
page read and write
3650000
direct allocation
page read and write
3031000
heap
page read and write
108F000
heap
page read and write
40BB000
heap
page read and write
4F5C000
unclassified section
page execute and read and write
49AD000
direct allocation
page read and write
3031000
heap
page read and write
29C0000
heap
page read and write
40BB000
heap
page read and write
368E000
direct allocation
page execute and read and write
403D000
heap
page read and write
28B0000
heap
page read and write
4384BFE000
stack
page read and write
3031000
heap
page read and write
32D0000
trusted library allocation
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2FB6000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
19D69EF0000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
2F80000
direct allocation
page read and write
2D90000
heap
page read and write
2FB1000
heap
page read and write
2C19000
heap
page read and write
3031000
heap
page read and write
6E7000
unkown
page readonly
49AD000
direct allocation
page read and write
3031000
heap
page read and write
3197000
heap
page read and write
4880000
direct allocation
page read and write
4AB000
unkown
page readonly
4AB000
unkown
page readonly
40BB000
heap
page read and write
2F5E000
heap
page read and write
491000
unkown
page write copy
3024000
heap
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
70000
unkown
page readonly
19D6BBCE000
trusted library allocation
page read and write
19D69EEC000
heap
page read and write
E80000
unkown
page read and write
2C00000
heap
page read and write
2FE4000
heap
page read and write
7D3A000
heap
page read and write
403D000
heap
page read and write
2F30000
heap
page read and write
40BB000
heap
page read and write
6D0000
unkown
page readonly
93E000
stack
page read and write
364F000
stack
page read and write
2D30000
unkown
page execute and read and write
3FAC000
heap
page read and write
3031000
heap
page read and write
2AB0000
unkown
page readonly
3031000
heap
page read and write
403D000
heap
page read and write
2A354000
system
page read and write
4114000
heap
page read and write
19D6B880000
heap
page read and write
6D0000
unkown
page readonly
2FE1000
heap
page read and write
32BA000
heap
page read and write
300F000
heap
page read and write
3031000
heap
page read and write
70000
unkown
page readonly
40BB000
heap
page read and write
3031000
heap
page read and write
532C000
system
page execute and read and write
3031000
heap
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
2A13000
heap
page read and write
40BE000
heap
page read and write
3C00000
direct allocation
page read and write
5B0000
unkown
page read and write
ED0000
heap
page read and write
46E0000
direct allocation
page read and write
7D5E000
heap
page read and write
4137000
heap
page read and write
5B0000
unkown
page read and write
2E3E000
stack
page read and write
E60000
unkown
page readonly
6DCE000
unclassified section
page execute and read and write
403D000
heap
page read and write
3EF6000
heap
page read and write
4A1E000
direct allocation
page read and write
7D58000
heap
page read and write
3031000
heap
page read and write
19D69E20000
heap
page read and write
9D0000
unkown
page readonly
3031000
heap
page read and write
19D69D00000
system
page execute and read and write
7D41000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3348000
heap
page read and write
2FB6000
heap
page read and write
3230000
trusted library allocation
page execute and read and write
7D51000
heap
page read and write
403D000
heap
page read and write
4135000
heap
page read and write
19D6BA03000
trusted library allocation
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
49A9000
direct allocation
page read and write
43853FE000
stack
page read and write
3031000
heap
page read and write
800000
unkown
page readonly
403D000
heap
page read and write
3031000
heap
page read and write
2F45000
heap
page read and write
3031000
heap
page read and write
2F9E000
heap
page read and write
3D20000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2234000
heap
page read and write
404D000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2A13000
heap
page read and write
506E000
unkown
page execute and read and write
3031000
heap
page read and write
2F4D000
heap
page read and write
B91000
unkown
page readonly
2E7C000
unkown
page read and write
E80000
unkown
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2BA2000
unkown
page read and write
7D56000
heap
page read and write
E90000
heap
page read and write
2F42000
heap
page read and write
3031000
heap
page read and write
4A7000
unkown
page read and write
2A13000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
40BB000
heap
page read and write
2240000
unkown
page readonly
3031000
heap
page read and write
442D000
heap
page read and write
40BB000
heap
page read and write
4A1E000
direct allocation
page read and write
2FF7000
heap
page read and write
2D01000
heap
page read and write
3F43000
heap
page read and write
4090000
unclassified section
page execute and read and write
7D5B000
heap
page read and write
5A6E000
unkown
page execute and read and write
3031000
heap
page read and write
2FA2000
heap
page read and write
40BB000
heap
page read and write
2F38000
heap
page read and write
2C62000
unkown
page read and write
2A13000
heap
page read and write
338E000
stack
page read and write
28E0000
heap
page read and write
29F8000
stack
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
312D000
heap
page read and write
403D000
heap
page read and write
3C6E000
unkown
page execute and read and write
3031000
heap
page read and write
4803000
direct allocation
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
33F6000
unkown
page read and write
ACB000
heap
page read and write
4A0000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
403D000
heap
page read and write
920000
unkown
page readonly
3190000
trusted library allocation
page read and write
34D1000
direct allocation
page execute and read and write
3475000
heap
page read and write
395C000
unclassified section
page read and write
19D69EC9000
heap
page read and write
105C000
unkown
page read and write
2FEA000
heap
page read and write
4A8000
heap
page read and write
403D000
heap
page read and write
40BB000
heap
page read and write
E90000
heap
page read and write
3D62000
unkown
page read and write
46E0000
direct allocation
page read and write
3031000
heap
page read and write
7D8B000
heap
page read and write
83EE000
stack
page read and write
2F53000
heap
page read and write
3031000
heap
page read and write
BCE000
unkown
page read and write
40BB000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
E1E000
stack
page read and write
3031000
heap
page read and write
EB0000
unkown
page read and write
2FC3000
heap
page read and write
2F92000
heap
page read and write
403D000
heap
page read and write
403D000
heap
page read and write
411C000
heap
page read and write
2AAF000
stack
page read and write
2C05000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
930000
unkown
page readonly
9E0000
unkown
page readonly
3031000
heap
page read and write
D00000
heap
page read and write
2FF7000
heap
page read and write
4803000
direct allocation
page read and write
40BB000
heap
page read and write
3031000
heap
page read and write
440000
heap
page read and write
63CE000
unclassified section
page execute and read and write
49A9000
direct allocation
page read and write
3031000
heap
page read and write
9D0000
unkown
page readonly
3031000
heap
page read and write
34E6000
heap
page read and write
3C6E000
heap
page read and write
9A000
stack
page read and write
2FE4000
heap
page read and write
3031000
heap
page read and write
3F04000
unclassified section
page read and write
490000
unkown
page read and write
40BB000
heap
page read and write
1070000
heap
page read and write
440000
heap
page read and write
371A000
unkown
page read and write
403D000
heap
page read and write
3009000
heap
page read and write
3031000
heap
page read and write
4385BFE000
stack
page read and write
3031000
heap
page read and write
1DC000
stack
page read and write
7D72000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
8AF000
stack
page read and write
3031000
heap
page read and write
2D94000
heap
page read and write
40BB000
heap
page read and write
3588000
unkown
page read and write
2FD2000
heap
page read and write
2C17000
heap
page read and write
40BB000
heap
page read and write
4A8000
heap
page read and write
3031000
heap
page read and write
401000
unkown
page execute read
3031000
heap
page read and write
1078000
heap
page read and write
3031000
heap
page read and write
2F40000
heap
page read and write
100000
heap
page read and write
1500000
unkown
page readonly
E20000
unkown
page read and write
2F4D000
heap
page read and write
2F44000
heap
page read and write
2EA0000
heap
page read and write
2F30000
heap
page read and write
3031000
heap
page read and write
2A13000
heap
page read and write
101E000
stack
page read and write
40BB000
heap
page read and write
6DE000
unkown
page readonly
2A13000
heap
page read and write
46E0000
direct allocation
page read and write
3031000
heap
page read and write
3BD0000
unkown
page read and write
3031000
heap
page read and write
6D1000
unkown
page execute read
920000
unkown
page readonly
3031000
heap
page read and write
3F75000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2F56000
heap
page read and write
368E000
stack
page read and write
7D77000
heap
page read and write
3031000
heap
page read and write
6E7000
unkown
page readonly
490000
unkown
page write copy
6E7000
unkown
page readonly
6E5000
unkown
page read and write
403D000
heap
page read and write
37C1000
direct allocation
page execute and read and write
40BB000
heap
page read and write
2FE1000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
32D0000
trusted library allocation
page read and write
3200000
direct allocation
page execute and read and write
403D000
heap
page read and write
3031000
heap
page read and write
168F000
stack
page read and write
43AA000
unkown
page read and write
46E0000
direct allocation
page read and write
930000
unkown
page readonly
40BB000
heap
page read and write
34CD000
direct allocation
page execute and read and write
5E0000
heap
page read and write
3031000
heap
page read and write
40BB000
heap
page read and write
2050000
heap
page read and write
3031000
heap
page read and write
4A1E000
direct allocation
page read and write
3471000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
504A000
unclassified section
page read and write
3030000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
3019000
heap
page read and write
2F4D000
heap
page read and write
19D6BBBE000
trusted library allocation
page read and write
403D000
heap
page read and write
7D8A000
heap
page read and write
2FC3000
heap
page read and write
40BB000
heap
page read and write
40BB000
heap
page read and write
430000
unkown
page readonly
2E30000
heap
page read and write
3031000
heap
page read and write
49AD000
direct allocation
page read and write
19D6BBB0000
trusted library allocation
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
38AC000
unkown
page read and write
7FF000
stack
page read and write
403D000
heap
page read and write
2FB6000
heap
page read and write
3019000
heap
page read and write
19D6BA11000
trusted library allocation
page read and write
19D6BB01000
trusted library allocation
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
6D0000
unkown
page readonly
533C000
system
page execute and read and write
29A4000
heap
page read and write
4218000
unkown
page read and write
3F50000
heap
page read and write
2F4D000
heap
page read and write
6DE000
unkown
page readonly
3031000
heap
page read and write
19D6BA00000
trusted library allocation
page read and write
6DE000
unkown
page readonly
3031000
heap
page read and write
60000
unkown
page readonly
403D000
heap
page read and write
2A13000
heap
page read and write
2A13000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
E31000
unkown
page readonly
6DE000
unkown
page readonly
3031000
heap
page read and write
40BB000
heap
page read and write
5A1000
unkown
page readonly
99A000
stack
page read and write
3031000
heap
page read and write
3009000
heap
page read and write
1FE0000
unkown
page read and write
3031000
heap
page read and write
403D000
heap
page read and write
3031000
heap
page read and write
482000
unkown
page readonly
3031000
heap
page read and write
40B8000
heap
page read and write
19D6BA16000
trusted library allocation
page read and write
50000
unkown
page readonly
49A9000
direct allocation
page read and write
40BB000
heap
page read and write
6E5000
unkown
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
2C17000
heap
page read and write
410000
unkown
page readonly
48E000
stack
page read and write
2F9E000
heap
page read and write
40BB000
heap
page read and write
4B94000
unclassified section
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
950000
heap
page read and write
339E000
direct allocation
page execute and read and write
2F53000
heap
page read and write
DA000
stack
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
49AD000
direct allocation
page read and write
3031000
heap
page read and write
3031000
heap
page read and write
A3E000
stack
page read and write
40BB000
heap
page read and write
CFC000
stack
page read and write
7D7E000
heap
page read and write
There are 796 hidden memdumps, click here to show them.