IOC Report
Revised Invoice H000127896.exe

loading gif

Files

File Path
Type
Category
Malicious
Revised Invoice H000127896.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\59F79305l7
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\niellists
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Revised Invoice H000127896.exe
"C:\Users\user\Desktop\Revised Invoice H000127896.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Revised Invoice H000127896.exe"
malicious
C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
"C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe"
malicious
C:\Windows\SysWOW64\replace.exe
"C:\Windows\SysWOW64\replace.exe"
malicious
C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
"C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.07t90q.vip/9eeu/?npb=3FKhBrgHxb5d5XX&jz=sYxoUF2rFRCkhaAkZ/A9Uj7dMzTBzKsd56kaE+tBLdvFK0LLAdAC/H8PE2DtjqQpoemNjozj05nG5pG/fmy7eOvuwMQDTc0cfupU/VfFqgUlIE8j+TMRgVEnKsfoFtzhDw==
3.33.130.190
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.kuaimaolife.shop/j39u/?jz=Bz1f0c7bYWyPEXgQH2KhVZZ8APOK/AslnFtnj2cpqvgmCRIzB1oQIQo/LvP87UgGwTfaSD+LVTW+9AK3Nxg5qUhvSHaGZLmYP9ngab3X35l8/z/r5KgCJlFWcHojvmaM7w==&npb=3FKhBrgHxb5d5XX
38.55.251.233
http://www.nodigitalsmoke.org/pnbu/
3.33.130.190
http://www.5oxzis.top/6tyq/
20.2.217.253
http://www.5oxzis.top/6tyq/?jz=jni3yiZJ4S7NmP87TLfQaIY/X77PcNTCOCcZxoXAf1kPTUY8H/4jiZTjzWgxt/+cQPOpbdgRSQIQgbB1DSTxgzvKKTE3COfRXcz2obzALE1MyEAjEb6tnUq41l0wGlUpcQ==&npb=3FKhBrgHxb5d5XX
20.2.217.253
http://www.kuaimaolife.shop/j39u/
38.55.251.233
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.concept.pink/4yov/
217.160.0.27
http://www.nodigitalsmoke.org
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.concept.pink/4yov/?jz=wLmY7AOB32o0S2u42dQo01BhAozElJEy6rFAsgDZdNn+sW1g/TF+eJ3R19ZQOPzynTi6ZGviANY3o1+5ycRViPNI2Nw+8mxels4+I7slmp23cyQYmVgQCmd7LylHNAhJBA==&npb=3FKhBrgHxb5d5XX
217.160.0.27
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.strato.de
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.concept.pink
unknown
malicious
www.nodigitalsmoke.org
unknown
malicious
www.07t90q.vip
unknown
malicious
07t90q.vip
3.33.130.190
nodigitalsmoke.org
3.33.130.190
concept.pink
217.160.0.27
www.kuaimaolife.shop
38.55.251.233
www.5oxzis.top
20.2.217.253

IPs

IP
Domain
Country
Malicious
217.160.0.27
concept.pink
Germany
20.2.217.253
www.5oxzis.top
United States
38.55.251.233
www.kuaimaolife.shop
United States
3.33.130.190
07t90q.vip
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
8050000
unclassified section
page execute and read and write
malicious
3D00000
unkown
page execute and read and write
malicious
2120000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
27D0000
trusted library allocation
page read and write
malicious
4FE0000
unclassified section
page execute and read and write
malicious
2820000
trusted library allocation
page read and write
malicious
1220000
system
page execute and read and write
malicious
107B000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
760000
unkown
page readonly
40A8000
heap
page read and write
26B1000
heap
page read and write
1030000
unkown
page readonly
817000
unkown
page readonly
1A5399D3000
system
page execute and read and write
2586000
heap
page read and write
7430000
trusted library allocation
page read and write
478D000
direct allocation
page read and write
392D000
direct allocation
page execute and read and write
729B000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
1275000
system
page execute and read and write
5A0E000
stack
page read and write
4A7000
unkown
page read and write
1040000
unkown
page readonly
3929000
direct allocation
page execute and read and write
413E000
heap
page read and write
7296000
heap
page read and write
26B1000
heap
page read and write
3CF0000
direct allocation
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
7305000
heap
page read and write
478D000
direct allocation
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
1231000
unkown
page readonly
1A53B370000
heap
page read and write
BFA000
stack
page read and write
3013000
heap
page read and write
40C1000
heap
page read and write
1030000
unkown
page readonly
3E13000
direct allocation
page read and write
3FF4000
heap
page read and write
2550000
heap
page read and write
413E000
heap
page read and write
1A539ABC000
heap
page read and write
260E000
heap
page read and write
72F6000
heap
page read and write
72DC000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
4069000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
5A6D000
stack
page read and write
25C0000
heap
page read and write
3600000
heap
page read and write
478D000
direct allocation
page read and write
731D000
heap
page read and write
47FE000
direct allocation
page read and write
2880000
trusted library allocation
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
31A4000
heap
page read and write
1291000
system
page execute and read and write
50EA000
unclassified section
page execute and read and write
1A539AAF000
heap
page read and write
40C1000
heap
page read and write
80E000
unkown
page readonly
1A5399D1000
system
page execute and read and write
761F000
stack
page read and write
F90000
heap
page read and write
3212000
heap
page read and write
4177000
heap
page read and write
26B1000
heap
page read and write
167F000
stack
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
3CF0000
direct allocation
page read and write
40C0000
heap
page read and write
817000
unkown
page readonly
413E000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
2740000
unkown
page read and write
3AD1000
direct allocation
page execute and read and write
39902000
system
page read and write
3221000
heap
page read and write
26B1000
heap
page read and write
3CF9000
heap
page read and write
401000
unkown
page execute read
72F6000
heap
page read and write
2D11000
direct allocation
page execute and read and write
26B1000
heap
page read and write
3400000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
A8A000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
40C1000
heap
page read and write
72A8000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
40A3000
heap
page execute and read and write
26B1000
heap
page read and write
5AAE000
stack
page read and write
4136000
heap
page read and write
79DE000
stack
page read and write
7A1F000
stack
page read and write
3013000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
1A53B60B000
trusted library allocation
page read and write
26B1000
heap
page read and write
9CE000
stack
page read and write
2BD0000
unkown
page read and write
1320000
unkown
page readonly
2C80000
heap
page read and write
492000
unkown
page read and write
26B1000
heap
page read and write
126D000
system
page execute and read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
751D000
stack
page read and write
4789000
direct allocation
page read and write
40C1000
heap
page read and write
3013000
heap
page read and write
21B4000
heap
page read and write
2E70000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
3ACD000
direct allocation
page execute and read and write
26B1000
heap
page read and write
4AB000
unkown
page readonly
72A000
stack
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
413E000
heap
page read and write
3BA0000
direct allocation
page read and write
2FF0000
heap
page read and write
88B5BFE000
stack
page read and write
2BF0000
heap
page read and write
40C1000
heap
page read and write
127E000
stack
page read and write
3F83000
heap
page read and write
2C90000
unkown
page readonly
40C1000
heap
page read and write
25ED000
heap
page read and write
F60000
heap
page read and write
413E000
heap
page read and write
92C000
stack
page read and write
2810000
unkown
page readonly
21B0000
heap
page read and write
7293000
heap
page read and write
1A53B621000
trusted library allocation
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
390A000
unclassified section
page read and write
25F0000
heap
page read and write
40C1000
heap
page read and write
5078000
unclassified section
page execute and read and write
A8E000
heap
page read and write
413E000
heap
page read and write
6A0000
unkown
page readonly
26B1000
heap
page read and write
3CEF000
stack
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
1A53B450000
trusted library allocation
page read and write
26B1000
heap
page read and write
817000
unkown
page readonly
29E0000
trusted library allocation
page read and write
26B1000
heap
page read and write
817000
unkown
page readonly
26B1000
heap
page read and write
3217000
heap
page read and write
6C0000
unkown
page readonly
413E000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
47FE000
direct allocation
page read and write
3CF0000
direct allocation
page read and write
26B1000
heap
page read and write
3217000
heap
page read and write
2586000
heap
page read and write
3F8B000
heap
page read and write
26B1000
heap
page read and write
FE0000
unkown
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
3013000
heap
page read and write
72FE000
heap
page read and write
40F9000
heap
page read and write
2F50000
heap
page read and write
1A539AA9000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
CFF000
stack
page read and write
45E0000
unclassified section
page execute and read and write
413E000
heap
page read and write
F90000
heap
page read and write
3013000
heap
page read and write
25F2000
heap
page read and write
26B1000
heap
page read and write
261C000
heap
page read and write
1050000
heap
page read and write
130000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
A0E000
stack
page read and write
12E8000
system
page execute and read and write
379E000
heap
page read and write
2804000
heap
page read and write
26B1000
heap
page read and write
2F9E000
stack
page read and write
1000000
unkown
page read and write
26B1000
heap
page read and write
2740000
unkown
page read and write
1058000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
8AF000
stack
page read and write
47FE000
direct allocation
page read and write
7F1000
unkown
page readonly
72D8000
heap
page read and write
27D3000
heap
page read and write
413E000
heap
page read and write
1231000
unkown
page readonly
790000
heap
page read and write
413E000
heap
page read and write
3013000
heap
page read and write
72E2000
heap
page read and write
3E13000
direct allocation
page read and write
413F000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
F54000
heap
page read and write
106F000
heap
page read and write
1A53B600000
trusted library allocation
page read and write
80E000
unkown
page readonly
72E2000
heap
page read and write
40C1000
heap
page read and write
1A539AD2000
heap
page read and write
412E000
heap
page read and write
1A53B612000
trusted library allocation
page read and write
3B50000
direct allocation
page read and write
3DB0000
heap
page read and write
26B1000
heap
page read and write
7650000
heap
page read and write
26B1000
heap
page read and write
35FF000
stack
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
72DC000
heap
page read and write
A80000
heap
page read and write
2800000
heap
page read and write
1A539ACF000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
72AB000
heap
page read and write
2E42000
unkown
page read and write
258C000
heap
page read and write
558C000
stack
page read and write
26B1000
heap
page read and write
21A0000
heap
page read and write
2C90000
unkown
page readonly
3301000
heap
page read and write
2C3C000
stack
page read and write
413E000
heap
page read and write
3EC0000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
815000
unkown
page read and write
3013000
heap
page read and write
3300000
unkown
page execute and read and write
413E000
heap
page read and write
26B1000
heap
page read and write
413D000
heap
page read and write
ABE000
heap
page read and write
26B1000
heap
page read and write
1A53B7BE000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
19E000
stack
page read and write
413E000
heap
page read and write
3205000
heap
page read and write
26B1000
heap
page read and write
B80000
unkown
page readonly
26B1000
heap
page read and write
25F7000
heap
page read and write
258C000
heap
page read and write
1A53B615000
trusted library allocation
page read and write
2BBF000
stack
page read and write
2E41000
heap
page read and write
72D2000
heap
page read and write
26B1000
heap
page read and write
728B000
heap
page read and write
257B000
heap
page read and write
4789000
direct allocation
page read and write
59CF000
stack
page read and write
1294000
system
page execute and read and write
F30000
unkown
page readonly
400000
unkown
page readonly
1A53B440000
heap
page read and write
2623000
heap
page read and write
4660000
direct allocation
page read and write
40C1000
heap
page read and write
EFC000
stack
page read and write
26B1000
heap
page read and write
41B9000
heap
page read and write
1DE000
stack
page read and write
755E000
stack
page read and write
92C000
stack
page read and write
3200000
heap
page read and write
26B1000
heap
page read and write
2B6D000
direct allocation
page execute and read and write
257D000
heap
page read and write
F40000
unkown
page readonly
4660000
direct allocation
page read and write
800000
unkown
page readonly
26B1000
heap
page read and write
306C000
unclassified section
page read and write
2587000
heap
page read and write
3013000
heap
page read and write
F38000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
80E000
unkown
page readonly
3CF7000
heap
page read and write
6B0000
unkown
page readonly
264F000
heap
page read and write
2FDE000
stack
page read and write
26B1000
heap
page read and write
2800000
heap
page read and write
3FD7000
heap
page read and write
26B1000
heap
page read and write
4789000
direct allocation
page read and write
26B1000
heap
page read and write
39BDC000
system
page read and write
35D6000
unkown
page read and write
40C1000
heap
page read and write
88B3BFB000
stack
page read and write
26B1000
heap
page read and write
3CF0000
direct allocation
page read and write
40C1000
heap
page read and write
3013000
heap
page read and write
40C1000
heap
page read and write
41B3000
heap
page read and write
D10000
unkown
page read and write
413E000
heap
page read and write
2BF0000
heap
page read and write
3002000
heap
page read and write
2900000
unkown
page execute and read and write
9A000
stack
page read and write
1058000
heap
page read and write
A70000
heap
page read and write
2A40000
direct allocation
page execute and read and write
3E13000
direct allocation
page read and write
2D0D000
direct allocation
page execute and read and write
1A53B701000
trusted library allocation
page read and write
1A53B7C4000
trusted library allocation
page read and write
40C1000
heap
page read and write
482000
unkown
page readonly
3444000
unkown
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
75DE000
stack
page read and write
413E000
heap
page read and write
1A53B7CE000
trusted library allocation
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
26B0000
heap
page read and write
1285000
system
page execute and read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
730B000
heap
page read and write
305C000
unkown
page read and write
7380000
trusted library allocation
page read and write
2619000
heap
page read and write
74DC000
stack
page read and write
26B1000
heap
page read and write
3D98000
unkown
page execute and read and write
26B1000
heap
page read and write
38FA000
unkown
page read and write
F30000
heap
page read and write
26B1000
heap
page read and write
2BF4000
heap
page read and write
760000
unkown
page readonly
780000
unkown
page readonly
413E000
heap
page read and write
264A000
heap
page read and write
815000
unkown
page read and write
26B1000
heap
page read and write
25F7000
heap
page read and write
1040000
unkown
page readonly
3013000
heap
page read and write
800000
unkown
page readonly
72AE000
heap
page read and write
F30000
heap
page read and write
4789000
direct allocation
page read and write
401000
unkown
page execute read
759F000
stack
page read and write
40C1000
heap
page read and write
9B000
stack
page read and write
413E000
heap
page read and write
1320000
unkown
page readonly
1A53B450000
trusted library allocation
page read and write
B90000
unkown
page readonly
4660000
direct allocation
page read and write
3CF0000
direct allocation
page read and write
26B1000
heap
page read and write
2BEB000
stack
page read and write
2930000
trusted library allocation
page execute and read and write
26B1000
heap
page read and write
2810000
unkown
page readonly
372D000
heap
page read and write
3CF0000
direct allocation
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
7309000
heap
page read and write
2F60000
direct allocation
page read and write
21B4000
heap
page read and write
26B1000
heap
page read and write
2FE0000
heap
page read and write
2D82000
direct allocation
page execute and read and write
413E000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
47FE000
direct allocation
page read and write
40C1000
heap
page read and write
EFC000
stack
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
3013000
heap
page read and write
4AB000
unkown
page readonly
D00000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
39FC4000
system
page read and write
413E000
heap
page read and write
2BDE000
direct allocation
page execute and read and write
3FE4000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
1A539A70000
heap
page read and write
7E0000
unkown
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
413C000
heap
page read and write
26B1000
heap
page read and write
31A0000
heap
page read and write
1A53B7B2000
trusted library allocation
page read and write
40A4000
heap
page read and write
26B1000
heap
page read and write
273F000
stack
page read and write
41B4000
heap
page read and write
F1E000
stack
page read and write
26B1000
heap
page read and write
2804000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
2C7E000
stack
page read and write
72D8000
heap
page read and write
2A2B000
heap
page read and write
413E000
heap
page read and write
40C1000
heap
page read and write
413E000
heap
page read and write
72A1000
heap
page read and write
3205000
heap
page read and write
26B1000
heap
page read and write
D00000
heap
page read and write
26B1000
heap
page read and write
2D82000
unkown
page read and write
3B42000
direct allocation
page execute and read and write
F81000
unkown
page readonly
40C1000
heap
page read and write
4074000
heap
page read and write
2E9C000
unkown
page read and write
72A6000
heap
page read and write
780000
unkown
page readonly
2570000
heap
page read and write
2D92000
unclassified section
page read and write
3778000
unclassified section
page read and write
7318000
heap
page read and write
40C1000
heap
page read and write
44C1000
heap
page read and write
1010000
unkown
page read and write
2E40000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
1050000
heap
page read and write
2586000
heap
page read and write
26B1000
heap
page read and write
25E3000
heap
page read and write
B70000
unkown
page readonly
26B1000
heap
page read and write
3013000
heap
page read and write
2D82000
unkown
page read and write
26B1000
heap
page read and write
AB5000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
B80000
unkown
page readonly
29E0000
trusted library allocation
page read and write
26B1000
heap
page read and write
3E13000
direct allocation
page read and write
26B1000
heap
page read and write
321A000
heap
page read and write
2604000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
7392000
heap
page read and write
38EE000
stack
page read and write
413E000
heap
page read and write
413E000
heap
page read and write
16B1000
unkown
page readonly
40C1000
heap
page read and write
2EAC000
unclassified section
page read and write
35E6000
unclassified section
page read and write
7397000
heap
page read and write
3BE0000
unclassified section
page execute and read and write
57B0000
trusted library allocation
page read and write
25F0000
heap
page read and write
3729000
heap
page read and write
D30000
unkown
page readonly
2870000
heap
page read and write
6B0000
unkown
page readonly
40C1000
heap
page read and write
5AEA000
unclassified section
page execute and read and write
26B1000
heap
page read and write
80E000
unkown
page readonly
26B1000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
1A53B60F000
trusted library allocation
page read and write
3BA0000
direct allocation
page read and write
4016000
heap
page read and write
1A539ACB000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
3BA0000
direct allocation
page read and write
26B1000
heap
page read and write
F38000
heap
page read and write
26B1000
heap
page read and write
480A000
unkown
page execute and read and write
F96000
heap
page read and write
72A000
stack
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
4789000
direct allocation
page read and write
41BB000
heap
page read and write
26B1000
heap
page read and write
1820000
heap
page read and write
AB2000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
FE0000
unkown
page read and write
2BAC000
stack
page read and write
26B1000
heap
page read and write
72BA000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
26B1000
heap
page read and write
2614000
heap
page read and write
2577000
heap
page read and write
D40000
heap
page read and write
413E000
heap
page read and write
72B0000
heap
page read and write
26B1000
heap
page read and write
305C000
unkown
page read and write
155000
heap
page read and write
1A539970000
system
page execute and read and write
26B1000
heap
page read and write
FDE000
stack
page read and write
26B1000
heap
page read and write
2B69000
direct allocation
page execute and read and write
26B1000
heap
page read and write
1A53B500000
trusted library allocation
page read and write
B70000
unkown
page readonly
801000
unkown
page execute read
26B1000
heap
page read and write
321F000
heap
page read and write
F81000
unkown
page readonly
800000
unkown
page readonly
ABE000
heap
page read and write
26B1000
heap
page read and write
BFA000
stack
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
482000
unkown
page readonly
26B1000
heap
page read and write
3E0A000
unkown
page execute and read and write
3768000
unkown
page read and write
40C1000
heap
page read and write
2580000
heap
page read and write
2655000
heap
page read and write
25ED000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
3800000
direct allocation
page execute and read and write
413E000
heap
page read and write
413E000
heap
page read and write
731C000
heap
page read and write
27B0000
heap
page read and write
7F1000
unkown
page readonly
4789000
direct allocation
page read and write
25F2000
heap
page read and write
800000
unkown
page readonly
26B1000
heap
page read and write
25DE000
heap
page read and write
4168000
heap
page read and write
16B1000
unkown
page readonly
26B1000
heap
page read and write
26B1000
heap
page read and write
3000000
heap
page read and write
88B4BFE000
stack
page read and write
491000
unkown
page write copy
D40000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
7DE000
stack
page read and write
2BD0000
unkown
page read and write
7E0000
unkown
page read and write
2604000
heap
page read and write
801000
unkown
page execute read
26B1000
heap
page read and write
4660000
direct allocation
page read and write
40C1000
heap
page read and write
F70000
unkown
page read and write
21B4000
heap
page read and write
29B6000
heap
page read and write
26B1000
heap
page read and write
D30000
unkown
page readonly
801000
unkown
page execute read
26B1000
heap
page read and write
26B1000
heap
page read and write
7314000
heap
page read and write
770000
unkown
page readonly
3013000
heap
page read and write
F40000
unkown
page readonly
1A53B700000
trusted library allocation
page read and write
40C1000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
3E13000
direct allocation
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
3013000
heap
page read and write
415F000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
3FCC000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
790000
heap
page read and write
D10000
unkown
page read and write
100000
heap
page read and write
2582000
heap
page read and write
F50000
unkown
page readonly
257B000
heap
page read and write
26B1000
heap
page read and write
3523000
heap
page read and write
27B0000
trusted library allocation
page read and write
40F6000
heap
page read and write
26B1000
heap
page read and write
40C1000
heap
page read and write
B90000
unkown
page readonly
26B1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
29BA000
heap
page read and write
478D000
direct allocation
page read and write
815000
unkown
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
478D000
direct allocation
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
413F000
heap
page read and write
262F000
heap
page read and write
26B1000
heap
page read and write
2C80000
heap
page read and write
3E13000
direct allocation
page read and write
2644000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
490000
unkown
page write copy
47FE000
direct allocation
page read and write
40C1000
heap
page read and write
6C0000
unkown
page readonly
3CF6000
heap
page read and write
F60000
heap
page read and write
2596000
heap
page read and write
72D2000
heap
page read and write
26B1000
heap
page read and write
400000
unkown
page readonly
26B1000
heap
page read and write
6A0000
unkown
page readonly
413E000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
F70000
unkown
page read and write
4660000
direct allocation
page read and write
730F000
heap
page read and write
2BF4000
heap
page read and write
26B1000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
399C2000
system
page read and write
150000
heap
page read and write
478D000
direct allocation
page read and write
490000
unkown
page read and write
815000
unkown
page read and write
257A000
heap
page read and write
72C4000
heap
page read and write
7323000
heap
page read and write
259E000
heap
page read and write
1A539BB0000
heap
page read and write
88B53FE000
stack
page read and write
413E000
heap
page read and write
F50000
unkown
page readonly
26B1000
heap
page read and write
730E000
heap
page read and write
801000
unkown
page execute read
40C1000
heap
page read and write
413E000
heap
page read and write
88B43FE000
stack
page read and write
288D000
heap
page read and write
47FE000
direct allocation
page read and write
413E000
heap
page read and write
3454000
unclassified section
page read and write
3601000
heap
page read and write
7312000
heap
page read and write
4660000
direct allocation
page read and write
26B0000
heap
page read and write
413E000
heap
page read and write
731A000
heap
page read and write
A10000
heap
page read and write
770000
unkown
page readonly
64EA000
unclassified section
page execute and read and write
2FE5000
heap
page read and write
40C1000
heap
page read and write
26B1000
heap
page read and write
26B1000
heap
page read and write
399E000
direct allocation
page execute and read and write
26B1000
heap
page read and write
72F8000
heap
page read and write
5B0F000
stack
page read and write
30F0000
direct allocation
page read and write
F30000
unkown
page readonly
411C000
heap
page read and write
413E000
heap
page read and write
110000
heap
page read and write
D8000
stack
page read and write
40C1000
heap
page read and write
34FF000
stack
page read and write
1A539AA0000
heap
page read and write
2E20000
heap
page read and write
413E000
heap
page read and write
26B1000
heap
page read and write
1A53B603000
trusted library allocation
page read and write
520A000
unkown
page execute and read and write
2E52000
unclassified section
page read and write
413E000
heap
page read and write
There are 794 hidden memdumps, click here to show them.