IOC Report
PURCHASE ORDER.exe

loading gif

Files

File Path
Type
Category
Malicious
PURCHASE ORDER.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\H05Y8H-I
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\inhumation
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PURCHASE ORDER.exe
"C:\Users\user\Desktop\PURCHASE ORDER.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\PURCHASE ORDER.exe"
malicious
C:\Program Files (x86)\aMKilHaSQRXrOhdFhMisFEAUHMjHvdDejTXZGKxxPtBMTtwMykLiOJlxnpTCdKlORquyaFZfaVOSwSv\mMtRNEqhUF.exe
"C:\Program Files (x86)\aMKilHaSQRXrOhdFhMisFEAUHMjHvdDejTXZGKxxPtBMTtwMykLiOJlxnpTCdKlORquyaFZfaVOSwSv\mMtRNEqhUF.exe"
malicious
C:\Windows\SysWOW64\TapiUnattend.exe
"C:\Windows\SysWOW64\TapiUnattend.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://www.crowsecurity.cloud/jvjp/
3.33.130.190
http://www.selftip.top/85su/?cvWdIt=+3B6fjGs9Z40sbhVvR4krjlQJIMiXt8F4isjbFYKdetJPWg+iKgIwujGEU5yKjzj4BkeFS8xvi4EjdbOtsLgDOfZNWyhFfht/6W034l9DUnQ7Tystood4rLNgn1SUoYWpA==&B0yh=QxoXDZd
199.192.21.169
https://duckduckgo.com/ac/?q=
unknown
http://www.selftip.top/85su/
199.192.21.169
http://www.weatherbook.live/4hiy/
3.33.130.190
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.zoho.com/sites/images/professionally-crafted-themes.png
unknown
http://www.inspireplay.live/p8sm/
3.33.130.190
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.selftip.top
unknown
http://www.whats-in-the-box.org/30jd/
3.33.130.190
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumb
unknown
http://www.shanhaiguan.net/p2q3/
156.242.132.82
https://www.ecosia.org/newtab/
unknown
http://www.lanxuanz.tech/ivo1/
136.143.186.12
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.zoho.com/sites/?src=parkeddomain&dr=www.lanxuanz.tech
unknown
http://www.aaavvejibej.bond/lpl9/?B0yh=QxoXDZd&cvWdIt=e8lWkFdpBI8fMqvo7AyVm0fpL9kk7cHQmYaHg/xvgOUuLw6B3kGtYYWM8/CK9QzH2IDr1kJuLXtu8i/nZF8LNOaL82kNnZvlFJYi74gKoV19uDxCQwtjMILqUMBFsIfV+w==
172.67.181.150
http://www.crowsecurity.cloud/jvjp/?cvWdIt=4b5MqvIelA8yeSWJd/RiTUHyH0EmcMdBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqE8prNCRKn3F85EuQNiaCrcWD/oorkYe/dSc+lX6wpjmjQw==&B0yh=QxoXDZd
3.33.130.190
http://www.inspireplay.live/p8sm/?cvWdIt=gudxXcfIjfM6RSgg73S9+XdIWXDCMwU0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjud+mzkPlPm9RYK75l27rAYJlLhafV6htmCUPEMRK+VCpk1A==&B0yh=QxoXDZd
3.33.130.190
http://www.lanxuanz.tech/ivo1/?cvWdIt=fL7FGqwZgFyeKETKnMvcF6/2X0xLn+ZD0XO9xnYIy5nXxzuHXVLl0+u5SqQtPDeu0FT/+Cn/ojl8jT3mUhnhvZd7UwgDvm6CV/Kdv2aRhtGTCKLAdrlbvWydzVsR1tMxiQ==&B0yh=QxoXDZd
136.143.186.12
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.inspireplay.live
unknown
malicious
www.weatherbook.live
unknown
malicious
www.crowsecurity.cloud
unknown
malicious
www.whats-in-the-box.org
unknown
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
www.lanxuanz.tech
unknown
malicious
crowsecurity.cloud
3.33.130.190
inspireplay.live
3.33.130.190
zhs.zohosites.com
136.143.186.12
www.aaavvejibej.bond
172.67.181.150
weatherbook.live
3.33.130.190
www.selftip.top
199.192.21.169
whats-in-the-box.org
3.33.130.190
www.shanhaiguan.net
156.242.132.82
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
156.242.132.82
www.shanhaiguan.net
Seychelles
136.143.186.12
zhs.zohosites.com
United States
199.192.21.169
www.selftip.top
United States
172.67.181.150
www.aaavvejibej.bond
United States
3.33.130.190
crowsecurity.cloud
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
B50000
trusted library allocation
page read and write
malicious
3D90000
unclassified section
page execute and read and write
malicious
8EE0000
unclassified section
page execute and read and write
malicious
25F0000
unkown
page execute and read and write
malicious
BA0000
trusted library allocation
page read and write
malicious
5B0000
system
page execute and read and write
malicious
24F0000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
17C0000
heap
page read and write
2C71000
heap
page read and write
53B000
stack
page read and write
400000
unkown
page readonly
2C71000
heap
page read and write
3F5A000
heap
page read and write
7C0000
heap
page read and write
45C0000
direct allocation
page read and write
2C71000
heap
page read and write
6664000
system
page read and write
3FA1000
heap
page read and write
4021000
heap
page read and write
4082000
heap
page read and write
3FB8000
heap
page read and write
3213000
heap
page read and write
3C60000
heap
page read and write
2C71000
heap
page read and write
3F7E000
heap
page read and write
4021000
heap
page read and write
7FCE000
stack
page read and write
4367000
heap
page read and write
EF0000
heap
page read and write
4081000
heap
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
3D50000
direct allocation
page read and write
3FB8000
heap
page read and write
3F5A000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
3FB8000
heap
page read and write
3213000
heap
page read and write
408F000
unclassified section
page execute and read and write
3405000
heap
page read and write
2C71000
heap
page read and write
5E20000
trusted library allocation
page read and write
3213000
heap
page read and write
A8A000
heap
page read and write
7985000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
2C71000
heap
page read and write
488D000
direct allocation
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3412000
heap
page read and write
4021000
heap
page read and write
482000
unkown
page readonly
A06000
heap
page read and write
3213000
heap
page read and write
2C71000
heap
page read and write
3B30000
direct allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
4081000
heap
page read and write
2962000
unkown
page execute and read and write
32A1000
direct allocation
page execute and read and write
2C71000
heap
page read and write
4AB000
unkown
page readonly
3312000
direct allocation
page execute and read and write
3FB8000
heap
page read and write
402C000
unclassified section
page read and write
8B4000
stack
page read and write
2C71000
heap
page read and write
46E3000
direct allocation
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
2574000
system
page execute and read and write
3EF7000
heap
page read and write
3800000
heap
page read and write
4021000
heap
page read and write
185000
heap
page read and write
799D000
heap
page read and write
255A000
system
page execute and read and write
4081000
heap
page read and write
4081000
heap
page read and write
880000
heap
page read and write
99F000
stack
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
2F4D000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
2C71000
heap
page read and write
4021000
heap
page read and write
350000
unkown
page readonly
2C71000
heap
page read and write
A3D000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
3F5A000
heap
page read and write
2C71000
heap
page read and write
9C8000
heap
page read and write
720000
unkown
page readonly
9FD000
heap
page read and write
9FD000
heap
page read and write
343C000
unclassified section
page read and write
3CCD000
direct allocation
page execute and read and write
2C71000
heap
page read and write
4021000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
3322000
unclassified section
page read and write
AD7000
unkown
page readonly
B30000
heap
page read and write
2400000
unkown
page readonly
2C71000
heap
page read and write
ACE000
unkown
page readonly
4082000
heap
page read and write
ABC000
heap
page read and write
360000
unkown
page readonly
9C0000
heap
page read and write
7986000
heap
page read and write
4081000
heap
page read and write
794A000
heap
page read and write
23F0000
heap
page read and write
3FB8000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
2C71000
heap
page read and write
1FBC5213000
trusted library allocation
page read and write
798E000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
4081000
heap
page read and write
A95ABFD000
stack
page read and write
3FB8000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
2C71000
heap
page read and write
6FD0000
system
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2F5E000
stack
page read and write
7979000
heap
page read and write
4081000
heap
page read and write
A95A3FB000
stack
page read and write
870C000
unkown
page read and write
2C71000
heap
page read and write
45C0000
direct allocation
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
4081000
heap
page read and write
2F51000
heap
page read and write
4102000
unclassified section
page execute and read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
3213000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
884E000
stack
page read and write
2C71000
heap
page read and write
5502000
unclassified section
page execute and read and write
2C71000
heap
page read and write
87E000
stack
page read and write
4081000
heap
page read and write
A5B000
heap
page read and write
4021000
heap
page read and write
4021000
heap
page read and write
AD5000
unkown
page read and write
4081000
heap
page read and write
3B29000
direct allocation
page execute and read and write
4082000
heap
page read and write
9F9000
heap
page read and write
4760000
direct allocation
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
830000
heap
page read and write
A61000
heap
page read and write
784B000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
1FBC5215000
trusted library allocation
page read and write
4081000
heap
page read and write
884000
heap
page read and write
3FB8000
heap
page read and write
3D60000
heap
page read and write
7997000
heap
page read and write
46E3000
direct allocation
page read and write
1FBC3660000
heap
page read and write
1FBC53BE000
trusted library allocation
page read and write
4021000
heap
page read and write
99F000
stack
page read and write
401000
unkown
page execute read
2C71000
heap
page read and write
710000
unkown
page readonly
4082000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3AB5000
heap
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
3FB8000
heap
page read and write
2C71000
heap
page read and write
3FB8000
heap
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
23CF000
stack
page read and write
4081000
heap
page read and write
4081000
heap
page read and write
3FB8000
heap
page read and write
4081000
heap
page read and write
3FB8000
heap
page read and write
3501000
heap
page read and write
798A000
heap
page read and write
167F000
stack
page read and write
AF0000
unkown
page readonly
2C71000
heap
page read and write
2C71000
heap
page read and write
1FBC368B000
heap
page read and write
3202000
heap
page read and write
23CF000
stack
page read and write
2C71000
heap
page read and write
3CA000
stack
page read and write
3FB8000
heap
page read and write
3FB8000
heap
page read and write
1FBC5221000
trusted library allocation
page read and write
3FB8000
heap
page read and write
ABA000
heap
page read and write
7C0000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
A89000
heap
page read and write
34AC000
system
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
1FBC53CE000
trusted library allocation
page read and write
490000
unkown
page read and write
2C71000
heap
page read and write
4889000
direct allocation
page read and write
1FBC367C000
heap
page read and write
1790000
heap
page read and write
1FBC5200000
trusted library allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4A7000
unkown
page read and write
2C71000
heap
page read and write
23E0000
unkown
page read and write
7302000
unclassified section
page execute and read and write
A8E000
heap
page read and write
4021000
heap
page read and write
2FA0000
direct allocation
page read and write
4021000
heap
page read and write
7900000
trusted library allocation
page read and write
4021000
heap
page read and write
3FB8000
heap
page read and write
28EF000
unkown
page execute and read and write
3FB8000
heap
page read and write
1CE000
stack
page read and write
170000
heap
page read and write
89F000
stack
page read and write
392D000
heap
page read and write
2C71000
heap
page read and write
785E000
heap
page read and write
A92000
heap
page read and write
4081000
heap
page read and write
3405000
heap
page read and write
AC7000
heap
page read and write
AC1000
heap
page read and write
1FBC4E40000
trusted library allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4350000
unclassified section
page read and write
AB6000
heap
page read and write
AA3000
heap
page read and write
9C8000
heap
page read and write
4021000
heap
page read and write
3417000
heap
page read and write
9A0000
unkown
page readonly
4082000
heap
page read and write
4021000
heap
page read and write
7997000
heap
page read and write
3FB8000
heap
page read and write
4889000
direct allocation
page read and write
4889000
direct allocation
page read and write
39E4000
unclassified section
page read and write
4021000
heap
page read and write
40E9000
heap
page read and write
3F5E000
heap
page read and write
2C71000
heap
page read and write
127E000
stack
page read and write
AC1000
unkown
page execute read
3FB8000
heap
page read and write
9E8000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
795B000
heap
page read and write
E10000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
3801000
heap
page read and write
A4E000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
1FBC346A000
system
page execute and read and write
4081000
heap
page read and write
4082000
heap
page read and write
401000
unkown
page execute read
25D7000
system
page execute and read and write
2C71000
heap
page read and write
4021000
heap
page read and write
884000
heap
page read and write
9F4000
heap
page read and write
A35000
heap
page read and write
3FFA000
heap
page read and write
A95B3FE000
stack
page read and write
4081000
heap
page read and write
AD5000
unkown
page read and write
3E5A000
heap
page read and write
3213000
heap
page read and write
23D0000
unkown
page read and write
86B0000
unkown
page read and write
2564000
system
page execute and read and write
1FBC5100000
trusted library allocation
page read and write
2400000
unkown
page readonly
4021000
heap
page read and write
880C000
unkown
page read and write
2C71000
heap
page read and write
7840000
trusted library allocation
page read and write
4021000
heap
page read and write
1770000
heap
page read and write
2C71000
heap
page read and write
AD7000
unkown
page readonly
1FBC5301000
trusted library allocation
page read and write
7928000
heap
page read and write
48FE000
direct allocation
page read and write
2C71000
heap
page read and write
6CAC000
system
page read and write
791B000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
7A0000
unkown
page read and write
3FB8000
heap
page read and write
4081000
heap
page read and write
48FE000
direct allocation
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
A49000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
AF0000
unkown
page readonly
2C71000
heap
page read and write
4021000
heap
page read and write
7920000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
894F000
stack
page read and write
A8D000
heap
page read and write
8AF000
stack
page read and write
AC1000
unkown
page execute read
2EEE000
stack
page read and write
A0E000
heap
page read and write
2C71000
heap
page read and write
329D000
direct allocation
page execute and read and write
2C71000
heap
page read and write
4081000
heap
page read and write
3D50000
direct allocation
page read and write
4082000
heap
page read and write
3E7E000
heap
page read and write
46E3000
direct allocation
page read and write
490000
unkown
page write copy
3E4D000
heap
page read and write
400000
unkown
page readonly
2C71000
heap
page read and write
E81000
unkown
page readonly
1684000
heap
page read and write
7955000
heap
page read and write
4760000
direct allocation
page read and write
1FBC5203000
trusted library allocation
page read and write
AC0000
unkown
page readonly
30FD000
direct allocation
page execute and read and write
4081000
heap
page read and write
6062000
system
page read and write
25E0000
heap
page read and write
7972000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
9F2000
heap
page read and write
785B000
heap
page read and write
2C71000
heap
page read and write
3F59000
heap
page execute and read and write
4021000
heap
page read and write
2C71000
heap
page read and write
48FE000
direct allocation
page read and write
2C71000
heap
page read and write
7989000
heap
page read and write
A30000
heap
page read and write
4021000
heap
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
2C71000
heap
page read and write
3D62000
unkown
page execute and read and write
2C71000
heap
page read and write
4760000
direct allocation
page read and write
4021000
heap
page read and write
9FD000
heap
page read and write
578000
stack
page read and write
4081000
heap
page read and write
488D000
direct allocation
page read and write
1FBC3467000
system
page execute and read and write
3213000
heap
page read and write
2F9E000
stack
page read and write
4082000
heap
page read and write
3E8B000
heap
page read and write
A03000
heap
page read and write
110000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3FB8000
heap
page read and write
7916000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
4B02000
unclassified section
page execute and read and write
9A000
stack
page read and write
3D42000
direct allocation
page execute and read and write
4081000
heap
page read and write
2C71000
heap
page read and write
3FB8000
heap
page read and write
410000
unkown
page read and write
3392000
system
page read and write
4021000
heap
page read and write
AC0000
unkown
page readonly
2F20000
direct allocation
page read and write
3E9A000
unclassified section
page read and write
4081000
heap
page read and write
45C0000
direct allocation
page read and write
2FD0000
direct allocation
page execute and read and write
4760000
direct allocation
page read and write
4092000
heap
page read and write
3E56000
heap
page read and write
2C71000
heap
page read and write
3D50000
direct allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
791000
unkown
page readonly
2580000
system
page execute and read and write
2E24000
heap
page read and write
3A00000
direct allocation
page execute and read and write
730000
heap
page read and write
C10000
heap
page read and write
2C71000
heap
page read and write
33E2000
unclassified section
page read and write
797F000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
488D000
direct allocation
page read and write
2C71000
heap
page read and write
4889000
direct allocation
page read and write
B30000
trusted library allocation
page read and write
2C74000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
990000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
1FBC53C4000
trusted library allocation
page read and write
A58000
heap
page read and write
7951000
heap
page read and write
2C71000
heap
page read and write
5FA2000
system
page read and write
1FBC3620000
heap
page read and write
2C71000
heap
page read and write
3452000
system
page read and write
4021000
heap
page read and write
6FC000
stack
page read and write
77E000
stack
page read and write
4081000
heap
page read and write
40E9000
heap
page read and write
E81000
unkown
page readonly
3200000
heap
page read and write
884000
heap
page read and write
9EE000
stack
page read and write
4081000
heap
page read and write
A5B000
heap
page read and write
2C71000
heap
page read and write
7B00000
heap
page read and write
99F000
stack
page read and write
3400000
heap
page read and write
37FF000
stack
page read and write
780000
unkown
page read and write
2C71000
heap
page read and write
9F4000
heap
page read and write
3417000
heap
page read and write
2C70000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4AB000
unkown
page readonly
9FD000
heap
page read and write
4021000
heap
page read and write
A2E000
stack
page read and write
9FD000
heap
page read and write
A80000
heap
page read and write
1FBC4E40000
trusted library allocation
page read and write
36FF000
stack
page read and write
3B2D000
direct allocation
page execute and read and write
350000
unkown
page readonly
25E4000
heap
page read and write
1FBC5210000
trusted library allocation
page read and write
7925000
heap
page read and write
2C71000
heap
page read and write
3FB8000
heap
page read and write
780000
unkown
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
399E000
heap
page read and write
2C71000
heap
page read and write
6988000
system
page read and write
730000
heap
page read and write
4760000
direct allocation
page read and write
4081000
heap
page read and write
3E4F000
heap
page read and write
3F6A000
heap
page read and write
4081000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
413000
unkown
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2D70000
trusted library allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3AAF000
stack
page read and write
22CE000
stack
page read and write
4021000
heap
page read and write
A90000
heap
page read and write
4021000
heap
page read and write
7994000
heap
page read and write
C20000
trusted library allocation
page read and write
4889000
direct allocation
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
4760000
direct allocation
page read and write
2C71000
heap
page read and write
46E3000
direct allocation
page read and write
4082000
heap
page read and write
800F000
stack
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
30F9000
direct allocation
page execute and read and write
6902000
unclassified section
page execute and read and write
A95BBFF000
stack
page read and write
1FBC3692000
heap
page read and write
360000
unkown
page readonly
4081000
heap
page read and write
4021000
heap
page read and write
3600000
heap
page read and write
798F000
heap
page read and write
A83000
heap
page read and write
9A0000
unkown
page readonly
2C71000
heap
page read and write
1FBC3667000
heap
page read and write
48FE000
direct allocation
page read and write
2C71000
heap
page read and write
627C000
system
page read and write
340000
unkown
page readonly
4082000
heap
page read and write
1FBC520E000
trusted library allocation
page read and write
A58000
heap
page read and write
7910000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3424000
heap
page read and write
180000
heap
page read and write
1FBC3500000
heap
page read and write
7C6000
heap
page read and write
5B62000
unkown
page execute and read and write
4081000
heap
page read and write
2C71000
heap
page read and write
45C0000
direct allocation
page read and write
3D08000
unclassified section
page read and write
77E000
stack
page read and write
4081000
heap
page read and write
4082000
heap
page read and write
2C71000
heap
page read and write
3213000
heap
page read and write
7934000
heap
page read and write
45C0000
direct allocation
page read and write
1FBC368F000
heap
page read and write
2C71000
heap
page read and write
4889000
direct allocation
page read and write
4081000
heap
page read and write
488D000
direct allocation
page read and write
3FB8000
heap
page read and write
9C0000
heap
page read and write
23D0000
unkown
page read and write
2C71000
heap
page read and write
1794000
heap
page read and write
366C000
system
page read and write
4082000
heap
page read and write
1FBC53A6000
trusted library allocation
page read and write
D4C000
stack
page read and write
4081000
heap
page read and write
700000
unkown
page readonly
3FB8000
heap
page read and write
ADB000
heap
page read and write
340000
unkown
page readonly
44E2000
unclassified section
page read and write
A6E000
heap
page read and write
5F02000
unclassified section
page execute and read and write
3FB8000
heap
page read and write
3B76000
unclassified section
page read and write
4082000
heap
page read and write
36AE000
stack
page read and write
4082000
heap
page read and write
4762000
unkown
page execute and read and write
2C71000
heap
page read and write
4021000
heap
page read and write
3723000
heap
page read and write
2C71000
heap
page read and write
4081000
heap
page read and write
25E0000
heap
page read and write
2C71000
heap
page read and write
DE0000
heap
page read and write
2C71000
heap
page read and write
45C0000
direct allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
9DE000
heap
page read and write
B20000
heap
page read and write
22CE000
stack
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
4081000
heap
page read and write
4082000
heap
page read and write
3417000
heap
page read and write
4082000
heap
page read and write
3EBC000
heap
page read and write
3362000
unkown
page execute and read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3A54000
system
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
A7E000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
3FB7000
heap
page read and write
1FBC5000000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
316E000
direct allocation
page execute and read and write
3FB8000
heap
page read and write
35FC000
unclassified section
page read and write
488D000
direct allocation
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
791000
unkown
page readonly
7A0000
unkown
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4082000
heap
page read and write
1FBC3400000
system
page execute and read and write
C20000
trusted library allocation
page read and write
9E0000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
15E000
stack
page read and write
23F0000
heap
page read and write
2C71000
heap
page read and write
48FE000
direct allocation
page read and write
710000
unkown
page readonly
2C71000
heap
page read and write
3B38000
heap
page read and write
488D000
direct allocation
page read and write
1FBC35E0000
heap
page read and write
2C71000
heap
page read and write
9FD000
heap
page read and write
A97000
heap
page read and write
2C71000
heap
page read and write
1FBC520A000
trusted library allocation
page read and write
9F2000
heap
page read and write
4021000
heap
page read and write
D8A000
stack
page read and write
3CD1000
direct allocation
page execute and read and write
1FBC4E40000
trusted library allocation
page read and write
2C71000
heap
page read and write
2E10000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
A6E000
heap
page read and write
2C71000
heap
page read and write
C20000
trusted library allocation
page read and write
342A000
heap
page read and write
2C71000
heap
page read and write
100000
heap
page read and write
4082000
heap
page read and write
4021000
heap
page read and write
3ECF000
heap
page read and write
7162000
system
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
60BC000
system
page read and write
67F6000
system
page read and write
A4E000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
7992000
heap
page read and write
3213000
heap
page read and write
4021000
heap
page read and write
3FFD000
heap
page read and write
4082000
heap
page read and write
3929000
heap
page read and write
3FB8000
heap
page read and write
4081000
heap
page read and write
A61000
heap
page read and write
796F000
heap
page read and write
700000
unkown
page readonly
2F2E000
stack
page read and write
25E4000
heap
page read and write
A03000
heap
page read and write
2C71000
heap
page read and write
40E9000
heap
page read and write
445F000
heap
page read and write
4081000
heap
page read and write
2C71000
heap
page read and write
5162000
unkown
page execute and read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
DC0000
heap
page read and write
3FB8000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
2C71000
heap
page read and write
4021000
heap
page read and write
6FC000
stack
page read and write
6B1A000
system
page read and write
2C71000
heap
page read and write
3F60000
heap
page read and write
2C71000
heap
page read and write
46E3000
direct allocation
page read and write
2D97000
heap
page read and write
48FE000
direct allocation
page read and write
720000
unkown
page readonly
1FBC3692000
heap
page read and write
4021000
heap
page read and write
46E3000
direct allocation
page read and write
3213000
heap
page read and write
2C71000
heap
page read and write
2FC2000
heap
page read and write
2C71000
heap
page read and write
ACE000
unkown
page readonly
2C71000
heap
page read and write
3CA000
stack
page read and write
There are 772 hidden memdumps, click here to show them.