IOC Report
PO#001498.exe

loading gif

Files

File Path
Type
Category
Malicious
PO#001498.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\20Y-W08y
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified
C:\Users\user\AppData\Local\Temp\gobioid
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO#001498.exe
"C:\Users\user\Desktop\PO#001498.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\PO#001498.exe"
malicious
C:\Program Files (x86)\VFHYPMRHNSmDvkDOwyvQmIScReffGBDtnnCfHxSMLyuqFYcuFILGcMwFiYnGerwoQHpXzBGxx\AnbtBVreItY.exe
"C:\Program Files (x86)\VFHYPMRHNSmDvkDOwyvQmIScReffGBDtnnCfHxSMLyuqFYcuFILGcMwFiYnGerwoQHpXzBGxx\AnbtBVreItY.exe"
malicious
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\SysWOW64\forfiles.exe"
malicious
C:\Program Files (x86)\VFHYPMRHNSmDvkDOwyvQmIScReffGBDtnnCfHxSMLyuqFYcuFILGcMwFiYnGerwoQHpXzBGxx\AnbtBVreItY.exe
"C:\Program Files (x86)\VFHYPMRHNSmDvkDOwyvQmIScReffGBDtnnCfHxSMLyuqFYcuFILGcMwFiYnGerwoQHpXzBGxx\AnbtBVreItY.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.monitoraseg.online/l90v/?PDnL0H4=tj7s0oyrGc1LrDSGnf8YHtw+ebsKDrOBu6GSmYGqVaA9KTCtf5t4TDr3lhx61sWDy3u5CDLnPKwXwDtlkJUkQXT0jCihCdlrSRGn+EUQa4fXC4BrJZGRQFbKceI3GDyLA2ga/kBrekJs&cJ=eZx4P
162.240.81.18
malicious
http://www.paysom.xyz/guro/
203.161.41.205
malicious
http://www.rtpsilva4d.click/zctj/
67.223.117.169
malicious
http://www.mcse.top/kyiu/
154.9.228.56
malicious
http://www.monitoraseg.online/l90v/
162.240.81.18
malicious
http://www.elektromontaze.online/t3gh/
37.9.175.163
malicious
http://www.bearableguy.net/swj2/?PDnL0H4=P0crsamxtuU6gq442A5JVDLtFaQ272SuKPgrEa6KpDZhy5jCC+7AJhWiOHv/kCv6EaT0CLlKbyEmlyMFHr9gqySJu+UUyj4X55F7OWVcwUUW7TkNkiV3TddgPHJr/SBxtLqf2BhyIm+8&cJ=eZx4P
3.33.130.190
malicious
http://www.paysom.xyz/guro/?PDnL0H4=7+kD9FiWdLQbO7Xh4mp3Tzq63KAmHikwKr+gs46wKWEdWXZTCgAq3DZWNFT071I6kRcf0adkrwgUpAlbIxvs7ctY0Q4kDRV1VLfOJzsmQYQkjGZNIcuY5VcZwoAGjmNzsmH6ta/2x1bG&cJ=eZx4P
203.161.41.205
malicious
http://www.elektromontaze.online/t3gh/?PDnL0H4=zEDKAPo0fWIr7gepujFM3hONZ8pGlKAcECMHT5GhOUjPLGGHYOnRhJ5losn3B+cwv2wWXqsOX+tmwA3DpzxQYWcvF9OI/7vzh1sU1BgJQgDKmJ3P14tuMLY//UhfsPslfp/YvJbN0ZLZ&cJ=eZx4P
37.9.175.163
malicious
http://www.rtpsilva4d.click/zctj/?PDnL0H4=7S4o5+ZCgT4OODwfFpG+s4wiCFAnOZCzfRxqRVdrbobbRD+6SGggBBocUcamamM0rj3t2K/sItShBC5e9jOvPMFc8Ts9kNN+wHKhjSFFlD0pLjr7njpBm/yeBJ+c4s7d7sPpMprzB4Pv&cJ=eZx4P
67.223.117.169
malicious
http://www.bearableguy.net/swj2/
3.33.130.190
malicious
http://www.spectre.center/mfnh/?cJ=eZx4P&PDnL0H4=uiQSy69x68ywNzcc2xGZGS3b7G9Di2AmSZy7E0+wXNrf1UQY7cg94CWp6P5m0cawB8S+TLOh4cYPJlBKxEA2O4b/zKyvUiD5czmdoxMYCqiElO0H9mCQ9xUwX3LJfG6F/jT3KbKUs5js
5.39.10.93
malicious
http://www.mcse.top/kyiu/?PDnL0H4=WCaTEpVIV1F/IDd5xet0U/v8EBgR4+MrBcMWAOPreHJieMqZHDOJq6LkbwJNcnm0/KUex7YRpxZmHiJXClvi8IQXQojzYPwJ0us3fopYznmqkr1xoIt7ztcwmZJFiE0pdwe7fNqg6tit&cJ=eZx4P
154.9.228.56
malicious
http://www.spectre.center/mfnh/
5.39.10.93
malicious
http://www.notepad.mobi/l4rw/
199.59.243.227
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://giganet.ua/ru
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.imena.ua/domains
unknown
https://www.imena.ua/documents
unknown
https://img.imena.ua/js/bundle.min.js
unknown
http://inau.ua/
unknown
https://www.imena.ua/en/how-search
unknown
https://www.imena.ua/vps
unknown
https://www.ripe.net/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.imena.ua/hosting
unknown
https://admin.active24.cz/
unknown
https://www.google.com
unknown
https://www.imena.ua/
unknown
http://nginx.net/
unknown
http://fedoraproject.org/
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Bold.woff2
unknown
https://www.imena.ua/domains/prices
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.imena.ua/ua
unknown
http://partner.mirohost.net
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Regular.otf
unknown
https://www.active24.cz/cart/domain-checker
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Medium.woff2
unknown
https://www.imena.ua/domains/premium-domains
unknown
https://admin.active24.cz/en
unknown
https://www.imena.ua/blog/
unknown
https://www.imena.ua/datacenter
unknown
https://www.imena.ua/domains/regtm
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Bold.otf
unknown
https://www.imena.ua/how-search
unknown
https://www.imena.ua/job
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.active24.cz/support/
unknown
https://www.imena.ua/contact
unknown
https://www.imena.ua/en
unknown
http://www.ix.net.ua/ru
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Regular.woff2
unknown
https://img.imena.ua/css/media-set.css
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://mail.mirohost.net
unknown
https://www.imena.ua/help
unknown
https://www.ecosia.org/newtab/
unknown
http://www.spectre.center
unknown
https://control.imena.ua/login.php?lang=2
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://cdn.active24.eu/fonts/OTF/Active24-Medium.otf
unknown
https://control.mirohost.net/auth/login.php?lang=ru
unknown
https://www.imena.ua/ru
unknown
https://www.imena.ua/whois.php?domain=spectre.center
unknown
https://www.imena.ua/check-domain
unknown
https://www.imena.ua/payments
unknown
https://www.imena.ua/servers
unknown
https://www.active24.cz/
unknown
http://ogp.me/ns#
unknown
https://www.imena.ua/check-domain?step=transfer
unknown
http://schema.org/Organization
unknown
https://www.imena.ua/support/domains-finance/sposoby-oplaty-uslug-imena-ua
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.active24.eu
unknown
https://www.imena.ua/support/domains-finance/icann-i-ee-funkcii
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.elektromontaze.online
37.9.175.163
malicious
monitoraseg.online
162.240.81.18
malicious
ankittrading.store
84.32.84.32
malicious
www.mcse.top
154.9.228.56
malicious
www.spectre.center
5.39.10.93
malicious
www.notepad.mobi
199.59.243.227
malicious
rtpsilva4d.click
67.223.117.169
malicious
www.paysom.xyz
203.161.41.205
malicious
bearableguy.net
3.33.130.190
malicious
www.ankittrading.store
unknown
malicious
www.monitoraseg.online
unknown
malicious
www.bearableguy.net
unknown
malicious
www.rtpsilva4d.click
unknown
malicious
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.240.81.18
monitoraseg.online
United States
malicious
67.223.117.169
rtpsilva4d.click
United States
malicious
154.9.228.56
www.mcse.top
United States
malicious
37.9.175.163
www.elektromontaze.online
Slovakia (SLOVAK Republic)
malicious
199.59.243.227
www.notepad.mobi
United States
malicious
203.161.41.205
www.paysom.xyz
Malaysia
malicious
84.32.84.32
ankittrading.store
Lithuania
malicious
3.33.130.190
bearableguy.net
United States
malicious
5.39.10.93
www.spectre.center
France
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4970000
trusted library allocation
page read and write
malicious
44C0000
unkown
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
4920000
trusted library allocation
page read and write
malicious
2E90000
system
page execute and read and write
malicious
3590000
unclassified section
page execute and read and write
malicious
2CB0000
system
page execute and read and write
malicious
5050000
unclassified section
page execute and read and write
malicious
4821000
heap
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
2E5E000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
19635200000
trusted library allocation
page read and write
4219000
heap
page read and write
49EE000
direct allocation
page read and write
1963396F000
heap
page read and write
5BDC000
unclassified section
page read and write
2F31000
heap
page read and write
4821000
heap
page read and write
401000
unkown
page execute read
3400000
heap
page read and write
4857000
unkown
page execute and read and write
2EA0000
heap
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
4CA9000
direct allocation
page execute and read and write
1D5000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
49EE000
direct allocation
page read and write
3013000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2E3A000
stack
page read and write
4821000
heap
page read and write
3D40000
heap
page read and write
4821000
heap
page read and write
4AFB000
heap
page read and write
7FE5000
heap
page read and write
3E40000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
1338000
heap
page read and write
196336B0000
system
page execute and read and write
3523000
heap
page read and write
1250000
unkown
page read and write
2F3C000
heap
page read and write
1991000
unkown
page readonly
41B7000
heap
page read and write
6224000
unclassified section
page read and write
11C0000
unkown
page readonly
4AB000
unkown
page readonly
F50000
unkown
page readonly
2F19000
system
page execute and read and write
4821000
heap
page read and write
FF0000
unkown
page readonly
4821000
heap
page read and write
41B7000
heap
page read and write
220CBFE000
stack
page read and write
11D0000
unkown
page readonly
4010000
heap
page read and write
497D000
direct allocation
page read and write
2D60000
heap
page read and write
3030000
heap
page read and write
3004000
heap
page read and write
19E000
stack
page read and write
41B7000
heap
page read and write
995000
unkown
page read and write
4979000
direct allocation
page read and write
19635315000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
82FF000
stack
page read and write
2E70000
heap
page read and write
1390000
heap
page read and write
1991000
unkown
page readonly
4821000
heap
page read and write
107A000
stack
page read and write
7FBD000
heap
page read and write
98E000
unkown
page readonly
41B7000
heap
page read and write
2F38000
heap
page read and write
1390000
heap
page read and write
4821000
heap
page read and write
2FC1000
heap
page read and write
2F51000
heap
page read and write
4219000
heap
page read and write
12FC000
stack
page read and write
A10000
heap
page read and write
4219000
heap
page read and write
4821000
heap
page read and write
F30000
unkown
page readonly
4821000
heap
page read and write
2FC2000
heap
page read and write
4090000
heap
page read and write
4821000
heap
page read and write
7F83000
heap
page read and write
2F48000
heap
page read and write
2FC4000
heap
page read and write
196354CE000
trusted library allocation
page read and write
3000000
heap
page read and write
1290000
unkown
page read and write
4218000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
1680000
direct allocation
page read and write
3013000
heap
page read and write
4821000
heap
page read and write
53E7000
unclassified section
page execute and read and write
4850000
direct allocation
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
2FF0000
heap
page read and write
7FFC000
heap
page read and write
2FD0000
heap
page read and write
3B42000
direct allocation
page execute and read and write
7FF8000
heap
page read and write
3C50000
unclassified section
page execute and read and write
4821000
heap
page read and write
3030000
trusted library allocation
page read and write
3600000
heap
page read and write
4979000
direct allocation
page read and write
7EFE000
stack
page read and write
41B7000
heap
page read and write
8007000
heap
page read and write
3002000
heap
page read and write
4821000
heap
page read and write
4219000
heap
page read and write
4218000
heap
page read and write
3205000
heap
page read and write
4821000
heap
page read and write
8310000
heap
page read and write
2EC0000
heap
page read and write
11EE000
stack
page read and write
1010000
unkown
page readonly
3224000
heap
page read and write
1963397C000
heap
page read and write
9FA000
heap
page read and write
1241000
unkown
page readonly
1660000
unkown
page readonly
49C0000
trusted library allocation
page read and write
995000
unkown
page read and write
98E000
unkown
page readonly
4821000
heap
page read and write
9F0000
heap
page read and write
3013000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2FE6000
heap
page read and write
4821000
heap
page read and write
997000
unkown
page readonly
41B7000
heap
page read and write
110000
heap
page read and write
3F90000
heap
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
FBA000
stack
page read and write
F40000
unkown
page readonly
4086000
heap
page read and write
4218000
heap
page read and write
410A000
heap
page read and write
990000
heap
page read and write
4821000
heap
page read and write
4218000
heap
page read and write
40C4000
heap
page read and write
3301000
heap
page read and write
2CA8000
stack
page read and write
41B7000
heap
page read and write
3F20000
heap
page read and write
4821000
heap
page read and write
107A000
stack
page read and write
8005000
heap
page read and write
2EC0000
heap
page read and write
7FC8000
heap
page read and write
980000
unkown
page readonly
41B7000
heap
page read and write
41B7000
heap
page read and write
8B4000
stack
page read and write
4B20000
trusted library allocation
page read and write
4219000
heap
page read and write
1861000
unkown
page readonly
4821000
heap
page read and write
4821000
heap
page read and write
131C000
stack
page read and write
134F000
heap
page read and write
82BE000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
3013000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
19633990000
heap
page read and write
3013000
heap
page read and write
A22000
heap
page read and write
4278000
heap
page read and write
4821000
heap
page read and write
1670000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
117C000
stack
page read and write
46B0000
direct allocation
page read and write
4277000
heap
page execute and read and write
1A00000
unkown
page readonly
4821000
heap
page read and write
33702000
system
page read and write
490000
unkown
page write copy
4821000
heap
page read and write
4447000
heap
page read and write
4821000
heap
page read and write
3F54000
heap
page read and write
2F0A000
system
page execute and read and write
981000
unkown
page execute read
2F20000
heap
page read and write
4821000
heap
page read and write
2FF9000
heap
page read and write
4821000
heap
page read and write
2E30000
unkown
page readonly
4821000
heap
page read and write
1963530F000
trusted library allocation
page read and write
1000000
unkown
page readonly
1230000
unkown
page read and write
7FF5000
heap
page read and write
4218000
heap
page read and write
47D3000
direct allocation
page read and write
4219000
heap
page read and write
2D70000
heap
page read and write
2F8D000
heap
page read and write
2FC1000
heap
page read and write
4821000
heap
page read and write
2BDC000
stack
page read and write
3217000
heap
page read and write
1330000
heap
page read and write
997000
unkown
page readonly
4821000
heap
page read and write
1660000
unkown
page readonly
47D3000
direct allocation
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2E97000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
3601000
heap
page read and write
9A000
stack
page read and write
3F7A000
heap
page read and write
2FD0000
unkown
page readonly
4821000
heap
page read and write
4821000
heap
page read and write
2FB2000
heap
page read and write
4B20000
trusted library allocation
page read and write
2D74000
heap
page read and write
3217000
heap
page read and write
2F42000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2FD3000
heap
page read and write
4850000
direct allocation
page read and write
4821000
heap
page read and write
46B0000
direct allocation
page read and write
1330000
heap
page read and write
1310000
unkown
page readonly
47D3000
direct allocation
page read and write
2E80000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
196354BE000
trusted library allocation
page read and write
3013000
heap
page read and write
3FB6000
heap
page read and write
2FA5000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2FC6000
heap
page read and write
1241000
unkown
page readonly
2D10000
heap
page read and write
4821000
heap
page read and write
3BF9000
heap
page read and write
3000000
unkown
page readonly
41B7000
heap
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
196337B0000
heap
page read and write
4821000
heap
page read and write
401000
unkown
page execute read
4219000
heap
page read and write
4821000
heap
page read and write
372D000
heap
page read and write
4821000
heap
page read and write
1600000
unkown
page readonly
40C4000
heap
page read and write
41B7000
heap
page read and write
2FCF000
stack
page read and write
4821000
heap
page read and write
40B3000
heap
page read and write
4821000
heap
page read and write
4277000
heap
page read and write
47D3000
direct allocation
page read and write
321A000
heap
page read and write
46B0000
direct allocation
page read and write
4821000
heap
page read and write
392D000
direct allocation
page execute and read and write
2E50000
heap
page read and write
4218000
heap
page read and write
7FC3000
heap
page read and write
995000
unkown
page read and write
46B0000
direct allocation
page read and write
1D0000
heap
page read and write
33D04000
system
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4979000
direct allocation
page read and write
FF0000
unkown
page readonly
5F00000
unclassified section
page read and write
3FA0000
heap
page read and write
2FB2000
heap
page read and write
2FF4000
heap
page read and write
4821000
heap
page read and write
FBA000
stack
page read and write
4821000
heap
page read and write
2E50000
unkown
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
1338000
heap
page read and write
4040000
heap
page read and write
3009000
heap
page read and write
42B2000
unkown
page read and write
5D6E000
unclassified section
page read and write
6092000
unclassified section
page read and write
7FFE000
heap
page read and write
15EF000
stack
page read and write
482000
unkown
page readonly
12A0000
heap
page read and write
5A4A000
unclassified section
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
7F9E000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4219000
heap
page read and write
8015000
heap
page read and write
4219000
heap
page read and write
19633993000
heap
page read and write
49EE000
direct allocation
page read and write
8AF000
stack
page read and write
2EF0000
system
page execute and read and write
86DF000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
3025000
heap
page read and write
2FF4000
heap
page read and write
401F000
heap
page read and write
8070000
trusted library allocation
page read and write
31B2000
unkown
page read and write
3391C000
system
page read and write
3020000
heap
page read and write
3590000
direct allocation
page read and write
4218000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
997000
unkown
page readonly
3FE6000
heap
page read and write
3B6F000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4219000
heap
page read and write
4EC2000
direct allocation
page execute and read and write
400000
unkown
page readonly
33642000
system
page read and write
11E0000
heap
page read and write
3C6A000
unkown
page read and write
4821000
heap
page read and write
7FFA000
heap
page read and write
4821000
heap
page read and write
4E51000
direct allocation
page execute and read and write
11E0000
heap
page read and write
2F81000
heap
page read and write
41B7000
heap
page read and write
7F86000
heap
page read and write
2F3C000
heap
page read and write
4A7000
unkown
page read and write
40A0000
heap
page read and write
1861000
unkown
page readonly
4821000
heap
page read and write
4219000
heap
page read and write
995000
unkown
page read and write
1330000
heap
page read and write
4821000
heap
page read and write
2F37000
heap
page read and write
2E10000
unkown
page read and write
3070000
heap
page read and write
4821000
heap
page read and write
89F000
stack
page read and write
410A000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
220DBFF000
stack
page read and write
196351F0000
heap
page read and write
997000
unkown
page readonly
7F9B000
heap
page read and write
3013000
heap
page read and write
2F28000
heap
page read and write
4820000
heap
page read and write
379E000
heap
page read and write
3ACD000
direct allocation
page execute and read and write
98E000
unkown
page readonly
4821000
heap
page read and write
4821000
heap
page read and write
3929000
direct allocation
page execute and read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
980000
unkown
page readonly
3200000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
7FF2000
heap
page read and write
40C4000
heap
page read and write
4821000
heap
page read and write
2F35000
heap
page read and write
41B7000
heap
page read and write
482000
unkown
page readonly
196338A0000
heap
page read and write
4219000
heap
page read and write
41F0000
heap
page read and write
49D2000
heap
page read and write
3729000
heap
page read and write
2F3C000
heap
page read and write
F50000
unkown
page readonly
3C4F000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
7F96000
heap
page read and write
1963371D000
system
page execute and read and write
4219000
heap
page read and write
220C3FB000
stack
page read and write
4444000
unkown
page read and write
1963371B000
system
page execute and read and write
4821000
heap
page read and write
497D000
direct allocation
page read and write
4821000
heap
page read and write
19635200000
trusted library allocation
page read and write
4A70000
trusted library allocation
page execute and read and write
4821000
heap
page read and write
3946000
unkown
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
800A000
heap
page read and write
2E64000
heap
page read and write
2FD0000
unkown
page readonly
41F1000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4FEC000
unclassified section
page read and write
4979000
direct allocation
page read and write
3013000
heap
page read and write
2F3C000
heap
page read and write
2FCC000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4219000
heap
page read and write
3013000
heap
page read and write
2F9F000
heap
page read and write
196354AB000
trusted library allocation
page read and write
1398000
heap
page read and write
4821000
heap
page read and write
5594000
unclassified section
page read and write
1398000
heap
page read and write
4218000
heap
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
2E80000
heap
page read and write
196354C4000
trusted library allocation
page read and write
1000000
unkown
page readonly
4545000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
DF0000
unkown
page readonly
427B000
heap
page read and write
41B7000
heap
page read and write
2D74000
heap
page read and write
4821000
heap
page read and write
4ED2000
unclassified section
page read and write
4219000
heap
page read and write
2FC0000
heap
page read and write
2E60000
heap
page read and write
2FD5000
heap
page read and write
220E3FE000
stack
page read and write
98E000
unkown
page readonly
4821000
heap
page read and write
19635311000
trusted library allocation
page read and write
4821000
heap
page read and write
12C0000
unkown
page read and write
1270000
unkown
page readonly
4821000
heap
page read and write
4821000
heap
page read and write
1010000
unkown
page readonly
4821000
heap
page read and write
1A01000
unkown
page readonly
4821000
heap
page read and write
494A000
heap
page read and write
3AC0000
unkown
page execute and read and write
2FA5000
heap
page read and write
2E30000
unkown
page readonly
4821000
heap
page read and write
30C0000
unkown
page execute and read and write
2F9C000
heap
page read and write
A29000
heap
page read and write
2F9F000
heap
page read and write
58B8000
unclassified section
page read and write
2FDA000
heap
page read and write
4821000
heap
page read and write
19635401000
trusted library allocation
page read and write
30F2000
unkown
page read and write
3205000
heap
page read and write
7F7B000
heap
page read and write
3013000
heap
page read and write
4219000
heap
page read and write
41E0000
heap
page read and write
41B7000
heap
page read and write
2E64000
heap
page read and write
3540000
direct allocation
page read and write
9FE000
heap
page read and write
2FF0000
heap
page read and write
4821000
heap
page read and write
4219000
heap
page read and write
19635200000
trusted library allocation
page read and write
12A6000
heap
page read and write
2F80000
heap
page read and write
4B70000
heap
page read and write
4143000
heap
page read and write
1290000
unkown
page read and write
5BFF000
stack
page read and write
4AFF000
heap
page read and write
4821000
heap
page read and write
2F3C000
heap
page read and write
7F98000
heap
page read and write
1230000
unkown
page read and write
1B0000
heap
page read and write
3AD8000
unkown
page read and write
4219000
heap
page read and write
4B20000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
2EFA000
system
page execute and read and write
3F8E000
unkown
page read and write
162E000
stack
page read and write
4120000
unkown
page read and write
41B7000
heap
page read and write
41B7000
heap
page read and write
3F5A000
heap
page read and write
2F31000
heap
page read and write
4821000
heap
page read and write
137E000
stack
page read and write
321B000
heap
page read and write
1320000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2F33000
heap
page read and write
1330000
heap
page read and write
11D0000
unkown
page readonly
4821000
heap
page read and write
41B7000
heap
page read and write
981000
unkown
page execute read
3000000
unkown
page readonly
376E000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
7F91000
heap
page read and write
220D3FE000
stack
page read and write
1310000
unkown
page readonly
41B7000
heap
page read and write
4821000
heap
page read and write
F40000
unkown
page readonly
7FE2000
heap
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
1380000
unkown
page read and write
3013000
heap
page read and write
4219000
heap
page read and write
100000
heap
page read and write
11C0000
unkown
page readonly
4821000
heap
page read and write
2F9C000
heap
page read and write
7F3E000
stack
page read and write
19635300000
trusted library allocation
page read and write
46B0000
direct allocation
page read and write
49EE000
direct allocation
page read and write
3AD1000
direct allocation
page execute and read and write
4821000
heap
page read and write
2FCE000
stack
page read and write
3013000
heap
page read and write
4821000
heap
page read and write
4218000
heap
page read and write
4821000
heap
page read and write
1600000
unkown
page readonly
1250000
unkown
page read and write
4821000
heap
page read and write
497D000
direct allocation
page read and write
800F000
heap
page read and write
2C6B000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2F78000
heap
page read and write
47D3000
direct allocation
page read and write
4821000
heap
page read and write
19635400000
trusted library allocation
page read and write
980000
unkown
page readonly
12A0000
heap
page read and write
15E000
stack
page read and write
4219000
heap
page read and write
19633993000
heap
page read and write
1300000
unkown
page readonly
2F42000
heap
page read and write
4850000
direct allocation
page read and write
46B0000
direct allocation
page read and write
7FAA000
heap
page read and write
980000
unkown
page readonly
7F8B000
heap
page read and write
3F52000
heap
page read and write
981000
unkown
page execute read
981000
unkown
page execute read
4CAD000
direct allocation
page execute and read and write
7F9F000
heap
page read and write
4821000
heap
page read and write
30F2000
unkown
page read and write
4821000
heap
page read and write
5726000
unclassified section
page read and write
4821000
heap
page read and write
4D1E000
direct allocation
page execute and read and write
8007000
heap
page read and write
41B7000
heap
page read and write
4650000
unclassified section
page execute and read and write
4219000
heap
page read and write
33CC000
unkown
page read and write
7FCD000
heap
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
4E4D000
direct allocation
page execute and read and write
4821000
heap
page read and write
4821000
heap
page read and write
41B6000
heap
page read and write
4821000
heap
page read and write
5459000
unclassified section
page execute and read and write
41B7000
heap
page read and write
4821000
heap
page read and write
1963398C000
heap
page read and write
1270000
unkown
page readonly
4821000
heap
page read and write
3DFC000
unkown
page read and write
4821000
heap
page read and write
2F16000
system
page execute and read and write
4219000
heap
page read and write
2E1E000
stack
page read and write
4979000
direct allocation
page read and write
41B7000
heap
page read and write
12B0000
unkown
page read and write
1380000
unkown
page read and write
4B80000
direct allocation
page execute and read and write
2F37000
heap
page read and write
9EE000
stack
page read and write
2E50000
unkown
page read and write
490000
unkown
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2EAE000
stack
page read and write
4821000
heap
page read and write
400000
unkown
page readonly
3375C000
system
page read and write
4219000
heap
page read and write
41B7000
heap
page read and write
2F92000
heap
page read and write
47D3000
direct allocation
page read and write
4AB000
unkown
page readonly
4821000
heap
page read and write
2F6D000
system
page execute and read and write
4850000
direct allocation
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
2F92000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
12FC000
stack
page read and write
320C000
unkown
page read and write
3011000
heap
page read and write
40C4000
heap
page read and write
196338D0000
heap
page read and write
2F3C000
heap
page read and write
3013000
heap
page read and write
4F92000
unclassified section
page read and write
4821000
heap
page read and write
3013000
heap
page read and write
58FC000
stack
page read and write
353E000
stack
page read and write
4821000
heap
page read and write
1963396A000
heap
page read and write
4821000
heap
page read and write
48C9000
unkown
page execute and read and write
3212000
heap
page read and write
3F49000
heap
page read and write
399E000
direct allocation
page execute and read and write
2E10000
unkown
page read and write
4219000
heap
page read and write
41B7000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
40C4000
heap
page read and write
41B7000
heap
page read and write
2F90000
direct allocation
page read and write
4821000
heap
page read and write
4979000
direct allocation
page read and write
4821000
heap
page read and write
4850000
direct allocation
page read and write
4821000
heap
page read and write
34FF000
stack
page read and write
4821000
heap
page read and write
3013000
heap
page read and write
8080000
trusted library allocation
page read and write
5AFF000
stack
page read and write
37B4000
unkown
page read and write
117C000
stack
page read and write
1320000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
1300000
unkown
page readonly
2E60000
heap
page read and write
165F000
stack
page read and write
4821000
heap
page read and write
2D75000
heap
page read and write
3800000
direct allocation
page execute and read and write
2D74000
heap
page read and write
4821000
heap
page read and write
41F1000
heap
page read and write
19633960000
heap
page read and write
8001000
heap
page read and write
33CC000
unkown
page read and write
4218000
heap
page read and write
869E000
stack
page read and write
3B71000
heap
page read and write
41F6000
heap
page read and write
51AC000
unclassified section
page read and write
19635303000
trusted library allocation
page read and write
4821000
heap
page read and write
4827000
heap
page read and write
19635321000
trusted library allocation
page read and write
16E0000
heap
page read and write
3013000
heap
page read and write
4219000
heap
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
3590000
direct allocation
page read and write
4218000
heap
page read and write
F30000
unkown
page readonly
4821000
heap
page read and write
4821000
heap
page read and write
41B7000
heap
page read and write
DF0000
unkown
page readonly
497D000
direct allocation
page read and write
49EE000
direct allocation
page read and write
7C40000
trusted library allocation
page read and write
11B0000
unkown
page readonly
4821000
heap
page read and write
41B7000
heap
page read and write
11B0000
unkown
page readonly
4219000
heap
page read and write
41B7000
heap
page read and write
2FFF000
heap
page read and write
497D000
direct allocation
page read and write
7FEB000
heap
page read and write
There are 778 hidden memdumps, click here to show them.