IOC Report
NEW INVOICE.exe

loading gif

Files

File Path
Type
Category
Malicious
NEW INVOICE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Graff
data
dropped
C:\Users\user\AppData\Local\Temp\is175JI8N
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NEW INVOICE.exe
"C:\Users\user\Desktop\NEW INVOICE.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\NEW INVOICE.exe"
malicious
C:\Program Files (x86)\nhuQDukfxHXGWhwtjJOqrpWOlxgWwSjfnzfxZdQbltYAzdV\iLyDwpUmDRByL.exe
"C:\Program Files (x86)\nhuQDukfxHXGWhwtjJOqrpWOlxgWwSjfnzfxZdQbltYAzdV\iLyDwpUmDRByL.exe"
malicious
C:\Windows\SysWOW64\setupugc.exe
"C:\Windows\SysWOW64\setupugc.exe"
malicious
C:\Program Files (x86)\nhuQDukfxHXGWhwtjJOqrpWOlxgWwSjfnzfxZdQbltYAzdV\iLyDwpUmDRByL.exe
"C:\Program Files (x86)\nhuQDukfxHXGWhwtjJOqrpWOlxgWwSjfnzfxZdQbltYAzdV\iLyDwpUmDRByL.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.cctv9.rest/n990/?v2x4if=GxIYSLz2GkLjPqt/rHopn9WrO9y33v8yD5l3ZEVwbM0FZ2j7mw+4XotPwvAai7FT8Vl9/yJfFwWFKgVG3tpm2nD6ueTLwdPoo/Wta03Cu/cEpPnD/hpbWd7xqCAhgBSZNQ==&bTU8=BDEpwP48zFO0YTL
114.134.188.182
malicious
http://www.07t90q.vip/cyr7/?v2x4if=Vj4d5vaEXsFuB8fEcLmrU2eSD43jNQA/5S+cpwa+Zl1KtdnsFYOpBvNJOVDgu9PAnTJmhhfW0UddtTnseo1uNxsgVMS/H7YloLAZNbDtj8sD0y9kdjlRL77hQz9vNymozA==&bTU8=BDEpwP48zFO0YTL
3.33.130.190
malicious
http://www.arcare.partners/6deb/?bTU8=BDEpwP48zFO0YTL&v2x4if=frbZRuXmKU61niiN8d5+MgPC6Pfs/vAzOJxU/pKZoFND5OO3a5aIko3iRqTcSjrrqUfDpbGVv4TG7n3U9jbk61XITHwlKVRh/+b6X5sz4nwuxRz0po2o/GoElcEwj6ZdbQ==
3.33.130.190
malicious
http://www.hpb5spjmad.buzz/ms92/
206.238.91.127
malicious
http://www.hpb5spjmad.buzz/ms92/?v2x4if=n8dDXvAJzlUA6O6FnjGVBJIJvgZrOKbtAkr4DdUmwdjfrfZifRy06AIZkxbgl7NZdYzWyf+P5ib5INIFgNORIa1dMQY3kp3ISeG94e9yVPy6MxUyIGQp/U8X9iEsYtM0zA==&bTU8=BDEpwP48zFO0YTL
206.238.91.127
malicious
http://www.983743.vin/hi08/
45.150.55.15
malicious
http://www.yesonkoicasino.net/au3y/?v2x4if=BGHhcy5EGJH3TGsr0SdAyB/IY0TJfM6b0Iyf+x5ct/zMbQAi/VOw0CHGLkWqXJ1uj5ygw+VfiH3h5t6lg/ZXmjp4gFIYwdA6QsklqXxg8umNXWH5XR+T10UE2xCqQBbuLw==&bTU8=BDEpwP48zFO0YTL
3.33.130.190
malicious
http://www.arcare.partners/6deb/
3.33.130.190
malicious
http://www.aed.shopping/aee4/?v2x4if=ES5FzaFcHZl881dcPkloWrtYSs+NgVQDIMJFF9px4VCQZC+r8qI7xcKZuwQNqR19d0uyEXBGxed8FJi2lm9yYZ1OZE63+Pgn8NmZa2sjPIuJKsbkgLcIIc7eVTKhMDO8Pg==&bTU8=BDEpwP48zFO0YTL
35.214.185.243
malicious
http://www.stratogent.info/1c49/
76.223.105.230
malicious
http://www.cctv9.rest/n990/
114.134.188.182
malicious
http://www.983743.vin/hi08/?v2x4if=+COrnfoiLIYpHID8Jdn5STS8mn+dG0IOSj3c7V4IL3MTuwRxXjxT14sXhAjF0/r/wZdWh4U9LEdUgjY8Z9goLxBnq4opY1y2hZAtwcDdsNM1Zv/DVnaDD1dNLgPD6a//aQ==&bTU8=BDEpwP48zFO0YTL
45.150.55.15
malicious
http://www.dbold.top/akfs/
209.74.64.190
malicious
http://www.07t90q.vip/cyr7/
3.33.130.190
malicious
http://www.stratogent.info/1c49/?v2x4if=WckH/SqvT3kS7RHLNOlxiQ21wOxfNt38tZjSQddzpQSzD2qOP8gJzvFEgzI5dIMVlIsEuBKIXf3X3jGZEF/onz6UCD5x8CZk1xGCCmMlAa+hgJB6DGnTg2zkdlj6iSBSfg==&bTU8=BDEpwP48zFO0YTL
76.223.105.230
malicious
http://www.yesonkoicasino.net/au3y/
3.33.130.190
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://aed.shopping/aee4/?v2x4if=ES5FzaFcHZl881dcPkloWrtYSs
unknown
http://www.yesonkoicasino.net
unknown
https://stratogent.info/1c49/?v2x4if=WckH/SqvT3kS7RHLNOlxiQ21wOxfNt38tZjSQddzpQSzD2qOP8gJzvFEgzI5dIM
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
07t90q.vip
3.33.130.190
malicious
www.cctv9.rest
114.134.188.182
malicious
www.aed.shopping
35.214.185.243
malicious
www.983743.vin
45.150.55.15
malicious
stratogent.info
76.223.105.230
malicious
arcare.partners
3.33.130.190
malicious
www.hpb5spjmad.buzz
206.238.91.127
malicious
www.dbold.top
209.74.64.190
malicious
yesonkoicasino.net
3.33.130.190
malicious
cricketinsights.info
118.139.176.2
malicious
www.diterra.shop
unknown
malicious
www.07t90q.vip
unknown
malicious
www.cricketinsights.info
unknown
malicious
www.arcare.partners
unknown
malicious
www.yesonkoicasino.net
unknown
malicious
www.stratogent.info
unknown
malicious
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
114.134.188.182
www.cctv9.rest
Cambodia
malicious
45.150.55.15
www.983743.vin
Japan
malicious
76.223.105.230
stratogent.info
United States
malicious
206.238.91.127
www.hpb5spjmad.buzz
United States
malicious
209.74.64.190
www.dbold.top
United States
malicious
3.33.130.190
07t90q.vip
United States
malicious
35.214.185.243
www.aed.shopping
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3240000
unclassified section
page execute and read and write
malicious
29A0000
trusted library allocation
page read and write
malicious
3750000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
2950000
trusted library allocation
page read and write
malicious
3100000
unkown
page execute and read and write
malicious
5240000
system
page execute and read and write
malicious
350000
system
page execute and read and write
malicious
47B3000
direct allocation
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
3CC0000
heap
page read and write
7588000
heap
page read and write
17EF000
stack
page read and write
28B0000
unkown
page read and write
2851000
heap
page read and write
400C000
heap
page read and write
14B0000
unkown
page readonly
2851000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
18EECCBE000
trusted library allocation
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
400000
unkown
page readonly
2A13000
heap
page read and write
47B3000
direct allocation
page read and write
2851000
heap
page read and write
2AED000
heap
page read and write
2851000
heap
page read and write
18EECB0F000
trusted library allocation
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
2930000
unkown
page readonly
2851000
heap
page read and write
2851000
heap
page read and write
75A1000
heap
page read and write
FC0000
unkown
page readonly
400C000
heap
page read and write
2CF0000
direct allocation
page execute and read and write
4070000
unclassified section
page read and write
4830000
direct allocation
page read and write
2F3F000
stack
page read and write
323E000
stack
page read and write
7CBE000
stack
page read and write
18EECCCE000
trusted library allocation
page read and write
2851000
heap
page read and write
2960000
direct allocation
page read and write
495D000
direct allocation
page read and write
2851000
heap
page read and write
4959000
direct allocation
page read and write
2AB3000
heap
page read and write
FE0000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
2B2F4000
system
page read and write
2851000
heap
page read and write
4959000
direct allocation
page read and write
2851000
heap
page read and write
FF0000
unkown
page read and write
EB8000
heap
page read and write
2851000
heap
page read and write
2E0C000
unkown
page read and write
2ACF2000
system
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
3CA4000
unclassified section
page execute and read and write
2A13000
heap
page read and write
2B2F000
stack
page read and write
3000000
heap
page read and write
3F75000
heap
page read and write
400C000
heap
page read and write
3D0000
heap
page read and write
2851000
heap
page read and write
52A0000
system
page execute and read and write
7D0000
heap
page read and write
400C000
heap
page read and write
2D0000
unkown
page readonly
2851000
heap
page read and write
7513000
heap
page read and write
2851000
heap
page read and write
4690000
direct allocation
page read and write
4959000
direct allocation
page read and write
2851000
heap
page read and write
3010000
unkown
page readonly
7583000
heap
page read and write
3F72000
heap
page read and write
F7A000
stack
page read and write
2C17000
heap
page read and write
495D000
direct allocation
page read and write
1441000
unkown
page readonly
759A000
heap
page read and write
2851000
heap
page read and write
FC0000
unkown
page readonly
3042000
unclassified section
page read and write
2851000
heap
page read and write
9DE000
stack
page read and write
2A5B000
heap
page read and write
7CFF000
stack
page read and write
4959000
direct allocation
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
18EECCA6000
trusted library allocation
page read and write
35E2000
unkown
page execute and read and write
A75000
heap
page read and write
495D000
direct allocation
page read and write
2851000
heap
page read and write
3170000
heap
page read and write
4052000
heap
page read and write
930000
unkown
page readonly
12FC000
stack
page read and write
1374000
heap
page read and write
3FC0000
heap
page read and write
2B00000
heap
page read and write
3300000
direct allocation
page execute and read and write
2851000
heap
page read and write
3023000
heap
page read and write
1A31000
unkown
page readonly
2950000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
288E000
stack
page read and write
2AD4C000
system
page read and write
2851000
heap
page read and write
52BC000
system
page execute and read and write
2851000
heap
page read and write
2D1000
unkown
page execute read
8FE000
stack
page read and write
2A13000
heap
page read and write
FE0000
heap
page read and write
A85000
heap
page read and write
4052000
heap
page read and write
3F71000
heap
page execute and read and write
2A13000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
7521000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
2DE000
unkown
page readonly
4690000
direct allocation
page read and write
3001000
heap
page read and write
2D1000
unkown
page execute read
2910000
heap
page read and write
2851000
heap
page read and write
3F72000
heap
page read and write
29F0000
trusted library allocation
page read and write
4052000
heap
page read and write
16A0000
unkown
page readonly
E4E000
stack
page read and write
3E0000
heap
page read and write
12FC000
stack
page read and write
3B60000
unkown
page read and write
B90000
direct allocation
page read and write
CFC000
stack
page read and write
47B3000
direct allocation
page read and write
3240000
direct allocation
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
2C17000
heap
page read and write
18EEC770000
trusted library allocation
page read and write
2851000
heap
page read and write
2AC32000
system
page read and write
2851000
heap
page read and write
3F72000
heap
page read and write
1320000
heap
page read and write
2A13000
heap
page read and write
2851000
heap
page read and write
751C000
heap
page read and write
2851000
heap
page read and write
3C32000
unclassified section
page execute and read and write
2851000
heap
page read and write
47B3000
direct allocation
page read and write
2AC0000
heap
page read and write
40BC000
heap
page read and write
2A61000
heap
page read and write
38BE000
stack
page read and write
2D0000
unkown
page readonly
70E000
stack
page read and write
940000
unkown
page readonly
2851000
heap
page read and write
2A20000
heap
page read and write
D00000
unkown
page readonly
18EEAD32000
system
page execute and read and write
4AB000
unkown
page readonly
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
3100000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
2C78000
heap
page read and write
2AF7000
heap
page read and write
2850000
heap
page read and write
400C000
heap
page read and write
18EECC01000
trusted library allocation
page read and write
2E5000
unkown
page read and write
E61000
unkown
page readonly
4690000
direct allocation
page read and write
4052000
heap
page read and write
400C000
heap
page read and write
3A28000
unclassified section
page read and write
374E000
stack
page read and write
2851000
heap
page read and write
CFC000
stack
page read and write
400C000
heap
page read and write
4052000
heap
page read and write
2A5B000
heap
page read and write
2851000
heap
page read and write
2A72000
heap
page read and write
2ADD000
heap
page read and write
18EEAF97000
heap
page read and write
4052000
heap
page read and write
400C000
heap
page read and write
14B0000
unkown
page readonly
2976000
heap
page read and write
3BBA000
unclassified section
page read and write
E90000
unkown
page readonly
4E2FFB000
stack
page read and write
2ABD000
heap
page read and write
5A70000
trusted library allocation
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2C05000
heap
page read and write
1441000
unkown
page readonly
18EEAFC3000
heap
page read and write
2E8E000
direct allocation
page execute and read and write
2851000
heap
page read and write
18EECB15000
trusted library allocation
page read and write
18EECB03000
trusted library allocation
page read and write
2851000
heap
page read and write
F00000
unkown
page readonly
E90000
unkown
page readonly
2E19000
direct allocation
page execute and read and write
2ABD000
heap
page read and write
2851000
heap
page read and write
7561000
heap
page read and write
2D1000
unkown
page execute read
4052000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
4830000
direct allocation
page read and write
758D000
heap
page read and write
47B3000
direct allocation
page read and write
400C000
heap
page read and write
2890000
unkown
page read and write
C0F000
heap
page read and write
2DB000
stack
page read and write
495D000
direct allocation
page read and write
100000
heap
page read and write
3518000
unkown
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
950000
unkown
page readonly
28A0000
unkown
page read and write
8B4000
stack
page read and write
2851000
heap
page read and write
2CE3000
heap
page read and write
3010000
unkown
page readonly
2AF3000
heap
page read and write
2FC1000
direct allocation
page execute and read and write
2C00000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2E5000
unkown
page read and write
315C000
unclassified section
page read and write
3012000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
3EAD000
heap
page read and write
2851000
heap
page read and write
18EECB0C000
trusted library allocation
page read and write
2A50000
heap
page read and write
7593000
heap
page read and write
D10000
unkown
page readonly
3032000
direct allocation
page execute and read and write
2851000
heap
page read and write
14AE000
stack
page read and write
FD0000
unkown
page readonly
2851000
heap
page read and write
2AEA000
heap
page read and write
2851000
heap
page read and write
482000
unkown
page readonly
2851000
heap
page read and write
9BA000
stack
page read and write
18EEC770000
trusted library allocation
page read and write
2AF0C000
system
page read and write
2851000
heap
page read and write
D00000
unkown
page readonly
FF0000
unkown
page read and write
757D000
heap
page read and write
4052000
heap
page read and write
2BF0000
trusted library allocation
page execute and read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
9F0000
unkown
page readonly
4959000
direct allocation
page read and write
EF0000
unkown
page readonly
7561000
heap
page read and write
2F50000
unkown
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
7599000
heap
page read and write
74F000
stack
page read and write
4052000
heap
page read and write
342D000
direct allocation
page execute and read and write
2851000
heap
page read and write
2851000
heap
page read and write
3EEE000
heap
page read and write
4830000
direct allocation
page read and write
2851000
heap
page read and write
2BF2000
unkown
page read and write
2851000
heap
page read and write
2890000
unkown
page read and write
B80000
heap
page read and write
2A61000
heap
page read and write
3FC1000
heap
page read and write
2920000
heap
page read and write
7596000
heap
page read and write
2A56000
heap
page read and write
2D1000
unkown
page execute read
2851000
heap
page read and write
299E000
stack
page read and write
3F25000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
18EEACA0000
system
page execute and read and write
3CBF000
stack
page read and write
18EEAEF0000
heap
page read and write
2851000
heap
page read and write
752E000
heap
page read and write
3EB0000
heap
page read and write
10B0000
unkown
page readonly
2851000
heap
page read and write
4052000
heap
page read and write
7556000
heap
page read and write
3229000
heap
page read and write
400C000
heap
page read and write
2E0C000
unkown
page read and write
2851000
heap
page read and write
2A50000
heap
page read and write
4052000
heap
page read and write
980000
heap
page read and write
2AD4000
heap
page read and write
3654000
unkown
page execute and read and write
2851000
heap
page read and write
2D0000
unkown
page readonly
2A13000
heap
page read and write
2851000
heap
page read and write
761A000
heap
page read and write
D25000
heap
page read and write
3174000
heap
page read and write
4E37FD000
stack
page read and write
2E7000
unkown
page readonly
752B000
heap
page read and write
400C000
heap
page read and write
39CE000
unkown
page read and write
2851000
heap
page read and write
2A5B000
heap
page read and write
18EEADD0000
heap
page read and write
18EECB21000
trusted library allocation
page read and write
2851000
heap
page read and write
D20000
heap
page read and write
2851000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
2DE000
unkown
page readonly
2851000
heap
page read and write
2F90000
heap
page read and write
7550000
heap
page read and write
2A13000
heap
page read and write
401000
unkown
page execute read
F10000
unkown
page readonly
2AB3000
heap
page read and write
2851000
heap
page read and write
1301000
unkown
page readonly
E50000
unkown
page read and write
2E5000
unkown
page read and write
18EEC770000
trusted library allocation
page read and write
29A0000
direct allocation
page read and write
2851000
heap
page read and write
3F40000
heap
page read and write
2A02000
heap
page read and write
400C000
heap
page read and write
E70000
unkown
page read and write
400C000
heap
page read and write
7600000
trusted library allocation
page read and write
2851000
heap
page read and write
E61000
unkown
page readonly
1328000
heap
page read and write
49CE000
direct allocation
page read and write
2851000
heap
page read and write
2FBD000
direct allocation
page execute and read and write
4A7000
unkown
page read and write
2A5B000
heap
page read and write
2851000
heap
page read and write
4690000
direct allocation
page read and write
47B3000
direct allocation
page read and write
43CB000
heap
page read and write
2851000
heap
page read and write
A2E000
stack
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
3F72000
heap
page read and write
2851000
heap
page read and write
2AAE000
heap
page read and write
18EEAD36000
system
page execute and read and write
4E3FFE000
stack
page read and write
2851000
heap
page read and write
3E4000
heap
page read and write
2851000
heap
page read and write
1328000
heap
page read and write
2851000
heap
page read and write
2A13000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
7528000
heap
page read and write
18EECCC4000
trusted library allocation
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
D20000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
BF0000
heap
page read and write
400C000
heap
page read and write
2A13000
heap
page read and write
A80000
heap
page read and write
759C000
heap
page read and write
4394000
unclassified section
page read and write
A0B000
unkown
page read and write
4690000
direct allocation
page read and write
3896000
unclassified section
page read and write
2AD4000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
18EECB00000
trusted library allocation
page read and write
287C000
stack
page read and write
482000
unkown
page readonly
14C0000
heap
page read and write
4526000
unclassified section
page read and write
2A40000
heap
page read and write
3102000
unclassified section
page read and write
2C05000
heap
page read and write
7770000
heap
page read and write
2DE000
unkown
page readonly
2851000
heap
page read and write
2851000
heap
page read and write
2D0000
unkown
page readonly
329E000
heap
page read and write
2853000
heap
page read and write
4052000
heap
page read and write
1310000
unkown
page read and write
7543000
heap
page read and write
490000
unkown
page write copy
400C000
heap
page read and write
2C6E000
heap
page read and write
2C72000
heap
page read and write
BFE000
heap
page read and write
7556000
heap
page read and write
52B0000
system
page execute and read and write
495D000
direct allocation
page read and write
2AE3000
heap
page read and write
2A20000
heap
page read and write
2851000
heap
page read and write
5D2E000
stack
page read and write
3E84000
unkown
page read and write
5295000
system
page execute and read and write
FB0000
unkown
page readonly
750B000
heap
page read and write
18EEAD34000
system
page execute and read and write
2851000
heap
page read and write
2851000
heap
page read and write
2930000
unkown
page readonly
2851000
heap
page read and write
4AB000
unkown
page readonly
7591000
heap
page read and write
2851000
heap
page read and write
1F0000
heap
page read and write
10AF000
stack
page read and write
2851000
heap
page read and write
18EEAFAC000
heap
page read and write
7F0000
heap
page read and write
7550000
heap
page read and write
28F0000
heap
page read and write
1E0000
heap
page read and write
FD0000
unkown
page readonly
400C000
heap
page read and write
F10000
unkown
page readonly
1310000
unkown
page read and write
2E1D000
direct allocation
page execute and read and write
2851000
heap
page read and write
400B000
heap
page read and write
400C000
heap
page read and write
2C1A000
heap
page read and write
2851000
heap
page read and write
EB0000
heap
page read and write
5313000
system
page execute and read and write
BFA000
heap
page read and write
4959000
direct allocation
page read and write
D30000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
755B000
heap
page read and write
3DC0000
heap
page read and write
2851000
heap
page read and write
29F0000
trusted library allocation
page read and write
2851000
heap
page read and write
4052000
heap
page read and write
2E7000
unkown
page readonly
2851000
heap
page read and write
4052000
heap
page read and write
2851000
heap
page read and write
49CE000
direct allocation
page read and write
2DE000
unkown
page readonly
400C000
heap
page read and write
4052000
heap
page read and write
2CDD000
stack
page read and write
3704000
unclassified section
page read and write
2B32000
unkown
page read and write
2A00000
heap
page read and write
3D4C000
unclassified section
page read and write
4052000
heap
page read and write
2924000
heap
page read and write
2B27000
heap
page read and write
3429000
direct allocation
page execute and read and write
2920000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2A13000
heap
page read and write
400000
unkown
page readonly
400C000
heap
page read and write
4830000
direct allocation
page read and write
2851000
heap
page read and write
1A31000
unkown
page readonly
18EEAF90000
heap
page read and write
2A56000
heap
page read and write
495D000
direct allocation
page read and write
2A55000
heap
page read and write
3642000
direct allocation
page execute and read and write
ECF000
heap
page read and write
4E47FE000
stack
page read and write
4052000
heap
page read and write
2A5B000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
35CD000
direct allocation
page execute and read and write
2F00000
heap
page read and write
49CE000
direct allocation
page read and write
3FC1000
heap
page read and write
FB0000
unkown
page readonly
49CE000
direct allocation
page read and write
400F000
heap
page read and write
2924000
heap
page read and write
930000
unkown
page readonly
318000
stack
page read and write
383C000
unkown
page read and write
9A000
stack
page read and write
4083000
heap
page read and write
2A48000
heap
page read and write
3F8A000
heap
page read and write
2851000
heap
page read and write
2B45000
heap
page read and write
76B0000
trusted library allocation
page read and write
2851000
heap
page read and write
755B000
heap
page read and write
7526000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
401000
unkown
page execute read
18EEAF9F000
heap
page read and write
2851000
heap
page read and write
322D000
heap
page read and write
35D1000
direct allocation
page execute and read and write
7577000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2AC0000
heap
page read and write
950000
heap
page read and write
49CE000
direct allocation
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
E50000
unkown
page read and write
D30000
heap
page read and write
3000000
heap
page read and write
400C000
heap
page read and write
4690000
direct allocation
page read and write
2851000
heap
page read and write
7575000
heap
page read and write
C2C000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
7614000
heap
page read and write
2C5B000
heap
page read and write
950000
unkown
page readonly
3E4000
heap
page read and write
2851000
heap
page read and write
18EECB13000
trusted library allocation
page read and write
4052000
heap
page read and write
2AC6000
heap
page read and write
D10000
unkown
page readonly
18EEAFBC000
heap
page read and write
2E7000
unkown
page readonly
A94000
heap
page read and write
1301000
unkown
page readonly
2E5000
unkown
page read and write
2A13000
heap
page read and write
3386000
unkown
page read and write
2A13000
heap
page read and write
13EE000
stack
page read and write
290C000
unkown
page read and write
2C12000
heap
page read and write
2B17000
heap
page read and write
2F90000
heap
page read and write
F7A000
stack
page read and write
2851000
heap
page read and write
9BA000
stack
page read and write
758D000
heap
page read and write
940000
unkown
page readonly
18EEC950000
heap
page read and write
3240000
direct allocation
page read and write
758A000
heap
page read and write
331C000
unclassified section
page read and write
36AA000
unkown
page read and write
9F0000
unkown
page readonly
2851000
heap
page read and write
EF0000
unkown
page readonly
14C0000
heap
page read and write
2851000
heap
page read and write
18EEAEB0000
heap
page read and write
2851000
heap
page read and write
7575000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
EB0000
heap
page read and write
2851000
heap
page read and write
2B1D000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
753A000
heap
page read and write
400C000
heap
page read and write
4052000
heap
page read and write
3E4000
heap
page read and write
18EEAFC0000
heap
page read and write
2FCF000
stack
page read and write
2C4C000
unkown
page read and write
490000
unkown
page read and write
400C000
heap
page read and write
4830000
direct allocation
page read and write
44EF000
heap
page read and write
3EDE000
unclassified section
page read and write
542C000
unkown
page read and write
2A5B000
heap
page read and write
2C19000
heap
page read and write
2851000
heap
page read and write
145E000
stack
page read and write
28BB000
stack
page read and write
2F94000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2F50000
unkown
page read and write
2F94000
heap
page read and write
2851000
heap
page read and write
3240000
direct allocation
page read and write
3E86000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
2B32000
unkown
page read and write
3E89000
heap
page read and write
169F000
stack
page read and write
2A13000
heap
page read and write
3FA9000
heap
page read and write
400C000
heap
page read and write
2851000
heap
page read and write
2F9B000
heap
page read and write
2AC6000
heap
page read and write
4016000
unkown
page read and write
16A0000
unkown
page readonly
2851000
heap
page read and write
A70000
heap
page read and write
2950000
trusted library allocation
page read and write
E70000
unkown
page read and write
18EECA00000
trusted library allocation
page read and write
400C000
heap
page read and write
F00000
unkown
page readonly
2851000
heap
page read and write
2851000
heap
page read and write
349E000
direct allocation
page execute and read and write
EB8000
heap
page read and write
4052000
heap
page read and write
400C000
heap
page read and write
10AF000
stack
page read and write
2851000
heap
page read and write
2A13000
heap
page read and write
E4E000
stack
page read and write
8AF000
stack
page read and write
4830000
direct allocation
page read and write
2851000
heap
page read and write
2940000
heap
page read and write
93E000
stack
page read and write
2D01000
heap
page read and write
2851000
heap
page read and write
2851000
heap
page read and write
10B0000
unkown
page readonly
2851000
heap
page read and write
2B40000
trusted library allocation
page read and write
2B21000
heap
page read and write
2A13000
heap
page read and write
1320000
heap
page read and write
3F0000
heap
page read and write
2A13000
heap
page read and write
49CE000
direct allocation
page read and write
2AAE000
heap
page read and write
29F0000
trusted library allocation
page read and write
89F000
stack
page read and write
2E7000
unkown
page readonly
31F4000
unkown
page read and write
There are 737 hidden memdumps, click here to show them.