IOC Report
PAYMENT ADVISE#9879058.exe

loading gif

Files

File Path
Type
Category
Malicious
PAYMENT ADVISE#9879058.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2023Ei4
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\togging
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PAYMENT ADVISE#9879058.exe
"C:\Users\user\Desktop\PAYMENT ADVISE#9879058.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\PAYMENT ADVISE#9879058.exe"
malicious
C:\Program Files (x86)\XLTCSewxDUMLdikaPXcOZYCoqtmGBvvhnUXiYckHGzcCnXzSTMhVbViDzubQxfnbEGSspn\eYlgnnKYnAjqSS.exe
"C:\Program Files (x86)\XLTCSewxDUMLdikaPXcOZYCoqtmGBvvhnUXiYckHGzcCnXzSTMhVbViDzubQxfnbEGSspn\eYlgnnKYnAjqSS.exe"
malicious
C:\Windows\SysWOW64\NETSTAT.EXE
"C:\Windows\SysWOW64\NETSTAT.EXE"
malicious
C:\Program Files (x86)\XLTCSewxDUMLdikaPXcOZYCoqtmGBvvhnUXiYckHGzcCnXzSTMhVbViDzubQxfnbEGSspn\eYlgnnKYnAjqSS.exe
"C:\Program Files (x86)\XLTCSewxDUMLdikaPXcOZYCoqtmGBvvhnUXiYckHGzcCnXzSTMhVbViDzubQxfnbEGSspn\eYlgnnKYnAjqSS.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.b5x7vk.agency/3rsv/
104.21.11.31
malicious
http://www.b5x7vk.agency/3rsv/?xNv=xIX+WL4Gosls7mMvG39YjczwIlc5FH+9QHTcqjrnYPts9+3MRA8haYPK8pqgYSQnqVoX+MtR4yK2qH2ERM2vlkvqHJkEK2jfahGH5woqObRGQGud+bD1SW8=&xh-d=eNF4ktDXSL5XRvo
104.21.11.31
malicious
http://www.healtpro.top/fes8/
203.161.43.245
malicious
http://www.chalet-tofane.net:80/w5h3/?xNv=1SmCwmpOaIYJfuspvbmYENxQiVuKofAafkRqArhwQnoekPS2kKO
unknown
malicious
http://www.chalet-tofane.net/w5h3/?xNv=1SmCwmpOaIYJfuspvbmYENxQiVuKofAafkRqArhwQnoekPS2kKO+Sw+l3ZpIkD6/zHiqkZCr31NVHRkc0KhHMBZH6coriNZLnk7PgxLNtl8YZG6QQCHD2lU=&xh-d=eNF4ktDXSL5XRvo
62.149.128.40
malicious
http://www.wcq24.top/4jol/
154.23.184.240
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.wcq24.top
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.b5x7vk.agency
104.21.11.31
malicious
chalet-tofane.net
62.149.128.40
malicious
wcq24.top
154.23.184.240
malicious
www.healtpro.top
203.161.43.245
malicious
www.wcq24.top
unknown
malicious
www.bonusgame2024.online
unknown
malicious
www.chalet-tofane.net
unknown
malicious

IPs

IP
Domain
Country
Malicious
62.149.128.40
chalet-tofane.net
Italy
malicious
203.161.43.245
www.healtpro.top
Malaysia
malicious
104.21.11.31
www.b5x7vk.agency
United States
malicious
154.23.184.240
wcq24.top
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2E80000
unkown
page execute and read and write
malicious
11A0000
system
page execute and read and write
malicious
3E00000
unclassified section
page execute and read and write
malicious
3A50000
unclassified section
page execute and read and write
malicious
30E0000
system
page execute and read and write
malicious
35B0000
trusted library allocation
page read and write
malicious
3600000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
F50000
unkown
page read and write
3461000
heap
page read and write
C60000
unkown
page readonly
403E000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
306B000
stack
page read and write
39D1000
direct allocation
page execute and read and write
2CBA000
stack
page read and write
833B000
heap
page read and write
85DF000
stack
page read and write
48ED000
direct allocation
page read and write
10BF000
heap
page read and write
2B84000
heap
page read and write
3461000
heap
page read and write
3450000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
376B000
heap
page read and write
25D1BFC4000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
33CF000
stack
page read and write
3461000
heap
page read and write
2BB0000
unkown
page read and write
35D6000
unkown
page read and write
25D1BCC0000
trusted library allocation
page read and write
495E000
direct allocation
page read and write
3461000
heap
page read and write
BE1000
unkown
page readonly
3461000
heap
page read and write
3768000
unkown
page read and write
2E13000
heap
page read and write
8348000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3FE3000
heap
page read and write
301A000
heap
page read and write
3461000
heap
page read and write
3460000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2F5000
unkown
page read and write
3461000
heap
page read and write
37FE000
stack
page read and write
3520000
direct allocation
page read and write
568F000
stack
page read and write
321E000
heap
page read and write
8375000
heap
page read and write
401000
unkown
page execute read
3E8F000
heap
page read and write
400000
unkown
page readonly
C50000
unkown
page readonly
10A8000
heap
page read and write
121E000
heap
page read and write
25D1BE0F000
trusted library allocation
page read and write
490000
unkown
page read and write
3461000
heap
page read and write
4074000
heap
page read and write
BC0000
heap
page read and write
2B0E000
stack
page read and write
BF0000
unkown
page read and write
305C000
unkown
page read and write
2CF0000
heap
page read and write
3461000
heap
page read and write
4074000
heap
page read and write
44BD000
heap
page read and write
3461000
heap
page read and write
3181000
heap
page read and write
402E000
heap
page read and write
2F35000
heap
page read and write
4743000
direct allocation
page read and write
120D000
system
page execute and read and write
C60000
unkown
page readonly
834B000
heap
page read and write
EFC000
stack
page read and write
3461000
heap
page read and write
25D1A320000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
578F000
stack
page read and write
2B90000
unkown
page readonly
324B000
heap
page read and write
3BFF000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
1090000
unkown
page read and write
25D1A340000
heap
page read and write
4743000
direct allocation
page read and write
B90000
unkown
page readonly
3E97000
heap
page read and write
834F000
heap
page read and write
3164000
heap
page read and write
2D80000
heap
page read and write
37B0000
trusted library allocation
page read and write
DDC000
stack
page read and write
C70000
unkown
page readonly
1030000
unkown
page readonly
3176000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3EA0000
heap
page read and write
10A8000
heap
page read and write
2E13000
heap
page read and write
BE1000
unkown
page readonly
4620000
direct allocation
page read and write
3461000
heap
page read and write
2E9C000
unkown
page read and write
15E000
stack
page read and write
25D1BCC0000
trusted library allocation
page read and write
402E000
heap
page read and write
320E000
heap
page read and write
34CF000
stack
page read and write
1170000
unkown
page read and write
2F5000
unkown
page read and write
2E13000
heap
page read and write
3461000
heap
page read and write
AD0000
unkown
page readonly
386E000
stack
page read and write
8379000
heap
page read and write
1010000
heap
page read and write
3F4C000
unclassified section
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
11F0000
heap
page read and write
2E13000
heap
page read and write
3FE3000
heap
page read and write
836C000
heap
page read and write
382E000
stack
page read and write
1050000
heap
page read and write
48E9000
direct allocation
page read and write
3FE3000
heap
page read and write
3461000
heap
page read and write
25D1BE0C000
trusted library allocation
page read and write
4074000
heap
page read and write
3461000
heap
page read and write
C70000
unkown
page readonly
3520000
direct allocation
page read and write
3461000
heap
page read and write
2BF4000
heap
page read and write
8AF000
stack
page read and write
3461000
heap
page read and write
4620000
direct allocation
page read and write
25D1BE03000
trusted library allocation
page read and write
44C6000
unclassified section
page read and write
5283000
unclassified section
page execute and read and write
3C01000
heap
page read and write
11F5000
system
page execute and read and write
3461000
heap
page read and write
3461000
heap
page read and write
94B000
heap
page read and write
3461000
heap
page read and write
3FA8000
heap
page read and write
3005000
heap
page read and write
3461000
heap
page read and write
305C000
unkown
page read and write
48E9000
direct allocation
page read and write
317B000
heap
page read and write
3461000
heap
page read and write
3101000
heap
page read and write
402E000
heap
page read and write
3461000
heap
page read and write
3005000
heap
page read and write
91A000
heap
page read and write
25D1BE16000
trusted library allocation
page read and write
2CFF000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3560000
trusted library allocation
page read and write
3461000
heap
page read and write
1631000
unkown
page readonly
2B90000
unkown
page readonly
47C0000
direct allocation
page read and write
3204000
heap
page read and write
3461000
heap
page read and write
3232000
heap
page read and write
402E000
heap
page read and write
25D1BD00000
trusted library allocation
page read and write
834D000
heap
page read and write
3461000
heap
page read and write
4074000
heap
page read and write
3160000
heap
page read and write
91E000
heap
page read and write
AF0000
unkown
page readonly
34D0000
direct allocation
page read and write
8B4000
stack
page read and write
2E13000
heap
page read and write
2AC0000
heap
page read and write
3461000
heap
page read and write
8369000
heap
page read and write
4743000
direct allocation
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
495E000
direct allocation
page read and write
8328000
heap
page read and write
495E000
direct allocation
page read and write
4074000
heap
page read and write
B90000
unkown
page readonly
1219000
system
page execute and read and write
2E0000
unkown
page readonly
4620000
direct allocation
page read and write
3461000
heap
page read and write
3254000
heap
page read and write
3461000
heap
page read and write
4074000
heap
page read and write
2F40000
heap
page read and write
3461000
heap
page read and write
2EE000
unkown
page readonly
3461000
heap
page read and write
1270000
system
page execute and read and write
1020000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
1040000
unkown
page readonly
AE0000
unkown
page readonly
3181000
heap
page read and write
100000
heap
page read and write
31E3000
heap
page read and write
2F5000
unkown
page read and write
31F7000
heap
page read and write
3461000
heap
page read and write
3245000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3C72000
unclassified section
page read and write
31ED000
heap
page read and write
1050000
heap
page read and write
3461000
heap
page read and write
10A0000
heap
page read and write
25D1A240000
system
page execute and read and write
3461000
heap
page read and write
110000
heap
page read and write
17B0000
heap
page read and write
3461000
heap
page read and write
85431FE000
stack
page read and write
1040000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
8336000
heap
page read and write
2E13000
heap
page read and write
3FA7000
heap
page execute and read and write
2EE000
unkown
page readonly
1181000
unkown
page readonly
85419FC000
stack
page read and write
2E13000
heap
page read and write
3461000
heap
page read and write
2B80000
heap
page read and write
BC0000
heap
page read and write
4AB000
unkown
page readonly
48E9000
direct allocation
page read and write
F90000
heap
page read and write
85429FE000
stack
page read and write
121C000
system
page execute and read and write
3461000
heap
page read and write
BA0000
unkown
page readonly
25D1A300000
heap
page read and write
2E1000
unkown
page execute read
25D1BF00000
trusted library allocation
page read and write
3461000
heap
page read and write
9A000
stack
page read and write
47C0000
direct allocation
page read and write
3461000
heap
page read and write
B5A000
stack
page read and write
3880000
unkown
page execute and read and write
2C7C000
stack
page read and write
3461000
heap
page read and write
35A0000
heap
page read and write
8A2F000
stack
page read and write
3204000
heap
page read and write
3170000
heap
page read and write
3C8A000
heap
page read and write
4074000
heap
page read and write
BD0000
unkown
page read and write
3461000
heap
page read and write
317A000
heap
page read and write
3461000
heap
page read and write
3BF1000
direct allocation
page execute and read and write
3461000
heap
page read and write
31ED000
heap
page read and write
3461000
heap
page read and write
2B80000
heap
page read and write
402E000
heap
page read and write
2F7000
unkown
page readonly
4099000
heap
page read and write
2D9E000
stack
page read and write
30B4000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
1AA26000
system
page read and write
3560000
heap
page read and write
317E000
heap
page read and write
85E0000
heap
page read and write
3898000
heap
page read and write
3D8C000
unclassified section
page read and write
25D1BF01000
trusted library allocation
page read and write
3461000
heap
page read and write
495E000
direct allocation
page read and write
4AB000
unkown
page readonly
2E0000
unkown
page readonly
3461000
heap
page read and write
1781000
unkown
page readonly
48ED000
direct allocation
page read and write
362D000
heap
page read and write
3461000
heap
page read and write
2E02000
heap
page read and write
13F0000
unkown
page readonly
89AF000
stack
page read and write
F60000
unkown
page read and write
2BF4000
heap
page read and write
1190000
unkown
page read and write
3461000
heap
page read and write
3423000
heap
page read and write
47C0000
direct allocation
page read and write
2F7000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
3012000
heap
page read and write
3461000
heap
page read and write
2E13000
heap
page read and write
3650000
trusted library allocation
page read and write
13EF000
stack
page read and write
11FD000
system
page execute and read and write
3461000
heap
page read and write
1030000
unkown
page readonly
2A7C000
stack
page read and write
3909000
heap
page read and write
3461000
heap
page read and write
2B84000
heap
page read and write
4074000
heap
page read and write
15DF000
stack
page read and write
8420000
trusted library allocation
page read and write
25D1A26D000
system
page execute and read and write
2E0000
unkown
page readonly
35BB000
heap
page read and write
25D1A31A000
heap
page read and write
3461000
heap
page read and write
89EE000
stack
page read and write
3225000
heap
page read and write
BF0000
unkown
page read and write
3461000
heap
page read and write
4074000
heap
page read and write
3461000
heap
page read and write
495E000
direct allocation
page read and write
896E000
stack
page read and write
3461000
heap
page read and write
3FB0000
heap
page read and write
3461000
heap
page read and write
2E00000
heap
page read and write
CDA000
stack
page read and write
25D1A310000
heap
page read and write
2D60000
direct allocation
page read and write
389E000
direct allocation
page execute and read and write
1020000
unkown
page readonly
321B000
heap
page read and write
89F000
stack
page read and write
402E000
heap
page read and write
3017000
heap
page read and write
38FC000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
31DE000
heap
page read and write
8372000
heap
page read and write
11F8000
heap
page read and write
3461000
heap
page read and write
3266000
heap
page read and write
3017000
heap
page read and write
3461000
heap
page read and write
3700000
trusted library allocation
page execute and read and write
3461000
heap
page read and write
2DDC000
heap
page read and write
3461000
heap
page read and write
11DE000
stack
page read and write
3461000
heap
page read and write
2F30000
heap
page read and write
3461000
heap
page read and write
3A49000
direct allocation
page execute and read and write
3250000
heap
page read and write
25D1BC00000
heap
page read and write
3300000
heap
page read and write
39CD000
direct allocation
page execute and read and write
2F7000
unkown
page readonly
3461000
heap
page read and write
31F0000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3894000
heap
page read and write
2E13000
heap
page read and write
382D000
direct allocation
page execute and read and write
25D1BE00000
trusted library allocation
page read and write
3461000
heap
page read and write
3EAC000
heap
page read and write
85421FD000
stack
page read and write
4A7000
unkown
page read and write
3461000
heap
page read and write
2E13000
heap
page read and write
47C0000
direct allocation
page read and write
48ED000
direct allocation
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
4620000
direct allocation
page read and write
3461000
heap
page read and write
1A292000
system
page read and write
25D1A33C000
heap
page read and write
3F84000
heap
page read and write
3C62000
direct allocation
page execute and read and write
2AC0000
heap
page read and write
4620000
direct allocation
page read and write
2E13000
heap
page read and write
25D1BFAE000
trusted library allocation
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
401000
unkown
page execute read
3461000
heap
page read and write
558C000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3891000
unkown
page execute and read and write
1070000
unkown
page readonly
2D90000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
2E13000
heap
page read and write
25D1BE13000
trusted library allocation
page read and write
3461000
heap
page read and write
482000
unkown
page readonly
490000
unkown
page write copy
3461000
heap
page read and write
3920000
direct allocation
page execute and read and write
2BF0000
heap
page read and write
48E9000
direct allocation
page read and write
3178000
heap
page read and write
13F0000
unkown
page readonly
3461000
heap
page read and write
3500000
heap
page read and write
F96000
heap
page read and write
2D10000
heap
page read and write
859E000
stack
page read and write
3461000
heap
page read and write
1181000
unkown
page readonly
2D80000
heap
page read and write
3461000
heap
page read and write
3256000
heap
page read and write
2D90000
unkown
page readonly
47EA000
unclassified section
page read and write
3461000
heap
page read and write
402E000
heap
page read and write
3461000
heap
page read and write
1CE000
stack
page read and write
8366000
heap
page read and write
DDC000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2D82000
unkown
page read and write
1A1D2000
system
page read and write
94B000
heap
page read and write
2D50000
heap
page read and write
10CD000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
837A000
heap
page read and write
4074000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
AD0000
unkown
page readonly
3700000
direct allocation
page execute and read and write
3461000
heap
page read and write
BA0000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
1631000
unkown
page readonly
3461000
heap
page read and write
43BA000
heap
page read and write
2EE000
unkown
page readonly
4743000
direct allocation
page read and write
3F33000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
C50000
unkown
page readonly
3461000
heap
page read and write
402E000
heap
page read and write
11EE000
stack
page read and write
47C0000
direct allocation
page read and write
2EE000
unkown
page readonly
3903000
unkown
page execute and read and write
3E99000
heap
page read and write
AE0000
unkown
page readonly
4743000
direct allocation
page read and write
CDA000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2DDE000
stack
page read and write
25D1BFCE000
trusted library allocation
page read and write
3A4D000
direct allocation
page execute and read and write
3461000
heap
page read and write
1170000
unkown
page read and write
3461000
heap
page read and write
30B0000
heap
page read and write
1090000
unkown
page read and write
3EB3000
heap
page read and write
2D82000
unkown
page read and write
495E000
direct allocation
page read and write
AF0000
unkown
page readonly
3A42000
direct allocation
page execute and read and write
3F60000
heap
page read and write
48E9000
direct allocation
page read and write
3178000
heap
page read and write
3BED000
direct allocation
page execute and read and write
369E000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
47C0000
direct allocation
page read and write
38FA000
unkown
page read and write
2F5000
unkown
page read and write
48ED000
direct allocation
page read and write
25D1BFBE000
trusted library allocation
page read and write
3461000
heap
page read and write
4743000
direct allocation
page read and write
2E13000
heap
page read and write
944000
heap
page read and write
8430000
trusted library allocation
page read and write
25D1A430000
heap
page read and write
1781000
unkown
page readonly
3461000
heap
page read and write
31F7000
heap
page read and write
837D000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
835A000
heap
page read and write
170000
heap
page read and write
3164000
heap
page read and write
3461000
heap
page read and write
BB0000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
2ABE000
stack
page read and write
3520000
direct allocation
page read and write
48ED000
direct allocation
page read and write
319A000
heap
page read and write
3461000
heap
page read and write
1A4AC000
system
page read and write
3461000
heap
page read and write
2E13000
heap
page read and write
8341000
heap
page read and write
2E13000
heap
page read and write
8FE000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
10A0000
heap
page read and write
85439FF000
stack
page read and write
3461000
heap
page read and write
12A0000
unkown
page readonly
12A0000
unkown
page readonly
4620000
direct allocation
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
37B0000
trusted library allocation
page read and write
3461000
heap
page read and write
402E000
heap
page read and write
1070000
unkown
page readonly
BB0000
unkown
page readonly
37B0000
trusted library allocation
page read and write
3019000
heap
page read and write
910000
heap
page read and write
25D1A343000
heap
page read and write
48ED000
direct allocation
page read and write
2E42000
unkown
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3629000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
400000
unkown
page readonly
402E000
heap
page read and write
3000000
heap
page read and write
4811000
unclassified section
page execute and read and write
30A8000
stack
page read and write
3164000
heap
page read and write
3FAC000
heap
page read and write
4800000
unclassified section
page execute and read and write
3461000
heap
page read and write
F90000
heap
page read and write
2E1000
unkown
page execute read
EFC000
stack
page read and write
3461000
heap
page read and write
8370000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
36DE000
heap
page read and write
3ABE000
direct allocation
page execute and read and write
3461000
heap
page read and write
3D32000
unclassified section
page read and write
855D000
stack
page read and write
3829000
direct allocation
page execute and read and write
17AE000
stack
page read and write
3461000
heap
page read and write
25D1A32C000
heap
page read and write
3461000
heap
page read and write
4658000
unclassified section
page read and write
2E1000
unkown
page execute read
3461000
heap
page read and write
3461000
heap
page read and write
482000
unkown
page readonly
402E000
heap
page read and write
3461000
heap
page read and write
B5A000
stack
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
48E9000
direct allocation
page read and write
2C90000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
8360000
heap
page read and write
317D000
heap
page read and write
3270000
heap
page read and write
4883000
unclassified section
page execute and read and write
402E000
heap
page read and write
3164000
heap
page read and write
1A2EC000
system
page read and write
3461000
heap
page read and write
3EB1000
heap
page read and write
3461000
heap
page read and write
11F8000
heap
page read and write
116E000
stack
page read and write
11F0000
heap
page read and write
3461000
heap
page read and write
8331000
heap
page read and write
3461000
heap
page read and write
3DB0000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2E13000
heap
page read and write
25D1BCB0000
heap
page read and write
3EE2000
heap
page read and write
2BB0000
unkown
page read and write
25D1BE21000
trusted library allocation
page read and write
2C90000
unkown
page readonly
3461000
heap
page read and write
25D1A26B000
system
page execute and read and write
2E0000
unkown
page readonly
3461000
heap
page read and write
1190000
unkown
page read and write
3461000
heap
page read and write
2F7000
unkown
page readonly
3461000
heap
page read and write
3461000
heap
page read and write
8346000
heap
page read and write
3C0F000
heap
page read and write
402E000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
BD0000
unkown
page read and write
3461000
heap
page read and write
31F0000
heap
page read and write
4074000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2D40000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2E1000
unkown
page execute read
3461000
heap
page read and write
1010000
heap
page read and write
2EF0000
heap
page read and write
4303000
unkown
page execute and read and write
180000
heap
page read and write
3461000
heap
page read and write
3461000
heap
page read and write
2BF0000
heap
page read and write
There are 677 hidden memdumps, click here to show them.