IOC Report
Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\1863I7301
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ojejimv.xok.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n4vk50nh.uc5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uyi3omke.qbh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zykndro0.pir.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Order.exe
"C:\Users\user\Desktop\Order.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Order.exe"
malicious
C:\Users\user\Desktop\Order.exe
"C:\Users\user\Desktop\Order.exe"
malicious
C:\Users\user\Desktop\Order.exe
"C:\Users\user\Desktop\Order.exe"
malicious
C:\Program Files (x86)\YAodXpadNTymUQmxtjsDbXnbTgoyRNRjoLrbYoUeCzqA\mkvfHfXifKJWp.exe
"C:\Program Files (x86)\YAodXpadNTymUQmxtjsDbXnbTgoyRNRjoLrbYoUeCzqA\mkvfHfXifKJWp.exe"
malicious
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\SysWOW64\mshta.exe"
malicious
C:\Program Files (x86)\YAodXpadNTymUQmxtjsDbXnbTgoyRNRjoLrbYoUeCzqA\mkvfHfXifKJWp.exe
"C:\Program Files (x86)\YAodXpadNTymUQmxtjsDbXnbTgoyRNRjoLrbYoUeCzqA\mkvfHfXifKJWp.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.coffee-and-blends.info/jp2s/?oFA=_z5x9B5&kf-HBx=P0qG7QiazDWD2BWelIei5OaE3G7F+t1+aX9fXKMK+x60PE0IVfUJFQ907pREBNW8LmwaLsR1/kIgdQ4HVuT4wdAdC4fEO7kU/4v+0UaEqAZT5BgARj9CDCY=
217.160.0.231
malicious
http://www.filelabel.info/lclg/?kf-HBx=qGNQqN428OgBR9iKpkadQRykwt+HrKy+i1J9pxVfZ8K+uwmr88+1atpMra6tnIlLOjS5I+7feEtfi/Omwv/rkGEuIwUpZoXbB9LzMpYZI6R6lH7jDDsD7jY=&oFA=_z5x9B5
3.33.130.190
malicious
http://www.multileveltravel.world/ou1g/?kf-HBx=p6P+FgoGiP/G4Ng2k4kydfL9CEjREuwmc4B14fS4wE3C00mAPriyDmdkjkAl1MwiKmR4YcU9y+Hnl6M9logr4guZJ1Pjn+I9YPEKQsPJSCqhxwn7206Dyyk=&oFA=_z5x9B5
3.33.130.190
malicious
http://www.nad5.shop/moqb/
156.226.22.233
malicious
http://www.softillery.info/xia9/
3.33.130.190
malicious
http://www.digitalbloom.info/frw6/?kf-HBx=UG3twl1RTWICP6a+snMr6dqVChYRNbF04tf9jk2zJzREL1HFEfeM3dheGhXvZJa2xeklgJW6nyy59H+FpxNRygeU7S1OzbuuspnSBo+prL8MhwcFbuUikZc=&oFA=_z5x9B5
3.33.130.190
malicious
http://www.specialgift.asia/s7e8/?kf-HBx=Qf5nKOHOS6pOo2hqHNTD4NLxMOybGOQpbdUHnCIedAl2mvk/ZCfVPn7bYBvLSFyKndMpVE3F/mLSkI4cHOWneAsTSYMh6rYvgLLbq+jq88smW47nOX2gz0M=&oFA=_z5x9B5
35.156.117.131
malicious
http://www.tukaari.shop/h8b0/?kf-HBx=DRMewQ2K/nAxApdAjdq/8MBaTrmuK5PhjAtlDuz9ScYe9TdKczyHToKl/nXwUp75CTxdtMRmJbFDzl6M6vndpjQD4u+ERF0y3CIErlIFDiiN/rGNNtD3azo=&oFA=_z5x9B5
3.33.130.190
malicious
http://www.tmstore.click/qmcg/
54.179.173.60
malicious
http://www.vasehub.xyz/rhgo/
162.213.249.216
malicious
http://www.tmstore.click/qmcg/?kf-HBx=67IAuCDTBw5QZph7iUnsNNZg0vqYuCAKYaPJ7pOH3jPtJouGJ8FP+NUi0Lg8hSiTUrSIuLh0DGPLGIiCUYAvzJi3IqMGAEHDzAW40nPzBt7ZJ3Wrnor3ezI=&oFA=_z5x9B5
54.179.173.60
malicious
http://www.moritynomxd.xyz/d5je/?oFA=_z5x9B5&kf-HBx=joFU07nwohD6eVoe3rFlartiOObsWeCn1fIADxIG1iVHGQ+b2sFWG9fhj6bDMdYTFTYIwFceucpsU6xb3PR2iChOsBNMIjf68Qc2WylAI6LhtEtoF9GlVuo=
172.81.61.224
malicious
http://www.vasehub.xyz/rhgo/?kf-HBx=1xwwfRv/EtrSMau8qPeCsOf3wKLyTBnoq21AcW2zPWj0G3ZAwmXkdhytTHgnTqC6RVKy1Kv2PAT+a+qucbh6tBLzZBRYsir7YQhsB0BKwkYVMNCqueBTujA=&oFA=_z5x9B5
162.213.249.216
malicious
http://www.digitalbloom.info/frw6/
3.33.130.190
malicious
http://www.luxe.guru/esft/
52.20.84.62
malicious
http://www.softillery.info/xia9/?kf-HBx=6Fbp2c2euLl3IpV1eF5M890ZMvcTOf/3kT3/256CKoimaApAh5mhtnZkbQOyMHVCRwBLnE72oyxVmwPWVRK3JQiLPTXJhO4ROr3CrWHqyrvdf750Ozu+jso=&oFA=_z5x9B5
3.33.130.190
malicious
http://www.40wxd.top/xqel/?kf-HBx=vvqDHEJ83RQMdUhh5kLoqoSDKB3hWQiq1sb91PtModI/1ZQDQosT/W6HQ09vXqzqrFP7Qh9498xTBzMpQmH7Kh5kUCFMd1INst0sGCzgDgfe+hjN7G6C4+s=&oFA=_z5x9B5
206.119.82.134
malicious
http://www.moritynomxd.xyz/d5je/
172.81.61.224
malicious
http://www.tukaari.shop/h8b0/
3.33.130.190
malicious
http://www.multileveltravel.world/ou1g/
3.33.130.190
malicious
http://www.filelabel.info/lclg/
3.33.130.190
malicious
http://www.nad5.shop/moqb/?oFA=_z5x9B5&kf-HBx=5S0MhnNpk6MkkLakdHV8bk6Gf6N5AAHlj1oGaRHlrviJ69CM+vN0PvYaKZeKsDU+ZViOcrN8cLcNEkQHPUUQsTizlRh8nNBpgfm81WeJmiMGBZ7xhu/fL+Q=
156.226.22.233
malicious
http://www.coffee-and-blends.info/jp2s/
217.160.0.231
malicious
http://www.40wxd.top/xqel/
206.119.82.134
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://www.luxe.guru/
unknown
http://www.amitayush.digital/5ab9/?kf-HBx=RKfYqv7dLSd52zuxxJ7U+qX1dgM0j08UigLPO7fV9fYs6caX5nN0t2AmzQZhkSW6ZNnx9rwHNAGWB6es6Bp2HJzLwgFpIUBewc3Sq/1ccTai3Bmxrp0U6E4=&oFA=_z5x9B5
142.250.186.83
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://www.amitayush.digital/5ab9/?kf-HBx=RKfYqv7dLSd52zuxxJ7U
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.amitayush.digital/5ab9/
142.250.186.83
http://www.tukaari.shop
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.strikingly.com/?utm_source=404&utm_medium=internal&utm_campaign=404_redirect
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
http://www.carterandcone.coml
unknown
https://www.tmstore.click/qmcg/?kf-HBx=67IAuCDTBw5QZph7iUnsNNZg0vqYuCAKYaPJ7pOH3jPtJouGJ8FP
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.vasehub.xyz
162.213.249.216
malicious
softillery.info
3.33.130.190
malicious
tukaari.shop
3.33.130.190
malicious
www.moritynomxd.xyz
172.81.61.224
malicious
40wxd.top
206.119.82.134
malicious
www.specialgift.asia.s.strikinglydns.com
35.156.117.131
malicious
www.luxe.guru
52.20.84.62
malicious
dns.ladipage.com
54.179.173.60
malicious
digitalbloom.info
3.33.130.190
malicious
www.coffee-and-blends.info
217.160.0.231
malicious
filelabel.info
3.33.130.190
malicious
www.nad5.shop
156.226.22.233
malicious
multileveltravel.world
3.33.130.190
malicious
www.tukaari.shop
unknown
malicious
www.tmstore.click
unknown
malicious
www.40wxd.top
unknown
malicious
www.gemtastic.shop
unknown
malicious
www.softillery.info
unknown
malicious
www.longfilsalphonse.net
unknown
malicious
www.multileveltravel.world
unknown
malicious
www.digitalbloom.info
unknown
malicious
www.filelabel.info
unknown
malicious
www.specialgift.asia
unknown
malicious
www.amitayush.digital
unknown
malicious
ghs.googlehosted.com
142.250.186.83
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
217.160.0.231
www.coffee-and-blends.info
Germany
malicious
52.20.84.62
www.luxe.guru
United States
malicious
35.156.117.131
www.specialgift.asia.s.strikinglydns.com
United States
malicious
156.226.22.233
www.nad5.shop
Seychelles
malicious
206.119.82.134
40wxd.top
United States
malicious
54.179.173.60
dns.ladipage.com
United States
malicious
162.213.249.216
www.vasehub.xyz
United States
malicious
3.33.130.190
softillery.info
United States
malicious
172.81.61.224
www.moritynomxd.xyz
United States
malicious
142.250.186.83
ghs.googlehosted.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1880000
unclassified section
page execute and read and write
malicious
3A39000
trusted library allocation
page read and write
malicious
3500000
trusted library allocation
page read and write
malicious
34B0000
trusted library allocation
page read and write
malicious
B80000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4A60000
system
page execute and read and write
malicious
1D60000
unclassified section
page execute and read and write
malicious
5130000
trusted library section
page read and write
malicious
2D40000
unkown
page execute and read and write
malicious
180000
unkown
page readonly
FF0000
heap
page read and write
1CE4E640000
trusted library allocation
page read and write
7DE000
unkown
page readonly
3316000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
3160000
heap
page read and write
35B1000
heap
page read and write
FF8000
heap
page read and write
F6F000
stack
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4E803000
trusted library allocation
page read and write
C67000
heap
page read and write
4F0B000
stack
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
8396000
heap
page read and write
11F0000
unkown
page readonly
335E000
heap
page read and write
7D0000
unkown
page readonly
35B1000
heap
page read and write
32D3000
heap
page read and write
2A14000
unkown
page read and write
20A0000
unkown
page readonly
35B1000
heap
page read and write
35B1000
heap
page read and write
17DF000
stack
page read and write
35B1000
heap
page read and write
1C1000
unkown
page readonly
35B1000
heap
page read and write
2502000
unclassified section
page execute and read and write
1581000
unkown
page readonly
530000
unkown
page readonly
CBBC000
system
page read and write
2ECA000
unkown
page read and write
170000
unkown
page readonly
29E0000
heap
page execute and read and write
35B1000
heap
page read and write
8391000
heap
page read and write
35B1000
heap
page read and write
3320000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
83A2000
heap
page read and write
3CEC000
unkown
page read and write
1CE4E821000
trusted library allocation
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
2758000
trusted library allocation
page read and write
F00000
heap
page read and write
1CE4CB69000
system
page execute and read and write
35B1000
heap
page read and write
8391000
heap
page read and write
1130000
heap
page read and write
35B1000
heap
page read and write
2B40000
heap
page read and write
52D000
heap
page read and write
305C000
unkown
page read and write
8391000
heap
page read and write
55FC000
unclassified section
page read and write
3A3D000
direct allocation
page execute and read and write
B85E000
stack
page read and write
1CE4CD30000
heap
page read and write
B70000
unkown
page readonly
13A000
stack
page read and write
35B1000
heap
page read and write
546A000
unclassified section
page read and write
2976000
trusted library allocation
page read and write
35B1000
heap
page read and write
2C50000
unkown
page readonly
2971000
trusted library allocation
page read and write
44B6000
unclassified section
page read and write
5324000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
2830000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
35B1000
heap
page read and write
EFC000
stack
page read and write
3359000
heap
page read and write
12FB000
stack
page read and write
4FF3000
heap
page read and write
36E0000
heap
page read and write
F4E000
stack
page read and write
C10000
trusted library allocation
page execute and read and write
532000
unkown
page readonly
5354000
unkown
page execute and read and write
FE1000
unkown
page readonly
7D0000
unkown
page readonly
C60000
heap
page read and write
35B1000
heap
page read and write
74E000
stack
page read and write
229F000
stack
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
3903000
heap
page read and write
1CE4CD5A000
heap
page read and write
35B1000
heap
page read and write
1910000
direct allocation
page execute and read and write
2340000
heap
page read and write
519E000
stack
page read and write
3C2E000
trusted library allocation
page read and write
35B1000
heap
page read and write
246C000
unkown
page read and write
8391000
heap
page read and write
2840000
heap
page read and write
20A0000
unkown
page readonly
15A0000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4CD61000
heap
page read and write
32D2000
heap
page read and write
2950000
trusted library allocation
page read and write
35B1000
heap
page read and write
C2E000
heap
page read and write
35B1000
heap
page read and write
8386000
heap
page read and write
7D1000
unkown
page execute read
1C1000
unkown
page readonly
4E70000
heap
page read and write
35B1000
heap
page read and write
2A10000
unkown
page read and write
29F0000
unkown
page readonly
338D000
heap
page read and write
1CE4E9BE000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
52D0000
heap
page read and write
3550000
trusted library allocation
page read and write
35B1000
heap
page read and write
51B0000
trusted library allocation
page read and write
CAA2000
system
page read and write
35B1000
heap
page read and write
1CE4E510000
heap
page read and write
32C2000
heap
page read and write
35B1000
heap
page read and write
A25000
heap
page read and write
3311000
heap
page read and write
A00000
heap
page read and write
2340000
heap
page read and write
752E000
stack
page read and write
8391000
heap
page read and write
2C4F000
stack
page read and write
11F0000
unkown
page readonly
1CE4E9C4000
trusted library allocation
page read and write
5150000
heap
page read and write
35B1000
heap
page read and write
8391000
heap
page read and write
29D0000
trusted library allocation
page read and write
71C0000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
750000
unkown
page readonly
9F0000
heap
page read and write
4D74000
unclassified section
page execute and read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
B75E000
stack
page read and write
3320000
heap
page read and write
3387000
heap
page read and write
2AC4000
heap
page read and write
35B1000
heap
page read and write
29A0000
trusted library allocation
page read and write
35B1000
heap
page read and write
4FC000
stack
page read and write
35B1000
heap
page read and write
4C90000
unclassified section
page read and write
35B1000
heap
page read and write
5D54000
unkown
page execute and read and write
1AAE000
direct allocation
page execute and read and write
3910000
direct allocation
page execute and read and write
35B1000
heap
page read and write
1360000
heap
page read and write
35B1000
heap
page read and write
55A0000
trusted library allocation
page execute and read and write
5450000
heap
page read and write
FF8000
heap
page read and write
35B1000
heap
page read and write
29F0000
unkown
page readonly
8391000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4CD5F000
heap
page read and write
14C0000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
C6A000
heap
page read and write
83A8000
heap
page read and write
1CE4E800000
trusted library allocation
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
7E7000
unkown
page readonly
282C000
stack
page read and write
6B60000
trusted library allocation
page read and write
558E000
stack
page read and write
35B1000
heap
page read and write
2352000
unkown
page read and write
1CE4E80A000
trusted library allocation
page read and write
AC0000
unkown
page readonly
508000
heap
page read and write
B80000
unkown
page readonly
35B1000
heap
page read and write
8391000
heap
page read and write
73EE000
stack
page read and write
34E2000
unkown
page execute and read and write
7AE8000
trusted library allocation
page read and write
4FC000
stack
page read and write
8391000
heap
page read and write
C91000
unkown
page readonly
C90000
unkown
page readonly
3359000
heap
page read and write
180000
unkown
page readonly
27E000
unkown
page read and write
35B1000
heap
page read and write
13B7000
heap
page read and write
2C50000
unkown
page readonly
35B1000
heap
page read and write
BCD000
trusted library allocation
page execute and read and write
BC9C000
stack
page read and write
1D5F000
stack
page read and write
C28000
heap
page read and write
83C6000
heap
page read and write
35B1000
heap
page read and write
BB4000
trusted library allocation
page read and write
336B000
heap
page read and write
FD0000
unkown
page read and write
35B1000
heap
page read and write
4C8C000
unkown
page read and write
7AC0000
trusted library allocation
page execute and read and write
1BD6000
direct allocation
page execute and read and write
35B1000
heap
page read and write
50F0000
trusted library allocation
page read and write
1A0000
heap
page read and write
35B1000
heap
page read and write
8391000
heap
page read and write
32CD000
heap
page read and write
530E000
heap
page read and write
C0000
unkown
page readonly
BE7000
trusted library allocation
page execute and read and write
32B7000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
83A0000
heap
page read and write
32D3000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
5AB2000
unclassified section
page read and write
33AA000
heap
page read and write
4AFE000
unclassified section
page read and write
C20000
heap
page read and write
3337000
heap
page read and write
35B1000
heap
page read and write
3D7C000
unclassified section
page read and write
35B1000
heap
page read and write
BBD000
trusted library allocation
page execute and read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
83C8000
heap
page read and write
35B1000
heap
page read and write
1100000
heap
page read and write
BA0000
unkown
page readonly
35B1000
heap
page read and write
336B000
heap
page read and write
35B1000
heap
page read and write
3892000
heap
page read and write
3BDD000
direct allocation
page execute and read and write
51C0000
heap
page read and write
BD6000
trusted library allocation
page execute and read and write
3AAE000
direct allocation
page execute and read and write
4FB0000
trusted library section
page readonly
1137000
heap
page read and write
3512000
unkown
page read and write
32CD000
heap
page read and write
BB9C000
stack
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
2A10000
unkown
page read and write
74EF000
stack
page read and write
3164000
heap
page read and write
1CE4CD3F000
heap
page read and write
35B1000
heap
page read and write
3095000
heap
page read and write
35B1000
heap
page read and write
1CE4E9A9000
trusted library allocation
page read and write
720B000
heap
page read and write
1120000
trusted library allocation
page read and write
29EE000
stack
page read and write
262C000
unkown
page read and write
35B1000
heap
page read and write
1E0000
unkown
page read and write
B0000
unkown
page readonly
1BDD000
direct allocation
page execute and read and write
500000
heap
page read and write
1D0000
heap
page read and write
181E000
stack
page read and write
C0000
unkown
page readonly
35B1000
heap
page read and write
AC0000
unkown
page readonly
1B0000
unkown
page read and write
384E000
stack
page read and write
8391000
heap
page read and write
35B1000
heap
page read and write
1CE4CD4C000
heap
page read and write
BB3000
trusted library allocation
page execute and read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
335E000
heap
page read and write
496C000
unclassified section
page read and write
2F74000
unclassified section
page execute and read and write
35B1000
heap
page read and write
508000
heap
page read and write
1CE4CC00000
heap
page read and write
BB0000
heap
page read and write
35B1000
heap
page read and write
790000
unkown
page read and write
35B1000
heap
page read and write
7DE000
unkown
page readonly
71B0000
heap
page read and write
900000
unkown
page readonly
3311000
heap
page read and write
83D6000
heap
page read and write
3B5A000
unkown
page read and write
8380000
trusted library allocation
page read and write
8391000
heap
page read and write
1CE4E80F000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
338D000
heap
page read and write
35B1000
heap
page read and write
2AC0000
heap
page read and write
B7E000
stack
page read and write
339F000
heap
page read and write
3A31000
trusted library allocation
page read and write
1A0000
heap
page read and write
32C9000
heap
page read and write
297D000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
332A000
heap
page read and write
76B0000
trusted library section
page read and write
789F000
stack
page read and write
4E80000
trusted library allocation
page execute and read and write
770000
unkown
page read and write
8391000
heap
page read and write
8391000
heap
page read and write
1A3D000
direct allocation
page execute and read and write
2AC0000
heap
page read and write
35B1000
heap
page read and write
BFE000
stack
page read and write
8DAF000
stack
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
4954000
unkown
page execute and read and write
8391000
heap
page read and write
190000
unkown
page readonly
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4E900000
trusted library allocation
page read and write
B80000
unkown
page readonly
4374000
unclassified section
page execute and read and write
CDD000
heap
page read and write
4FB4000
unclassified section
page read and write
1CE4E700000
trusted library allocation
page read and write
32C2000
heap
page read and write
1830000
direct allocation
page read and write
3316000
heap
page read and write
35B1000
heap
page read and write
2352000
unkown
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
B90000
heap
page read and write
35B1000
heap
page read and write
D0000
unkown
page readonly
32C4000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
B3A000
stack
page read and write
B3E000
stack
page read and write
32CD000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
3316000
heap
page read and write
35B0000
heap
page read and write
11EF000
stack
page read and write
35B1000
heap
page read and write
2412000
unkown
page read and write
35B1000
heap
page read and write
8391000
heap
page read and write
BE2000
trusted library allocation
page read and write
294E000
stack
page read and write
35B1000
heap
page read and write
190000
unkown
page readonly
2574000
unclassified section
page execute and read and write
88A000
stack
page read and write
35B1000
heap
page read and write
3164000
heap
page read and write
770000
unkown
page read and write
35B1000
heap
page read and write
32B0000
heap
page read and write
750000
unkown
page readonly
35B1000
heap
page read and write
EF8000
stack
page read and write
3A39000
direct allocation
page execute and read and write
35B1000
heap
page read and write
51C5000
heap
page read and write
BDA000
trusted library allocation
page execute and read and write
6860000
trusted library allocation
page read and write
52E0000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4E640000
trusted library allocation
page read and write
3765000
heap
page read and write
1BC1000
direct allocation
page execute and read and write
3387000
heap
page read and write
7B2E000
stack
page read and write
E1E000
stack
page read and write
8660000
heap
page read and write
39C8000
unkown
page read and write
1CE4E813000
trusted library allocation
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
4AC8000
system
page execute and read and write
35B1000
heap
page read and write
13A7000
heap
page read and write
7D0000
unkown
page readonly
3337000
heap
page read and write
5FA000
unkown
page readonly
3550000
trusted library allocation
page read and write
8490000
trusted library allocation
page read and write
AB0000
unkown
page readonly
8391000
heap
page read and write
7208000
heap
page read and write
70E000
stack
page read and write
8FF000
stack
page read and write
35B1000
heap
page read and write
83C3000
heap
page read and write
35B1000
heap
page read and write
1D0000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
B90000
heap
page read and write
2190000
heap
page read and write
762F000
stack
page read and write
70E000
stack
page read and write
FD0000
unkown
page read and write
BA0000
trusted library allocation
page read and write
388E000
heap
page read and write
71AE000
stack
page read and write
B0000
unkown
page readonly
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
839B000
heap
page read and write
C40000
heap
page read and write
83B6000
heap
page read and write
BB0000
heap
page read and write
2AC4000
heap
page read and write
4FE0000
trusted library allocation
page execute and read and write
987000
stack
page read and write
1CE4E9CE000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
35B1000
heap
page read and write
337C000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4CCF0000
heap
page read and write
AB0000
unkown
page readonly
35B1000
heap
page read and write
A20000
heap
page read and write
4FC0000
heap
page read and write
35B1000
heap
page read and write
3354000
heap
page read and write
51F000
heap
page read and write
D0000
unkown
page readonly
4030FFC000
stack
page read and write
35B1000
heap
page read and write
B70000
unkown
page readonly
3D22000
unclassified section
page read and write
BEB000
trusted library allocation
page execute and read and write
35B1000
heap
page read and write
2190000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
2BA6000
unkown
page read and write
3320000
heap
page read and write
B3A000
stack
page read and write
83AA000
heap
page read and write
3974000
unclassified section
page execute and read and write
47DA000
unclassified section
page read and write
3346000
heap
page read and write
83AD000
heap
page read and write
35B1000
heap
page read and write
2B8E000
trusted library allocation
page read and write
8391000
heap
page read and write
35B1000
heap
page read and write
BD2000
trusted library allocation
page read and write
40317FD000
stack
page read and write
36A4000
unkown
page read and write
31EE000
unkown
page read and write
332A000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
3760000
trusted library allocation
page execute and read and write
262C000
unkown
page read and write
337C000
heap
page read and write
8391000
heap
page read and write
B960000
heap
page read and write
3323000
heap
page read and write
295B000
trusted library allocation
page read and write
2A20000
heap
page execute and read and write
52CD000
stack
page read and write
3270000
heap
page read and write
1CE4E630000
heap
page read and write
3305000
heap
page read and write
35B1000
heap
page read and write
32CD000
heap
page read and write
1CE4CD61000
heap
page read and write
73AE000
stack
page read and write
6B82000
trusted library allocation
page read and write
83CC000
heap
page read and write
3C52000
direct allocation
page execute and read and write
35B1000
heap
page read and write
7D1000
unkown
page execute read
3090000
trusted library allocation
page read and write
4AAF000
system
page execute and read and write
2990000
unkown
page read and write
1581000
unkown
page readonly
35B1000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
4E22000
unclassified section
page read and write
52E9000
heap
page read and write
35A0000
heap
page read and write
E5E000
stack
page read and write
22DC000
unkown
page read and write
BB0000
trusted library allocation
page read and write
296E000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
1D5000
heap
page read and write
FE1000
unkown
page readonly
35B1000
heap
page read and write
7DE000
unkown
page readonly
7D1000
unkown
page execute read
4AD4000
system
page execute and read and write
71D2000
heap
page read and write
E60000
heap
page read and write
1CE4CB10000
system
page execute and read and write
D164000
system
page read and write
35B1000
heap
page read and write
AD0000
unkown
page readonly
725A000
heap
page read and write
29B0000
trusted library allocation
page read and write
1A39000
direct allocation
page execute and read and write
779E000
stack
page read and write
7D0000
unkown
page readonly
35B1000
heap
page read and write
35B1000
heap
page read and write
4AB8000
system
page execute and read and write
35B1000
heap
page read and write
C56000
heap
page read and write
35B1000
heap
page read and write
C63000
heap
page read and write
CD7C000
system
page read and write
1E0000
unkown
page read and write
35B1000
heap
page read and write
2A8F000
trusted library allocation
page read and write
35B1000
heap
page read and write
52D8000
unclassified section
page read and write
35B1000
heap
page read and write
5320000
heap
page read and write
32CD000
heap
page read and write
4B2B000
stack
page read and write
3164000
heap
page read and write
7B7E000
stack
page read and write
35B1000
heap
page read and write
7E5000
unkown
page read and write
B95E000
stack
page read and write
7DE000
unkown
page readonly
2990000
unkown
page read and write
334B000
heap
page read and write
13A0000
heap
page read and write
7E7000
unkown
page readonly
B4B000
stack
page read and write
8390000
heap
page read and write
2344000
heap
page read and write
35B1000
heap
page read and write
32C4000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
1CE4CD39000
heap
page read and write
35B1000
heap
page read and write
2A86000
trusted library allocation
page read and write
40327FE000
stack
page read and write
6BDE000
stack
page read and write
4AD6000
system
page execute and read and write
7E5000
unkown
page read and write
4E92000
trusted library allocation
page read and write
7D1000
unkown
page execute read
35B1000
heap
page read and write
35B1000
heap
page read and write
3382000
heap
page read and write
C00000
trusted library allocation
page read and write
900000
unkown
page readonly
545E000
heap
page read and write
3F3C000
unclassified section
page read and write
35B1000
heap
page read and write
83A5000
heap
page read and write
860E000
stack
page read and write
1820000
heap
page read and write
3323000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
4324000
unclassified section
page read and write
29A5000
trusted library allocation
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
2344000
heap
page read and write
1CE4E818000
trusted library allocation
page read and write
35B1000
heap
page read and write
FF0000
heap
page read and write
1CE4E901000
trusted library allocation
page read and write
35B1000
heap
page read and write
3C62000
unclassified section
page read and write
51A0000
trusted library allocation
page read and write
35B1000
heap
page read and write
1011000
heap
page read and write
13A000
stack
page read and write
1370000
heap
page read and write
7750000
trusted library allocation
page read and write
4B2B000
system
page execute and read and write
EFC000
stack
page read and write
F90000
heap
page read and write
170000
unkown
page readonly
4E90000
trusted library allocation
page read and write
8FF000
stack
page read and write
2B40000
heap
page read and write
7AE0000
trusted library allocation
page read and write
CB62000
system
page read and write
3323000
heap
page read and write
32CD000
heap
page read and write
BC0000
trusted library allocation
page read and write
16DE000
stack
page read and write
35B1000
heap
page read and write
332A000
heap
page read and write
35B1000
heap
page read and write
AD0000
unkown
page readonly
8391000
heap
page read and write
780000
unkown
page read and write
8391000
heap
page read and write
3337000
heap
page read and write
1C58000
direct allocation
page execute and read and write
4FD0000
heap
page read and write
35B1000
heap
page read and write
1B0000
unkown
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
7E5000
unkown
page read and write
3382000
heap
page read and write
3554000
unkown
page execute and read and write
83BD000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
8391000
heap
page read and write
8E7E000
stack
page read and write
BA0000
unkown
page readonly
3E7E000
unkown
page read and write
35B1000
heap
page read and write
41A2000
unkown
page read and write
8391000
heap
page read and write
3380000
unkown
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
7E7000
unkown
page readonly
578E000
unclassified section
page read and write
4FF0000
heap
page read and write
500000
heap
page read and write
326F000
stack
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
FFC000
stack
page read and write
2990000
trusted library allocation
page read and write
8391000
heap
page read and write
35B1000
heap
page read and write
7E5000
unkown
page read and write
3BE1000
direct allocation
page execute and read and write
35BD000
heap
page read and write
3354000
heap
page read and write
35B1000
heap
page read and write
35B1000
heap
page read and write
8391000
heap
page read and write
4031FFE000
stack
page read and write
3F54000
unkown
page execute and read and write
7E7000
unkown
page readonly
35B1000
heap
page read and write
339F000
heap
page read and write
35B1000
heap
page read and write
3550000
trusted library allocation
page read and write
There are 708 hidden memdumps, click here to show them.