IOC Report
Due Payment Invoice PISS2024993.exe

loading gif

Files

File Path
Type
Category
Malicious
Due Payment Invoice PISS2024993.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Due Payment Invoice PISS2024993.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\56Q8T4H
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Due Payment Invoice PISS2024993.exe
"C:\Users\user\Desktop\Due Payment Invoice PISS2024993.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Program Files (x86)\OJGHJXIyqEapPJjZGDfDlJeZArmxOoMlvpiiNmPZKvAMTUnY\cJjnESPXORw.exe
"C:\Program Files (x86)\OJGHJXIyqEapPJjZGDfDlJeZArmxOoMlvpiiNmPZKvAMTUnY\cJjnESPXORw.exe"
malicious
C:\Windows\SysWOW64\xcopy.exe
"C:\Windows\SysWOW64\xcopy.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.mireela.pro/mdol/?pZxtux=IBR/N437Xoj/lvQ/yaypF1iCxq0JhxtvQ9XvO2IN6lbwsaKUqIYSoc7J5DfSIcjVFUNu75pY4qnkQs5YcPPLlBdqXD3XopUqxrOy0G+yXtR7yOmR4k+PDTzACkBBVYCXxA==&C6=EXkTb
69.57.163.227
https://duckduckgo.com/ac/?q=
unknown
http://www.mjmegartravel.online/t2sm/?pZxtux=94IeUqPLX3ZZBpOBWJjj6w05jpTx/xHCK3bXujG3CQTlZUuHvWSdywBNDw0UN7LA9SFuNcoJQf79ZomCfHkQBPJfdTEUnKSwwNjbiieOsGOn8kHnIz1RgyTaVPNwwy1Row==&C6=EXkTb
76.223.67.189
http://www.energyparks.net/24sh/
3.33.130.190
http://tempuri.org/DataSet1.xsd
unknown
https://www.shintow.net/ow7i/?pZxtux=D6NwXqVIZVbqudPbukfKSXslB0cDplrj7EaXwER037qfX6kPuWmDYfQvQA/Ze
unknown
http://www.shintow.net/ow7i/
142.250.185.115
http://www.shintow.net/ow7i/?pZxtux=D6NwXqVIZVbqudPbukfKSXslB0cDplrj7EaXwER037qfX6kPuWmDYfQvQA/Ze+QTmkPK0wpsgEVRbQCYLV+GBPPQtbW1nqz4pZ5COE7r30blXJdgErW3TYP6jwHTnZcx3A==&C6=EXkTb
142.250.185.115
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://meanttobebroken.org/zdt7/?pZxtux=OdyTsfpKOp
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.theawareness.shop/df5c/
172.67.177.220
https://www.ecosia.org/newtab/
unknown
http://www.energyparks.net/24sh/?pZxtux=M41UUGwRPTDcYYp7NjzFchXqTu9ohCG2hnX9QOYTWHvuC0V13uvlBW/8MUrXzawQyQAEaeslrtJdAUXUhjCRxVhWrTu2Hm15Y+EHLS69Aj11G8IhKuKDs0JHRlg0rr8yhA==&C6=EXkTb
3.33.130.190
http://www.ak711ka10.lat/o5z9/
154.23.181.7
http://estrela-b.online/62tt/?C6=EXkTb&pZxtux=2eR3StT9zNfU5ywUIZ2bgc3wtAC6ZBxlVhDhLCkeE
unknown
http://www.ila.beauty/qq33/?pZxtux=i6Dk+UJVjxglEXs09Tl/1hzZ7yI7sWOV9FpOihhS4ziFAzHmIjfzFnYav8OQcpUvdMfWm2GXI1cxWM9gtNVnhTwiButew2EOfjMP80SRQHDkyyZg6sD1yMmsAnC5II4onw==&C6=EXkTb
13.248.169.48
http://www.meanttobebroken.org/zdt7/
141.193.213.11
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.mireela.pro/mdol/
69.57.163.227
http://www.micrhyms.info/uao9/?pZxtux=gsMVmNPJ8N9SSsJhvzgfzwwjqe07CXl0sVKqNnzNMDh6tN9OUV5g1ZhKr/MfkgGiHAPXbKUUpWb7OZdwItOAW4YYmA3iTr55JhOSegfIcMD9E8fUPg/eNtps2xYGlBIlpg==&C6=EXkTb
3.33.130.190
http://www.mjmegartravel.online/t2sm/
76.223.67.189
http://www.estrela-b.online/62tt/
162.241.63.77
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.ak711ka10.lat/o5z9/?pZxtux=z11/8LNw/ilOmRo5iVplmq9QJ2/sY6O9S3jiPj8IKRvMXjps+f+3QxK4x8TDiA3fpLYwxgH4NhA45modVvBwao6NdyacUH38gYwDUqZfGQ230ajUqn4GEmUCWVLyRw7Now==&C6=EXkTb
154.23.181.7
http://www.ak711ka10.lat
unknown
http://www.meanttobebroken.org/zdt7/?pZxtux=OdyTsfpKOp+FbfSBk3rtAPX6yl42tFHs0o0DPQC5l8EmE472eTQ0FDkunmNaJXsoU4tZbjlt6ORfso7icAjAvSN+KGdO51cWhvQZ2fU2V4w5zpyWN4cvAtWl9PkRGGXA+g==&C6=EXkTb
141.193.213.11
http://www.theawareness.shop/df5c/?pZxtux=iTGQ2f3/8wLaRYQP0xZx681X5jLmVFU/oLVVEoegdR+OVsnqcEQj6iurR8BAvDospkEZVkGP6nTG7c6sAiwUrDOAfXxLGlgGaAd3CytgAtbKInIGuq2UlXDJcOT7zCeYfw==&C6=EXkTb
172.67.177.220
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.micrhyms.info/uao9/
3.33.130.190
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.ila.beauty
13.248.169.48
estrela-b.online
162.241.63.77
www.ak711ka10.lat
154.23.181.7
www.meanttobebroken.org
141.193.213.11
mjmegartravel.online
76.223.67.189
www.theawareness.shop
172.67.177.220
www.mireela.pro
69.57.163.227
ghs.googlehosted.com
142.250.185.115
micrhyms.info
3.33.130.190
energyparks.net
3.33.130.190
www.micrhyms.info
unknown
www.mjmegartravel.online
unknown
www.estrela-b.online
unknown
www.energyparks.net
unknown
www.shintow.net
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
154.23.181.7
www.ak711ka10.lat
United States
141.193.213.11
www.meanttobebroken.org
United States
13.248.169.48
www.ila.beauty
United States
69.57.163.227
www.mireela.pro
United States
76.223.67.189
mjmegartravel.online
United States
162.241.63.77
estrela-b.online
United States
172.67.177.220
www.theawareness.shop
United States
3.33.130.190
micrhyms.info
United States
142.250.185.115
ghs.googlehosted.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3070000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2800000
system
page execute and read and write
malicious
1ED0000
unclassified section
page execute and read and write
malicious
2BE0000
trusted library allocation
page read and write
malicious
F50000
unclassified section
page execute and read and write
malicious
2B90000
trusted library allocation
page read and write
malicious
1460000
trusted library allocation
page read and write
19893FE000
stack
page read and write
7B3C000
heap
page read and write
5F0000
unkown
page readonly
1420000
trusted library allocation
page read and write
820000
heap
page read and write
3290000
trusted library allocation
page execute and read and write
15CA000
heap
page read and write
2C51000
heap
page read and write
93DE000
stack
page read and write
2A2D000
heap
page read and write
5880000
heap
page read and write
1A10B5C4000
trusted library allocation
page read and write
9150000
heap
page read and write
2C51000
heap
page read and write
6341000
system
page execute and read and write
1A1098B3000
heap
page read and write
328D000
direct allocation
page execute and read and write
2C51000
heap
page read and write
5E20000
trusted library section
page read and write
2C51000
heap
page read and write
B17000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2AA1000
heap
page read and write
2F39000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
5A50000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
29BE000
heap
page read and write
2C51000
heap
page read and write
2A66000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
58D0000
trusted library allocation
page read and write
646C000
unkown
page read and write
2C51000
heap
page read and write
74F0000
heap
page read and write
5883000
heap
page read and write
62EA000
system
page execute and read and write
4214000
system
page read and write
58E0000
trusted library allocation
page execute and read and write
5D8E000
stack
page read and write
91A4000
heap
page read and write
2C51000
heap
page read and write
766D000
stack
page read and write
7A3A000
heap
page read and write
1A10B421000
trusted library allocation
page read and write
198A3FE000
stack
page read and write
2C51000
heap
page read and write
9F0000
heap
page read and write
7B04000
heap
page read and write
1480000
trusted library allocation
page read and write
29CD000
heap
page read and write
18C5000
trusted library allocation
page read and write
29CA000
heap
page read and write
2FAA000
heap
page read and write
825E000
stack
page read and write
9E000
unkown
page readonly
2EB0000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2A8C000
heap
page read and write
1443000
trusted library allocation
page read and write
5830000
trusted library allocation
page execute and read and write
2590000
unkown
page read and write
1A10B403000
trusted library allocation
page read and write
181E000
stack
page read and write
1A10B5BE000
trusted library allocation
page read and write
2C51000
heap
page read and write
1A109700000
system
page execute and read and write
2C51000
heap
page read and write
AB0000
unkown
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
1A10B300000
trusted library allocation
page read and write
3486000
unkown
page execute and read and write
B57000
heap
page read and write
14A0000
heap
page read and write
58B0000
heap
page read and write
2C51000
heap
page read and write
3291000
direct allocation
page execute and read and write
2C51000
heap
page read and write
4B86000
trusted library allocation
page read and write
25E4000
heap
page read and write
5BC000
stack
page read and write
3CF8000
unclassified section
page read and write
2C51000
heap
page read and write
820000
heap
page read and write
4BA000
stack
page read and write
2C51000
heap
page read and write
62DE000
system
page execute and read and write
1434000
trusted library allocation
page read and write
485C000
system
page read and write
127D000
direct allocation
page execute and read and write
9A0000
heap
page read and write
29C4000
heap
page read and write
7B22000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2A2D000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
AAF000
stack
page read and write
2C51000
heap
page read and write
587B000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
55B000
stack
page read and write
AFE000
heap
page read and write
2A86000
heap
page read and write
7AE0000
heap
page read and write
6260000
system
page execute and read and write
7B18000
heap
page read and write
29BE000
heap
page read and write
2C51000
heap
page read and write
4B47000
trusted library allocation
page read and write
2C51000
heap
page read and write
2660000
heap
page read and write
30EE000
trusted library allocation
page read and write
E4F000
stack
page read and write
2358000
unclassified section
page execute and read and write
991E000
stack
page read and write
332D000
trusted library allocation
page read and write
7B5B000
heap
page read and write
C2FE000
stack
page read and write
951000
unkown
page readonly
1520000
heap
page read and write
2C51000
heap
page read and write
7B56000
heap
page read and write
2C51000
heap
page read and write
4340000
unclassified section
page read and write
2C40000
heap
page read and write
2F6E000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
5900000
heap
page execute and read and write
F4F000
stack
page read and write
829F000
stack
page read and write
440000
unkown
page readonly
2A23000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
6000000
trusted library allocation
page read and write
99E000
stack
page read and write
1A1098B0000
heap
page read and write
6428000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
AFA000
heap
page read and write
4BA000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
9752000
system
page read and write
979E000
stack
page read and write
94E000
stack
page read and write
9D1E000
stack
page read and write
1A10978D000
system
page execute and read and write
2A3A000
heap
page read and write
2C51000
heap
page read and write
3B52000
system
page read and write
2C51000
heap
page read and write
25E0000
heap
page read and write
FB0000
direct allocation
page execute and read and write
1A10B410000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
29C1000
heap
page read and write
18E0000
heap
page read and write
1A109840000
heap
page read and write
44D2000
unclassified section
page read and write
2C51000
heap
page read and write
98A0000
trusted library allocation
page read and write
2A7C000
heap
page read and write
6400000
heap
page read and write
2C51000
heap
page read and write
29D0000
heap
page read and write
32C0000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
58F0000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
1467000
trusted library allocation
page execute and read and write
9B1D000
stack
page read and write
4D12000
system
page read and write
7B12000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
2C51000
heap
page read and write
2A15000
heap
page read and write
2C51000
heap
page read and write
900000
unkown
page read and write
2C51000
heap
page read and write
12F8000
direct allocation
page execute and read and write
32E0000
heap
page execute and read and write
B29000
heap
page read and write
29D0000
heap
page read and write
161C000
heap
page read and write
2C51000
heap
page read and write
2A15000
heap
page read and write
25E4000
heap
page read and write
989E000
stack
page read and write
2C51000
heap
page read and write
30FD000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
14EE000
stack
page read and write
2C51000
heap
page read and write
5BD0000
trusted library allocation
page execute and read and write
7A2A000
heap
page read and write
25A0000
unkown
page read and write
1A10B130000
heap
page read and write
15CE000
heap
page read and write
2C51000
heap
page read and write
7B65000
heap
page read and write
AF0000
heap
page read and write
2C51000
heap
page read and write
2A53000
heap
page read and write
1A10B200000
heap
page read and write
30F6000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
B18000
unkown
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
A7000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
2580000
unkown
page read and write
AFE000
heap
page read and write
2C51000
heap
page read and write
42F1000
trusted library allocation
page read and write
AD0000
direct allocation
page read and write
1490000
trusted library allocation
page execute and read and write
262C000
unkown
page read and write
2C51000
heap
page read and write
1560000
heap
page read and write
2A3A000
heap
page read and write
2A49000
heap
page read and write
7B28000
heap
page read and write
2C51000
heap
page read and write
2A23000
heap
page read and write
7AD0000
trusted library allocation
page read and write
800000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
62CE000
system
page execute and read and write
2C51000
heap
page read and write
9E000
unkown
page readonly
58C0000
trusted library allocation
page read and write
13C0000
heap
page read and write
B50000
heap
page read and write
2660000
heap
page read and write
91000
unkown
page execute read
2C51000
heap
page read and write
2C51000
heap
page read and write
2D50000
trusted library allocation
page read and write
42F9000
trusted library allocation
page read and write
2C51000
heap
page read and write
AD0000
unkown
page readonly
DA0000
unkown
page readonly
2A19000
heap
page read and write
2C51000
heap
page read and write
2670000
unkown
page execute and read and write
2B70000
trusted library allocation
page read and write
2C51000
heap
page read and write
5F0000
unkown
page readonly
14F0000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
1A10B417000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
BF0000
unkown
page readonly
41AE000
unclassified section
page read and write
29CB000
heap
page read and write
1A10B414000
trusted library allocation
page read and write
5BE0000
heap
page read and write
810000
unkown
page readonly
18E7000
heap
page read and write
74FE000
heap
page read and write
2FC0000
direct allocation
page execute and read and write
AD0000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
4B27000
trusted library allocation
page read and write
2490000
unkown
page readonly
3160000
heap
page read and write
2944000
heap
page read and write
AFA000
heap
page read and write
2C51000
heap
page read and write
171E000
stack
page read and write
152E000
heap
page read and write
7B46000
heap
page read and write
29CA000
heap
page read and write
1A10B210000
trusted library allocation
page read and write
2C51000
heap
page read and write
98D0000
trusted library allocation
page execute and read and write
A5000
unkown
page read and write
2C51000
heap
page read and write
C50000
heap
page read and write
FE7000
stack
page read and write
7AE6000
heap
page read and write
2A3E000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
1430000
trusted library allocation
page read and write
2C51000
heap
page read and write
1250000
heap
page read and write
A7000
unkown
page readonly
10D9000
direct allocation
page execute and read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
29C6000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2EB0000
trusted library allocation
page read and write
1988BFC000
stack
page read and write
3120000
trusted library allocation
page read and write
1547000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
43A6000
system
page read and write
2A27000
heap
page read and write
2C51000
heap
page read and write
9EE000
stack
page read and write
2C51000
heap
page read and write
34F8000
unkown
page execute and read and write
2C51000
heap
page read and write
1A1098AC000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
2C50000
heap
page read and write
29B0000
heap
page read and write
146B000
trusted library allocation
page execute and read and write
3312000
unclassified section
page read and write
2C51000
heap
page read and write
2E0C000
heap
page read and write
1A109880000
heap
page read and write
900000
unkown
page read and write
63F0000
heap
page read and write
1433000
trusted library allocation
page execute and read and write
30CB000
stack
page read and write
18BD000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2E00000
trusted library allocation
page execute and read and write
5BC000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
3B66000
unclassified section
page read and write
3170000
heap
page read and write
2C51000
heap
page read and write
1A10B5CE000
trusted library allocation
page read and write
14D0000
unclassified section
page execute and read and write
2C51000
heap
page read and write
5EC000
stack
page read and write
2C51000
heap
page read and write
137E000
stack
page read and write
94DF000
stack
page read and write
25E0000
heap
page read and write
1081000
unkown
page readonly
2C51000
heap
page read and write
1562000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
EEA000
stack
page read and write
2490000
unkown
page readonly
1261000
direct allocation
page execute and read and write
1450000
trusted library allocation
page read and write
53EC000
stack
page read and write
3C12000
system
page read and write
327F000
stack
page read and write
2944000
heap
page read and write
2C51000
heap
page read and write
C1BD000
stack
page read and write
9692000
system
page read and write
8FB000
stack
page read and write
2C51000
heap
page read and write
1830000
trusted library allocation
page read and write
2A82000
heap
page read and write
2C51000
heap
page read and write
1452000
trusted library allocation
page read and write
114E000
direct allocation
page execute and read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
9A5000
heap
page read and write
1820000
trusted library allocation
page execute and read and write
58A0000
heap
page read and write
2F2D000
stack
page read and write
1330000
heap
page read and write
1A10B500000
trusted library allocation
page read and write
10DD000
direct allocation
page execute and read and write
1A10B400000
trusted library allocation
page read and write
1A10978A000
system
page execute and read and write
2C51000
heap
page read and write
7AEB000
heap
page read and write
430000
unkown
page readonly
BC7B000
trusted library allocation
page read and write
2C51000
heap
page read and write
1604000
heap
page read and write
2A59000
heap
page read and write
46CA000
system
page read and write
2C51000
heap
page read and write
1500000
trusted library allocation
page read and write
9C1E000
stack
page read and write
BF0000
unkown
page readonly
2C51000
heap
page read and write
62ED000
system
page execute and read and write
2B70000
heap
page read and write
2990000
heap
page read and write
1A1098B3000
heap
page read and write
30D0000
trusted library allocation
page read and write
2C51000
heap
page read and write
32F1000
trusted library allocation
page read and write
342C000
unclassified section
page read and write
187E000
stack
page read and write
7620000
trusted library allocation
page read and write
401C000
unclassified section
page read and write
1A10988A000
heap
page read and write
2EB0000
trusted library allocation
page read and write
2C51000
heap
page read and write
5BE5000
heap
page read and write
1A10B5B1000
trusted library allocation
page read and write
4538000
system
page read and write
39D4000
unclassified section
page read and write
4EA4000
system
page read and write
2C51000
heap
page read and write
1989BFF000
stack
page read and write
15D2000
heap
page read and write
91000
unkown
page execute read
2C51000
heap
page read and write
2C51000
heap
page read and write
2944000
heap
page read and write
2C51000
heap
page read and write
30E9000
direct allocation
page execute and read and write
2C51000
heap
page read and write
711000
unkown
page read and write
2C51000
heap
page read and write
2580000
unkown
page read and write
1A10B210000
trusted library allocation
page read and write
7AF5000
heap
page read and write
7AF0000
heap
page read and write
450000
unkown
page readonly
C1FD000
stack
page read and write
7AEE000
heap
page read and write
2C51000
heap
page read and write
5890000
trusted library section
page readonly
145A000
trusted library allocation
page execute and read and write
1456000
trusted library allocation
page execute and read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
450000
unkown
page readonly
2C51000
heap
page read and write
7B1E000
heap
page read and write
965E000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2A43000
heap
page read and write
91C2000
heap
page read and write
430000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
29CA000
heap
page read and write
DA2000
unkown
page readonly
90000
unkown
page readonly
2C51000
heap
page read and write
5730000
heap
page read and write
30ED000
direct allocation
page execute and read and write
98B0000
trusted library allocation
page read and write
3C6C000
system
page read and write
22E6000
unclassified section
page execute and read and write
1A10B40A000
trusted library allocation
page read and write
29C4000
heap
page read and write
2C51000
heap
page read and write
9D54000
system
page read and write
6420000
heap
page read and write
2C51000
heap
page read and write
13C5000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
29D5000
heap
page read and write
2C51000
heap
page read and write
33D2000
unclassified section
page read and write
2C51000
heap
page read and write
90000
unkown
page readonly
2A50000
heap
page read and write
1276000
direct allocation
page execute and read and write
29B8000
heap
page read and write
2940000
heap
page read and write
4664000
unclassified section
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
7B62000
heap
page read and write
2C51000
heap
page read and write
1462000
trusted library allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
15DE000
heap
page read and write
7B52000
heap
page read and write
1081000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
7970000
trusted library section
page read and write
18C0000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
143D000
trusted library allocation
page execute and read and write
951E000
stack
page read and write
2C51000
heap
page read and write
2A27000
heap
page read and write
3584000
trusted library allocation
page read and write
13BE000
stack
page read and write
2C51000
heap
page read and write
49EE000
system
page read and write
440000
unkown
page readonly
C0BD000
stack
page read and write
1A10989C000
heap
page read and write
2C51000
heap
page read and write
1554000
heap
page read and write
2860000
heap
page read and write
32A0000
trusted library allocation
page read and write
1A10B40E000
trusted library allocation
page read and write
2C51000
heap
page read and write
18D0000
trusted library allocation
page read and write
99E000
stack
page read and write
2F35000
heap
page read and write
2C51000
heap
page read and write
1510000
trusted library allocation
page read and write
2C51000
heap
page read and write
29CA000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
3E8A000
unclassified section
page read and write
800000
unkown
page readonly
2C51000
heap
page read and write
950000
heap
page read and write
9A0000
heap
page read and write
4B80000
system
page read and write
2C51000
heap
page read and write
A5000
unkown
page read and write
30DB000
trusted library allocation
page read and write
2C51000
heap
page read and write
29CA000
heap
page read and write
EEF000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
3302000
direct allocation
page execute and read and write
2C51000
heap
page read and write
2A19000
heap
page read and write
29CB000
heap
page read and write
29CA000
heap
page read and write
1A109820000
heap
page read and write
7B4C000
heap
page read and write
951000
unkown
page readonly
2C51000
heap
page read and write
1A10B501000
trusted library allocation
page read and write
810000
unkown
page readonly
30F1000
trusted library allocation
page read and write
2C51000
heap
page read and write
29BB000
heap
page read and write
2C51000
heap
page read and write
29C4000
heap
page read and write
AF0000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
14C0000
heap
page read and write
2D74000
heap
page read and write
2C51000
heap
page read and write
598000
stack
page read and write
2C51000
heap
page read and write
AB0000
unkown
page read and write
2C51000
heap
page read and write
7AF8000
heap
page read and write
7D50000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
915B000
heap
page read and write
97AC000
system
page read and write
2C51000
heap
page read and write
961E000
stack
page read and write
2C51000
heap
page read and write
13E0000
heap
page read and write
315E000
direct allocation
page execute and read and write
975E000
stack
page read and write
9A1E000
stack
page read and write
9A0000
heap
page read and write
There are 600 hidden memdumps, click here to show them.