IOC Report
INVOICES.exe

loading gif

Files

File Path
Type
Category
Malicious
INVOICES.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Temp\27-180b5
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\aut9E9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\sticket
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INVOICES.exe
"C:\Users\user\Desktop\INVOICES.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\INVOICES.exe"
malicious
C:\Program Files (x86)\OFtyZipvaoDSZWmBUsqGFRTWDyGOJtFBZOTWXZxUYCoQWHLDIwMNvCJLSZCxJBUIefvvKSYLE\XORjEgwNIUb.exe
"C:\Program Files (x86)\OFtyZipvaoDSZWmBUsqGFRTWDyGOJtFBZOTWXZxUYCoQWHLDIwMNvCJLSZCxJBUIefvvKSYLE\XORjEgwNIUb.exe"
malicious
C:\Windows\SysWOW64\AtBroker.exe
"C:\Windows\SysWOW64\AtBroker.exe"
malicious
C:\Program Files (x86)\OFtyZipvaoDSZWmBUsqGFRTWDyGOJtFBZOTWXZxUYCoQWHLDIwMNvCJLSZCxJBUIefvvKSYLE\XORjEgwNIUb.exe
"C:\Program Files (x86)\OFtyZipvaoDSZWmBUsqGFRTWDyGOJtFBZOTWXZxUYCoQWHLDIwMNvCJLSZCxJBUIefvvKSYLE\XORjEgwNIUb.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.nutrigenfit.online/uye5/
195.110.124.133
http://www.nutrigenfit.online/uye5/?mRR=Vxudf0fHzLw84n3P&edD=75F1ULhw6FwEjpnDA0ShEFdlFdwdGFO+6cO+diyrF+sYFY6hrAWtaaFZiFMruwmlEHMkL4DDBtvLLE4rNUa6rOrOasIwOIgL2b+vXbiOxUsIxCPoWDvEXykJs0FHlhf94g==
195.110.124.133
https://duckduckgo.com/ac/?q=
unknown
https://reg.ru
unknown
http://www.premium303max.rest/4sq5/
45.79.252.94
http://www.broork.sbs/mivl/?edD=NCBdkbAo51Pk6OQCOHBLNPGGoFWb7jFDRfsqOlllsQkjLkqguOrgRg1KSY2RNLpxIpBa/WYuubaTkbJsfRdnK6r1gpJDlK+mMheAcqBYNXKJFvncR+Lje3KwNZ7V3SHyOg==&mRR=Vxudf0fHzLw84n3P
163.44.176.12
http://www.plyvik.info/ak8m/
67.223.117.142
http://www.gold-rates.online/026w/
199.59.243.227
https://www.reg.ru/domain/new/?utm_source=www.dpo-medicina.online&utm_medium=parking&utm_campaign=s_
unknown
http://www.dpo-medicina.online/hzvv/?mRR=Vxudf0fHzLw84n3P&edD=rORncVVdvgzWlpxqVdy6wyOp/+Tf7AwoM18MThSKdmZP0ohcmrwEBuX8zFjiIhpadHd1pz5OrNzpltMAb4bxQj9ydLcasKlfpoifhU3jpBZMJYPNfPfapl2Jiho/Qt0KOg==
194.58.112.174
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.2925588.com/1t94/
103.71.154.12
http://www.adsdomain-195.click/xene/?mRR=Vxudf0fHzLw84n3P&edD=oQfmtMAR504qWoEoIiuXkIZ390sDtx871CN+h8gaaxvvjR4IOOhM8LL7s1MwTzNJoD6YjSoePunXYwEMUYhUEvd3KGx73JHR40wuRl04yT55myu+mdIWD34OfxSC3JH3Pw==
199.59.243.227
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://premium303max.rest/4sq5/?edD=auinYk/N7fzuxFx7OuKPDQsKV8iAhIfXxmAc
unknown
https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-
unknown
https://www.ecosia.org/newtab/
unknown
http://www.treatyourownhip.online/pq4g/?mRR=Vxudf0fHzLw84n3P&edD=/x7ZrZ76GI+PVQICx+fJsRsDfPwUjqoVDZRMpFR2TevR7yRDJNTVJQ5a4wLIxcipLtxsrpwhId74rtIBLdbLD5OWdqbGxCnsQwRTx3/JOzhGR6ZHHmQh6NCPA8f1t14f7g==
81.169.145.95
http://www.bulbulun.net/taxt/
95.216.25.89
https://www.reg.ru/dedicated/?utm_source=www.dpo-medicina.online&utm_medium=parking&utm_campaign=s_l
unknown
http://www.adsdomain-195.click/xene/
199.59.243.227
http://www.broork.sbs/mivl/
163.44.176.12
http://www.premium303max.rest/4sq5/?edD=auinYk/N7fzuxFx7OuKPDQsKV8iAhIfXxmAc+9FVGd08SK7om5hBOw/tR9MrAyioRLaXqFIVFqwDeVrkz6gRFEBF2GjT/+1q0RocL006XFUWck2TAJQGogQWHAk4IwcjPQ==&mRR=Vxudf0fHzLw84n3P
45.79.252.94
http://www.2q33e.top/phwy/
38.47.233.52
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://www.loginov.enterprises/b8ns/
3.33.130.190
http://www.tangible.online
unknown
http://www.68529.xyz/2su7/
107.163.130.253
https://www.reg.ru/whois/?check=&dname=www.dpo-medicina.online&reg_source=parking_auto
unknown
https://www.reg.ru/hosting/?utm_source=www.dpo-medicina.online&utm_medium=parking&utm_campaign=s_lan
unknown
http://www.tangible.online/5byq/
13.248.169.48
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.2925588.com/1t94/?edD=gjMIJwSCW/9UgfmDC9v9JuEAXY9+Tk/wxiwa2AwzMfTndCXl3IsTOH3xQbqTIzs3KmqJPz6XjFO/L3LQlwMgjZ5WYlhZ6IbItanfVRefUclVTIAe/3x+VFj+y2sVXiouoQ==&mRR=Vxudf0fHzLw84n3P
103.71.154.12
http://www.loginov.enterprises/b8ns/?edD=AHsT2lQM7afkvhgrd3a+ObbJ1OaVFxW6qPC56vyLY+r/hbqOgzan0xtCN8OL4Bj/PuszXJHvjvqxiuIPtsWv0tAUFBubyxcqdahqlM3D7pXLIOqGlrWJuLpzoNBd4O/a7Q==&mRR=Vxudf0fHzLw84n3P
3.33.130.190
https://www.reg.ru/sozdanie-saita/
unknown
http://www.treatyourownhip.online/pq4g/
81.169.145.95
http://www.68529.xyz/2su7/?edD=pamwepkWr5FhGLIp9e9dE5wxTwNKoV0OitnUuyON/V0YdhH090qorkisWAKc74xRI1QLgpFLJyIK92bUXzceQHZBiR72PVsC64CKK1bLyHz9EtZqc0FSRzmTtcqhmMmMlg==&mRR=Vxudf0fHzLw84n3P
107.163.130.253
http://www.smithsmobilewash.net/trf9/
3.33.130.190
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://parking.reg.ru/script/get_domain_data?domain_name=www.dpo-medicina.online&rand=
unknown
http://www.plyvik.info/ak8m/?edD=rnlDhCsdJ2ooBNmRxWrIjnPAthAEmDTBnoEBgto8r48ZfNeG/PnUuRGB6UxkEvrVIavN7L12K9gGymeMzCPkQjaYFwN3T3JuEHWt+eu64/V1Op0q2QF2dqSePIe0BpSPtA==&mRR=Vxudf0fHzLw84n3P
67.223.117.142
http://www.bulbulun.net/taxt/?edD=r1Iubw6Wh8IGmXw0YJVaMoRCD3peRXEmz6ievL1zkHtXMQX/g3sK5IHJ6rQ7ggOc23QC6zmWJBnuHS8GGugfDzOdB1VYvGABqxLnspqtMyj1CdMgVpHhi3ZxRPJaa26iDA==&mRR=Vxudf0fHzLw84n3P
95.216.25.89
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.68529.xyz
107.163.130.253
malicious
2q33e.top
38.47.233.52
treatyourownhip.online
81.169.145.95
loginov.enterprises
3.33.130.190
www.bulbulun.net
95.216.25.89
www.tangible.online
13.248.169.48
www.gold-rates.online
199.59.243.227
www.broork.sbs
163.44.176.12
nutrigenfit.online
195.110.124.133
www.dpo-medicina.online
194.58.112.174
www.premium303max.rest
45.79.252.94
www.2925588.com
103.71.154.12
www.plyvik.info
67.223.117.142
smithsmobilewash.net
3.33.130.190
www.adsdomain-195.click
199.59.243.227
www.treatyourownhip.online
unknown
www.loginov.enterprises
unknown
www.smithsmobilewash.net
unknown
www.2q33e.top
unknown
www.nutrigenfit.online
unknown
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
107.163.130.253
www.68529.xyz
United States
malicious
163.44.176.12
www.broork.sbs
Japan
13.248.169.48
www.tangible.online
United States
38.47.233.52
2q33e.top
United States
199.59.243.227
www.gold-rates.online
United States
103.71.154.12
www.2925588.com
Hong Kong
67.223.117.142
www.plyvik.info
United States
45.79.252.94
www.premium303max.rest
United States
81.169.145.95
treatyourownhip.online
Germany
195.110.124.133
nutrigenfit.online
Italy
95.216.25.89
www.bulbulun.net
Germany
194.58.112.174
www.dpo-medicina.online
Russian Federation
3.33.130.190
loginov.enterprises
United States
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D60000
trusted library allocation
page read and write
malicious
340000
system
page execute and read and write
malicious
27F0000
unkown
page execute and read and write
malicious
930000
trusted library allocation
page read and write
malicious
3C00000
unclassified section
page execute and read and write
malicious
3490000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
E01000
heap
page read and write
55E1000
system
page execute and read and write
E01000
heap
page read and write
3DD0000
unkown
page read and write
A50000
heap
page read and write
E01000
heap
page read and write
B20000
heap
page read and write
4286000
unkown
page read and write
4430000
trusted library allocation
page execute and read and write
3440000
direct allocation
page read and write
E01000
heap
page read and write
3BBE000
direct allocation
page read and write
7EE000
unkown
page execute and read and write
E01000
heap
page read and write
B65000
unkown
page read and write
EFC000
stack
page read and write
E01000
heap
page read and write
120C000
heap
page read and write
F3E000
stack
page read and write
E01000
heap
page read and write
B67000
unkown
page readonly
2E02000
heap
page read and write
4AC4000
unclassified section
page execute and read and write
24428401000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
1240000
heap
page read and write
FCF000
stack
page read and write
244284BE000
trusted library allocation
page read and write
115C000
heap
page read and write
B00000
unkown
page readonly
BBE000
stack
page read and write
2E13000
heap
page read and write
2C00000
unkown
page readonly
E01000
heap
page read and write
FFD000
stack
page read and write
5428000
unclassified section
page read and write
3880000
direct allocation
page read and write
B10000
unkown
page readonly
45E0000
trusted library allocation
page read and write
799000
heap
page read and write
124A000
heap
page read and write
244268BE000
heap
page read and write
D00000
heap
page read and write
77D000
heap
page read and write
3D0000
heap
page read and write
730000
unkown
page readonly
2442663A000
system
page execute and read and write
16D1000
unkown
page readonly
A10000
unkown
page read and write
7E4000
unkown
page execute and read and write
E01000
heap
page read and write
1096000
heap
page read and write
E01000
heap
page read and write
4554000
heap
page read and write
79C000
heap
page read and write
E01000
heap
page read and write
731000
unkown
page execute and read and write
85C000
unkown
page execute and write copy
C7F000
stack
page read and write
119F000
stack
page read and write
2E13000
heap
page read and write
B5E000
unkown
page readonly
3B4D000
direct allocation
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
39A3000
direct allocation
page read and write
E01000
heap
page read and write
3000000
heap
page read and write
63DC000
unclassified section
page read and write
B67000
unkown
page readonly
114F000
heap
page read and write
E01000
heap
page read and write
3B4D000
direct allocation
page read and write
3B49000
direct allocation
page read and write
85D000
unkown
page read and write
E01000
heap
page read and write
B51000
unkown
page execute read
E01000
heap
page read and write
5B0000
heap
page read and write
7F5000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
D00000
heap
page read and write
3C0000
heap
page read and write
4385000
heap
page read and write
2E13000
heap
page read and write
244268D5000
heap
page read and write
E01000
heap
page read and write
3B4D000
direct allocation
page read and write
720000
heap
page read and write
3BBE000
direct allocation
page read and write
E01000
heap
page read and write
1CAE000
stack
page read and write
3C3E000
unkown
page read and write
E01000
heap
page read and write
115B000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
3005000
heap
page read and write
244284A9000
trusted library allocation
page read and write
980000
unkown
page readonly
E01000
heap
page read and write
E00000
heap
page read and write
3B49000
direct allocation
page read and write
B5E000
unkown
page readonly
656E000
unclassified section
page read and write
1000000
direct allocation
page read and write
754000
heap
page read and write
3323000
heap
page read and write
5C0000
heap
page read and write
4508000
heap
page read and write
372D000
direct allocation
page execute and read and write
E01000
heap
page read and write
E01000
heap
page read and write
10E7000
heap
page read and write
727000
heap
page read and write
93C000
stack
page read and write
B5E000
unkown
page readonly
48CE000
unkown
page read and write
456E000
heap
page read and write
4506000
heap
page read and write
115B000
heap
page read and write
E01000
heap
page read and write
244268D2000
heap
page read and write
83A000
stack
page read and write
3B49000
direct allocation
page read and write
2E13000
heap
page read and write
E01000
heap
page read and write
1240000
heap
page read and write
DEE000
stack
page read and write
3A20000
direct allocation
page read and write
124E000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
1090000
heap
page read and write
121B000
heap
page read and write
E01000
heap
page read and write
4B02000
unclassified section
page read and write
9A0000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
D2B000
unkown
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
466B000
heap
page read and write
B51000
unkown
page execute read
45F6000
heap
page read and write
E01000
heap
page read and write
9F0000
unkown
page read and write
24428080000
trusted library allocation
page read and write
807000
unkown
page execute and write copy
A30000
unkown
page readonly
244268A7000
heap
page read and write
26F0000
heap
page read and write
7F2E000
stack
page read and write
B50000
unkown
page readonly
980000
trusted library allocation
page read and write
990000
unkown
page readonly
B30000
unkown
page read and write
10E4000
heap
page read and write
32FF000
stack
page read and write
E01000
heap
page read and write
2E13000
heap
page read and write
46F0000
direct allocation
page execute and read and write
3B4D000
direct allocation
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
B41000
unkown
page readonly
3529000
heap
page read and write
E01000
heap
page read and write
453F000
heap
page read and write
36B4000
unkown
page execute and read and write
10EC000
heap
page read and write
738000
heap
page read and write
453E000
heap
page read and write
B65000
unkown
page read and write
453A000
heap
page read and write
E01000
heap
page read and write
114C000
heap
page read and write
789000
heap
page read and write
4573000
heap
page read and write
E01000
heap
page read and write
3400000
heap
page read and write
E01000
heap
page read and write
457C000
heap
page read and write
244268A0000
heap
page read and write
E01000
heap
page read and write
7AF000
heap
page read and write
E01000
heap
page read and write
24428080000
trusted library allocation
page read and write
3B49000
direct allocation
page read and write
10E3000
heap
page read and write
58DE000
unclassified section
page read and write
26F0000
heap
page read and write
E01000
heap
page read and write
2700000
unkown
page readonly
E9933FE000
stack
page read and write
67F000
stack
page read and write
743000
heap
page read and write
3017000
heap
page read and write
D04000
heap
page read and write
743000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
39A3000
direct allocation
page read and write
E01000
heap
page read and write
49C1000
direct allocation
page execute and read and write
24428321000
trusted library allocation
page read and write
E01000
heap
page read and write
2CA0000
heap
page read and write
5D0000
unkown
page readonly
E01000
heap
page read and write
26AF000
stack
page read and write
730000
unkown
page readonly
ABA000
stack
page read and write
39A3000
direct allocation
page read and write
E01000
heap
page read and write
85D000
unkown
page write copy
E01000
heap
page read and write
301A000
heap
page read and write
E01000
heap
page read and write
2CB4000
unkown
page execute and read and write
E01000
heap
page read and write
743000
heap
page read and write
7FB000
unkown
page execute and read and write
2700000
unkown
page readonly
B20000
heap
page read and write
450B000
heap
page read and write
B30000
unkown
page read and write
E01000
heap
page read and write
117B000
heap
page read and write
3600000
direct allocation
page execute and read and write
244267B0000
heap
page read and write
5D0000
unkown
page readonly
244268B1000
heap
page read and write
7A2000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
788000
heap
page read and write
1010000
unkown
page read and write
AF0000
unkown
page readonly
26C34000
system
page read and write
5B0000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
970000
heap
page read and write
4579000
heap
page read and write
26632000
system
page read and write
A01000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
743000
heap
page read and write
119F000
stack
page read and write
2BF0000
heap
page read and write
9A0000
heap
page read and write
3AAC000
unkown
page read and write
D18000
heap
page read and write
A50000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
4D1C000
unclassified section
page read and write
3490000
direct allocation
page read and write
2D90000
direct allocation
page read and write
3019000
heap
page read and write
2E13000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
749000
heap
page read and write
29DC000
stack
page read and write
4B5C000
unclassified section
page read and write
E01000
heap
page read and write
970000
unkown
page readonly
244265E0000
system
page execute and read and write
3880000
direct allocation
page read and write
E9923FB000
stack
page read and write
4577000
heap
page read and write
44A8000
heap
page read and write
E01000
heap
page read and write
3BBE000
direct allocation
page read and write
5C0000
unkown
page readonly
2D90000
heap
page read and write
2DCE000
stack
page read and write
910000
heap
page read and write
7FB000
heap
page read and write
D51000
unkown
page read and write
2E00000
heap
page read and write
2E13000
heap
page read and write
A40000
unkown
page readonly
3880000
direct allocation
page read and write
4380000
trusted library allocation
page read and write
E01000
heap
page read and write
A10000
unkown
page read and write
D10000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
244268CD000
heap
page read and write
73A000
heap
page read and write
93C000
stack
page read and write
4052000
unclassified section
page execute and read and write
38CD000
direct allocation
page execute and read and write
3880000
direct allocation
page read and write
D50000
unkown
page read and write
2DB000
stack
page read and write
49BD000
direct allocation
page execute and read and write
B51000
unkown
page execute read
379E000
direct allocation
page execute and read and write
E01000
heap
page read and write
60B8000
unclassified section
page read and write
799000
heap
page read and write
307C000
unkown
page read and write
2C42000
unkown
page execute and read and write
3880000
direct allocation
page read and write
44E1000
heap
page read and write
B65000
unkown
page read and write
E01000
heap
page read and write
3880000
direct allocation
page read and write
4667000
heap
page read and write
44FC000
heap
page read and write
E01000
heap
page read and write
B65000
unkown
page read and write
3B4D000
direct allocation
page read and write
45FB000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
10EC000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
B50000
unkown
page readonly
AF0000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
3A20000
direct allocation
page read and write
E01000
heap
page read and write
4501000
heap
page read and write
E01000
heap
page read and write
5A70000
unclassified section
page read and write
24428080000
trusted library allocation
page read and write
2D94000
heap
page read and write
B30000
unkown
page read and write
71E000
stack
page read and write
46DC000
heap
page read and write
D04000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
556E000
system
page execute and read and write
E01000
heap
page read and write
EFC000
stack
page read and write
2E13000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
7C3000
heap
page read and write
3012000
heap
page read and write
980000
unkown
page readonly
3BBE000
direct allocation
page read and write
720000
heap
page read and write
970000
unkown
page readonly
456A000
heap
page read and write
3A20000
direct allocation
page read and write
E01000
heap
page read and write
55BA000
unclassified section
page read and write
4A42000
unclassified section
page read and write
974000
heap
page read and write
2E13000
heap
page read and write
3200000
heap
page read and write
E01000
heap
page read and write
40C4000
unclassified section
page execute and read and write
244284CE000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
1269000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
2E62000
unkown
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
3490000
direct allocation
page read and write
3729000
direct allocation
page execute and read and write
E01000
heap
page read and write
54B0000
system
page execute and read and write
FBF000
stack
page read and write
2EBC000
unkown
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
2442830E000
trusted library allocation
page read and write
114F000
heap
page read and write
333E000
stack
page read and write
738000
heap
page read and write
FF0000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
930000
heap
page read and write
7CE000
heap
page read and write
A30000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
24428200000
trusted library allocation
page read and write
B50000
unkown
page readonly
B50000
unkown
page readonly
6A0000
heap
page read and write
E01000
heap
page read and write
7BD000
heap
page read and write
A50000
unkown
page readonly
318000
stack
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
40F4000
unkown
page read and write
63E000
stack
page read and write
E01000
heap
page read and write
1010000
unkown
page read and write
E01000
heap
page read and write
3BBE000
direct allocation
page read and write
558D000
system
page execute and read and write
5B0000
unkown
page readonly
6A4000
heap
page read and write
39A3000
direct allocation
page read and write
4535000
heap
page read and write
5C0000
unkown
page readonly
FD0000
unkown
page read and write
E01000
heap
page read and write
980000
trusted library allocation
page read and write
7D4000
heap
page read and write
E01000
heap
page read and write
749000
heap
page read and write
7AF000
heap
page read and write
1340000
unkown
page readonly
B51000
unkown
page execute read
2E13000
heap
page read and write
6A4000
heap
page read and write
244268A9000
heap
page read and write
B00000
unkown
page readonly
35F6000
unkown
page read and write
990000
unkown
page readonly
1203000
heap
page read and write
4418000
unkown
page read and write
E01000
heap
page read and write
452F000
heap
page read and write
359E000
heap
page read and write
B67000
unkown
page readonly
303E000
heap
page read and write
E01000
heap
page read and write
800000
heap
page read and write
E01000
heap
page read and write
3A20000
direct allocation
page read and write
D10000
heap
page read and write
3017000
heap
page read and write
E01000
heap
page read and write
11A1000
unkown
page readonly
488E000
direct allocation
page execute and read and write
E01000
heap
page read and write
7710000
trusted library allocation
page read and write
3942000
direct allocation
page execute and read and write
FF0000
unkown
page readonly
E01000
heap
page read and write
930000
trusted library allocation
page read and write
2DA2000
unkown
page read and write
79C000
heap
page read and write
2E13000
heap
page read and write
244267F0000
heap
page read and write
680000
heap
page read and write
2E13000
heap
page read and write
10B8000
heap
page read and write
B10000
unkown
page readonly
16D0000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
2C00000
unkown
page readonly
1090000
heap
page read and write
E01000
heap
page read and write
7E1000
heap
page read and write
A30000
unkown
page readonly
45AA000
unkown
page read and write
124A000
heap
page read and write
2BF0000
heap
page read and write
BFE000
stack
page read and write
1340000
unkown
page readonly
E01000
heap
page read and write
39A3000
direct allocation
page read and write
2E13000
heap
page read and write
455D000
heap
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
4564000
heap
page read and write
5296000
unclassified section
page read and write
B41000
unkown
page readonly
E01000
heap
page read and write
6A4000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
39A3000
direct allocation
page read and write
2C3A000
stack
page read and write
352D000
heap
page read and write
E01000
heap
page read and write
E992BFE000
stack
page read and write
11D7000
heap
page read and write
3BBE000
direct allocation
page read and write
1020000
unkown
page read and write
856000
unkown
page execute and read and write
481D000
direct allocation
page execute and read and write
11A0000
unkown
page readonly
244266D0000
heap
page read and write
307C000
unkown
page read and write
788000
heap
page read and write
E01000
heap
page read and write
ABA000
stack
page read and write
E10000
unkown
page readonly
3005000
heap
page read and write
302B000
heap
page read and write
E01000
heap
page read and write
3A20000
direct allocation
page read and write
E01000
heap
page read and write
115B000
heap
page read and write
E10000
unkown
page readonly
E01000
heap
page read and write
A50000
heap
page read and write
A30000
unkown
page readonly
E01000
heap
page read and write
E01000
heap
page read and write
78E000
heap
page read and write
3464000
unkown
page read and write
301B000
heap
page read and write
E01000
heap
page read and write
3B49000
direct allocation
page read and write
24428303000
trusted library allocation
page read and write
4A32000
direct allocation
page execute and read and write
2C50000
heap
page read and write
114C000
heap
page read and write
A01000
unkown
page readonly
3788000
unkown
page read and write
2DA2000
unkown
page read and write
2684C000
system
page read and write
18AD000
stack
page read and write
9EE000
stack
page read and write
B30000
unkown
page read and write
9C0000
heap
page read and write
2E13000
heap
page read and write
56EC000
unkown
page read and write
574C000
unclassified section
page read and write
44F3000
heap
page read and write
2BDF000
stack
page read and write
2D80000
heap
page read and write
E01000
heap
page read and write
D4E000
unkown
page read and write
E01000
heap
page read and write
2E13000
heap
page read and write
83A000
stack
page read and write
E01000
heap
page read and write
303E000
heap
page read and write
E01000
heap
page read and write
806000
heap
page read and write
108C000
unkown
page read and write
549000
stack
page read and write
5C02000
unclassified section
page read and write
E01000
heap
page read and write
24428311000
trusted library allocation
page read and write
3A20000
direct allocation
page read and write
451A000
heap
page read and write
E01000
heap
page read and write
24428300000
trusted library allocation
page read and write
743000
heap
page read and write
3B4D000
direct allocation
page read and write
BBE000
stack
page read and write
B5E000
unkown
page readonly
E01000
heap
page read and write
2E13000
heap
page read and write
450E000
heap
page read and write
2C70000
heap
page read and write
3101000
heap
page read and write
558A000
system
page execute and read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
26572000
system
page read and write
E01000
heap
page read and write
6DE000
stack
page read and write
473C000
unkown
page read and write
38D1000
direct allocation
page execute and read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
CBE000
stack
page read and write
D93000
unkown
page read and write
E01000
heap
page read and write
3A01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
FDB000
stack
page read and write
E01000
heap
page read and write
5D94000
unclassified section
page read and write
343F000
stack
page read and write
E01000
heap
page read and write
1030000
unkown
page read and write
7F6F000
stack
page read and write
A40000
unkown
page readonly
73A000
heap
page read and write
E01000
heap
page read and write
2D90000
heap
page read and write
E01000
heap
page read and write
624A000
unclassified section
page read and write
3F62000
unkown
page read and write
1204000
heap
page read and write
E01000
heap
page read and write
B67000
unkown
page readonly
2D94000
heap
page read and write
E01000
heap
page read and write
D18000
heap
page read and write
244281D0000
heap
page read and write
E01000
heap
page read and write
557E000
system
page execute and read and write
391A000
unkown
page read and write
775000
heap
page read and write
743000
heap
page read and write
FD0000
unkown
page read and write
980000
trusted library allocation
page read and write
E993BFF000
stack
page read and write
3B49000
direct allocation
page read and write
2668C000
system
page read and write
9F0000
unkown
page read and write
5F26000
unclassified section
page read and write
10B0000
heap
page read and write
7CB000
heap
page read and write
E01000
heap
page read and write
24428314000
trusted library allocation
page read and write
73F000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
7A2000
heap
page read and write
940000
direct allocation
page execute and read and write
E01000
heap
page read and write
244284C4000
trusted library allocation
page read and write
5104000
unclassified section
page read and write
E01000
heap
page read and write
124E000
heap
page read and write
4819000
direct allocation
page execute and read and write
There are 649 hidden memdumps, click here to show them.