IOC Report
payments.exe

loading gif

Files

File Path
Type
Category
Malicious
payments.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\72Z53078
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\aut32B9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\carryover
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\payments.exe
"C:\Users\user\Desktop\payments.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\payments.exe"
malicious
C:\Program Files (x86)\vStUfGvKGwoXegmVEyxLwjOSQAnKWmLuLzHsczaMjNPFreMZJuPixoX\XhwUfLdILQipZF.exe
"C:\Program Files (x86)\vStUfGvKGwoXegmVEyxLwjOSQAnKWmLuLzHsczaMjNPFreMZJuPixoX\XhwUfLdILQipZF.exe"
malicious
C:\Windows\SysWOW64\pcaui.exe
"C:\Windows\SysWOW64\pcaui.exe"
malicious
C:\Program Files (x86)\vStUfGvKGwoXegmVEyxLwjOSQAnKWmLuLzHsczaMjNPFreMZJuPixoX\XhwUfLdILQipZF.exe
"C:\Program Files (x86)\vStUfGvKGwoXegmVEyxLwjOSQAnKWmLuLzHsczaMjNPFreMZJuPixoX\XhwUfLdILQipZF.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
unknown
https://dts.gnpge.com
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.3kw40881107247y.click/6wln/
172.67.192.207
http://i3.cdn-image.com/__media__/pics/28903/search.png)
unknown
https://cdn.consentmanager.net
unknown
http://www.matteicapital.online/Funds.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1SZmvSimxwvd
unknown
http://www.questmatch.pro/z3ox/
104.21.62.184
http://www.54248711.xyz/jm2l/?PBk=f4VDN8Bp14IhbV&bBw=M21ir/NSFfGrmB4z/u+JMR/HgMrfgTX4RaXyCSFwSSwtaZs5yH0UEptpPba+9Px3pipv0aZDZRRy+Xo/jJmyg51Tr+0rPqFG3CUyYWI31hnfzG2FIQ==
161.97.142.144
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.70kdd.top/klhq/?bBw=AHY/rhT5FAaHaOQwqTnzrcskZO2I+4brO2rEekNoUo4JX0G52JlH+4AuLBXgGUSDwTLgniL6s02sZcl+Gf8+ja3Sv08AkNNTw70A3KyR0Ra9u58Xeg==&PBk=f4VDN8Bp14IhbV
38.47.232.124
https://www.bt.cn/?from=404
unknown
http://www.smartcongress.net/11t3/
146.88.233.115
http://www.rtpterbaruwaktu3.xyz/7yx4/?bBw=m5A4fx9ZIvMjycGMPfzrz9w2buYwlryi7dKiWry0Mz65334dxjvJlwP/oWrLHd67Yf3RW+voxQmVQwC1SSJQb1jyxz6bPKG1jNO+cUySHxdHc2K5rg==&PBk=f4VDN8Bp14IhbV
103.21.221.87
https://www.google.com
unknown
http://www.gogawithme.live/6gtt/?bBw=SGA0vAB7ljjiJZBksJb1gqec1i3dMNjZK6uCbLTCC3HP5ur0cn6Abe6/hzp/g4dh4YOAUYGeqr6sPYYs6bnbepy0TXn/sNBWKXnk+HntNHa0bIYL3g==&PBk=f4VDN8Bp14IhbV
209.74.77.109
http://www.smartcongress.net/11t3/?bBw=BoXQYlgPFtFW2+QaEcN/9vg3Pg7HxeD9OGXhxFZv9pg5w5kxRGgY33EbCKURTw9NMXrcECQepab13HCWL013w88VAS70Y9JS73ZjbBY8NXuVWXuwPQ==&PBk=f4VDN8Bp14IhbV
146.88.233.115
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
unknown
http://i3.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
unknown
http://www.matteicapital.online/Capital.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1SZmvSimxw
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
unknown
http://www.bser101pp.buzz/crrp/?bBw=upjfZKq4/ZGfoF/T3gRqvMsDposBEsbCPxdbSO05fQ4zSiP5+UGAxJqZOtAYqZWCOef+BeM6z+3JdRqWgtx/gAtazJHp7Z7XNdyJQnSFd8YmyBfIfQ==&PBk=f4VDN8Bp14IhbV
104.21.58.90
http://www.ytsd88.top/egqi/?bBw=b73RclDzsQx9LNfVP0mvFBo4qCNcPXUUZl7U/15lM3StUAJAIINJCW5I+z7gQYXdXqIUVixe3UGJ61mgF9Q8lot5wYlOl469WmdukWuN3NsqkmPJjQ==&PBk=f4VDN8Bp14IhbV
47.76.213.197
http://www.ampsamkok88.shop/huvt/?bBw=yxXU4HpAbhaf+OkoYuih9i/g9QEw7HNYYa9VbkZ8i0eD7fFgPye8gqdK566WGP/XcS8CMkxomySFTtdD4uVPcijKU85s4sBliMM2+p3cutSfMcIpXQ==&PBk=f4VDN8Bp14IhbV
172.67.209.48
http://www.matteicapital.online/Home_Equity_Rates.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
unknown
https://delivery.consentmanager.net
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
unknown
http://i3.cdn-image.com/__media__/pics/29590/bg1.png)
unknown
http://www.mrpokrovskii.pro/2pji/
194.85.61.76
http://www.matteicapital.online/hyyd/?PBk=f4VDN8Bp14IhbV&bBw=fqlLWWUWU+rKW3EBskUV6SGgNRnmDoU2hpWkksgzCQayp6WkBROPj8SoyGxHGehCRFG0wA/ATtWP72Uz33qX3VjmPRmhRH/ifjHqvJrHFSE8BVe6vQ==
208.91.197.27
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
unknown
http://www.70kdd.top/klhq/
38.47.232.124
http://www.matteicapital.online/Interest.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1SZmvSimx
unknown
http://www.bser101pp.buzz/crrp/
104.21.58.90
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
unknown
http://www.acond-22-mvr.click/w9z4/
199.59.243.227
http://www.llljjjiii.shop/rsvy/
8.210.114.150
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://i3.cdn-image.com/__media__/pics/28905/arrrow.png)
unknown
http://www.llljjjiii.shop/rsvy/?bBw=r8TqL8lVmKhCyKg91gAe8j+3yCz/CgsH+3nLHstVk9be2gQWJEXa9NKMMz87e0tjGxvoPEvy6SLnfdtsmt5rQpb0mRwFlkiYxCOBwbKBY/Wtalppug==&PBk=f4VDN8Bp14IhbV
8.210.114.150
http://www.canadavinreport.site/cvhb/?bBw=eb9ahS5GFYDOhq0JOiIrfnQwKg301mZRXDTXF/EDnGWOAiF9jJHx
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
unknown
https://www.ecosia.org/newtab/
unknown
http://i3.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
unknown
http://www.matteicapital.online/__media__/js/trademark.php?d=matteicapital.online&type=ns
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.ampsamkok88.shop/huvt/
172.67.209.48
http://i3.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
unknown
http://www.matteicapital.online/Angel_Investors.cfm?fp=rc9%2BBG3aoUzorBCa6%2F7nT8%2F3WEhQ2jcM0%2BP1S
unknown
http://i3.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
unknown
http://www.3kw40881107247y.click
unknown
http://www.gogawithme.live/6gtt/
209.74.77.109
http://www.ytsd88.top/egqi/
47.76.213.197
http://www.questmatch.pro/z3ox/?bBw=XRVN9XS8GrL3N+/sXJw1nASfMdlrVHj65QayKB69AEGBKWegVMYG7P4Sa4h2i8A2rJx8M9mN63brSxfD4lNhUirL/6ZuF4cRwiIE0+ehkyVFqeLMeg==&PBk=f4VDN8Bp14IhbV
104.21.62.184
http://www.canadavinreport.site/cvhb/?bBw=eb9ahS5GFYDOhq0JOiIrfnQwKg301mZRXDTXF/EDnGWOAiF9jJHx+uvzEaHIq78+HHS43fAza3sJA+7AAuSew4ovcqpU8EMNhqKZYp0bCjlC2qCkSQ==&PBk=f4VDN8Bp14IhbV
185.27.134.206
http://i3.cdn-image.com/__media__/js/min.js?v2.3
unknown
http://www.Matteicapital.online
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.canadavinreport.site/cvhb/
185.27.134.206
http://www.mrpokrovskii.pro/2pji/?bBw=67iA4TPPdQ9nErotgeyL+Ya2EPxYwBsEvI1Cgt9ewFwChBdA65DXjWpTSdFtRBveCaF8GV/HBCb4pJoPY3YT82t+6t4M73z602ZXRfzEt+UzcIaSeg==&PBk=f4VDN8Bp14IhbV
194.85.61.76
http://www.54248711.xyz/jm2l/
161.97.142.144
http://www.matteicapital.online/__media__/design/underconstructionnotice.php?d=matteicapital.online
unknown
http://www.matteicapital.online/hyyd/
208.91.197.27
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.54248711.xyz
161.97.142.144
malicious
rtpterbaruwaktu3.xyz
103.21.221.87
malicious
www.rtpterbaruwaktu3.xyz
unknown
malicious
www.llljjjiii.shop
8.210.114.150
www.ampsamkok88.shop
172.67.209.48
s-part-0035.t-0009.t-msedge.net
13.107.246.63
www.gogawithme.live
209.74.77.109
www.canadavinreport.site
185.27.134.206
www.3kw40881107247y.click
172.67.192.207
www.questmatch.pro
104.21.62.184
www.acond-22-mvr.click
199.59.243.227
www.mrpokrovskii.pro
194.85.61.76
smartcongress.net
146.88.233.115
www.matteicapital.online
208.91.197.27
70kdd.top
38.47.232.124
www.bser101pp.buzz
104.21.58.90
www.ytsd88.top
47.76.213.197
www.70kdd.top
unknown
www.smartcongress.net
unknown
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
161.97.142.144
www.54248711.xyz
United States
malicious
103.21.221.87
rtpterbaruwaktu3.xyz
unknown
malicious
209.74.77.109
www.gogawithme.live
United States
146.88.233.115
smartcongress.net
France
8.210.114.150
www.llljjjiii.shop
Singapore
104.21.58.90
www.bser101pp.buzz
United States
199.59.243.227
www.acond-22-mvr.click
United States
208.91.197.27
www.matteicapital.online
Virgin Islands (BRITISH)
104.21.62.184
www.questmatch.pro
United States
38.47.232.124
70kdd.top
United States
172.67.192.207
www.3kw40881107247y.click
United States
47.76.213.197
www.ytsd88.top
United States
185.27.134.206
www.canadavinreport.site
United Kingdom
194.85.61.76
www.mrpokrovskii.pro
Russian Federation
172.67.209.48
www.ampsamkok88.shop
United States
There are 5 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
43C0000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
5620000
system
page execute and read and write
malicious
26A0000
system
page execute and read and write
malicious
4370000
trusted library allocation
page read and write
malicious
4800000
unclassified section
page execute and read and write
malicious
3710000
unkown
page execute and read and write
malicious
3620000
unclassified section
page execute and read and write
malicious
5F0000
heap
page read and write
4251000
heap
page read and write
3580000
direct allocation
page read and write
12C0000
unkown
page readonly
39D1000
direct allocation
page execute and read and write
22F31700000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
EB6000
heap
page read and write
4251000
heap
page read and write
5727000
system
page execute and read and write
3A10000
direct allocation
page read and write
5DF6000
unclassified section
page read and write
4251000
heap
page read and write
DA0000
unkown
page readonly
118A000
heap
page read and write
3700000
direct allocation
page execute and read and write
56D3000
system
page execute and read and write
292E000
heap
page read and write
4251000
heap
page read and write
333E000
stack
page read and write
2B8B000
stack
page read and write
5C64000
unclassified section
page read and write
D15000
unkown
page read and write
4251000
heap
page read and write
357F000
stack
page read and write
58BC000
unkown
page read and write
7638000
heap
page read and write
2B5F000
stack
page read and write
DFE000
stack
page read and write
7668000
heap
page read and write
4570000
trusted library allocation
page read and write
39C0000
direct allocation
page read and write
52F8000
unclassified section
page read and write
E54000
heap
page read and write
C70000
unkown
page read and write
56D0000
system
page execute and read and write
7686000
heap
page read and write
D01000
unkown
page execute read
4251000
heap
page read and write
22F315A0000
heap
page read and write
D54000
unkown
page readonly
3000000
heap
page read and write
22F31801000
trusted library allocation
page read and write
16C1000
unkown
page readonly
76AD000
heap
page read and write
4251000
heap
page read and write
37D0000
direct allocation
page read and write
2678000
stack
page read and write
4251000
heap
page read and write
FA6000
heap
page read and write
10AF000
heap
page read and write
BF0000
unkown
page readonly
28B8000
heap
page read and write
1280000
heap
page read and write
3B5E000
direct allocation
page read and write
2C20000
unkown
page readonly
76B3000
heap
page read and write
471A000
unkown
page read and write
AAA000
stack
page read and write
1110000
unkown
page read and write
22F2FC03000
heap
page read and write
4251000
heap
page read and write
298E000
heap
page read and write
643E000
unclassified section
page read and write
4251000
heap
page read and write
1110000
unkown
page read and write
3AED000
direct allocation
page read and write
CF0000
unkown
page readonly
3870000
direct allocation
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
3B39000
direct allocation
page read and write
4251000
heap
page read and write
5C829FB000
stack
page read and write
4251000
heap
page read and write
C90000
unkown
page read and write
4251000
heap
page read and write
22F31711000
trusted library allocation
page read and write
4251000
heap
page read and write
2BF4000
heap
page read and write
4251000
heap
page read and write
11BD000
heap
page read and write
4251000
heap
page read and write
26F4000
heap
page read and write
4251000
heap
page read and write
39C0000
direct allocation
page read and write
304D000
heap
page read and write
2992000
heap
page read and write
D0E000
unkown
page readonly
762B000
heap
page read and write
4251000
heap
page read and write
22F2FBDA000
heap
page read and write
4912000
unclassified section
page read and write
FA6000
heap
page read and write
4251000
heap
page read and write
2D00000
heap
page read and write
22F2F9D0000
system
page execute and read and write
2D04000
heap
page read and write
BE0000
unkown
page readonly
4251000
heap
page read and write
2E13000
heap
page read and write
28DB000
heap
page read and write
26F4000
heap
page read and write
A20000
unkown
page readonly
2CFE000
stack
page read and write
10AF000
heap
page read and write
C70000
heap
page read and write
F6C000
heap
page read and write
2E13000
heap
page read and write
D00000
unkown
page readonly
4251000
heap
page read and write
31EC000
unkown
page read and write
3005000
heap
page read and write
3300000
direct allocation
page read and write
45C0000
direct allocation
page execute and read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
14BF000
stack
page read and write
2E02000
heap
page read and write
4251000
heap
page read and write
2C10000
heap
page read and write
7672000
heap
page read and write
C81000
unkown
page readonly
103A000
stack
page read and write
1370000
unkown
page read and write
F02000
heap
page read and write
4251000
heap
page read and write
4FD4000
unclassified section
page read and write
22F31600000
trusted library allocation
page read and write
76A5000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
C91000
unkown
page execute read
1160000
unkown
page readonly
3B3D000
direct allocation
page read and write
4251000
heap
page read and write
369E000
heap
page read and write
4251000
heap
page read and write
22F31703000
trusted library allocation
page read and write
1861000
unkown
page readonly
768F000
heap
page read and write
3993000
direct allocation
page read and write
4350000
trusted library allocation
page read and write
5770000
unkown
page read and write
3993000
direct allocation
page read and write
4251000
heap
page read and write
362D000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
76A4000
heap
page read and write
14C0000
unkown
page readonly
4251000
heap
page read and write
4251000
heap
page read and write
22F31721000
trusted library allocation
page read and write
D1D000
unkown
page readonly
2923000
heap
page read and write
4251000
heap
page read and write
2C20000
unkown
page readonly
2FFF4000
system
page read and write
22F2FB50000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
763B000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
10AB000
heap
page read and write
3012000
heap
page read and write
22F2F9CE000
system
page execute and read and write
7631000
heap
page read and write
2E13000
heap
page read and write
C10000
heap
page read and write
3DAE000
unkown
page read and write
7D1E000
stack
page read and write
2F9F2000
system
page read and write
E50000
heap
page read and write
D01000
unkown
page execute read
2E13000
heap
page read and write
4251000
heap
page read and write
2944000
heap
page read and write
DA0000
unkown
page readonly
2951000
heap
page read and write
2E13000
heap
page read and write
35D0000
direct allocation
page read and write
4251000
heap
page read and write
7890000
heap
page read and write
10BD000
heap
page read and write
22F2FB80000
heap
page read and write
4251000
heap
page read and write
5C841FE000
stack
page read and write
561C000
unclassified section
page read and write
4251000
heap
page read and write
28D5000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
4251000
heap
page read and write
16C1000
unkown
page readonly
4251000
heap
page read and write
2C70000
unkown
page read and write
28D0000
heap
page read and write
13BE000
stack
page read and write
4264000
unkown
page read and write
1651000
unkown
page readonly
118E000
heap
page read and write
46ED000
direct allocation
page execute and read and write
2F00000
unkown
page read and write
3870000
direct allocation
page read and write
1861000
unkown
page readonly
440E000
heap
page read and write
22F2FBD0000
heap
page read and write
3101000
heap
page read and write
4438000
unkown
page execute and read and write
3BAE000
direct allocation
page read and write
7D5F000
stack
page read and write
FA6000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
7619000
heap
page read and write
3629000
heap
page read and write
4251000
heap
page read and write
1170000
unkown
page readonly
C00000
heap
page read and write
10AB000
heap
page read and write
C60000
heap
page read and write
4251000
heap
page read and write
D01000
unkown
page execute read
4251000
heap
page read and write
4251000
heap
page read and write
4902000
direct allocation
page execute and read and write
4251000
heap
page read and write
7636000
heap
page read and write
7689000
heap
page read and write
4251000
heap
page read and write
28D5000
heap
page read and write
2E13000
heap
page read and write
5F88000
unclassified section
page read and write
11DB000
unkown
page read and write
3B39000
direct allocation
page read and write
22F2F9A0000
system
page execute and read and write
C10000
heap
page read and write
4250000
heap
page read and write
28D0000
heap
page read and write
D3E000
unkown
page readonly
4251000
heap
page read and write
2A40000
heap
page read and write
5166000
unclassified section
page read and write
4251000
heap
page read and write
44C0000
trusted library allocation
page execute and read and write
763E000
heap
page read and write
4251000
heap
page read and write
3AED000
direct allocation
page read and write
4251000
heap
page read and write
28D1000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
62AC000
unclassified section
page read and write
22F2FA60000
heap
page read and write
389E000
direct allocation
page execute and read and write
3B39000
direct allocation
page read and write
12C0000
unkown
page readonly
2C70000
unkown
page read and write
173E000
stack
page read and write
291E000
heap
page read and write
1290000
heap
page read and write
4251000
heap
page read and write
56AC000
system
page execute and read and write
2D10000
unkown
page execute and read and write
4251000
heap
page read and write
1220000
unkown
page read and write
4251000
heap
page read and write
2D00000
heap
page read and write
76A8000
heap
page read and write
5C839FF000
stack
page read and write
4251000
heap
page read and write
771F000
heap
page read and write
76AB000
heap
page read and write
291E000
heap
page read and write
4251000
heap
page read and write
1B3F000
stack
page read and write
1290000
heap
page read and write
BAC000
stack
page read and write
343F000
stack
page read and write
1651000
unkown
page readonly
4251000
heap
page read and write
D54000
unkown
page readonly
4251000
heap
page read and write
BF0000
unkown
page readonly
3943000
direct allocation
page read and write
4251000
heap
page read and write
28CA000
heap
page read and write
437C000
heap
page read and write
4251000
heap
page read and write
4259000
heap
page read and write
2BF0000
heap
page read and write
1180000
heap
page read and write
2BC0000
heap
page read and write
4BEC000
unclassified section
page read and write
C70000
unkown
page read and write
26F4000
heap
page read and write
DB0000
unkown
page readonly
72E0000
trusted library allocation
page read and write
2E13000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
D0E000
unkown
page readonly
10B8000
heap
page read and write
22F3170A000
trusted library allocation
page read and write
2961000
heap
page read and write
D4A000
unkown
page write copy
22F2FC03000
heap
page read and write
22F2FBEC000
heap
page read and write
BE0000
unkown
page readonly
C90000
unkown
page readonly
28CC000
heap
page read and write
D00000
unkown
page readonly
2E13000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
3210000
heap
page read and write
28B0000
heap
page read and write
4537000
heap
page read and write
382D000
direct allocation
page execute and read and write
4A2C000
unclassified section
page read and write
2937000
heap
page read and write
548A000
unclassified section
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
2F12000
unkown
page read and write
2E0F000
stack
page read and write
D4F000
unkown
page write copy
4251000
heap
page read and write
302B000
heap
page read and write
4251000
heap
page read and write
FA4000
heap
page read and write
4251000
heap
page read and write
2E13000
heap
page read and write
4251000
heap
page read and write
4A3E000
unkown
page read and write
4B28000
unclassified section
page execute and read and write
43F6000
unkown
page read and write
2E13000
heap
page read and write
A40000
unkown
page readonly
11C8000
heap
page read and write
2974000
heap
page read and write
2890000
heap
page read and write
28CC000
heap
page read and write
2E13000
heap
page read and write
3017000
heap
page read and write
BAC000
stack
page read and write
4251000
heap
page read and write
1180000
heap
page read and write
56C4000
system
page execute and read and write
294C000
heap
page read and write
2BF4000
heap
page read and write
2D04000
heap
page read and write
28CA000
heap
page read and write
3A10000
direct allocation
page read and write
295E000
heap
page read and write
7713000
heap
page read and write
4251000
heap
page read and write
3BAE000
direct allocation
page read and write
C00000
unkown
page readonly
4251000
heap
page read and write
EB6000
heap
page read and write
3A42000
direct allocation
page execute and read and write
BFD000
stack
page read and write
2FC0C000
system
page read and write
4251000
heap
page read and write
2E13000
heap
page read and write
4251000
heap
page read and write
22F3170F000
trusted library allocation
page read and write
4251000
heap
page read and write
22F313B0000
trusted library allocation
page read and write
4251000
heap
page read and write
F6C000
heap
page read and write
35D4000
unkown
page read and write
BBB000
stack
page read and write
2BF0000
heap
page read and write
EB6000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
45AC000
heap
page read and write
D1D000
unkown
page readonly
3766000
unkown
page read and write
10AB000
heap
page read and write
4251000
heap
page read and write
113C000
stack
page read and write
4251000
heap
page read and write
2912000
heap
page read and write
4251000
heap
page read and write
302C000
unkown
page read and write
611A000
unclassified section
page read and write
11A9000
heap
page read and write
22F318B4000
trusted library allocation
page read and write
3300000
heap
page read and write
D15000
unkown
page read and write
292E000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
D90000
unkown
page readonly
26F0000
heap
page read and write
4251000
heap
page read and write
3F40000
unkown
page read and write
D00000
unkown
page readonly
4251000
heap
page read and write
4891000
direct allocation
page execute and read and write
2998000
heap
page read and write
347E000
stack
page read and write
4570000
trusted library allocation
page read and write
3B5E000
direct allocation
page read and write
3A10000
direct allocation
page read and write
4251000
heap
page read and write
3E00000
unclassified section
page execute and read and write
E70000
heap
page read and write
2F00000
unkown
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
14C0000
unkown
page readonly
4251000
heap
page read and write
3820000
direct allocation
page read and write
769A000
heap
page read and write
2F932000
system
page read and write
75DE000
stack
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
2C90000
unkown
page readonly
C5E000
stack
page read and write
2967000
heap
page read and write
76AD000
heap
page read and write
2907000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
3820000
direct allocation
page read and write
475E000
direct allocation
page execute and read and write
288F000
stack
page read and write
4251000
heap
page read and write
2C10000
heap
page read and write
CF0000
unkown
page readonly
759E000
stack
page read and write
A30000
unkown
page readonly
3943000
direct allocation
page read and write
4251000
heap
page read and write
D15000
unkown
page read and write
2931000
heap
page read and write
4251000
heap
page read and write
1280000
heap
page read and write
A40000
unkown
page readonly
4251000
heap
page read and write
306F000
heap
page read and write
2E10000
unkown
page readonly
28D5000
heap
page read and write
304D000
heap
page read and write
38F8000
unkown
page read and write
A30000
unkown
page readonly
4251000
heap
page read and write
C81000
unkown
page readonly
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4588000
unkown
page read and write
57AE000
unclassified section
page read and write
5940000
unclassified section
page read and write
3C1C000
unkown
page read and write
D01000
unkown
page execute read
3005000
heap
page read and write
2C90000
unkown
page readonly
57BC000
unkown
page read and write
D00000
unkown
page readonly
4251000
heap
page read and write
3024000
heap
page read and write
3A8A000
unkown
page read and write
7623000
heap
page read and write
D0E000
unkown
page readonly
2931000
heap
page read and write
3870000
direct allocation
page read and write
4251000
heap
page read and write
D0E000
unkown
page readonly
764A000
heap
page read and write
FA4000
heap
page read and write
4251000
heap
page read and write
D3E000
unkown
page readonly
488D000
direct allocation
page execute and read and write
D15000
unkown
page read and write
2E13000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
453B000
heap
page read and write
2957000
heap
page read and write
C00000
unkown
page readonly
28DB000
heap
page read and write
3017000
heap
page read and write
C60000
heap
page read and write
3829000
direct allocation
page execute and read and write
4251000
heap
page read and write
3820000
direct allocation
page read and write
284E000
stack
page read and write
28D5000
heap
page read and write
4251000
heap
page read and write
10BB000
heap
page read and write
113C000
stack
page read and write
39CD000
direct allocation
page execute and read and write
E7E000
heap
page read and write
2E00000
heap
page read and write
C90000
unkown
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
C4D000
stack
page read and write
4251000
heap
page read and write
56B4000
system
page execute and read and write
4251000
heap
page read and write
5C831FE000
stack
page read and write
1BF0000
heap
page read and write
769F000
heap
page read and write
4251000
heap
page read and write
22F318C4000
trusted library allocation
page read and write
306F000
heap
page read and write
11C0000
heap
page read and write
10AA000
heap
page execute and read and write
263B000
stack
page read and write
E9C000
heap
page read and write
4251000
heap
page read and write
3AE9000
direct allocation
page read and write
D17000
unkown
page readonly
4251000
heap
page read and write
2CB0000
heap
page read and write
4251000
heap
page read and write
CEE000
stack
page read and write
3AE9000
direct allocation
page read and write
118E000
heap
page read and write
35D0000
direct allocation
page read and write
3BAE000
direct allocation
page read and write
4570000
trusted library allocation
page read and write
22F2FC00000
heap
page read and write
77C0000
trusted library allocation
page read and write
118A000
heap
page read and write
EAC000
heap
page read and write
E30000
heap
page read and write
D4A000
unkown
page read and write
2E10000
unkown
page readonly
EB6000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
2FD2000
unkown
page read and write
D90000
unkown
page readonly
31EC000
unkown
page read and write
D17000
unkown
page readonly
2F12000
unkown
page read and write
3AED000
direct allocation
page read and write
22F2FBFB000
heap
page read and write
4251000
heap
page read and write
589000
stack
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
3943000
direct allocation
page read and write
FA4000
heap
page read and write
1221000
unkown
page read and write
4251000
heap
page read and write
D17000
unkown
page readonly
3500000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
C90000
unkown
page readonly
4251000
heap
page read and write
2B4C000
stack
page read and write
F6D000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
35D0000
direct allocation
page read and write
28D5000
heap
page read and write
4251000
heap
page read and write
D17000
unkown
page readonly
4251000
heap
page read and write
2937000
heap
page read and write
2CB0000
heap
page read and write
2730000
heap
page read and write
766C000
heap
page read and write
11C8000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
AAA000
stack
page read and write
46E9000
direct allocation
page execute and read and write
769C000
heap
page read and write
A20000
unkown
page readonly
10FF000
stack
page read and write
EB5000
heap
page read and write
2944000
heap
page read and write
3B3D000
direct allocation
page read and write
4251000
heap
page read and write
103A000
stack
page read and write
4251000
heap
page read and write
E7A000
heap
page read and write
11C0000
heap
page read and write
14BF000
stack
page read and write
3993000
direct allocation
page read and write
4240000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
5AD2000
unclassified section
page read and write
DB0000
unkown
page readonly
7695000
heap
page read and write
4251000
heap
page read and write
7662000
heap
page read and write
5528000
unclassified section
page execute and read and write
BCF000
stack
page read and write
1170000
unkown
page readonly
4251000
heap
page read and write
4251000
heap
page read and write
1160000
unkown
page readonly
2BE0000
heap
page read and write
3C01000
heap
page read and write
49D2000
unclassified section
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
1150000
unkown
page readonly
22F313B0000
trusted library allocation
page read and write
4251000
heap
page read and write
32F0000
heap
page read and write
39C0000
direct allocation
page read and write
40D2000
unkown
page read and write
E3F000
unkown
page read and write
3423000
heap
page read and write
4251000
heap
page read and write
3B5E000
direct allocation
page read and write
4251000
heap
page read and write
2E13000
heap
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
1370000
unkown
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
3AE9000
direct allocation
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
22F313B0000
trusted library allocation
page read and write
4350000
heap
page read and write
2923000
heap
page read and write
769F000
heap
page read and write
3A38000
unkown
page execute and read and write
13BE000
stack
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
2988000
heap
page read and write
BDB000
stack
page read and write
4251000
heap
page read and write
C91000
unkown
page execute read
5C849FE000
stack
page read and write
4251000
heap
page read and write
3B3D000
direct allocation
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
4570000
trusted library allocation
page read and write
4251000
heap
page read and write
28E8000
heap
page read and write
4251000
heap
page read and write
22F318BE000
trusted library allocation
page read and write
28D5000
heap
page read and write
1150000
unkown
page readonly
4251000
heap
page read and write
48AC000
unkown
page read and write
There are 665 hidden memdumps, click here to show them.