IOC Report
Purchase Order PO.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order PO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order PO.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\l420377x
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order PO.exe
"C:\Users\user\Desktop\Purchase Order PO.exe"
malicious
C:\Users\user\Desktop\Purchase Order PO.exe
"C:\Users\user\Desktop\Purchase Order PO.exe"
malicious
C:\Program Files (x86)\SAmkgsoDaGLUlMXdgHYfokaVNFHsGLOzMJqoobAwaSTwORZJc\QfgdvbjddZ.exe
"C:\Program Files (x86)\SAmkgsoDaGLUlMXdgHYfokaVNFHsGLOzMJqoobAwaSTwORZJc\QfgdvbjddZ.exe"
malicious
C:\Windows\SysWOW64\isoburn.exe
"C:\Windows\SysWOW64\isoburn.exe"
malicious
C:\Program Files (x86)\SAmkgsoDaGLUlMXdgHYfokaVNFHsGLOzMJqoobAwaSTwORZJc\QfgdvbjddZ.exe
"C:\Program Files (x86)\SAmkgsoDaGLUlMXdgHYfokaVNFHsGLOzMJqoobAwaSTwORZJc\QfgdvbjddZ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.cstrategy.online/qx5d/?Mr60=IyUQrkKyuirfHSYuUsN1
unknown
http://www.bienmaigrir.info/7yhf/
35.220.176.144
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.dietcoffee.online/dm4p/
77.68.64.45
http://www.tiro.com
unknown
http://www.bser101pp.buzz/v89f/?Mr60=vR3kWP+v98PFeIQUj3bnjAJ1ckGUCiAryWjHUGMo4+T5xi8TnNV+jgD2+4ag3QdSrCwOZVBfu0hve5I79B9k2Lg1hTzUbXWqWgu/JIX+7IudMx93vwrkJY0=&o6=SpTPojpx7H
104.21.58.90
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.madhf.tech/6ou6/
103.224.182.242
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.smartcongress.net/qtfx/?Mr60=KdNk/QG/ntQJ0Ylt7Lyc3znBwC3jfRDsxCMWqIa/89W9m0NHjjmW45E2UxezVHfL5+2nDpZVQ4VEoa9MycOLMlSLf1n7d0xHEmolRusqu1Y7m0apztprjxI=&o6=SpTPojpx7H
146.88.233.115
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.dietcoffee.online/dm4p/?o6=SpTPojpx7H&Mr60=nAmjXBwFyC120iWGDF5QEkfQ4V9pq4qW/X6vA0SQviJnmQOR7pbzII6Li/fXSuLSC3cdwp3L3c1awzkuuw4A1F2MgfpbEGtSAoSHmNs0Z+rY9P6APqFlZ34=
77.68.64.45
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://github.com/ppx17/Onkyo-Remote-Control
unknown
http://www.cyperla.xyz/qygv/?o6=SpTPojpx7H&Mr60=PNgLNtFNavTWVACgmh5xCzkhObl4Vn/3Y2lvnmQ+PypmeASZv9aNxFxhHJqyS8bM8Pjr3wsa5/scE4diKg4Wmu6EeWsOoRA0CokgLA8hMNXivrFO8nzFLsU=
31.186.11.114
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.smartcongress.net/qtfx/
146.88.233.115
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.yc791022.asia/wu7k/
101.35.209.183
http://www.jalan2.online/ykgd/
108.181.189.7
http://www.madhf.tech/6ou6/?o6=SpTPojpx7H&Mr60=We72k2U8RqyHNx9ftVgFe72GQMu4iuXnCau05KQMUjWmq73IzupFd
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.bser101pp.buzz/v89f/
104.21.58.90
http://www.madhf.tech/6ou6/?o6=SpTPojpx7H&Mr60=We72k2U8RqyHNx9ftVgFe72GQMu4iuXnCau05KQMUjWmq73IzupFdRGddnmXCSRdMUrkGKdQ0AHY8jBIUc/t5WHt4/FI7OJ+yOIhAl7/LaOCHNokGW9xZfY=
103.224.182.242
http://www.070002018.xyz/6m2n/
161.97.142.144
https://www.ecosia.org/newtab/
unknown
http://www.beyondfitness.live/fbpt/?Mr60=sHQWWiJRbY7Czg+qExT5lhETHbNnMxamWGf9ZvbaXe6zmK6gq2rUy+H9V8T+CpeiS8UyZN5qWlRSJl8kNjqw7URZvJro+8N+ASp2jrUizWujex2cueM/JZ0=&o6=SpTPojpx7H
209.74.77.107
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.goldstarfootwear.shop/8m07/
3.33.130.190
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.smartcongress.net
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
http://www.beyondfitness.live/fbpt/
209.74.77.107
http://www.cstrategy.online/qx5d/
194.76.119.60
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.070002018.xyz
161.97.142.144
malicious
cyperla.xyz
31.186.11.114
malicious
www.cyperla.xyz
unknown
malicious
www.beyondfitness.live
209.74.77.107
goldstarfootwear.shop
3.33.130.190
cstrategy.online
194.76.119.60
www.madhf.tech
103.224.182.242
smartcongress.net
146.88.233.115
www.dietcoffee.online
77.68.64.45
www.bser101pp.buzz
104.21.58.90
www.bienmaigrir.info
35.220.176.144
www.yc791022.asia
101.35.209.183
jalan2.online
108.181.189.7
www.cstrategy.online
unknown
www.jalan2.online
unknown
www.goldstarfootwear.shop
unknown
www.alihones.lol
unknown
www.smartcongress.net
unknown
There are 8 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
161.97.142.144
www.070002018.xyz
United States
malicious
31.186.11.114
cyperla.xyz
Turkey
malicious
101.35.209.183
www.yc791022.asia
China
77.68.64.45
www.dietcoffee.online
United Kingdom
146.88.233.115
smartcongress.net
France
209.74.77.107
www.beyondfitness.live
United States
104.21.58.90
www.bser101pp.buzz
United States
108.181.189.7
jalan2.online
Canada
103.224.182.242
www.madhf.tech
Australia
194.76.119.60
cstrategy.online
Italy
35.220.176.144
www.bienmaigrir.info
United States
3.33.130.190
goldstarfootwear.shop
United States
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5670000
system
page execute and read and write
malicious
2D10000
system
page execute and read and write
malicious
4CE0000
trusted library allocation
page read and write
malicious
4C90000
trusted library allocation
page read and write
malicious
1F70000
unclassified section
page execute and read and write
malicious
2F20000
unkown
page execute and read and write
malicious
1DB0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5690000
trusted library allocation
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
30C7000
heap
page read and write
8141000
heap
page read and write
4B51000
heap
page read and write
3086000
heap
page read and write
4B51000
heap
page read and write
30FC000
heap
page read and write
A01E000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
5370000
heap
page execute and read and write
8152000
heap
page read and write
5320000
heap
page read and write
A11F000
stack
page read and write
615000
unkown
page read and write
601000
unkown
page execute read
11BB000
stack
page read and write
3040000
heap
page read and write
4B51000
heap
page read and write
1100000
unkown
page readonly
30C4000
heap
page read and write
8141000
heap
page read and write
3040000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
14E0000
unkown
page readonly
3093000
heap
page read and write
1110000
heap
page read and write
1B2D7D92000
heap
page read and write
45D8000
unkown
page read and write
33A0000
heap
page read and write
157E000
stack
page read and write
D30000
unkown
page readonly
4B51000
heap
page read and write
4B51000
heap
page read and write
1110000
heap
page read and write
323C000
unkown
page read and write
53E2000
unclassified section
page read and write
30F7000
heap
page read and write
9EDE000
stack
page read and write
2E4F000
stack
page read and write
4B51000
heap
page read and write
E27000
heap
page read and write
303B000
heap
page read and write
8141000
heap
page read and write
30F7000
heap
page read and write
815D000
heap
page read and write
30CD000
heap
page read and write
1298000
heap
page read and write
4B51000
heap
page read and write
5470000
trusted library allocation
page read and write
1B2D99C4000
trusted library allocation
page read and write
10FC000
stack
page read and write
2B32000
trusted library allocation
page read and write
D40000
unkown
page readonly
600000
unkown
page readonly
3090000
heap
page read and write
E9A000
heap
page read and write
2E60000
heap
page read and write
4B51000
heap
page read and write
2CA0000
unkown
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
56F1000
system
page execute and read and write
56FD000
system
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
30CD000
heap
page read and write
30A7000
heap
page read and write
4E90000
trusted library allocation
page read and write
12DE000
stack
page read and write
7F990000
trusted library allocation
page execute and read and write
516E000
direct allocation
page execute and read and write
4B51000
heap
page read and write
2E20000
heap
page read and write
615000
unkown
page read and write
2C80000
unkown
page readonly
1B8D000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
E16000
heap
page read and write
2D1C000
unkown
page read and write
1DA8000
direct allocation
page execute and read and write
2D84000
heap
page read and write
5312000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2B50000
trusted library allocation
page read and write
2CC0000
unkown
page read and write
30B5000
heap
page read and write
12E0000
heap
page read and write
1271000
unkown
page readonly
2C80000
unkown
page readonly
30EC000
heap
page read and write
32D2000
heap
page read and write
8179000
heap
page read and write
4B51000
heap
page read and write
4E90000
trusted library allocation
page read and write
1B2D7BE0000
heap
page read and write
8141000
heap
page read and write
4B51000
heap
page read and write
60E000
unkown
page readonly
42B4000
unkown
page read and write
DB0000
trusted library allocation
page read and write
310E000
heap
page read and write
4B51000
heap
page read and write
4DE0000
trusted library allocation
page execute and read and write
2D84000
heap
page read and write
3093000
heap
page read and write
18134000
system
page read and write
5C70000
heap
page read and write
15F0000
heap
page read and write
4B51000
heap
page read and write
10FC000
stack
page read and write
19EF000
stack
page read and write
4B51000
heap
page read and write
1B2D9812000
trusted library allocation
page read and write
2D80000
unkown
page read and write
4B51000
heap
page read and write
1B2D7D8F000
heap
page read and write
1B2D7D70000
heap
page read and write
2D94000
heap
page read and write
4B51000
heap
page read and write
DBD000
trusted library allocation
page execute and read and write
2DA0000
heap
page read and write
8141000
heap
page read and write
7443FFF000
stack
page read and write
4B51000
heap
page read and write
3948000
unkown
page read and write
4B51000
heap
page read and write
1B2D7CD0000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
E09000
heap
page read and write
1160000
unkown
page read and write
3040000
heap
page read and write
2B0B000
trusted library allocation
page read and write
1B2D7D8B000
heap
page read and write
30C4000
heap
page read and write
D14000
trusted library allocation
page read and write
4B51000
heap
page read and write
5DEF000
trusted library allocation
page read and write
1100000
unkown
page readonly
4B51000
heap
page read and write
60E000
unkown
page readonly
309A000
heap
page read and write
3ADA000
unkown
page read and write
617000
unkown
page readonly
2C4F000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
DEE000
heap
page read and write
4B51000
heap
page read and write
5490000
heap
page read and write
DD7000
trusted library allocation
page execute and read and write
8141000
heap
page read and write
74AE000
stack
page read and write
2E64000
heap
page read and write
2E64000
heap
page read and write
8240000
trusted library allocation
page read and write
1B2D99CE000
trusted library allocation
page read and write
2F62000
unkown
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
74437FE000
stack
page read and write
D1D000
trusted library allocation
page execute and read and write
5040000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2CB0000
unkown
page read and write
4B51000
heap
page read and write
3BE1000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
30BA000
heap
page read and write
5460000
trusted library section
page read and write
4B51000
heap
page read and write
8141000
heap
page read and write
52A1000
direct allocation
page execute and read and write
D50000
unkown
page readonly
8141000
heap
page read and write
710000
unkown
page readonly
30CD000
heap
page read and write
1D11000
direct allocation
page execute and read and write
2B70000
trusted library allocation
page read and write
30A7000
heap
page read and write
11B0000
heap
page read and write
4B51000
heap
page read and write
816E000
heap
page read and write
2B2D000
trusted library allocation
page read and write
4B51000
heap
page read and write
50F9000
direct allocation
page execute and read and write
4B51000
heap
page read and write
8141000
heap
page read and write
2D80000
unkown
page read and write
1B2D9810000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
87FE000
stack
page read and write
12E0000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
17D4C000
system
page read and write
8173000
heap
page read and write
600000
unkown
page readonly
8141000
heap
page read and write
4B51000
heap
page read and write
3046000
heap
page read and write
6806000
unclassified section
page read and write
3040000
heap
page read and write
4B51000
heap
page read and write
2B30000
trusted library allocation
page read and write
1178000
trusted library allocation
page read and write
50EB000
stack
page read and write
DE0000
unkown
page readonly
4122000
unkown
page read and write
4C74000
heap
page read and write
3090000
heap
page read and write
14E0000
unkown
page readonly
5020000
heap
page read and write
4B51000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
115E000
stack
page read and write
1160000
heap
page execute and read and write
1210000
unkown
page read and write
4B51000
heap
page read and write
2F62000
unkown
page read and write
4B51000
heap
page read and write
3090000
heap
page read and write
4B51000
heap
page read and write
1870000
unkown
page readonly
8141000
heap
page read and write
5090000
trusted library section
page readonly
1B2D9821000
trusted library allocation
page read and write
1B2D9817000
trusted library allocation
page read and write
4B51000
heap
page read and write
883F000
stack
page read and write
7910000
trusted library section
page read and write
3037000
heap
page read and write
3090000
heap
page read and write
DC2000
trusted library allocation
page read and write
DCA000
trusted library allocation
page execute and read and write
1D2D000
direct allocation
page execute and read and write
712000
unkown
page readonly
4B51000
heap
page read and write
DC6000
trusted library allocation
page execute and read and write
1210000
unkown
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
DB3000
trusted library allocation
page read and write
30DA000
heap
page read and write
30E4000
heap
page read and write
617000
unkown
page readonly
2C9B000
stack
page read and write
3093000
heap
page read and write
4B51000
heap
page read and write
3028000
heap
page read and write
30E4000
heap
page read and write
4F56000
heap
page read and write
17B32000
system
page read and write
D20000
unkown
page readonly
5753000
system
page execute and read and write
1B2D7B4F000
system
page execute and read and write
32D1000
unkown
page execute and read and write
1220000
heap
page read and write
4B51000
heap
page read and write
DE8000
heap
page read and write
4B51000
heap
page read and write
2CA0000
unkown
page read and write
30CD000
heap
page read and write
585C000
unkown
page read and write
4B51000
heap
page read and write
A15E000
stack
page read and write
3DFE000
unkown
page read and write
2DF0000
heap
page read and write
1500000
heap
page read and write
30F7000
heap
page read and write
4B51000
heap
page read and write
3049000
heap
page read and write
1D26000
direct allocation
page execute and read and write
2E60000
heap
page read and write
30F2000
heap
page read and write
1B2D9803000
trusted library allocation
page read and write
A39E000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
1298000
heap
page read and write
4B51000
heap
page read and write
8167000
heap
page read and write
601000
unkown
page execute read
8158000
heap
page read and write
10DF000
stack
page read and write
D10000
trusted library allocation
page read and write
1490000
unkown
page readonly
4B51000
heap
page read and write
30DA000
heap
page read and write
309A000
heap
page read and write
2B26000
trusted library allocation
page read and write
4B51000
heap
page read and write
8140000
heap
page read and write
1B2D7AE0000
system
page execute and read and write
56D7000
system
page execute and read and write
6674000
unclassified section
page read and write
2E70000
unkown
page readonly
4B51000
heap
page read and write
1F60000
heap
page read and write
1B2D9700000
trusted library allocation
page read and write
4B51000
heap
page read and write
3624000
unkown
page read and write
4B51000
heap
page read and write
1280000
unkown
page read and write
323C000
unkown
page read and write
2D6F000
stack
page read and write
309A000
heap
page read and write
5480000
trusted library allocation
page execute and read and write
5CAE000
heap
page read and write
1B2D7B4B000
system
page execute and read and write
3035000
heap
page read and write
4B51000
heap
page read and write
815A000
heap
page read and write
4FC7000
heap
page read and write
1B2D980B000
trusted library allocation
page read and write
1130000
heap
page read and write
30C7000
heap
page read and write
2D80000
heap
page read and write
4B51000
heap
page read and write
1150000
trusted library allocation
page read and write
4B51000
heap
page read and write
1257000
heap
page read and write
10FC000
stack
page read and write
2E20000
heap
page read and write
E25000
heap
page read and write
17A72000
system
page read and write
5E9A000
unclassified section
page read and write
30F9000
heap
page read and write
10FC000
stack
page read and write
DAA000
stack
page read and write
FDE000
stack
page read and write
6E30000
trusted library allocation
page read and write
4B51000
heap
page read and write
2B21000
trusted library allocation
page read and write
30EC000
heap
page read and write
4B51000
heap
page read and write
5E25000
heap
page read and write
DF0000
unkown
page readonly
DF0000
unkown
page readonly
30F2000
heap
page read and write
5498000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2D40000
heap
page read and write
8155000
heap
page read and write
4B51000
heap
page read and write
615000
unkown
page read and write
30C4000
heap
page read and write
124C000
stack
page read and write
4B51000
heap
page read and write
DE0000
unkown
page readonly
4E90000
trusted library allocation
page read and write
61BE000
unclassified section
page read and write
14DF000
stack
page read and write
BE0000
heap
page read and write
18EF000
stack
page read and write
8141000
heap
page read and write
4B51000
heap
page read and write
8141000
heap
page read and write
D13000
trusted library allocation
page execute and read and write
4B51000
heap
page read and write
1180000
unkown
page read and write
4B51000
heap
page read and write
54D2000
heap
page read and write
59E4000
unclassified section
page read and write
1250000
heap
page read and write
1130000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2E30000
unkown
page readonly
6E52000
trusted library allocation
page read and write
4B51000
heap
page read and write
1B2D9901000
trusted library allocation
page read and write
4B51000
heap
page read and write
4CDC000
stack
page read and write
1870000
unkown
page readonly
4B51000
heap
page read and write
1120000
unkown
page readonly
1B2D9540000
trusted library allocation
page read and write
4B51000
heap
page read and write
19F0000
direct allocation
page read and write
8141000
heap
page read and write
4B51000
heap
page read and write
3040000
heap
page read and write
D50000
unkown
page readonly
1180000
unkown
page read and write
A29E000
stack
page read and write
4B51000
heap
page read and write
12E8000
heap
page read and write
4B51000
heap
page read and write
5E10000
trusted library allocation
page read and write
16F0000
heap
page read and write
4B51000
heap
page read and write
2B65000
trusted library allocation
page read and write
1B2D9540000
trusted library allocation
page read and write
8146000
heap
page read and write
303B000
heap
page read and write
5DE0000
trusted library allocation
page read and write
8141000
heap
page read and write
2393000
unclassified section
page execute and read and write
5060000
trusted library allocation
page read and write
8141000
heap
page read and write
126E000
stack
page read and write
4B50000
heap
page read and write
A69000
stack
page read and write
8150000
heap
page read and write
1820000
unkown
page readonly
8141000
heap
page read and write
1490000
unkown
page readonly
DCA000
stack
page read and write
30EC000
heap
page read and write
2E70000
unkown
page readonly
1530000
heap
page read and write
8141000
heap
page read and write
30B5000
heap
page read and write
30FC000
heap
page read and write
30BA000
heap
page read and write
14DF000
stack
page read and write
3035000
heap
page read and write
4B51000
heap
page read and write
2AFF000
stack
page read and write
1290000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
113E000
stack
page read and write
3086000
heap
page read and write
30FC000
heap
page read and write
1271000
unkown
page readonly
4F4E000
stack
page read and write
D60000
unkown
page readonly
30A9000
heap
page read and write
4B51000
heap
page read and write
310E000
heap
page read and write
3086000
heap
page read and write
1100000
unkown
page readonly
1B2D9540000
trusted library allocation
page read and write
30C7000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
30A7000
heap
page read and write
4B51000
heap
page read and write
5D08000
unclassified section
page read and write
4B51000
heap
page read and write
3020000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
32D0000
trusted library allocation
page read and write
4B51000
heap
page read and write
55FC000
unclassified section
page read and write
5DF0000
trusted library allocation
page execute and read and write
30B5000
heap
page read and write
11A0000
unkown
page readonly
2B00000
trusted library allocation
page read and write
DDB000
trusted library allocation
page execute and read and write
4B51000
heap
page read and write
617000
unkown
page readonly
600000
unkown
page readonly
4B51000
heap
page read and write
DE0000
heap
page read and write
4B51000
heap
page read and write
DAA000
stack
page read and write
7441FFC000
stack
page read and write
10F0000
trusted library allocation
page read and write
1BFE000
direct allocation
page execute and read and write
4B51000
heap
page read and write
5E20000
heap
page read and write
11B0000
heap
page read and write
4F0D000
stack
page read and write
723E000
heap
page read and write
50A0000
trusted library allocation
page read and write
2321000
unclassified section
page execute and read and write
1420000
heap
page read and write
2D90000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2CD8000
stack
page read and write
30C7000
heap
page read and write
D40000
unkown
page readonly
30A7000
heap
page read and write
2B04000
trusted library allocation
page read and write
4B51000
heap
page read and write
4C60000
heap
page read and write
7442FFE000
stack
page read and write
DCA000
stack
page read and write
15BE000
stack
page read and write
9FDE000
stack
page read and write
1140000
trusted library allocation
page execute and read and write
615000
unkown
page read and write
D40000
unkown
page readonly
4B51000
heap
page read and write
4D97000
heap
page read and write
1B2D99A5000
trusted library allocation
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
1171000
unkown
page readonly
56B0000
trusted library allocation
page read and write
4B51000
heap
page read and write
5B76000
unclassified section
page read and write
56E1000
system
page execute and read and write
8188000
heap
page read and write
30DA000
heap
page read and write
4B51000
heap
page read and write
DAE000
stack
page read and write
60E000
unkown
page readonly
4E29000
heap
page read and write
4B51000
heap
page read and write
1160000
unkown
page read and write
2D84000
heap
page read and write
816A000
heap
page read and write
3081000
heap
page read and write
DD2000
trusted library allocation
page read and write
1220000
heap
page read and write
10BC000
stack
page read and write
2E30000
unkown
page readonly
4B51000
heap
page read and write
4B51000
heap
page read and write
5322000
unclassified section
page read and write
4B51000
heap
page read and write
8141000
heap
page read and write
2B90000
trusted library allocation
page read and write
D6E000
stack
page read and write
1280000
unkown
page read and write
4F52000
heap
page read and write
C10000
heap
page read and write
476A000
unkown
page read and write
4B51000
heap
page read and write
3343000
unkown
page execute and read and write
5C80000
heap
page read and write
2B60000
trusted library allocation
page read and write
30BA000
heap
page read and write
3075000
heap
page read and write
B67000
stack
page read and write
3040000
heap
page read and write
F43000
unkown
page read and write
3040000
heap
page read and write
600000
unkown
page readonly
A25F000
stack
page read and write
309A000
heap
page read and write
4B51000
heap
page read and write
6B2A000
unclassified section
page read and write
1B2D9650000
heap
page read and write
5050000
trusted library allocation
page execute and read and write
4B51000
heap
page read and write
3081000
heap
page read and write
2B1E000
trusted library allocation
page read and write
545E000
stack
page read and write
E74000
heap
page read and write
1B2D980E000
trusted library allocation
page read and write
37B6000
unkown
page read and write
4B51000
heap
page read and write
1171000
unkown
page readonly
601000
unkown
page execute read
8141000
heap
page read and write
2C6E000
stack
page read and write
3022000
unkown
page read and write
1100000
unkown
page readonly
2D40000
heap
page read and write
1820000
unkown
page readonly
1B2D7D60000
heap
page read and write
7230000
heap
page read and write
7460000
trusted library allocation
page execute and read and write
5CC0000
heap
page read and write
50FD000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2D94000
heap
page read and write
3F90000
unkown
page read and write
E7E000
heap
page read and write
11A0000
unkown
page readonly
4B51000
heap
page read and write
30F2000
heap
page read and write
4B51000
heap
page read and write
617000
unkown
page readonly
4B51000
heap
page read and write
1B2D99BE000
trusted library allocation
page read and write
4B51000
heap
page read and write
3C6C000
unkown
page read and write
4B51000
heap
page read and write
8141000
heap
page read and write
D60000
unkown
page readonly
50F0000
heap
page read and write
4446000
unkown
page read and write
D40000
unkown
page readonly
15F8000
heap
page read and write
4B51000
heap
page read and write
3086000
heap
page read and write
4B51000
heap
page read and write
12E8000
heap
page read and write
310E000
heap
page read and write
4B51000
heap
page read and write
30C4000
heap
page read and write
1B2D7D92000
heap
page read and write
1110000
unkown
page readonly
D20000
unkown
page readonly
5032000
trusted library allocation
page read and write
4B51000
heap
page read and write
1B2D9800000
trusted library allocation
page read and write
30BA000
heap
page read and write
4B51000
heap
page read and write
1225000
heap
page read and write
126E000
stack
page read and write
D20000
heap
page read and write
1B89000
direct allocation
page execute and read and write
8141000
heap
page read and write
148F000
stack
page read and write
5330000
trusted library allocation
page read and write
4B51000
heap
page read and write
4C70000
heap
page read and write
4B51000
heap
page read and write
30DA000
heap
page read and write
8141000
heap
page read and write
2BE1000
trusted library allocation
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
64E2000
unclassified section
page read and write
4B51000
heap
page read and write
7EC0000
trusted library allocation
page read and write
3081000
heap
page read and write
602C000
unclassified section
page read and write
568D000
stack
page read and write
3046000
heap
page read and write
4B51000
heap
page read and write
1A60000
direct allocation
page execute and read and write
12FF000
heap
page read and write
1120000
unkown
page readonly
30E4000
heap
page read and write
4B51000
heap
page read and write
3119000
heap
page read and write
BD0000
heap
page read and write
4B51000
heap
page read and write
D00000
trusted library allocation
page read and write
1110000
unkown
page readonly
742E000
stack
page read and write
3093000
heap
page read and write
2D90000
heap
page read and write
4B51000
heap
page read and write
2BD0000
heap
page read and write
4B51000
heap
page read and write
4E90000
trusted library allocation
page read and write
30B5000
heap
page read and write
5100000
heap
page read and write
814B000
heap
page read and write
8141000
heap
page read and write
74427FE000
stack
page read and write
4B51000
heap
page read and write
6350000
unclassified section
page read and write
4B51000
heap
page read and write
6998000
unclassified section
page read and write
8141000
heap
page read and write
D30000
unkown
page readonly
2B40000
trusted library allocation
page read and write
1B2D7D00000
heap
page read and write
4B51000
heap
page read and write
817E000
heap
page read and write
4B51000
heap
page read and write
1290000
heap
page read and write
4B51000
heap
page read and write
5030000
trusted library allocation
page read and write
601000
unkown
page execute read
8146000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
1B2D7D6A000
heap
page read and write
4B51000
heap
page read and write
1B2D7D7C000
heap
page read and write
4B51000
heap
page read and write
5103000
heap
page read and write
781E000
stack
page read and write
4B51000
heap
page read and write
529D000
direct allocation
page execute and read and write
60E000
unkown
page readonly
There are 683 hidden memdumps, click here to show them.