IOC Report
ORIGINAL INVOICE COAU7230734290.exe

loading gif

Files

File Path
Type
Category
Malicious
ORIGINAL INVOICE COAU7230734290.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\283026M3L
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\anaboly
data
dropped
C:\Users\user\AppData\Local\Temp\aut6F38.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290.exe
"C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290.exe"
malicious
C:\Program Files (x86)\qMLrzcnlYymOXinSzLJToFkBWYtvDvmTGOOHHuAToRqDTSFPSxwUcCqikfquPepJCBoCFJ\tOxaspWNamv.exe
"C:\Program Files (x86)\qMLrzcnlYymOXinSzLJToFkBWYtvDvmTGOOHHuAToRqDTSFPSxwUcCqikfquPepJCBoCFJ\tOxaspWNamv.exe"
malicious
C:\Windows\SysWOW64\ktmutil.exe
"C:\Windows\SysWOW64\ktmutil.exe"
malicious
C:\Program Files (x86)\qMLrzcnlYymOXinSzLJToFkBWYtvDvmTGOOHHuAToRqDTSFPSxwUcCqikfquPepJCBoCFJ\tOxaspWNamv.exe
"C:\Program Files (x86)\qMLrzcnlYymOXinSzLJToFkBWYtvDvmTGOOHHuAToRqDTSFPSxwUcCqikfquPepJCBoCFJ\tOxaspWNamv.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\SysWOW64\srdelayed.exe
"C:\Windows\SysWOW64\srdelayed.exe"

URLs

Name
IP
Malicious
http://www.futurevision.life/hxmz/?Hx=ot9h&yX7=xeYt+TVrluKccowhuJaDBktUUZBiwtnijwrYeJgffsaeXHWEwE1YZCbtIyEm+ckVl2hmk1+GOFDMCTsPe0H768cQaPGnwmWpoBoTXnujTk0fw5ooQYelqhpppqeWfG8SjK30Qts=
203.161.49.193
malicious
http://www.mcfunding.org/0598/
3.33.130.190
malicious
http://www.futurevision.life/hxmz/
203.161.49.193
malicious
http://www.mcfunding.org/0598/?yX7=t68BN09iVeqb/IuLF1oa7LGDO07/W7CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4Tu+XiR6NXotGry9ANEeeRCoN4FhbxnBZSnIhm0SzK0MisIZlDjM=&Hx=ot9h
3.33.130.190
malicious
http://www.huiguang.xyz/hv6g/?Hx=ot9h&yX7=vSitAQgQO9xnWjtJgvvZZsk+23T/NzOm/sAr3nzbW6mT0FGB0/NYbIaPlj7BCWSFPaPgTx5lzENVl3g1chzGBem8ABx5elB2IpCI9aOC0eTdsykMK9iQYMJsZcXRFR0PJFreT4Q=
154.216.76.80
malicious
http://www.beingandbecoming.ltd/79tr/?yX7=vB4016rwfH0MxtawL3zGYGaXYsIh8iPne8uh+mnoHReWloNmM7dp4Fgr6wtK7PtcWtNvsE0Cpt3tQWtVQrZPygs+MxIMUNH2akCfN7/CzpsZyLj6qmJ1F1UuDNbdqvUipDEiTgU=&Hx=ot9h
3.33.130.190
malicious
http://www.beingandbecoming.ltd/79tr/
3.33.130.190
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://34.92.79.175:19817
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://hm.baidu.com/hm.js?cf95fa39f4a72ce6b85bbfbe9eadb95a
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.mcfunding.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mcfunding.org
3.33.130.190
malicious
beingandbecoming.ltd
3.33.130.190
malicious
migorengya8.click
198.252.98.54
malicious
schedulemassage.xyz
3.33.130.190
malicious
www.schedulemassage.xyz
unknown
malicious
www.huiguang.xyz
154.216.76.80
fp2e7a.wpc.phicdn.net
192.229.221.95
www.futurevision.life
203.161.49.193
www.beingandbecoming.ltd
unknown
www.migorengya8.click
unknown
www.mcfunding.org
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
3.33.130.190
mcfunding.org
United States
malicious
203.161.49.193
www.futurevision.life
Malaysia
154.216.76.80
www.huiguang.xyz
Seychelles

Memdumps

Base Address
Regiontype
Protect
Malicious
5B50000
unclassified section
page execute and read and write
malicious
D80000
system
page execute and read and write
malicious
2F90000
unclassified section
page execute and read and write
malicious
2780000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
4790000
unkown
page execute and read and write
malicious
2E70000
trusted library allocation
page read and write
malicious
2EC0000
trusted library allocation
page read and write
malicious
1C39900A000
trusted library allocation
page read and write
2C11000
heap
page read and write
1F0000
unkown
page readonly
2B90000
heap
page read and write
80EF000
stack
page read and write
7CA0000
heap
page read and write
2D70000
heap
page read and write
35D3000
direct allocation
page read and write
9BB000
stack
page read and write
EF4000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
29E000
unkown
page readonly
B40000
unkown
page readonly
23B2000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
B70000
heap
page read and write
3213000
heap
page read and write
E25000
heap
page read and write
2C11000
heap
page read and write
400000
unkown
page readonly
F2F000
stack
page read and write
30BC000
unkown
page read and write
2DFB000
heap
page read and write
34A1000
direct allocation
page execute and read and write
2D81000
heap
page read and write
19439FB000
stack
page read and write
3213000
heap
page read and write
F3C000
unkown
page read and write
43E000
heap
page read and write
F71000
unkown
page execute read
813E000
stack
page read and write
2C11000
heap
page read and write
1C3991A5000
trusted library allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
C38000
heap
page read and write
1C399100000
trusted library allocation
page read and write
DDC000
system
page execute and read and write
5D6A000
unclassified section
page execute and read and write
E24000
heap
page execute and read and write
3151000
heap
page read and write
3723000
heap
page read and write
1F0000
unkown
page readonly
2C11000
heap
page read and write
2E29000
heap
page read and write
2B4000
unkown
page readonly
2D83000
heap
page read and write
F71000
unkown
page execute read
1C397633000
heap
page read and write
C50000
unkown
page readonly
30AE000
stack
page read and write
74F000
stack
page read and write
2C11000
heap
page read and write
430000
heap
page read and write
2D8C000
heap
page read and write
F70000
unkown
page readonly
2C11000
heap
page read and write
2850000
unkown
page readonly
422C000
unclassified section
page read and write
BC0000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
BF0000
heap
page read and write
2C11000
heap
page read and write
B2E000
stack
page read and write
1C3973D0000
system
page execute and read and write
7A2E000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
27D000
unkown
page readonly
2C11000
heap
page read and write
410000
heap
page read and write
1F0000
unkown
page readonly
7A7B000
heap
page read and write
2C11000
heap
page read and write
3CE000
stack
page read and write
3213000
heap
page read and write
DC0000
heap
page read and write
1C398DF0000
heap
page read and write
379E000
direct allocation
page read and write
4BBC000
unkown
page read and write
790000
unkown
page readonly
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
7A87000
heap
page read and write
EF0000
heap
page read and write
2C11000
heap
page read and write
31C6000
heap
page read and write
3A00000
direct allocation
page execute and read and write
2C11000
heap
page read and write
1C397630000
heap
page read and write
2D83000
heap
page read and write
7A2B000
heap
page read and write
BE0000
heap
page read and write
2C11000
heap
page read and write
2AA000
unkown
page read and write
C2D000
heap
page read and write
3779000
direct allocation
page read and write
F70000
unkown
page readonly
67DC000
unclassified section
page execute and read and write
C60000
heap
page read and write
2C11000
heap
page read and write
377D000
direct allocation
page read and write
E57000
system
page execute and read and write
2DE3000
heap
page read and write
D60000
heap
page read and write
EF0000
heap
page read and write
4A1C000
unkown
page execute and read and write
2DDD000
heap
page read and write
40000
unkown
page readonly
EA0000
unkown
page read and write
B90000
heap
page read and write
2C11000
heap
page read and write
2AA000
unkown
page write copy
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
F7E000
unkown
page readonly
2D10000
heap
page read and write
2E1F000
heap
page read and write
4750000
unclassified section
page execute and read and write
3B29000
direct allocation
page execute and read and write
372D000
direct allocation
page read and write
43A000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
541C000
unkown
page execute and read and write
C50000
unkown
page readonly
2C11000
heap
page read and write
2C11000
heap
page read and write
45A000
heap
page read and write
2D81000
heap
page read and write
A3A000
stack
page read and write
400000
unkown
page readonly
30000
unkown
page readonly
AA000
stack
page read and write
3BE4000
unclassified section
page read and write
2C11000
heap
page read and write
2FC0000
trusted library allocation
page execute and read and write
2C11000
heap
page read and write
9FC000
stack
page read and write
19451FF000
stack
page read and write
E25000
heap
page read and write
2C11000
heap
page read and write
2DF1000
heap
page read and write
D70000
heap
page read and write
E25000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
29E000
unkown
page readonly
7A05000
heap
page read and write
3929000
heap
page read and write
2C11000
heap
page read and write
1C397600000
heap
page read and write
FA0000
unkown
page readonly
A3A000
stack
page read and write
35E2000
unclassified section
page read and write
780000
unkown
page readonly
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
32FD000
direct allocation
page execute and read and write
2E46000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1C39900E000
trusted library allocation
page read and write
3800000
heap
page read and write
2D92000
heap
page read and write
2C11000
heap
page read and write
4BFE000
stack
page read and write
3213000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2F90000
direct allocation
page read and write
34C000
unkown
page read and write
C8D000
heap
page read and write
2C11000
heap
page read and write
C38000
heap
page read and write
23B2000
unkown
page read and write
2D8C000
heap
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
2C11000
heap
page read and write
2E57000
heap
page read and write
2C11000
heap
page read and write
6EB000
stack
page read and write
7A16000
heap
page read and write
3213000
heap
page read and write
3583000
direct allocation
page read and write
F40000
unkown
page read and write
2C11000
heap
page read and write
3501000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
7A82000
heap
page read and write
CED000
heap
page read and write
3729000
direct allocation
page read and write
2C11000
heap
page read and write
3417000
heap
page read and write
31CC000
stack
page read and write
B60000
unkown
page readonly
C7B000
heap
page read and write
1AC000
stack
page read and write
1F1000
unkown
page execute read
2C11000
heap
page read and write
27F0000
heap
page read and write
2DEE000
heap
page read and write
37EE000
direct allocation
page read and write
3512000
direct allocation
page execute and read and write
2C11000
heap
page read and write
3110000
heap
page read and write
3583000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3729000
direct allocation
page read and write
2F40000
direct allocation
page read and write
3D50000
unclassified section
page execute and read and write
420000
unkown
page read and write
CEC000
stack
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
F70000
unkown
page readonly
3405000
heap
page read and write
2C11000
heap
page read and write
2D88000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
951000
unkown
page readonly
392D000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
34B0000
direct allocation
page read and write
7A0000
unkown
page readonly
2C11000
heap
page read and write
3114000
heap
page read and write
1E0000
unkown
page readonly
1C398E60000
trusted library allocation
page read and write
2C11000
heap
page read and write
2BC0000
heap
page read and write
F85000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3600000
direct allocation
page read and write
2C11000
heap
page read and write
2984000
heap
page read and write
1C39762C000
heap
page read and write
D60000
unkown
page read and write
2C11000
heap
page read and write
FA0000
unkown
page readonly
430000
heap
page read and write
380000
heap
page read and write
F85000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
7A26000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2DDD000
heap
page read and write
2D8C000
heap
page read and write
43E000
heap
page read and write
951000
unkown
page readonly
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
536000
heap
page read and write
2D78000
heap
page read and write
2980000
heap
page read and write
2C11000
heap
page read and write
17A24000
system
page read and write
D60000
unkown
page read and write
2C11000
heap
page read and write
1C3991CE000
trusted library allocation
page read and write
2C11000
heap
page read and write
17EF000
stack
page read and write
24CC000
unkown
page read and write
2C11000
heap
page read and write
2E7F000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
E29000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
DF4000
system
page execute and read and write
2F2A000
unkown
page read and write
2C11000
heap
page read and write
1C3991BE000
trusted library allocation
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
D2A000
stack
page read and write
1E0000
unkown
page readonly
C38000
heap
page read and write
2C11000
heap
page read and write
320000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
F40000
unkown
page read and write
35D3000
direct allocation
page read and write
37FF000
stack
page read and write
2C11000
heap
page read and write
7C3E000
stack
page read and write
2D92000
heap
page read and write
420000
unkown
page read and write
3460000
direct allocation
page read and write
3028000
heap
page read and write
7B00000
trusted library allocation
page read and write
B50000
unkown
page readonly
37EE000
direct allocation
page read and write
17362000
system
page read and write
2F90000
direct allocation
page read and write
2E1C000
heap
page read and write
40000
unkown
page readonly
2D30000
trusted library allocation
page read and write
2C11000
heap
page read and write
2E04000
heap
page read and write
2C11000
heap
page read and write
F7E000
unkown
page readonly
2C11000
heap
page read and write
379E000
direct allocation
page read and write
B2E000
stack
page read and write
BF0000
unkown
page read and write
B50000
unkown
page readonly
2D10000
trusted library allocation
page read and write
2C11000
heap
page read and write
1C3975D0000
heap
page read and write
3600000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
7A13000
heap
page read and write
9CE000
stack
page read and write
C38000
heap
page read and write
806F000
stack
page read and write
37EE000
direct allocation
page read and write
F87000
unkown
page readonly
2C11000
heap
page read and write
3405000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
BBE000
stack
page read and write
2C11000
heap
page read and write
1C398E50000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2BC4000
heap
page read and write
1C39761C000
heap
page read and write
20000
unkown
page readonly
349D000
direct allocation
page execute and read and write
2C11000
heap
page read and write
3D90000
unkown
page execute and read and write
2C11000
heap
page read and write
F85000
unkown
page read and write
2C11000
heap
page read and write
C50000
unkown
page readonly
2C11000
heap
page read and write
C2F000
stack
page read and write
2C11000
heap
page read and write
64E000
stack
page read and write
2C11000
heap
page read and write
7A97000
heap
page read and write
20000
unkown
page readonly
DE4000
system
page execute and read and write
2C11000
heap
page read and write
3729000
direct allocation
page read and write
330000
heap
page read and write
31D0000
direct allocation
page execute and read and write
2472000
unkown
page read and write
2C06000
unkown
page read and write
3390000
unkown
page execute and read and write
2C11000
heap
page read and write
D40000
unkown
page readonly
1AC000
stack
page read and write
2C11000
heap
page read and write
7A0000
unkown
page readonly
B3C000
stack
page read and write
3417000
heap
page read and write
E0E000
stack
page read and write
2C11000
heap
page read and write
1C3991C4000
trusted library allocation
page read and write
3600000
direct allocation
page read and write
2DF1000
heap
page read and write
379E000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
37D000
stack
page read and write
2E33000
heap
page read and write
1C398F00000
trusted library allocation
page read and write
802E000
stack
page read and write
C2F000
stack
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
F87000
unkown
page readonly
3200000
heap
page read and write
2C11000
heap
page read and write
36FF000
stack
page read and write
2D30000
trusted library allocation
page read and write
BD1000
unkown
page readonly
3779000
direct allocation
page read and write
FA1000
unkown
page readonly
C83000
heap
page read and write
2C11000
heap
page read and write
7A28000
heap
page read and write
2C11000
heap
page read and write
728000
stack
page read and write
2C11000
heap
page read and write
268C000
unkown
page read and write
BFE000
heap
page read and write
E90000
unkown
page read and write
C37000
heap
page read and write
399E000
heap
page read and write
30EE000
stack
page read and write
2F10000
trusted library allocation
page read and write
7C7F000
stack
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
F7E000
unkown
page readonly
17422000
system
page read and write
C30000
unkown
page read and write
2C11000
heap
page read and write
336E000
direct allocation
page execute and read and write
2D9D000
heap
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
2DE3000
heap
page read and write
2E0F000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2D8C000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3412000
heap
page read and write
372D000
direct allocation
page read and write
2D98000
unkown
page read and write
2C11000
heap
page read and write
D70000
heap
page read and write
377D000
direct allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
7A5E000
heap
page read and write
2AF000
unkown
page write copy
B40000
unkown
page readonly
2C11000
heap
page read and write
30000
unkown
page readonly
C50000
unkown
page readonly
7B10000
trusted library allocation
page read and write
1C398E60000
trusted library allocation
page read and write
2C11000
heap
page read and write
3460000
direct allocation
page read and write
80AE000
stack
page read and write
D40000
unkown
page readonly
1C399011000
trusted library allocation
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
7A21000
heap
page read and write
DB0000
heap
page read and write
C1D000
heap
page read and write
2C11000
heap
page read and write
2DF7000
heap
page read and write
3213000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
49AA000
unkown
page execute and read and write
1763C000
system
page read and write
780000
unkown
page readonly
C68000
heap
page read and write
1C399003000
trusted library allocation
page read and write
C4E000
stack
page read and write
B70000
heap
page read and write
318C000
stack
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
750000
unkown
page readonly
F87000
unkown
page readonly
2C11000
heap
page read and write
2E4D000
heap
page read and write
2C11000
heap
page read and write
9DB000
stack
page read and write
7A72000
heap
page read and write
2C11000
heap
page read and write
F85000
unkown
page read and write
7A58000
heap
page read and write
189000
stack
page read and write
F70000
unkown
page readonly
283F000
stack
page read and write
C68000
heap
page read and write
2C11000
heap
page read and write
2E04000
heap
page read and write
7A54000
heap
page read and write
2980000
heap
page read and write
3080000
direct allocation
page read and write
E00000
system
page execute and read and write
3202000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1C399101000
trusted library allocation
page read and write
2840000
heap
page read and write
AA000
stack
page read and write
DD0000
direct allocation
page read and write
5150000
unclassified section
page execute and read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
410000
heap
page read and write
74F000
stack
page read and write
3650000
direct allocation
page read and write
32F9000
direct allocation
page execute and read and write
F7E000
unkown
page readonly
5FE0000
trusted library allocation
page read and write
2C11000
heap
page read and write
34B0000
direct allocation
page read and write
C8E000
heap
page read and write
372D000
direct allocation
page read and write
2DFB000
heap
page read and write
37FC000
unclassified section
page read and write
2C11000
heap
page read and write
1330000
unkown
page readonly
2C11000
heap
page read and write
D80000
heap
page read and write
3B2D000
direct allocation
page execute and read and write
3F08000
unclassified section
page read and write
2C11000
heap
page read and write
2850000
unkown
page readonly
2DF7000
heap
page read and write
7A85000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3CCD000
direct allocation
page execute and read and write
2C11000
heap
page read and write
B50000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3522000
unclassified section
page read and write
2C11000
heap
page read and write
43A000
heap
page read and write
1C3974F0000
heap
page read and write
2C11000
heap
page read and write
1C397459000
system
page execute and read and write
B60000
unkown
page readonly
2C11000
heap
page read and write
BFA000
heap
page read and write
34B0000
direct allocation
page read and write
2C11000
heap
page read and write
2A74000
unkown
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3D76000
unclassified section
page read and write
268C000
unkown
page read and write
19449FE000
stack
page read and write
BD1000
unkown
page readonly
3213000
heap
page read and write
3400000
heap
page read and write
C83000
heap
page read and write
2C11000
heap
page read and write
BF0000
unkown
page read and write
EF4000
heap
page read and write
2990000
unkown
page execute and read and write
530000
heap
page read and write
2E26000
heap
page read and write
2840000
heap
page read and write
C60000
heap
page read and write
2C11000
heap
page read and write
2DEE000
heap
page read and write
7A3A000
heap
page read and write
2D8C000
heap
page read and write
2F90000
direct allocation
page read and write
F71000
unkown
page execute read
3155000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
1C397607000
heap
page read and write
27D000
unkown
page readonly
2C11000
heap
page read and write
2C11000
heap
page read and write
7A4E000
heap
page read and write
2C11000
heap
page read and write
750000
unkown
page readonly
1F1000
unkown
page execute read
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
2E15000
heap
page read and write
2C11000
heap
page read and write
35D3000
direct allocation
page read and write
2C11000
heap
page read and write
CEE000
heap
page read and write
363C000
unclassified section
page read and write
2FA2000
heap
page read and write
13EE000
stack
page read and write
7A1B000
heap
page read and write
3650000
direct allocation
page read and write
409A000
unclassified section
page read and write
3600000
heap
page read and write
3583000
direct allocation
page read and write
2D30000
trusted library allocation
page read and write
2D8C000
heap
page read and write
F87000
unkown
page readonly
64E000
stack
page read and write
7A95000
heap
page read and write
2BC4000
heap
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
4CFF000
stack
page read and write
1330000
unkown
page readonly
C30000
unkown
page read and write
1F0000
unkown
page readonly
2E51000
heap
page read and write
19441FD000
stack
page read and write
2C11000
heap
page read and write
3650000
direct allocation
page read and write
CED000
heap
page read and write
7A8F000
heap
page read and write
E4E000
stack
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
E02000
system
page execute and read and write
3460000
direct allocation
page read and write
3213000
heap
page read and write
BC0000
unkown
page read and write
2C11000
heap
page read and write
F71000
unkown
page execute read
C99000
heap
page read and write
2BC4000
heap
page read and write
2C11000
heap
page read and write
2C11000
heap
page read and write
3801000
heap
page read and write
3D42000
direct allocation
page execute and read and write
7A30000
heap
page read and write
2C11000
heap
page read and write
2B4000
unkown
page readonly
377D000
direct allocation
page read and write
2E21000
heap
page read and write
817F000
stack
page read and write
2BA0000
heap
page read and write
3213000
heap
page read and write
2C11000
heap
page read and write
2C10000
heap
page read and write
2C11000
heap
page read and write
3213000
heap
page read and write
FA0000
unkown
page readonly
1C399021000
trusted library allocation
page read and write
3779000
direct allocation
page read and write
790000
unkown
page readonly
2C11000
heap
page read and write
3CD1000
direct allocation
page execute and read and write
B3C000
stack
page read and write
1C399000000
trusted library allocation
page read and write
BE0000
heap
page read and write
2C11000
heap
page read and write
C7B000
heap
page read and write
5DDC000
unclassified section
page execute and read and write
2984000
heap
page read and write
2C11000
heap
page read and write
530000
heap
page read and write
There are 672 hidden memdumps, click here to show them.