IOC Report
FACTURA 24V70 VINS.exe

loading gif

Files

File Path
Type
Category
Malicious
FACTURA 24V70 VINS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FACTURA 24V70 VINS.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\n-T73hKo
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FACTURA 24V70 VINS.exe
"C:\Users\user\Desktop\FACTURA 24V70 VINS.exe"
malicious
C:\Users\user\Desktop\FACTURA 24V70 VINS.exe
"C:\Users\user\Desktop\FACTURA 24V70 VINS.exe"
malicious
C:\Program Files (x86)\KsAbjxnfRomHREeeFwXVZZDoIDFHmaxVzTjxOZcfPwBquTNWSye\fXZvHKoWCzop.exe
"C:\Program Files (x86)\KsAbjxnfRomHREeeFwXVZZDoIDFHmaxVzTjxOZcfPwBquTNWSye\fXZvHKoWCzop.exe"
malicious
C:\Windows\SysWOW64\cacls.exe
"C:\Windows\SysWOW64\cacls.exe"
malicious
C:\Program Files (x86)\KsAbjxnfRomHREeeFwXVZZDoIDFHmaxVzTjxOZcfPwBquTNWSye\fXZvHKoWCzop.exe
"C:\Program Files (x86)\KsAbjxnfRomHREeeFwXVZZDoIDFHmaxVzTjxOZcfPwBquTNWSye\fXZvHKoWCzop.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.hellogus.online/zrnp/?0dfXG=7dvP3oKbkgtActo7X+aB5i8XRavAV5IyhK19vEIy5gkELgbrMMXbl9nvhn4QjRtqjZGCw7A4nUi7FbRpiGaR0ExHc3mJnAhEafCzKEQKll8qfESIyEeBcE8V5iUbRPjYsxxHG3c=&U0W=7ROlj
209.74.64.190
malicious
http://www.wiretap.digital/lbm4/
3.33.130.190
malicious
http://www.funddata-x.net/ktuy/?U0W=7ROlj&0dfXG=652DQ4wRyI2XhVz/YhB0IQPCvW3zE+wrC97TZKhiuJWrpaOjtOEU/fEJ0zut8nj2vm3uuaJhtQEDGSF/YMgRQz9E7T0dRnILtzW899MV4oEvPyMvvne8hVkOXAeZd0jlejfVwHA=
3.33.130.190
malicious
http://www.tanjavanlaar.online/x6qo/
213.249.67.10
malicious
http://www.tanjavanlaar.online/x6qo/?0dfXG=LYoYqqsXSyXZ912d02KeRxWxUajovPP+KCE++TS9h3rijU4gS1lBkAl2SxoHngebSXZzdlj5br48AWpKGxuZwHFzrTAaxdvQ/X7He5kEj4NwOXn+jWKWbQEmUjM4tYdd4DTDmwg=&U0W=7ROlj
213.249.67.10
malicious
http://www.nieuws-july202502.sbs/vt2q/?0dfXG=NeoW3ZpGNhFVpRE+iGe18olEV8dN0FIDCvpVAutU77D6mk6iXiXc50i5bVx+uujx/SS4gHQAhcY6fImMEntZJ64couIpYsJtCpfvEgcpegPN4ht4aXCPY1AcPZvlMYHCMmAE9mg=&U0W=7ROlj
162.0.229.222
malicious
http://www.impulsarnegocios.info/bpal/?0dfXG=VMgVOaCh3mm+GdPlwv+P/XKcyqoSqp/AEn6p1isqCLPz7ObQC9Sqz3hudnfRRQZjENudSaBoMynPI/uiESQeR0wcE+BMO0b1K91MeQYvtVLH9vcXww6dd1bPq3nzmSOiSfDHfUE=&U0W=7ROlj
3.33.130.190
malicious
http://www.hellogus.online/zrnp/
209.74.64.190
malicious
http://www.kuaimaolife.shop/wlzg/?0dfXG=c08zQlMNeTS9mFjcPTIyFfA1amU1nGqngy7ufrhJTucKXTiOjnqlR7bZNhOZWme4Y5s9JAieBcHnX0Bnfm5WdfKnufcgj0lRy4Tut92jAo5YyVSLqem1aQwSKpkntqqW/GXfj2I=&U0W=7ROlj
92.118.228.160
malicious
http://www.impulsarnegocios.info/bpal/
3.33.130.190
malicious
http://www.accupower.tech/bruv/
217.160.0.158
malicious
http://www.kuaimaolife.shop/wlzg/
92.118.228.160
malicious
http://www.accupower.tech/bruv/?0dfXG=m8AssDc9uWk0x9GHCTrZnR9Y2jIcSn1GjYx2w9avnpMe4W6VVreO1nGOBjertTgGFNtTfqQ2X/AnqGB7Ol5o31E7begEaRgXS9U7KwBR2U2mwEb1+OLmP0VxkBeeDW6FuSeEkXI=&U0W=7ROlj
217.160.0.158
malicious
http://www.funddata-x.net/ktuy/
3.33.130.190
malicious
http://www.nieuws-july202502.sbs/vt2q/
162.0.229.222
malicious
http://www.wiretap.digital/lbm4/?0dfXG=b6KmuAKoHDfmH6wBa4Iuhs+4qAfci8KJxStQSrt0xRWxrI04LbR2sZmSZHliQZPsTEeCyhZmzit1d7xvCBPKA7cM2dH3/rnJzTWpKXRa2CCyGb+HtjdcybjYJ406KzLAcPDnEDo=&U0W=7ROlj
3.33.130.190
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://www.hellogus.online
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://github.com/necolas/normalize.css
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
accupower.tech
217.160.0.158
malicious
funddata-x.net
3.33.130.190
malicious
wiretap.digital
3.33.130.190
malicious
www.tanjavanlaar.online
213.249.67.10
malicious
nieuws-july202502.sbs
162.0.229.222
malicious
www.iwhfa.fyi
168.206.11.225
malicious
impulsarnegocios.info
3.33.130.190
malicious
www.kuaimaolife.shop
92.118.228.160
malicious
www.hellogus.online
209.74.64.190
malicious
www.nieuws-july202502.sbs
unknown
malicious
www.wiretap.digital
unknown
malicious
www.impulsarnegocios.info
unknown
malicious
www.funddata-x.net
unknown
malicious
www.o30cf998d.cfd
unknown
malicious
www.accupower.tech
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
213.249.67.10
www.tanjavanlaar.online
Netherlands
malicious
168.206.11.225
www.iwhfa.fyi
South Africa
malicious
217.160.0.158
accupower.tech
Germany
malicious
162.0.229.222
nieuws-july202502.sbs
Canada
malicious
92.118.228.160
www.kuaimaolife.shop
Latvia
malicious
209.74.64.190
www.hellogus.online
United States
malicious
3.33.130.190
funddata-x.net
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3580000
trusted library allocation
page read and write
malicious
3530000
trusted library allocation
page read and write
malicious
880000
system
page execute and read and write
malicious
2D90000
system
page execute and read and write
malicious
2F50000
unclassified section
page execute and read and write
malicious
3690000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1620000
unclassified section
page execute and read and write
malicious
E81000
unkown
page readonly
14978AAF000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
4D8C000
stack
page read and write
3180000
heap
page read and write
786F000
trusted library allocation
page read and write
2DE0000
heap
page read and write
3361000
heap
page read and write
5A0000
heap
page read and write
260000
unkown
page readonly
3361000
heap
page read and write
3487000
heap
page read and write
3184000
heap
page read and write
3361000
heap
page read and write
5CB0000
trusted library allocation
page read and write
2582000
unkown
page read and write
3361000
heap
page read and write
56C0000
heap
page read and write
BAD0000
heap
page read and write
3361000
heap
page read and write
D9C000
stack
page read and write
55E1000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
3361000
heap
page read and write
3184000
heap
page read and write
8313000
heap
page read and write
8352000
heap
page read and write
1700000
direct allocation
page execute and read and write
14F0000
trusted library allocation
page read and write
8A4F000
stack
page read and write
3361000
heap
page read and write
E51000
unkown
page execute read
3A689FE000
stack
page read and write
3361000
heap
page read and write
2430000
heap
page read and write
3361000
heap
page read and write
18E7000
heap
page read and write
31D6000
heap
page read and write
11D7000
heap
page read and write
260000
unkown
page readonly
13A0000
heap
page read and write
3742000
unkown
page read and write
E65000
unkown
page read and write
3239000
heap
page read and write
E81000
unkown
page readonly
3361000
heap
page read and write
113E000
stack
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
82D6000
heap
page read and write
318F000
heap
page read and write
3361000
heap
page read and write
4E24000
unclassified section
page read and write
14976D50000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
14B0000
trusted library allocation
page read and write
3248000
heap
page read and write
3680000
trusted library allocation
page read and write
325E000
heap
page read and write
11D0000
heap
page read and write
95AE000
stack
page read and write
90000
unkown
page readonly
D32000
unkown
page readonly
3178000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
67F0000
trusted library allocation
page read and write
3361000
heap
page read and write
1610000
heap
page read and write
2FDE000
stack
page read and write
31F7000
heap
page read and write
3361000
heap
page read and write
7500000
heap
page read and write
31EA000
heap
page read and write
14978660000
trusted library allocation
page read and write
31F7000
heap
page read and write
74DE000
stack
page read and write
DA0000
unkown
page read and write
3464000
heap
page read and write
182D000
direct allocation
page execute and read and write
3244000
heap
page read and write
D80000
unkown
page readonly
3361000
heap
page read and write
430000
unkown
page readonly
781F000
stack
page read and write
3680000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
5CA0000
trusted library allocation
page read and write
2582000
unkown
page read and write
3361000
heap
page read and write
14D2000
trusted library allocation
page read and write
3361000
heap
page read and write
754B000
heap
page read and write
496E000
unclassified section
page read and write
DA0000
unkown
page read and write
3361000
heap
page read and write
351F000
heap
page read and write
3361000
heap
page read and write
55C4000
trusted library allocation
page read and write
3361000
heap
page read and write
BF4000
heap
page read and write
1FC000
stack
page read and write
5B1D000
stack
page read and write
3361000
heap
page read and write
7FDF000
stack
page read and write
7610000
trusted library allocation
page read and write
1B50000
unclassified section
page execute and read and write
7EDE000
stack
page read and write
3361000
heap
page read and write
38D4000
unkown
page read and write
3189000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
BF4000
heap
page read and write
580000
unkown
page read and write
30EA000
unclassified section
page execute and read and write
2642000
unkown
page read and write
3A20000
trusted library allocation
page execute and read and write
3030000
heap
page read and write
DF0000
heap
page read and write
3361000
heap
page read and write
640000
unkown
page readonly
82C4000
heap
page read and write
3361000
heap
page read and write
811E000
stack
page read and write
D00000
unkown
page readonly
569C000
unkown
page execute and read and write
3192000
heap
page read and write
14976CAA000
system
page execute and read and write
3A671FC000
stack
page read and write
8319000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
6D0000
unkown
page readonly
2F7E000
stack
page read and write
13AE000
heap
page read and write
3361000
heap
page read and write
364C000
heap
page read and write
2290000
unkown
page execute and read and write
55E6000
trusted library allocation
page read and write
144A000
heap
page read and write
36BD000
heap
page read and write
3361000
heap
page read and write
980000
unkown
page readonly
3361000
heap
page read and write
BE0D000
stack
page read and write
3350000
heap
page read and write
14978ACE000
trusted library allocation
page read and write
3361000
heap
page read and write
189E000
direct allocation
page execute and read and write
3361000
heap
page read and write
1510000
trusted library allocation
page read and write
7972000
trusted library allocation
page read and write
833D000
heap
page read and write
5B20000
heap
page read and write
2F90000
trusted library allocation
page execute and read and write
5650000
trusted library allocation
page read and write
14978660000
trusted library allocation
page read and write
7620000
trusted library allocation
page execute and read and write
320D000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
6AAE000
stack
page read and write
324A000
heap
page read and write
37F9000
direct allocation
page execute and read and write
386E000
direct allocation
page execute and read and write
70000
unkown
page readonly
7F670000
trusted library allocation
page execute and read and write
5652000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
4C92000
unclassified section
page read and write
5630000
heap
page read and write
3AD2000
unclassified section
page read and write
6A0000
unkown
page read and write
1187000
stack
page read and write
270000
unkown
page readonly
5660000
trusted library allocation
page read and write
3361000
heap
page read and write
BF0000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
130E000
stack
page read and write
6A9C000
unkown
page execute and read and write
3361000
heap
page read and write
5700000
heap
page read and write
3361000
heap
page read and write
8DF000
system
page execute and read and write
6B0000
heap
page read and write
8340000
heap
page read and write
6DA000
heap
page read and write
3361000
heap
page read and write
4F5C000
unclassified section
page execute and read and write
3361000
heap
page read and write
E5E000
unkown
page readonly
14C6000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
55ED000
trusted library allocation
page read and write
3361000
heap
page read and write
460000
heap
page read and write
6B0000
unkown
page read and write
31E3000
heap
page read and write
70000
unkown
page readonly
6B8000
heap
page read and write
19C6000
direct allocation
page execute and read and write
1520000
heap
page read and write
18E0000
heap
page read and write
3361000
heap
page read and write
D40000
unkown
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
440000
unkown
page readonly
455C000
unclassified section
page execute and read and write
5A0000
heap
page read and write
3361000
heap
page read and write
14976E70000
heap
page read and write
389C000
unkown
page execute and read and write
610000
unkown
page readonly
13A8000
heap
page read and write
3361000
heap
page read and write
49D6000
trusted library allocation
page read and write
58E0000
heap
page read and write
2490000
unkown
page readonly
1497890F000
trusted library allocation
page read and write
2480000
heap
page read and write
620000
heap
page read and write
929C000
unkown
page execute and read and write
9C9C000
unkown
page execute and read and write
E5E000
unkown
page readonly
3361000
heap
page read and write
2F68000
unkown
page read and write
14978800000
trusted library allocation
page read and write
3361000
heap
page read and write
955C000
unclassified section
page execute and read and write
14AD000
trusted library allocation
page execute and read and write
3361000
heap
page read and write
44B8000
unclassified section
page read and write
2DE4000
heap
page read and write
3361000
heap
page read and write
399D000
direct allocation
page execute and read and write
31E0000
heap
page read and write
3361000
heap
page read and write
DF6000
unkown
page readonly
301E000
stack
page read and write
3361000
heap
page read and write
39A1000
direct allocation
page execute and read and write
8D5000
system
page execute and read and write
640000
unkown
page readonly
36CA2000
system
page read and write
2DE4000
heap
page read and write
14976CA7000
system
page execute and read and write
3361000
heap
page read and write
14DB000
trusted library allocation
page execute and read and write
3361000
heap
page read and write
3361000
heap
page read and write
12C0000
heap
page read and write
3141000
trusted library allocation
page read and write
8317000
heap
page read and write
3361000
heap
page read and write
2D58000
stack
page read and write
2C90000
unkown
page execute and read and write
3361000
heap
page read and write
650000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
82E2000
heap
page read and write
3360000
heap
page read and write
810000
unkown
page readonly
3206000
heap
page read and write
1B4F000
stack
page read and write
6D0000
unkown
page readonly
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
E67000
unkown
page readonly
3361000
heap
page read and write
3BEC000
unclassified section
page read and write
3B5C000
unclassified section
page execute and read and write
47DC000
unclassified section
page read and write
2F05000
trusted library allocation
page read and write
BF0000
heap
page read and write
3361000
heap
page read and write
1A48000
direct allocation
page execute and read and write
889C000
unkown
page execute and read and write
5B30000
heap
page read and write
3361000
heap
page read and write
6D5C000
unclassified section
page execute and read and write
270000
unkown
page readonly
E65000
unkown
page read and write
3200000
heap
page read and write
4141000
trusted library allocation
page read and write
3361000
heap
page read and write
80000
unkown
page readonly
2D1B000
stack
page read and write
82E0000
heap
page read and write
3361000
heap
page read and write
450000
unkown
page readonly
BD0D000
stack
page read and write
3361000
heap
page read and write
82D0000
heap
page read and write
7561000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
2550000
unclassified section
page execute and read and write
2DE4000
heap
page read and write
3189000
heap
page read and write
3361000
heap
page read and write
18C0000
trusted library allocation
page read and write
31E0000
heap
page read and write
2F10000
trusted library allocation
page read and write
952000
system
page execute and read and write
3361000
heap
page read and write
609C000
unkown
page execute and read and write
610000
unkown
page readonly
3361000
heap
page read and write
3361000
heap
page read and write
149C000
heap
page read and write
5640000
trusted library allocation
page execute and read and write
B81000
unkown
page readonly
3175000
trusted library allocation
page read and write
3361000
heap
page read and write
8EF000
system
page execute and read and write
810000
unkown
page readonly
3361000
heap
page read and write
8B5C000
unclassified section
page execute and read and write
3B92000
unclassified section
page read and write
146B000
heap
page read and write
3361000
heap
page read and write
8350000
heap
page read and write
FA000
stack
page read and write
3361000
heap
page read and write
6B0000
unkown
page read and write
4998000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
775C000
unclassified section
page execute and read and write
527C000
stack
page read and write
3361000
heap
page read and write
1390000
trusted library allocation
page read and write
440000
unkown
page readonly
3361000
heap
page read and write
3361000
heap
page read and write
31EA000
heap
page read and write
83D0000
trusted library allocation
page read and write
31D1000
heap
page read and write
55CB000
trusted library allocation
page read and write
2490000
unkown
page readonly
36D0000
direct allocation
page execute and read and write
3361000
heap
page read and write
3361000
heap
page read and write
700000
unkown
page read and write
3361000
heap
page read and write
10FB000
stack
page read and write
3DC000
stack
page read and write
1444000
heap
page read and write
7525000
heap
page read and write
13BF000
heap
page read and write
3A681FF000
stack
page read and write
3361000
heap
page read and write
14976D7A000
heap
page read and write
250000
unkown
page readonly
D80000
unkown
page readonly
3361000
heap
page read and write
630000
unkown
page readonly
3361000
heap
page read and write
E50000
unkown
page readonly
7270000
heap
page read and write
313E000
stack
page read and write
3361000
heap
page read and write
3225000
heap
page read and write
3361000
heap
page read and write
82D1000
heap
page read and write
3361000
heap
page read and write
700000
unkown
page read and write
85B0000
heap
page read and write
3217000
heap
page read and write
31E5000
heap
page read and write
8FB000
system
page execute and read and write
591000
unkown
page readonly
2F00000
trusted library allocation
page read and write
6A0000
unkown
page read and write
3648000
heap
page read and write
3361000
heap
page read and write
341E000
unkown
page read and write
315C000
unclassified section
page execute and read and write
3361000
heap
page read and write
31B9000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
B6F9000
trusted library allocation
page read and write
3361000
heap
page read and write
4326000
unclassified section
page read and write
162F000
stack
page read and write
3361000
heap
page read and write
14976D6C000
heap
page read and write
3361000
heap
page read and write
3460000
trusted library allocation
page read and write
E51000
unkown
page execute read
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
58E5000
heap
page read and write
E50000
unkown
page readonly
3361000
heap
page read and write
517C000
stack
page read and write
3361000
heap
page read and write
3A12000
direct allocation
page execute and read and write
14C2000
trusted library allocation
page read and write
82DB000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
2DA000
stack
page read and write
3361000
heap
page read and write
31D6000
heap
page read and write
626000
heap
page read and write
2434000
heap
page read and write
815C000
unclassified section
page execute and read and write
630000
unkown
page readonly
3170000
heap
page read and write
5680000
trusted library allocation
page read and write
14CA000
trusted library allocation
page execute and read and write
3361000
heap
page read and write
14978911000
trusted library allocation
page read and write
14976D59000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
460000
heap
page read and write
14976C50000
system
page execute and read and write
3361000
heap
page read and write
1FC000
stack
page read and write
3361000
heap
page read and write
19CD000
direct allocation
page execute and read and write
1140000
heap
page read and write
14A4000
trusted library allocation
page read and write
14978640000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
6B0000
heap
page read and write
108A000
stack
page read and write
33BD000
trusted library allocation
page read and write
14D7000
trusted library allocation
page execute and read and write
135E000
stack
page read and write
7860000
trusted library allocation
page read and write
650000
heap
page read and write
620000
heap
page read and write
801E000
stack
page read and write
35B0000
unkown
page read and write
3361000
heap
page read and write
6E0000
heap
page read and write
771E000
stack
page read and write
3361000
heap
page read and write
7E9C000
unkown
page execute and read and write
3361000
heap
page read and write
1310000
heap
page read and write
8A0E000
stack
page read and write
738000
heap
page read and write
35D0000
trusted library allocation
page read and write
4B00000
unclassified section
page read and write
82E5000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
14976D5E000
heap
page read and write
172E000
stack
page read and write
15A0000
direct allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
E67000
unkown
page readonly
3361000
heap
page read and write
56E0000
trusted library allocation
page execute and read and write
328C000
unkown
page read and write
55DE000
trusted library allocation
page read and write
285C000
unkown
page read and write
3361000
heap
page read and write
82E8000
heap
page read and write
58DC000
stack
page read and write
D20000
unkown
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
8343000
heap
page read and write
5703000
heap
page read and write
14978ABE000
trusted library allocation
page read and write
3361000
heap
page read and write
2480000
heap
page read and write
8336000
heap
page read and write
3361000
heap
page read and write
269C000
unkown
page read and write
E5E000
unkown
page readonly
591000
unkown
page readonly
3361000
heap
page read and write
595C000
unclassified section
page execute and read and write
3361000
heap
page read and write
E50000
unkown
page readonly
159F000
stack
page read and write
3189000
heap
page read and write
815E000
stack
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
56A0000
trusted library section
page readonly
73C000
heap
page read and write
1500000
trusted library allocation
page execute and read and write
E81000
unkown
page readonly
3189000
heap
page read and write
B81000
unkown
page readonly
2F30000
heap
page execute and read and write
3361000
heap
page read and write
3361000
heap
page read and write
37FD000
direct allocation
page execute and read and write
1829000
direct allocation
page execute and read and write
13C6000
heap
page read and write
3361000
heap
page read and write
4149000
trusted library allocation
page read and write
1150000
heap
page read and write
4C9C000
unkown
page execute and read and write
3361000
heap
page read and write
3361000
heap
page read and write
317E000
heap
page read and write
3361000
heap
page read and write
3DAC000
unclassified section
page read and write
3361000
heap
page read and write
E81000
unkown
page readonly
3188000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
55C0000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
36BE2000
system
page read and write
E51000
unkown
page execute read
3361000
heap
page read and write
14978AC4000
trusted library allocation
page read and write
3361000
heap
page read and write
E67000
unkown
page readonly
3185000
heap
page read and write
710000
heap
page read and write
14978660000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
14A0000
trusted library allocation
page read and write
3361000
heap
page read and write
710000
heap
page read and write
19B1000
direct allocation
page execute and read and write
80000
unkown
page readonly
3361000
heap
page read and write
82D1000
heap
page read and write
14BD000
trusted library allocation
page execute and read and write
3361000
heap
page read and write
7600000
trusted library allocation
page execute and read and write
429C000
unkown
page execute and read and write
785E000
stack
page read and write
3361000
heap
page read and write
1497890A000
trusted library allocation
page read and write
718000
heap
page read and write
3361000
heap
page read and write
13D5000
heap
page read and write
3361000
heap
page read and write
149787E0000
heap
page read and write
430000
unkown
page readonly
13A0000
heap
page read and write
14976D7F000
heap
page read and write
31D1000
heap
page read and write
3140000
heap
page read and write
3150000
heap
page read and write
3020000
heap
page read and write
3189000
heap
page read and write
119E000
stack
page read and write
5B50000
heap
page read and write
82EA000
heap
page read and write
2DD6000
unkown
page read and write
8349000
heap
page read and write
DEC000
stack
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
718000
heap
page read and write
14978900000
trusted library allocation
page read and write
3361000
heap
page read and write
13E0000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3210000
heap
page read and write
E50000
unkown
page readonly
3181000
heap
page read and write
E65000
unkown
page read and write
36EBC000
system
page read and write
82F4000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
90000
unkown
page readonly
832D000
heap
page read and write
980000
unkown
page readonly
3361000
heap
page read and write
7569000
heap
page read and write
2DA000
stack
page read and write
D30000
unkown
page readonly
D20000
unkown
page read and write
18D0000
trusted library allocation
page read and write
3A679FE000
stack
page read and write
7D50000
trusted library section
page read and write
3361000
heap
page read and write
73DE000
stack
page read and write
3364000
heap
page read and write
11E0000
heap
page read and write
3361000
heap
page read and write
2434000
heap
page read and write
13E2000
heap
page read and write
FA000
stack
page read and write
970000
unkown
page read and write
E51000
unkown
page execute read
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
635C000
unclassified section
page execute and read and write
6B8000
heap
page read and write
BCCD000
stack
page read and write
382A000
unkown
page execute and read and write
3361000
heap
page read and write
580000
unkown
page read and write
7511000
heap
page read and write
D00000
unkown
page readonly
6AEE000
stack
page read and write
323F000
heap
page read and write
3361000
heap
page read and write
2430000
heap
page read and write
318A000
heap
page read and write
3361000
heap
page read and write
5970000
heap
page read and write
450000
unkown
page readonly
3361000
heap
page read and write
14978921000
trusted library allocation
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
250000
unkown
page readonly
3361000
heap
page read and write
749C000
unkown
page execute and read and write
3361000
heap
page read and write
3361000
heap
page read and write
E5E000
unkown
page readonly
31E3000
heap
page read and write
E67000
unkown
page readonly
6CF000
heap
page read and write
56B0000
heap
page read and write
3DC000
stack
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
8308000
heap
page read and write
14976D40000
heap
page read and write
830E000
heap
page read and write
317E000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
3361000
heap
page read and write
14976D81000
heap
page read and write
14978913000
trusted library allocation
page read and write
14978A01000
trusted library allocation
page read and write
3361000
heap
page read and write
74E0000
trusted library section
page read and write
31E5000
heap
page read and write
E65000
unkown
page read and write
285C000
unkown
page read and write
5C90000
trusted library allocation
page read and write
318F000
heap
page read and write
14978903000
trusted library allocation
page read and write
3361000
heap
page read and write
14D0000
trusted library allocation
page read and write
14A3000
trusted library allocation
page execute and read and write
56D0000
heap
page execute and read and write
3361000
heap
page read and write
7521000
heap
page read and write
There are 691 hidden memdumps, click here to show them.