IOC Report
FACTURA PROFORMA MATRICULACI#U00d3N.exe

loading gif

Files

File Path
Type
Category
Malicious
FACTURA PROFORMA MATRICULACI#U00d3N.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\steelmake\bimlet\Reorganisere.Cir
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\steelmake\bimlet\closico.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 1000x1080, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\steelmake\bimlet\gangtj.rem
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\steelmake\bimlet\mytologiernes.mam
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\steelmake\bimlet\prosadigtets.Udt
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\steelmake\bimlet\unexpansively.hom
data
dropped
C:\Users\user\AppData\Local\Temp\aw8-5Gi
SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\nskBC9B.tmp\LangDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskBC9B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\militriskes.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FACTURA PROFORMA MATRICULACI#U00d3N.exe
"C:\Users\user\Desktop\FACTURA PROFORMA MATRICULACI#U00d3N.exe"
malicious
C:\Users\user\Desktop\FACTURA PROFORMA MATRICULACI#U00d3N.exe
"C:\Users\user\Desktop\FACTURA PROFORMA MATRICULACI#U00d3N.exe"
malicious
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
"C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s
malicious
C:\Windows\SysWOW64\rasphone.exe
"C:\Windows\SysWOW64\rasphone.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.flourishno.life/qb00/?CQRx1OZ=y6RGjgI4rKy0Y6DzFnE4ds/DujDyIwFNLNdcR+n+evPAM1AFOC6aSjfWGX6bXFIk+vpsjJoo09/MZkArP0uBTPlzJhQmz/zjZXCfq3NAyoUHFZTw2iUqUnI=&arsF=q7myW0OKNmfa9
67.223.117.189
malicious
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://212.162.149.165/psKGLMYRljeu25.binE
unknown
http://212.162.149.165/psKGLMYRljeu25.bin9
unknown
http://212.162.149.165/
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://212.162.149.165/psKGLMYRljeu25.binu
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://212.162.149.165/psKGLMYRljeu25.bin
212.162.149.165
http://www.gopher.ftp://ftp.
unknown
http://212.162.149.165/Q
unknown
http://212.162.149.165/psKGLMYRljeu25.bino
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.flourishno.life
67.223.117.189
malicious
www.brunokito.cloud
unknown
www.fullhdfilmizlesene.uno
unknown

IPs

IP
Domain
Country
Malicious
67.223.117.189
www.flourishno.life
United States
malicious
212.162.149.165
unknown
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
1660000
remote allocation
page execute and read and write
malicious
8C45000
direct allocation
page execute and read and write
malicious
36460000
unclassified section
page execute and read and write
malicious
4730000
trusted library allocation
page read and write
malicious
4EB0000
direct allocation
page execute and read and write
malicious
29FF000
heap
page read and write
malicious
46E0000
trusted library allocation
page read and write
malicious
298E000
heap
page read and write
44D1000
heap
page read and write
4B0000
direct allocation
page read and write
258F000
unkown
page read and write
29FF000
heap
page read and write
298E000
heap
page read and write
44D1000
heap
page read and write
626000
unkown
page execute read
2629000
unkown
page read and write
5A45000
direct allocation
page execute and read and write
591000
heap
page read and write
44D1000
heap
page read and write
2627000
unkown
page read and write
79FA000
heap
page read and write
2566000
unkown
page read and write
25C4000
unkown
page read and write
29F8000
heap
page read and write
257A000
unkown
page read and write
4780000
trusted library allocation
page read and write
4C0000
direct allocation
page read and write
4665000
heap
page read and write
2595000
unkown
page read and write
3667B000
heap
page read and write
44D1000
heap
page read and write
6508000
heap
page read and write
56F000
heap
page read and write
44D1000
heap
page read and write
3601D000
stack
page read and write
258B000
unkown
page read and write
3C4B000
stack
page read and write
6680000
heap
page read and write
307B000
unkown
page read and write
44D1000
heap
page read and write
500000
unkown
page readonly
523000
heap
page read and write
25A4000
unkown
page read and write
9B0000
unkown
page read and write
510000
unkown
page readonly
25DB000
unkown
page read and write
4D0000
direct allocation
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
59A000
heap
page read and write
6579000
heap
page read and write
44D1000
heap
page read and write
259A000
unkown
page read and write
5BA000
heap
page read and write
25E7000
unkown
page read and write
37450000
unclassified section
page execute and read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
7A00000
heap
page read and write
401000
unkown
page execute read
430000
unkown
page read and write
2983000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
30000
heap
page read and write
44D1000
heap
page read and write
5045000
direct allocation
page execute and read and write
580000
heap
page read and write
2611000
unkown
page read and write
25E7000
unkown
page read and write
67C0000
direct allocation
page read and write
25DB000
unkown
page read and write
A30000
unkown
page read and write
7A06000
heap
page read and write
29F0000
heap
page read and write
25C0000
unkown
page read and write
35F5F000
stack
page read and write
44D1000
heap
page read and write
2620000
unkown
page read and write
2540000
heap
page read and write
68A000
heap
page read and write
35F5000
remote allocation
page execute and read and write
6495000
heap
page read and write
2A19000
heap
page read and write
26A0000
heap
page read and write
5B9000
heap
page read and write
57B000
heap
page read and write
460000
direct allocation
page read and write
510000
unkown
page readonly
87F000
stack
page read and write
23B0000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
7A20000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
580000
heap
page read and write
23A0000
unkown
page read and write
584000
heap
page read and write
6575000
heap
page read and write
523000
heap
page read and write
5AD000
heap
page read and write
44D1000
heap
page read and write
29F0000
heap
page read and write
2A3B000
heap
page read and write
3B4C000
stack
page read and write
44D1000
heap
page read and write
24C0000
unkown
page read and write
24BD000
stack
page read and write
598000
heap
page read and write
260C000
unkown
page read and write
258F000
unkown
page read and write
8D0000
unkown
page read and write
584000
heap
page read and write
58A000
heap
page read and write
44D1000
heap
page read and write
29C7000
heap
page read and write
A40000
unkown
page read and write
530000
heap
page read and write
44D1000
heap
page read and write
36700000
direct allocation
page execute and read and write
2B3F000
stack
page read and write
3639C000
stack
page read and write
2A5F000
heap
page read and write
44D1000
heap
page read and write
6564000
heap
page read and write
42C000
unkown
page read and write
2A0F000
heap
page read and write
29FF000
heap
page read and write
6580000
heap
page read and write
257E000
unkown
page read and write
44D1000
heap
page read and write
707E1000
unkown
page execute read
8C0000
unkown
page readonly
2A3F000
stack
page read and write
45D9000
heap
page read and write
520000
heap
page read and write
548000
heap
page read and write
657A000
heap
page read and write
44D1000
heap
page read and write
2585000
unkown
page read and write
654C000
heap
page read and write
3280000
unkown
page read and write
44D1000
heap
page read and write
6533000
heap
page read and write
13A000
stack
page read and write
6570000
heap
page read and write
3A66000
unkown
page read and write
815F000
stack
page read and write
6770000
direct allocation
page read and write
56F000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4780000
trusted library allocation
page read and write
36430000
direct allocation
page execute and read and write
58A000
heap
page read and write
807E000
stack
page read and write
6564000
heap
page read and write
3667F000
heap
page read and write
3295000
unkown
page read and write
584000
heap
page read and write
45E3000
heap
page read and write
2638000
unkown
page read and write
44D1000
heap
page read and write
7A76000
heap
page read and write
427000
unkown
page read and write
ABE000
stack
page read and write
8D0000
unkown
page read and write
29EB000
heap
page read and write
25F3000
unkown
page read and write
E41000
unkown
page readonly
2A4B000
heap
page read and write
66FE000
stack
page read and write
3292000
unkown
page read and write
4780000
trusted library allocation
page read and write
378C5000
unclassified section
page execute and read and write
2C7E000
stack
page read and write
540000
heap
page read and write
3A60000
unkown
page read and write
44D1000
heap
page read and write
2573000
unkown
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
98000
stack
page read and write
44D1000
heap
page read and write
6C0000
system
page execute and read and write
6497000
heap
page read and write
2983000
heap
page read and write
707E6000
unkown
page readonly
2627000
unkown
page read and write
25DE000
unkown
page read and write
29EB000
heap
page read and write
2390000
unkown
page read and write
493D000
direct allocation
page execute and read and write
44D1000
heap
page read and write
25E3000
unkown
page read and write
6E45000
direct allocation
page execute and read and write
369D0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
B50000
heap
page read and write
7C2C000
stack
page read and write
8BE000
stack
page read and write
25BA000
unkown
page read and write
401000
unkown
page execute read
360CE000
stack
page read and write
640000
heap
page read and write
44D1000
heap
page read and write
7A72000
heap
page read and write
480000
direct allocation
page read and write
2B3F000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
23FF000
stack
page read and write
29E6000
heap
page read and write
657F000
heap
page read and write
44D1000
heap
page read and write
663E000
stack
page read and write
40A000
unkown
page write copy
259D000
unkown
page read and write
673F000
stack
page read and write
44D1000
heap
page read and write
3B60000
unkown
page execute and read and write
273F000
stack
page read and write
540000
unkown
page read and write
44D1000
heap
page read and write
3280000
unkown
page read and write
4670000
heap
page read and write
44D1000
heap
page read and write
180000
unkown
page read and write
7CAE000
stack
page read and write
25EF000
unkown
page read and write
6750000
direct allocation
page read and write
49D5000
unkown
page execute and read and write
24A0000
heap
page read and write
9645000
direct allocation
page execute and read and write
7B00000
trusted library allocation
page read and write
44D1000
heap
page read and write
3220000
heap
page read and write
64E0000
direct allocation
page read and write
29F8000
heap
page read and write
24BD000
stack
page read and write
AB0000
unkown
page readonly
4F9C000
unclassified section
page read and write
57B000
heap
page read and write
44D1000
heap
page read and write
17F5000
remote allocation
page execute and read and write
584000
heap
page read and write
56F000
heap
page read and write
4E1000
unkown
page readonly
2629000
unkown
page read and write
5F2000
unkown
page execute read
68A000
heap
page read and write
80BF000
stack
page read and write
68C000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
470000
direct allocation
page read and write
3620F000
stack
page read and write
298A000
heap
page read and write
2994000
heap
page read and write
58A000
heap
page read and write
25E9000
unkown
page read and write
44D1000
heap
page read and write
667F000
stack
page read and write
3180000
unkown
page readonly
5EC000
unkown
page execute read
35F9E000
stack
page read and write
44D1000
heap
page read and write
707E4000
unkown
page readonly
255E000
unkown
page read and write
525000
heap
page read and write
5B9000
heap
page read and write
261C000
unkown
page read and write
2607000
unkown
page read and write
67A0000
direct allocation
page read and write
44D1000
heap
page read and write
7A65000
heap
page read and write
44D1000
heap
page read and write
2B7E000
stack
page read and write
58A000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
29FC000
heap
page read and write
2CC0000
heap
page read and write
44D1000
heap
page read and write
645E000
stack
page read and write
453000
unkown
page readonly
57B000
heap
page read and write
500000
direct allocation
page read and write
3785C000
unclassified section
page execute and read and write
7A23000
heap
page read and write
36120000
heap
page read and write
3A63000
unkown
page read and write
2595000
unkown
page read and write
29D7000
heap
page read and write
283F000
stack
page read and write
584000
heap
page read and write
5F0000
unkown
page execute read
44D1000
heap
page read and write
2970000
heap
page read and write
44D1000
heap
page read and write
257A000
unkown
page read and write
4792000
heap
page read and write
490000
direct allocation
page read and write
25CD000
unkown
page read and write
6574000
heap
page read and write
363AA000
heap
page read and write
2BBE000
stack
page read and write
25A1000
unkown
page read and write
44D1000
heap
page read and write
681E000
stack
page read and write
44D1000
heap
page read and write
29E6000
heap
page read and write
44D1000
heap
page read and write
2A3F000
stack
page read and write
44D1000
heap
page read and write
6564000
heap
page read and write
2A41000
heap
page read and write
260C000
unkown
page read and write
44D1000
heap
page read and write
29E1000
heap
page read and write
4A0000
direct allocation
page read and write
2960000
heap
page read and write
44D1000
heap
page read and write
7A33000
heap
page read and write
259D000
unkown
page read and write
A30000
unkown
page read and write
632000
heap
page read and write
281D2000
system
page read and write
5AD000
heap
page read and write
44D1000
heap
page read and write
3080000
unkown
page read and write
2898000
stack
page read and write
7845000
direct allocation
page execute and read and write
434000
unkown
page read and write
2930000
heap
page read and write
AB0000
unkown
page readonly
298C000
heap
page read and write
A10000
heap
page read and write
4939000
direct allocation
page execute and read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
2C3F000
stack
page read and write
580000
heap
page read and write
6569000
heap
page read and write
4F0000
direct allocation
page read and write
44D1000
heap
page read and write
293F000
stack
page read and write
44D1000
heap
page read and write
66C000
heap
page read and write
453000
unkown
page readonly
44D1000
heap
page read and write
44D1000
heap
page read and write
584000
heap
page read and write
56F000
heap
page read and write
10000
heap
page read and write
2994000
heap
page read and write
273F000
stack
page read and write
3281000
unkown
page read and write
5FA000
heap
page read and write
580000
heap
page read and write
811E000
stack
page read and write
2581000
unkown
page read and write
6530000
heap
page read and write
25A4000
unkown
page read and write
2607000
unkown
page read and write
44D1000
heap
page read and write
29D2000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
5EE000
unkown
page execute read
7A44000
heap
page read and write
2602000
unkown
page read and write
44D1000
heap
page read and write
25F8000
unkown
page read and write
25D2000
unkown
page read and write
591000
heap
page read and write
7A78000
heap
page read and write
283F000
stack
page read and write
29F3000
heap
page read and write
7A8A000
heap
page read and write
36829000
direct allocation
page execute and read and write
B55000
heap
page read and write
29DC000
heap
page read and write
298E000
heap
page read and write
149000
stack
page read and write
25C0000
unkown
page read and write
44D1000
heap
page read and write
A50000
unkown
page read and write
4D82000
unclassified section
page read and write
AC0000
heap
page read and write
44D1000
heap
page read and write
36A50000
unclassified section
page execute and read and write
5E8000
unkown
page execute read
44D1000
heap
page read and write
44D1000
heap
page read and write
26A4000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
259F000
unkown
page read and write
584000
heap
page read and write
2623000
unkown
page read and write
25E9000
unkown
page read and write
44D1000
heap
page read and write
6FF000
system
page execute and read and write
56F000
heap
page read and write
52D2000
system
page read and write
44D1000
heap
page read and write
19A000
stack
page read and write
49F5000
remote allocation
page execute and read and write
36552000
heap
page read and write
528000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
25A1000
unkown
page read and write
2623000
unkown
page read and write
44D1000
heap
page read and write
4CC2000
unclassified section
page read and write
AA0000
heap
page read and write
24C0000
unkown
page read and write
23B0000
heap
page read and write
44D1000
heap
page read and write
364CD000
heap
page read and write
2370000
unkown
page readonly
3FF5000
remote allocation
page execute and read and write
170000
direct allocation
page read and write
44D1000
heap
page read and write
6500000
heap
page read and write
44D1000
heap
page read and write
591000
heap
page read and write
727000
system
page execute and read and write
7A6A000
heap
page read and write
535000
heap
page read and write
25D6000
unkown
page read and write
44D1000
heap
page read and write
2250000
unkown
page read and write
263E000
unkown
page read and write
6562000
heap
page read and write
A50000
unkown
page read and write
44D1000
heap
page read and write
6780000
direct allocation
page read and write
28BB8000
system
page read and write
25AD000
unkown
page read and write
2573000
unkown
page read and write
44D1000
heap
page read and write
58A000
heap
page read and write
44D1000
heap
page read and write
257C000
unkown
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
408000
unkown
page readonly
6790000
direct allocation
page read and write
3629C000
stack
page read and write
25BA000
unkown
page read and write
7A1A000
heap
page read and write
369CC000
direct allocation
page execute and read and write
29FE000
heap
page read and write
44D1000
heap
page read and write
40A000
unkown
page write copy
6569000
heap
page read and write
56F000
heap
page read and write
44D1000
heap
page read and write
6480000
direct allocation
page read and write
6579000
heap
page read and write
2BF5000
remote allocation
page execute and read and write
47FD000
stack
page read and write
44D1000
heap
page read and write
401000
unkown
page execute read
57B000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
7A62000
heap
page read and write
453000
unkown
page readonly
5B0000
heap
page read and write
6B0000
unkown
page readonly
5F6000
heap
page read and write
44D1000
heap
page read and write
2602000
unkown
page read and write
649000
unkown
page execute read
44D1000
heap
page read and write
2638000
unkown
page read and write
44C0000
heap
page read and write
298E000
heap
page read and write
2350000
unkown
page read and write
8245000
direct allocation
page execute and read and write
597000
heap
page read and write
6760000
direct allocation
page read and write
293F000
stack
page read and write
2250000
unkown
page read and write
6830000
heap
page read and write
149000
stack
page read and write
496C000
unkown
page execute and read and write
259A000
unkown
page read and write
257E000
unkown
page read and write
4E1000
unkown
page readonly
636000
heap
page read and write
4B60000
trusted library allocation
page read and write
7A01000
heap
page read and write
639000
heap
page read and write
44D1000
heap
page read and write
3270000
unkown
page read and write
256A000
unkown
page read and write
510000
direct allocation
page read and write
363A0000
direct allocation
page read and write
258B000
unkown
page read and write
5FA000
heap
page read and write
2985000
heap
page read and write
7CEF000
stack
page read and write
500000
unkown
page readonly
2978000
heap
page read and write
4560000
unkown
page execute and read and write
675000
heap
page read and write
632000
heap
page read and write
256A000
unkown
page read and write
AA0000
heap
page read and write
64DE000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
5F6000
heap
page read and write
7A0F000
heap
page read and write
259F000
unkown
page read and write
4F0000
unkown
page read and write
10000
heap
page read and write
535000
heap
page read and write
44D1000
heap
page read and write
3682D000
direct allocation
page execute and read and write
2581000
unkown
page read and write
4ADC000
direct allocation
page execute and read and write
79F0000
trusted library allocation
page read and write
3276000
unkown
page read and write
3A63000
unkown
page read and write
44D1000
heap
page read and write
363F0000
direct allocation
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
2934000
heap
page read and write
6562000
heap
page read and write
57B000
heap
page read and write
7CF0000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
7A80000
heap
page read and write
2370000
unkown
page readonly
72A000
system
page execute and read and write
5EA000
unkown
page execute read
44D1000
heap
page read and write
79BE000
stack
page read and write
5392000
system
page read and write
44D1000
heap
page read and write
7A81000
heap
page read and write
4C10000
trusted library allocation
page execute and read and write
2566000
unkown
page read and write
520000
heap
page read and write
3180000
unkown
page readonly
285B000
stack
page read and write
591000
heap
page read and write
2576000
unkown
page read and write
28292000
system
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
2611000
unkown
page read and write
361CE000
stack
page read and write
53E000
heap
page read and write
44D1000
heap
page read and write
25CD000
unkown
page read and write
44D1000
heap
page read and write
408000
unkown
page readonly
44D1000
heap
page read and write
44D1000
heap
page read and write
13A000
stack
page read and write
6570000
heap
page read and write
400000
unkown
page readonly
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
2A14000
heap
page read and write
4F0000
unkown
page read and write
2A1D000
heap
page read and write
21F5000
remote allocation
page execute and read and write
591000
heap
page read and write
44D1000
heap
page read and write
25C4000
unkown
page read and write
255E000
unkown
page read and write
363A0000
direct allocation
page read and write
29E4000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
2934000
heap
page read and write
6570000
heap
page read and write
540000
unkown
page read and write
25D6000
unkown
page read and write
71000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
591000
heap
page read and write
9B0000
unkown
page read and write
56A8000
unclassified section
page read and write
7A3D000
heap
page read and write
25EF000
unkown
page read and write
580000
heap
page read and write
44D1000
heap
page read and write
580000
heap
page read and write
4810000
direct allocation
page execute and read and write
44D1000
heap
page read and write
A40000
unkown
page read and write
6B0000
unkown
page readonly
3270000
unkown
page read and write
64F0000
direct allocation
page read and write
23B3000
heap
page read and write
6559000
heap
page read and write
580000
heap
page read and write
58A000
heap
page read and write
7A4E000
heap
page read and write
44D1000
heap
page read and write
400000
unkown
page readonly
530000
heap
page read and write
56F000
heap
page read and write
4E0000
direct allocation
page read and write
70000
heap
page read and write
44D1000
heap
page read and write
2540000
heap
page read and write
30000
heap
page read and write
A84000
unkown
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
640000
heap
page read and write
3610F000
stack
page read and write
58A000
heap
page read and write
2576000
unkown
page read and write
44D1000
heap
page read and write
298E000
heap
page read and write
2995000
heap
page read and write
25F3000
unkown
page read and write
44D1000
heap
page read and write
400000
unkown
page readonly
56F000
heap
page read and write
644000
heap
page read and write
25CA000
unkown
page read and write
1F0000
unkown
page readonly
23B3000
heap
page read and write
6569000
heap
page read and write
2A26000
heap
page read and write
53F5000
remote allocation
page execute and read and write
2350000
unkown
page read and write
44D1000
heap
page read and write
425000
unkown
page read and write
28C0000
system
page execute and read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
6569000
heap
page read and write
25DE000
unkown
page read and write
45D0000
trusted library allocation
page read and write
66F000
heap
page read and write
44D1000
heap
page read and write
68C000
heap
page read and write
257C000
unkown
page read and write
2390000
unkown
page read and write
44D1000
heap
page read and write
657F000
heap
page read and write
3605B000
stack
page read and write
A84000
unkown
page read and write
44D1000
heap
page read and write
657A000
heap
page read and write
44D1000
heap
page read and write
25CA000
unkown
page read and write
591000
heap
page read and write
44D1000
heap
page read and write
44D0000
heap
page read and write
3080000
unkown
page read and write
44D1000
heap
page read and write
23A0000
unkown
page read and write
702000
system
page execute and read and write
44D1000
heap
page read and write
2620000
unkown
page read and write
58A000
heap
page read and write
2BFE000
stack
page read and write
25AA000
unkown
page read and write
25AD000
unkown
page read and write
261C000
unkown
page read and write
263E000
unkown
page read and write
29F7000
heap
page read and write
2A45000
heap
page read and write
681000
heap
page read and write
59A000
heap
page read and write
44D1000
heap
page read and write
55AC000
system
page read and write
57B000
heap
page read and write
44D1000
heap
page read and write
6740000
direct allocation
page read and write
328E000
unkown
page read and write
639000
heap
page read and write
520000
heap
page read and write
29E4000
heap
page read and write
2585000
unkown
page read and write
584000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
7A7E000
heap
page read and write
67B0000
direct allocation
page read and write
6445000
direct allocation
page execute and read and write
284AC000
system
page read and write
591000
heap
page read and write
7C6D000
stack
page read and write
35FDF000
stack
page read and write
E41000
unkown
page readonly
44D1000
heap
page read and write
25D2000
unkown
page read and write
408000
unkown
page readonly
44C000
unkown
page read and write
25AA000
unkown
page read and write
528000
heap
page read and write
2CBE000
stack
page read and write
44D1000
heap
page read and write
478E000
heap
page read and write
2C3F000
stack
page read and write
5DF5000
remote allocation
page execute and read and write
2C3F000
stack
page read and write
2985000
heap
page read and write
636000
heap
page read and write
7A7B000
heap
page read and write
44D1000
heap
page read and write
5B0000
heap
page read and write
584000
heap
page read and write
3276000
unkown
page read and write
44D1000
heap
page read and write
57B000
heap
page read and write
580000
heap
page read and write
580000
heap
page read and write
363F0000
direct allocation
page read and write
401000
unkown
page execute read
44D1000
heap
page read and write
29E1000
heap
page read and write
57B000
heap
page read and write
180000
unkown
page read and write
44D1000
heap
page read and write
707E0000
unkown
page readonly
2A0A000
heap
page read and write
25E3000
unkown
page read and write
68C000
heap
page read and write
298E000
heap
page read and write
2A03000
heap
page read and write
7A49000
heap
page read and write
44D1000
heap
page read and write
6490000
heap
page read and write
5CB8000
system
page read and write
1F0000
unkown
page readonly
2934000
heap
page read and write
3A60000
unkown
page read and write
363F0000
direct allocation
page read and write
591000
heap
page read and write
57B000
heap
page read and write
25F8000
unkown
page read and write
44D1000
heap
page read and write
40A000
unkown
page read and write
25E0000
heap
page read and write
3A50000
heap
page read and write
3A66000
unkown
page read and write
There are 761 hidden memdumps, click here to show them.