IOC Report
PO -2025918.exe

loading gif

Files

File Path
Type
Category
Malicious
PO -2025918.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO -2025918.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\-4108694
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0twen1au.jov.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_curnwszq.a2f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fx50y0hm.cmp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xct4qmlf.z35.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO -2025918.exe
"C:\Users\user\Desktop\PO -2025918.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO -2025918.exe"
malicious
C:\Users\user\Desktop\PO -2025918.exe
"C:\Users\user\Desktop\PO -2025918.exe"
malicious
C:\Program Files (x86)\JeaREswGBvxwNDEUJgOaujnvZkEuWPrGxrijCBpJBPUniLFqPfuLMAxWHGxYBGgYhNvCl\nWrCyfejRZk.exe
"C:\Program Files (x86)\JeaREswGBvxwNDEUJgOaujnvZkEuWPrGxrijCBpJBPUniLFqPfuLMAxWHGxYBGgYhNvCl\nWrCyfejRZk.exe"
malicious
C:\Windows\SysWOW64\ROUTE.EXE
"C:\Windows\SysWOW64\ROUTE.EXE"
malicious
C:\Program Files (x86)\JeaREswGBvxwNDEUJgOaujnvZkEuWPrGxrijCBpJBPUniLFqPfuLMAxWHGxYBGgYhNvCl\nWrCyfejRZk.exe
"C:\Program Files (x86)\JeaREswGBvxwNDEUJgOaujnvZkEuWPrGxrijCBpJBPUniLFqPfuLMAxWHGxYBGgYhNvCl\nWrCyfejRZk.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.zucchini.pro/tqv2/?6NWT=ubtLSzl&V0=mw5EMDe107YJTqujAq9unz2dxFIqRcwx5FZV14wN+wWnYz/1vECwz9qX0523rVAHVbCkyePm1aNLCJN6m48zwwFGYhIaaAphRdYS1Kl1BiYSwcT5l1L9JEw=
13.248.169.48
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.actionhub.live/gq43/
67.223.117.189
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.qzsazi.info/bqha/
47.83.1.90
http://www.qzsazi.info/bqha/?V0=XaQS++1s5Z2sQk6g657UrSdcX7H3EUdTMtu3zec/e2geVsN/mry3D0SmJYJJ828Xh6gONHNOHW6qADxKsznE6ZdUGRZN1xACtCVpUj7MYkJvH6jcy3tgXEM=&6NWT=ubtLSzl
47.83.1.90
http://www.fontbureau.com/designers?
unknown
https://www.fasthosts.co.uk/domain-names/search/?domain=$
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://fasthosts.co.uk/
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.100millionjobs.africa/ktot/
136.243.64.147
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.aloezhealthcare.info/he9k/?V0=0MI6+xzwqxZaqD2fSvbI+Ez0sKo1K30QNU5KfAdCo3osKEpgr6ecWOPkYYCElD9/ZCs5VNg1QoXcN7il9gzOzrl593t+ZyNHd/O+D84ZuyAEiK4V6BaRopc=&6NWT=ubtLSzl
213.171.195.105
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.truckgoway.info/m320/?V0=Ph0JwVcw7zzuTeHjokN+Pj0vqxzi/qoK5eH0o0l2w/5oKsNqReXVchdY7BGekisn6nC+H3gPoTPDUk5nD7LsnmjV2eR6T95oFo+TtC+4wolZhiL0ouse1nU=&6NWT=ubtLSzl
84.32.84.32
http://www.aloezhealthcare.info/he9k/
213.171.195.105
http://www.letsbookcruise.xyz
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://maximumgroup.co.za/ktot/?6NWT=ubtLSzl&V0=QtQc2mqNJwvMGBSr7V0zPUg2Ke4Xyt62plWHvEnyVDfp5Gg9
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.letsbookcruise.xyz/coi2/
85.159.66.93
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.100millionjobs.africa/ktot/?6NWT=ubtLSzl&V0=QtQc2mqNJwvMGBSr7V0zPUg2Ke4Xyt62plWHvEnyVDfp5Gg9+XblDX8y1WL79lKxhp5ksn3mik5BgcOnzw4ck6L30rZkuOCe6cRp9wSIOgnwHyHnoLuvl9s=
136.243.64.147
https://www.ecosia.org/newtab/
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://static.fasthosts.co.uk/icons/favicon.ico
unknown
http://www.truckgoway.info/m320/
84.32.84.32
http://www.fontbureau.com/designers8
unknown
http://maximumgroup.co.za/ktot/?6NWT=ubtLSzl&V0=QtQc2mqNJwvMGBSr7V0zPUg2Ke4Xyt62plWHvEnyVDfp5Gg9
unknown
http://www.vh5g.sbs/
unknown
https://www.fasthosts.co.uk?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_parking_do_
unknown
http://www.vh5g.sbs/54nj/
188.114.97.3
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.fasthosts.co.uk/contact?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_par
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.letsbookcruise.xyz
unknown
malicious
www.qzsazi.info
47.83.1.90
www.aloezhealthcare.info
213.171.195.105
truckgoway.info
84.32.84.32
www.zucchini.pro
13.248.169.48
www.vh5g.sbs
188.114.97.3
www.actionhub.live
67.223.117.189
100millionjobs.africa
136.243.64.147
natroredirect.natrocdn.com
85.159.66.93
www.100millionjobs.africa
unknown
www.v89ey584d.shop
unknown
www.truckgoway.info
unknown
www.x3kwqc5tye4vl90y.top
unknown
www.hwak.live
unknown
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.zucchini.pro
United States
67.223.117.189
www.actionhub.live
United States
188.114.97.3
www.vh5g.sbs
European Union
47.83.1.90
www.qzsazi.info
United States
84.32.84.32
truckgoway.info
Lithuania
136.243.64.147
100millionjobs.africa
Germany
85.159.66.93
natroredirect.natrocdn.com
Turkey
213.171.195.105
www.aloezhealthcare.info
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
1A50000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A90000
system
page execute and read and write
malicious
2050000
unclassified section
page execute and read and write
malicious
2D90000
trusted library allocation
page read and write
malicious
27A6000
trusted library allocation
page read and write
malicious
3759000
trusted library allocation
page read and write
malicious
2980000
unkown
page execute and read and write
malicious
2D40000
trusted library allocation
page read and write
malicious
5840000
system
page execute and read and write
malicious
7040000
trusted library section
page read and write
malicious
4CF0000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F7C000
unkown
page read and write
2E56000
heap
page read and write
260B9314000
trusted library allocation
page read and write
2F01000
heap
page read and write
2E7B000
heap
page read and write
2F01000
heap
page read and write
801000
unkown
page execute read
1558000
heap
page read and write
355D000
direct allocation
page execute and read and write
2F01000
heap
page read and write
879E000
stack
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
274F000
stack
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2EA8000
heap
page read and write
31DA000
unkown
page execute and read and write
2F01000
heap
page read and write
EC0000
unkown
page readonly
800000
unkown
page readonly
2F01000
heap
page read and write
30BE000
stack
page read and write
ACE000
stack
page read and write
9F0000
unkown
page readonly
B6E000
heap
page read and write
1700000
heap
page read and write
19FF000
stack
page read and write
47A2000
unclassified section
page read and write
815000
unkown
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2ED3000
heap
page read and write
2F01000
heap
page read and write
BB4000
heap
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
60E0000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
960000
heap
page read and write
3124000
heap
page read and write
70CE000
stack
page read and write
817000
unkown
page readonly
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
260B94A5000
trusted library allocation
page read and write
105E000
unkown
page read and write
2F01000
heap
page read and write
950000
unkown
page readonly
740000
unkown
page readonly
260B9321000
trusted library allocation
page read and write
B470000
trusted library allocation
page read and write
2F01000
heap
page read and write
836E000
stack
page read and write
2EC5000
heap
page read and write
F90000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
63DE000
stack
page read and write
340C000
unkown
page read and write
7BC1000
heap
page read and write
8E1F000
stack
page read and write
2F01000
heap
page read and write
4C50000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
260B783F000
heap
page read and write
7BC1000
heap
page read and write
260B7830000
heap
page read and write
2F01000
heap
page read and write
7BCB000
heap
page read and write
7F7AFFC000
stack
page read and write
1570000
heap
page read and write
15E0000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
B30000
trusted library allocation
page read and write
7BC6000
heap
page read and write
2F01000
heap
page read and write
2751000
trusted library allocation
page read and write
2F01000
heap
page read and write
7BFC000
heap
page read and write
2EEF000
stack
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
C1C000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
D40000
heap
page read and write
1650000
unkown
page readonly
2E74000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
260B771A000
system
page execute and read and write
B9FB000
stack
page read and write
F90000
unkown
page readonly
BA1000
heap
page read and write
260B785F000
heap
page read and write
4C40000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2560000
trusted library allocation
page read and write
2E8A000
heap
page read and write
2F01000
heap
page read and write
2EBB000
heap
page read and write
960000
heap
page read and write
2F01000
heap
page read and write
1406000
heap
page read and write
800000
unkown
page readonly
150F000
stack
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
37D24000
system
page read and write
875F000
stack
page read and write
B10000
heap
page read and write
D0E000
stack
page read and write
AD0000
heap
page read and write
FE0000
unkown
page read and write
2F01000
heap
page read and write
817000
unkown
page readonly
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
1558000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
7BD0000
heap
page read and write
2F01000
heap
page read and write
4CB0000
heap
page read and write
6C20000
heap
page read and write
800000
unkown
page readonly
2F01000
heap
page read and write
2E71000
heap
page read and write
2F01000
heap
page read and write
7C03000
heap
page read and write
9C1000
unkown
page readonly
96D000
stack
page read and write
5200000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
260B9120000
trusted library allocation
page read and write
260B9110000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
58FC000
system
page execute and read and write
B4CE000
stack
page read and write
13D0000
unkown
page read and write
2F01000
heap
page read and write
5E7000
stack
page read and write
2F80000
heap
page read and write
13F0000
unkown
page readonly
3E3C000
unkown
page read and write
7BF7000
heap
page read and write
2F01000
heap
page read and write
3797000
trusted library allocation
page read and write
2F90000
unkown
page readonly
2F01000
heap
page read and write
154E000
stack
page read and write
260B930E000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
EF7000
heap
page read and write
2F01000
heap
page read and write
58E1000
system
page execute and read and write
BB0000
heap
page read and write
2F01000
heap
page read and write
B8AE000
stack
page read and write
B3D000
trusted library allocation
page execute and read and write
2E96000
heap
page read and write
25BE000
stack
page read and write
2E0A000
heap
page read and write
F80000
unkown
page readonly
2F01000
heap
page read and write
260B930A000
trusted library allocation
page read and write
B60000
heap
page read and write
2F01000
heap
page read and write
A8F000
stack
page read and write
4EA000
stack
page read and write
48EC000
stack
page read and write
2F01000
heap
page read and write
2E62000
heap
page read and write
3124000
heap
page read and write
D40000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
2E0B000
heap
page read and write
4CC0000
heap
page read and write
2F01000
heap
page read and write
2640000
heap
page execute and read and write
260B000
trusted library allocation
page read and write
2F00000
unkown
page read and write
2E9B000
heap
page read and write
33B9000
direct allocation
page execute and read and write
7BC1000
heap
page read and write
FF1000
unkown
page readonly
BA3000
heap
page read and write
2890000
unkown
page readonly
2F01000
heap
page read and write
1058000
unkown
page read and write
7BB6000
heap
page read and write
260B785B000
heap
page read and write
50F5000
heap
page read and write
7CC0000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
320C000
heap
page read and write
31F2000
unkown
page read and write
7BC1000
heap
page read and write
4F2B000
stack
page read and write
2F01000
heap
page read and write
E6F000
stack
page read and write
37722000
system
page read and write
2F01000
heap
page read and write
840000
heap
page read and write
31A0000
trusted library allocation
page execute and read and write
2F01000
heap
page read and write
2F03000
heap
page read and write
FE0000
unkown
page read and write
7BD8000
heap
page read and write
342E000
direct allocation
page execute and read and write
2F01000
heap
page read and write
760000
unkown
page readonly
2F01000
heap
page read and write
2E88000
heap
page read and write
5110000
heap
page read and write
2F01000
heap
page read and write
1582000
heap
page read and write
2F01000
heap
page read and write
3986000
unkown
page read and write
4F30000
trusted library section
page readonly
415A000
unclassified section
page read and write
2F01000
heap
page read and write
7308000
heap
page read and write
37662000
system
page read and write
5908000
system
page execute and read and write
7BC1000
heap
page read and write
3E36000
unclassified section
page read and write
889F000
stack
page read and write
9C1000
unkown
page readonly
19E1000
unkown
page readonly
F60000
unkown
page readonly
EB0000
unkown
page readonly
2F01000
heap
page read and write
7BDA000
heap
page read and write
C06000
heap
page read and write
2F01000
heap
page read and write
324C000
unkown
page read and write
4FD0000
heap
page read and write
760000
unkown
page readonly
2F01000
heap
page read and write
260B7862000
heap
page read and write
5210000
trusted library allocation
page execute and read and write
340C000
unkown
page read and write
2F20000
unkown
page read and write
260B94CE000
trusted library allocation
page read and write
2F01000
heap
page read and write
83AF000
stack
page read and write
7070000
trusted library allocation
page execute and read and write
703E000
stack
page read and write
4CD0000
trusted library allocation
page execute and read and write
58EC000
system
page execute and read and write
D44000
heap
page read and write
7BC1000
heap
page read and write
1450000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
BB4000
heap
page read and write
392000
unkown
page readonly
2F01000
heap
page read and write
2E0E000
heap
page read and write
7F7CFFF000
stack
page read and write
750000
unkown
page readonly
260B7718000
system
page execute and read and write
260B77B0000
heap
page read and write
2F01000
heap
page read and write
C31000
heap
page read and write
2ECD000
heap
page read and write
817000
unkown
page readonly
F2A000
stack
page read and write
2EDD000
heap
page read and write
2F01000
heap
page read and write
30D9000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
7210000
trusted library allocation
page read and write
5119000
heap
page read and write
6820000
trusted library allocation
page read and write
2F01000
heap
page read and write
2E0D000
heap
page read and write
817000
unkown
page readonly
7BFA000
heap
page read and write
89F0000
trusted library allocation
page read and write
2ED8000
heap
page read and write
3250000
trusted library allocation
page read and write
7318000
heap
page read and write
B43000
trusted library allocation
page read and write
E98000
heap
page read and write
14E0000
heap
page read and write
2F01000
heap
page read and write
D60000
heap
page read and write
2F01000
heap
page read and write
7BE4000
heap
page read and write
2F01000
heap
page read and write
EA0000
unkown
page readonly
260B9200000
trusted library allocation
page read and write
260B783A000
heap
page read and write
4934000
unclassified section
page read and write
2EEF000
stack
page read and write
2F01000
heap
page read and write
11FB000
stack
page read and write
2F01000
heap
page read and write
B20000
trusted library allocation
page read and write
2F01000
heap
page read and write
262D000
trusted library allocation
page read and write
EF0000
heap
page read and write
3777C000
system
page read and write
260B784C000
heap
page read and write
2F01000
heap
page read and write
5A6C000
unkown
page read and write
260B9120000
trusted library allocation
page read and write
260B9310000
trusted library allocation
page read and write
F90000
unkown
page readonly
B52000
trusted library allocation
page read and write
2540000
trusted library allocation
page execute and read and write
737C000
heap
page read and write
7BC1000
heap
page read and write
3561000
direct allocation
page execute and read and write
2E88000
heap
page read and write
260B76D0000
system
page execute and read and write
F70000
unkown
page readonly
F80000
unkown
page readonly
30DF000
heap
page read and write
2621000
trusted library allocation
page read and write
33BD000
direct allocation
page execute and read and write
1E11000
direct allocation
page execute and read and write
4CB3000
heap
page read and write
BB4000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
3250000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
2F01000
heap
page read and write
7BEB000
heap
page read and write
260B771C000
system
page execute and read and write
2600000
trusted library allocation
page read and write
898D000
stack
page read and write
1580000
heap
page read and write
B89000
heap
page read and write
2F01000
heap
page read and write
7BF0000
heap
page read and write
F2A000
stack
page read and write
2F01000
heap
page read and write
3132000
unkown
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2880000
heap
page read and write
7BC1000
heap
page read and write
7342000
heap
page read and write
2F01000
heap
page read and write
35D2000
direct allocation
page execute and read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
260B7800000
heap
page read and write
2E08000
heap
page read and write
7F7C7FE000
stack
page read and write
260B9303000
trusted library allocation
page read and write
BFE000
heap
page read and write
2F01000
heap
page read and write
815000
unkown
page read and write
E98000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
89EC000
trusted library allocation
page read and write
154E000
stack
page read and write
2F01000
heap
page read and write
1321000
unkown
page readonly
2F01000
heap
page read and write
1321000
unkown
page readonly
7060000
trusted library allocation
page read and write
105B000
unkown
page read and write
251B000
trusted library allocation
page execute and read and write
2F01000
heap
page read and write
800000
unkown
page readonly
7BD2000
heap
page read and write
4CE9000
trusted library allocation
page read and write
2F01000
heap
page read and write
5260000
trusted library allocation
page read and write
9B0000
unkown
page read and write
2F01000
heap
page read and write
2512000
trusted library allocation
page read and write
2EF2000
heap
page read and write
80E000
unkown
page readonly
1E26000
direct allocation
page execute and read and write
2E08000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
BA0000
heap
page read and write
2F01000
heap
page read and write
3132000
unkown
page read and write
2550000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
2E67000
heap
page read and write
750000
unkown
page readonly
B96000
heap
page read and write
1C8D000
direct allocation
page execute and read and write
815000
unkown
page read and write
2F01000
heap
page read and write
3000000
trusted library allocation
page read and write
1708000
heap
page read and write
1400000
heap
page read and write
2EA5000
heap
page read and write
B10000
heap
page read and write
2880000
heap
page read and write
2570000
heap
page read and write
2F10000
unkown
page read and write
595F000
system
page execute and read and write
4D00000
heap
page execute and read and write
2F01000
heap
page read and write
4D40000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
801000
unkown
page execute read
801000
unkown
page execute read
1550000
heap
page read and write
801000
unkown
page execute read
2F01000
heap
page read and write
2F01000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
1650000
unkown
page readonly
2F01000
heap
page read and write
6E5F000
stack
page read and write
260B9300000
trusted library allocation
page read and write
7BC1000
heap
page read and write
7BB0000
trusted library allocation
page read and write
327D000
heap
page read and write
980000
heap
page read and write
261E000
trusted library allocation
page read and write
2F00000
unkown
page read and write
2F01000
heap
page read and write
930000
unkown
page readonly
92D000
stack
page read and write
30C0000
heap
page read and write
50E0000
heap
page read and write
7F7BFFE000
stack
page read and write
2E9B000
heap
page read and write
EA0000
unkown
page readonly
985000
heap
page read and write
13D0000
unkown
page read and write
9AE000
stack
page read and write
940000
unkown
page readonly
3751000
trusted library allocation
page read and write
3290000
direct allocation
page execute and read and write
7BC1000
heap
page read and write
740000
unkown
page readonly
A3B000
stack
page read and write
2F01000
heap
page read and write
B5A000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
14DE000
stack
page read and write
7CA000
stack
page read and write
282F000
stack
page read and write
B56000
trusted library allocation
page execute and read and write
7DFC000
stack
page read and write
D20000
unkown
page read and write
2EA8000
heap
page read and write
5100000
heap
page read and write
7FA40000
trusted library allocation
page execute and read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
80E000
unkown
page readonly
36A2000
unclassified section
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
260B94BE000
trusted library allocation
page read and write
D60000
heap
page read and write
2F01000
heap
page read and write
71CE000
stack
page read and write
7F7B7FE000
stack
page read and write
B33000
trusted library allocation
page execute and read and write
8C50000
trusted library section
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
50DD000
stack
page read and write
80E000
unkown
page readonly
2510000
trusted library allocation
page read and write
639E000
stack
page read and write
7EE0000
heap
page read and write
13F0000
unkown
page readonly
3CAA000
unkown
page read and write
FDE000
stack
page read and write
1EA8000
direct allocation
page execute and read and write
25FC000
stack
page read and write
4CE2000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
7C04000
heap
page read and write
1E2D000
direct allocation
page execute and read and write
2F01000
heap
page read and write
9D0000
unkown
page read and write
2626000
trusted library allocation
page read and write
6D5E000
stack
page read and write
2530000
trusted library allocation
page read and write
940000
unkown
page readonly
1C89000
direct allocation
page execute and read and write
2F90000
unkown
page readonly
2F01000
heap
page read and write
260B77D0000
heap
page read and write
4484000
unkown
page read and write
EB9000
heap
page read and write
920000
heap
page read and write
930000
unkown
page readonly
2842000
unclassified section
page execute and read and write
2E00000
heap
page read and write
D44000
heap
page read and write
2F01000
heap
page read and write
B4D000
trusted library allocation
page execute and read and write
10FC000
stack
page read and write
B6AF000
stack
page read and write
2F01000
heap
page read and write
CD0000
heap
page read and write
1B60000
direct allocation
page execute and read and write
7CA000
stack
page read and write
2F01000
heap
page read and write
2040000
heap
page read and write
2890000
unkown
page readonly
2F01000
heap
page read and write
A78000
stack
page read and write
2F01000
heap
page read and write
1CFE000
direct allocation
page execute and read and write
42F2000
unkown
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
28AA000
unclassified section
page execute and read and write
513E000
heap
page read and write
2F01000
heap
page read and write
37F4000
unkown
page read and write
260B94C4000
trusted library allocation
page read and write
149E000
stack
page read and write
2EEF000
heap
page read and write
9F0000
unkown
page readonly
171A000
heap
page read and write
2F01000
heap
page read and write
EB5000
heap
page read and write
3208000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2EAE000
heap
page read and write
89CD000
stack
page read and write
2F01000
heap
page read and write
5154000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
6F3E000
stack
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
7BD5000
heap
page read and write
42EC000
unclassified section
page read and write
7BFF000
heap
page read and write
2F01000
heap
page read and write
F90000
heap
page read and write
B34000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
B7AE000
stack
page read and write
2E3A000
heap
page read and write
3026000
heap
page read and write
2F01000
heap
page read and write
720E000
stack
page read and write
19E1000
unkown
page readonly
2EAE000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
4C30000
trusted library allocation
page read and write
E90000
heap
page read and write
FF1000
unkown
page readonly
390000
unkown
page readonly
2E67000
heap
page read and write
2E7B000
heap
page read and write
3120000
heap
page read and write
12FD000
stack
page read and write
8D1E000
stack
page read and write
1A00000
direct allocation
page read and write
9D0000
unkown
page read and write
5EAF000
stack
page read and write
7BC1000
heap
page read and write
2E11000
heap
page read and write
36FC000
unclassified section
page read and write
2F01000
heap
page read and write
7C07000
heap
page read and write
260B9400000
trusted library allocation
page read and write
2F01000
heap
page read and write
2E11000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
D20000
unkown
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
1550000
heap
page read and write
2F01000
heap
page read and write
1500000
heap
page read and write
815000
unkown
page read and write
3120000
heap
page read and write
2F01000
heap
page read and write
3793C000
system
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
F60000
unkown
page readonly
2F01000
heap
page read and write
4CE0000
trusted library allocation
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
4C45000
trusted library allocation
page read and write
6842000
trusted library allocation
page read and write
18FF000
stack
page read and write
2F01000
heap
page read and write
3172000
unkown
page execute and read and write
89E0000
trusted library allocation
page read and write
80E000
unkown
page readonly
2F00000
heap
page read and write
9B0000
unkown
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
5250000
trusted library allocation
page execute and read and write
2F01000
heap
page read and write
2E1F000
heap
page read and write
950000
unkown
page readonly
4616000
unkown
page read and write
3CA4000
unclassified section
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2E96000
heap
page read and write
2E71000
heap
page read and write
4AC6000
unclassified section
page read and write
F70000
unkown
page readonly
D5E000
stack
page read and write
4758000
trusted library allocation
page read and write
2F01000
heap
page read and write
279D000
trusted library allocation
page read and write
4FC0000
heap
page read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
2F01000
heap
page read and write
7080000
trusted library allocation
page execute and read and write
2F01000
heap
page read and write
7BC1000
heap
page read and write
EC0000
unkown
page readonly
2F01000
heap
page read and write
2F80000
heap
page read and write
7BC1000
heap
page read and write
BF0000
heap
page read and write
2E74000
heap
page read and write
2EBB000
heap
page read and write
1400000
heap
page read and write
7BC0000
heap
page read and write
50F0000
heap
page read and write
BAFC000
stack
page read and write
38BC000
unclassified section
page read and write
2EA5000
heap
page read and write
7C0F000
heap
page read and write
260B9401000
trusted library allocation
page read and write
450000
unkown
page readonly
B480000
trusted library allocation
page execute and read and write
2F01000
heap
page read and write
2E06000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2517000
trusted library allocation
page execute and read and write
12FD000
stack
page read and write
4CEC000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
EB0000
unkown
page readonly
92D000
stack
page read and write
35E2000
unclassified section
page read and write
7E3D000
stack
page read and write
There are 703 hidden memdumps, click here to show them.