IOC Report
New Order#9.exe

loading gif

Files

File Path
Type
Category
Malicious
New Order#9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\303e-83
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Charley
data
dropped
C:\Users\user\AppData\Local\Temp\Dunlop
ASCII text, with very long lines (28674), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\autBB1E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBB4D.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New Order#9.exe
"C:\Users\user\Desktop\New Order#9.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\New Order#9.exe"
malicious
C:\Program Files (x86)\HreXNxgMsrDPXONQKKESuJfGRgktgqYxdhGwHnXkEamMetVMCWkqj\NFkWqLxjmvJuf.exe
"C:\Program Files (x86)\HreXNxgMsrDPXONQKKESuJfGRgktgqYxdhGwHnXkEamMetVMCWkqj\NFkWqLxjmvJuf.exe"
malicious
C:\Windows\SysWOW64\gpupdate.exe
"C:\Windows\SysWOW64\gpupdate.exe"
malicious
C:\Program Files (x86)\HreXNxgMsrDPXONQKKESuJfGRgktgqYxdhGwHnXkEamMetVMCWkqj\NFkWqLxjmvJuf.exe
"C:\Program Files (x86)\HreXNxgMsrDPXONQKKESuJfGRgktgqYxdhGwHnXkEamMetVMCWkqj\NFkWqLxjmvJuf.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.gridban.xyz/hheq/
162.254.38.56
http://www.toppersbusiness.net/hugu/?4f=N0ZHwlGH&jhVdcz=vP/uG1dCvZ4PilGLFureb44eipjsuOvQXbL49xadF8bamHBm064La/heTQ4Pfno94C0sjxAGfQAAlyvLUXQlTtZB4zIUvEoM3zQ61bjQ13shwgtlO8h70X3QY/xUTFtAQA==
178.212.35.248
http://www.lovezi.shop/htli/?jhVdcz=FjHjKNi/s/5kx+KnkSdD7DBcT3to66u90TWIQenAa0cXcBEeV9ZBFtbsq/uwbVXzm5/jkr9fdxMKasz/2IuVvEkWA5eWfr+6uK8ix+bvoaaPZEzC/cixV8fHHlKsAdCdfw==&4f=N0ZHwlGH
84.32.84.32
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.rajveena.online/wptv/
84.32.84.32
http://www.artfulfusionhub.lat/qogc/
104.21.19.148
https://www.9muyiutyt.online/39t8/?4f=N0ZHwlGH&jhVdcz=89XVD
unknown
https://www.ecosia.org/newtab/
unknown
http://www.pqnqxn.xyz/fku9/
172.67.185.114
http://www.gridban.xyz/hheq/?jhVdcz=OQHjTIEzxI4+3uBJ4Ch4/gBE3u2u+7BoOuCOJurFjFRPYCarRFUfzgF9IWvn7XTpBRUAmOCVXs1kY9Zsut6EdHJsI9AJbTCs7iVD1ouYIWNqRmE7fP7CptgJfBKNW9KUkg==&4f=N0ZHwlGH
162.254.38.56
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.pqnqxn.xyz/fku9/?jhVdcz=8+E5hHkJAI9KLzdnRfLjsdta627301LWvCxQnfER7jE6HhXelR0L8M6eacA5uvGu6fFFzcUJZ3XtElIgDxgrCowK6qnc0dbjxbukcDgECY4ZLyFshyoZroDOS+2pE7Poig==&4f=N0ZHwlGH
172.67.185.114
http://www.suntextmeetings.online/1wd4/
148.66.138.133
http://www.suntextmeetings.online/1wd4/?jhVdcz=ScHcXTKAO5eSE6uaWkYIjyQnfQ68P9tZ9TtcMsVrul6RoGZN9pvJIdRIgUxQy3rdaSGeQ+CIaUiYSa72rbvJ1wEunXVWpcUP89m8x1dRGPimMbT7bK/R3/HUlg93LDGrxg==&4f=N0ZHwlGH
148.66.138.133
http://www.9muyiutyt.online/39t8/?4f=N0ZHwlGH&jhVdcz=89XVD+Uem60dZ1sDkhzA52EMF3du5QagyTQWgC74INncPQoYck8yZMKmhHYNHaZtvErKW4LDM1h+RSXnGPYlre6VurbK/jTyWP4vAbFcilh1x/G4ZSBU3Zl0LqnbfRVoCA==
154.218.3.243
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://artfulfusionhub.lat/qogc/?jhVdcz=gSefwjuKZsCuEGncBKSqgUjxJH
unknown
http://www.lovezi.shop/htli/
84.32.84.32
http://www.gridban.xyz
unknown
http://www.pqnqxn.xyz
unknown
http://www.9muyiutyt.online/39t8/
154.218.3.243
http://www.artfulfusionhub.lat/qogc/?jhVdcz=gSefwjuKZsCuEGncBKSqgUjxJH+JcQqz+YMIzSjuOw+Y7MS0RxllxFRTV2Gn+zIiEtGaIum1DRHYZfVjpe+PZ37sYiWUr85MYTmGz//Zl0zNgUvOn9EXUqnEL5f2vZZjHw==&4f=N0ZHwlGH
104.21.19.148
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.rajveena.online/wptv/?jhVdcz=UBaSdI4L0SLSC905rDSQkq9H8MI7DUlv5ISEnSSRcSh4rK6z4u+7wt/PvR1ecI/XTQn9u86KuHymNqf2TqtSEsuZKbYYXqmtSyS/3vOPWUm+34EGC7zgpqm6nqQHfZAfNA==&4f=N0ZHwlGH
84.32.84.32
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.pqnqxn.xyz
172.67.185.114
malicious
www.gridban.xyz
162.254.38.56
malicious
www.76716e97778bac2e.com
unknown
malicious
www.rajveena.online
unknown
malicious
www.9muyiutyt.online
unknown
malicious
www.artfulfusionhub.lat
unknown
malicious
www.toppersbusiness.net
unknown
malicious
www.suntextmeetings.online
unknown
malicious
www.lovezi.shop
unknown
malicious
suntextmeetings.online
148.66.138.133
8fyhback.javalebogame008.com
154.218.3.243
toppersbusiness.net
178.212.35.248
rajveena.online
84.32.84.32
lovezi.shop
84.32.84.32
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.185.114
www.pqnqxn.xyz
United States
malicious
162.254.38.56
www.gridban.xyz
United States
malicious
178.212.35.248
toppersbusiness.net
Germany
104.21.19.148
unknown
United States
84.32.84.32
rajveena.online
Lithuania
154.218.3.243
8fyhback.javalebogame008.com
Seychelles
148.66.138.133
suntextmeetings.online
Singapore

Memdumps

Base Address
Regiontype
Protect
Malicious
4670000
unkown
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
38D0000
unclassified section
page execute and read and write
malicious
3610000
trusted library allocation
page read and write
malicious
5E00000
unclassified section
page execute and read and write
malicious
35C0000
trusted library allocation
page read and write
malicious
3200000
system
page execute and read and write
malicious
4E51000
heap
page read and write
4E51000
heap
page read and write
D10000
unkown
page readonly
930000
unkown
page readonly
3443000
heap
page read and write
4212000
unkown
page read and write
4E51000
heap
page read and write
1C39000
heap
page read and write
FCC000
unkown
page write copy
8338000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
D27000
unkown
page readonly
8335000
heap
page read and write
1D5B000
heap
page read and write
1390000
unkown
page read and write
3213000
heap
page read and write
4E51000
heap
page read and write
82FC000
heap
page read and write
453D000
direct allocation
page read and write
4E51000
heap
page read and write
639E000
unclassified section
page read and write
82C0000
heap
page read and write
3F24000
heap
page read and write
4E51000
heap
page read and write
1250000
heap
page read and write
15922E12000
trusted library allocation
page read and write
4E51000
heap
page read and write
33B1000
heap
page read and write
4E51000
heap
page read and write
89CF000
stack
page read and write
9B0000
unkown
page read and write
33B7000
heap
page read and write
33B1000
heap
page read and write
832F000
heap
page read and write
35A0000
heap
page read and write
31D0000
heap
page read and write
8319000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
950000
unkown
page readonly
4E51000
heap
page read and write
4E51000
heap
page read and write
15AF000
stack
page read and write
590000
unkown
page readonly
3472000
heap
page read and write
15921253000
heap
page read and write
B80000
heap
page read and write
3417000
heap
page read and write
2F60000
unkown
page readonly
2700000
unkown
page readonly
45AE000
direct allocation
page read and write
82B3000
heap
page read and write
2E50000
heap
page read and write
4270000
direct allocation
page read and write
5481000
direct allocation
page execute and read and write
45AE000
direct allocation
page read and write
118C000
unkown
page read and write
13B0000
heap
page read and write
54385FE000
stack
page read and write
5136000
heap
page read and write
4E51000
heap
page read and write
30C0000
heap
page read and write
4E51000
heap
page read and write
4539000
direct allocation
page read and write
82F6000
heap
page read and write
4E51000
heap
page read and write
1B50000
direct allocation
page execute and read and write
332F000
stack
page read and write
45AE000
direct allocation
page read and write
4E51000
heap
page read and write
1C03000
heap
page read and write
4410000
direct allocation
page read and write
3429000
heap
page read and write
5009000
heap
page read and write
50CE000
stack
page read and write
5F66000
unclassified section
page execute and read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
2F60000
unkown
page readonly
8FC000
stack
page read and write
4E51000
heap
page read and write
4410000
direct allocation
page read and write
3400000
heap
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
13B0000
heap
page read and write
4E51000
heap
page read and write
6530000
unclassified section
page read and write
4E51000
heap
page read and write
4270000
direct allocation
page read and write
4E51000
heap
page read and write
4270000
direct allocation
page read and write
4410000
direct allocation
page read and write
1D5B000
heap
page read and write
32E4000
heap
page read and write
275E000
stack
page read and write
E60000
unkown
page readonly
159210D6000
system
page execute and read and write
1C02000
heap
page read and write
33B1000
heap
page read and write
4E51000
heap
page read and write
FC2000
unkown
page readonly
15922AD0000
trusted library allocation
page read and write
940000
unkown
page readonly
33C2000
heap
page read and write
15922FCE000
trusted library allocation
page read and write
82CA000
heap
page read and write
316C000
unkown
page read and write
32E5000
heap
page read and write
3213000
heap
page read and write
B88000
heap
page read and write
4E51000
heap
page read and write
3EEE000
unkown
page read and write
4E51000
heap
page read and write
3501000
heap
page read and write
4E51000
heap
page read and write
2F5F000
stack
page read and write
3112000
unkown
page read and write
17EF000
stack
page read and write
32D0000
heap
page read and write
1B95000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4539000
direct allocation
page read and write
1230000
unkown
page readonly
2D8E000
stack
page read and write
3413000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
3B29000
direct allocation
page execute and read and write
4E51000
heap
page read and write
5132000
heap
page read and write
4F50000
trusted library allocation
page read and write
15922FC4000
trusted library allocation
page read and write
57EC000
system
page execute and read and write
9AE000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
1240000
unkown
page readonly
4E51000
heap
page read and write
4E51000
heap
page read and write
3434000
heap
page read and write
4E51000
heap
page read and write
4E50000
heap
page read and write
33B1000
heap
page read and write
3213000
heap
page read and write
343A000
heap
page read and write
4E51000
heap
page read and write
32E0000
heap
page read and write
3450000
heap
page read and write
26DF000
stack
page read and write
3CCD000
direct allocation
page execute and read and write
52DD000
direct allocation
page execute and read and write
3417000
heap
page read and write
4E51000
heap
page read and write
E70000
unkown
page readonly
15922AD0000
trusted library allocation
page read and write
17CF000
stack
page read and write
E40000
unkown
page readonly
E40000
unkown
page readonly
15922E03000
trusted library allocation
page read and write
2DB4000
heap
page read and write
4E51000
heap
page read and write
10C9000
stack
page read and write
4E51000
heap
page read and write
15921220000
heap
page read and write
1CDF000
heap
page read and write
1B30000
heap
page read and write
3390000
heap
page read and write
1B9F000
heap
page read and write
3202000
heap
page read and write
3467000
heap
page read and write
8310000
heap
page read and write
2860000
heap
page read and write
E50000
unkown
page readonly
45AE000
direct allocation
page read and write
4E51000
heap
page read and write
15922E00000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
1C0B000
heap
page read and write
570000
unkown
page readonly
3477000
heap
page read and write
4539000
direct allocation
page read and write
F01000
unkown
page execute read
F00000
unkown
page readonly
3413000
heap
page read and write
33AC000
heap
page read and write
3213000
heap
page read and write
5438DFE000
stack
page read and write
4E51000
heap
page read and write
4393000
direct allocation
page read and write
4E51000
heap
page read and write
4539000
direct allocation
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
2700000
unkown
page readonly
2864000
heap
page read and write
3E01000
heap
page read and write
159210B0000
system
page execute and read and write
4E51000
heap
page read and write
33A6000
heap
page read and write
4E51000
heap
page read and write
898E000
stack
page read and write
3880000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
4000000
unclassified section
page execute and read and write
5840000
system
page execute and read and write
32E4000
heap
page read and write
5FA000
stack
page read and write
38A6000
unkown
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
FDC000
stack
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
4E51000
heap
page read and write
3A00000
direct allocation
page execute and read and write
1C03000
heap
page read and write
66C2000
unclassified section
page read and write
B80000
heap
page read and write
15921190000
heap
page read and write
1C19000
heap
page read and write
4E51000
heap
page read and write
13B8000
heap
page read and write
1592123C000
heap
page read and write
367E000
stack
page read and write
3052000
unkown
page read and write
4E51000
heap
page read and write
453D000
direct allocation
page read and write
9C1000
unkown
page readonly
FCC000
unkown
page read and write
2FC8000
stack
page read and write
4E51000
heap
page read and write
453D000
direct allocation
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
82AC000
heap
page read and write
3405000
heap
page read and write
51A7000
heap
page read and write
1210000
unkown
page readonly
4E51000
heap
page read and write
1240000
unkown
page readonly
2D90000
unkown
page readonly
3213000
heap
page read and write
3419000
heap
page read and write
5400000
unclassified section
page execute and read and write
1D3C000
heap
page read and write
4E51000
heap
page read and write
E70000
unkown
page readonly
3B2D000
direct allocation
page execute and read and write
510E000
stack
page read and write
2D8E000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
D11000
unkown
page execute read
2D90000
unkown
page readonly
3C70000
unkown
page execute and read and write
3BCA000
unkown
page read and write
17BF000
stack
page read and write
1B93000
heap
page read and write
377F000
stack
page read and write
4E51000
heap
page read and write
13B8000
heap
page read and write
32CF000
stack
page read and write
118F000
unkown
page read and write
82BB000
heap
page read and write
38D0000
direct allocation
page read and write
4E51000
heap
page read and write
1592124C000
heap
page read and write
4E51000
heap
page read and write
4393000
direct allocation
page read and write
4E51000
heap
page read and write
3052000
unkown
page read and write
9B0000
unkown
page read and write
15921170000
heap
page read and write
4E51000
heap
page read and write
A10000
heap
page read and write
33B7000
heap
page read and write
57DD000
system
page execute and read and write
4E51000
heap
page read and write
3411000
heap
page read and write
1960000
heap
page read and write
FD4000
unkown
page readonly
580000
unkown
page readonly
54F2000
direct allocation
page execute and read and write
D25000
unkown
page read and write
5ACF000
stack
page read and write
2131C000
system
page read and write
4E51000
heap
page read and write
2DE0000
unkown
page read and write
4E51000
heap
page read and write
4270000
direct allocation
page read and write
5BC4000
unclassified section
page read and write
8600000
heap
page read and write
4E51000
heap
page read and write
8020000
trusted library allocation
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
E50000
unkown
page readonly
15922FBE000
trusted library allocation
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
9D0000
unkown
page read and write
4E51000
heap
page read and write
3D5C000
unkown
page read and write
4E51000
heap
page read and write
F9C000
unkown
page readonly
159211C0000
heap
page read and write
4E51000
heap
page read and write
1B9C000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
35A0000
trusted library allocation
page read and write
136E000
stack
page read and write
3213000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
8FC000
stack
page read and write
2DB0000
heap
page read and write
15922E0F000
trusted library allocation
page read and write
346D000
heap
page read and write
4E51000
heap
page read and write
2DC0000
unkown
page read and write
4E51000
heap
page read and write
1C03000
heap
page read and write
38D0000
direct allocation
page read and write
21704000
system
page read and write
453D000
direct allocation
page read and write
580000
unkown
page readonly
33AC000
heap
page read and write
47D6000
unkown
page execute and read and write
D10000
unkown
page readonly
D25000
unkown
page read and write
B30000
unkown
page read and write
1370000
unkown
page read and write
4E51000
heap
page read and write
D25000
unkown
page read and write
3213000
heap
page read and write
1D3C000
heap
page read and write
9C1000
unkown
page readonly
82EB000
heap
page read and write
EDA000
stack
page read and write
4E51000
heap
page read and write
33A8000
heap
page read and write
4E51000
heap
page read and write
1C14000
heap
page read and write
33B1000
heap
page read and write
3280000
heap
page read and write
83BC000
heap
page read and write
15B0000
unkown
page readonly
8325000
heap
page read and write
4E51000
heap
page read and write
3F20000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
D11000
unkown
page execute read
570000
unkown
page readonly
11C0000
heap
page read and write
1D49000
heap
page read and write
340E000
heap
page read and write
2DB4000
heap
page read and write
4410000
direct allocation
page read and write
598C000
unkown
page read and write
30A0000
heap
page read and write
4E51000
heap
page read and write
341A000
heap
page read and write
4E51000
heap
page read and write
1250000
heap
page read and write
4E51000
heap
page read and write
2E3C000
unkown
page read and write
15B0000
unkown
page readonly
1130000
heap
page read and write
E60000
unkown
page readonly
4E51000
heap
page read and write
15922F01000
trusted library allocation
page read and write
32E4000
heap
page read and write
3418000
heap
page read and write
4E51000
heap
page read and write
11D0000
heap
page read and write
15922C90000
heap
page read and write
4410000
direct allocation
page read and write
1BF3000
heap
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
1C9E000
heap
page read and write
54395FF000
stack
page read and write
3411000
heap
page read and write
B88000
heap
page read and write
17DB000
stack
page read and write
4410000
direct allocation
page read and write
1941000
unkown
page readonly
4393000
direct allocation
page read and write
45AE000
direct allocation
page read and write
D11000
unkown
page execute read
11D1000
unkown
page readonly
136E000
stack
page read and write
235E000
stack
page read and write
2870000
unkown
page execute and read and write
392D000
heap
page read and write
1D3C000
heap
page read and write
9F0000
unkown
page readonly
4E51000
heap
page read and write
D10000
unkown
page readonly
3929000
heap
page read and write
387F000
stack
page read and write
FD0000
unkown
page write copy
15AF000
stack
page read and write
4393000
direct allocation
page read and write
1225000
heap
page read and write
1941000
unkown
page readonly
332C000
unkown
page read and write
33B1000
heap
page read and write
1230000
unkown
page readonly
930000
unkown
page readonly
453D000
direct allocation
page read and write
5760000
system
page execute and read and write
1C19000
heap
page read and write
4E51000
heap
page read and write
3404000
heap
page read and write
5502000
unclassified section
page read and write
30F0000
heap
page read and write
3425000
heap
page read and write
11BD000
stack
page read and write
4E51000
heap
page read and write
1B9C000
heap
page read and write
8460000
trusted library allocation
page read and write
1210000
unkown
page readonly
82C5000
heap
page read and write
85AE000
stack
page read and write
561C000
unclassified section
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
4E51000
heap
page read and write
342E000
heap
page read and write
3425000
heap
page read and write
13CF000
heap
page read and write
A10000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
17FF000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
33A6000
heap
page read and write
D10000
unkown
page readonly
4E51000
heap
page read and write
1390000
unkown
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
960000
heap
page read and write
11D1000
unkown
page readonly
38D0000
direct allocation
page read and write
4E51000
heap
page read and write
57E9000
system
page execute and read and write
4E51000
heap
page read and write
1381000
unkown
page readonly
4E51000
heap
page read and write
15922FA6000
trusted library allocation
page read and write
D27000
unkown
page readonly
4E51000
heap
page read and write
4E51000
heap
page read and write
33FF000
heap
page read and write
399E000
heap
page read and write
1220000
heap
page read and write
4E51000
heap
page read and write
3398000
heap
page read and write
57CD000
system
page execute and read and write
4E51000
heap
page read and write
1381000
unkown
page readonly
2F8B000
stack
page read and write
4E51000
heap
page read and write
D27000
unkown
page readonly
4E51000
heap
page read and write
15922D00000
trusted library allocation
page read and write
453D000
direct allocation
page read and write
4E51000
heap
page read and write
4F7E000
heap
page read and write
4E51000
heap
page read and write
307A000
stack
page read and write
1C1A000
heap
page read and write
1C19000
heap
page read and write
3418000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
1B9F000
heap
page read and write
83BD000
heap
page read and write
4E51000
heap
page read and write
343D000
heap
page read and write
4270000
direct allocation
page read and write
4E51000
heap
page read and write
55C2000
unclassified section
page read and write
D27000
unkown
page readonly
1B60000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4393000
direct allocation
page read and write
607A000
unclassified section
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
1D58000
heap
page read and write
4764000
unkown
page execute and read and write
4E51000
heap
page read and write
9F0000
unkown
page readonly
E3F000
stack
page read and write
B2E000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
3412000
heap
page read and write
1189000
unkown
page read and write
5EF4000
unclassified section
page execute and read and write
8329000
heap
page read and write
85EF000
stack
page read and write
1370000
unkown
page read and write
83A0000
trusted library allocation
page read and write
5437DFB000
stack
page read and write
1B68000
heap
page read and write
4E51000
heap
page read and write
3660000
trusted library allocation
page read and write
1C14000
heap
page read and write
4E51000
heap
page read and write
3600000
heap
page read and write
3714000
unkown
page read and write
590000
unkown
page readonly
F01000
unkown
page execute read
D1E000
unkown
page readonly
FDC000
stack
page read and write
FC2000
unkown
page readonly
4393000
direct allocation
page read and write
15922AD0000
trusted library allocation
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
3200000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
332C000
unkown
page read and write
2864000
heap
page read and write
4270000
direct allocation
page read and write
57C3000
system
page execute and read and write
D25000
unkown
page read and write
57C5000
system
page execute and read and write
534E000
direct allocation
page execute and read and write
B30000
unkown
page read and write
2DC0000
unkown
page read and write
15922E21000
trusted library allocation
page read and write
2860000
heap
page read and write
4E51000
heap
page read and write
26F0000
heap
page read and write
4E5B000
heap
page read and write
1592122A000
heap
page read and write
3600000
direct allocation
page read and write
3D42000
direct allocation
page execute and read and write
2F5F000
stack
page read and write
F9C000
unkown
page readonly
4E51000
heap
page read and write
3213000
heap
page read and write
4E51000
heap
page read and write
1C19000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
3660000
trusted library allocation
page read and write
21042000
system
page read and write
52D9000
direct allocation
page execute and read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
117E000
stack
page read and write
4E51000
heap
page read and write
2DB0000
heap
page read and write
960000
heap
page read and write
2DD0000
unkown
page read and write
831F000
heap
page read and write
3CD1000
direct allocation
page execute and read and write
D1E000
unkown
page readonly
4E51000
heap
page read and write
4E51000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
D1E000
unkown
page readonly
3723000
heap
page read and write
4539000
direct allocation
page read and write
FD4000
unkown
page readonly
4E51000
heap
page read and write
82F2000
heap
page read and write
4E51000
heap
page read and write
57DC000
unclassified section
page read and write
82DA000
heap
page read and write
340E000
heap
page read and write
950000
unkown
page readonly
BA7000
heap
page read and write
36A0000
heap
page read and write
1C04000
heap
page read and write
5FA000
stack
page read and write
4E51000
heap
page read and write
1C19000
heap
page read and write
4E51000
heap
page read and write
363E000
stack
page read and write
4E51000
heap
page read and write
3800000
heap
page read and write
4E51000
heap
page read and write
3405000
heap
page read and write
4E51000
heap
page read and write
45AE000
direct allocation
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
15921250000
heap
page read and write
59CE000
stack
page read and write
4A00000
unclassified section
page execute and read and write
3447000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
D11000
unkown
page execute read
1220000
heap
page read and write
4E51000
heap
page read and write
F00000
unkown
page readonly
EDA000
stack
page read and write
4E51000
heap
page read and write
940000
unkown
page readonly
3421000
heap
page read and write
4E51000
heap
page read and write
26F0000
heap
page read and write
3E60000
direct allocation
page read and write
4E51000
heap
page read and write
2E50000
heap
page read and write
4539000
direct allocation
page read and write
4E51000
heap
page read and write
620C000
unclassified section
page read and write
D1E000
unkown
page readonly
21102000
system
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
15921253000
heap
page read and write
4E51000
heap
page read and write
547D000
direct allocation
page execute and read and write
303C000
stack
page read and write
4FF0000
trusted library allocation
page execute and read and write
3270000
unkown
page execute and read and write
4E51000
heap
page read and write
5D56000
unclassified section
page read and write
1C14000
heap
page read and write
4E51000
heap
page read and write
4080000
unkown
page read and write
9D0000
unkown
page read and write
There are 660 hidden memdumps, click here to show them.