Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Final Shipping Document.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\303e-83
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autEBF.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autF0E.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\batchers
|
ASCII text, with very long lines (28674), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\buncal
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Final Shipping Document.exe
|
"C:\Users\user\Desktop\Final Shipping Document.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\Final Shipping Document.exe"
|
||
C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe
|
"C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe"
|
||
C:\Windows\SysWOW64\gpupdate.exe
|
"C:\Windows\SysWOW64\gpupdate.exe"
|
||
C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe
|
"C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.xawcfzcql9tcvj.shop
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://www.gridban.xyz/hheq/
|
162.254.38.56
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://www.artfulfusionhub.lat/qogc/?1Hg=gSefwjuKZsCuEGncBKSqgUjxJH+JcQqz+YMIzSjuOw+Y7MS0RxllxFRTV2Gn+zIiEtGaIum1DRHYZfVjpe+PZ37sYiWUr85MYTmGz//Zl0zNgUvOn9EXUqnEL5f2vZZjHw==&ejlto=QtkhctgpxJahPP0
|
188.114.96.3
|
||
http://www.9muyiutyt.online/39t8/?ejlto=QtkhctgpxJahPP0&1Hg=89XVD+Uem60dZ1sDkhzA52EMF3du5QagyTQWgC74INncPQoYck8yZMKmhHYNHaZtvErKW4LDM1h+RSXnGPYlre6VurbK/jTyWP4vAbFcilh1x/G4ZSBU3Zl0LqnbfRVoCA==
|
154.218.3.243
|
||
http://www.xawcfzcql9tcvj.shop/jug9/
|
142.171.29.133
|
||
http://www.toppersbusiness.net/hugu/?ejlto=QtkhctgpxJahPP0&1Hg=vP/uG1dCvZ4PilGLFureb44eipjsuOvQXbL49xadF8bamHBm064La/heTQ4Pfno94C0sjxAGfQAAlyvLUXQlTtZB4zIUvEoM3zQ61bjQ13shwgtlO8h70X3QY/xUTFtAQA==
|
178.212.35.248
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://www.gridban.xyz/hheq/?1Hg=OQHjTIEzxI4+3uBJ4Ch4/gBE3u2u+7BoOuCOJurFjFRPYCarRFUfzgF9IWvn7XTpBRUAmOCVXs1kY9Zsut6EdHJsI9AJbTCs7iVD1ouYIWNqRmE7fP7CptgJfBKNW9KUkg==&ejlto=QtkhctgpxJahPP0
|
162.254.38.56
|
||
http://www.rajveena.online/wptv/
|
84.32.84.32
|
||
http://www.lovezi.shop/htli/?ejlto=QtkhctgpxJahPP0&1Hg=FjHjKNi/s/5kx+KnkSdD7DBcT3to66u90TWIQenAa0cXcBEeV9ZBFtbsq/uwbVXzm5/jkr9fdxMKasz/2IuVvEkWA5eWfr+6uK8ix+bvoaaPZEzC/cixV8fHHlKsAdCdfw==
|
84.32.84.32
|
||
http://www.artfulfusionhub.lat/qogc/
|
188.114.96.3
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://www.pqnqxn.xyz/fku9/
|
104.21.59.240
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.9muyiutyt.online/39t8/?ejlto=QtkhctgpxJahPP0&1Hg=89XVD
|
unknown
|
||
http://www.suntextmeetings.online/1wd4/
|
148.66.138.133
|
||
https://artfulfusionhub.lat/qogc/?1Hg=gSefwjuKZsCuEGncBKSqgUjxJH
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://www.lovezi.shop/htli/
|
84.32.84.32
|
||
http://www.rajveena.online/wptv/?1Hg=UBaSdI4L0SLSC905rDSQkq9H8MI7DUlv5ISEnSSRcSh4rK6z4u+7wt/PvR1ecI/XTQn9u86KuHymNqf2TqtSEsuZKbYYXqmtSyS/3vOPWUm+34EGC7zgpqm6nqQHfZAfNA==&ejlto=QtkhctgpxJahPP0
|
84.32.84.32
|
||
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
|
unknown
|
||
http://www.pqnqxn.xyz
|
unknown
|
||
http://www.9muyiutyt.online/39t8/
|
154.218.3.243
|
||
http://www.suntextmeetings.online/1wd4/?1Hg=ScHcXTKAO5eSE6uaWkYIjyQnfQ68P9tZ9TtcMsVrul6RoGZN9pvJIdRIgUxQy3rdaSGeQ+CIaUiYSa72rbvJ1wEunXVWpcUP89m8x1dRGPimMbT7bK/R3/HUlg93LDGrxg==&ejlto=QtkhctgpxJahPP0
|
148.66.138.133
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://www.pqnqxn.xyz/fku9/?1Hg=8+E5hHkJAI9KLzdnRfLjsdta627301LWvCxQnfER7jE6HhXelR0L8M6eacA5uvGu6fFFzcUJZ3XtElIgDxgrCowK6qnc0dbjxbukcDgECY4ZLyFshyoZroDOS+2pE7Poig==&ejlto=QtkhctgpxJahPP0
|
104.21.59.240
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.pqnqxn.xyz
|
104.21.59.240
|
||
www.gridban.xyz
|
162.254.38.56
|
||
www.76716e97778bac2e.com
|
unknown
|
||
www.rajveena.online
|
unknown
|
||
www.9muyiutyt.online
|
unknown
|
||
www.toppersbusiness.net
|
unknown
|
||
www.suntextmeetings.online
|
unknown
|
||
www.lovezi.shop
|
unknown
|
||
www.xawcfzcql9tcvj.shop
|
unknown
|
||
suntextmeetings.online
|
148.66.138.133
|
||
www.artfulfusionhub.lat
|
188.114.96.3
|
||
8fyhback.javalebogame008.com
|
154.218.3.243
|
||
toppersbusiness.net
|
178.212.35.248
|
||
rajveena.online
|
84.32.84.32
|
||
lovezi.shop
|
84.32.84.32
|
||
xawcfzcql9tcvj.shop
|
142.171.29.133
|
There are 6 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.59.240
|
www.pqnqxn.xyz
|
United States
|
||
162.254.38.56
|
www.gridban.xyz
|
United States
|
||
178.212.35.248
|
toppersbusiness.net
|
Germany
|
||
188.114.96.3
|
www.artfulfusionhub.lat
|
European Union
|
||
84.32.84.32
|
rajveena.online
|
Lithuania
|
||
154.218.3.243
|
8fyhback.javalebogame008.com
|
Seychelles
|
||
142.171.29.133
|
xawcfzcql9tcvj.shop
|
Canada
|
||
148.66.138.133
|
suntextmeetings.online
|
Singapore
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3470000
|
unkown
|
page execute and read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
4400000
|
unclassified section
|
page execute and read and write
|
||
5550000
|
system
|
page execute and read and write
|
||
3220000
|
unclassified section
|
page execute and read and write
|
||
2D80000
|
system
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4060000
|
direct allocation
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
418D000
|
direct allocation
|
page read and write
|
||
2F5C000
|
unkown
|
page read and write
|
||
1B7000
|
unkown
|
page readonly
|
||
890F000
|
stack
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
3FE3000
|
direct allocation
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
3EC0000
|
direct allocation
|
page read and write
|
||
1781000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
39BA000
|
unkown
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2F02000
|
unkown
|
page read and write
|
||
3180000
|
direct allocation
|
page read and write
|
||
2183D950000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
82AF000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
31CE000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
4C45000
|
heap
|
page read and write
|
||
3BF12000
|
system
|
page read and write
|
||
2183DC01000
|
trusted library allocation
|
page read and write
|
||
413D000
|
direct allocation
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
D80000
|
heap
|
page read and write
|
||
3BE52000
|
system
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31E4000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
4E7D000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
35CD000
|
direct allocation
|
page execute and read and write
|
||
278A000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
2F00000
|
direct allocation
|
page read and write
|
||
2183BEC0000
|
system
|
page execute and read and write
|
||
DCE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4010000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
3801000
|
heap
|
page read and write
|
||
4139000
|
direct allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
81E9000
|
heap
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
51E2000
|
unclassified section
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
2C34000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
2183C02C000
|
heap
|
page read and write
|
||
1570000
|
direct allocation
|
page execute and read and write
|
||
C80000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
2183C000000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
2874000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
15F4000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
15FC000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2980000
|
unkown
|
page readonly
|
||
21CE000
|
stack
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
A6A000
|
stack
|
page read and write
|
||
3C12C000
|
system
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
2E42000
|
unkown
|
page read and write
|
||
2C12000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
315C000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1B5000
|
unkown
|
page read and write
|
||
1DCE000
|
stack
|
page read and write
|
||
81BD000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183DC00000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
1AE000
|
unkown
|
page readonly
|
||
12F8000
|
heap
|
page read and write
|
||
2183BF1D000
|
system
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
4060000
|
direct allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
52FC000
|
unclassified section
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
515D000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
13F0000
|
unkown
|
page readonly
|
||
DB0000
|
unkown
|
page read and write
|
||
320E000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183DCCE000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
88CE000
|
stack
|
page read and write
|
||
81B1000
|
heap
|
page read and write
|
||
5A36000
|
unclassified section
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183C033000
|
heap
|
page read and write
|
||
3EC0000
|
direct allocation
|
page read and write
|
||
2D01000
|
heap
|
page read and write
|
||
DE1000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
5D5A000
|
unclassified section
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
81DE000
|
heap
|
page read and write
|
||
C6C000
|
unkown
|
page read and write
|
||
566C000
|
unkown
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
41AE000
|
direct allocation
|
page read and write
|
||
2183C00F000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
63A2000
|
unclassified section
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
DAD000
|
stack
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
311C000
|
unkown
|
page read and write
|
||
2980000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
B95EFFE000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
322D000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
55A8000
|
system
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3CDE000
|
unkown
|
page read and write
|
||
2D48000
|
stack
|
page read and write
|
||
81B8000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
2C21000
|
heap
|
page read and write
|
||
31D5000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
1604000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
DF0000
|
unkown
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
349E000
|
direct allocation
|
page execute and read and write
|
||
3F93000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2183DB0D000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
820B000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
3F93000
|
direct allocation
|
page read and write
|
||
1AE000
|
unkown
|
page readonly
|
||
2D30000
|
heap
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
81BA000
|
heap
|
page read and write
|
||
31DD000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
41AE000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
342D000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
82A2000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
311C000
|
unkown
|
page read and write
|
||
DE1000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
4CDF000
|
heap
|
page read and write
|
||
4FBD000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
413D000
|
direct allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
31B9000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
16E5000
|
heap
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4010000
|
direct allocation
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
D0A000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
3158000
|
heap
|
page read and write
|
||
1781000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
3E70000
|
direct allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
C62000
|
unkown
|
page readonly
|
||
2183C01C000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
31B2000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
355F000
|
unkown
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
164F000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
274C000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
C62000
|
unkown
|
page readonly
|
||
13CE000
|
stack
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
2BE0000
|
unkown
|
page read and write
|
||
2A70000
|
unkown
|
page execute and read and write
|
||
D1A000
|
stack
|
page read and write
|
||
3158000
|
heap
|
page read and write
|
||
1B7000
|
unkown
|
page readonly
|
||
2A13000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
2183BFB0000
|
heap
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
81E4000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
2874000
|
heap
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
D0A000
|
stack
|
page read and write
|
||
C6C000
|
unkown
|
page write copy
|
||
8350000
|
trusted library allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
C3C000
|
unkown
|
page readonly
|
||
4B20000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
FC7000
|
unkown
|
page read and write
|
||
1619000
|
heap
|
page read and write
|
||
4189000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
BA0000
|
unkown
|
page readonly
|
||
D50000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31DF000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4EEF000
|
unclassified section
|
page execute and read and write
|
||
3EC0000
|
direct allocation
|
page read and write
|
||
3E70000
|
direct allocation
|
page read and write
|
||
8211000
|
heap
|
page read and write
|
||
3149000
|
heap
|
page read and write
|
||
4010000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page execute read
|
||
3138000
|
heap
|
page read and write
|
||
13F0000
|
unkown
|
page readonly
|
||
3C514000
|
system
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2C19000
|
heap
|
page read and write
|
||
B95D7FE000
|
stack
|
page read and write
|
||
2183D940000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3F5F000
|
unkown
|
page execute and read and write
|
||
3152000
|
heap
|
page read and write
|
||
4060000
|
direct allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3FE3000
|
direct allocation
|
page read and write
|
||
5EEC000
|
unclassified section
|
page read and write
|
||
13A1000
|
unkown
|
page readonly
|
||
6210000
|
unclassified section
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
B95CFFC000
|
stack
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
2183DCBE000
|
trusted library allocation
|
page read and write
|
||
81A6000
|
heap
|
page read and write
|
||
B95E7FE000
|
stack
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
822A000
|
heap
|
page read and write
|
||
81BF000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
4002000
|
unkown
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
8202000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
8480000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
576C000
|
unkown
|
page read and write
|
||
3F93000
|
direct allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1AE000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4194000
|
unkown
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
44EF000
|
unclassified section
|
page execute and read and write
|
||
314D000
|
heap
|
page read and write
|
||
418D000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
607E000
|
unclassified section
|
page read and write
|
||
8194000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
31AF000
|
heap
|
page read and write
|
||
55B4000
|
system
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
2183DB03000
|
trusted library allocation
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
51D2000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
55C4000
|
system
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
2183DCA9000
|
trusted library allocation
|
page read and write
|
||
FC4000
|
unkown
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
1AE000
|
unkown
|
page readonly
|
||
31C6000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
81EE000
|
heap
|
page read and write
|
||
8290000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2E42000
|
unkown
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183DB00000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
4139000
|
direct allocation
|
page read and write
|
||
314D000
|
heap
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
2183DA00000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
unkown
|
page read and write
|
||
418D000
|
direct allocation
|
page read and write
|
||
3147000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
821C000
|
heap
|
page read and write
|
||
41FE000
|
direct allocation
|
page read and write
|
||
3187000
|
heap
|
page read and write
|
||
3696000
|
unkown
|
page read and write
|
||
2183DB14000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
41AE000
|
direct allocation
|
page read and write
|
||
41FE000
|
direct allocation
|
page read and write
|
||
3B4C000
|
unkown
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
821E000
|
heap
|
page read and write
|
||
1010000
|
unkown
|
page readonly
|
||
7F0000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
164F000
|
heap
|
page read and write
|
||
3300000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3023000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
58A4000
|
unclassified section
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
FCA000
|
unkown
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
8227000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
16F5000
|
heap
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
81B5000
|
heap
|
page read and write
|
||
2183BFD0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
31B2000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183DB16000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1B5000
|
unkown
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
5161000
|
direct allocation
|
page execute and read and write
|
||
6534000
|
unclassified section
|
page read and write
|
||
13A1000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
3E70000
|
direct allocation
|
page read and write
|
||
3E70000
|
unkown
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
12F0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31C6000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
413D000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
81A3000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2183DCC4000
|
trusted library allocation
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
C3C000
|
unkown
|
page readonly
|
||
2183D8B0000
|
heap
|
page read and write
|
||
B95DFFE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
55D0000
|
system
|
page execute and read and write
|
||
329E000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31AF000
|
heap
|
page read and write
|
||
2183C033000
|
heap
|
page read and write
|
||
4189000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183C030000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
81CA000
|
heap
|
page read and write
|
||
12E0000
|
unkown
|
page readonly
|
||
4D60000
|
trusted library allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3429000
|
direct allocation
|
page execute and read and write
|
||
3194000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
1A1000
|
unkown
|
page execute read
|
||
164F000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1010000
|
unkown
|
page readonly
|
||
1615000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183C00A000
|
heap
|
page read and write
|
||
3642000
|
direct allocation
|
page execute and read and write
|
||
3504000
|
unkown
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
8218000
|
heap
|
page read and write
|
||
12E0000
|
unkown
|
page readonly
|
||
3164000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3A00000
|
unclassified section
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
4E08000
|
heap
|
page read and write
|
||
4FB9000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
DD0000
|
unkown
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
1B5000
|
unkown
|
page read and write
|
||
8221000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
35D1000
|
direct allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
502E000
|
direct allocation
|
page execute and read and write
|
||
C90000
|
unkown
|
page readonly
|
||
15E9000
|
heap
|
page read and write
|
||
5627000
|
system
|
page execute and read and write
|
||
1B7000
|
unkown
|
page readonly
|
||
1510000
|
heap
|
page read and write
|
||
C70000
|
unkown
|
page write copy
|
||
4B21000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
2183D950000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
58AF000
|
stack
|
page read and write
|
||
54BC000
|
unclassified section
|
page read and write
|
||
A6A000
|
stack
|
page read and write
|
||
2C00000
|
unkown
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
31A5000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
2183DB0F000
|
trusted library allocation
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
31B9000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
31D0000
|
direct allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
DD0000
|
unkown
|
page read and write
|
||
1B5000
|
unkown
|
page read and write
|
||
4189000
|
direct allocation
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
2A13000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
4139000
|
direct allocation
|
page read and write
|
||
81AB000
|
heap
|
page read and write
|
||
3147000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2BE0000
|
unkown
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
1699000
|
heap
|
page read and write
|
||
1B7000
|
unkown
|
page readonly
|
||
41FE000
|
direct allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2183DB21000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2BF0000
|
unkown
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page execute read
|
||
31D0000
|
direct allocation
|
page read and write
|
||
3FE3000
|
direct allocation
|
page read and write
|
||
52A2000
|
unclassified section
|
page read and write
|
There are 652 hidden memdumps, click here to show them.