IOC Report
Final Shipping Document.exe

loading gif

Files

File Path
Type
Category
Malicious
Final Shipping Document.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\303e-83
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\autEBF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autF0E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\batchers
ASCII text, with very long lines (28674), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\buncal
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Final Shipping Document.exe
"C:\Users\user\Desktop\Final Shipping Document.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Final Shipping Document.exe"
malicious
C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe
"C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe"
malicious
C:\Windows\SysWOW64\gpupdate.exe
"C:\Windows\SysWOW64\gpupdate.exe"
malicious
C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe
"C:\Program Files (x86)\gbpubFqQDlEdUubIycEGbALhwRGmBmoyLPeZJVyYmzhdFTGKOwnWivArruVgDQZcIvzJxwqhWNWp\QnAcfZuONg.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.xawcfzcql9tcvj.shop
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.gridban.xyz/hheq/
162.254.38.56
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.artfulfusionhub.lat/qogc/?1Hg=gSefwjuKZsCuEGncBKSqgUjxJH+JcQqz+YMIzSjuOw+Y7MS0RxllxFRTV2Gn+zIiEtGaIum1DRHYZfVjpe+PZ37sYiWUr85MYTmGz//Zl0zNgUvOn9EXUqnEL5f2vZZjHw==&ejlto=QtkhctgpxJahPP0
188.114.96.3
http://www.9muyiutyt.online/39t8/?ejlto=QtkhctgpxJahPP0&1Hg=89XVD+Uem60dZ1sDkhzA52EMF3du5QagyTQWgC74INncPQoYck8yZMKmhHYNHaZtvErKW4LDM1h+RSXnGPYlre6VurbK/jTyWP4vAbFcilh1x/G4ZSBU3Zl0LqnbfRVoCA==
154.218.3.243
http://www.xawcfzcql9tcvj.shop/jug9/
142.171.29.133
http://www.toppersbusiness.net/hugu/?ejlto=QtkhctgpxJahPP0&1Hg=vP/uG1dCvZ4PilGLFureb44eipjsuOvQXbL49xadF8bamHBm064La/heTQ4Pfno94C0sjxAGfQAAlyvLUXQlTtZB4zIUvEoM3zQ61bjQ13shwgtlO8h70X3QY/xUTFtAQA==
178.212.35.248
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.gridban.xyz/hheq/?1Hg=OQHjTIEzxI4+3uBJ4Ch4/gBE3u2u+7BoOuCOJurFjFRPYCarRFUfzgF9IWvn7XTpBRUAmOCVXs1kY9Zsut6EdHJsI9AJbTCs7iVD1ouYIWNqRmE7fP7CptgJfBKNW9KUkg==&ejlto=QtkhctgpxJahPP0
162.254.38.56
http://www.rajveena.online/wptv/
84.32.84.32
http://www.lovezi.shop/htli/?ejlto=QtkhctgpxJahPP0&1Hg=FjHjKNi/s/5kx+KnkSdD7DBcT3to66u90TWIQenAa0cXcBEeV9ZBFtbsq/uwbVXzm5/jkr9fdxMKasz/2IuVvEkWA5eWfr+6uK8ix+bvoaaPZEzC/cixV8fHHlKsAdCdfw==
84.32.84.32
http://www.artfulfusionhub.lat/qogc/
188.114.96.3
https://www.ecosia.org/newtab/
unknown
http://www.pqnqxn.xyz/fku9/
104.21.59.240
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.9muyiutyt.online/39t8/?ejlto=QtkhctgpxJahPP0&1Hg=89XVD
unknown
http://www.suntextmeetings.online/1wd4/
148.66.138.133
https://artfulfusionhub.lat/qogc/?1Hg=gSefwjuKZsCuEGncBKSqgUjxJH
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.lovezi.shop/htli/
84.32.84.32
http://www.rajveena.online/wptv/?1Hg=UBaSdI4L0SLSC905rDSQkq9H8MI7DUlv5ISEnSSRcSh4rK6z4u+7wt/PvR1ecI/XTQn9u86KuHymNqf2TqtSEsuZKbYYXqmtSyS/3vOPWUm+34EGC7zgpqm6nqQHfZAfNA==&ejlto=QtkhctgpxJahPP0
84.32.84.32
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
http://www.pqnqxn.xyz
unknown
http://www.9muyiutyt.online/39t8/
154.218.3.243
http://www.suntextmeetings.online/1wd4/?1Hg=ScHcXTKAO5eSE6uaWkYIjyQnfQ68P9tZ9TtcMsVrul6RoGZN9pvJIdRIgUxQy3rdaSGeQ+CIaUiYSa72rbvJ1wEunXVWpcUP89m8x1dRGPimMbT7bK/R3/HUlg93LDGrxg==&ejlto=QtkhctgpxJahPP0
148.66.138.133
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.pqnqxn.xyz/fku9/?1Hg=8+E5hHkJAI9KLzdnRfLjsdta627301LWvCxQnfER7jE6HhXelR0L8M6eacA5uvGu6fFFzcUJZ3XtElIgDxgrCowK6qnc0dbjxbukcDgECY4ZLyFshyoZroDOS+2pE7Poig==&ejlto=QtkhctgpxJahPP0
104.21.59.240
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.pqnqxn.xyz
104.21.59.240
malicious
www.gridban.xyz
162.254.38.56
malicious
www.76716e97778bac2e.com
unknown
malicious
www.rajveena.online
unknown
malicious
www.9muyiutyt.online
unknown
malicious
www.toppersbusiness.net
unknown
malicious
www.suntextmeetings.online
unknown
malicious
www.lovezi.shop
unknown
malicious
www.xawcfzcql9tcvj.shop
unknown
malicious
suntextmeetings.online
148.66.138.133
www.artfulfusionhub.lat
188.114.96.3
8fyhback.javalebogame008.com
154.218.3.243
toppersbusiness.net
178.212.35.248
rajveena.online
84.32.84.32
lovezi.shop
84.32.84.32
xawcfzcql9tcvj.shop
142.171.29.133
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.59.240
www.pqnqxn.xyz
United States
malicious
162.254.38.56
www.gridban.xyz
United States
malicious
178.212.35.248
toppersbusiness.net
Germany
188.114.96.3
www.artfulfusionhub.lat
European Union
84.32.84.32
rajveena.online
Lithuania
154.218.3.243
8fyhback.javalebogame008.com
Seychelles
142.171.29.133
xawcfzcql9tcvj.shop
Canada
148.66.138.133
suntextmeetings.online
Singapore

Memdumps

Base Address
Regiontype
Protect
Malicious
3470000
unkown
page execute and read and write
malicious
4C20000
trusted library allocation
page read and write
malicious
4C70000
trusted library allocation
page read and write
malicious
4400000
unclassified section
page execute and read and write
malicious
5550000
system
page execute and read and write
malicious
3220000
unclassified section
page execute and read and write
malicious
2D80000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
4060000
direct allocation
page read and write
D80000
unkown
page readonly
1A0000
unkown
page readonly
4B21000
heap
page read and write
2F7E000
stack
page read and write
418D000
direct allocation
page read and write
2F5C000
unkown
page read and write
1B7000
unkown
page readonly
890F000
stack
page read and write
1A1000
unkown
page execute read
3FE3000
direct allocation
page read and write
A00000
unkown
page readonly
3EC0000
direct allocation
page read and write
1781000
unkown
page readonly
4B21000
heap
page read and write
39BA000
unkown
page read and write
2C05000
heap
page read and write
4B21000
heap
page read and write
2F02000
unkown
page read and write
3180000
direct allocation
page read and write
2183D950000
trusted library allocation
page read and write
4B21000
heap
page read and write
82AF000
heap
page read and write
3152000
heap
page read and write
31CE000
heap
page read and write
CC1000
unkown
page readonly
4B21000
heap
page read and write
2C40000
unkown
page readonly
4C45000
heap
page read and write
3BF12000
system
page read and write
2183DC01000
trusted library allocation
page read and write
413D000
direct allocation
page read and write
D40000
unkown
page readonly
D80000
heap
page read and write
3BE52000
system
page read and write
4B21000
heap
page read and write
15D8000
heap
page read and write
3500000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
E37000
heap
page read and write
4B21000
heap
page read and write
31E4000
heap
page read and write
30F4000
heap
page read and write
15D0000
heap
page read and write
4E7D000
heap
page read and write
D60000
unkown
page readonly
35CD000
direct allocation
page execute and read and write
278A000
stack
page read and write
E10000
heap
page read and write
C74000
unkown
page readonly
2F00000
direct allocation
page read and write
2183BEC0000
system
page execute and read and write
DCE000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
31F0000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4010000
direct allocation
page read and write
4B21000
heap
page read and write
4E00000
trusted library allocation
page read and write
2A02000
heap
page read and write
3801000
heap
page read and write
4139000
direct allocation
page read and write
297F000
stack
page read and write
81E9000
heap
page read and write
164F000
heap
page read and write
30F4000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
51E2000
unclassified section
page read and write
4B21000
heap
page read and write
BC0000
unkown
page readonly
2C34000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
100F000
stack
page read and write
4B21000
heap
page read and write
1A1000
unkown
page execute read
2183C02C000
heap
page read and write
1570000
direct allocation
page execute and read and write
C80000
unkown
page readonly
4B21000
heap
page read and write
2183C000000
heap
page read and write
1520000
heap
page read and write
2874000
heap
page read and write
7F0000
unkown
page readonly
4B21000
heap
page read and write
2870000
heap
page read and write
15F4000
heap
page read and write
4B21000
heap
page read and write
15FC000
heap
page read and write
4B21000
heap
page read and write
2980000
unkown
page readonly
21CE000
stack
page read and write
12F8000
heap
page read and write
1604000
heap
page read and write
A6A000
stack
page read and write
3C12C000
system
page read and write
E18000
heap
page read and write
2E42000
unkown
page read and write
2C12000
heap
page read and write
2BCE000
stack
page read and write
4B21000
heap
page read and write
31CA000
heap
page read and write
315C000
heap
page read and write
1604000
heap
page read and write
2D30000
heap
page read and write
4B21000
heap
page read and write
1B5000
unkown
page read and write
1DCE000
stack
page read and write
81BD000
heap
page read and write
4B21000
heap
page read and write
2183DC00000
trusted library allocation
page read and write
4B21000
heap
page read and write
D40000
unkown
page readonly
1AE000
unkown
page readonly
12F8000
heap
page read and write
2183BF1D000
system
page execute and read and write
4B21000
heap
page read and write
3229000
heap
page read and write
CD0000
heap
page read and write
4060000
direct allocation
page read and write
27C0000
heap
page read and write
52FC000
unclassified section
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
515D000
direct allocation
page execute and read and write
4B21000
heap
page read and write
13F0000
unkown
page readonly
DB0000
unkown
page read and write
320E000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
2183DCCE000
trusted library allocation
page read and write
4B21000
heap
page read and write
D70000
heap
page read and write
4B21000
heap
page read and write
88CE000
stack
page read and write
81B1000
heap
page read and write
5A36000
unclassified section
page read and write
4B21000
heap
page read and write
2183C033000
heap
page read and write
3EC0000
direct allocation
page read and write
2D01000
heap
page read and write
DE1000
unkown
page readonly
4B21000
heap
page read and write
3204000
heap
page read and write
5D5A000
unclassified section
page read and write
4B21000
heap
page read and write
CC1000
unkown
page readonly
4B21000
heap
page read and write
81DE000
heap
page read and write
C6C000
unkown
page read and write
566C000
unkown
page read and write
32AF000
stack
page read and write
10FC000
stack
page read and write
4B21000
heap
page read and write
D20000
unkown
page read and write
41AE000
direct allocation
page read and write
2183C00F000
heap
page read and write
BA0000
unkown
page readonly
4B21000
heap
page read and write
63A2000
unclassified section
page read and write
1634000
heap
page read and write
DAD000
stack
page read and write
2C05000
heap
page read and write
311C000
unkown
page read and write
2980000
unkown
page readonly
4B21000
heap
page read and write
4B21000
heap
page read and write
12CF000
stack
page read and write
4B21000
heap
page read and write
B95EFFE000
stack
page read and write
2A13000
heap
page read and write
CA0000
unkown
page readonly
322D000
heap
page read and write
4B21000
heap
page read and write
55A8000
system
page execute and read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
3CDE000
unkown
page read and write
2D48000
stack
page read and write
81B8000
heap
page read and write
4B21000
heap
page read and write
3214000
heap
page read and write
4B21000
heap
page read and write
3E20000
direct allocation
page read and write
2C21000
heap
page read and write
31D5000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
BA0000
unkown
page readonly
1604000
heap
page read and write
4B21000
heap
page read and write
DF0000
unkown
page read and write
D1E000
stack
page read and write
349E000
direct allocation
page execute and read and write
3F93000
direct allocation
page read and write
4B21000
heap
page read and write
2EF0000
heap
page read and write
2183DB0D000
trusted library allocation
page read and write
4B21000
heap
page read and write
820B000
heap
page read and write
4B21000
heap
page read and write
12F0000
heap
page read and write
3F93000
direct allocation
page read and write
1AE000
unkown
page readonly
2D30000
heap
page read and write
164F000
heap
page read and write
81BA000
heap
page read and write
31DD000
heap
page read and write
4B21000
heap
page read and write
41AE000
direct allocation
page read and write
2A13000
heap
page read and write
13FF000
stack
page read and write
342D000
direct allocation
page execute and read and write
4B21000
heap
page read and write
82A2000
heap
page read and write
4B21000
heap
page read and write
311C000
unkown
page read and write
DE1000
unkown
page readonly
4B21000
heap
page read and write
4CDF000
heap
page read and write
4FBD000
direct allocation
page execute and read and write
4B21000
heap
page read and write
413D000
direct allocation
page read and write
1620000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B22000
heap
page read and write
2D0B000
stack
page read and write
3100000
heap
page read and write
31B9000
heap
page read and write
4B21000
heap
page read and write
1584000
heap
page read and write
4B21000
heap
page read and write
16E5000
heap
page read and write
10FC000
stack
page read and write
815E000
stack
page read and write
16F5000
heap
page read and write
16E4000
heap
page read and write
4B21000
heap
page read and write
4010000
direct allocation
page read and write
3152000
heap
page read and write
D0A000
stack
page read and write
4B21000
heap
page read and write
30F4000
heap
page read and write
3158000
heap
page read and write
1781000
unkown
page readonly
4B21000
heap
page read and write
3E70000
direct allocation
page read and write
1650000
heap
page read and write
C62000
unkown
page readonly
2183C01C000
heap
page read and write
D76000
heap
page read and write
31B2000
heap
page read and write
4B21000
heap
page read and write
355F000
unkown
page execute and read and write
4B21000
heap
page read and write
2A13000
heap
page read and write
4B21000
heap
page read and write
1A1000
unkown
page execute read
164F000
heap
page read and write
4B21000
heap
page read and write
1604000
heap
page read and write
274C000
stack
page read and write
2A13000
heap
page read and write
320A000
heap
page read and write
307F000
stack
page read and write
B6C000
stack
page read and write
4B21000
heap
page read and write
C62000
unkown
page readonly
13CE000
stack
page read and write
31DA000
heap
page read and write
4B21000
heap
page read and write
3152000
heap
page read and write
2BE0000
unkown
page read and write
2A70000
unkown
page execute and read and write
D1A000
stack
page read and write
3158000
heap
page read and write
1B7000
unkown
page readonly
2A13000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
D60000
unkown
page readonly
2183BFB0000
heap
page read and write
D50000
unkown
page readonly
4B21000
heap
page read and write
2E3F000
stack
page read and write
1550000
heap
page read and write
81E4000
heap
page read and write
4B21000
heap
page read and write
164F000
heap
page read and write
4B21000
heap
page read and write
34C0000
trusted library allocation
page read and write
2874000
heap
page read and write
15F7000
heap
page read and write
D0A000
stack
page read and write
C6C000
unkown
page write copy
8350000
trusted library allocation
page read and write
2A13000
heap
page read and write
4B21000
heap
page read and write
C3C000
unkown
page readonly
4B20000
heap
page read and write
3130000
heap
page read and write
1634000
heap
page read and write
FC7000
unkown
page read and write
1619000
heap
page read and write
4189000
direct allocation
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
C80000
unkown
page readonly
BA0000
unkown
page readonly
D50000
unkown
page readonly
4B21000
heap
page read and write
34C0000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
31DF000
heap
page read and write
2C00000
heap
page read and write
3152000
heap
page read and write
4B21000
heap
page read and write
4EEF000
unclassified section
page execute and read and write
3EC0000
direct allocation
page read and write
3E70000
direct allocation
page read and write
8211000
heap
page read and write
3149000
heap
page read and write
4010000
direct allocation
page read and write
2A13000
heap
page read and write
BA1000
unkown
page execute read
3138000
heap
page read and write
13F0000
unkown
page readonly
3C514000
system
page read and write
4B21000
heap
page read and write
2A13000
heap
page read and write
2C19000
heap
page read and write
B95D7FE000
stack
page read and write
2183D940000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
3F5F000
unkown
page execute and read and write
3152000
heap
page read and write
4060000
direct allocation
page read and write
2BCE000
stack
page read and write
BD0000
heap
page read and write
3FE3000
direct allocation
page read and write
5EEC000
unclassified section
page read and write
13A1000
unkown
page readonly
6210000
unclassified section
page read and write
4B21000
heap
page read and write
C90000
unkown
page readonly
B95CFFC000
stack
page read and write
2F3E000
stack
page read and write
DCE000
stack
page read and write
2183DCBE000
trusted library allocation
page read and write
81A6000
heap
page read and write
B95E7FE000
stack
page read and write
B6C000
stack
page read and write
822A000
heap
page read and write
81BF000
heap
page read and write
130F000
heap
page read and write
4002000
unkown
page read and write
1699000
heap
page read and write
4B21000
heap
page read and write
8202000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1604000
heap
page read and write
8480000
heap
page read and write
4B21000
heap
page read and write
4E0C000
heap
page read and write
576C000
unkown
page read and write
3F93000
direct allocation
page read and write
BD0000
heap
page read and write
4B21000
heap
page read and write
2A00000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1AE000
unkown
page readonly
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4194000
unkown
page read and write
2870000
heap
page read and write
CB0000
unkown
page read and write
44EF000
unclassified section
page execute and read and write
314D000
heap
page read and write
418D000
direct allocation
page read and write
4B21000
heap
page read and write
4E00000
trusted library allocation
page read and write
607E000
unclassified section
page read and write
8194000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
D7E000
stack
page read and write
13BF000
stack
page read and write
31AF000
heap
page read and write
55B4000
system
page execute and read and write
4B21000
heap
page read and write
31D0000
direct allocation
page read and write
2183DB03000
trusted library allocation
page read and write
164F000
heap
page read and write
CB0000
unkown
page read and write
51D2000
direct allocation
page execute and read and write
4B21000
heap
page read and write
55C4000
system
page execute and read and write
DF0000
heap
page read and write
4B21000
heap
page read and write
2A13000
heap
page read and write
1A0000
unkown
page readonly
4B21000
heap
page read and write
31A0000
heap
page read and write
2183DCA9000
trusted library allocation
page read and write
FC4000
unkown
page read and write
4B21000
heap
page read and write
13EF000
stack
page read and write
2A13000
heap
page read and write
1AE000
unkown
page readonly
31C6000
heap
page read and write
DA0000
heap
page read and write
81EE000
heap
page read and write
8290000
trusted library allocation
page read and write
4B21000
heap
page read and write
2E42000
unkown
page read and write
4B21000
heap
page read and write
2183DB00000
trusted library allocation
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
E10000
heap
page read and write
12CF000
stack
page read and write
4139000
direct allocation
page read and write
314D000
heap
page read and write
CA0000
unkown
page readonly
2183DA00000
trusted library allocation
page read and write
DF0000
unkown
page read and write
418D000
direct allocation
page read and write
3147000
heap
page read and write
4B21000
heap
page read and write
2A13000
heap
page read and write
821C000
heap
page read and write
41FE000
direct allocation
page read and write
3187000
heap
page read and write
3696000
unkown
page read and write
2183DB14000
trusted library allocation
page read and write
4B21000
heap
page read and write
41AE000
direct allocation
page read and write
41FE000
direct allocation
page read and write
3B4C000
unkown
page read and write
BC0000
unkown
page readonly
821E000
heap
page read and write
1010000
unkown
page readonly
7F0000
unkown
page readonly
1A0000
unkown
page readonly
1A0000
unkown
page readonly
164F000
heap
page read and write
3300000
direct allocation
page execute and read and write
4B21000
heap
page read and write
3023000
heap
page read and write
2C17000
heap
page read and write
58A4000
unclassified section
page read and write
4E7E000
stack
page read and write
13DB000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
FCA000
unkown
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
8227000
heap
page read and write
7E0000
unkown
page readonly
16F5000
heap
page read and write
1613000
heap
page read and write
81B5000
heap
page read and write
2183BFD0000
heap
page read and write
4B21000
heap
page read and write
164F000
heap
page read and write
31B2000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
2183DB16000
trusted library allocation
page read and write
4B21000
heap
page read and write
D80000
heap
page read and write
1B5000
unkown
page read and write
164F000
heap
page read and write
5161000
direct allocation
page execute and read and write
6534000
unclassified section
page read and write
13A1000
unkown
page readonly
4B21000
heap
page read and write
2E10000
heap
page read and write
326E000
stack
page read and write
3E70000
direct allocation
page read and write
3E70000
unkown
page read and write
BA0000
unkown
page readonly
12F0000
heap
page read and write
4B21000
heap
page read and write
31C6000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
413D000
direct allocation
page read and write
2A13000
heap
page read and write
81A3000
heap
page read and write
2A13000
heap
page read and write
2183DCC4000
trusted library allocation
page read and write
1611000
heap
page read and write
C3C000
unkown
page readonly
2183D8B0000
heap
page read and write
B95DFFE000
stack
page read and write
4B21000
heap
page read and write
55D0000
system
page execute and read and write
329E000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
31AF000
heap
page read and write
2183C033000
heap
page read and write
4189000
direct allocation
page read and write
4B21000
heap
page read and write
2183C030000
heap
page read and write
DEE000
stack
page read and write
81CA000
heap
page read and write
12E0000
unkown
page readonly
4D60000
trusted library allocation
page execute and read and write
4B21000
heap
page read and write
D60000
heap
page read and write
4B21000
heap
page read and write
A00000
unkown
page readonly
4B21000
heap
page read and write
4B21000
heap
page read and write
3429000
direct allocation
page execute and read and write
3194000
heap
page read and write
D80000
unkown
page readonly
1A1000
unkown
page execute read
164F000
heap
page read and write
4B21000
heap
page read and write
1010000
unkown
page readonly
1615000
heap
page read and write
4E00000
trusted library allocation
page read and write
4B21000
heap
page read and write
2183C00A000
heap
page read and write
3642000
direct allocation
page execute and read and write
3504000
unkown
page read and write
3000000
heap
page read and write
8218000
heap
page read and write
12E0000
unkown
page readonly
3164000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
2C40000
unkown
page readonly
7EA0000
trusted library allocation
page read and write
16E4000
heap
page read and write
3A00000
unclassified section
page execute and read and write
2A13000
heap
page read and write
2C17000
heap
page read and write
4E08000
heap
page read and write
4FB9000
direct allocation
page execute and read and write
4B21000
heap
page read and write
1611000
heap
page read and write
DD0000
unkown
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1B5000
unkown
page read and write
8221000
heap
page read and write
4B21000
heap
page read and write
D70000
heap
page read and write
35D1000
direct allocation
page execute and read and write
DA0000
heap
page read and write
502E000
direct allocation
page execute and read and write
C90000
unkown
page readonly
15E9000
heap
page read and write
5627000
system
page execute and read and write
1B7000
unkown
page readonly
1510000
heap
page read and write
C70000
unkown
page write copy
4B21000
heap
page read and write
7E0000
unkown
page readonly
2183D950000
trusted library allocation
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4CC0000
trusted library allocation
page read and write
2C34000
heap
page read and write
58AF000
stack
page read and write
54BC000
unclassified section
page read and write
A6A000
stack
page read and write
2C00000
unkown
page read and write
2A13000
heap
page read and write
31A5000
heap
page read and write
317F000
stack
page read and write
D20000
unkown
page read and write
2183DB0F000
trusted library allocation
page read and write
E18000
heap
page read and write
2F00000
heap
page read and write
4B21000
heap
page read and write
31B9000
heap
page read and write
27E0000
heap
page read and write
C74000
unkown
page readonly
31D0000
direct allocation
page read and write
1580000
heap
page read and write
2C30000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
2E3F000
stack
page read and write
DB0000
unkown
page read and write
2C1A000
heap
page read and write
4B21000
heap
page read and write
DD0000
unkown
page read and write
1B5000
unkown
page read and write
4189000
direct allocation
page read and write
BB0000
unkown
page readonly
2A13000
heap
page read and write
30E0000
heap
page read and write
4139000
direct allocation
page read and write
81AB000
heap
page read and write
3147000
heap
page read and write
3152000
heap
page read and write
4B21000
heap
page read and write
2BE0000
unkown
page read and write
2C30000
heap
page read and write
BB0000
unkown
page readonly
1699000
heap
page read and write
1B7000
unkown
page readonly
41FE000
direct allocation
page read and write
4B21000
heap
page read and write
CD0000
heap
page read and write
4B21000
heap
page read and write
2183DB21000
trusted library allocation
page read and write
4B21000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
30F0000
heap
page read and write
2BF0000
unkown
page read and write
57AE000
stack
page read and write
4B21000
heap
page read and write
BA1000
unkown
page execute read
31D0000
direct allocation
page read and write
3FE3000
direct allocation
page read and write
52A2000
unclassified section
page read and write
There are 652 hidden memdumps, click here to show them.