IOC Report
Purchase_Order_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase_Order_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1FZhY82B
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\syphilous
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase_Order_pdf.exe
"C:\Users\user\Desktop\Purchase_Order_pdf.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Purchase_Order_pdf.exe"
malicious
C:\Program Files (x86)\NAXjQwOxPJIdnJBYBNfGJpJjLIAkCkkWbrVUswdurkTaBfBKxAasSeLCBzqa\hEtOKWgxZfeL.exe
"C:\Program Files (x86)\NAXjQwOxPJIdnJBYBNfGJpJjLIAkCkkWbrVUswdurkTaBfBKxAasSeLCBzqa\hEtOKWgxZfeL.exe"
malicious
C:\Windows\SysWOW64\rasdial.exe
"C:\Windows\SysWOW64\rasdial.exe"
malicious
C:\Program Files (x86)\NAXjQwOxPJIdnJBYBNfGJpJjLIAkCkkWbrVUswdurkTaBfBKxAasSeLCBzqa\hEtOKWgxZfeL.exe
"C:\Program Files (x86)\NAXjQwOxPJIdnJBYBNfGJpJjLIAkCkkWbrVUswdurkTaBfBKxAasSeLCBzqa\hEtOKWgxZfeL.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.patioprojex.africa/iv79/
197.189.237.186
malicious
http://www.drivedoge.website/czka/
195.161.68.8
malicious
http://www.wdeb18.top/jo6v/
206.119.82.147
malicious
http://www.lanxuanz.tech/1q08/
136.143.186.12
malicious
http://www.fieldelse.net/exug/
18.141.10.107
malicious
http://www.huyven.xyz/dbbh/
162.0.238.246
malicious
http://www.h5hph710am.site/ni9w/
144.34.186.85
malicious
http://www.galaxyslot88rtp.lat/sfat/
162.0.209.213
malicious
http://www.bayarcepat19.click/g48c/
188.114.97.3
malicious
http://www.dto20.shop/zlyl/
3.33.130.190
malicious
http://www.dverkom.store/fbcx/
31.31.196.17
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://jino.ru
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.lanxuanz.tech
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.huyven.xyz
162.0.238.246
malicious
www.fieldelse.net
18.141.10.107
malicious
www.ngmr.xyz
54.67.87.110
malicious
galaxyslot88rtp.lat
162.0.209.213
malicious
zhs.zohosites.com
136.143.186.12
malicious
dto20.shop
3.33.130.190
malicious
patioprojex.africa
197.189.237.186
malicious
wdeb18.top
206.119.82.147
malicious
www.drivedoge.website
195.161.68.8
malicious
h5hph710am.site
144.34.186.85
malicious
www.dverkom.store
31.31.196.17
malicious
www.bayarcepat19.click
188.114.97.3
malicious
www.wdeb18.top
unknown
malicious
www.dto20.shop
unknown
malicious
www.h5hph710am.site
unknown
malicious
www.animekuid.xyz
unknown
malicious
www.lanxuanz.tech
unknown
malicious
www.longfilsalphonse.net
unknown
malicious
www.galaxyslot88rtp.lat
unknown
malicious
www.patioprojex.africa
unknown
malicious
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.0.238.246
www.huyven.xyz
Canada
malicious
136.143.186.12
zhs.zohosites.com
United States
malicious
197.189.237.186
patioprojex.africa
South Africa
malicious
188.114.97.3
www.bayarcepat19.click
European Union
malicious
31.31.196.17
www.dverkom.store
Russian Federation
malicious
144.34.186.85
h5hph710am.site
Canada
malicious
54.67.87.110
www.ngmr.xyz
United States
malicious
206.119.82.147
wdeb18.top
United States
malicious
195.161.68.8
www.drivedoge.website
Russian Federation
malicious
162.0.209.213
galaxyslot88rtp.lat
Canada
malicious
18.141.10.107
www.fieldelse.net
United States
malicious
3.33.130.190
dto20.shop
United States
malicious
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3BE0000
unclassified section
page execute and read and write
malicious
2F80000
unkown
page execute and read and write
malicious
87B0000
unclassified section
page execute and read and write
malicious
DD0000
trusted library allocation
page read and write
malicious
A10000
system
page execute and read and write
malicious
4EF0000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
E30000
trusted library allocation
page read and write
malicious
3B34000
unkown
page read and write
79EB000
heap
page read and write
5434000
unclassified section
page read and write
B70000
unkown
page read and write
3013000
heap
page read and write
AF7000
unkown
page readonly
B54000
heap
page read and write
BB0000
unkown
page read and write
1620000
heap
page read and write
46B1000
heap
page read and write
4FE0000
unkown
page read and write
79BE000
heap
page read and write
15CE000
stack
page read and write
488D000
direct allocation
page read and write
1A0000
heap
page read and write
1388000
heap
page read and write
7AA4000
heap
page read and write
4760000
direct allocation
page read and write
3600000
heap
page read and write
2ABC000
unkown
page read and write
AE2000
heap
page read and write
46B1000
heap
page read and write
27E2000
unkown
page read and write
46B1000
heap
page read and write
27693970000
trusted library allocation
page read and write
ADE000
heap
page read and write
D28000
heap
page read and write
7F0000
unkown
page readonly
46B1000
heap
page read and write
4D62000
direct allocation
page execute and read and write
3301000
heap
page read and write
AE8000
heap
page read and write
AD9000
heap
page read and write
27693C0E000
trusted library allocation
page read and write
3FEA000
unkown
page read and write
46B1000
heap
page read and write
27691FBF000
system
page execute and read and write
BFE000
stack
page read and write
2BAC000
stack
page read and write
46B1000
heap
page read and write
4AB000
unkown
page readonly
AD9000
heap
page read and write
5820000
unclassified section
page execute and read and write
3200000
heap
page read and write
B47000
heap
page read and write
B50000
unkown
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
BC0000
heap
page read and write
4BBE000
direct allocation
page execute and read and write
B77000
heap
page read and write
AF7000
unkown
page readonly
7D0000
unkown
page readonly
E80000
trusted library allocation
page read and write
46B1000
heap
page read and write
F7F73FE000
stack
page read and write
46B1000
heap
page read and write
2F9E000
stack
page read and write
46B1000
heap
page read and write
E80000
trusted library allocation
page read and write
2EA4000
unkown
page read and write
46B1000
heap
page read and write
488D000
direct allocation
page read and write
27693C03000
trusted library allocation
page read and write
276920C0000
heap
page read and write
1388000
heap
page read and write
79C0000
heap
page read and write
ADD000
heap
page read and write
46B1000
heap
page read and write
157F000
stack
page read and write
46E3000
direct allocation
page read and write
115C000
stack
page read and write
34FF000
stack
page read and write
46B1000
heap
page read and write
B7F000
heap
page read and write
4440000
heap
page read and write
79B000
stack
page read and write
27693DCE000
trusted library allocation
page read and write
27693950000
heap
page read and write
809F000
stack
page read and write
3E16000
heap
page read and write
3EBF000
heap
page read and write
490000
unkown
page write copy
AE0000
unkown
page readonly
2E34000
heap
page read and write
3DEC000
heap
page read and write
BC4000
heap
page read and write
399E000
direct allocation
page execute and read and write
46B1000
heap
page read and write
3EBF000
heap
page read and write
F1F000
stack
page read and write
433B000
heap
page read and write
488D000
direct allocation
page read and write
4F46000
system
page execute and read and write
35FF000
stack
page read and write
46B1000
heap
page read and write
3729000
heap
page read and write
79DB000
heap
page read and write
400000
unkown
page readonly
46B1000
heap
page read and write
115C000
stack
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
2F60000
direct allocation
page read and write
5DA0000
unclassified section
page read and write
46B1000
heap
page read and write
B50000
unkown
page read and write
321A000
heap
page read and write
335A000
unkown
page read and write
ADD000
heap
page read and write
F7F63FB000
stack
page read and write
27693B00000
trusted library allocation
page read and write
D20000
heap
page read and write
379E000
heap
page read and write
79AC000
heap
page read and write
8F4000
heap
page read and write
DB0000
heap
page read and write
46B1000
heap
page read and write
3013000
heap
page read and write
BAA000
heap
page read and write
46B1000
heap
page read and write
3013000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
19E000
stack
page read and write
46B1000
heap
page read and write
AE2000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
DF0000
unkown
page readonly
B3D000
heap
page read and write
799F000
heap
page read and write
46B1000
heap
page read and write
4B49000
direct allocation
page execute and read and write
B75000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
B6E000
heap
page read and write
46B1000
heap
page read and write
486C000
heap
page read and write
46B2000
heap
page read and write
B61000
heap
page read and write
46B1000
heap
page read and write
28A2000
unkown
page read and write
11D0000
heap
page read and write
3013000
heap
page read and write
4AB000
unkown
page readonly
4D72000
unclassified section
page read and write
2E80000
heap
page read and write
46B1000
heap
page read and write
488D000
direct allocation
page read and write
3B50000
direct allocation
page read and write
C30000
unkown
page readonly
AF5000
unkown
page read and write
1370000
unkown
page readonly
46B1000
heap
page read and write
79B6000
heap
page read and write
B4E000
stack
page read and write
45C0000
direct allocation
page read and write
D20000
heap
page read and write
3929000
direct allocation
page execute and read and write
46B1000
heap
page read and write
417C000
unkown
page read and write
2E40000
unkown
page read and write
27693DBE000
trusted library allocation
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
136E000
stack
page read and write
C10000
unkown
page read and write
400000
unkown
page readonly
1190000
unkown
page readonly
372D000
heap
page read and write
46B1000
heap
page read and write
11B0000
unkown
page readonly
3AD1000
direct allocation
page execute and read and write
48FE000
direct allocation
page read and write
46B1000
heap
page read and write
B90000
unkown
page readonly
3B42000
direct allocation
page execute and read and write
4760000
direct allocation
page read and write
DE0000
unkown
page readonly
4760000
direct allocation
page read and write
46B1000
heap
page read and write
7A0F000
heap
page read and write
3013000
heap
page read and write
AEE000
unkown
page readonly
46B1000
heap
page read and write
48FE000
direct allocation
page read and write
8CE000
heap
page read and write
2769209F000
heap
page read and write
276920C3000
heap
page read and write
3601000
heap
page read and write
AEE000
unkown
page readonly
3E0B000
heap
page read and write
3EBE000
heap
page read and write
46B1000
heap
page read and write
58EA000
unclassified section
page read and write
4E32000
unclassified section
page read and write
900000
heap
page read and write
4CED000
direct allocation
page execute and read and write
AF5000
unkown
page read and write
276920AC000
heap
page read and write
1310000
unkown
page read and write
27692099000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
E80000
trusted library allocation
page read and write
46B1000
heap
page read and write
100000
heap
page read and write
630000
unkown
page readonly
5FC0000
unkown
page execute and read and write
4E20000
unclassified section
page execute and read and write
79BB000
heap
page read and write
1911000
unkown
page readonly
4860000
trusted library allocation
page execute and read and write
AE1000
unkown
page execute read
46B1000
heap
page read and write
AF7000
unkown
page readonly
7A90000
trusted library allocation
page read and write
DD0000
unkown
page readonly
46B1000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
7A25000
heap
page read and write
27693AC0000
heap
page read and write
7A19000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
B7C000
heap
page read and write
46B1000
heap
page read and write
48FE000
direct allocation
page read and write
1301000
unkown
page readonly
60C4000
unclassified section
page read and write
401000
unkown
page execute read
DB0000
trusted library allocation
page read and write
3013000
heap
page read and write
45C0000
direct allocation
page read and write
C44000
heap
page read and write
3217000
heap
page read and write
46B1000
heap
page read and write
27691F90000
system
page execute and read and write
7AA3000
heap
page read and write
B9A000
heap
page read and write
B33000
heap
page read and write
B72000
heap
page read and write
7A27000
heap
page read and write
AD7000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
AE0000
unkown
page readonly
4889000
direct allocation
page read and write
610000
unkown
page readonly
AE1000
unkown
page execute read
79E1000
heap
page read and write
46B1000
heap
page read and write
AC7000
heap
page read and write
513C000
unkown
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
2E90000
unkown
page readonly
3C30000
heap
page read and write
4999000
heap
page read and write
27693DB1000
trusted library allocation
page read and write
368E000
stack
page read and write
1580000
unkown
page readonly
46B1000
heap
page read and write
C25000
heap
page read and write
490000
unkown
page read and write
2E70000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
139B000
unkown
page read and write
B7C000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
3036000
unkown
page read and write
C20000
heap
page read and write
79C000
stack
page read and write
3F74000
heap
page read and write
805E000
stack
page read and write
C3F000
stack
page read and write
3FDC000
heap
page read and write
1580000
unkown
page readonly
46B1000
heap
page read and write
46B1000
heap
page read and write
4F3D000
system
page execute and read and write
7A1E000
heap
page read and write
46B1000
heap
page read and write
4F56000
system
page execute and read and write
2DF4000
heap
page read and write
45C0000
direct allocation
page read and write
46B1000
heap
page read and write
1301000
unkown
page readonly
1C0000
heap
page read and write
158F000
stack
page read and write
46B1000
heap
page read and write
3013000
heap
page read and write
2E20000
heap
page read and write
2E30000
heap
page read and write
46B1000
heap
page read and write
3E58000
unkown
page read and write
B68000
heap
page read and write
105A000
stack
page read and write
EFD000
stack
page read and write
7B40000
trusted library allocation
page read and write
3205000
heap
page read and write
2F00000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
B9A000
heap
page read and write
55C0000
unkown
page execute and read and write
488D000
direct allocation
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
27693C10000
trusted library allocation
page read and write
46B1000
heap
page read and write
BB0000
unkown
page read and write
F1F000
stack
page read and write
8AF000
stack
page read and write
1380000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
BC4000
heap
page read and write
46B1000
heap
page read and write
3EBF000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
11B0000
unkown
page readonly
8F6000
heap
page read and write
276920C3000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
BC0000
heap
page read and write
46B1000
heap
page read and write
3FDC000
heap
page read and write
47B0000
trusted library allocation
page read and write
1203C000
system
page read and write
657A000
unclassified section
page read and write
2E40000
unkown
page read and write
B42000
heap
page read and write
B54000
heap
page read and write
1640000
heap
page read and write
2FDE000
stack
page read and write
79C000
stack
page read and write
3BA0000
direct allocation
page read and write
46E3000
direct allocation
page read and write
494E000
stack
page read and write
630000
unkown
page readonly
3F37000
heap
page read and write
AF5000
unkown
page read and write
27BF000
stack
page read and write
46B1000
heap
page read and write
3A9D000
heap
page read and write
46B1000
heap
page read and write
503C000
unkown
page read and write
7710000
trusted library allocation
page read and write
3BA0000
direct allocation
page read and write
482000
unkown
page readonly
4F62000
system
page execute and read and write
B61000
heap
page read and write
8B4000
stack
page read and write
46B1000
heap
page read and write
B4E000
stack
page read and write
4BC0000
unkown
page execute and read and write
670C000
unclassified section
page read and write
110000
heap
page read and write
27693970000
trusted library allocation
page read and write
160E000
stack
page read and write
3BA0000
direct allocation
page read and write
B33000
heap
page read and write
13A5000
unkown
page read and write
125E4000
system
page read and write
3000000
heap
page read and write
3400000
heap
page read and write
46B1000
heap
page read and write
620000
unkown
page readonly
4B4D000
direct allocation
page execute and read and write
B75000
heap
page read and write
12F0000
unkown
page read and write
46B1000
heap
page read and write
4A20000
direct allocation
page execute and read and write
46B1000
heap
page read and write
AD7000
heap
page read and write
46B1000
heap
page read and write
3002000
heap
page read and write
401000
unkown
page execute read
46B1000
heap
page read and write
2E1F000
stack
page read and write
3013000
heap
page read and write
47D5000
heap
page read and write
27693C16000
trusted library allocation
page read and write
4CF1000
direct allocation
page execute and read and write
46B1000
heap
page read and write
63E8000
unclassified section
page read and write
3B10000
direct allocation
page read and write
374E000
unkown
page execute and read and write
46B1000
heap
page read and write
2E30000
heap
page read and write
B90000
unkown
page readonly
46B1000
heap
page read and write
46B1000
heap
page read and write
482000
unkown
page readonly
46B1000
heap
page read and write
2BEA000
stack
page read and write
48FE000
direct allocation
page read and write
B15000
heap
page read and write
79A6000
heap
page read and write
B7F000
heap
page read and write
46B1000
heap
page read and write
7A00000
heap
page read and write
46B1000
heap
page read and write
15E000
stack
page read and write
11A0000
unkown
page readonly
8C0000
heap
page read and write
3013000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
69A000
stack
page read and write
46E3000
direct allocation
page read and write
D4C000
heap
page read and write
3013000
heap
page read and write
46B1000
heap
page read and write
12B1000
unkown
page readonly
BA0000
heap
page read and write
27692050000
heap
page read and write
8CA000
heap
page read and write
B40000
heap
page read and write
3B13000
heap
page read and write
367E000
unkown
page read and write
4A7000
unkown
page read and write
B77000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
AF7000
unkown
page readonly
46B1000
heap
page read and write
12EE000
stack
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
620000
unkown
page readonly
3DF6000
heap
page read and write
46B1000
heap
page read and write
48FE000
direct allocation
page read and write
B42000
heap
page read and write
4A0A000
heap
page read and write
4889000
direct allocation
page read and write
C44000
heap
page read and write
B40000
heap
page read and write
C30000
unkown
page readonly
46B1000
heap
page read and write
B54000
heap
page read and write
DD0000
unkown
page readonly
7D8000
stack
page read and write
3523000
heap
page read and write
1625000
heap
page read and write
79B8000
heap
page read and write
3013000
heap
page read and write
2F44000
heap
page read and write
4889000
direct allocation
page read and write
46B1000
heap
page read and write
31C8000
unkown
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
46E3000
direct allocation
page read and write
B61000
unkown
page readonly
46B1000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
2F40000
heap
page read and write
AE1000
unkown
page execute read
3F32000
heap
page execute and read and write
4889000
direct allocation
page read and write
3A8F000
stack
page read and write
46B1000
heap
page read and write
F7F6BFE000
stack
page read and write
105A000
stack
page read and write
AE2000
heap
page read and write
37C0000
unkown
page execute and read and write
7E0000
unkown
page readonly
610000
unkown
page readonly
45C0000
direct allocation
page read and write
46E3000
direct allocation
page read and write
A00000
heap
page read and write
1911000
unkown
page readonly
46B1000
heap
page read and write
27693C00000
trusted library allocation
page read and write
118E000
stack
page read and write
1310000
unkown
page read and write
3EBF000
heap
page read and write
46B1000
heap
page read and write
12F0000
unkown
page read and write
900000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
4F65000
system
page execute and read and write
D3F000
heap
page read and write
B2E000
heap
page read and write
AEE000
unkown
page readonly
4995000
heap
page read and write
3013000
heap
page read and write
392D000
direct allocation
page execute and read and write
4889000
direct allocation
page read and write
79A3000
heap
page read and write
121FC000
system
page read and write
B47000
heap
page read and write
1190000
unkown
page readonly
4889000
direct allocation
page read and write
2E90000
unkown
page readonly
AE2000
heap
page read and write
46B1000
heap
page read and write
11FE2000
system
page read and write
46B1000
heap
page read and write
2ABC000
unkown
page read and write
46B1000
heap
page read and write
504C000
unclassified section
page read and write
27D0000
heap
page read and write
46B1000
heap
page read and write
AE0000
unkown
page readonly
C40000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
55C6000
unclassified section
page read and write
3013000
heap
page read and write
69A000
stack
page read and write
B63000
heap
page read and write
43AE000
unclassified section
page execute and read and write
2E34000
heap
page read and write
F20000
unkown
page readonly
B3D000
heap
page read and write
3F78000
heap
page read and write
46B1000
heap
page read and write
B47000
heap
page read and write
11A0000
unkown
page readonly
B3D000
heap
page read and write
27D0000
heap
page read and write
27E2000
unkown
page read and write
46B1000
heap
page read and write
B61000
unkown
page readonly
B62000
heap
page read and write
AE1000
unkown
page execute read
46B1000
heap
page read and write
3F32000
heap
page read and write
5758000
unclassified section
page read and write
46B1000
heap
page read and write
4E8C000
unclassified section
page read and write
46B1000
heap
page read and write
27693D01000
trusted library allocation
page read and write
46B1000
heap
page read and write
11C0000
heap
page read and write
3800000
direct allocation
page execute and read and write
B42000
heap
page read and write
3013000
heap
page read and write
4420000
unclassified section
page execute and read and write
46B1000
heap
page read and write
3212000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
BA4000
heap
page read and write
79B1000
heap
page read and write
9A000
stack
page read and write
4FB9000
system
page execute and read and write
46B1000
heap
page read and write
3ACD000
direct allocation
page execute and read and write
AC0000
heap
page read and write
A90000
heap
page read and write
46B1000
heap
page read and write
AF5000
unkown
page read and write
11C0000
heap
page read and write
C44000
heap
page read and write
276920BC000
heap
page read and write
488D000
direct allocation
page read and write
B70000
unkown
page read and write
46B1000
heap
page read and write
2E80000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
27692070000
heap
page read and write
A00000
heap
page read and write
46B1000
heap
page read and write
7F0000
unkown
page readonly
46B1000
heap
page read and write
45C0000
direct allocation
page read and write
27693970000
trusted library allocation
page read and write
B2E000
heap
page read and write
B40000
heap
page read and write
46B1000
heap
page read and write
825000
unkown
page read and write
6220000
unclassified section
page execute and read and write
F20000
unkown
page readonly
46B1000
heap
page read and write
AEE000
unkown
page readonly
BA0000
heap
page read and write
3217000
heap
page read and write
27693DC4000
trusted library allocation
page read and write
3F30000
heap
page read and write
28FC000
unkown
page read and write
46B1000
heap
page read and write
B88000
heap
page read and write
1370000
unkown
page readonly
46B1000
heap
page read and write
1380000
heap
page read and write
12B1000
unkown
page readonly
27693C21000
trusted library allocation
page read and write
13A9000
unkown
page read and write
49F0000
heap
page read and write
46B1000
heap
page read and write
4760000
direct allocation
page read and write
AE0000
unkown
page readonly
46B1000
heap
page read and write
46B1000
heap
page read and write
F7F7BFF000
stack
page read and write
11D0000
heap
page read and write
46B1000
heap
page read and write
45C0000
direct allocation
page read and write
46B1000
heap
page read and write
4760000
direct allocation
page read and write
46B1000
heap
page read and write
4760000
direct allocation
page read and write
7D0000
unkown
page readonly
3013000
heap
page read and write
46B0000
heap
page read and write
11F22000
system
page read and write
DE0000
unkown
page readonly
27692090000
heap
page read and write
AA0000
heap
page read and write
AF4000
heap
page read and write
B72000
heap
page read and write
7A09000
heap
page read and write
46B1000
heap
page read and write
AE2000
heap
page read and write
3205000
heap
page read and write
D28000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
7E0000
unkown
page readonly
46B1000
heap
page read and write
46B1000
heap
page read and write
3013000
heap
page read and write
3220000
heap
page read and write
DF0000
unkown
page readonly
79E5000
heap
page read and write
3D30000
heap
page read and write
BA4000
heap
page read and write
7A15000
heap
page read and write
3F3F000
heap
page read and write
46B1000
heap
page read and write
46E3000
direct allocation
page read and write
BAA000
heap
page read and write
3E11000
heap
page read and write
3F31000
heap
page read and write
AE2000
heap
page read and write
48FE000
direct allocation
page read and write
46B1000
heap
page read and write
3F31000
heap
page read and write
13A8000
unkown
page read and write
89F000
stack
page read and write
C0E000
stack
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
E20000
heap
page read and write
5C0E000
unclassified section
page read and write
2E40000
heap
page read and write
3E22000
heap
page read and write
27693C13000
trusted library allocation
page read and write
6C20000
unclassified section
page execute and read and write
46B1000
heap
page read and write
79CA000
heap
page read and write
41C0000
unkown
page execute and read and write
C20000
heap
page read and write
2F50000
heap
page read and write
46B1000
heap
page read and write
B88000
heap
page read and write
AE8000
heap
page read and write
46B1000
heap
page read and write
3810000
unkown
page read and write
B33000
heap
page read and write
There are 675 hidden memdumps, click here to show them.