IOC Report
OEC-GCE-250326-Shipper Verified Gross Mass (VGM) Declaration Form (update) SO 1047.XLSX.scr.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps201510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
OEC-GCE-250326-Shipper Verified Gross Mass (VGM) Declaration Form (update) SO 1047.XLSX.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\WSP\wsp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\WSP\wsp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Links\Fqukkjoy.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\13830.cmd
Unicode text, UTF-8 text, with very long lines (577), with CRLF line terminators
dropped
C:\ProgramData\5764.cmd
Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\ProgramData\neo.cmd
Unicode text, UTF-8 text, with very long lines (372), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhvE1BB.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x98490fa6, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\wxyoqgxrejiyvnyavymm
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Links\Fqukkjoy.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Links\\Fqukkjoy.PIF">), ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OEC-GCE-250326-Shipper Verified Gross Mass (VGM) Declaration Form (update) SO 1047.XLSX.scr.exe
"C:\Users\user\Desktop\OEC-GCE-250326-Shipper Verified Gross Mass (VGM) Declaration Form (update) SO 1047.XLSX.scr.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5764.cmd""
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13830.cmd""
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wxyoqgxrejiyvnyavymm"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\yrdgryilsracxcueeihfubwe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\yrdgryilsracxcueeihfubwe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\itqrrrtmgasphiiiwtthxgjvpdf"
malicious
C:\Users\user\Links\Fqukkjoy.PIF
"C:\Users\user\Links\Fqukkjoy.PIF"
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\Users\user\Links\Fqukkjoy.PIF
"C:\Users\user\Links\Fqukkjoy.PIF"
malicious
C:\ProgramData\WSP\wsp.exe
"C:\ProgramData\WSP\wsp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
180.178
malicious
https://www.office.com/
unknown
http://www.imvu.comr
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://d0682b2d8bbebf21dab46160329925d6.azr.footprintdns.com/apc/trans.gif?8595da0e88f921ab00454191
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
http://geoplugin.net/json.gp8
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
http://o.pki.goog/we20%
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5b&FrontEnd=AF
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
http://geoplugin.net/
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://i.pki.goog/gsr1.crt0-
unknown
http://c.pki.goog/r/r4.crl0
unknown
https://d0682b2d8bbebf21dab46160329925d6.azr.footprintdns.com/apc/trans.gif?82954a9491e844512441fcdc
unknown
http://i.pki.goog/r4.crt0
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://www.pmail.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
http://www.ebuddy.com
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Fqukkjoy
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
wsp-KG6IRP
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
wsp-KG6IRP
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
exepath
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
licence
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
time
HKEY_CURRENT_USER\SOFTWARE\wsp-KG6IRP
UID

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7FBC0000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
21038000
direct allocation
page readonly
malicious
3F6B3000
heap
page read and write
malicious
22F0000
direct allocation
page read and write
malicious
3F382000
heap
page read and write
malicious
3F0EB000
heap
page read and write
malicious
3F200000
unclassified section
page execute and read and write
malicious
3F209000
heap
page read and write
malicious
21D0000
direct allocation
page read and write
malicious
21028000
direct allocation
page readonly
malicious
6B8000
heap
page read and write
malicious
89B000
heap
page read and write
malicious
21018000
direct allocation
page readonly
malicious
21949000
direct allocation
page readonly
malicious
3F5A3000
heap
page read and write
malicious
3F112000
heap
page read and write
malicious
76E000
heap
page read and write
malicious
844000
heap
page read and write
malicious
806000
heap
page read and write
malicious
8A1000
heap
page read and write
malicious
7E670000
direct allocation
page read and write
malicious
8CC000
heap
page read and write
malicious
8ED000
heap
page read and write
malicious
21022000
direct allocation
page read and write
20E6E000
stack
page read and write
20A8F000
stack
page read and write
20CFF000
stack
page read and write
231A000
direct allocation
page read and write
7EF04000
direct allocation
page read and write
728000
heap
page read and write
2110000
heap
page read and write
20CFF000
stack
page read and write
7E670000
direct allocation
page read and write
850000
heap
page read and write
655000
heap
page read and write
24EA000
direct allocation
page read and write
23FC000
direct allocation
page read and write
4F1A000
heap
page read and write
2AD7000
direct allocation
page read and write
249E000
stack
page read and write
48D6000
heap
page read and write
4F1E000
heap
page read and write
3770000
heap
page read and write
5110000
trusted library allocation
page read and write
20FE6000
heap
page read and write
8E2000
heap
page read and write
2D04000
heap
page read and write
3F280000
direct allocation
page read and write
7EEFF000
direct allocation
page read and write
293F000
direct allocation
page read and write
4F39000
heap
page read and write
5C0000
heap
page read and write
33E9000
heap
page read and write
7F0000
heap
page read and write
48CE000
heap
page read and write
7E670000
direct allocation
page read and write
48C000
unkown
page read and write
3F147000
heap
page read and write
48C000
unkown
page read and write
2155E000
heap
page read and write
21205000
heap
page read and write
2955000
direct allocation
page execute and read and write
48C9000
heap
page read and write
7FB00000
direct allocation
page read and write
48B0000
heap
page read and write
24F1000
direct allocation
page read and write
20901000
direct allocation
page read and write
20653000
direct allocation
page read and write
4F3E000
heap
page read and write
20A8B000
stack
page read and write
243F000
stack
page read and write
5C0000
heap
page read and write
7E700000
direct allocation
page read and write
2831000
direct allocation
page read and write
3F5FC000
unclassified section
page execute and read and write
23B0000
heap
page read and write
48C1000
heap
page read and write
4F2B000
heap
page read and write
228E000
stack
page read and write
71E000
stack
page read and write
4F10000
heap
page read and write
206CC000
stack
page read and write
2D05000
heap
page read and write
70E000
stack
page read and write
4EAE000
unkown
page read and write
48CC000
heap
page read and write
2101A000
direct allocation
page readonly
207EB000
stack
page read and write
8EF000
heap
page read and write
C9F000
stack
page read and write
2098E000
stack
page read and write
2073F000
direct allocation
page read and write
20FF1000
direct allocation
page execute read
2891000
direct allocation
page read and write
20672000
direct allocation
page read and write
6A0000
heap
page read and write
3F4EA000
heap
page read and write
208CF000
direct allocation
page read and write
2D05000
heap
page read and write
228A000
direct allocation
page read and write
20948000
direct allocation
page read and write
239C000
direct allocation
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
20D6E000
stack
page read and write
2AE5000
direct allocation
page execute and read and write
23B1000
direct allocation
page read and write
48D6000
heap
page read and write
5C0000
heap
page read and write
2273000
heap
page read and write
824000
heap
page read and write
8FA000
heap
page read and write
7EE70000
direct allocation
page read and write
33CE000
heap
page read and write
4F39000
heap
page read and write
3300000
heap
page read and write
2240000
heap
page read and write
20908000
direct allocation
page read and write
19C000
stack
page read and write
4F3F000
heap
page read and write
4E14000
heap
page read and write
7F8000
heap
page read and write
2B25000
direct allocation
page execute and read and write
3673000
heap
page read and write
33CA000
heap
page read and write
7FA00000
direct allocation
page read and write
6F0000
heap
page read and write
84E000
heap
page read and write
329B000
stack
page read and write
238D000
direct allocation
page read and write
33A0000
heap
page read and write
9B000
stack
page read and write
7E670000
direct allocation
page read and write
2370000
direct allocation
page read and write
2362000
direct allocation
page read and write
94D000
heap
page read and write
48D1000
heap
page read and write
4F1A000
heap
page read and write
5430000
heap
page read and write
29D5000
direct allocation
page execute and read and write
4F3E000
heap
page read and write
9B000
stack
page read and write
7E0000
direct allocation
page execute and read and write
8FE000
heap
page read and write
9B000
stack
page read and write
21042000
direct allocation
page read and write
245C000
stack
page read and write
2D04000
heap
page read and write
3384000
heap
page read and write
456000
system
page execute and read and write
4EF8000
heap
page read and write
841000
heap
page read and write
49A0000
trusted library allocation
page read and write
6A0000
heap
page read and write
4E10000
heap
page read and write
2DE6000
heap
page read and write
206EC000
stack
page read and write
8F6000
heap
page read and write
4F2B000
heap
page read and write
905000
heap
page read and write
7D3000
heap
page read and write
6EE000
stack
page read and write
5110000
trusted library allocation
page read and write
7A0000
heap
page read and write
208E4000
direct allocation
page read and write
2861000
direct allocation
page execute read
206B8000
direct allocation
page read and write
2394000
direct allocation
page read and write
7ED80000
direct allocation
page read and write
1D5000
heap
page read and write
846000
heap
page read and write
7FA00000
direct allocation
page read and write
20FE1000
direct allocation
page execute read
4D43000
heap
page read and write
23C2000
direct allocation
page read and write
48D8000
heap
page read and write
4F18000
heap
page read and write
2321000
direct allocation
page read and write
3384000
heap
page read and write
2CE0000
heap
page readonly
20FE1000
direct allocation
page execute read
1D0000
heap
page read and write
20A7F000
stack
page read and write
4F1E000
heap
page read and write
2096E000
stack
page read and write
2090F000
direct allocation
page read and write
2997000
direct allocation
page read and write
947000
heap
page read and write
7EFC0000
direct allocation
page read and write
48E000
unkown
page write copy
2AB1000
direct allocation
page execute read
3440000
heap
page read and write
2E0B000
heap
page read and write
86A000
heap
page read and write
61E000
stack
page read and write
4F1C000
heap
page read and write
48C9000
heap
page read and write
8A8000
heap
page read and write
325C000
stack
page read and write
92F000
stack
page read and write
2087B000
stack
page read and write
400000
unkown
page readonly
7EC3F000
direct allocation
page read and write
890000
heap
page read and write
48D0000
heap
page read and write
20FBF000
stack
page read and write
218F1000
direct allocation
page execute read
2DD0000
heap
page read and write
20C1E000
stack
page read and write
30FF000
stack
page read and write
291D000
direct allocation
page read and write
2102A000
direct allocation
page readonly
19D000
stack
page read and write
235D000
direct allocation
page read and write
2140000
direct allocation
page execute and read and write
4D40000
heap
page read and write
2D04000
heap
page read and write
8EA000
heap
page read and write
2971000
direct allocation
page read and write
20D10000
heap
page read and write
3F2A9000
heap
page read and write
21968000
direct allocation
page readonly
3F071000
heap
page read and write
20EAE000
stack
page read and write
21029000
direct allocation
page readonly
34C0000
heap
page read and write
4F1A000
heap
page read and write
21965000
direct allocation
page read and write
23B0000
heap
page read and write
48CC000
heap
page read and write
2313000
direct allocation
page read and write
34E4000
heap
page read and write
2DC0000
heap
page read and write
230C000
direct allocation
page read and write
208AA000
direct allocation
page read and write
83D000
heap
page read and write
2951000
direct allocation
page read and write
20FB1000
direct allocation
page execute read
3F147000
heap
page read and write
23AA000
direct allocation
page read and write
862000
heap
page read and write
7E5000
heap
page read and write
48D4000
heap
page read and write
AEF000
stack
page read and write
48D6000
heap
page read and write
5110000
trusted library allocation
page read and write
48C000
unkown
page read and write
826000
heap
page read and write
8FE000
heap
page read and write
7EEA0000
direct allocation
page read and write
20D6E000
stack
page read and write
24E3000
heap
page read and write
2BBE000
unkown
page read and write
207FE000
stack
page execute and read and write
2FFF000
stack
page read and write
2D05000
heap
page read and write
2900000
direct allocation
page read and write
4D40000
heap
page read and write
4F17000
heap
page read and write
811000
heap
page read and write
4F11000
heap
page read and write
2C2A000
heap
page read and write
20BFE000
stack
page read and write
377C000
heap
page read and write
28EC000
stack
page read and write
29C5000
direct allocation
page execute and read and write
23D0000
direct allocation
page read and write
81A000
heap
page read and write
20686000
direct allocation
page read and write
20FE4000
direct allocation
page execute read
29C7000
direct allocation
page read and write
908000
heap
page read and write
33AA000
heap
page read and write
20C1E000
stack
page read and write
21022000
direct allocation
page read and write
3384000
heap
page read and write
99F000
stack
page read and write
2D04000
heap
page read and write
2095E000
stack
page read and write
4F19000
heap
page read and write
866000
heap
page read and write
7A0000
heap
page read and write
400000
system
page execute and read and write
21349000
heap
page read and write
3384000
heap
page read and write
7EF5E000
direct allocation
page read and write
33CA000
heap
page read and write
7EEA0000
direct allocation
page read and write
5119000
heap
page read and write
2100000
heap
page read and write
48C9000
heap
page read and write
7AE000
stack
page read and write
24D4000
direct allocation
page read and write
6DE000
stack
page read and write
3F281000
direct allocation
page execute and read and write
293A000
direct allocation
page read and write
487000
unkown
page read and write
48D5000
heap
page read and write
20D2F000
stack
page read and write
2895000
direct allocation
page execute and read and write
21009000
direct allocation
page readonly
7EE70000
direct allocation
page read and write
20FEB000
direct allocation
page execute read
20D1F000
stack
page read and write
783000
heap
page read and write
223A000
direct allocation
page read and write
32FC000
stack
page read and write
21001000
direct allocation
page execute read
208C2000
direct allocation
page read and write
208FA000
direct allocation
page read and write
4FAF000
unkown
page read and write
48D5000
heap
page read and write
48D6000
heap
page read and write
2916000
direct allocation
page read and write
7AB000
heap
page read and write
7ECCF000
direct allocation
page read and write
8ED000
heap
page read and write
48A000
unkown
page read and write
20A6F000
stack
page read and write
2947000
direct allocation
page read and write
2362000
direct allocation
page read and write
2200000
direct allocation
page read and write
2D04000
heap
page read and write
20FB0000
heap
page read and write
2394000
direct allocation
page read and write
20EBE000
stack
page read and write
4F20000
heap
page read and write
20D10000
heap
page read and write
21962000
direct allocation
page read and write
825000
heap
page read and write
20BFE000
stack
page read and write
493000
unkown
page readonly
3384000
heap
page read and write
48C000
unkown
page read and write
7F081000
direct allocation
page read and write
2954000
direct allocation
page read and write
4F16000
heap
page read and write
4D4D000
heap
page read and write
8F7000
heap
page read and write
4F6D000
heap
page read and write
828000
heap
page read and write
3F274000
unclassified section
page execute and read and write
3EE2E000
stack
page read and write
74E000
stack
page read and write
2093A000
direct allocation
page read and write
20E70000
heap
page read and write
20FD7000
direct allocation
page execute read
487000
unkown
page read and write
3384000
heap
page read and write
6C0000
heap
page read and write
20EAE000
stack
page read and write
2D04000
heap
page read and write
20BBF000
stack
page read and write
2D00000
heap
page read and write
2242000
direct allocation
page read and write
6A5000
heap
page read and write
2C00000
heap
page read and write
9C0000
heap
page read and write
3310000
heap
page read and write
7EB6F000
direct allocation
page read and write
401000
unkown
page execute read
20FAF000
stack
page read and write
20FAF000
stack
page read and write
24E3000
direct allocation
page read and write
908000
heap
page read and write
2D05000
heap
page read and write
29BC000
direct allocation
page read and write
20941000
direct allocation
page read and write
3EDEF000
stack
page read and write
8F6000
heap
page read and write
2103D000
direct allocation
page readonly
5250000
heap
page read and write
4F38000
heap
page read and write
2298000
direct allocation
page read and write
8FB000
heap
page read and write
676000
heap
page read and write
48A000
unkown
page read and write
20E6E000
stack
page read and write
4F16000
heap
page read and write
20FF7000
direct allocation
page execute read
20FAF000
stack
page read and write
2067F000
direct allocation
page read and write
7EEFF000
direct allocation
page read and write
48C9000
heap
page read and write
48CC000
heap
page read and write
9D0000
heap
page read and write
34E7000
heap
page read and write
20FE7000
direct allocation
page execute read
2971000
direct allocation
page execute read
846000
heap
page read and write
2D04000
heap
page read and write
750000
heap
page read and write
22D2000
direct allocation
page read and write
2FD0000
heap
page readonly
299F000
stack
page read and write
2092F000
stack
page read and write
4F59000
heap
page read and write
7BD000
heap
page read and write
2D80000
heap
page read and write
348F000
stack
page read and write
60E000
stack
page read and write
20D6E000
stack
page read and write
7FD30000
direct allocation
page read and write
48C4000
heap
page read and write
7EBD0000
direct allocation
page read and write
7E6E8000
direct allocation
page read and write
48D0000
heap
page read and write
2CF0000
heap
page read and write
5486000
heap
page read and write
20A9E000
stack
page read and write
9D5000
heap
page read and write
8F8000
heap
page read and write
7EEC5000
direct allocation
page read and write
34C0000
heap
page read and write
20D1F000
stack
page read and write
2A20000
heap
page read and write
3F071000
heap
page read and write
3384000
heap
page read and write
8A0000
heap
page read and write
491D000
heap
page read and write
4F1A000
heap
page read and write
839000
heap
page read and write
2D04000
heap
page read and write
2948000
direct allocation
page read and write
20916000
direct allocation
page read and write
48C1000
heap
page read and write
20BCF000
stack
page read and write
207F9000
stack
page read and write
23B8000
direct allocation
page read and write
501F000
stack
page read and write
5431000
heap
page read and write
7EDF0000
direct allocation
page read and write
476F000
unkown
page read and write
23B6000
heap
page read and write
7EC5F000
direct allocation
page read and write
2283000
direct allocation
page read and write
4F3E000
heap
page read and write
24B0000
direct allocation
page execute and read and write
7D0000
direct allocation
page execute and read and write
A4F000
stack
page read and write
4F1A000
heap
page read and write
9B000
stack
page read and write
2291000
direct allocation
page read and write
487000
unkown
page read and write
670000
heap
page read and write
4F39000
heap
page read and write
294D000
direct allocation
page read and write
2887000
direct allocation
page read and write
20FF1000
direct allocation
page execute read
2290000
direct allocation
page execute and read and write
947000
heap
page read and write
2083E000
stack
page read and write
2304000
direct allocation
page read and write
4570000
heap
page read and write
208D6000
direct allocation
page read and write
48C1000
heap
page read and write
48EE000
heap
page read and write
493F000
heap
page read and write
29A2000
stack
page read and write
2E24000
heap
page read and write
7EEC0000
direct allocation
page read and write
824000
heap
page read and write
48A000
unkown
page read and write
293F000
direct allocation
page read and write
7EF03000
direct allocation
page read and write
7EC48000
direct allocation
page read and write
3F25E000
unclassified section
page execute and read and write
20FD4000
direct allocation
page execute read
33E9000
heap
page read and write
2130000
heap
page read and write
4E11000
heap
page read and write
28FC000
direct allocation
page read and write
377C000
heap
page read and write
20778000
direct allocation
page read and write
3F382000
heap
page read and write
22CD000
direct allocation
page read and write
48BC000
heap
page read and write
7EF30000
direct allocation
page read and write
20902000
direct allocation
page read and write
3F070000
heap
page read and write
660000
heap
page read and write
3F0EA000
heap
page read and write
610000
heap
page read and write
20D7E000
stack
page read and write
3F5F6000
unclassified section
page execute and read and write
367D000
heap
page read and write
48A000
unkown
page read and write
48D1000
heap
page read and write
343E000
stack
page read and write
8EB000
heap
page read and write
4F19000
heap
page read and write
206B1000
direct allocation
page read and write
294C000
direct allocation
page read and write
3483000
heap
page read and write
7FA00000
direct allocation
page read and write
48D5000
heap
page read and write
21045000
direct allocation
page read and write
3670000
heap
page read and write
7EEFF000
direct allocation
page read and write
7FA00000
direct allocation
page read and write
2D8E000
stack
page read and write
20FFF000
direct allocation
page execute read
8F1000
heap
page read and write
2233000
direct allocation
page read and write
885000
heap
page read and write
755000
heap
page read and write
7EF5E000
direct allocation
page read and write
206FC000
stack
page read and write
20D6E000
stack
page read and write
3F119000
heap
page read and write
296A000
direct allocation
page read and write
3380000
heap
page read and write
4F1E000
heap
page read and write
24A2000
direct allocation
page read and write
45E000
system
page execute and read and write
7EF30000
direct allocation
page read and write
3F071000
heap
page read and write
75E000
stack
page read and write
7FC10000
direct allocation
page read and write
85F000
stack
page read and write
23AA000
direct allocation
page read and write
7EF84000
direct allocation
page read and write
8EB000
heap
page read and write
48D5000
heap
page read and write
20EBE000
stack
page read and write
2418000
direct allocation
page read and write
222C000
direct allocation
page read and write
4F11000
heap
page read and write
48D8000
heap
page read and write
3F650000
heap
page read and write
810000
heap
page read and write
2978000
direct allocation
page read and write
22D6000
heap
page read and write
207F1000
direct allocation
page read and write
2333000
heap
page read and write
2076A000
direct allocation
page read and write
294D000
direct allocation
page read and write
3384000
heap
page read and write
3F136000
heap
page read and write
2C2B000
heap
page read and write
365F000
stack
page read and write
20831000
direct allocation
page read and write
7FC08000
direct allocation
page read and write
19D000
stack
page read and write
4F1E000
heap
page read and write
22D0000
heap
page read and write
29A0000
direct allocation
page readonly
7EEA0000
direct allocation
page read and write
7EF50000
direct allocation
page read and write
650000
heap
page read and write
2D04000
heap
page read and write
4E60000
heap
page read and write
2D05000
heap
page read and write
7B0000
heap
page read and write
20FD1000
direct allocation
page execute read
2068D000
direct allocation
page read and write
3384000
heap
page read and write
221D000
direct allocation
page read and write
3F434000
heap
page read and write
4F38000
heap
page read and write
2D04000
heap
page read and write
5365000
heap
page read and write
21F2000
direct allocation
page read and write
19C000
stack
page read and write
7EDFB000
direct allocation
page read and write
24CD000
direct allocation
page read and write
33CB000
heap
page read and write
5431000
heap
page read and write
907000
heap
page read and write
91F000
stack
page read and write
2097E000
stack
page read and write
2D04000
heap
page read and write
73E000
stack
page read and write
84A000
heap
page read and write
4F5F000
heap
page read and write
4F5E000
heap
page read and write
7ECF0000
direct allocation
page read and write
947000
heap
page read and write
33E9000
heap
page read and write
21032000
direct allocation
page read and write
2403000
direct allocation
page read and write
206FC000
stack
page read and write
2101D000
direct allocation
page readonly
2986000
stack
page read and write
6E0000
heap
page read and write
7FD1B000
direct allocation
page read and write
210E000
stack
page read and write
3F122000
heap
page read and write
22E0000
direct allocation
page read and write
20FC0000
heap
page read and write
20D1F000
stack
page read and write
29C1000
direct allocation
page read and write
48A000
unkown
page read and write
48CE000
heap
page read and write
5D0000
heap
page read and write
21ED000
direct allocation
page read and write
6A0000
heap
page read and write
6FE000
stack
page read and write
2150000
heap
page read and write
29B7000
direct allocation
page read and write
474000
system
page execute and read and write
908000
heap
page read and write
21019000
direct allocation
page readonly
7FD40000
direct allocation
page read and write
4F1E000
heap
page read and write
336E000
stack
page read and write
2378000
direct allocation
page read and write
29A1000
direct allocation
page execute read
227F000
stack
page read and write
48BC000
heap
page read and write
2C49000
heap
page read and write
2FC0000
heap
page read and write
48C9000
heap
page read and write
860000
heap
page read and write
19D000
stack
page read and write
7C0000
heap
page read and write
4F3E000
heap
page read and write
7FA00000
direct allocation
page read and write
33E0000
heap
page readonly
21035000
direct allocation
page read and write
7EF00000
direct allocation
page read and write
20FDF000
direct allocation
page execute read
48A000
unkown
page read and write
45C000
system
page execute and read and write
48CE000
heap
page read and write
36D0000
heap
page read and write
4F1A000
heap
page read and write
3773000
heap
page read and write
48CE000
heap
page read and write
48C9000
heap
page read and write
4F1A000
heap
page read and write
48C0000
heap
page read and write
2921000
direct allocation
page execute read
48CA000
heap
page read and write
4F1A000
heap
page read and write
758000
heap
page read and write
20FC2000
heap
page read and write
20FC1000
direct allocation
page execute read
20EBE000
stack
page read and write
7EE70000
direct allocation
page read and write
48CC000
heap
page read and write
206DA000
direct allocation
page read and write
8FE000
heap
page read and write
20BBF000
stack
page read and write
48CC000
heap
page read and write
66E000
heap
page read and write
524B000
heap
page read and write
2FE0000
heap
page read and write
6D0000
heap
page read and write
7EEA0000
direct allocation
page read and write
48BC000
heap
page read and write
7EE70000
direct allocation
page read and write
20B9F000
stack
page read and write
5111000
heap
page read and write
20E6E000
stack
page read and write
29A4000
stack
page read and write
239F000
stack
page read and write
2DED000
heap
page read and write
238D000
direct allocation
page read and write
917000
heap
page read and write
858000
heap
page read and write
7ED71000
direct allocation
page read and write
4F18000
heap
page read and write
400000
system
page execute and read and write
19D000
stack
page read and write
7FA00000
direct allocation
page read and write
7F16B000
direct allocation
page read and write
21035000
direct allocation
page read and write
3384000
heap
page read and write
7F07C000
direct allocation
page read and write
20A5F000
stack
page read and write
20694000
direct allocation
page read and write
20924000
direct allocation
page read and write
48D6000
heap
page read and write
2091D000
direct allocation
page read and write
2274000
direct allocation
page read and write
3F6B2000
heap
page read and write
2100000
heap
page read and write
48D1000
heap
page read and write
2149C000
stack
page read and write
33F0000
heap
page read and write
8F0000
heap
page read and write
2157C000
heap
page read and write
24DE000
stack
page read and write
2224000
direct allocation
page read and write
21025000
direct allocation
page read and write
242F000
stack
page read and write
2963000
direct allocation
page read and write
2C2B000
heap
page read and write
2AA0000
heap
page read and write
205A1000
direct allocation
page read and write
7EF30000
direct allocation
page read and write
4F39000
heap
page read and write
346B000
heap
page read and write
2D04000
heap
page read and write
4F18000
heap
page read and write
330E000
stack
page read and write
9B000
stack
page read and write
7EEC0000
direct allocation
page read and write
836000
heap
page read and write
296A000
direct allocation
page read and write
9B000
stack
page read and write
2082E000
stack
page read and write
2D4E000
stack
page read and write
2411000
direct allocation
page read and write
3F296000
direct allocation
page execute and read and write
3384000
heap
page read and write
7EEA0000
direct allocation
page read and write
2840000
direct allocation
page read and write
2D04000
heap
page read and write
3300000
heap
page read and write
2AAF000
stack
page read and write
48D0000
heap
page read and write
218F0000
direct allocation
page readonly
3EF2F000
stack
page read and write
296B000
stack
page read and write
8F6000
heap
page read and write
8C6000
heap
page read and write
2F1C000
stack
page read and write
7F840000
direct allocation
page read and write
4F11000
heap
page read and write
4F1A000
heap
page read and write
288C000
direct allocation
page read and write
3384000
heap
page read and write
3F132000
heap
page read and write
208DD000
direct allocation
page read and write
7EF30000
direct allocation
page read and write
28BE000
direct allocation
page read and write
2842000
direct allocation
page read and write
23B3000
heap
page read and write
905000
heap
page read and write
2086A000
direct allocation
page read and write
760000
heap
page read and write
20A7F000
stack
page read and write
5C0000
heap
page read and write
2946000
direct allocation
page read and write
48C000
unkown
page read and write
5110000
trusted library allocation
page read and write
20FEA000
heap
page read and write
7E541000
direct allocation
page read and write
900000
heap
page read and write
29A5000
direct allocation
page execute and read and write
838000
heap
page read and write
2991000
direct allocation
page execute read
19D000
stack
page read and write
7FE3B000
direct allocation
page read and write
20FDB000
direct allocation
page execute read
2DE0000
heap
page read and write
487000
unkown
page write copy
2C0A000
heap
page read and write
23BD000
direct allocation
page read and write
48CE000
heap
page read and write
7EEA0000
direct allocation
page read and write
7F0000
heap
page read and write
811000
heap
page read and write
2103A000
direct allocation
page readonly
3F331000
heap
page read and write
48D8000
heap
page read and write
24BF000
stack
page read and write
48A0000
heap
page read and write
780000
heap
page read and write
20ACE000
stack
page read and write
3F62B000
unclassified section
page execute and read and write
2250000
direct allocation
page read and write
2098C000
stack
page read and write
4F23000
heap
page read and write
3384000
heap
page read and write
4F3A000
heap
page read and write
2861000
direct allocation
page read and write
905000
heap
page read and write
3EC90000
heap
page read and write
5110000
trusted library allocation
page read and write
7EDF6000
direct allocation
page read and write
33CD000
heap
page read and write
2102D000
direct allocation
page readonly
48CE000
heap
page read and write
24DC000
direct allocation
page read and write
3460000
heap
page read and write
6D5000
heap
page read and write
2AAE000
stack
page read and write
2330000
heap
page read and write
7EF50000
direct allocation
page read and write
20ABE000
stack
page read and write
3384000
heap
page read and write
7E700000
direct allocation
page read and write
7EED0000
direct allocation
page read and write
20C2E000
stack
page read and write
20AAE000
stack
page read and write
7D0000
direct allocation
page execute and read and write
2924000
direct allocation
page read and write
536A000
heap
page read and write
207FF000
stack
page read and write
7EEF0000
direct allocation
page read and write
2ADC000
direct allocation
page read and write
5BA000
unkown
page readonly
9B000
stack
page read and write
487000
unkown
page read and write
20FEF000
direct allocation
page execute read
7E670000
direct allocation
page read and write
2924000
direct allocation
page read and write
20E7E000
stack
page read and write
3F0EA000
heap
page read and write
4903000
heap
page read and write
8FB000
heap
page read and write
7E540000
direct allocation
page read and write
48CD000
heap
page read and write
206AA000
direct allocation
page read and write
3380000
heap
page read and write
48C9000
heap
page read and write
33E9000
heap
page read and write
20E6E000
stack
page read and write
20C1E000
stack
page read and write
3EC90000
heap
page read and write
3384000
heap
page read and write
20771000
direct allocation
page read and write
3F14C000
heap
page read and write
20E70000
heap
page read and write
48EA000
heap
page read and write
48C1000
heap
page read and write
3F0EB000
heap
page read and write
8C4000
heap
page read and write
33CB000
heap
page read and write
226D000
direct allocation
page read and write
765000
heap
page read and write
20BAF000
stack
page read and write
4F11000
heap
page read and write
20FBF000
stack
page read and write
2929000
direct allocation
page read and write
7E53C000
direct allocation
page read and write
28DA000
direct allocation
page read and write
20EAE000
stack
page read and write
835000
heap
page read and write
2946000
direct allocation
page read and write
24B0000
direct allocation
page read and write
20713000
direct allocation
page read and write
20FE2000
heap
page read and write
7F08A000
direct allocation
page read and write
5C0000
heap
page read and write
21035000
direct allocation
page read and write
2084E000
stack
page read and write
7EF2F000
direct allocation
page read and write
3384000
heap
page read and write
7E1D0000
direct allocation
page read and write
49A0000
trusted library allocation
page read and write
34CB000
heap
page read and write
2978000
direct allocation
page read and write
487000
unkown
page read and write
2D04000
heap
page read and write
3ECEE000
stack
page read and write
4F17000
heap
page read and write
22FD000
direct allocation
page read and write
48B0000
heap
page read and write
207CB000
stack
page read and write
4E11000
heap
page read and write
720000
heap
page read and write
3F124000
heap
page read and write
695000
heap
page read and write
24F8000
direct allocation
page read and write
208E3000
direct allocation
page read and write
7EC60000
direct allocation
page read and write
2DED000
heap
page read and write
7EC90000
direct allocation
page read and write
23ED000
direct allocation
page read and write
7FE43000
direct allocation
page read and write
367D000
heap
page read and write
7FE48000
direct allocation
page read and write
20FD1000
direct allocation
page execute read
2095E000
stack
page read and write
7EAB0000
direct allocation
page read and write
20E6E000
stack
page read and write
700000
heap
page read and write
87D000
heap
page read and write
20D6E000
stack
page read and write
4F16000
heap
page read and write
21032000
direct allocation
page read and write
905000
heap
page read and write
5471000
heap
page read and write
2270000
heap
page read and write
8C8000
heap
page read and write
48D6000
heap
page read and write
208A3000
direct allocation
page read and write
690000
heap
page read and write
850000
heap
page read and write
2971000
direct allocation
page read and write
66A000
heap
page read and write
7EF50000
direct allocation
page read and write
48E1000
heap
page read and write
2F59000
stack
page read and write
2D05000
heap
page read and write
4F1E000
heap
page read and write
7E1000
heap
page read and write
48D6000
heap
page read and write
2061A000
direct allocation
page read and write
750000
heap
page read and write
2C00000
heap
page read and write
2094F000
stack
page read and write
48C9000
heap
page read and write
288F000
direct allocation
page read and write
2139C000
stack
page read and write
41B000
system
page execute and read and write
7EE3F000
direct allocation
page read and write
239C000
direct allocation
page read and write
6B0000
heap
page read and write
48C9000
heap
page read and write
5C0000
heap
page read and write
48C1000
heap
page read and write
2E00000
heap
page read and write
487000
unkown
page read and write
2B1C000
direct allocation
page read and write
20661000
direct allocation
page read and write
9EF000
stack
page read and write
8FF000
heap
page read and write
20D8F000
stack
page read and write
917000
heap
page read and write
2DED000
heap
page read and write
21032000
direct allocation
page read and write
4F3E000
heap
page read and write
299C000
direct allocation
page read and write
8F3000
heap
page read and write
487000
unkown
page read and write
2D05000
heap
page read and write
50EF000
stack
page read and write
5110000
trusted library allocation
page read and write
94D000
heap
page read and write
7E390000
direct allocation
page read and write
827000
heap
page read and write
4F39000
heap
page read and write
2248000
direct allocation
page read and write
2D04000
heap
page read and write
4F19000
heap
page read and write
4F38000
heap
page read and write
207FB000
stack
page read and write
7B0000
heap
page read and write
2106000
heap
page read and write
20B9F000
stack
page read and write
2156000
heap
page read and write
49F0000
heap
page read and write
2D04000
heap
page read and write
29A1000
direct allocation
page read and write
2941000
direct allocation
page read and write
909000
heap
page read and write
2913000
direct allocation
page read and write
231C000
stack
page read and write
2241000
direct allocation
page read and write
48C9000
heap
page read and write
918000
heap
page read and write
2B17000
direct allocation
page read and write
23A3000
direct allocation
page read and write
369E000
stack
page read and write
20FBF000
stack
page read and write
7FA00000
direct allocation
page read and write
20A9E000
stack
page read and write
2081E000
stack
page read and write
298B000
stack
page read and write
2091F000
stack
page read and write
706000
heap
page read and write
2D04000
heap
page read and write
24E0000
heap
page read and write
20732000
direct allocation
page read and write
48C000
unkown
page read and write
3384000
heap
page read and write
6C3000
heap
page read and write
20746000
direct allocation
page read and write
7F090000
direct allocation
page read and write
240A000
direct allocation
page read and write
7EFA5000
direct allocation
page read and write
21025000
direct allocation
page read and write
48C1000
heap
page read and write
2328000
direct allocation
page read and write
7FD70000
direct allocation
page read and write
2F9C000
stack
page read and write
2E21000
heap
page read and write
4F39000
heap
page read and write
2AF1000
direct allocation
page execute read
7E670000
direct allocation
page read and write
846000
heap
page read and write
4F1E000
heap
page read and write
20FFB000
direct allocation
page execute read
2810000
heap
page read and write
20F0000
heap
page read and write
48C1000
heap
page read and write
211AF000
direct allocation
page read and write
21567000
heap
page read and write
20FF4000
direct allocation
page execute read
249D000
direct allocation
page read and write
2932000
direct allocation
page read and write
2097F000
stack
page read and write
2370000
direct allocation
page read and write
680000
heap
page read and write
7D0000
heap
page read and write
905000
heap
page read and write
23B1000
direct allocation
page read and write
2074D000
direct allocation
page read and write
9A0000
heap
page read and write
5D0000
heap
page read and write
3F610000
unclassified section
page execute and read and write
3F5A0000
unclassified section
page execute and read and write
8E6000
heap
page read and write
7EEA0000
direct allocation
page read and write
20754000
direct allocation
page read and write
48D5000
heap
page read and write
29AE000
stack
page read and write
4E11000
heap
page read and write
2AE1000
direct allocation
page read and write
227C000
direct allocation
page read and write
29EC000
stack
page read and write
3F0EA000
heap
page read and write
48CE000
heap
page read and write
2260000
direct allocation
page execute and read and write
7EBA0000
direct allocation
page read and write
2895000
direct allocation
page read and write
20ABE000
stack
page read and write
2B21000
direct allocation
page read and write
7E670000
direct allocation
page read and write
900000
heap
page read and write
20A5F000
stack
page read and write
48A000
unkown
page read and write
2954000
direct allocation
page read and write
2A10000
heap
page read and write
4EE0000
heap
page read and write
2093F000
stack
page read and write
296C000
stack
page read and write
4F23000
heap
page read and write
23F4000
direct allocation
page read and write
48D0000
heap
page read and write
845000
heap
page read and write
3F132000
heap
page read and write
There are 1018 hidden memdumps, click here to show them.