IOC Report
shipping documents_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
shipping documents_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\-2-48L
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\ectosphere
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\shipping documents_pdf.exe
"C:\Users\user\Desktop\shipping documents_pdf.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\shipping documents_pdf.exe"
malicious
C:\Program Files (x86)\jSyAJrgjZOVcydAJMtoGbEfCEicDMKgUlueMmMdlXUfi\jsmAYDUnVBUZ.exe
"C:\Program Files (x86)\jSyAJrgjZOVcydAJMtoGbEfCEicDMKgUlueMmMdlXUfi\jsmAYDUnVBUZ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe"
malicious
C:\Program Files (x86)\jSyAJrgjZOVcydAJMtoGbEfCEicDMKgUlueMmMdlXUfi\jsmAYDUnVBUZ.exe
"C:\Program Files (x86)\jSyAJrgjZOVcydAJMtoGbEfCEicDMKgUlueMmMdlXUfi\jsmAYDUnVBUZ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.itaja.xyz/piim/
83.229.19.82
malicious
http://www.meliorahomes.net/v6hi/?GX4dS=J4OZQFJkwHb7CqxUSgK5kC7bOCRQ1HDFuBm9sh8+Hwi6g72gNv5/qcE3wP+eGlRxbFCI7z2mPoN0ns0tJj8yIlhQwyv+KQ3WGhFwXvk/5rV44M5qziNnSOc=&QHdD=Mr7PG
8.217.17.192
malicious
http://www.itaja.xyz/piim/?GX4dS=RYsZikA+gzGvj7iZiTCDr+aQt7fmUZTyGCVkHuEfnLcd5+XBs56/1e6IekUyxiYXxJTamO9QBVR7KuXqJ7BSZgW6PH27nc20dnk3ICKQzrrMBcAKjPIq1No=&QHdD=Mr7PG
83.229.19.82
malicious
http://www.restobarbebek.xyz/vyi4/?GX4dS=/xy0pcQoI48O0GHyPYCEmU2R4Hpu0VZORDN/dAaN/HIxdTX0a/Tw+B0GG8XhGWU8PZV29+oHaQZBX3c3szNNFJMBEHP/DJI13k5P4rPNXnp/cIoi/p+Ic+M=&QHdD=Mr7PG
85.159.66.93
malicious
http://www.mynotebook.shop/3q2o/
13.248.169.48
malicious
http://www.cctv9.rest/s7c9/?GX4dS=AvCjDDvglUmypHRh3tcpFDEnXU0eyxJ0gEyBu7LJ6NAS+DraqwYREr+jqcUkWNOrfKJXuGVAM+jH6WkALlmgLCdPJ31xuM0fYjGNAwDkyRY4kQ2+D/EajS4=&QHdD=Mr7PG
114.134.188.182
malicious
http://www.restobarbebek.xyz/vyi4/
85.159.66.93
malicious
http://www.cricketinsights.info/7r21/?GX4dS=Zcl8OC2U2mZSOodQP89hLxJaF9oxIylC3vQVS5j+kQePBp9DPErvqQJ5GN/fq92ZSua+eOkgWypb4NJRPdpqD2l3+Txvj2dKnJzbedJ/jR6LsqpOy2ysxaE=&QHdD=Mr7PG
118.139.176.2
malicious
http://www.havfabi.life/wieb/?QHdD=Mr7PG&GX4dS=eg7bLBeRfjnWkUSkFPDFz7CDjhz4SauAKYy7Gl2+zW+bwKjkoH9UXc52MkveFRCVuGtTn8uwV230S6082MDCqbLQ2LkwAkuHHQvkznNaIdZpiNU96nR7hSc=
162.213.249.216
malicious
http://www.cctv9.rest/s7c9/
114.134.188.182
malicious
http://www.appointy.shop/a1sy/
13.248.169.48
malicious
http://www.appointy.shop/a1sy/?GX4dS=43kMdQUk4RwRJMi6yD+2w8EPj2c5h/nzCBj69vS+SY4LuE9CgiSoK5ODTlc+3PfTwBmzR2IwCrk+5EAKTw2sMvYmaCzYBStST9GoSzlhXbP5C08N1MLucTc=&QHdD=Mr7PG
13.248.169.48
malicious
http://www.coba168.info/nwnl/
3.33.130.190
malicious
http://www.coba168.info/nwnl/?GX4dS=beqecatXY4qIJjPXOia4kQmqT9sqBvOCFEuBM0i0Dlt4M9tlrl1tg88laI+FpgcKerQYOIncNJ3shYG/Ub3oJIvQtmlajUKZMxQvi2F/DOJ3YHvB9A08ObE=&QHdD=Mr7PG
3.33.130.190
malicious
http://www.havfabi.life/wieb/
162.213.249.216
malicious
http://www.meliorahomes.net/v6hi/
8.217.17.192
malicious
http://www.30kfeet.net/prdf/
3.33.130.190
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cricketinsights.info/7r21/?GX4dS=Zcl8OC2U2mZSOodQP89hLxJaF9oxIylC3vQVS5j
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.mynotebook.shop
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.cctv9.rest
114.134.188.182
malicious
30kfeet.net
3.33.130.190
malicious
www.appointy.shop
13.248.169.48
malicious
www.havfabi.life
162.213.249.216
malicious
itaja.xyz
83.229.19.82
malicious
www.meliorahomes.net
8.217.17.192
malicious
www.mynotebook.shop
13.248.169.48
malicious
coba168.info
3.33.130.190
malicious
natroredirect.natrocdn.com
85.159.66.93
malicious
cricketinsights.info
118.139.176.2
malicious
www.coba168.info
unknown
malicious
www.itaja.xyz
unknown
malicious
www.cricketinsights.info
unknown
malicious
www.restobarbebek.xyz
unknown
malicious
www.30kfeet.net
unknown
malicious
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
8.217.17.192
www.meliorahomes.net
Singapore
malicious
13.248.169.48
www.appointy.shop
United States
malicious
114.134.188.182
www.cctv9.rest
Cambodia
malicious
118.139.176.2
cricketinsights.info
Singapore
malicious
162.213.249.216
www.havfabi.life
United States
malicious
83.229.19.82
itaja.xyz
United Kingdom
malicious
3.33.130.190
30kfeet.net
United States
malicious
85.159.66.93
natroredirect.natrocdn.com
Turkey
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3600000
unclassified section
page execute and read and write
malicious
27A0000
unkown
page execute and read and write
malicious
5B0000
unclassified section
page execute and read and write
malicious
4E10000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
800000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
7B0000
trusted library allocation
page read and write
malicious
DA7000
heap
page read and write
7EE000
unkown
page readonly
253A08C0000
heap
page read and write
8B1000
heap
page read and write
750000
unkown
page readonly
613000
heap
page read and write
6A0000
unkown
page readonly
63C000
heap
page read and write
44E0000
heap
page read and write
44EF000
heap
page read and write
55E000
stack
page read and write
8B1000
heap
page read and write
8B0000
heap
page read and write
4FE000
stack
page read and write
4430000
heap
page read and write
2DC4000
unkown
page read and write
62B000
heap
page read and write
57F000
heap
page read and write
420E000
heap
page read and write
8D0000
unkown
page read and write
400000
unkown
page readonly
7A0000
heap
page read and write
44D1000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
55A000
stack
page read and write
253A2203000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
420E000
heap
page read and write
253A20A0000
trusted library allocation
page read and write
3042000
direct allocation
page execute and read and write
65C000
stack
page read and write
8E5C5FE000
stack
page read and write
8B1000
heap
page read and write
2E0D000
heap
page read and write
7E0000
unkown
page readonly
57F000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
44D7000
heap
page read and write
620000
heap
page read and write
64C000
stack
page read and write
8B1000
heap
page read and write
190000
heap
page read and write
253A0690000
system
page execute and read and write
8B1000
heap
page read and write
4438000
heap
page read and write
3242000
direct allocation
page execute and read and write
420E000
heap
page read and write
2E2D000
heap
page read and write
EA0000
unkown
page readonly
253A2212000
trusted library allocation
page read and write
44EB000
heap
page read and write
482000
unkown
page readonly
4189000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
6B0000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
253A0890000
heap
page read and write
7F5000
unkown
page read and write
420E000
heap
page read and write
25A0000
heap
page read and write
253A23A6000
trusted library allocation
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
4578000
heap
page read and write
8B1000
heap
page read and write
4436000
heap
page read and write
6C0000
heap
page read and write
8B1000
heap
page read and write
281C000
unkown
page read and write
75B1000
heap
page read and write
75ED000
heap
page read and write
309E000
direct allocation
page execute and read and write
8B1000
heap
page read and write
4199000
heap
page read and write
8B1000
heap
page read and write
253A08DE000
heap
page read and write
790000
unkown
page read and write
4432000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
259F000
stack
page read and write
8B1000
heap
page read and write
2604000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
44E1000
heap
page read and write
457E000
heap
page read and write
8B1000
heap
page read and write
44DF000
heap
page read and write
420E000
heap
page read and write
4B4000
heap
page read and write
7CE000
stack
page read and write
4433000
heap
page read and write
7E1000
unkown
page execute read
8B1000
heap
page read and write
A60000
trusted library allocation
page execute and read and write
420E000
heap
page read and write
7E0000
unkown
page readonly
4433000
heap
page read and write
8B1000
heap
page read and write
253A08ED000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
5CD000
heap
page read and write
253A2210000
trusted library allocation
page read and write
770000
unkown
page read and write
420E000
heap
page read and write
4430000
direct allocation
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8E5BDFE000
stack
page read and write
4435000
heap
page read and write
420E000
heap
page read and write
5CD000
heap
page read and write
878000
heap
page read and write
7690000
trusted library allocation
page read and write
2E9E000
heap
page read and write
75E0000
heap
page read and write
E13000
heap
page read and write
613000
heap
page read and write
8B1000
heap
page read and write
4437000
heap
page read and write
EA0000
unkown
page readonly
8B1000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
253A23BE000
trusted library allocation
page read and write
721000
unkown
page readonly
AFF000
stack
page read and write
4438000
heap
page read and write
302D000
direct allocation
page execute and read and write
8B1000
heap
page read and write
4589000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
24B0000
unkown
page readonly
420E000
heap
page read and write
8B1000
heap
page read and write
253A06D8000
system
page execute and read and write
420E000
heap
page read and write
10A0000
unkown
page readonly
60D000
heap
page read and write
44E0000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
7E1000
unkown
page execute read
253A08A0000
heap
page read and write
8C0000
unkown
page read and write
4553000
direct allocation
page read and write
7F5000
unkown
page read and write
420E000
heap
page read and write
458F000
heap
page read and write
56E000
heap
page read and write
420B000
heap
page read and write
901000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
44EF000
heap
page read and write
57E000
heap
page read and write
CFF000
stack
page read and write
8B1000
heap
page read and write
4553000
direct allocation
page read and write
443D000
heap
page read and write
8B1000
heap
page read and write
710000
unkown
page read and write
890000
unkown
page readonly
44E5000
heap
page read and write
316C000
unclassified section
page read and write
B23000
heap
page read and write
4AB000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
4434000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
44E5000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
46FD000
direct allocation
page read and write
9DF000
stack
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
2E9E000
direct allocation
page execute and read and write
420E000
heap
page read and write
41DB000
heap
page read and write
7EE000
unkown
page readonly
640000
heap
page read and write
3029000
direct allocation
page execute and read and write
4579000
heap
page read and write
4189000
heap
page read and write
490000
heap
page read and write
8B1000
heap
page read and write
613000
heap
page read and write
E17000
heap
page read and write
890000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
443F000
heap
page read and write
579000
heap
page read and write
4F0000
unkown
page readonly
613000
heap
page read and write
443B000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
805000
heap
page read and write
359E000
unkown
page read and write
8B1000
heap
page read and write
4FDC000
unkown
page read and write
1EE000
stack
page read and write
420E000
heap
page read and write
2790000
heap
page read and write
8B1000
heap
page read and write
88E000
stack
page read and write
1090000
unkown
page readonly
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
55A000
stack
page read and write
420E000
heap
page read and write
7CAF000
stack
page read and write
46FD000
direct allocation
page read and write
8B1000
heap
page read and write
25DC000
unkown
page read and write
443B000
heap
page read and write
680000
unkown
page readonly
60A000
heap
page read and write
7F7000
unkown
page readonly
5B3000
heap
page read and write
3B1C000
heap
page read and write
4E0000
unkown
page readonly
420E000
heap
page read and write
420E000
heap
page read and write
4430000
heap
page read and write
5D2000
heap
page read and write
3112000
unclassified section
page read and write
8B1000
heap
page read and write
2794000
heap
page read and write
443D000
heap
page read and write
8B1000
heap
page read and write
253A2215000
trusted library allocation
page read and write
2600000
heap
page read and write
3A54000
unkown
page read and write
8B1000
heap
page read and write
3B10000
heap
page read and write
8B1000
heap
page read and write
41AE000
heap
page read and write
253A08D1000
heap
page read and write
850000
trusted library allocation
page read and write
420E000
heap
page read and write
44DC000
heap
page read and write
4080000
unclassified section
page read and write
5DF000
heap
page read and write
4430000
direct allocation
page read and write
2F00000
direct allocation
page execute and read and write
7B1000
unkown
page readonly
8B1000
heap
page read and write
7B1000
unkown
page readonly
780000
heap
page read and write
8B1000
heap
page read and write
56E000
heap
page read and write
8B1000
heap
page read and write
81A000
heap
page read and write
2AE9000
unkown
page execute and read and write
8B1000
heap
page read and write
44D4000
heap
page read and write
420E000
heap
page read and write
573000
heap
page read and write
5FF000
heap
page read and write
44EE000
heap
page read and write
420E000
heap
page read and write
613000
heap
page read and write
4B4000
heap
page read and write
8B1000
heap
page read and write
208FC000
system
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
44E6000
heap
page read and write
655000
heap
page read and write
420E000
heap
page read and write
7C0000
unkown
page read and write
8B1000
heap
page read and write
2FD1000
direct allocation
page execute and read and write
4434000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
9B0000
trusted library allocation
page read and write
780000
heap
page read and write
4200000
heap
page read and write
6A0000
unkown
page readonly
8B1000
heap
page read and write
44E0000
heap
page read and write
D00000
unkown
page readonly
443E000
heap
page read and write
253A20A0000
trusted library allocation
page read and write
3EEE000
unclassified section
page read and write
476E000
direct allocation
page read and write
44DD000
heap
page read and write
8B1000
heap
page read and write
4579000
heap
page read and write
9E0000
unkown
page read and write
8B1000
heap
page read and write
3714000
unclassified section
page read and write
560000
direct allocation
page read and write
44D3000
heap
page read and write
41DB000
heap
page read and write
4C0000
unkown
page readonly
8FF000
heap
page read and write
2C7D000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
6A0000
unkown
page readonly
878000
heap
page read and write
6C0000
heap
page read and write
8B1000
heap
page read and write
75D6000
heap
page read and write
812000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
4431000
heap
page read and write
44DE000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
4436000
heap
page read and write
44DB000
heap
page read and write
420D000
heap
page read and write
8B1000
heap
page read and write
140000
heap
page read and write
BFF000
stack
page read and write
30E8000
unkown
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
579000
heap
page read and write
253A2221000
trusted library allocation
page read and write
476E000
direct allocation
page read and write
7C0000
unkown
page read and write
4E0000
unkown
page readonly
4439000
heap
page read and write
44E0000
heap
page read and write
849000
heap
page read and write
443A000
heap
page read and write
8B1000
heap
page read and write
7890000
heap
page read and write
44ED000
heap
page read and write
253A2100000
trusted library allocation
page read and write
420E000
heap
page read and write
7E0000
unkown
page readonly
443D000
heap
page read and write
8E7000
heap
page read and write
DA7000
heap
page read and write
90B000
heap
page read and write
849000
heap
page read and write
253A08C7000
heap
page read and write
8B1000
heap
page read and write
4586000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
2702000
unkown
page read and write
7F5000
unkown
page read and write
579000
heap
page read and write
1C8000
stack
page read and write
43A4000
unclassified section
page read and write
8B1000
heap
page read and write
680000
unkown
page readonly
420E000
heap
page read and write
540000
heap
page read and write
253A08F2000
heap
page read and write
4E0000
unkown
page readonly
420E000
heap
page read and write
44E3000
heap
page read and write
420C000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
690000
unkown
page readonly
26AF000
stack
page read and write
41DB000
heap
page read and write
420E000
heap
page read and write
4D0000
unkown
page readonly
253A0770000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
5FD000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B7000
heap
page read and write
75E9000
heap
page read and write
6B0000
heap
page read and write
420E000
heap
page read and write
2F56000
unkown
page read and write
4436000
heap
page read and write
253A2300000
trusted library allocation
page read and write
D00000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
4E7F000
system
page execute and read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
613000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
75AB000
heap
page read and write
3730000
unkown
page read and write
2E2D000
direct allocation
page execute and read and write
76A0000
trusted library allocation
page read and write
5C2000
heap
page read and write
8B1000
heap
page read and write
46F9000
direct allocation
page read and write
800000
heap
page read and write
3B1A000
heap
page read and write
8E7000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
2CEE000
heap
page read and write
8B1000
heap
page read and write
5B0000
direct allocation
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
7EE000
unkown
page readonly
443D000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
7E1000
unkown
page execute read
8E5CDFE000
stack
page read and write
590000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
4431000
heap
page read and write
2BCE000
stack
page read and write
613000
heap
page read and write
420E000
heap
page read and write
44E7000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
3052000
unclassified section
page read and write
817000
heap
page read and write
420E000
heap
page read and write
4ED6000
system
page execute and read and write
8B1000
heap
page read and write
75B6000
heap
page read and write
AB3000
unkown
page read and write
690000
unkown
page readonly
8B1000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
44EA000
heap
page read and write
327A000
unkown
page read and write
8B1000
heap
page read and write
160000
heap
page read and write
490000
unkown
page write copy
8B1000
heap
page read and write
8B1000
heap
page read and write
2610000
unkown
page readonly
8B1000
heap
page read and write
46F9000
direct allocation
page read and write
75BB000
heap
page read and write
5E6000
heap
page read and write
45D0000
direct allocation
page read and write
5DC000
heap
page read and write
3D5C000
unclassified section
page read and write
8E0000
heap
page read and write
875000
heap
page read and write
29DC000
unkown
page read and write
480000
heap
page read and write
790000
unkown
page read and write
875000
heap
page read and write
690000
unkown
page readonly
206E2000
system
page read and write
420E000
heap
page read and write
5E1000
heap
page read and write
46FD000
direct allocation
page read and write
420E000
heap
page read and write
750000
unkown
page readonly
8B1000
heap
page read and write
5E6000
heap
page read and write
DA0000
heap
page read and write
45D0000
direct allocation
page read and write
613000
heap
page read and write
253A23CE000
trusted library allocation
page read and write
31CD000
direct allocation
page execute and read and write
401000
unkown
page execute read
75BE000
heap
page read and write
420E000
heap
page read and write
843000
heap
page read and write
8B1000
heap
page read and write
873000
heap
page read and write
44D3000
heap
page read and write
420E000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
253A23C4000
trusted library allocation
page read and write
5D2000
heap
page read and write
CFF000
stack
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
2E29000
heap
page read and write
8B1000
heap
page read and write
75CA000
heap
page read and write
5DF000
heap
page read and write
2073C000
system
page read and write
8B1000
heap
page read and write
443F000
heap
page read and write
44EF000
heap
page read and write
420E000
heap
page read and write
253A2200000
trusted library allocation
page read and write
4207000
heap
page read and write
75A1000
heap
page read and write
44E0000
heap
page read and write
4438000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
770000
unkown
page read and write
8B1000
heap
page read and write
5F3000
heap
page read and write
4D0000
unkown
page readonly
2B8D000
stack
page read and write
DE4000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
4553000
direct allocation
page read and write
4553000
direct allocation
page read and write
443D000
heap
page read and write
2702000
unkown
page read and write
75E5000
heap
page read and write
8B1000
heap
page read and write
443D000
heap
page read and write
7C6E000
stack
page read and write
8B1000
heap
page read and write
253A06DA000
system
page execute and read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
636000
heap
page read and write
18B000
stack
page read and write
420E000
heap
page read and write
253A08F5000
heap
page read and write
9DA000
heap
page read and write
420E000
heap
page read and write
613000
heap
page read and write
8B1000
heap
page read and write
7A0000
heap
page read and write
2604000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
6B0000
heap
page read and write
8B1000
heap
page read and write
1B0000
direct allocation
page read and write
3949000
unclassified section
page execute and read and write
7A5000
heap
page read and write
6B0000
unkown
page readonly
8B1000
heap
page read and write
44EA000
heap
page read and write
8B1000
heap
page read and write
46F9000
direct allocation
page read and write
458E000
heap
page read and write
4E73000
system
page execute and read and write
8B1000
heap
page read and write
3BCA000
unclassified section
page read and write
8B1000
heap
page read and write
10B000
stack
page read and write
38A6000
unclassified section
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
56A000
heap
page read and write
3A38000
unclassified section
page read and write
8B0000
heap
page read and write
8B1000
heap
page read and write
613000
heap
page read and write
2FCD000
direct allocation
page execute and read and write
730000
unkown
page read and write
4C0000
unkown
page readonly
476E000
direct allocation
page read and write
4F0000
unkown
page readonly
46FD000
direct allocation
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
2C79000
heap
page read and write
8B1000
heap
page read and write
579000
heap
page read and write
24B0000
unkown
page readonly
44EC000
heap
page read and write
7F7000
unkown
page readonly
4432000
heap
page read and write
8B1000
heap
page read and write
8E0000
heap
page read and write
721000
unkown
page readonly
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
613000
heap
page read and write
2610000
unkown
page readonly
2600000
heap
page read and write
7B0000
trusted library allocation
page read and write
45D0000
direct allocation
page read and write
574000
heap
page read and write
4D0000
unkown
page readonly
4439000
heap
page read and write
613000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
2D00000
direct allocation
page execute and read and write
DA0000
heap
page read and write
29DC000
unkown
page read and write
44DB000
heap
page read and write
4589000
heap
page read and write
7F7000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
4437000
heap
page read and write
420E000
heap
page read and write
2794000
heap
page read and write
8B0000
heap
page read and write
710000
unkown
page read and write
613000
heap
page read and write
75DD000
heap
page read and write
5DC000
heap
page read and write
44E0000
heap
page read and write
7EE000
unkown
page readonly
44D7000
heap
page read and write
25A0000
heap
page read and write
A00000
heap
page read and write
44E7000
heap
page read and write
8B1000
heap
page read and write
4431000
heap
page read and write
8B1000
heap
page read and write
600000
heap
page read and write
2790000
heap
page read and write
420E000
heap
page read and write
560000
heap
page read and write
4431000
heap
page read and write
8B1000
heap
page read and write
613000
heap
page read and write
4D0000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
4588000
heap
page read and write
8E5B5FB000
stack
page read and write
443F000
heap
page read and write
4B4000
heap
page read and write
690000
unkown
page readonly
5B70000
trusted library allocation
page read and write
617000
heap
page read and write
420E000
heap
page read and write
44E0000
heap
page read and write
44E0000
heap
page read and write
8B1000
heap
page read and write
1A0000
heap
page read and write
850000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
4B0000
heap
page read and write
54A000
stack
page read and write
4433000
heap
page read and write
8B1000
heap
page read and write
4436000
heap
page read and write
70E000
stack
page read and write
8A0000
heap
page read and write
420E000
heap
page read and write
817000
heap
page read and write
31D1000
direct allocation
page execute and read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
443F000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
4E63000
system
page execute and read and write
253A0850000
heap
page read and write
613000
heap
page read and write
8B1000
heap
page read and write
4435000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
65C000
stack
page read and write
5F3000
heap
page read and write
8B1000
heap
page read and write
253A220E000
trusted library allocation
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
44E4000
heap
page read and write
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
2B50000
heap
page read and write
8C0000
unkown
page read and write
20622000
system
page read and write
730000
unkown
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
4588000
heap
page read and write
6A0000
unkown
page readonly
44EE000
heap
page read and write
8B1000
heap
page read and write
586000
heap
page read and write
5B0000
direct allocation
page read and write
2D00000
heap
page read and write
27C2000
unkown
page read and write
44EA000
heap
page read and write
10A0000
unkown
page readonly
8B1000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
4436000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
84E000
stack
page read and write
4E0000
unkown
page readonly
420E000
heap
page read and write
420E000
heap
page read and write
4430000
direct allocation
page read and write
46F9000
direct allocation
page read and write
44D5000
heap
page read and write
579000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
7598000
heap
page read and write
44D8000
heap
page read and write
7F7000
unkown
page readonly
8B1000
heap
page read and write
5F8000
heap
page read and write
443A000
heap
page read and write
873000
heap
page read and write
64C000
stack
page read and write
613000
heap
page read and write
8B1000
heap
page read and write
4434000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
53F000
stack
page read and write
7F5000
unkown
page read and write
7E1000
unkown
page execute read
45D0000
direct allocation
page read and write
420E000
heap
page read and write
253A2301000
trusted library allocation
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
805000
heap
page read and write
332C000
unclassified section
page read and write
4430000
direct allocation
page read and write
602000
heap
page read and write
8B1000
heap
page read and write
7E0000
unkown
page readonly
CC000
stack
page read and write
8B1000
heap
page read and write
443A000
heap
page read and write
5E1000
heap
page read and write
8B1000
heap
page read and write
4206000
heap
page read and write
20CE4000
system
page read and write
44EF000
heap
page read and write
8B1000
heap
page read and write
443A000
heap
page read and write
8B1000
heap
page read and write
253A06D6000
system
page execute and read and write
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
340C000
unkown
page read and write
574000
heap
page read and write
613000
heap
page read and write
3401000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
646000
heap
page read and write
44D6000
heap
page read and write
420E000
heap
page read and write
84E000
stack
page read and write
2E29000
direct allocation
page execute and read and write
54A000
stack
page read and write
8B1000
heap
page read and write
4E82000
system
page execute and read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
420E000
heap
page read and write
44DA000
heap
page read and write
8B1000
heap
page read and write
1090000
unkown
page readonly
420E000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
8B1000
heap
page read and write
There are 796 hidden memdumps, click here to show them.