IOC Report
z4Shipping_document_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
z4Shipping_document_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1FZhY82B
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\polygamodioecious
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z4Shipping_document_pdf.exe
"C:\Users\user\Desktop\z4Shipping_document_pdf.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\z4Shipping_document_pdf.exe"
malicious
C:\Program Files (x86)\ptFXyHEtSdFbvUvXCMprFdPALiMwCHgsJCUhkfaILEsCTLYXRQUzlrqMO\fWXPcgRbOhi.exe
"C:\Program Files (x86)\ptFXyHEtSdFbvUvXCMprFdPALiMwCHgsJCUhkfaILEsCTLYXRQUzlrqMO\fWXPcgRbOhi.exe"
malicious
C:\Windows\SysWOW64\rasdial.exe
"C:\Windows\SysWOW64\rasdial.exe"
malicious
C:\Program Files (x86)\ptFXyHEtSdFbvUvXCMprFdPALiMwCHgsJCUhkfaILEsCTLYXRQUzlrqMO\fWXPcgRbOhi.exe
"C:\Program Files (x86)\ptFXyHEtSdFbvUvXCMprFdPALiMwCHgsJCUhkfaILEsCTLYXRQUzlrqMO\fWXPcgRbOhi.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.ngmr.xyz/fu87/?2Zv0=qtmpl4wh&FbuX5DnP=qh6vHM1wnebxXDDw2+FKNmF+EgGb6h3lhyJTJqyJk9tXxJTOz685U0RnFTuJgXE78BkDdexAIHcYDkJjTquRDOTOtPaRUKFiNfEDt1vQqQEhgT+IhmyUGPK3HCAi1oMdiQ==
54.67.87.110
malicious
http://www.huyven.xyz/dbbh/?FbuX5DnP=lamGMLAlOh98dBGrtynney6GPlHEM5QlQKbLlI7thJxhBrd30wtgMCvSkAg0SEbnfS5+p1L4UOQ6xDYv4dERCKoYatamVnzjD+qK6bhsesKkSZw/Bnu8WzfQ6tLw1Gl2PQ==&2Zv0=qtmpl4wh
162.0.238.246
malicious
http://www.dverkom.store/fbcx/?FbuX5DnP=4VtioKF/mjPo/GpRkpc0Qv24mdyWT6seFEVk09A1HDpPAPyqNiGIX689XALIlCi8LzaCpYl7SzxyH3kwVthnk7FHu2LJAC1pbav8pNbFzRj12JkmuKEoiUFHOdUjAAbLgw==&2Zv0=qtmpl4wh
31.31.196.17
malicious
http://www.galaxyslot88rtp.lat/sfat/
46.17.172.49
malicious
http://www.dto20.shop/zlyl/?FbuX5DnP=Ol7+XR9be+0p6ZvC9qKVEv0Hj0TGab+KR+2v1t8GCnFaAg3dec/002KiYj/aEuecGLCmVtqBzfUyHhXipe21UKmYS12AvSLU6uuH/hqX9wcAM20fmpYouhsYXjVvYDGKbw==&2Zv0=qtmpl4wh
3.33.130.190
malicious
http://www.galaxyslot88rtp.lat/sfat/?2Zv0=qtmpl4wh&FbuX5DnP=ndQRUSq53iSLxvb8OFWfwTz47wZn0JkOZeX5JGA9kygqb7/vKRX/BZDIVWlzOZ6s0Fqu7sJ8lUpg5mYkJBBsoyg01CQ+qYMAZnZLVb86DHwbwWbBhRFgOPvzLtNlDmufAw==
46.17.172.49
malicious
http://www.dto20.shop/zlyl/
3.33.130.190
malicious
http://www.drivedoge.website/czka/?FbuX5DnP=ec+/5ooiqEi687og6mxZgK97hGtyT8hL+UNAVpoR3RpVRqn8W9A98dmq3fmGshL635UHDIR5u/r4iIgXkla3rsnbIqFgNahEcjh4DtJ4lSLz0jzSBM29wabUMiG34aKFBg==&2Zv0=qtmpl4wh
195.161.68.8
malicious
http://www.longfilsalphonse.net/iq05/
52.223.13.41
malicious
http://www.wdeb18.top/jo6v/?FbuX5DnP=2MtP9xsvcXKXviIsu0vpU2PONZvfmv7hx3sLTV54B3JqqEM7biiUK4O8idRTqEg/3Cvc/KoIDU0zY+SEf5yzUNBsxxGwA99CFGRROpYSVV0FKk6l03kHnIpY1s/MIxOd0w==&2Zv0=qtmpl4wh
206.119.82.147
malicious
http://www.patioprojex.africa/iv79/
197.189.237.186
malicious
http://www.drivedoge.website/czka/
195.161.68.8
malicious
http://www.wdeb18.top/jo6v/
206.119.82.147
malicious
http://www.patioprojex.africa/iv79/?FbuX5DnP=aYGuHzYMPqEvnYXTlDqrzWS6BBG+GAu386ntO+DgId2dpQiGgb80BmvDaKZWEoL5dVALkBoXEqYTfu76HBnrOhZ2SSaKAt1EqOH8KFdduTsKn1GCCc4Euldn4jk7wR0qhg==&2Zv0=qtmpl4wh
197.189.237.186
malicious
http://www.animekuid.xyz/7u36/?2Zv0=qtmpl4wh&FbuX5DnP=RRg0VWAgukFyDCcWaOUK9J2JRQGKN1ekxOnlJwT3H1aqQkfKCZmBZ7MUA7JRhWgDz1/ahDOpP8lgsu8VajAwDFVi2x2f3RqmShFRGyru4wY6+58zPRZ+PwrE6jG4RlKX4A==
203.175.9.128
malicious
http://www.lanxuanz.tech/1q08/
136.143.186.12
malicious
http://www.fieldelse.net/exug/
18.141.10.107
malicious
http://www.huyven.xyz/dbbh/
162.0.238.246
malicious
http://www.h5hph710am.site/ni9w/?FbuX5DnP=8RaSk5tWi66Sq48MhHZUoNqLIlgjLo7w7AJBRYL2j4srPIRV3wjO+oo3VCeYgIIWRIVLwvpyy/VAIW0MNnFhP5IMZ0bC4qCM9jFMkTpJYlgGjxgR3domNTZU3RfMxSMm9A==&2Zv0=qtmpl4wh
144.34.186.85
malicious
http://www.h5hph710am.site/ni9w/
144.34.186.85
malicious
http://www.animekuid.xyz/7u36/
203.175.9.128
malicious
http://www.bayarcepat19.click/g48c/
188.114.96.3
malicious
http://www.fieldelse.net/exug/?2Zv0=qtmpl4wh&FbuX5DnP=TUpMmFq2kwIXLFstS9tSAK6sg3+MTXwTelyO0iz++Kl2PamQN8cgWwJpHGB2BYM6TBg0ujJhQFrOEWIIA95gJhU2w3nrLf6Fr1xVloq0NNPRZ4qmm6KGpgvxijzqAjWBDA==
18.141.10.107
malicious
http://www.bayarcepat19.click/g48c/?2Zv0=qtmpl4wh&FbuX5DnP=u4dxImDz3hiCSE5hJ4yjIETlrN4hPhRObI6eehslCZThPKRDqwNE0F1xdz+i8CSvJHFK4MEqkJv66ZZdqE7/rLlhv1jvHawsWmzNBJFBDXYHMYLAOiBh9V/zUb3xtGimdQ==
188.114.96.3
malicious
http://www.dverkom.store/fbcx/
31.31.196.17
malicious
http://www.longfilsalphonse.net/iq05/?FbuX5DnP=HV/ljHR4CkTrXMhbIgqckwyB9eweuTfvL3Xi4RkMqp5guFUs7GFftA+08bhVXex6kzCAqTLzzcugxJOFA2/kc/VgdEUBB0GAlRBjnLrQuMLpABo8u25VHIvKEGEOSOD+9A==&2Zv0=qtmpl4wh
52.223.13.41
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://jino.ru
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.lanxuanz.tech
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://animekuid.xyz/7u36/?2Zv0=qtmpl4wh&FbuX5DnP=RRg0VWAgukFyDCcWaOUK9J2JRQGKN1ekxOnlJwT3H1aqQkfKCZ
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.bayarcepat19.click/g48c/?2Zv0=qtmpl4wh&FbuX5DnP=u4dxImDz3hiCSE5hJ4yjIETlrN4hPhRObI6eehsl
unknown
http://patioprojex.africa/iv79/?FbuX5DnP=aYGuHzYMPqEvnYXTlDqrzWS6BBG
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.huyven.xyz
162.0.238.246
malicious
www.drivedoge.website
195.161.68.8
malicious
animekuid.xyz
203.175.9.128
malicious
www.dverkom.store
31.31.196.17
malicious
www.fieldelse.net
18.141.10.107
malicious
www.longfilsalphonse.net
52.223.13.41
malicious
www.ngmr.xyz
54.67.87.110
malicious
galaxyslot88rtp.lat
46.17.172.49
malicious
zhs.zohosites.com
136.143.186.12
malicious
dto20.shop
3.33.130.190
malicious
patioprojex.africa
197.189.237.186
malicious
wdeb18.top
206.119.82.147
malicious
h5hph710am.site
144.34.186.85
malicious
www.bayarcepat19.click
188.114.96.3
malicious
www.wdeb18.top
unknown
malicious
www.dto20.shop
unknown
malicious
www.h5hph710am.site
unknown
malicious
www.animekuid.xyz
unknown
malicious
www.lanxuanz.tech
unknown
malicious
www.galaxyslot88rtp.lat
unknown
malicious
www.patioprojex.africa
unknown
malicious
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.0.238.246
www.huyven.xyz
Canada
malicious
136.143.186.12
zhs.zohosites.com
United States
malicious
197.189.237.186
patioprojex.africa
South Africa
malicious
206.119.82.147
wdeb18.top
United States
malicious
203.175.9.128
animekuid.xyz
Indonesia
malicious
31.31.196.17
www.dverkom.store
Russian Federation
malicious
144.34.186.85
h5hph710am.site
Canada
malicious
54.67.87.110
www.ngmr.xyz
United States
malicious
188.114.96.3
www.bayarcepat19.click
European Union
malicious
52.223.13.41
www.longfilsalphonse.net
United States
malicious
46.17.172.49
galaxyslot88rtp.lat
Germany
malicious
195.161.68.8
www.drivedoge.website
Russian Federation
malicious
18.141.10.107
www.fieldelse.net
United States
malicious
3.33.130.190
dto20.shop
United States
malicious
There are 4 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4E90000
system
page execute and read and write
malicious
4400000
unclassified section
page execute and read and write
malicious
2A80000
trusted library allocation
page read and write
malicious
31A0000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
2800000
system
page execute and read and write
malicious
38A0000
unkown
page execute and read and write
malicious
44E0000
trusted library allocation
page read and write
malicious
2F0E000
stack
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
17938A01000
trusted library allocation
page read and write
43E1000
heap
page read and write
3B2A000
heap
page read and write
4491000
heap
page read and write
41B1000
heap
page read and write
289C000
unkown
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
12D0000
heap
page read and write
37234000
system
page read and write
17936EAF000
heap
page read and write
43E0000
heap
page read and write
2B0F000
heap
page read and write
2A13000
heap
page read and write
2BAE000
heap
page read and write
454D000
heap
page read and write
4543000
direct allocation
page read and write
2E90000
heap
page read and write
2B86000
heap
page read and write
2B79000
heap
page read and write
43E1000
heap
page read and write
4420000
direct allocation
page read and write
4533000
heap
page read and write
2B0A000
heap
page read and write
43E1000
heap
page read and write
46ED000
direct allocation
page read and write
41B1000
heap
page read and write
2A13000
heap
page read and write
43E1000
heap
page read and write
12E0000
unkown
page readonly
449D000
heap
page read and write
4498000
heap
page read and write
46ED000
direct allocation
page read and write
2A5C000
unkown
page read and write
43E1000
heap
page read and write
4543000
direct allocation
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
10FC000
stack
page read and write
13DE000
heap
page read and write
41B1000
heap
page read and write
2A13000
heap
page read and write
45C0000
direct allocation
page read and write
43E1000
heap
page read and write
449D000
heap
page read and write
41B1000
heap
page read and write
2BD4000
heap
page read and write
43E1000
heap
page read and write
DD0000
unkown
page readonly
B70000
heap
page read and write
1220000
unkown
page read and write
DE0000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
4537000
heap
page read and write
DE0000
heap
page read and write
10F1000
unkown
page readonly
43E1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
348C000
unkown
page read and write
413D000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
4A11000
direct allocation
page execute and read and write
7FCE000
stack
page read and write
43E1000
heap
page read and write
790B000
heap
page read and write
41B1000
heap
page read and write
2A13000
heap
page read and write
41B1000
heap
page read and write
7C0000
unkown
page read and write
4541000
heap
page read and write
41A3000
heap
page read and write
43E1000
heap
page read and write
449F000
heap
page read and write
417F000
heap
page read and write
DD0000
unkown
page readonly
7918000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
3AD4000
unkown
page read and write
17938AC4000
trusted library allocation
page read and write
43E1000
heap
page read and write
295E000
stack
page read and write
2E90000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
7912000
heap
page read and write
43E1000
heap
page read and write
12B0000
unkown
page read and write
41B1000
heap
page read and write
C7F000
heap
page read and write
43E1000
heap
page read and write
4495000
heap
page read and write
41B1000
heap
page read and write
454B000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
740000
unkown
page readonly
41B1000
heap
page read and write
757000
unkown
page readonly
41B1000
heap
page read and write
45C0000
direct allocation
page read and write
43E1000
heap
page read and write
640000
unkown
page readonly
2610000
unkown
page readonly
41B1000
heap
page read and write
41B1000
heap
page read and write
4599000
heap
page read and write
2A00000
heap
page read and write
757000
unkown
page readonly
1211000
unkown
page readonly
4610000
direct allocation
page read and write
43E1000
heap
page read and write
94B000
unkown
page read and write
640000
unkown
page readonly
41B1000
heap
page read and write
43E1000
heap
page read and write
37B0000
unkown
page read and write
5F76000
unclassified section
page read and write
2A13000
heap
page read and write
757000
unkown
page readonly
2BBB000
heap
page read and write
6108000
unclassified section
page read and write
2AF8000
heap
page read and write
2A60000
trusted library allocation
page read and write
304E000
stack
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
2BCE000
heap
page read and write
43E1000
heap
page read and write
645D3FE000
stack
page read and write
41B1000
heap
page read and write
13DA000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
645C3FD000
stack
page read and write
620000
unkown
page readonly
41B1000
heap
page read and write
43E1000
heap
page read and write
17938903000
trusted library allocation
page read and write
2B65000
heap
page read and write
2B0A000
heap
page read and write
2B72000
heap
page read and write
41B1000
heap
page read and write
1260000
heap
page read and write
740000
unkown
page readonly
43E1000
heap
page read and write
4548000
heap
page read and write
2D80000
trusted library allocation
page read and write
15CF000
stack
page read and write
322D000
heap
page read and write
43E1000
heap
page read and write
329E000
heap
page read and write
43E1000
heap
page read and write
7AE000
stack
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
27D0000
heap
page read and write
4549000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
3942000
unkown
page read and write
453A000
heap
page read and write
2B13000
heap
page read and write
4545000
heap
page read and write
43E1000
heap
page read and write
453A000
heap
page read and write
45E8000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4497000
heap
page read and write
46E9000
direct allocation
page read and write
43E1000
heap
page read and write
4546000
heap
page read and write
453E000
heap
page read and write
645CBFE000
stack
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
31A0000
direct allocation
page read and write
2B72000
heap
page read and write
13FF000
heap
page read and write
7925000
heap
page read and write
1260000
heap
page read and write
2A04000
heap
page read and write
273B000
stack
page read and write
17936BE0000
system
page execute and read and write
12D0000
heap
page read and write
12B0000
unkown
page read and write
2B24000
heap
page read and write
43E1000
heap
page read and write
17936E9C000
heap
page read and write
2600000
heap
page read and write
4593000
direct allocation
page read and write
41B1000
heap
page read and write
DF0000
unkown
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
7E0000
unkown
page readonly
17936E87000
heap
page read and write
2A02000
heap
page read and write
B75000
heap
page read and write
D60000
unkown
page readonly
411C000
unkown
page read and write
2B08000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4D6C000
unclassified section
page read and write
1793890A000
trusted library allocation
page read and write
2B6F000
heap
page read and write
D7A000
stack
page read and write
454F000
heap
page read and write
78BA000
heap
page read and write
41B1000
heap
page read and write
2DC0000
heap
page read and write
43E1000
heap
page read and write
5C52000
unclassified section
page read and write
41B1000
heap
page read and write
45ED000
heap
page read and write
349E000
direct allocation
page execute and read and write
740000
unkown
page readonly
41B1000
heap
page read and write
490000
unkown
page write copy
4493000
heap
page read and write
3DF8000
unkown
page read and write
2610000
unkown
page readonly
449C000
heap
page read and write
D10000
unkown
page readonly
2774000
heap
page read and write
43E1000
heap
page read and write
43E0000
heap
page read and write
43E1000
heap
page read and write
4499000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
314F000
stack
page read and write
412D000
heap
page read and write
730000
unkown
page read and write
13DA000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43DD000
heap
page read and write
480000
unkown
page readonly
43E1000
heap
page read and write
475E000
direct allocation
page read and write
43E1000
heap
page read and write
342D000
direct allocation
page execute and read and write
39D9000
unkown
page execute and read and write
2588000
stack
page read and write
449F000
heap
page read and write
4EA000
stack
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4533000
heap
page read and write
4549000
heap
page read and write
741000
unkown
page execute read
3168000
unkown
page read and write
4536000
heap
page read and write
4534000
heap
page read and write
78EE000
heap
page read and write
D7A000
stack
page read and write
D00000
unkown
page readonly
650000
heap
page read and write
43E1000
heap
page read and write
7610000
trusted library allocation
page read and write
78AB000
heap
page read and write
36C8C000
system
page read and write
41B1000
heap
page read and write
592E000
unclassified section
page read and write
4536000
heap
page read and write
486D000
direct allocation
page execute and read and write
2B79000
heap
page read and write
13D0000
heap
page read and write
2A13000
heap
page read and write
B40000
unkown
page read and write
4494000
heap
page read and write
43E1000
heap
page read and write
2B9A000
heap
page read and write
43E1000
heap
page read and write
35CD000
direct allocation
page execute and read and write
17936E80000
heap
page read and write
4EA000
stack
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
460000
unkown
page readonly
757000
unkown
page readonly
43E1000
heap
page read and write
B3E000
stack
page read and write
17938ACE000
trusted library allocation
page read and write
4493000
heap
page read and write
417F000
heap
page read and write
41B1000
heap
page read and write
650000
heap
page read and write
46C2000
heap
page read and write
41AF000
heap
page read and write
41A9000
heap
page read and write
3F8A000
unkown
page read and write
4420000
direct allocation
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
730000
unkown
page read and write
2A13000
heap
page read and write
454D000
heap
page read and write
453E000
heap
page read and write
4F1B000
system
page execute and read and write
43E1000
heap
page read and write
630000
unkown
page readonly
43E1000
heap
page read and write
43E1000
heap
page read and write
3100000
heap
page read and write
3AAE000
heap
page read and write
755000
unkown
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
449D000
heap
page read and write
41B1000
heap
page read and write
10F1000
unkown
page readonly
43E1000
heap
page read and write
15D0000
unkown
page readonly
2B86000
heap
page read and write
1402000
unkown
page read and write
17936EB2000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4A0D000
direct allocation
page execute and read and write
4491000
heap
page read and write
4B52000
unclassified section
page read and write
48DE000
direct allocation
page execute and read and write
10FC000
stack
page read and write
454C000
heap
page read and write
179387E0000
heap
page read and write
41B1000
heap
page read and write
41AA000
heap
page read and write
43E1000
heap
page read and write
12E0000
unkown
page readonly
41B1000
heap
page read and write
17936DC0000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
470000
unkown
page readonly
43E1000
heap
page read and write
1961000
unkown
page readonly
45EC000
heap
page read and write
475E000
direct allocation
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
46E9000
direct allocation
page read and write
7AE000
stack
page read and write
4492000
heap
page read and write
2BD9000
heap
page read and write
12AE000
stack
page read and write
1220000
unkown
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
3023000
heap
page read and write
4490000
heap
page read and write
DC0000
unkown
page readonly
41B1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
26FC000
stack
page read and write
41B1000
heap
page read and write
17936EB2000
heap
page read and write
3150000
direct allocation
page read and write
17938917000
trusted library allocation
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
45EA000
heap
page read and write
2A13000
heap
page read and write
2C05000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
2BDE000
heap
page read and write
45DC000
heap
page read and write
2C17000
heap
page read and write
C60000
heap
page read and write
2770000
heap
page read and write
453D000
heap
page read and write
13D0000
heap
page read and write
2D01000
heap
page read and write
4420000
direct allocation
page read and write
1793890F000
trusted library allocation
page read and write
17938ABE000
trusted library allocation
page read and write
3C66000
unkown
page read and write
2B4A000
heap
page read and write
AFF000
stack
page read and write
17936EAB000
heap
page read and write
2B54000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
C60000
heap
page read and write
5DE4000
unclassified section
page read and write
4494000
heap
page read and write
43E1000
heap
page read and write
642C000
unclassified section
page read and write
2A13000
heap
page read and write
41B1000
heap
page read and write
2A00000
heap
page read and write
2ED0000
direct allocation
page read and write
560A000
unclassified section
page read and write
2C17000
heap
page read and write
45C0000
direct allocation
page read and write
D60000
unkown
page readonly
43E1000
heap
page read and write
43E1000
heap
page read and write
4538000
heap
page read and write
482000
unkown
page readonly
800F000
stack
page read and write
74E000
unkown
page readonly
2BA4000
heap
page read and write
741000
unkown
page execute read
2F00000
heap
page read and write
755000
unkown
page read and write
4497000
heap
page read and write
43E1000
heap
page read and write
3A00000
unclassified section
page execute and read and write
449F000
heap
page read and write
4543000
direct allocation
page read and write
7B20000
heap
page read and write
2B96000
heap
page read and write
2A04000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
2B13000
heap
page read and write
D10000
unkown
page readonly
4497000
heap
page read and write
27C0000
heap
page read and write
78DE000
heap
page read and write
480000
unkown
page readonly
2FD6000
unkown
page read and write
43E1000
heap
page read and write
B80000
unkown
page read and write
453B000
heap
page read and write
2C00000
heap
page read and write
41B1000
heap
page read and write
4490000
heap
page read and write
4490000
heap
page read and write
2E94000
heap
page read and write
475E000
direct allocation
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
17936D80000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
449B000
heap
page read and write
45E0000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
741000
unkown
page execute read
43E1000
heap
page read and write
41B1000
heap
page read and write
45EA000
heap
page read and write
4F37000
system
page execute and read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
2770000
heap
page read and write
3642000
direct allocation
page execute and read and write
DB0000
unkown
page readonly
2B60000
heap
page read and write
43E1000
heap
page read and write
B70000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
78B7000
heap
page read and write
2A05000
heap
page read and write
43E1000
heap
page read and write
46ED000
direct allocation
page read and write
4494000
heap
page read and write
41B1000
heap
page read and write
4536000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
400000
unkown
page readonly
1240000
unkown
page readonly
45E7000
heap
page read and write
453F000
heap
page read and write
46E9000
direct allocation
page read and write
4539000
unclassified section
page execute and read and write
2BA0000
heap
page read and write
2782000
unkown
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
4541000
heap
page read and write
43E1000
heap
page read and write
36B72000
system
page read and write
79AA000
heap
page read and write
41B1000
heap
page read and write
45E8000
heap
page read and write
791C000
heap
page read and write
2C12000
heap
page read and write
3229000
heap
page read and write
7990000
trusted library allocation
page read and write
41B1000
heap
page read and write
5154000
unclassified section
page read and write
755000
unkown
page read and write
45EF000
heap
page read and write
2E94000
heap
page read and write
43E1000
heap
page read and write
AFF000
stack
page read and write
4538000
heap
page read and write
2770000
heap
page read and write
1961000
unkown
page readonly
4544000
heap
page read and write
41B1000
heap
page read and write
7903000
heap
page read and write
2A13000
heap
page read and write
41AC000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
B50000
unkown
page read and write
45D6000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
7B1000
unkown
page readonly
41B1000
heap
page read and write
43E1000
heap
page read and write
78B0000
heap
page read and write
41B1000
heap
page read and write
2A13000
heap
page read and write
43E1000
heap
page read and write
74E000
unkown
page readonly
17938912000
trusted library allocation
page read and write
453F000
heap
page read and write
43E1000
heap
page read and write
78E8000
heap
page read and write
449D000
heap
page read and write
31A0000
direct allocation
page read and write
41B1000
heap
page read and write
120E000
stack
page read and write
43E1000
heap
page read and write
4F2B000
system
page execute and read and write
45D9000
heap
page read and write
4494000
heap
page read and write
DB0000
unkown
page readonly
449C000
heap
page read and write
2A60000
heap
page read and write
4470000
direct allocation
page read and write
41B1000
heap
page read and write
78E4000
heap
page read and write
2A13000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
17936C0A000
system
page execute and read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
630000
unkown
page readonly
43E1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
4503000
heap
page read and write
4545000
heap
page read and write
4549000
heap
page read and write
2E44000
unkown
page read and write
43E1000
heap
page read and write
300F000
stack
page read and write
43E1000
heap
page read and write
741000
unkown
page execute read
43E1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
CF0000
unkown
page readonly
45D6000
heap
page read and write
74E000
unkown
page readonly
2B13000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
4A82000
direct allocation
page execute and read and write
4536000
heap
page read and write
45EF000
heap
page read and write
43E1000
heap
page read and write
7B1000
unkown
page readonly
620000
unkown
page readonly
78B5000
heap
page read and write
7927000
heap
page read and write
17938921000
trusted library allocation
page read and write
43E1000
heap
page read and write
4498000
heap
page read and write
4740000
direct allocation
page execute and read and write
629A000
unclassified section
page read and write
43E1000
heap
page read and write
13F5000
heap
page read and write
78A3000
heap
page read and write
2C19000
heap
page read and write
4493000
heap
page read and write
2B6F000
heap
page read and write
2B13000
heap
page read and write
5EC000
stack
page read and write
41AE000
heap
page read and write
7A40000
trusted library allocation
page read and write
43E1000
heap
page read and write
2AF0000
heap
page read and write
3300000
direct allocation
page execute and read and write
43E1000
heap
page read and write
4490000
heap
page read and write
4492000
heap
page read and write
17936CA0000
heap
page read and write
1211000
unkown
page readonly
792A000
heap
page read and write
4AB000
unkown
page readonly
2B19000
heap
page read and write
41B0000
heap
page read and write
43E1000
heap
page read and write
46C6000
heap
page read and write
43E1000
heap
page read and write
45AB000
unclassified section
page execute and read and write
2B65000
heap
page read and write
45D8000
heap
page read and write
7E0000
unkown
page readonly
43E1000
heap
page read and write
4494000
heap
page read and write
43E1000
heap
page read and write
2A13000
heap
page read and write
2774000
heap
page read and write
78CA000
heap
page read and write
2BA9000
heap
page read and write
4492000
heap
page read and write
17938900000
trusted library allocation
page read and write
74E000
unkown
page readonly
17938800000
trusted library allocation
page read and write
412D000
heap
page read and write
449D000
heap
page read and write
43E1000
heap
page read and write
3A4B000
unkown
page execute and read and write
4544000
heap
page read and write
29E0000
heap
page read and write
13DE000
heap
page read and write
43E1000
heap
page read and write
CF0000
unkown
page readonly
254B000
stack
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4493000
heap
page read and write
3429000
direct allocation
page execute and read and write
299F000
stack
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
2842000
unkown
page read and write
C68000
heap
page read and write
4BAC000
unclassified section
page read and write
2C05000
heap
page read and write
36E4C000
system
page read and write
2790000
heap
page read and write
25FF000
stack
page read and write
DF0000
unkown
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
415F000
heap
page read and write
79A4000
heap
page read and write
17936E8F000
heap
page read and write
43E1000
heap
page read and write
1240000
unkown
page readonly
449D000
heap
page read and write
2B13000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4495000
heap
page read and write
C68000
heap
page read and write
52E6000
unclassified section
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
2C1A000
heap
page read and write
579C000
unclassified section
page read and write
5478000
unclassified section
page read and write
43E1000
heap
page read and write
508C000
unkown
page read and write
2B08000
heap
page read and write
41B1000
heap
page read and write
17938660000
trusted library allocation
page read and write
2A5C000
unkown
page read and write
4535000
heap
page read and write
4737000
heap
page read and write
4530000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4541000
heap
page read and write
2EA0000
unkown
page execute and read and write
43E1000
heap
page read and write
17938660000
trusted library allocation
page read and write
32FA000
unkown
page read and write
470000
unkown
page readonly
43E1000
heap
page read and write
4152000
heap
page read and write
7C0000
unkown
page read and write
4F8E000
system
page execute and read and write
43DD000
heap
page read and write
45E9000
heap
page read and write
DC0000
unkown
page readonly
2D80000
trusted library allocation
page read and write
36C32000
system
page read and write
4530000
trusted library allocation
page read and write
4541000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
4F12000
system
page execute and read and write
43E1000
heap
page read and write
46CD000
stack
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4A92000
unclassified section
page read and write
41B1000
heap
page read and write
43E1000
heap
page read and write
2A13000
heap
page read and write
453E000
heap
page read and write
2D80000
trusted library allocation
page read and write
2C20000
heap
page read and write
25F0000
heap
page read and write
43E1000
heap
page read and write
15D0000
unkown
page readonly
D00000
unkown
page readonly
2A13000
heap
page read and write
740000
unkown
page readonly
17938AAA000
trusted library allocation
page read and write
2782000
unkown
page read and write
4494000
heap
page read and write
2B19000
heap
page read and write
3801000
heap
page read and write
4530000
heap
page read and write
4492000
heap
page read and write
B40000
unkown
page read and write
470E000
stack
page read and write
35D1000
direct allocation
page execute and read and write
4498000
heap
page read and write
43E1000
heap
page read and write
41B1000
heap
page read and write
A99000
heap
page read and write
4546000
heap
page read and write
361E000
unkown
page read and write
4534000
heap
page read and write
645BBFC000
stack
page read and write
4490000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
5AC0000
unclassified section
page read and write
789D000
heap
page read and write
755000
unkown
page read and write
17938660000
trusted library allocation
page read and write
2B13000
heap
page read and write
460000
unkown
page readonly
41B1000
heap
page read and write
41B1000
heap
page read and write
4869000
direct allocation
page execute and read and write
2A04000
heap
page read and write
BDC000
unkown
page read and write
43E1000
heap
page read and write
4497000
heap
page read and write
2A13000
heap
page read and write
2600000
heap
page read and write
2E6F000
stack
page read and write
43E1000
heap
page read and write
43E1000
heap
page read and write
4F3A000
system
page execute and read and write
5EC000
stack
page read and write
41B1000
heap
page read and write
31A0000
direct allocation
page read and write
41B1000
heap
page read and write
There are 796 hidden memdumps, click here to show them.