IOC Report
Project Breakdown Doc.exe

loading gif

Files

File Path
Type
Category
Malicious
Project Breakdown Doc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\320lF200
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\anaboly
data
dropped
C:\Users\user\AppData\Local\Temp\autC5D4.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Project Breakdown Doc.exe
"C:\Users\user\Desktop\Project Breakdown Doc.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Project Breakdown Doc.exe"
malicious
C:\Program Files (x86)\GzlfDizlOFsCEsVHarsTCLGgMRlFWzwRRlvlADjOGGIbgLJjxnCJwgZCQa\VFfhzkOtKq.exe
"C:\Program Files (x86)\GzlfDizlOFsCEsVHarsTCLGgMRlFWzwRRlvlADjOGGIbgLJjxnCJwgZCQa\VFfhzkOtKq.exe"
malicious
C:\Windows\SysWOW64\powercfg.exe
"C:\Windows\SysWOW64\powercfg.exe"
malicious
C:\Program Files (x86)\GzlfDizlOFsCEsVHarsTCLGgMRlFWzwRRlvlADjOGGIbgLJjxnCJwgZCQa\VFfhzkOtKq.exe
"C:\Program Files (x86)\GzlfDizlOFsCEsVHarsTCLGgMRlFWzwRRlvlADjOGGIbgLJjxnCJwgZCQa\VFfhzkOtKq.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.1secondlending.one/6pwo/?AFF=OcYLCa3XOMtt+RsgzD1zLQYXF21NRX3aDgwcqG8KHHMgaFOqYIh5VwBJiTVI7K2l1+vZ/nsgVnM6ADXGg1abnTc9bVWqvwMitNejIQMZs4A8D92e/CCvcvI=&qjBT=BfTHe4BP_zkdflN
43.205.198.29
malicious
http://www.wine-drinkers.club/hakt/
194.245.148.189
malicious
http://www.supernutra01.online/rk61/?qjBT=BfTHe4BP_zkdflN&AFF=4Jev6jkxg6xEO7Dapp2OtVT6jS0ALsNacNocs9uTAtM/sd7AmwK5VubVBVupph+Y/y0F/E1wxEQcV5PZ7sI9NGZN+wjn/QV3LQCc1WVNeTcwGOVDWPFPiYw=
172.67.220.36
malicious
http://www.supernutra01.online/rk61/
172.67.220.36
malicious
http://www.1secondlending.one/6pwo/
43.205.198.29
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://kb.fastpanel.direct/troubleshoot/
unknown
http://www.qqa79.top/mz0w/?qjBT=BfTHe4BP_zkdflN&AFF=uMzU0JGK22aEYJLN9gIRRbcx6PQvWyWv0SPCs66KRtTFzrJJ373CiBnwq6iLrm6CBfWGplZZf3wVkFmev9wws6pM55HNj3BAq/9ra29WeR04lUyUIOcydT8=
38.47.233.21
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.wine-drinkers.club
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.supernutra01.online
172.67.220.36
malicious
www.1secondlending.one
43.205.198.29
malicious
www.wine-drinkers.club
194.245.148.189
malicious
qqa79.top
38.47.233.21
www.qqa79.top
unknown

IPs

IP
Domain
Country
Malicious
43.205.198.29
www.1secondlending.one
Japan
malicious
194.245.148.189
www.wine-drinkers.club
Germany
malicious
172.67.220.36
www.supernutra01.online
United States
malicious
38.47.233.21
qqa79.top
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
32F0000
trusted library allocation
page read and write
malicious
3960000
unclassified section
page execute and read and write
malicious
3450000
unkown
page execute and read and write
malicious
4CA0000
system
page execute and read and write
malicious
4C00000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
D20000
system
page execute and read and write
malicious
3470000
trusted library allocation
page read and write
malicious
369E000
stack
page read and write
40E0000
direct allocation
page read and write
2F88000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
C41000
unkown
page execute read
60000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
1760000
heap
page read and write
3371000
heap
page read and write
410000
unkown
page readonly
D70000
unkown
page read and write
43CE000
direct allocation
page read and write
60000
unkown
page readonly
43CE000
direct allocation
page read and write
3371000
heap
page read and write
24BC000
stack
page read and write
15BF000
stack
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
8242000
heap
page read and write
3371000
heap
page read and write
64BB000
unclassified section
page execute and read and write
1798000
heap
page read and write
4230000
direct allocation
page read and write
2F00000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
4EAC000
stack
page read and write
C30000
unkown
page read and write
4280000
direct allocation
page read and write
4D6D000
system
page execute and read and write
2F61000
heap
page read and write
3419000
heap
page read and write
3371000
heap
page read and write
4276000
unclassified section
page read and write
3371000
heap
page read and write
3C2D000
direct allocation
page execute and read and write
257E000
stack
page read and write
3371000
heap
page read and write
D08000
unkown
page readonly
830000
unkown
page readonly
3371000
heap
page read and write
4090000
direct allocation
page read and write
3371000
heap
page read and write
41B3000
direct allocation
page read and write
3371000
heap
page read and write
26AC000
unkown
page read and write
2F05000
heap
page read and write
3DD1000
direct allocation
page execute and read and write
37F9000
direct allocation
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
5D0000
unkown
page readonly
3371000
heap
page read and write
4230000
direct allocation
page read and write
2F46000
heap
page read and write
6EBB000
unclassified section
page execute and read and write
2400000
heap
page read and write
3371000
heap
page read and write
3405000
heap
page read and write
183C000
heap
page read and write
13B0000
unkown
page readonly
3960000
direct allocation
page read and write
CF5000
unkown
page readonly
800000
heap
page read and write
3A2D000
heap
page read and write
2380000
unkown
page readonly
D61000
unkown
page readonly
E00000
unkown
page read and write
23C21510000
heap
page read and write
49A000
stack
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
17C2000
heap
page read and write
6E000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
17C3000
heap
page read and write
9B0000
heap
page read and write
43A9000
direct allocation
page read and write
850000
unkown
page readonly
3823000
heap
page read and write
FD955FE000
stack
page read and write
9BC000
stack
page read and write
3364000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
183C000
heap
page read and write
3371000
heap
page read and write
3620000
trusted library allocation
page read and write
441E000
direct allocation
page read and write
3371000
heap
page read and write
1832000
heap
page read and write
8218000
heap
page read and write
17B3000
heap
page read and write
84E000
stack
page read and write
2474000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
23C2150C000
heap
page read and write
3700000
heap
page read and write
2EAC000
stack
page read and write
386E000
direct allocation
page execute and read and write
23C22E12000
trusted library allocation
page read and write
174E000
stack
page read and write
3371000
heap
page read and write
3213000
heap
page read and write
3371000
heap
page read and write
800000
heap
page read and write
18EA000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3417000
heap
page read and write
2592000
unkown
page read and write
3371000
heap
page read and write
2580000
unkown
page read and write
430000
unkown
page readonly
3371000
heap
page read and write
2960000
unkown
page readonly
CCF000
unkown
page readonly
2F80000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3202000
heap
page read and write
3371000
heap
page read and write
75000
unkown
page read and write
36C6000
heap
page read and write
FD965FF000
stack
page read and write
3371000
heap
page read and write
17CF000
heap
page read and write
8211000
heap
page read and write
3371000
heap
page read and write
F1A000
stack
page read and write
23C214EF000
heap
page read and write
2592000
unkown
page read and write
170E000
stack
page read and write
3371000
heap
page read and write
40E0000
direct allocation
page read and write
570B000
unkown
page execute and read and write
430B000
unkown
page execute and read and write
9F0000
unkown
page readonly
6E000
unkown
page readonly
DE0000
unkown
page readonly
3371000
heap
page read and write
21834000
system
page read and write
2F75000
heap
page read and write
3371000
heap
page read and write
23C21281000
system
page execute and read and write
2F09000
heap
page read and write
23C21470000
heap
page read and write
17C1000
heap
page read and write
BE0000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
2470000
heap
page read and write
3371000
heap
page read and write
4CFA000
system
page execute and read and write
183C000
heap
page read and write
2EFE000
heap
page read and write
3528000
heap
page read and write
3364000
heap
page read and write
3371000
heap
page read and write
2FA3000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3899000
unkown
page execute and read and write
3213000
heap
page read and write
2F0F000
heap
page read and write
D70000
unkown
page read and write
3213000
heap
page read and write
3412000
heap
page read and write
848D000
stack
page read and write
C00000
unkown
page readonly
32D0000
trusted library allocation
page read and write
3371000
heap
page read and write
6E000
unkown
page readonly
183C000
heap
page read and write
8BA000
stack
page read and write
5E0000
unkown
page readonly
3371000
heap
page read and write
C30000
unkown
page read and write
3371000
heap
page read and write
4280000
direct allocation
page read and write
4CF0000
system
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
DCE000
stack
page read and write
CCF000
unkown
page readonly
15FD000
stack
page read and write
3A12000
direct allocation
page execute and read and write
3371000
heap
page read and write
2144C000
system
page read and write
3960000
direct allocation
page read and write
23C22E0A000
trusted library allocation
page read and write
3371000
heap
page read and write
77000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
3655000
heap
page read and write
E20000
heap
page read and write
3371000
heap
page read and write
840000
unkown
page readonly
36D0000
direct allocation
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
43CE000
direct allocation
page read and write
18E9000
heap
page read and write
3280000
heap
page read and write
3371000
heap
page read and write
3620000
trusted library allocation
page read and write
3371000
heap
page read and write
23C213F0000
heap
page read and write
2F6B000
heap
page read and write
821B000
heap
page read and write
DE0000
unkown
page readonly
101F000
stack
page read and write
23C22CC0000
trusted library allocation
page read and write
CFF000
unkown
page read and write
3371000
heap
page read and write
8300000
trusted library allocation
page read and write
3371000
heap
page read and write
3900000
heap
page read and write
2390000
direct allocation
page read and write
2F78000
unkown
page read and write
18EA000
heap
page read and write
BE0000
unkown
page readonly
3371000
heap
page read and write
850000
unkown
page readonly
420000
unkown
page readonly
3371000
heap
page read and write
F90000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
23C22E00000
trusted library allocation
page read and write
3371000
heap
page read and write
43A9000
direct allocation
page read and write
3371000
heap
page read and write
3417000
heap
page read and write
3371000
heap
page read and write
183D000
heap
page read and write
CFF000
unkown
page write copy
5F0000
unkown
page readonly
8247000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
286C000
unkown
page read and write
5ABB000
unclassified section
page execute and read and write
3371000
heap
page read and write
81F1000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3D44000
heap
page read and write
61000
unkown
page execute read
9E0000
heap
page read and write
3371000
heap
page read and write
FC0000
heap
page read and write
3371000
heap
page read and write
23C22FC4000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
40E4000
unclassified section
page read and write
3200000
heap
page read and write
3C29000
direct allocation
page execute and read and write
2F6B000
heap
page read and write
3371000
heap
page read and write
59C000
stack
page read and write
3DCD000
direct allocation
page execute and read and write
32D0000
heap
page read and write
13B1000
unkown
page readonly
4200000
unclassified section
page execute and read and write
2470000
heap
page read and write
3371000
heap
page read and write
88DF000
stack
page read and write
E2A000
heap
page read and write
60000
unkown
page readonly
2F70000
heap
page read and write
43AD000
direct allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
E00000
unkown
page read and write
F70000
unkown
page readonly
23C214E0000
heap
page read and write
3371000
heap
page read and write
1F8E000
stack
page read and write
286C000
unkown
page read and write
84CE000
stack
page read and write
15DB000
stack
page read and write
824B000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
75000
unkown
page read and write
E2E000
heap
page read and write
E80000
heap
page read and write
854E000
stack
page read and write
1780000
direct allocation
page execute and read and write
3371000
heap
page read and write
21172000
system
page read and write
4203000
direct allocation
page read and write
FD95DFE000
stack
page read and write
3501000
heap
page read and write
3371000
heap
page read and write
53EF000
stack
page read and write
1790000
heap
page read and write
3371000
heap
page read and write
2F40000
heap
page read and write
2F04000
heap
page read and write
2F0F000
heap
page read and write
8237000
heap
page read and write
50BB000
unclassified section
page execute and read and write
3213000
heap
page read and write
23C21513000
heap
page read and write
3371000
heap
page read and write
3B00000
direct allocation
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
2580000
unkown
page read and write
3213000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
8256000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
8550000
heap
page read and write
15CF000
stack
page read and write
2FCE000
stack
page read and write
5E0000
unkown
page readonly
43AD000
direct allocation
page read and write
23C21513000
heap
page read and write
2DE6000
unkown
page read and write
3371000
heap
page read and write
54EF000
stack
page read and write
3371000
heap
page read and write
21232000
system
page read and write
41B3000
direct allocation
page read and write
9BC000
stack
page read and write
399D000
direct allocation
page execute and read and write
34C0000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
2FCB000
heap
page read and write
3371000
heap
page read and write
2F70000
heap
page read and write
3371000
heap
page read and write
23C22E10000
trusted library allocation
page read and write
CAB000
stack
page read and write
2EEA000
stack
page read and write
5F0000
unkown
page readonly
821F000
heap
page read and write
3371000
heap
page read and write
2FC5000
heap
page read and write
2F8D000
heap
page read and write
3371000
heap
page read and write
3E42000
direct allocation
page execute and read and write
341B000
heap
page read and write
2F5D000
heap
page read and write
2F82000
heap
page read and write
295F000
stack
page read and write
3371000
heap
page read and write
F80000
heap
page read and write
2F90000
direct allocation
page read and write
2EF8000
heap
page read and write
3371000
heap
page read and write
9F0000
unkown
page readonly
2F20000
heap
page read and write
4359000
direct allocation
page read and write
3371000
heap
page read and write
3CFC000
unclassified section
page read and write
3370000
heap
page read and write
2F1D000
heap
page read and write
3371000
heap
page read and write
DD0000
heap
page read and write
3371000
heap
page read and write
4D18000
system
page execute and read and write
D03000
unkown
page write copy
861000
unkown
page readonly
253E000
stack
page read and write
2F9D000
heap
page read and write
F70000
unkown
page readonly
77000
unkown
page readonly
3371000
heap
page read and write
23C22E21000
trusted library allocation
page read and write
23C22D00000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
2850000
heap
page read and write
37FD000
direct allocation
page execute and read and write
3371000
heap
page read and write
49A000
stack
page read and write
23C22E03000
trusted library allocation
page read and write
821E000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
18B0000
heap
page read and write
2F82000
heap
page read and write
E69000
heap
page read and write
37CE000
stack
page read and write
3620000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
4230000
direct allocation
page read and write
3371000
heap
page read and write
823E000
heap
page read and write
1020000
unkown
page readonly
3371000
heap
page read and write
39A1000
direct allocation
page execute and read and write
3960000
direct allocation
page read and write
BDF000
stack
page read and write
23C22FCE000
trusted library allocation
page read and write
18DC000
heap
page read and write
3371000
heap
page read and write
40E0000
direct allocation
page read and write
3213000
heap
page read and write
6A4E000
stack
page read and write
3371000
heap
page read and write
3C9E000
direct allocation
page execute and read and write
C20000
heap
page read and write
4090000
direct allocation
page read and write
3371000
heap
page read and write
E2E000
heap
page read and write
C41000
unkown
page execute read
3371000
heap
page read and write
43AD000
direct allocation
page read and write
342D000
heap
page read and write
18E9000
heap
page read and write
D5E000
stack
page read and write
3371000
heap
page read and write
410000
unkown
page readonly
2F04000
heap
page read and write
3371000
heap
page read and write
2A50000
unkown
page execute and read and write
420000
unkown
page readonly
390B000
unkown
page execute and read and write
C40000
heap
page read and write
3371000
heap
page read and write
4090000
direct allocation
page read and write
23C2127E000
system
page execute and read and write
3371000
heap
page read and write
3371000
heap
page read and write
6E000
unkown
page readonly
2854000
heap
page read and write
430000
unkown
page readonly
3371000
heap
page read and write
D61000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
60000
unkown
page readonly
1020000
unkown
page readonly
861000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
4203000
direct allocation
page read and write
3D40000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3B3C000
unclassified section
page read and write
FD94DFC000
stack
page read and write
9E8000
heap
page read and write
2652000
unkown
page read and write
183C000
heap
page read and write
4280000
direct allocation
page read and write
2F5D000
heap
page read and write
3371000
heap
page read and write
23C22FBE000
trusted library allocation
page read and write
3A29000
heap
page read and write
380E000
stack
page read and write
850000
unkown
page read and write
1831000
heap
page read and write
9C0000
unkown
page readonly
3213000
heap
page read and write
3371000
heap
page read and write
435D000
direct allocation
page read and write
3371000
heap
page read and write
2F0A000
heap
page read and write
2380000
unkown
page readonly
23C22FA8000
trusted library allocation
page read and write
2EF0000
heap
page read and write
3371000
heap
page read and write
893E000
stack
page read and write
3371000
heap
page read and write
75000
unkown
page read and write
850000
unkown
page read and write
18F1000
heap
page read and write
17C2000
heap
page read and write
77000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
23C22E0E000
trusted library allocation
page read and write
17C6000
heap
page read and write
390F000
stack
page read and write
17CF000
heap
page read and write
43A9000
direct allocation
page read and write
3371000
heap
page read and write
2474000
heap
page read and write
875000
heap
page read and write
23C21430000
heap
page read and write
5D0000
unkown
page readonly
3371000
heap
page read and write
C00000
unkown
page readonly
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3213000
heap
page read and write
4001000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
4D0A000
system
page execute and read and write
8206000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
D08000
unkown
page readonly
2EFE000
heap
page read and write
3371000
heap
page read and write
41B3000
direct allocation
page read and write
23C211E0000
system
page execute and read and write
18D2000
heap
page read and write
23C22F00000
trusted library allocation
page read and write
238E000
stack
page read and write
2F9A000
heap
page read and write
610B000
unkown
page execute and read and write
3371000
heap
page read and write
E6C000
heap
page read and write
4359000
direct allocation
page read and write
897F000
stack
page read and write
CF5000
unkown
page readonly
3213000
heap
page read and write
3213000
heap
page read and write
2FD0000
heap
page read and write
C40000
unkown
page readonly
2F70000
heap
page read and write
441E000
direct allocation
page read and write
2F09000
heap
page read and write
441E000
direct allocation
page read and write
23C21310000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
9E0000
heap
page read and write
C40000
unkown
page readonly
3570000
trusted library allocation
page execute and read and write
2C54000
unkown
page read and write
C40000
heap
page read and write
3371000
heap
page read and write
23C22F01000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
950000
unkown
page read and write
2F09000
heap
page read and write
980000
unkown
page read and write
8BA000
stack
page read and write
2FD5000
heap
page read and write
23C214E7000
heap
page read and write
3371000
heap
page read and write
3910000
direct allocation
page read and write
840000
unkown
page readonly
5049000
unclassified section
page execute and read and write
3371000
heap
page read and write
82F0000
trusted library allocation
page read and write
3371000
heap
page read and write
3364000
heap
page read and write
3371000
heap
page read and write
820B000
heap
page read and write
3A22000
unclassified section
page read and write
2F75000
heap
page read and write
3371000
heap
page read and write
8201000
heap
page read and write
4408000
unclassified section
page read and write
3AE2000
unclassified section
page read and write
1814000
heap
page read and write
77000
unkown
page readonly
2FA7000
heap
page read and write
23C214FC000
heap
page read and write
3371000
heap
page read and write
2F09000
heap
page read and write
3651000
heap
page read and write
E2A000
heap
page read and write
3371000
heap
page read and write
3213000
heap
page read and write
9FF000
heap
page read and write
2854000
heap
page read and write
3371000
heap
page read and write
830000
unkown
page readonly
E20000
heap
page read and write
C10000
unkown
page readonly
844C000
stack
page read and write
185C000
heap
page read and write
3A9E000
heap
page read and write
3360000
heap
page read and write
C10000
unkown
page readonly
9C0000
unkown
page readonly
4D16000
system
page execute and read and write
2F61000
heap
page read and write
3372000
heap
page read and write
3371000
heap
page read and write
61000
unkown
page execute read
61000
unkown
page execute read
9B0000
heap
page read and write
DD0000
heap
page read and write
3213000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3213000
heap
page read and write
2F09000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3405000
heap
page read and write
341A000
heap
page read and write
2960000
unkown
page readonly
3213000
heap
page read and write
61000
unkown
page execute read
870000
heap
page read and write
78BB000
unclassified section
page execute and read and write
9E8000
heap
page read and write
3371000
heap
page read and write
4359000
direct allocation
page read and write
6790000
trusted library allocation
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
2850000
heap
page read and write
822A000
heap
page read and write
75000
unkown
page read and write
3213000
heap
page read and write
435D000
direct allocation
page read and write
870000
heap
page read and write
17C6000
heap
page read and write
CE8000
stack
page read and write
850F000
stack
page read and write
DA0000
heap
page read and write
4D0B000
unkown
page execute and read and write
3213000
heap
page read and write
435D000
direct allocation
page read and write
3400000
heap
page read and write
3495000
heap
page read and write
3371000
heap
page read and write
2FB0000
heap
page read and write
3371000
heap
page read and write
59C000
stack
page read and write
3371000
heap
page read and write
2F51000
heap
page read and write
23C22CC0000
trusted library allocation
page read and write
8216000
heap
page read and write
950000
unkown
page read and write
3371000
heap
page read and write
2F00000
heap
page read and write
C20000
heap
page read and write
3371000
heap
page read and write
3371000
heap
page read and write
183C000
heap
page read and write
970000
unkown
page read and write
3371000
heap
page read and write
4203000
direct allocation
page read and write
3371000
heap
page read and write
There are 665 hidden memdumps, click here to show them.