IOC Report
DO-COSU6387686280.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
DO-COSU6387686280.pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DO-COSU6387686280.pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\p1h163LmP
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DO-COSU6387686280.pdf.exe
"C:\Users\user\Desktop\DO-COSU6387686280.pdf.exe"
malicious
C:\Users\user\Desktop\DO-COSU6387686280.pdf.exe
"C:\Users\user\Desktop\DO-COSU6387686280.pdf.exe"
malicious
C:\Program Files (x86)\hLNpsIHmukIZoDRDxpFbCIICufiWlKehcOANmZAhCcJscOCNiHYcXedTEQJmYoLIhxFbKY\EnLuReulIds.exe
"C:\Program Files (x86)\hLNpsIHmukIZoDRDxpFbCIICufiWlKehcOANmZAhCcJscOCNiHYcXedTEQJmYoLIhxFbKY\EnLuReulIds.exe"
malicious
C:\Windows\SysWOW64\mountvol.exe
"C:\Windows\SysWOW64\mountvol.exe"
malicious
C:\Program Files (x86)\hLNpsIHmukIZoDRDxpFbCIICufiWlKehcOANmZAhCcJscOCNiHYcXedTEQJmYoLIhxFbKY\EnLuReulIds.exe
"C:\Program Files (x86)\hLNpsIHmukIZoDRDxpFbCIICufiWlKehcOANmZAhCcJscOCNiHYcXedTEQJmYoLIhxFbKY\EnLuReulIds.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.krshop.shop/grhe/
13.248.169.48
malicious
http://www.supernutra01.online/ipdr/?UbRxm=aqsMELEoVHYTBvrjaGL2RPOv1CWpxeit3T8CA32c3b1KGgngGePyFU4WnP+JT+CjtUjsMbMtl8M87Wzmg5dknNnagRNh5+9+QvGqF8xbYvDN2Ssh6AjGLaQoW3ut45K01w==&YvA4=xnL8AvI8CJiPEDU
104.21.24.198
malicious
http://www.samundri.online/5kax/
84.32.84.32
malicious
http://www.zxyck.net/z2jp/?UbRxm=OHC+NpFe2K8jmTlicXvXjJ+QVEgSatfCtasqPMFJtNXA1CIQdaIwTH1aekp09+pbZOA1peX5og6OyDAWYalTXTww0fqX4q90/3pIZSi2lNK2VQoZjt3+Z09NDWePsk/Y+A==&YvA4=xnL8AvI8CJiPEDU
118.107.250.103
malicious
http://www.kkpmoneysocial.top/dlkm/?UbRxm=h4lwGEVwdKAie/3i69ZS5ajdX7DevTN5l7rCLvUsWI5Ax6oJIVJyRtoh5SGHiRwIVgG3mVQ8/tYP0qqkAkm1lhwb/KkDwsT64i8O6GgUd051zcV49WQ+HPRS7BJ45XoE1w==&YvA4=xnL8AvI8CJiPEDU
172.67.129.38
malicious
http://www.sankan-fukushi.info/qq1e/?UbRxm=DayBJHTwMg56rcld9n6KWZbVQKFRYd6Y2OVvMB/QfV+VoLW2vz3Ysj2Lu1Mz5EvoA06VXqhN10X9MeLBCKiZ8LZ2VXddbMNCxmaFYlM5w9+CsZ6D34cvk8XDh8Pk/EneAg==&YvA4=xnL8AvI8CJiPEDU
163.44.185.183
malicious
http://www.oztalkshw.store/3agz/
199.59.243.227
malicious
http://www.krshop.shop/grhe/?UbRxm=AHRdWC0KZWrjxYC0KXJ/Pc0Ifc3a5dIjcNypL3DdH/M5f69FO55V4y/zfqI4/XMCrlXFD3GasOekPJK0GQB6Xv0fwrTDR9rlUwQmGtKqhkKLqQH5fcp3eHuY6Kvt/u2Y7w==&YvA4=xnL8AvI8CJiPEDU
13.248.169.48
malicious
http://www.officinadelpasso.shop/te2d/?UbRxm=YRrrocWQCJ4z5Wo4Hyii3lnusY6IScX2szwquVJanj4zZRsRM51rBmkRCj7FWFPYdGZcOIeAVFgSZdyx5BBHZnzVg/hu/fGyJb1Cl3lRDP19pEGPrlJr8lwvIP2DjfyM2w==&YvA4=xnL8AvI8CJiPEDU
195.110.124.133
malicious
http://www.callyur.shop/dmly/
66.29.137.10
malicious
http://www.samundri.online/5kax/?UbRxm=kHRDn+Od6RtwHubD3E4pw9JaMFUU2DIijxVB6CtFbwBz/SAX/B3t7cttXyp9BuzPrv9CCpl0ygq2nuEhZlB9cUHvF/n6EPGCDxKUJTRdD4WbzDcOj2b0xy5K4x5io8krBQ==&YvA4=xnL8AvI8CJiPEDU
84.32.84.32
malicious
http://www.supernutra01.online/ipdr/
104.21.24.198
malicious
http://www.callyur.shop/dmly/?YvA4=xnL8AvI8CJiPEDU&UbRxm=TxJb7MA4bghX/lTZi4FFUnx8X5IvqZr5NBwuw2qLyVi8/oqCfZzrCw4HdVl5+7DfFNR6jxv9e9mG0XYoVmaYbw3qmnHIup/BR6FUCIQOGhPMZ/gsWiB/XFVGgfvbM52XoA==
66.29.137.10
malicious
http://www.futuru.xyz/8uep/
209.74.77.109
malicious
http://www.yhj12.one/bi55/?UbRxm=9VfqSJPbhh1HsXnTkF+U6adH/BnqBZbub0jDgAwJrnxzr9B3JVfn3uPZcB9gesjtADmpDWZfolEsGVNmGAi6MiyGQ6YANno90wBnX2TfwVwXOUx5FI/nfHL1eW4WOSittQ==&YvA4=xnL8AvI8CJiPEDU
38.181.21.85
malicious
http://www.yhj12.one/bi55/
38.181.21.85
malicious
http://www.sankan-fukushi.info/qq1e/
163.44.185.183
malicious
http://www.oztalkshw.store/3agz/?YvA4=xnL8AvI8CJiPEDU&UbRxm=M9KkYvXJQvTAdDL0N809Af0gFgx9ZbNQHhlIdroNnVkJjfd2I5bhi/bs41o8FjJgMZ4GFKyENsY1nw3d8RcMg+XWHrwZPIIO2wtMzeZ/v8QmuglPj4pAgM6ngctNURE5tA==
199.59.243.227
malicious
http://www.iner-tech.online/2qq5/
37.140.192.206
malicious
http://www.futuru.xyz/8uep/?UbRxm=c2pj5XzU4r8mroY+x9nXsVmXiRTTvEExFimN19zxWLYZcfwNZM3Ctl+xWcy7JvpSNCmS4f8+1JlLQGO0Hv+UiSuhGSb748cjOyYKQpOu9XZhhnIssQky4Xxuz1j9m1caEA==&YvA4=xnL8AvI8CJiPEDU
209.74.77.109
malicious
http://www.kkpmoneysocial.top/dlkm/
172.67.129.38
malicious
http://www.zxyck.net/z2jp/
118.107.250.103
malicious
http://www.officinadelpasso.shop/te2d/
195.110.124.133
malicious
http://www.bioland.app/0322/?YvA4=xnL8AvI8CJiPEDU&UbRxm=HxR1FeZHXJ7BSqCS3fD8mQxxaJumBZenc9dO7nNnWiW1TdG8ymlkgtRZzCsH8EsCxrgxn7fyxa4U+0BCWK8lvrgV1wD4C6X04kpiBTwqtuBdGQan/Ge0WLc1tZ3QEOC6mw==
202.61.233.66
malicious
http://www.oztalkshw.store
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)
unknown
https://lolipop.jp/
unknown
https://pepabo.com/
unknown
https://www.reg.ru/support/#request
unknown
https://www.google.com
unknown
https://files.reg.ru/fonts/inter/Inter-Regular.woff)
unknown
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.lolipop.jp/hc/ja/articles/360049132953
unknown
https://kb.fastpanel.direct/troubleshoot/
unknown
https://files.reg.ru/fonts/inter/Inter-Medium.woff2)
unknown
https://2domains.ru
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)
unknown
https://minne.com/?utm_source=lolipop&utm_medium=banner&utm_campaign=synergy&utm_content=404
unknown
http://assets.lolipop.jp/img/bnr/bnr_lolipop_ad_001.gif
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://files.reg.ru/fonts/inter/Inter-Medium.woff)
unknown
https://files.reg.ru/fonts/inter/Inter-Regular.woff2)
unknown
https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404
unknown
http://js.ad-stir.com/js/adstir.js?20130527
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://server118.hosting.reg.ru/manager
unknown
https://static.minne.com/files/banner/minne_600x500
unknown
https://reg.ru?target=_blank
unknown
There are 44 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.yhj12.one
38.181.21.85
malicious
www.bioland.app
202.61.233.66
malicious
www.kkpmoneysocial.top
172.67.129.38
malicious
www.krshop.shop
13.248.169.48
malicious
callyur.shop
66.29.137.10
malicious
www.iner-tech.online
37.140.192.206
malicious
www.oztalkshw.store
199.59.243.227
malicious
www.fantastica.digital
194.58.112.174
malicious
www.futuru.xyz
209.74.77.109
malicious
www.zxyck.net
118.107.250.103
malicious
officinadelpasso.shop
195.110.124.133
malicious
samundri.online
84.32.84.32
malicious
www.sankan-fukushi.info
163.44.185.183
malicious
www.supernutra01.online
104.21.24.198
www.officinadelpasso.shop
unknown
www.samundri.online
unknown
www.callyur.shop
unknown
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
37.140.192.206
www.iner-tech.online
Russian Federation
malicious
209.74.77.109
www.futuru.xyz
United States
malicious
13.248.169.48
www.krshop.shop
United States
malicious
172.67.129.38
www.kkpmoneysocial.top
United States
malicious
163.44.185.183
www.sankan-fukushi.info
Japan
malicious
199.59.243.227
www.oztalkshw.store
United States
malicious
84.32.84.32
samundri.online
Lithuania
malicious
202.61.233.66
www.bioland.app
Australia
malicious
195.110.124.133
officinadelpasso.shop
Italy
malicious
118.107.250.103
www.zxyck.net
Hong Kong
malicious
38.181.21.85
www.yhj12.one
United States
malicious
66.29.137.10
callyur.shop
United States
malicious
104.21.24.198
www.supernutra01.online
United States
There are 3 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
remote allocation
page execute and read and write
malicious
5E30000
trusted library section
page read and write
malicious
3010000
trusted library allocation
page read and write
malicious
1D40000
unclassified section
page execute and read and write
malicious
3D59000
trusted library allocation
page read and write
malicious
3190000
unkown
page execute and read and write
malicious
2A20000
system
page execute and read and write
malicious
5090000
system
page execute and read and write
malicious
1400000
unclassified section
page execute and read and write
malicious
2FC0000
trusted library allocation
page read and write
malicious
1AA8000
direct allocation
page execute and read and write
2B74000
heap
page read and write
30A2000
heap
page read and write
3044000
unkown
page read and write
27AB000
stack
page read and write
1069000
heap
page read and write
19ADBF30000
heap
page read and write
8C00000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1D30000
heap
page read and write
34FA000
unkown
page read and write
7BB5000
heap
page read and write
2BF1000
heap
page read and write
7AE0000
trusted library allocation
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
CF0000
unkown
page read and write
19ADBD80000
heap
page read and write
2CBE000
trusted library allocation
page read and write
2D51000
heap
page read and write
7BB8000
heap
page read and write
5112000
system
page execute and read and write
D01000
unkown
page readonly
7BA0000
heap
page read and write
D4F000
heap
page read and write
2D51000
heap
page read and write
7BAB000
heap
page read and write
2784000
heap
page read and write
10FA000
stack
page read and write
7E0000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FDB0000
trusted library allocation
page execute and read and write
1508000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
D30000
heap
page read and write
5E60000
trusted library allocation
page read and write
19ADD710000
trusted library allocation
page read and write
731000
unkown
page execute read
19ADDB12000
trusted library allocation
page read and write
1320000
unkown
page readonly
2D51000
heap
page read and write
19ADDCBE000
trusted library allocation
page read and write
1391000
unkown
page readonly
BB0000
unkown
page readonly
D60000
heap
page read and write
2D51000
heap
page read and write
2982000
unkown
page read and write
2D51000
heap
page read and write
19ADDB03000
trusted library allocation
page read and write
2784000
heap
page read and write
743F000
stack
page read and write
1056000
heap
page read and write
2D51000
heap
page read and write
33F2000
direct allocation
page execute and read and write
2D51000
heap
page read and write
86CDFFE000
stack
page read and write
2D51000
heap
page read and write
BC0000
heap
page read and write
1270000
heap
page read and write
30B0000
direct allocation
page execute and read and write
3090000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1280000
trusted library allocation
page read and write
BA0000
unkown
page readonly
C16000
heap
page read and write
3B42000
unkown
page read and write
12C1000
unkown
page readonly
13E0000
trusted library allocation
page execute and read and write
2D51000
heap
page read and write
27CF000
unclassified section
page execute and read and write
2BE7000
heap
page read and write
337D000
direct allocation
page execute and read and write
2D51000
heap
page read and write
12CE000
stack
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1BAF000
stack
page read and write
5CF0000
heap
page read and write
7C12000
heap
page read and write
2D51000
heap
page read and write
14C0000
unkown
page read and write
1330000
heap
page read and write
2D51000
heap
page read and write
3562000
unclassified section
page read and write
5E50000
trusted library allocation
page execute and read and write
2B90000
heap
page read and write
12A0000
heap
page read and write
18FE000
direct allocation
page execute and read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
19ADBF5F000
heap
page read and write
ED0000
heap
page read and write
5330000
heap
page read and write
13F0000
heap
page read and write
3094000
heap
page read and write
2D51000
heap
page read and write
122D000
trusted library allocation
page execute and read and write
747000
unkown
page readonly
7E0000
unkown
page readonly
10C6000
heap
page read and write
1063000
heap
page read and write
2D51000
heap
page read and write
368C000
unkown
page read and write
1A11000
direct allocation
page execute and read and write
19ADBE70000
heap
page read and write
745000
unkown
page read and write
700E000
stack
page read and write
B5D000
stack
page read and write
F2F000
stack
page read and write
3FF8000
unkown
page read and write
2D51000
heap
page read and write
730000
unkown
page readonly
48B4000
unclassified section
page read and write
D37000
stack
page read and write
1700000
unkown
page readonly
2D51000
heap
page read and write
5E70000
trusted library allocation
page execute and read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2780000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1257000
trusted library allocation
page execute and read and write
2D51000
heap
page read and write
BB0000
unkown
page readonly
2D51000
heap
page read and write
E8E000
stack
page read and write
2B74000
heap
page read and write
72B0000
trusted library section
page read and write
2D51000
heap
page read and write
3381000
direct allocation
page execute and read and write
822E000
stack
page read and write
2720000
unkown
page readonly
1110000
heap
page read and write
2D51000
heap
page read and write
12B0000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
10B6000
heap
page read and write
2C12000
heap
page read and write
14A0000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
19ADDB0F000
trusted library allocation
page read and write
B90000
unkown
page readonly
2D51000
heap
page read and write
1246000
trusted library allocation
page execute and read and write
1252000
trusted library allocation
page read and write
5EB0000
heap
page read and write
4EFC000
unclassified section
page read and write
3D51000
trusted library allocation
page read and write
2982000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
51F0000
trusted library allocation
page read and write
2D51000
heap
page read and write
14D0000
heap
page read and write
C3A000
stack
page read and write
C10000
heap
page read and write
2D51000
heap
page read and write
1010000
trusted library allocation
page read and write
7490000
trusted library allocation
page execute and read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D00000
trusted library allocation
page read and write
302D000
heap
page read and write
3400000
trusted library allocation
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
27E8000
stack
page read and write
2C23000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
DBC000
stack
page read and write
3622000
unclassified section
page read and write
2E50000
trusted library allocation
page read and write
518F000
system
page execute and read and write
2D51000
heap
page read and write
3CD4000
unkown
page read and write
7BFF000
heap
page read and write
13A0000
heap
page read and write
2BE7000
heap
page read and write
126E000
stack
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
19ADBEA0000
heap
page read and write
426C000
unclassified section
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2BFB000
heap
page read and write
BC0000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
5320000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1240000
trusted library allocation
page read and write
2D51000
heap
page read and write
12C1000
unkown
page readonly
1065000
heap
page read and write
1230000
trusted library allocation
page read and write
86CCFFE000
stack
page read and write
2D55000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
511C000
system
page execute and read and write
12FC000
stack
page read and write
731000
unkown
page execute read
40DA000
unclassified section
page read and write
2D51000
heap
page read and write
73E000
unkown
page readonly
4D6A000
unclassified section
page read and write
3094000
heap
page read and write
2C5C000
unkown
page read and write
E40000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
730000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
2C08000
heap
page read and write
2D51000
heap
page read and write
7D0000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
7D0000
unkown
page readonly
5D20000
heap
page read and write
2D51000
heap
page read and write
2C7C000
stack
page read and write
418A000
unkown
page read and write
2B80000
heap
page read and write
2D51000
heap
page read and write
2BCE000
heap
page read and write
2D51000
heap
page read and write
1233000
trusted library allocation
page read and write
7C21000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1028000
heap
page read and write
7C07000
heap
page read and write
1391000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2BE2000
heap
page read and write
19ADDB0A000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
5E2E000
stack
page read and write
2720000
unkown
page readonly
D10000
unkown
page read and write
19ADBF5B000
heap
page read and write
2D51000
heap
page read and write
D10000
unkown
page read and write
5138000
system
page execute and read and write
13A0000
heap
page read and write
7C23000
heap
page read and write
2EDE000
stack
page read and write
747000
unkown
page readonly
2D51000
heap
page read and write
2D05000
trusted library allocation
page read and write
1760000
direct allocation
page execute and read and write
630E000
stack
page read and write
513B000
system
page execute and read and write
43FE000
unclassified section
page read and write
BA0000
unkown
page readonly
2CAB000
trusted library allocation
page read and write
745000
unkown
page read and write
123D000
trusted library allocation
page execute and read and write
5350000
trusted library allocation
page read and write
2D51000
heap
page read and write
7E00000
heap
page read and write
6EC0000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
3C24000
unclassified section
page read and write
5EB5000
heap
page read and write
13F7000
heap
page read and write
1310000
unkown
page readonly
2B85000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1480000
unkown
page read and write
2BF4000
heap
page read and write
2D51000
heap
page read and write
731000
unkown
page execute read
B90000
unkown
page readonly
ECD000
stack
page read and write
19ADD710000
trusted library allocation
page read and write
1700000
unkown
page readonly
7AE3000
heap
page read and write
19ADBF62000
heap
page read and write
2D51000
heap
page read and write
D38000
heap
page read and write
8B0000
unkown
page readonly
431C000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
86CE7FE000
stack
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
B5FF000
stack
page read and write
2D51000
heap
page read and write
2E78000
heap
page read and write
7BEB000
heap
page read and write
2760000
unkown
page read and write
2D51000
heap
page read and write
7AF3000
heap
page read and write
2D51000
heap
page read and write
3DB6000
unclassified section
page read and write
19ADDB00000
trusted library allocation
page read and write
2C4A000
heap
page read and write
1380000
unkown
page read and write
19ADBF3F000
heap
page read and write
2C28000
heap
page read and write
73E000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
2C50000
heap
page read and write
75C2000
trusted library allocation
page read and write
1320000
unkown
page readonly
2D51000
heap
page read and write
271E000
stack
page read and write
2D51000
heap
page read and write
2C5A000
heap
page read and write
1250000
trusted library allocation
page read and write
CF0000
unkown
page read and write
2D51000
heap
page read and write
19ADD900000
heap
page read and write
2D51000
heap
page read and write
7C1C000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2C93000
heap
page read and write
2D51000
heap
page read and write
19ADDCB4000
trusted library allocation
page read and write
D20000
heap
page read and write
2B74000
heap
page read and write
7B90000
trusted library allocation
page read and write
2EDF000
heap
page read and write
7AF0000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2740000
unclassified section
page execute and read and write
2D51000
heap
page read and write
34B0000
trusted library allocation
page execute and read and write
731000
unkown
page execute read
2C90000
heap
page read and write
2D51000
heap
page read and write
2B8E000
heap
page read and write
F60000
unkown
page readonly
2C1F000
heap
page read and write
7F0000
unkown
page readonly
19ADDB21000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
B63E000
stack
page read and write
C10000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
3368000
unkown
page read and write
99A000
unkown
page read and write
10CC000
heap
page read and write
F50000
unkown
page readonly
747E000
stack
page read and write
19ADDCCE000
trusted library allocation
page read and write
7C14000
heap
page read and write
2FA0000
heap
page read and write
2D51000
heap
page read and write
2740000
unkown
page read and write
530B000
stack
page read and write
19ADD710000
trusted library allocation
page read and write
2B8F000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2B87000
heap
page read and write
2A9C000
unkown
page read and write
3031000
heap
page read and write
D38000
heap
page read and write
2C55000
heap
page read and write
367C000
unclassified section
page read and write
2CF0000
trusted library allocation
page read and write
2890000
unkown
page readonly
6FC6000
trusted library allocation
page read and write
2D51000
heap
page read and write
B73F000
stack
page read and write
FDF000
stack
page read and write
2D51000
heap
page read and write
FCA000
stack
page read and write
73E000
unkown
page readonly
2D51000
heap
page read and write
16FF000
stack
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1300000
unkown
page readonly
2BA8000
trusted library allocation
page read and write
2D51000
heap
page read and write
3090000
heap
page read and write
51D2000
trusted library allocation
page read and write
2D51000
heap
page read and write
745000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
7BE6000
heap
page read and write
733A000
trusted library section
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1500000
heap
page read and write
2750000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1480000
unkown
page read and write
2D51000
heap
page read and write
51E0000
trusted library allocation
page execute and read and write
73E000
unkown
page readonly
2F04000
heap
page read and write
7BC4000
heap
page read and write
2D51000
heap
page read and write
6FCA000
trusted library allocation
page read and write
7BE1000
heap
page read and write
2D51000
heap
page read and write
51C0000
heap
page read and write
D01000
unkown
page readonly
2D51000
heap
page read and write
122E000
stack
page read and write
C0E000
stack
page read and write
2D51000
heap
page read and write
169F000
stack
page read and write
2A42000
unkown
page read and write
2D51000
heap
page read and write
2B70000
heap
page read and write
F30000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
5210000
trusted library allocation
page read and write
2BF4000
heap
page read and write
19ADDA00000
trusted library allocation
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
5310000
trusted library section
page readonly
1A2D000
direct allocation
page execute and read and write
2D51000
heap
page read and write
13DE000
stack
page read and write
2D51000
heap
page read and write
512C000
system
page execute and read and write
52EC000
unkown
page read and write
D30000
heap
page read and write
5340000
trusted library allocation
page execute and read and write
2CC6000
trusted library allocation
page read and write
86CC7FB000
stack
page read and write
3C1F000
unkown
page execute and read and write
2D51000
heap
page read and write
275D000
unclassified section
page execute and read and write
62CE000
stack
page read and write
2D10000
trusted library allocation
page read and write
2D51000
heap
page read and write
2BF1000
heap
page read and write
1BCE2000
system
page read and write
86CD7FE000
stack
page read and write
A5A000
stack
page read and write
2B74000
heap
page read and write
2D40000
heap
page read and write
2D51000
heap
page read and write
730000
unkown
page readonly
2D51000
heap
page read and write
F60000
unkown
page readonly
2CC1000
trusted library allocation
page read and write
1224000
trusted library allocation
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1A91000
unkown
page readonly
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
19ADBC90000
system
page execute and read and write
FCA000
stack
page read and write
4E4C000
stack
page read and write
4722000
unclassified section
page read and write
3F48000
unclassified section
page read and write
2D51000
heap
page read and write
19ADDCC4000
trusted library allocation
page read and write
1300000
unkown
page readonly
730000
unkown
page readonly
288F000
stack
page read and write
14A0000
unkown
page readonly
2B50000
heap
page read and write
19ADDC01000
trusted library allocation
page read and write
3B90000
unkown
page execute and read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1220000
trusted library allocation
page read and write
4590000
unclassified section
page read and write
2740000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1889000
direct allocation
page execute and read and write
3060000
trusted library allocation
page read and write
2D51000
heap
page read and write
1270000
heap
page read and write
A5A000
stack
page read and write
2C35000
heap
page read and write
2D51000
heap
page read and write
2780000
heap
page read and write
D20000
heap
page read and write
3BAD000
unkown
page execute and read and write
7BDB000
heap
page read and write
1020000
heap
page read and write
3060000
trusted library allocation
page read and write
2C5C000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D30000
trusted library allocation
page read and write
19ADBF3A000
heap
page read and write
7BA6000
heap
page read and write
125B000
trusted library allocation
page execute and read and write
2D51000
heap
page read and write
10FE000
heap
page read and write
31D9000
direct allocation
page execute and read and write
2D95000
trusted library allocation
page read and write
1500000
heap
page read and write
2CA0000
trusted library allocation
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
6FC0000
trusted library allocation
page read and write
2D51000
heap
page read and write
30A0000
unkown
page readonly
2D51000
trusted library allocation
page read and write
4BD8000
unclassified section
page read and write
102E000
heap
page read and write
1C2E4000
system
page read and write
2B90000
heap
page read and write
2D51000
heap
page read and write
1223000
trusted library allocation
page execute and read and write
12D0000
heap
page execute and read and write
B77E000
stack
page read and write
7C0E000
heap
page read and write
7BB0000
heap
page read and write
14D0000
heap
page read and write
19ADBF4C000
heap
page read and write
7C17000
heap
page read and write
5D00000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
1330000
heap
page read and write
2D51000
heap
page read and write
10C8000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
747000
unkown
page readonly
12FC000
stack
page read and write
124A000
trusted library allocation
page execute and read and write
1BC22000
system
page read and write
573E000
stack
page read and write
2D51000
heap
page read and write
2CE0000
trusted library allocation
page read and write
2D51000
heap
page read and write
B4FE000
stack
page read and write
137E000
stack
page read and write
1A91000
unkown
page readonly
2D51000
heap
page read and write
1BEFC000
system
page read and write
2D51000
heap
page read and write
826F000
stack
page read and write
6010000
trusted library allocation
page read and write
188D000
direct allocation
page execute and read and write
31D6000
unkown
page read and write
F40000
unkown
page readonly
B5D000
stack
page read and write
2D51000
heap
page read and write
14C0000
unkown
page read and write
2C18000
heap
page read and write
51EC000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
324E000
direct allocation
page execute and read and write
2AA0000
heap
page read and write
383C000
unclassified section
page read and write
704E000
stack
page read and write
2BFB000
heap
page read and write
5400000
heap
page execute and read and write
2D51000
heap
page read and write
19ADDB17000
trusted library allocation
page read and write
2D51000
heap
page read and write
F50000
unkown
page readonly
3060000
trusted library allocation
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2890000
unkown
page readonly
1310000
unkown
page readonly
14A8000
heap
page read and write
2D51000
heap
page read and write
1508000
heap
page read and write
2B8A000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
7F0000
unkown
page readonly
2B9D000
heap
page read and write
2B30000
heap
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
B87E000
stack
page read and write
121F000
stack
page read and write
3E66000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
2CA4000
trusted library allocation
page read and write
19ADBCEA000
system
page execute and read and write
2D51000
heap
page read and write
2C08000
heap
page read and write
2D51000
heap
page read and write
1A26000
direct allocation
page execute and read and write
2D51000
heap
page read and write
5360000
heap
page read and write
8B2000
unkown
page readonly
F30000
unkown
page readonly
2FDF000
stack
page read and write
2BE2000
heap
page read and write
2CD2000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
2C6F000
heap
page read and write
31DD000
direct allocation
page execute and read and write
13B0000
direct allocation
page read and write
2D51000
heap
page read and write
381E000
unkown
page read and write
2C80000
trusted library allocation
page read and write
1380000
unkown
page read and write
39B0000
unkown
page read and write
8DFF000
stack
page read and write
2D51000
heap
page read and write
747000
unkown
page readonly
14A0000
unkown
page readonly
30A0000
unkown
page readonly
745000
unkown
page read and write
2D51000
heap
page read and write
2D51000
heap
page read and write
4A46000
unclassified section
page read and write
1048000
heap
page read and write
F40000
unkown
page readonly
2D50000
heap
page read and write
2D51000
heap
page read and write
There are 666 hidden memdumps, click here to show them.