IOC Report
shipping document.exe

loading gif

Files

File Path
Type
Category
Malicious
shipping document.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\shipping document.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\03F67l1929
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\shipping document.exe
"C:\Users\user\Desktop\shipping document.exe"
malicious
C:\Users\user\Desktop\shipping document.exe
"C:\Users\user\Desktop\shipping document.exe"
malicious
C:\Program Files (x86)\fCHtILpYpFbWFzXFGNwToQmYRczXdrUMSrMjxIdUESsXVazGuJRZrDpkvESvVQMyw\oWRaEnEJAq.exe
"C:\Program Files (x86)\fCHtILpYpFbWFzXFGNwToQmYRczXdrUMSrMjxIdUESsXVazGuJRZrDpkvESvVQMyw\oWRaEnEJAq.exe"
malicious
C:\Windows\SysWOW64\openfiles.exe
"C:\Windows\SysWOW64\openfiles.exe"
malicious
C:\Program Files (x86)\fCHtILpYpFbWFzXFGNwToQmYRczXdrUMSrMjxIdUESsXVazGuJRZrDpkvESvVQMyw\oWRaEnEJAq.exe
"C:\Program Files (x86)\fCHtILpYpFbWFzXFGNwToQmYRczXdrUMSrMjxIdUESsXVazGuJRZrDpkvESvVQMyw\oWRaEnEJAq.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.paydayloans3.shop/3g97/
64.190.62.22
malicious
http://www.jthzbrdb.fun/3g97/?AlB=sdJPX&12l42=0byNfP8xYbFTvv3TFTBCb86kR2BGbvQk+A1BHdxmY/MfvALInVuskjfkuf2FjiBL/p+WASS1FPmyok1wO3yhMgT0gLImR5/DqviqEDtH5dgpFLFfPLyFVKE=
80.240.20.220
malicious
http://www.brothedboil.com/3g97/
91.195.240.19
malicious
http://www.tavernadoheroi.store/3g97/
162.240.81.18
malicious
http://www.a-two-spa-salon.com/3g97/
157.7.107.63
malicious
http://www.corvidemporium.com/3g97/?12l42=xT2trqCQSb0YGfwnfC7AAWCSgoebgz86z2nMETOowAc4zyKeScBuNk+zQrcmduROogVqNtfeQZVF2OAhYZAs5wKafa9/anE/xTNtRCFpw92mm1bEow/bC00=&AlB=sdJPX
34.149.87.45
malicious
http://www.carliente.com/3g97/
217.160.0.111
malicious
http://www.kansaiwoody.com/3g97/
118.27.122.214
malicious
http://www.a-two-spa-salon.com/3g97/?12l42=14Ldh71M1tAlq614+H+qL8FcHbYJSqGFN6RtTIloW1xTPtpRPWfTFb1ZY6KJ/sGolC/raog+W4a2BjveEWOkSH7srevI7CXU30k1a21fOzbLf05e9HUvJZA=&AlB=sdJPX
157.7.107.63
malicious
http://www.levelstep.online/3g97/?AlB=sdJPX&12l42=chI4PXqGf2akS9KXcN1/fIedDZpx1haPemMkxCQLjjdC+0LHJVcL8RVSGr04qmANi3qgGmUbQWZg1h9oBh32jeRnCnRBYigKMCJed0uSuMGI415b3fHmBd4=
31.186.11.254
malicious
http://www.tavernadoheroi.store/3g97/?12l42=i+yp5adQUIH0VEgvOjK1asLzAf4iESqSDXIw4u3g+VG2ev6y5D4E1hL0oESk2gA2rBhm9fxiezQ8IT1HT+LmxelGkpS4OcyZPgZgITeIYkhl82tlqROkzZ0=&AlB=sdJPX
162.240.81.18
malicious
http://www.carliente.com/3g97/?AlB=sdJPX&12l42=pss1I4hPKcXAgTeMienjdKFyes9H9oPLrlXUMEqkxJwN3Lu9fPUDc8IPlpsJO9uNl7TAjBTqm2QSFPkGLslINQQyxLsDbCNKxleUNo2npjmmo3Auov63B2Q=
217.160.0.111
malicious
http://www.heldhold.life/3g97/
203.161.46.103
malicious
http://www.levelstep.online/3g97/
31.186.11.254
malicious
http://www.tondex.finance/3g97/
91.195.240.19
malicious
http://www.corvidemporium.com/3g97/
34.149.87.45
malicious
http://www.brothedboil.com/3g97/?12l42=SimubthO8j6ps9851O6iFrPFbhU0j9rq0/tYQBfzEgGK5hVM85jEDi8N6ZmkhSeBx8n/pYDrpewbJx/zj6rVSge67MmYz8zyJ6w88vNyo3JtRae+fbqeQKU=&AlB=sdJPX
91.195.240.19
malicious
http://www.paydayloans3.shop/3g97/?12l42=+UthD+705U1ao7DlNG8D0XAg53Vx3iw389CE+agLgXg1A2DbEeFYSszaWdWCIKr2NLn015a/QKEJl6wBw76YOQKFwTcvF/Pv+Bjw8BucK5rNlKIw4A0tIOg=&AlB=sdJPX
64.190.62.22
malicious
http://www.heldhold.life/3g97/?AlB=sdJPX&12l42=meGryHO7z/6rT923FBL9q9LP9fsOajdjArpVhNvG0WuyKOeyc4yYaP5CwAgWJzIE3e4WxKJNZpro8/ttq32sXWhgj4qMLx7ltRSWVCmHVfZWVpKDtZXBa18=
203.161.46.103
malicious
http://www.tondex.finance
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://a-two-spa-salon.com/3g97/?12l42=14Ldh71M1tAlq614
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://nginx.net/
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fedoraproject.org/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.mz3fk6g3.sbs/3g97/
172.217.16.36
http://www.sakkal.com
unknown
https://www.strato.de
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://github.com/Deathmax/Chest-Control/raw/master/version.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
http://www.sakkal.com8
unknown
http://www.mz3fk6g3.sbs/3g97/?12l42=ZDaHJbFbnHAFPJixhC0W5VJcO+3r+/EbU9/fBM2jNZ9+Ym38hIZ/X5pUYkV2fcPscAyJxVIUpy5G03sBlccn/BoOXNW31gfQYe8OGfTtnGJDjF2r8y9L4VM=&AlB=sdJPX
172.217.16.36
http://www.carterandcone.coml
unknown
http://hostname.domain.tld/
unknown
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.namecheap.com/domains/registration/results/?domain=brothedboil.com
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://img.sedoparking.com/templates/images/hero_nc.svg
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://browsehappy.com/
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
carliente.com
217.160.0.111
malicious
www.heldhold.life
203.161.46.103
malicious
tavernadoheroi.store
162.240.81.18
malicious
www.a-two-spa-salon.com
157.7.107.63
malicious
www.paydayloans3.shop
64.190.62.22
malicious
levelstep.online
31.186.11.254
malicious
td-ccm-neg-87-45.wixdns.net
34.149.87.45
malicious
www.kansaiwoody.com
118.27.122.214
malicious
www.jthzbrdb.fun
80.240.20.220
malicious
www.tavernadoheroi.store
unknown
malicious
www.ordinarythoughts.org
unknown
malicious
www.brothedboil.com
unknown
malicious
www.mervadohome.com
unknown
malicious
www.tondex.finance
unknown
malicious
www.levelstep.online
unknown
malicious
www.corvidemporium.com
unknown
malicious
www.alpine3dcreations.com
unknown
malicious
www.carliente.com
unknown
malicious
parkingpage.namecheap.com
91.195.240.19
www.mz3fk6g3.sbs
172.217.16.36
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.240.81.18
tavernadoheroi.store
United States
malicious
157.7.107.63
www.a-two-spa-salon.com
Japan
malicious
217.160.0.111
carliente.com
Germany
malicious
80.240.20.220
www.jthzbrdb.fun
Germany
malicious
64.190.62.22
www.paydayloans3.shop
United States
malicious
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
malicious
203.161.46.103
www.heldhold.life
Malaysia
malicious
118.27.122.214
www.kansaiwoody.com
Japan
malicious
31.186.11.254
levelstep.online
Turkey
malicious
172.217.16.36
www.mz3fk6g3.sbs
United States
91.195.240.19
parkingpage.namecheap.com
Germany
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
46C0000
trusted library allocation
page read and write
malicious
3B00000
unkown
page execute and read and write
malicious
5AD0000
trusted library section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5770000
system
page execute and read and write
malicious
4700000
trusted library allocation
page read and write
malicious
2530000
unclassified section
page execute and read and write
malicious
2790000
system
page execute and read and write
malicious
1A80000
unclassified section
page execute and read and write
malicious
43A9000
trusted library allocation
page read and write
malicious
DCC000
stack
page read and write
2CA9ABC4000
trusted library allocation
page read and write
1420000
unkown
page readonly
1210000
unkown
page readonly
5862000
trusted library allocation
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
14F0000
heap
page read and write
116E000
stack
page read and write
191F000
stack
page read and write
5870000
trusted library allocation
page execute and read and write
4501000
heap
page read and write
2F6F000
stack
page read and write
E40000
unkown
page readonly
F40000
unkown
page readonly
2A9F000
stack
page read and write
2AF9000
heap
page read and write
1960000
unkown
page readonly
2CA9ABB0000
trusted library allocation
page read and write
2CA98F50000
heap
page read and write
46D8000
unkown
page read and write
2AEE000
heap
page read and write
1361000
unkown
page readonly
149F000
stack
page read and write
4501000
heap
page read and write
30C0000
trusted library allocation
page read and write
2CA9AA03000
trusted library allocation
page read and write
FE0000
unkown
page read and write
2CA9AA0A000
trusted library allocation
page read and write
B87000
unkown
page readonly
E50000
unkown
page readonly
39F1000
unclassified section
page execute and read and write
4501000
heap
page read and write
1440000
heap
page read and write
17DA000
trusted library allocation
page execute and read and write
4501000
heap
page read and write
7D5E000
stack
page read and write
2584000
unclassified section
page execute and read and write
4501000
heap
page read and write
499D000
direct allocation
page execute and read and write
141E000
stack
page read and write
3BDA000
unkown
page read and write
4501000
heap
page read and write
7BBB000
heap
page read and write
2F70000
unkown
page readonly
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
11D0000
heap
page read and write
2FF1000
unclassified section
page execute and read and write
4501000
heap
page read and write
2B9E000
heap
page read and write
2CA98E40000
system
page execute and read and write
1400000
heap
page read and write
5BA0000
trusted library allocation
page execute and read and write
7AE3000
heap
page read and write
4FC1000
unkown
page execute and read and write
4501000
heap
page read and write
2CA99002000
heap
page read and write
1456000
heap
page read and write
3062000
unkown
page read and write
4BC0000
trusted library allocation
page execute and read and write
1545000
heap
page read and write
2E24000
heap
page read and write
4501000
heap
page read and write
333C000
unkown
page read and write
4501000
heap
page read and write
B85000
unkown
page read and write
314B000
stack
page read and write
339F000
stack
page read and write
FC0000
unkown
page read and write
1509000
heap
page read and write
7ABF000
stack
page read and write
1444000
heap
page read and write
2CA98FD7000
heap
page read and write
2CA98F10000
heap
page read and write
7BFE000
heap
page read and write
F60000
unkown
page readonly
1800000
heap
page read and write
646A000
unclassified section
page read and write
4501000
heap
page read and write
2CA9AA0E000
trusted library allocation
page read and write
2CA9AB00000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
7B6E000
stack
page read and write
145E000
stack
page read and write
E60000
unkown
page readonly
4501000
heap
page read and write
3010000
unkown
page readonly
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2AE8000
heap
page read and write
7C30000
trusted library allocation
page read and write
4D97000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
B70000
unkown
page readonly
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2E24000
heap
page read and write
1450000
heap
page read and write
1370000
unkown
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
16D0000
direct allocation
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2AF3000
heap
page read and write
B7E000
unkown
page readonly
F60000
unkown
page readonly
1509000
unkown
page read and write
3010000
unkown
page readonly
5C60000
heap
page read and write
2CA9A880000
trusted library allocation
page read and write
63FE000
heap
page read and write
63D0000
heap
page read and write
43A1000
trusted library allocation
page read and write
2CA98E69000
system
page execute and read and write
B85000
unkown
page read and write
1A78000
direct allocation
page execute and read and write
17C3000
trusted library allocation
page read and write
485D000
stack
page read and write
B85000
unkown
page read and write
2A10000
heap
page read and write
4999000
direct allocation
page execute and read and write
4501000
heap
page read and write
4501000
heap
page read and write
2F00000
heap
page read and write
4546000
unkown
page read and write
B7E000
unkown
page readonly
B85000
unkown
page read and write
54B6000
unclassified section
page read and write
4501000
heap
page read and write
1220000
unkown
page readonly
58F0000
trusted library section
page readonly
B70000
unkown
page readonly
27E0000
heap
page read and write
2AF3000
heap
page read and write
333C000
unkown
page read and write
2AE8000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2B56000
heap
page read and write
3290000
heap
page read and write
4501000
heap
page read and write
1810000
heap
page read and write
2AEA000
heap
page read and write
47EB000
heap
page read and write
B71000
unkown
page execute read
4501000
heap
page read and write
3100000
unkown
page execute and read and write
324B000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
2B85000
heap
page read and write
2CA9AA10000
trusted library allocation
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
DB0E000
stack
page read and write
7BD4000
heap
page read and write
11B0000
heap
page read and write
4501000
heap
page read and write
2F70000
unkown
page readonly
3266000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
4870000
direct allocation
page execute and read and write
1460000
unkown
page read and write
7BB6000
heap
page read and write
14D8000
heap
page read and write
1004000
unkown
page readonly
2CA98FEC000
heap
page read and write
2CA9A900000
trusted library allocation
page read and write
2B71000
heap
page read and write
1517000
heap
page read and write
4501000
heap
page read and write
14D0000
heap
page read and write
F70000
heap
page read and write
3244000
trusted library allocation
page read and write
4507000
heap
page read and write
2B49000
heap
page read and write
2AF3000
heap
page read and write
4501000
heap
page read and write
14FE000
heap
page read and write
4501000
heap
page read and write
1A60000
unkown
page readonly
D6DF5FF000
stack
page read and write
7BE5000
heap
page read and write
5C30000
trusted library section
page read and write
2CA98E66000
system
page execute and read and write
2AEF000
heap
page read and write
D74E000
stack
page read and write
E50000
unkown
page readonly
4501000
heap
page read and write
2CA9AA12000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
17D2000
trusted library allocation
page read and write
12FC000
stack
page read and write
2AEA000
heap
page read and write
74E2000
trusted library allocation
page read and write
4501000
heap
page read and write
2CA98FD0000
heap
page read and write
1807000
heap
page read and write
7AC0000
heap
page read and write
7BEA000
heap
page read and write
B7E000
unkown
page readonly
4501000
heap
page read and write
74C0000
trusted library allocation
page read and write
19FD000
direct allocation
page execute and read and write
2CA98FFB000
heap
page read and write
47E0000
trusted library allocation
page read and write
13D0000
heap
page read and write
4501000
heap
page read and write
17CD000
trusted library allocation
page execute and read and write
5B90000
trusted library allocation
page read and write
58EB000
stack
page read and write
EA0000
unkown
page readonly
4C10000
trusted library allocation
page read and write
4501000
heap
page read and write
2AF3000
heap
page read and write
1B30000
unclassified section
page execute and read and write
326D000
trusted library allocation
page read and write
5BB0000
heap
page read and write
2AF9000
heap
page read and write
1390000
heap
page read and write
5AFE000
unclassified section
page read and write
2B2F000
heap
page read and write
4501000
heap
page read and write
D6DDDFC000
stack
page read and write
4501000
heap
page read and write
2CA9AA17000
trusted library allocation
page read and write
4501000
heap
page read and write
D70E000
stack
page read and write
4501000
heap
page read and write
57DA000
system
page execute and read and write
15A7000
heap
page read and write
1350000
unkown
page read and write
FE0000
unkown
page read and write
FC0000
unkown
page read and write
3190000
heap
page execute and read and write
4501000
heap
page read and write
B7E000
unkown
page readonly
2B2E000
heap
page read and write
1230000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
7C2E000
stack
page read and write
2E20000
heap
page read and write
57CE000
system
page execute and read and write
DA0E000
stack
page read and write
2CA9ABCE000
trusted library allocation
page read and write
12F0000
heap
page read and write
D6DE5FE000
stack
page read and write
B87000
unkown
page readonly
4501000
heap
page read and write
4501000
heap
page read and write
2AD7000
heap
page read and write
15CE000
stack
page read and write
5E22000
unclassified section
page read and write
4501000
heap
page read and write
7BEE000
heap
page read and write
FBE000
stack
page read and write
F50000
unkown
page readonly
2E20000
heap
page read and write
4501000
heap
page read and write
2AA0000
heap
page read and write
B70000
unkown
page readonly
17D0000
trusted library allocation
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
317C000
unkown
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
27E4000
heap
page read and write
4501000
heap
page read and write
15D0000
unkown
page readonly
4501000
heap
page read and write
2D50000
heap
page read and write
16CF000
stack
page read and write
17A0000
trusted library allocation
page read and write
5A90000
heap
page read and write
588C000
unkown
page read and write
7BC0000
heap
page read and write
4501000
heap
page read and write
F40000
unkown
page readonly
4222000
unkown
page read and write
151D000
heap
page read and write
1197000
stack
page read and write
5E08000
trusted library allocation
page read and write
4501000
heap
page read and write
2758000
stack
page read and write
1350000
unkown
page read and write
1A60000
unkown
page readonly
5840000
heap
page read and write
4501000
heap
page read and write
11D0000
heap
page read and write
7BB1000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
190AC000
system
page read and write
57DA000
unclassified section
page read and write
2BA3000
heap
page read and write
5860000
trusted library allocation
page read and write
11AE000
stack
page read and write
11D8000
heap
page read and write
1120000
unkown
page read and write
2B3F000
heap
page read and write
5850000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2B98000
heap
page read and write
4501000
heap
page read and write
271B000
stack
page read and write
2D20000
heap
page read and write
4C62000
unclassified section
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
5DEE000
stack
page read and write
17B0000
trusted library allocation
page read and write
4501000
heap
page read and write
5C90000
unclassified section
page read and write
A640000
trusted library section
page read and write
43B4000
unkown
page read and write
F70000
heap
page read and write
4B3D000
direct allocation
page execute and read and write
4501000
heap
page read and write
549C000
stack
page read and write
14DE000
heap
page read and write
14D0000
heap
page read and write
1450000
heap
page read and write
47E0000
trusted library allocation
page read and write
2B42000
heap
page read and write
1515000
heap
page read and write
4501000
heap
page read and write
2B4C000
heap
page read and write
3180000
trusted library allocation
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
27E4000
heap
page read and write
47E7000
heap
page read and write
2B34000
heap
page read and write
3EFE000
unkown
page read and write
E60000
unkown
page readonly
4501000
heap
page read and write
4501000
heap
page read and write
2CA99000000
heap
page read and write
462A000
heap
page read and write
4501000
heap
page read and write
3280000
trusted library allocation
page read and write
2AF3000
heap
page read and write
179E000
stack
page read and write
2AF3000
heap
page read and write
7BC8000
heap
page read and write
4501000
heap
page read and write
10FA000
stack
page read and write
5853000
heap
page read and write
4501000
heap
page read and write
1370000
unkown
page read and write
4501000
heap
page read and write
2AD0000
heap
page read and write
363B000
trusted library allocation
page read and write
4501000
heap
page read and write
2B3F000
heap
page read and write
1470000
unkown
page read and write
2BA9000
heap
page read and write
14FA000
heap
page read and write
14D0000
heap
page read and write
3170000
trusted library allocation
page read and write
598C000
unkown
page read and write
D90E000
stack
page read and write
6146000
unclassified section
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
486A000
unkown
page read and write
4501000
heap
page read and write
7BF4000
heap
page read and write
4501000
heap
page read and write
149E000
stack
page read and write
4501000
heap
page read and write
1460000
unkown
page read and write
4501000
heap
page read and write
3122000
unkown
page read and write
78B0000
trusted library allocation
page read and write
4501000
heap
page read and write
7BDE000
heap
page read and write
4501000
heap
page read and write
15D0000
unkown
page readonly
14D8000
heap
page read and write
5E00000
trusted library allocation
page read and write
3BC1000
unkown
page execute and read and write
4501000
heap
page read and write
2CA9ABBE000
trusted library allocation
page read and write
57BE000
system
page execute and read and write
4501000
heap
page read and write
5AC0000
trusted library allocation
page execute and read and write
B70000
unkown
page readonly
4501000
heap
page read and write
4501000
heap
page read and write
19E1000
direct allocation
page execute and read and write
4501000
heap
page read and write
7BA8000
heap
page read and write
17B4000
trusted library allocation
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2F00000
heap
page read and write
2CA9AA21000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
17E7000
trusted library allocation
page execute and read and write
31A8000
trusted library allocation
page read and write
14D8000
heap
page read and write
17C0000
trusted library allocation
page read and write
63C0000
heap
page read and write
4501000
heap
page read and write
5C40000
trusted library allocation
page read and write
B87000
unkown
page readonly
4501000
heap
page read and write
1859000
direct allocation
page execute and read and write
134E000
stack
page read and write
4501000
heap
page read and write
16CF000
stack
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2BBA000
heap
page read and write
7CB0000
trusted library allocation
page read and write
2B34000
heap
page read and write
1220000
unkown
page readonly
1230000
heap
page read and write
1410000
heap
page read and write
14D8000
heap
page read and write
5B80000
trusted library allocation
page read and write
19494000
system
page read and write
FCC000
stack
page read and write
4501000
heap
page read and write
17B3000
trusted library allocation
page execute and read and write
4D22000
unclassified section
page read and write
78C0000
heap
page read and write
E90000
unkown
page readonly
16CF000
stack
page read and write
11FE000
heap
page read and write
4A0E000
direct allocation
page execute and read and write
E40000
unkown
page readonly
16D0000
unkown
page readonly
109A000
stack
page read and write
17BD000
trusted library allocation
page execute and read and write
1480000
unkown
page read and write
4501000
heap
page read and write
3261000
trusted library allocation
page read and write
4501000
heap
page read and write
17E0000
trusted library allocation
page read and write
16D0000
unkown
page readonly
F50000
unkown
page readonly
1200000
unkown
page readonly
2CA98F00000
heap
page read and write
2B6E000
heap
page read and write
35A8000
trusted library allocation
page read and write
1444000
heap
page read and write
4CAC000
trusted library allocation
page read and write
4501000
heap
page read and write
310E000
stack
page read and write
1960000
unkown
page readonly
1120000
heap
page read and write
7BC5000
heap
page read and write
4501000
heap
page read and write
ECA000
stack
page read and write
3285000
trusted library allocation
page read and write
4501000
heap
page read and write
185D000
direct allocation
page execute and read and write
4501000
heap
page read and write
1420000
unkown
page readonly
2CA9AA00000
trusted library allocation
page read and write
5DAE000
stack
page read and write
2B44000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
57B5000
system
page execute and read and write
4501000
heap
page read and write
27E4000
heap
page read and write
4501000
heap
page read and write
5D6D000
stack
page read and write
4501000
heap
page read and write
4607000
heap
page read and write
2B4C000
heap
page read and write
5AF0000
heap
page execute and read and write
4501000
heap
page read and write
F52000
unkown
page readonly
2CA9A880000
trusted library allocation
page read and write
2B49000
heap
page read and write
5DF0000
trusted library allocation
page execute and read and write
4BB2000
direct allocation
page execute and read and write
FF0000
heap
page read and write
14D0000
heap
page read and write
7EE30000
trusted library allocation
page execute and read and write
12FC000
stack
page read and write
4740000
trusted library allocation
page read and write
14A0000
unkown
page readonly
14C0000
unkown
page read and write
FBE000
stack
page read and write
EA0000
unkown
page readonly
5FB4000
unclassified section
page read and write
7ADA000
heap
page read and write
F0A000
stack
page read and write
25F1000
unclassified section
page execute and read and write
4501000
heap
page read and write
1593000
heap
page read and write
57E0000
trusted library allocation
page read and write
3062000
unkown
page read and write
3D6C000
unkown
page read and write
4501000
heap
page read and write
7E50000
heap
page read and write
7C50000
trusted library allocation
page execute and read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
B71000
unkown
page execute read
14F7000
heap
page read and write
5830000
system
page execute and read and write
5324000
unclassified section
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
14A0000
unkown
page readonly
1440000
heap
page read and write
18E92000
system
page read and write
2A5F000
stack
page read and write
4D7C000
unclassified section
page read and write
46BE000
heap
page read and write
831F000
stack
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
62D8000
unclassified section
page read and write
2B8F000
heap
page read and write
17E2000
trusted library allocation
page read and write
4501000
heap
page read and write
2B56000
heap
page read and write
4501000
heap
page read and write
17D6000
trusted library allocation
page execute and read and write
FD1000
unkown
page readonly
1210000
unkown
page readonly
F50000
unkown
page readonly
485C000
heap
page read and write
1390000
heap
page read and write
E80000
unkown
page readonly
F0A000
stack
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
1361000
unkown
page readonly
14EC000
unkown
page read and write
38B6000
unkown
page read and write
4600000
trusted library allocation
page read and write
4500000
heap
page read and write
14D8000
heap
page read and write
596C000
unclassified section
page read and write
4501000
heap
page read and write
45C1000
unkown
page execute and read and write
4501000
heap
page read and write
2DAE000
stack
page read and write
FCC000
stack
page read and write
2CA98F60000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
18DD2000
system
page read and write
4501000
heap
page read and write
2AF9000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2B61000
heap
page read and write
82DE000
stack
page read and write
2CA9AB01000
trusted library allocation
page read and write
4501000
heap
page read and write
4F3C000
unclassified section
page read and write
358F000
trusted library allocation
page read and write
B71000
unkown
page execute read
5AA0000
heap
page read and write
4501000
heap
page read and write
3B54000
unkown
page execute and read and write
B71000
unkown
page execute read
5800000
trusted library allocation
page read and write
4501000
heap
page read and write
3150000
trusted library allocation
page execute and read and write
14C0000
unkown
page read and write
FF0000
heap
page read and write
4501000
heap
page read and write
4090000
unkown
page read and write
4501000
heap
page read and write
1730000
direct allocation
page execute and read and write
3240000
trusted library allocation
page read and write
4501000
heap
page read and write
E90000
unkown
page readonly
1B20000
heap
page read and write
4501000
heap
page read and write
2B78000
heap
page read and write
1200000
unkown
page readonly
ECA000
stack
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
2AEE000
heap
page read and write
17EB000
trusted library allocation
page execute and read and write
7BB0000
heap
page read and write
7EAE000
stack
page read and write
3724000
unkown
page read and write
1505000
heap
page read and write
E80000
unkown
page readonly
5BB5000
heap
page read and write
4501000
heap
page read and write
4B41000
direct allocation
page execute and read and write
14D0000
heap
page read and write
4501000
heap
page read and write
D6DEDFE000
stack
page read and write
47E0000
trusted library allocation
page read and write
2B5C000
heap
page read and write
B87000
unkown
page readonly
2B42000
heap
page read and write
18CE000
direct allocation
page execute and read and write
FD1000
unkown
page readonly
DC0E000
stack
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
4C5E000
trusted library allocation
page read and write
2B44000
heap
page read and write
19F6000
direct allocation
page execute and read and write
300F000
stack
page read and write
4501000
heap
page read and write
4501000
heap
page read and write
6410000
heap
page read and write
There are 636 hidden memdumps, click here to show them.