IOC Report
SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\F56GKLK7U4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\aut6E13.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut6E72.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cerecloths
data
dropped
C:\Users\user\AppData\Local\Temp\windigos
ASCII text, with very long lines (28714), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.12126.13851.exe"
malicious
C:\Program Files (x86)\iZsZrHSpCPcKUZaSYkKQgChuOiRBiyMdarZuyfLyjSJRJrbxCCb\lXlvzubPaBLtjusO.exe
"C:\Program Files (x86)\iZsZrHSpCPcKUZaSYkKQgChuOiRBiyMdarZuyfLyjSJRJrbxCCb\lXlvzubPaBLtjusO.exe"
malicious
C:\Windows\SysWOW64\netbtugc.exe
"C:\Windows\SysWOW64\netbtugc.exe"
malicious
C:\Program Files (x86)\iZsZrHSpCPcKUZaSYkKQgChuOiRBiyMdarZuyfLyjSJRJrbxCCb\lXlvzubPaBLtjusO.exe
"C:\Program Files (x86)\iZsZrHSpCPcKUZaSYkKQgChuOiRBiyMdarZuyfLyjSJRJrbxCCb\lXlvzubPaBLtjusO.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
https://duckduckgo.com/ac/?q=
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
http://www.magmadokum.com/fo8o/?VVq=lF_H&bD=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjNWAySNtnq/EMXCTP7S4oEh8mb9sAZyquFiTVTuU6HpMKOeASrGw=
85.159.66.93
http://www.empowermedeco.com/fo8o/
217.196.55.202
http://www.kasegitai.tokyo/fo8o/?bD=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8ssmc93kihOWHWb8NTA0vbQpCHGBmxgdm5sPEbG1Wvor0LSPPjnI=&VVq=lF_H
202.172.28.202
http://www.donnavariedades.com/fo8o/?bD=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pCTG1dl0n9Zx5sBovXqlibLG+oTQgCZHMA1AF4xfdSZkJv4XAGCI=&VVq=lF_H
23.227.38.74
http://img.sedoparking.com
unknown
https://track.uc.cn/collect
unknown
https://www.goldenjade-travel.com/fo8o/?VVq=lF_H&bD=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9b
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.empowermedeco.com/fo8o/?bD=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKYS1O+KnDGu0Ee7a9fQq7JRnHJ6pn6i4sEdb7G20jo8euDHkgubc=&VVq=lF_H
217.196.55.202
http://www.660danm.top/fo8o/
34.111.148.214
http://www.magmadokum.com/fo8o/
85.159.66.93
https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
unknown
https://www.shopify.com/admin/settings/domains
unknown
https://cdn.shopify.com/s/files/1/0458/4836/3030/files/ShopifySans-Medium.woff2?v=1674610916
unknown
https://musee.mobi/vivaldi/fo8o/?bD=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD
unknown
http://www.rssnewscast.com/fo8o/
91.195.240.94
https://accounts.shopify.com/rec
unknown
http://www.antonio-vivaldi.mobi/fo8o/?bD=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6Za05B0b8lb0SJyq2CvxKSeitE8AGVnlTlldZE82pgolkPyTnRDO8=&VVq=lF_H
46.30.213.191
http://www.elettrosistemista.zip/fo8o/?VVq=lF_H&bD=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMMgl3a4mkxzPbkN9BQKjpJMF6ezHcknvvvjzNmyPcHDwhODu1wVk=
195.110.124.133
http://www.kasegitai.tokyo/fo8o/
202.172.28.202
https://hm.baidu.com/hm.js?
unknown
https://musee.mobi/vivaldi/fo8o/?bD=PTl5gU/3CD/Xhg5Nd1HWi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
http://www.goldenjade-travel.com/fo8o/
116.50.37.244
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.antonio-vivaldi.mobi/fo8o/
46.30.213.191
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.elettrosistemista.zip/fo8o/
195.110.124.133
http://www.empowermedeco.com
unknown
https://www.ecosia.org/newtab/
unknown
http://www.donnavariedades.com/fo8o/
23.227.38.74
http://www.goldenjade-travel.com/fo8o/?VVq=lF_H&bD=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFxgszkgIsi8wfa6/CPqkeX1kME9DjI2TvouO65OvKk6Nl8OEvQ/8=
116.50.37.244
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://codepen.io/uzcho_/pens/popular/?grid_type=list
unknown
https://codepen.io/uzcho_/pen/eYdmdXw.css
unknown
https://www.goldenjade-travel.com/fo8o/?VVq=lF_H&bD=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr
unknown
http://www.rssnewscast.com/fo8o/?bD=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNp7YHjVi2aBezyBUOenUja13YBEIShwN33HoHbXtrY+oqbh1getk=&VVq=lF_H
91.195.240.94
https://cdn.shopify.com/s/files/1/0458/4836/3030/files/ShopifySans-Regular.woff2?v=1674610915
unknown
https://www.empowermedeco.com/fo8o/?bD=mxnR
unknown
http://www.660danm.top/fo8o/?VVq=lF_H&bD=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrJNroXeq/Q4lVX4E9J28Ip9JfR0m5D5TtgLDY+NMsBNkqmJUMcRE=
34.111.148.214
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.techchains.info/fo8o/
66.29.149.46
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.joyesi.xyz
185.237.107.49
malicious
www.magmadokum.com
unknown
malicious
www.donnavariedades.com
unknown
malicious
www.liangyuen528.com
unknown
malicious
www.empowermedeco.com
unknown
malicious
www.elettrosistemista.zip
unknown
malicious
elettrosistemista.zip
195.110.124.133
www.660danm.top
34.111.148.214
empowermedeco.com
217.196.55.202
www.3xfootball.com
154.215.72.110
www.antonio-vivaldi.mobi
46.30.213.191
www.goldenjade-travel.com
116.50.37.244
www.rssnewscast.com
91.195.240.94
www.techchains.info
66.29.149.46
shops.myshopify.com
23.227.38.74
natroredirect.natrocdn.com
85.159.66.93
www.kasegitai.tokyo
202.172.28.202
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.237.107.49
www.joyesi.xyz
Ukraine
malicious
91.195.240.94
www.rssnewscast.com
Germany
154.215.72.110
www.3xfootball.com
Seychelles
195.110.124.133
elettrosistemista.zip
Italy
34.111.148.214
www.660danm.top
United States
116.50.37.244
www.goldenjade-travel.com
Taiwan; Republic of China (ROC)
23.227.38.74
shops.myshopify.com
Canada
85.159.66.93
natroredirect.natrocdn.com
Turkey
202.172.28.202
www.kasegitai.tokyo
Japan
46.30.213.191
www.antonio-vivaldi.mobi
Denmark
66.29.149.46
www.techchains.info
United States
217.196.55.202
empowermedeco.com
Norway
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6E00000
unclassified section
page execute and read and write
malicious
34C0000
unclassified section
page execute and read and write
malicious
5BB0000
unkown
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
3360000
trusted library allocation
page read and write
malicious
3040000
trusted library allocation
page read and write
malicious
C20000
system
page execute and read and write
malicious
E4E000
unkown
page readonly
26BC59C4000
trusted library allocation
page read and write
422E000
direct allocation
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
2E13000
heap
page read and write
D60000
heap
page read and write
7E82000
heap
page read and write
3F40000
direct allocation
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
13DB000
stack
page read and write
770000
heap
page read and write
38D2000
unkown
page read and write
E55000
unkown
page read and write
7D9000
unkown
page read and write
26BC580A000
trusted library allocation
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
169A000
heap
page read and write
CE0000
unkown
page read and write
4209000
direct allocation
page read and write
3261000
heap
page read and write
BD0000
heap
page read and write
3F40000
direct allocation
page read and write
920000
unkown
page readonly
42F8000
unclassified section
page read and write
3261000
heap
page read and write
C40000
unkown
page read and write
9EF000
unkown
page readonly
3261000
heap
page read and write
3891000
direct allocation
page execute and read and write
DBA000
stack
page read and write
BD8000
heap
page read and write
511A000
unclassified section
page read and write
2E13000
heap
page read and write
26BC5650000
trusted library allocation
page read and write
1706000
heap
page read and write
CF0000
heap
page read and write
6A0000
unkown
page readonly
3261000
heap
page read and write
26BC59BE000
trusted library allocation
page read and write
750000
unkown
page readonly
3261000
heap
page read and write
2E13000
heap
page read and write
3F1A000
unkown
page read and write
1680000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3176000
heap
page read and write
359E000
stack
page read and write
D3E000
stack
page read and write
33B0000
unkown
page execute and read and write
3261000
heap
page read and write
26BC5630000
heap
page read and write
9B1000
unkown
page readonly
3419000
heap
page read and write
310D000
heap
page read and write
9E0000
unkown
page readonly
3090000
heap
page read and write
3261000
heap
page read and write
7EC5000
heap
page read and write
3A2C000
unclassified section
page read and write
D30000
heap
page read and write
47AE000
unclassified section
page read and write
313B000
heap
page read and write
3129000
heap
page read and write
3261000
heap
page read and write
5A00000
unclassified section
page execute and read and write
26BC3D62000
heap
page read and write
34C0000
direct allocation
page read and write
2CA0000
heap
page read and write
4E7F000
system
page execute and read and write
8FC000
stack
page read and write
3261000
heap
page read and write
961000
unkown
page execute read
359E000
heap
page read and write
3114000
heap
page read and write
4013000
direct allocation
page read and write
3261000
heap
page read and write
29EC000
unkown
page read and write
2E13000
heap
page read and write
E57000
unkown
page readonly
3912000
unclassified section
page read and write
34E0000
trusted library allocation
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
6460000
trusted library allocation
page read and write
3100000
heap
page read and write
3261000
heap
page read and write
28B0000
heap
page read and write
3261000
heap
page read and write
3D88000
unkown
page read and write
3261000
heap
page read and write
560000
unkown
page readonly
3261000
heap
page read and write
2E13000
heap
page read and write
1672000
heap
page read and write
2DD0000
heap
page read and write
A1F000
unkown
page write copy
950000
heap
page read and write
3261000
heap
page read and write
3121000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
D64000
heap
page read and write
D1F000
stack
page read and write
310A000
heap
page read and write
26BC3D10000
heap
page read and write
3EF0000
direct allocation
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
7E96000
heap
page read and write
35AE000
unkown
page read and write
7EF5000
heap
page read and write
16F6000
heap
page read and write
3144000
heap
page read and write
7ECF000
heap
page read and write
CF4000
heap
page read and write
560000
unkown
page readonly
5F0F000
unkown
page execute and read and write
3261000
heap
page read and write
7F07000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
422E000
direct allocation
page read and write
950000
heap
page read and write
3261000
heap
page read and write
16BF000
heap
page read and write
4EF2000
system
page execute and read and write
8110000
heap
page read and write
3151000
heap
page read and write
352D000
heap
page read and write
4E8F000
system
page execute and read and write
26BC5700000
trusted library allocation
page read and write
1652000
heap
page read and write
CE0000
unkown
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
26BC3D62000
heap
page read and write
7C0000
unkown
page read and write
5EA000
stack
page read and write
3261000
heap
page read and write
D64000
heap
page read and write
E30000
heap
page read and write
167A000
heap
page read and write
AFC000
stack
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
4013000
direct allocation
page read and write
D40000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
1663000
heap
page read and write
E41000
unkown
page execute read
9B1000
unkown
page readonly
16BF000
heap
page read and write
3261000
heap
page read and write
4600000
unclassified section
page execute and read and write
4063000
direct allocation
page read and write
2712000
unkown
page read and write
1654000
heap
page read and write
B4F81FE000
stack
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
26BC59CE000
trusted library allocation
page read and write
36ED000
direct allocation
page execute and read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
BD8000
heap
page read and write
3261000
heap
page read and write
26BC5814000
trusted library allocation
page read and write
F6F000
stack
page read and write
3529000
heap
page read and write
3C32000
system
page read and write
36E9000
direct allocation
page execute and read and write
3261000
heap
page read and write
3268000
heap
page read and write
3261000
heap
page read and write
1654000
heap
page read and write
3261000
heap
page read and write
9A0000
unkown
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3179000
heap
page read and write
7E0000
unkown
page read and write
39D2000
unclassified section
page read and write
3261000
heap
page read and write
570000
unkown
page readonly
3005000
heap
page read and write
4090000
direct allocation
page read and write
379E000
direct allocation
page execute and read and write
1654000
heap
page read and write
26BC5650000
trusted library allocation
page read and write
3261000
heap
page read and write
5EA000
stack
page read and write
4AD2000
unclassified section
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
310D000
heap
page read and write
7EBF000
heap
page read and write
38CD000
direct allocation
page execute and read and write
3261000
heap
page read and write
740000
unkown
page readonly
E55000
unkown
page read and write
3261000
heap
page read and write
28B0000
heap
page read and write
2CF0000
heap
page read and write
7F05000
heap
page read and write
3BEC000
unclassified section
page read and write
4209000
direct allocation
page read and write
3261000
heap
page read and write
4166000
unclassified section
page read and write
1614000
heap
page read and write
3480000
direct allocation
page read and write
7E0000
unkown
page read and write
BEF000
heap
page read and write
E41000
unkown
page execute read
3261000
heap
page read and write
7EC9000
heap
page read and write
26BC5620000
heap
page read and write
E55000
unkown
page read and write
1E1F000
stack
page read and write
35B7000
heap
page read and write
3134000
heap
page read and write
2E13000
heap
page read and write
16D7000
heap
page read and write
3261000
heap
page read and write
BCF000
stack
page read and write
3261000
heap
page read and write
30A7000
heap
page read and write
169A000
heap
page read and write
C90000
heap
page read and write
1706000
heap
page read and write
7EAD000
heap
page read and write
309C000
heap
page read and write
347F000
stack
page read and write
461C000
unclassified section
page read and write
3166000
heap
page read and write
1664000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
30A7000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
6400000
unclassified section
page execute and read and write
3261000
heap
page read and write
3261000
heap
page read and write
3EF0000
direct allocation
page read and write
E40000
unkown
page readonly
3261000
heap
page read and write
960000
unkown
page readonly
3261000
heap
page read and write
270F000
stack
page read and write
7EA5000
heap
page read and write
CDE000
stack
page read and write
3261000
heap
page read and write
BD0000
heap
page read and write
355E000
stack
page read and write
3261000
heap
page read and write
282C000
unkown
page read and write
3261000
heap
page read and write
422E000
direct allocation
page read and write
3323000
heap
page read and write
C78000
heap
page read and write
16BF000
heap
page read and write
3261000
heap
page read and write
310A000
heap
page read and write
3261000
heap
page read and write
3EF0000
direct allocation
page read and write
316C000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
E41000
unkown
page execute read
3261000
heap
page read and write
BCF000
stack
page read and write
A28000
unkown
page readonly
313E000
heap
page read and write
99E000
stack
page read and write
1620000
heap
page read and write
16BF000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
4209000
direct allocation
page read and write
3261000
heap
page read and write
4F8C000
unkown
page read and write
3261000
heap
page read and write
3942000
direct allocation
page execute and read and write
CF4000
heap
page read and write
41B9000
direct allocation
page read and write
41B9000
direct allocation
page read and write
7EE3000
heap
page read and write
3A64000
unkown
page read and write
3261000
heap
page read and write
B4F91FE000
stack
page read and write
3261000
heap
page read and write
920000
unkown
page readonly
3261000
heap
page read and write
30A3000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
26BC3BE0000
system
page execute and read and write
680000
unkown
page readonly
3098000
heap
page read and write
309E000
heap
page read and write
E40000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
E40000
unkown
page readonly
4090000
direct allocation
page read and write
35C0000
direct allocation
page execute and read and write
4E9E000
system
page execute and read and write
F70000
unkown
page readonly
940000
unkown
page readonly
29B0000
unkown
page execute and read and write
1674000
heap
page read and write
E4E000
unkown
page readonly
3261000
heap
page read and write
70A000
stack
page read and write
4E77000
system
page execute and read and write
770000
heap
page read and write
C20000
unkown
page readonly
30BB000
heap
page read and write
13BE000
stack
page read and write
169A000
heap
page read and write
E30000
heap
page read and write
26BC5810000
trusted library allocation
page read and write
2E13000
heap
page read and write
7EAF000
heap
page read and write
3261000
heap
page read and write
26BC3D4C000
heap
page read and write
26BC5800000
trusted library allocation
page read and write
3261000
heap
page read and write
3121000
heap
page read and write
C40000
unkown
page read and write
7E93000
heap
page read and write
2E13000
heap
page read and write
34E0000
trusted library allocation
page read and write
28C0000
unkown
page readonly
41BD000
direct allocation
page read and write
3261000
heap
page read and write
4013000
direct allocation
page read and write
4F88000
unclassified section
page read and write
1663000
heap
page read and write
3261000
heap
page read and write
3012000
heap
page read and write
3017000
heap
page read and write
3261000
heap
page read and write
47B0000
unkown
page execute and read and write
26BC3C77000
system
page execute and read and write
940000
unkown
page readonly
3261000
heap
page read and write
3005000
heap
page read and write
2E13000
heap
page read and write
7EA0000
heap
page read and write
930000
unkown
page readonly
3261000
heap
page read and write
3017000
heap
page read and write
A28000
unkown
page readonly
3200000
direct allocation
page read and write
3546000
heap
page read and write
A23000
unkown
page write copy
169A000
heap
page read and write
961000
unkown
page execute read
323E000
stack
page read and write
3261000
heap
page read and write
15C0000
heap
page read and write
26BC580E000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
34C0000
direct allocation
page read and write
26BC3D60000
heap
page read and write
B4F79FC000
stack
page read and write
3FD4000
unclassified section
page read and write
3261000
heap
page read and write
7EA8000
heap
page read and write
930000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
337E000
stack
page read and write
3261000
heap
page read and write
E57000
unkown
page readonly
5000000
unclassified section
page execute and read and write
3261000
heap
page read and write
E70000
unkown
page readonly
3261000
heap
page read and write
760000
unkown
page readonly
3261000
heap
page read and write
7D1000
unkown
page readonly
309C000
heap
page read and write
169B000
heap
page read and write
3260000
heap
page read and write
2E02000
heap
page read and write
2F66000
unkown
page read and write
3171000
heap
page read and write
312D000
heap
page read and write
16C6000
heap
page read and write
29EC000
unkown
page read and write
420D000
direct allocation
page read and write
28B4000
heap
page read and write
27D2000
unkown
page read and write
5EA1000
unkown
page execute and read and write
16BF000
heap
page read and write
448A000
unclassified section
page read and write
8FC000
stack
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
D20000
heap
page read and write
3261000
heap
page read and write
3B72000
system
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
4063000
direct allocation
page read and write
420D000
direct allocation
page read and write
3261000
heap
page read and write
16C6000
heap
page read and write
3261000
heap
page read and write
7D1000
unkown
page readonly
333E000
stack
page read and write
7EF2000
heap
page read and write
26BC3D37000
heap
page read and write
30FB000
heap
page read and write
3261000
heap
page read and write
26BC5821000
trusted library allocation
page read and write
1610000
heap
page read and write
3261000
heap
page read and write
1644000
heap
page read and write
30A7000
heap
page read and write
388D000
direct allocation
page execute and read and write
2DF0000
heap
page read and write
C1E000
stack
page read and write
427E000
direct allocation
page read and write
30AD000
heap
page read and write
16BF000
heap
page read and write
3261000
heap
page read and write
26BC5803000
trusted library allocation
page read and write
280F000
stack
page read and write
BE8000
stack
page read and write
3261000
heap
page read and write
B4F89FE000
stack
page read and write
9EF000
unkown
page readonly
2CC0000
heap
page read and write
26BC3E40000
heap
page read and write
1200000
unkown
page readonly
3261000
heap
page read and write
30A7000
heap
page read and write
3E70000
heap
page read and write
570000
unkown
page readonly
3261000
heap
page read and write
26BC59B4000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
16C6000
heap
page read and write
3261000
heap
page read and write
3A01000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
30A7000
heap
page read and write
3101000
heap
page read and write
6A0000
unkown
page readonly
9F0000
heap
page read and write
3261000
heap
page read and write
41BD000
direct allocation
page read and write
D64000
heap
page read and write
375E000
direct allocation
page execute and read and write
16BF000
heap
page read and write
3040000
trusted library allocation
page read and write
153E000
stack
page read and write
CF0000
heap
page read and write
3261000
heap
page read and write
4090000
direct allocation
page read and write
3261000
heap
page read and write
AFC000
stack
page read and write
4063000
direct allocation
page read and write
309E000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
70A000
stack
page read and write
301A000
heap
page read and write
1201000
unkown
page readonly
690000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
427E000
direct allocation
page read and write
427E000
direct allocation
page read and write
3261000
heap
page read and write
85EF000
stack
page read and write
E30000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
4C64000
unclassified section
page read and write
760000
unkown
page readonly
1420000
heap
page read and write
3261000
heap
page read and write
7BE000
stack
page read and write
13CE000
stack
page read and write
3261000
heap
page read and write
C20000
unkown
page readonly
3261000
heap
page read and write
E4E000
unkown
page readonly
508C000
unkown
page read and write
4DF6000
unclassified section
page read and write
4234000
system
page read and write
30F8000
unkown
page read and write
16D5000
heap
page read and write
85AE000
stack
page read and write
34E0000
trusted library allocation
page read and write
3261000
heap
page read and write
E57000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
1648000
heap
page read and write
34C0000
direct allocation
page read and write
1560000
heap
page read and write
3440000
trusted library allocation
page execute and read and write
51B0000
unkown
page execute and read and write
3261000
heap
page read and write
A1F000
unkown
page read and write
7EEB000
heap
page read and write
3261000
heap
page read and write
41B9000
direct allocation
page read and write
3261000
heap
page read and write
4E20000
system
page execute and read and write
E40000
unkown
page readonly
A15000
unkown
page readonly
1628000
heap
page read and write
4E9B000
system
page execute and read and write
3261000
heap
page read and write
580000
unkown
page readonly
1540000
heap
page read and write
3114000
heap
page read and write
9C0000
unkown
page read and write
3182000
heap
page read and write
715F000
unclassified section
page execute and read and write
A15000
unkown
page readonly
2E13000
heap
page read and write
9F0000
heap
page read and write
7F0000
heap
page read and write
C78000
heap
page read and write
E57000
unkown
page readonly
328A000
unkown
page read and write
40E0000
direct allocation
page read and write
3261000
heap
page read and write
1648000
heap
page read and write
3729000
direct allocation
page execute and read and write
3261000
heap
page read and write
3261000
heap
page read and write
960000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
40E0000
direct allocation
page read and write
740000
unkown
page readonly
2E13000
heap
page read and write
3261000
heap
page read and write
BFD000
heap
page read and write
372D000
direct allocation
page execute and read and write
3261000
heap
page read and write
2E13000
heap
page read and write
13FC000
stack
page read and write
C70000
heap
page read and write
3E90000
direct allocation
page execute and read and write
7F90000
trusted library allocation
page read and write
3261000
heap
page read and write
38D1000
direct allocation
page execute and read and write
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3020000
heap
page read and write
3261000
heap
page read and write
169A000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
7E9B000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
2E13000
heap
page read and write
420D000
direct allocation
page read and write
2E13000
heap
page read and write
7EF8000
heap
page read and write
1300000
unkown
page readonly
D40000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
3902000
direct allocation
page execute and read and write
690000
unkown
page readonly
3400000
heap
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
7EAA000
heap
page read and write
70F1000
unclassified section
page execute and read and write
3200000
heap
page read and write
26BC5901000
trusted library allocation
page read and write
580000
unkown
page readonly
169A000
heap
page read and write
30A8000
heap
page read and write
26BC3D5B000
heap
page read and write
28C0000
unkown
page readonly
16BF000
heap
page read and write
9E0000
unkown
page readonly
3261000
heap
page read and write
3261000
heap
page read and write
E55000
unkown
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
39BF000
stack
page read and write
341C000
unkown
page read and write
1301000
unkown
page readonly
3261000
heap
page read and write
26BC5900000
trusted library allocation
page read and write
4F40000
unkown
page read and write
3EA0000
direct allocation
page read and write
15AE000
stack
page read and write
28B4000
heap
page read and write
3261000
heap
page read and write
7EFE000
heap
page read and write
3261000
heap
page read and write
2DD4000
unkown
page read and write
680000
unkown
page readonly
26BC3D30000
heap
page read and write
9C0000
unkown
page read and write
30AD000
heap
page read and write
3BF6000
unkown
page read and write
3DB0000
unkown
page execute and read and write
3261000
heap
page read and write
2C3C000
stack
page read and write
3261000
heap
page read and write
3261000
heap
page read and write
2E13000
heap
page read and write
9A0000
unkown
page read and write
2C7A000
stack
page read and write
750000
unkown
page readonly
2E00000
heap
page read and write
E30000
heap
page read and write
99E000
stack
page read and write
2E13000
heap
page read and write
30EF000
heap
page read and write
3261000
heap
page read and write
BAB000
stack
page read and write
3600000
direct allocation
page execute and read and write
3261000
heap
page read and write
E70000
unkown
page readonly
3261000
heap
page read and write
41BD000
direct allocation
page read and write
16F6000
heap
page read and write
3261000
heap
page read and write
40E0000
direct allocation
page read and write
F70000
unkown
page readonly
3C00000
unclassified section
page execute and read and write
E4E000
unkown
page readonly
3261000
heap
page read and write
3F40000
direct allocation
page read and write
3261000
heap
page read and write
1706000
heap
page read and write
3261000
heap
page read and write
3000000
heap
page read and write
3E4C000
system
page read and write
338B000
heap
page read and write
C70000
heap
page read and write
3261000
heap
page read and write
3542000
heap
page read and write
2712000
unkown
page read and write
E41000
unkown
page execute read
3261000
heap
page read and write
7C0000
unkown
page read and write
7F0000
heap
page read and write
3261000
heap
page read and write
There are 679 hidden memdumps, click here to show them.