IOC Report
pYHrqNhFKr.exe

loading gif

Files

File Path
Type
Category
Malicious
pYHrqNhFKr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\l64fQ59.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\imYkV36.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\f7051zI.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\h99af07.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pYHrqNhFKr.exe
C:\Users\user\Desktop\pYHrqNhFKr.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6073.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba2214.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f7051zI.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h99af07.exe
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\

URLs

Name
IP
Malicious
193.233.20.28:4125
malicious
https://api.ip.sb/ip
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features
TamperProtection
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4BCC000
heap
page read and write
malicious
2BF0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2E50000
heap
page execute and read and write
4BDF000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
77B5000
trusted library allocation
page read and write
1250000
unkown
page readonly
902F3FD000
stack
page read and write
13B0000
heap
page read and write
1100000
heap
page read and write
76C0000
trusted library allocation
page read and write
2830000
heap
page read and write
265A000
stack
page read and write
303C000
heap
page read and write
4BBB000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
19E18402000
heap
page read and write
18335670000
heap
page read and write
2EF7000
heap
page read and write
877BF7B000
stack
page read and write
19E1843D000
heap
page read and write
459A000
trusted library allocation
page execute and read and write
2E50000
heap
page read and write
4B9C000
trusted library allocation
page read and write
494F000
stack
page read and write
20FC0A73000
heap
page read and write
1B5D5C02000
trusted library allocation
page read and write
4BBF000
trusted library allocation
page read and write
2E70000
heap
page read and write
1B5D5402000
heap
page read and write
4BC2000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
2C30000
heap
page read and write
4670000
heap
page read and write
4BAF000
trusted library allocation
page read and write
1CB9FC13000
heap
page read and write
4BE5000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
A3E000
stack
page read and write
4BA0000
trusted library allocation
page read and write
19E18424000
heap
page read and write
125C000
unkown
page readonly
2EF3000
heap
page read and write
10BC000
heap
page read and write
2C90000
trusted library allocation
page read and write
A65000
heap
page read and write
7FFC9DCD6000
trusted library allocation
page execute and read and write
2C20000
direct allocation
page read and write
1F0000
heap
page read and write
A21AE7F000
stack
page read and write
758D000
trusted library allocation
page read and write
20FC0A46000
heap
page read and write
29A0000
heap
page read and write
1F702AF0000
heap
page read and write
3004000
heap
page read and write
19E18400000
heap
page read and write
2BD6C7C000
stack
page read and write
78000
unkown
page write copy
7FFC9DBFD000
trusted library allocation
page execute and read and write
20FC0940000
heap
page read and write
1CB9FD00000
heap
page read and write
2BD6CFE000
stack
page read and write
1040000
heap
page read and write
29CE4075000
heap
page read and write
24440ACC000
heap
page read and write
AF8A37B000
stack
page read and write
7750000
trusted library allocation
page read and write
CA0000
unkown
page readonly
2E97000
heap
page execute and read and write
29CE4113000
heap
page read and write
4A40000
heap
page read and write
902F17C000
stack
page read and write
1060000
heap
page read and write
24440A29000
heap
page read and write
18335630000
heap
page read and write
1F702B00000
heap
page read and write
7700000
trusted library allocation
page read and write
2F0B000
heap
page read and write
20FC0A82000
heap
page read and write
1551000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
1CB9FBC0000
trusted library allocation
page read and write
10FE000
heap
page read and write
7FFC9DC02000
trusted library allocation
page read and write
20FC0A6B000
heap
page read and write
18335A05000
heap
page read and write
2E00000
heap
page read and write
1B5D5200000
heap
page read and write
1020000
heap
page read and write
2C7B000
stack
page read and write
20FC0A4D000
heap
page read and write
4BD6000
trusted library allocation
page read and write
1CB9FBF0000
remote allocation
page read and write
1560000
trusted library allocation
page read and write
795F000
stack
page read and write
AF89F3C000
stack
page read and write
DF0000
heap
page read and write
2835000
heap
page read and write
4B87000
trusted library allocation
page read and write
419E000
stack
page read and write
2CC0000
trusted library allocation
page read and write
A21B27C000
stack
page read and write
4590000
trusted library allocation
page read and write
24440A87000
heap
page read and write
1CBA15A0000
trusted library allocation
page read and write
AF8A77D000
stack
page read and write
272FBD00000
heap
page read and write
1CB9FA30000
heap
page read and write
1380000
trusted library allocation
page read and write
7A000
unkown
page readonly
2A05000
heap
page read and write
4B98000
trusted library allocation
page read and write
A4A000
heap
page read and write
482E000
stack
page read and write
20FC0A3D000
heap
page read and write
49A0000
heap
page read and write
19E18300000
heap
page read and write
1250000
unkown
page readonly
8A0000
unkown
page readonly
1B5D5500000
heap
page read and write
1CB9FC2A000
heap
page read and write
1F702AF5000
heap
page read and write
A21AF7C000
stack
page read and write
1B5D51F0000
heap
page read and write
4597000
trusted library allocation
page execute and read and write
195000
stack
page read and write
AF8A97E000
stack
page read and write
1B5D5502000
heap
page read and write
19E18451000
heap
page read and write
4870000
heap
page read and write
20FC0A4B000
heap
page read and write
902F57D000
stack
page read and write
45AB000
trusted library allocation
page execute and read and write
707F000
stack
page read and write
2ED0000
heap
page read and write
71000
unkown
page execute read
4880000
heap
page read and write
A40000
heap
page read and write
3020000
heap
page read and write
BACBAEC000
stack
page read and write
20FC0A50000
heap
page read and write
26487FE000
stack
page read and write
1B5D5440000
heap
page read and write
20FC0A67000
heap
page read and write
272FBB3B000
heap
page read and write
4B41000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
300E000
heap
page read and write
29CE403D000
heap
page read and write
2CA0000
trusted library allocation
page read and write
1258000
unkown
page write copy
47AE000
stack
page read and write
1560000
trusted library allocation
page read and write
7ADE000
stack
page read and write
AF8AB7F000
stack
page read and write
7720000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
264813C000
stack
page read and write
4720000
heap
page read and write
24440A13000
heap
page read and write
20FC0A79000
heap
page read and write
1104000
heap
page read and write
19E18310000
heap
page read and write
29CE4002000
heap
page read and write
2AE0000
unkown
page readonly
20FC0A7C000
heap
page read and write
5987E7E000
stack
page read and write
1CBA1602000
heap
page read and write
2A10000
heap
page read and write
7FFC9DC4C000
trusted library allocation
page execute and read and write
19E183A0000
trusted library allocation
page read and write
19E18502000
heap
page read and write
AF8A57C000
stack
page read and write
24440A3E000
heap
page read and write
29CE3EE0000
heap
page read and write
26481BE000
stack
page read and write
1560000
trusted library allocation
page read and write
20FC0A76000
heap
page read and write
7640000
trusted library allocation
page read and write
20FC0A60000
heap
page read and write
24440B13000
heap
page read and write
19E18429000
heap
page read and write
2DE9000
heap
page read and write
2C90000
trusted library allocation
page read and write
2EEF000
heap
page read and write
A21B07D000
stack
page read and write
4BD4000
trusted library allocation
page read and write
61D2F4B000
stack
page read and write
1CB9FC58000
heap
page read and write
26488FF000
stack
page read and write
1B5D5464000
heap
page read and write
1B5D5260000
heap
page read and write
4BA2000
trusted library allocation
page read and write
3011000
heap
page read and write
7680000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
1562000
trusted library allocation
page read and write
61D377E000
stack
page read and write
4B20000
trusted library allocation
page read and write
2E63000
trusted library allocation
page execute and read and write
4990000
trusted library allocation
page read and write
4AAF000
stack
page read and write
430000
unkown
page write copy
4DCC000
heap
page read and write
A73000
heap
page read and write
3009000
heap
page read and write
7FFC9DD92000
trusted library allocation
page read and write
3009000
heap
page read and write
20FC0A40000
heap
page read and write
125C000
unkown
page readonly
45F0000
heap
page execute and read and write
183355B0000
heap
page read and write
29D0000
heap
page read and write
4B9E000
trusted library allocation
page read and write
7FFC9DCA0000
trusted library allocation
page read and write
4B81000
trusted library allocation
page read and write
4B7B000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
4BB1000
trusted library allocation
page read and write
12E61000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
2A2B000
heap
page read and write
29CE4013000
heap
page read and write
A21AD7E000
stack
page read and write
7A000
unkown
page readonly
877BE7E000
stack
page read and write
BACBBEF000
stack
page read and write
29CE3E70000
heap
page read and write
61D38FD000
stack
page read and write
6C3E000
stack
page read and write
4B83000
trusted library allocation
page read and write
680000
heap
page read and write
2E64000
trusted library allocation
page read and write
24440AC3000
heap
page read and write
877BD7B000
stack
page read and write
463E000
stack
page read and write
20FC0A13000
heap
page read and write
BACBB6F000
stack
page read and write
2E6D000
trusted library allocation
page execute and read and write
CA6000
unkown
page readonly
125A000
unkown
page readonly
29F9000
heap
page read and write
1251000
unkown
page execute read
8A1000
unkown
page execute read
4D6E000
stack
page read and write
4B30000
heap
page read and write
42F000
unkown
page execute and read and write
29CE4802000
trusted library allocation
page read and write
2A02000
heap
page read and write
7609000
trusted library allocation
page read and write
300D000
heap
page read and write
2E4E000
stack
page read and write
1CB9FBF0000
remote allocation
page read and write
26486FE000
stack
page read and write
4B85000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
5987BBF000
stack
page read and write
7FFC9DBF4000
trusted library allocation
page read and write
61D34FF000
stack
page read and write
1CB9FC4B000
heap
page read and write
40F0000
heap
page read and write
2C20000
heap
page read and write
7C70000
trusted library allocation
page read and write
72B000
stack
page read and write
7710000
trusted library allocation
page read and write
902F1FE000
stack
page read and write
8AA000
unkown
page readonly
61D35FF000
stack
page read and write
2F0F000
heap
page read and write
4B7D000
trusted library allocation
page read and write
9C000
stack
page read and write
29F3000
heap
page read and write
1560000
trusted library allocation
page read and write
426000
unkown
page execute and read and write
19E183D0000
remote allocation
page read and write
8A1000
unkown
page execute read
AF8AA7F000
stack
page read and write
4994000
trusted library allocation
page read and write
4BB9000
trusted library allocation
page read and write
8A8000
unkown
page write copy
2E61000
trusted library allocation
page read and write
2A2C000
heap
page read and write
4583000
trusted library allocation
page read and write
4B10000
heap
page execute and read and write
1B5D5513000
heap
page read and write
2F0B000
heap
page read and write
1CBA1800000
trusted library allocation
page read and write
272FD660000
heap
page read and write
12E63000
trusted library allocation
page read and write
3020000
heap
page read and write
1B5D5477000
heap
page read and write
7FF4AD530000
trusted library allocation
page execute and read and write
781F000
stack
page read and write
1B5D5400000
heap
page read and write
24440AE1000
heap
page read and write
1561000
trusted library allocation
page read and write
10D2000
heap
page read and write
432000
unkown
page read and write
20FC0A47000
heap
page read and write
5B45000
trusted library allocation
page read and write
4BB5000
trusted library allocation
page read and write
1B5D5428000
heap
page read and write
1568000
trusted library allocation
page read and write
DE6000
stack
page read and write
41DF000
stack
page read and write
20FC0A29000
heap
page read and write
401000
unkown
page execute read
2A2C000
heap
page read and write
2CA0000
trusted library allocation
page read and write
135F000
stack
page read and write
19E183D0000
remote allocation
page read and write
4BB7000
trusted library allocation
page read and write
29FE000
heap
page read and write
1CB9FC4A000
heap
page read and write
4B79000
trusted library allocation
page read and write
29CE4029000
heap
page read and write
AF8A47F000
stack
page read and write
61D3AFC000
stack
page read and write
20FC0A7A000
heap
page read and write
2819000
heap
page read and write
1F702910000
heap
page read and write
4721000
heap
page read and write
20FC0A74000
heap
page read and write
13A0000
trusted library allocation
page read and write
A65000
heap
page read and write
75F0000
trusted library allocation
page read and write
45A0000
trusted library allocation
page read and write
20FC0A00000
heap
page read and write
61D37FB000
stack
page read and write
4BDC000
trusted library allocation
page read and write
902F07E000
stack
page read and write
125A000
unkown
page readonly
1CB9FBF0000
remote allocation
page read and write
71000
unkown
page execute read
3017000
heap
page read and write
244407E0000
heap
page read and write
2C8F000
stack
page read and write
76B0000
trusted library allocation
page read and write
1CB9FC5B000
heap
page read and write
46D0000
heap
page read and write
6ED000
stack
page read and write
7600000
trusted library allocation
page read and write
47EF000
stack
page read and write
183355D0000
heap
page read and write
3004000
heap
page read and write
A21A6BC000
stack
page read and write
1B5D5413000
heap
page read and write
75C0000
trusted library section
page read and write
2C3A000
stack
page read and write
1560000
trusted library allocation
page read and write
109C000
heap
page read and write
7FFC9DC1D000
trusted library allocation
page execute and read and write
20FC0A64000
heap
page read and write
3015000
heap
page read and write
2D80000
heap
page read and write
20FC0A39000
heap
page read and write
1560000
trusted library allocation
page read and write
61D367C000
stack
page read and write
20FC0950000
heap
page read and write
3011000
heap
page read and write
75E0000
heap
page read and write
A67000
heap
page read and write
27C0000
heap
page read and write
7770000
trusted library allocation
page read and write
272FBAA0000
heap
page read and write
77B0000
trusted library allocation
page read and write
7FFC9DC0D000
trusted library allocation
page execute and read and write
70000
unkown
page readonly
1CB9FC48000
heap
page read and write
4580000
trusted library allocation
page read and write
2C7E000
stack
page read and write
2AE0000
unkown
page readonly
3012000
heap
page read and write
2A24000
heap
page read and write
76F0000
trusted library allocation
page read and write
29CE401F000
heap
page read and write
3035000
heap
page read and write
29F9000
heap
page read and write
1CB9FC73000
heap
page read and write
5987B3C000
stack
page read and write
799E000
stack
page read and write
1CB9FBA0000
trusted library allocation
page read and write
A78000
heap
page read and write
24440ABB000
heap
page read and write
7FFC9DBF3000
trusted library allocation
page execute and read and write
7BDF000
stack
page read and write
61D39FE000
stack
page read and write
790000
heap
page read and write
A78000
heap
page read and write
1CBA1702000
heap
page read and write
269B000
stack
page read and write
4BA4000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
2EB7000
heap
page read and write
20FC1402000
trusted library allocation
page read and write
8AA000
unkown
page readonly
7C000
unkown
page readonly
20FC0A42000
heap
page read and write
1575000
heap
page read and write
1B5D5451000
heap
page read and write
76D0000
trusted library allocation
page read and write
20FC0A4E000
heap
page read and write
2A02000
heap
page read and write
785E000
stack
page read and write
19E18E02000
trusted library allocation
page read and write
2A07000
heap
page read and write
1570000
heap
page read and write
7620000
trusted library allocation
page read and write
400000
unkown
page readonly
1CB9FA40000
heap
page read and write
1CB9FC67000
heap
page read and write
10D4000
heap
page read and write
10C7000
heap
page read and write
4B96000
trusted library allocation
page read and write
4521000
heap
page read and write
65D0000
heap
page read and write
4A0C000
heap
page read and write
7D0000
heap
page read and write
2A04000
heap
page read and write
8A0000
unkown
page readonly
2C90000
trusted library allocation
page read and write
2F13000
heap
page read and write
272FBDA5000
heap
page read and write
7A9F000
stack
page read and write
1554000
trusted library allocation
page read and write
29FD000
heap
page read and write
78000
unkown
page read and write
20FC0A55000
heap
page read and write
2F05000
heap
page read and write
29CE4000000
heap
page read and write
CB0000
heap
page read and write
8AC000
unkown
page readonly
1F7043A0000
heap
page read and write
2E7A000
heap
page read and write
CA2000
unkown
page readonly
76A0000
trusted library allocation
page read and write
3011000
heap
page read and write
1251000
unkown
page execute read
2CB0000
heap
page read and write
4B71000
trusted library allocation
page read and write
1B3DD000
stack
page read and write
24440A00000
heap
page read and write
75B4000
trusted library allocation
page read and write
1B5D5479000
heap
page read and write
1CB9FC02000
heap
page read and write
45E0000
trusted library allocation
page execute and read and write
2DE0000
heap
page read and write
1CB9FD02000
heap
page read and write
2C90000
trusted library allocation
page read and write
19E18370000
heap
page read and write
20FC0A31000
heap
page read and write
272FBDA0000
heap
page read and write
301A000
heap
page read and write
18335540000
heap
page read and write
19E183D0000
remote allocation
page read and write
244407F0000
heap
page read and write
8A8000
unkown
page read and write
1560000
trusted library allocation
page read and write
1B890000
heap
page execute and read and write
7780000
trusted library allocation
page read and write
8AC000
unkown
page readonly
4740000
heap
page read and write
877BA7B000
stack
page read and write
23E0000
heap
page read and write
1CB9FD18000
heap
page read and write
4DAF000
stack
page read and write
2D40000
heap
page read and write
1560000
trusted library allocation
page read and write
2816000
heap
page read and write
4990000
trusted library allocation
page read and write
2A0F000
heap
page read and write
A21AC7E000
stack
page read and write
264847E000
stack
page read and write
7FFC9DD10000
trusted library allocation
page execute and read and write
3012000
heap
page read and write
29CE4077000
heap
page read and write
4750000
heap
page read and write
1258000
unkown
page read and write
1561000
trusted library allocation
page read and write
4AEE000
stack
page read and write
61D3BFE000
stack
page read and write
7FFC9DC10000
trusted library allocation
page read and write
486E000
stack
page read and write
1CB9FC5A000
heap
page read and write
20FC0A7D000
heap
page read and write
24440950000
trusted library allocation
page read and write
CA0000
unkown
page readonly
20FC0A49000
heap
page read and write
7719000
trusted library allocation
page read and write
2BD6DFF000
stack
page read and write
76E0000
trusted library allocation
page read and write
61D337C000
stack
page read and write
20FC0A62000
heap
page read and write
1560000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
1CB9FC00000
heap
page read and write
4BD0000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
4B9A000
trusted library allocation
page read and write
300D000
heap
page read and write
771E000
stack
page read and write
430000
unkown
page read and write
7740000
trusted library allocation
page read and write
20FC09E0000
trusted library allocation
page read and write
1F702890000
heap
page read and write
7C000
unkown
page readonly
2FE0000
heap
page read and write
2A19000
heap
page read and write
1CB9FAA0000
heap
page read and write
1560000
trusted library allocation
page read and write
2CC5000
heap
page read and write
45A7000
trusted library allocation
page execute and read and write
26485FE000
stack
page read and write
7660000
trusted library allocation
page read and write
3028000
heap
page read and write
4B6C000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
4BA9000
trusted library allocation
page read and write
29CE405A000
heap
page read and write
24441202000
heap
page read and write
4B77000
trusted library allocation
page read and write
4B7F000
trusted library allocation
page read and write
24440A6E000
heap
page read and write
1F702B20000
heap
page read and write
4BDA000
trusted library allocation
page read and write
20FC09B0000
heap
page read and write
4BD8000
trusted library allocation
page read and write
65D4000
heap
page read and write
7FFC9DC00000
trusted library allocation
page read and write
AF8A87F000
stack
page read and write
2CC0000
heap
page read and write
45D0000
trusted library allocation
page read and write
2A0F000
heap
page read and write
AF8AC7F000
stack
page read and write
1560000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
2F1F000
stack
page read and write
2BD6D7E000
stack
page read and write
272FBB10000
heap
page read and write
24441300000
heap
page read and write
29CE3FE0000
trusted library allocation
page read and write
4996000
trusted library allocation
page read and write
902F47E000
stack
page read and write
29CE4102000
heap
page read and write
2E20000
heap
page read and write
2A09000
heap
page read and write
2EDC000
heap
page read and write
12E69000
trusted library allocation
page read and write
24440B02000
heap
page read and write
2DE5000
heap
page read and write
2CA0000
trusted library allocation
page read and write
2EC9000
heap
page read and write
2F0B000
heap
page read and write
20FC0B02000
heap
page read and write
1562000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
2A07000
heap
page read and write
2FE9000
heap
page read and write
24440850000
heap
page read and write
1CB9FD13000
heap
page read and write
7C000
unkown
page readonly
46D4000
heap
page read and write
18335A00000
heap
page read and write
76E0000
trusted library allocation
page read and write
4640000
trusted library section
page read and write
7650000
trusted library allocation
page read and write
29DA000
heap
page read and write
3017000
heap
page read and write
7670000
trusted library allocation
page read and write
3021000
heap
page read and write
10C4000
heap
page read and write
19E1844C000
heap
page read and write
20FC0A45000
heap
page read and write
10BF000
heap
page read and write
272FBB30000
heap
page read and write
1CB9FC40000
heap
page read and write
2EDE000
stack
page read and write
70000
unkown
page readonly
2810000
heap
page read and write
4C0C000
heap
page read and write
902ECDB000
stack
page read and write
7A000
unkown
page readonly
303D000
heap
page read and write
20FC0A30000
heap
page read and write
30000
heap
page read and write
303D000
heap
page read and write
DDE000
stack
page read and write
4660000
trusted library allocation
page read and write
877C07E000
stack
page read and write
19E18413000
heap
page read and write
12E67000
trusted library allocation
page read and write
1B5D5360000
trusted library allocation
page read and write
29CE3E80000
heap
page read and write
4BD2000
trusted library allocation
page read and write
1090000
heap
page read and write
7FFC9DCB0000
trusted library allocation
page execute and read and write
498E000
stack
page read and write
3011000
heap
page read and write
There are 594 hidden memdumps, click here to show them.