IOC Report
yZcecBUXN7.exe

loading gif

Files

File Path
Type
Category
Malicious
yZcecBUXN7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yZcecBUXN7.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\1-00F23L
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yZcecBUXN7.exe
"C:\Users\user\Desktop\yZcecBUXN7.exe"
malicious
C:\Users\user\Desktop\yZcecBUXN7.exe
"C:\Users\user\Desktop\yZcecBUXN7.exe"
malicious
C:\Program Files (x86)\DUKoqSpezAPdkEeQLfXbQJktRyLdTGIcgkgDcRWuknrvtOsFOYoJLHQwvsoW\jBaxmaKIzqHZYEOPQcTTJTXx.exe
"C:\Program Files (x86)\DUKoqSpezAPdkEeQLfXbQJktRyLdTGIcgkgDcRWuknrvtOsFOYoJLHQwvsoW\jBaxmaKIzqHZYEOPQcTTJTXx.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\SysWOW64\netsh.exe"
malicious
C:\Program Files (x86)\DUKoqSpezAPdkEeQLfXbQJktRyLdTGIcgkgDcRWuknrvtOsFOYoJLHQwvsoW\jBaxmaKIzqHZYEOPQcTTJTXx.exe
"C:\Program Files (x86)\DUKoqSpezAPdkEeQLfXbQJktRyLdTGIcgkgDcRWuknrvtOsFOYoJLHQwvsoW\jBaxmaKIzqHZYEOPQcTTJTXx.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.instagram.com/hover_domains
unknown
https://www.nic.ru/catalog/ssl/
unknown
http://www.whirledairlines.com/0hhg/
216.40.34.41
http://www.yamiyasheec.online/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=XN/uN6nMvrGkpcBz+Thv1jYaxJtcZ3guzCEwk+wO1IePrLEfQ2dONhxJJ5MfI8SrhyY28ykjUI4nvFFhDsPQuo7fansGo7O9hSpOWy12njMGsYSDFVmwrLg=
119.18.54.116
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.nic.ru/
unknown
http://push.zhanzhang.baidu.com/push.js
unknown
https://www.hover.com/email?source=parked
unknown
https://www.hover.com/about?source=parked
unknown
http://www.dhleba51.ru/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=bCD+TBjy8MosL0R8cjbFvxriDyPYhKFZsDVB2lzqkrb80jeseZ1xwY0K4Gv6crRSCTRNIEUsU3Jqelj2oHAe6QPTv8GQpjovQK3uiYXh6MxwvjeFy3ewRNM=
195.24.68.5
https://www.nic.ru/catalog/domains/
unknown
https://www.nic.ru/help/oshibka-404_8500.html
unknown
http://www.applesolve.com/0hhg/?ABqDW6A8=vkFwZ006WdHbpHCmjjBOYDeoX+Rn6aHsZLnu3NGBe2VBUm0fUZsnu3sABaHfjqCa4r+GKRPsyPs5e5gNT6h7MvS/nYKUeSlb7fRS9PCej43uXu++wSLzang=&nNWXI=ybhXiHipjHJ
188.116.38.155
https://www.hover.com/domains/results
unknown
https://www.nic.ru/catalog/hosting/shared/
unknown
http://www.applesolve.com/0hhg/
188.116.38.155
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.dk48.lol/0hhg/
91.195.240.19
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
http://www.dk48.lol/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=Np3vqe/1Cu/OQ51upJR8Qsht1t6ybRV+pU7NEwPzo+CdnJXCrwJJ0q4TeA3yrjOGKQp+qts/DZNdYR5Nz+PtVR15bhmDHV5jmEZsuo4OBXvm+mP+YyhGbOc=
91.195.240.19
https://www.hover.com/tools?source=parked
unknown
https://help.hover.com/home?source=parked
unknown
http://www.xxaiai.top/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=4PSEdCTPIXdKXl7uh+LsBTwAtAbEEDmKYAJsxyVVq9bdmcYGjB9JHSE/ykX4VkYbcxwnxSFcyayelsVtdhVYibhKvsL7bWoBJw77jiRnpeIfkNF5+PYwYCo=
108.186.8.158
https://yastatic.net/pcode/adfox/loader.js
unknown
https://www.hover.com/domain_pricing?source=parked
unknown
https://www.hover.com/privacy?source=parked
unknown
https://twitter.com/hover
unknown
http://www.bnbuotqakx.shop/0hhg/
101.99.93.157
http://www.whirledairlines.com/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=OATZzJPiUUGU3mpjZciWUPZeXbT2MJCMteYhXkaeth47OgAuOtH7Ax1R5cSUzc8K7tJsdCLV7T20xyzul8wSbYrVofQNfqyssPuErqT1NUPeqaem3KrcSI4=
216.40.34.41
http://applesolve.com/0hhg/?ABqDW6A8=vkFwZ006WdHbpHCmjjBOYDeoX
unknown
https://www.hover.com/transfer_in?source=parked
unknown
https://www.hover.com/renew?source=parked
unknown
https://www.cucuzeus88.store/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=nRUqMZh05AeT5XBXy6tvbUigcs6hc4rC
unknown
http://www.quantummquest.top/0hhg/
203.161.50.127
http://www.quantummquest.top/0hhg/?ABqDW6A8=nDs+4sFgmC14rZAzdMtU+fOluyCTVoLAn9AW6ezlSd5l//pRDkDNUYKtMPmQp3hOJuHIoac+nQZfVGszaQStOPCeLqTfiXL51+ke6KS/qQDP30/ytVZd2Oc=&nNWXI=ybhXiHipjHJ
203.161.50.127
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://zz.bdstatic.com/linksubmit/push.js
unknown
http://www.dainikmirpur.com/0hhg/
192.250.235.36
https://www.nic.ru/catalog/hosting/dedicated/
unknown
https://www.ecosia.org/newtab/
unknown
http://www.yamiyasheec.online/0hhg/
119.18.54.116
http://www.dhleba51.ru/0hhg/
195.24.68.5
http://www.xxaiai.top/0hhg/
108.186.8.158
http://www.dainikmirpur.com/0hhg/?ABqDW6A8=3wBFJopWm5CMrZiTyKtS+1p+7hjS88lkxUD6z9EbhjEDI4ONso69BWfj9WDOW8yAnPP5dxxY4Y59DXJqqTyKGc0G8sgHpv85TbqwFJKqhW0zFRgOzIl1BwU=&nNWXI=ybhXiHipjHJ
192.250.235.36
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.nic.ru/catalog/hosting/vds-vps/
unknown
https://www.hover.com/tos?source=parked
unknown
http://www.vavada-band.ru/0hhg/?nNWXI=ybhXiHipjHJ&ABqDW6A8=ZgUGIv2SFtjYSXZ+sPWjrnmi9x4JTSAxK/4wkC6FqAYJ2g+qpBbYR3pK2HW+0dFnzG0fITqUvE2Gc/Yp1eE4tJw0C8fQ5yYHj2xbYtSMWmtqetVE9PQCI40=
148.251.36.121
http://www.bnbuotqakx.shop
unknown
https://www.nic.ru/catalog/hosting/
unknown
http://www.bettaroom.ru/0hhg/
194.58.112.173
http://www.cucuzeus88.store/0hhg/
153.92.8.41
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.hover.com/?source=parked
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.applesolve.com
unknown
malicious
www.cucuzeus88.store
unknown
malicious
www.bnbuotqakx.shop
unknown
malicious
www.dainikmirpur.com
unknown
malicious
www.dk48.lol
unknown
malicious
www.cluird.cloud
unknown
malicious
www.yamiyasheec.online
unknown
malicious
www.vavada-band.ru
unknown
malicious
www.vaesen.net
unknown
malicious
vavada-band.ru
148.251.36.121
cucuzeus88.store
153.92.8.41
www.quantummquest.top
203.161.50.127
www.dhleba51.ru
195.24.68.5
applesolve.com
188.116.38.155
parkingpage.namecheap.com
91.195.240.19
www.bettaroom.ru
194.58.112.173
bnbuotqakx.shop
101.99.93.157
www.xxaiai.top
108.186.8.158
dainikmirpur.com
192.250.235.36
www.whirledairlines.com
216.40.34.41
yamiyasheec.online
119.18.54.116
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
203.161.50.127
www.quantummquest.top
Malaysia
195.24.68.5
www.dhleba51.ru
Russian Federation
153.92.8.41
cucuzeus88.store
Germany
101.99.93.157
bnbuotqakx.shop
Malaysia
188.116.38.155
applesolve.com
Poland
148.251.36.121
vavada-band.ru
Germany
119.18.54.116
yamiyasheec.online
India
108.186.8.158
www.xxaiai.top
United States
192.250.235.36
dainikmirpur.com
United States
91.195.240.19
parkingpage.namecheap.com
Germany
194.58.112.173
www.bettaroom.ru
Russian Federation
216.40.34.41
www.whirledairlines.com
Canada
There are 2 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
55B0000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
C00000
system
page execute and read and write
malicious
2960000
unkown
page execute and read and write
malicious
1320000
trusted library allocation
page read and write
malicious
F00000
trusted library allocation
page read and write
malicious
1640000
unclassified section
page execute and read and write
malicious
1020000
unclassified section
page execute and read and write
malicious
1221000
heap
page read and write
1B1F3B67000
system
page execute and read and write
36B5000
heap
page read and write
10C0000
unkown
page read and write
1221000
heap
page read and write
4E000
unkown
page readonly
5671000
system
page execute and read and write
1170000
trusted library allocation
page read and write
D08000
heap
page read and write
3564000
unkown
page read and write
CE0000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
51B0000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
8061000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
6F0000
unkown
page readonly
1221000
heap
page read and write
F75000
heap
page read and write
1221000
heap
page read and write
4062000
unkown
page read and write
1221000
heap
page read and write
11A8000
trusted library allocation
page read and write
127F000
heap
page read and write
1221000
heap
page read and write
570E000
stack
page read and write
40000
unkown
page readonly
1221000
heap
page read and write
3D6C000
unclassified section
page read and write
317C000
unkown
page read and write
C9B000
trusted library allocation
page execute and read and write
36B9000
heap
page read and write
1B1F570E000
trusted library allocation
page read and write
1221000
heap
page read and write
460A000
unclassified section
page read and write
1B1F3C50000
heap
page read and write
1221000
heap
page read and write
2F62000
unkown
page read and write
1221000
heap
page read and write
C35000
heap
page read and write
1221000
heap
page read and write
700000
unkown
page readonly
C11000
unkown
page readonly
2704000
heap
page read and write
10B1000
unkown
page readonly
1230000
unkown
page readonly
1B1F5801000
trusted library allocation
page read and write
1221000
heap
page read and write
1190000
trusted library allocation
page read and write
5108000
unclassified section
page read and write
1221000
heap
page read and write
2DAF000
stack
page read and write
8084000
heap
page read and write
C3A000
unkown
page read and write
40000
unkown
page readonly
1221000
heap
page read and write
F7B000
heap
page read and write
36C0000
heap
page read and write
1221000
heap
page read and write
1250000
unkown
page read and write
1221000
heap
page read and write
11B0000
trusted library allocation
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
FE7000
heap
page read and write
16F1000
unkown
page readonly
1221000
heap
page read and write
4E000
unkown
page readonly
134A000
heap
page read and write
1221000
heap
page read and write
809B000
heap
page read and write
1221000
heap
page read and write
D7E000
stack
page read and write
C60000
heap
page read and write
3BAC000
unclassified section
page read and write
10A0000
unkown
page read and write
1221000
heap
page read and write
FBF000
heap
page read and write
121F000
stack
page read and write
C00000
trusted library allocation
page read and write
E1A000
heap
page read and write
F60000
heap
page read and write
10D0000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
7F0000
unkown
page read and write
55000
unkown
page read and write
7B0000
unkown
page readonly
492E000
unclassified section
page read and write
1221000
heap
page read and write
F7F000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
6F0000
unkown
page readonly
1B1F5580000
trusted library allocation
page read and write
1B1F58C4000
trusted library allocation
page read and write
2FBC000
unkown
page read and write
2BAC000
unkown
page read and write
FB0000
unkown
page readonly
57000
unkown
page readonly
2870000
unkown
page readonly
104A000
heap
page read and write
110E000
stack
page read and write
CB0000
heap
page read and write
8061000
heap
page read and write
10D6000
heap
page read and write
1220000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
FFF000
heap
page read and write
3A0D000
direct allocation
page execute and read and write
57CABFE000
stack
page read and write
111E000
stack
page read and write
C20000
unkown
page read and write
286F000
stack
page read and write
1B1F3C9C000
heap
page read and write
1221000
heap
page read and write
41000
unkown
page execute read
8BB000
stack
page read and write
5000000
heap
page read and write
DD0000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
3A11000
direct allocation
page execute and read and write
F79000
heap
page read and write
8061000
heap
page read and write
5657000
system
page execute and read and write
483C000
unkown
page read and write
57CBBFF000
stack
page read and write
1221000
heap
page read and write
BE0000
unkown
page readonly
C80000
unkown
page readonly
8061000
heap
page read and write
4E000
unkown
page readonly
1221000
heap
page read and write
C20000
trusted library allocation
page read and write
D0E000
heap
page read and write
1221000
heap
page read and write
FC5000
heap
page read and write
5316000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
F90000
unkown
page readonly
7F0000
unkown
page read and write
567D000
system
page execute and read and write
3A75000
trusted library allocation
page read and write
33A72000
system
page read and write
FE7000
heap
page read and write
1221000
heap
page read and write
2B3E000
stack
page read and write
C7E000
stack
page read and write
7B0000
unkown
page readonly
1221000
heap
page read and write
3888000
unkown
page read and write
CB0000
trusted library allocation
page read and write
808F000
heap
page read and write
1168000
heap
page read and write
FC0000
heap
page read and write
C97000
trusted library allocation
page execute and read and write
7D0000
unkown
page readonly
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
2BB0000
heap
page read and write
FDA000
heap
page read and write
1221000
heap
page read and write
7C0000
unkown
page readonly
F79000
heap
page read and write
56D4000
system
page execute and read and write
1221000
heap
page read and write
1B1F58BE000
trusted library allocation
page read and write
1003000
heap
page read and write
1221000
heap
page read and write
8061000
heap
page read and write
FA0000
unkown
page readonly
1221000
heap
page read and write
6D0000
unkown
page readonly
B20000
heap
page read and write
C8A000
trusted library allocation
page execute and read and write
1B1F5570000
heap
page read and write
4478000
unclassified section
page read and write
1221000
heap
page read and write
4FE9000
trusted library allocation
page read and write
EFF000
stack
page read and write
ED0000
unkown
page readonly
CA0000
unkown
page read and write
1221000
heap
page read and write
34134000
system
page read and write
10D0000
direct allocation
page execute and read and write
41000
unkown
page execute read
FD3000
heap
page read and write
41000
unkown
page execute read
F79000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1230000
unkown
page readonly
1221000
heap
page read and write
1032000
heap
page read and write
1268000
heap
page read and write
11FD000
direct allocation
page execute and read and write
1221000
heap
page read and write
D42000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
D35000
heap
page read and write
1360000
unkown
page readonly
1B1F5703000
trusted library allocation
page read and write
1221000
heap
page read and write
3ED0000
unkown
page read and write
1221000
heap
page read and write
806B000
heap
page read and write
1221000
heap
page read and write
8066000
heap
page read and write
5330000
trusted library section
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
FA0000
unkown
page readonly
AFC000
stack
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
4518000
unkown
page read and write
DD0000
heap
page read and write
C24000
trusted library allocation
page read and write
5F4E000
stack
page read and write
42E6000
unclassified section
page read and write
1221000
heap
page read and write
FC0000
heap
page read and write
1221000
heap
page read and write
101F000
stack
page read and write
1B1F5721000
trusted library allocation
page read and write
C0E000
stack
page read and write
1221000
heap
page read and write
102D000
heap
page read and write
1221000
heap
page read and write
B60000
heap
page read and write
584E000
stack
page read and write
4FEE000
trusted library allocation
page read and write
4C52000
unclassified section
page read and write
C30000
heap
page read and write
F70000
heap
page read and write
40000
unkown
page readonly
710000
unkown
page readonly
1221000
heap
page read and write
1B1F5700000
trusted library allocation
page read and write
8061000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
100C000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
4AC0000
unclassified section
page read and write
1221000
heap
page read and write
3869000
direct allocation
page execute and read and write
1221000
heap
page read and write
1221000
heap
page read and write
1396000
direct allocation
page execute and read and write
57CB3FF000
stack
page read and write
36F6000
unkown
page read and write
1290000
heap
page read and write
51D0000
trusted library allocation
page read and write
10C0000
unkown
page read and write
FC5000
heap
page read and write
1221000
heap
page read and write
2DB0000
unkown
page readonly
CD0000
heap
page read and write
2704000
heap
page read and write
FF2000
heap
page read and write
1221000
heap
page read and write
1400000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
1210000
heap
page read and write
33D4C000
system
page read and write
2A6E000
stack
page read and write
9B8000
stack
page read and write
F79000
heap
page read and write
1630000
heap
page read and write
1221000
heap
page read and write
FD0000
heap
page read and write
1221000
heap
page read and write
5010000
heap
page read and write
1221000
heap
page read and write
D80000
heap
page read and write
11C0000
heap
page read and write
1B1F5580000
trusted library allocation
page read and write
40000
unkown
page readonly
1221000
heap
page read and write
DF0000
heap
page read and write
52FB000
trusted library allocation
page read and write
1221000
heap
page read and write
114E000
stack
page read and write
57000
unkown
page readonly
1221000
heap
page read and write
1B1F5800000
trusted library allocation
page read and write
1227000
heap
page read and write
1221000
heap
page read and write
1008000
heap
page read and write
1B1F58A6000
trusted library allocation
page read and write
C60000
heap
page read and write
10D0000
heap
page read and write
14A0000
trusted library allocation
page read and write
2B40000
unkown
page read and write
C40000
heap
page read and write
700000
unkown
page readonly
BF0000
unkown
page readonly
52F4000
trusted library allocation
page read and write
1250000
unkown
page read and write
77A000
stack
page read and write
537D000
stack
page read and write
1221000
heap
page read and write
FBF000
heap
page read and write
52EF000
stack
page read and write
57CA3FE000
stack
page read and write
3B58000
trusted library allocation
page read and write
1260000
unkown
page readonly
3B56000
trusted library allocation
page read and write
1B1F3CAB000
heap
page read and write
4C0E000
stack
page read and write
8061000
heap
page read and write
E60000
heap
page read and write
1221000
heap
page read and write
C13000
trusted library allocation
page execute and read and write
2EA2000
unkown
page read and write
2EA2000
unkown
page read and write
560E000
stack
page read and write
1221000
heap
page read and write
FD3000
heap
page read and write
DD8000
heap
page read and write
1221000
heap
page read and write
513E000
stack
page read and write
1221000
heap
page read and write
809B000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
53CE000
stack
page read and write
1221000
heap
page read and write
1B1F3C80000
heap
page read and write
121F000
stack
page read and write
1221000
heap
page read and write
588E000
stack
page read and write
126E000
direct allocation
page execute and read and write
C80000
unkown
page readonly
DF4000
heap
page read and write
10CE000
stack
page read and write
1221000
heap
page read and write
3720000
trusted library allocation
page read and write
1221000
heap
page read and write
7C0000
unkown
page readonly
BD0000
unkown
page readonly
1221000
heap
page read and write
1B1F570A000
trusted library allocation
page read and write
1221000
heap
page read and write
80A5000
heap
page read and write
C3E000
stack
page read and write
4FEC000
trusted library allocation
page read and write
E28000
heap
page read and write
55000
unkown
page read and write
80A2000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
2BB0000
heap
page read and write
8061000
heap
page read and write
E5A000
stack
page read and write
4E000
unkown
page readonly
8075000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1B1F5600000
trusted library allocation
page read and write
51D5000
trusted library allocation
page read and write
1260000
unkown
page readonly
8061000
heap
page read and write
C14000
trusted library allocation
page read and write
3BAC000
unkown
page read and write
1221000
heap
page read and write
710000
unkown
page readonly
1221000
heap
page read and write
FD0000
heap
page read and write
E5A000
stack
page read and write
E20000
heap
page read and write
1260000
heap
page read and write
F7F000
heap
page read and write
55000
unkown
page read and write
1360000
trusted library allocation
page read and write
BFE000
stack
page read and write
5311000
trusted library allocation
page read and write
1B1F3C20000
heap
page read and write
1221000
heap
page read and write
14A0000
trusted library allocation
page read and write
1221000
heap
page read and write
AF6000
stack
page read and write
4FD0000
trusted library allocation
page read and write
1221000
heap
page read and write
1197000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
FB0000
unkown
page readonly
574E000
stack
page read and write
1221000
heap
page read and write
F5C000
stack
page read and write
1260000
heap
page read and write
11B5000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
57EC000
unkown
page read and write
33B8C000
system
page read and write
DF4000
heap
page read and write
8061000
heap
page read and write
1221000
heap
page read and write
1027000
heap
page read and write
2CA0000
heap
page read and write
D45000
heap
page read and write
1038000
heap
page read and write
1221000
heap
page read and write
8060000
heap
page read and write
4154000
unclassified section
page read and write
4FE0000
trusted library allocation
page read and write
4DE4000
unclassified section
page read and write
530E000
trusted library allocation
page read and write
151F000
stack
page read and write
11F9000
direct allocation
page execute and read and write
1221000
heap
page read and write
1221000
heap
page read and write
DB0000
direct allocation
page read and write
10B1000
unkown
page readonly
5140000
trusted library section
page read and write
1221000
heap
page read and write
2760000
heap
page read and write
8AAE000
stack
page read and write
F6A000
heap
page read and write
2870000
unkown
page readonly
1B1F3B69000
system
page execute and read and write
1221000
heap
page read and write
11A0000
trusted library allocation
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
2BB4000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
41000
unkown
page execute read
1221000
heap
page read and write
1221000
heap
page read and write
542C000
unclassified section
page read and write
1221000
heap
page read and write
8BAF000
stack
page read and write
8096000
heap
page read and write
77A000
stack
page read and write
33B32000
system
page read and write
1221000
heap
page read and write
CC0000
trusted library allocation
page execute and read and write
F7A000
heap
page read and write
57000
unkown
page readonly
1221000
heap
page read and write
AFA000
stack
page read and write
1B1F3C8A000
heap
page read and write
1221000
heap
page read and write
1D16000
unclassified section
page execute and read and write
AFC000
stack
page read and write
11BD000
trusted library allocation
page read and write
2700000
heap
page read and write
1221000
heap
page read and write
1B1F3B6B000
system
page execute and read and write
C10000
trusted library allocation
page read and write
1B1F5716000
trusted library allocation
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
3036000
unkown
page execute and read and write
DAE000
stack
page read and write
386D000
direct allocation
page execute and read and write
1150000
trusted library allocation
page read and write
479C000
unclassified section
page read and write
1B1F5711000
trusted library allocation
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
52F0000
trusted library allocation
page read and write
F74000
heap
page read and write
1B1F3CB0000
heap
page read and write
E5D000
heap
page read and write
1221000
heap
page read and write
2FC9000
unkown
page execute and read and write
3A92000
unclassified section
page read and write
2BB4000
heap
page read and write
FDA000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1381000
direct allocation
page execute and read and write
2700000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
F5C000
stack
page read and write
317C000
unkown
page read and write
E41000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
80A0000
heap
page read and write
1221000
heap
page read and write
367E000
stack
page read and write
3A82000
direct allocation
page execute and read and write
38DE000
direct allocation
page execute and read and write
1221000
heap
page read and write
151D000
stack
page read and write
F90000
unkown
page readonly
ED0000
unkown
page readonly
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
7D0000
unkown
page readonly
806E000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
C86000
trusted library allocation
page execute and read and write
372A000
heap
page read and write
3D3E000
unkown
page read and write
2B50000
unkown
page read and write
1268000
heap
page read and write
C11000
unkown
page readonly
808A000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
7E0000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
57000
unkown
page readonly
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1B1F3CB2000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
DFB000
heap
page read and write
80AF000
heap
page read and write
4FE4000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
139D000
direct allocation
page execute and read and write
1221000
heap
page read and write
11B8000
trusted library allocation
page read and write
2DB0000
unkown
page readonly
2CA0000
heap
page read and write
3A1A000
unkown
page read and write
CA0000
unkown
page read and write
1221000
heap
page read and write
F79000
heap
page read and write
1221000
heap
page read and write
DD8000
heap
page read and write
1B1F3AE0000
system
page execute and read and write
1221000
heap
page read and write
52F2000
trusted library allocation
page read and write
567F000
system
page execute and read and write
1221000
heap
page read and write
1016000
heap
page read and write
1418000
direct allocation
page execute and read and write
7E0000
heap
page read and write
4FF0000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
7BC000
stack
page read and write
1221000
heap
page read and write
F6E000
heap
page read and write
5661000
system
page execute and read and write
1B1F58CE000
trusted library allocation
page read and write
1221000
heap
page read and write
3B52000
unclassified section
page read and write
DBF000
stack
page read and write
41F4000
unkown
page read and write
FCF000
stack
page read and write
C70000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
C7D000
stack
page read and write
5659000
system
page execute and read and write
6D2000
unkown
page readonly
14A0000
trusted library allocation
page read and write
C20000
unkown
page read and write
E17000
heap
page read and write
3730000
trusted library allocation
page read and write
55000
unkown
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
CB0000
heap
page read and write
1221000
heap
page read and write
F6E000
heap
page read and write
BE0000
unkown
page readonly
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
BF0000
unkown
page readonly
10A0000
unkown
page read and write
4FC0000
trusted library allocation
page read and write
1221000
heap
page read and write
111E000
stack
page read and write
BD0000
unkown
page readonly
DD0000
heap
page read and write
16F0000
unkown
page readonly
1360000
unkown
page readonly
D00000
heap
page read and write
BB0000
heap
page read and write
8070000
heap
page read and write
F85000
heap
page read and write
3740000
direct allocation
page execute and read and write
1221000
heap
page read and write
1221000
heap
page read and write
1221000
heap
page read and write
1B1F3C00000
heap
page read and write
7FB000
stack
page read and write
DF4000
heap
page read and write
1CA9000
unclassified section
page execute and read and write
1221000
heap
page read and write
1221000
heap
page read and write
1160000
heap
page execute and read and write
1221000
heap
page read and write
2760000
heap
page read and write
57C9BFC000
stack
page read and write
358C000
heap
page read and write
8078000
heap
page read and write
2A71000
trusted library allocation
page read and write
There are 627 hidden memdumps, click here to show them.