IOC Report
UzQWEAhf9B.exe

loading gif

Files

File Path
Type
Category
Malicious
UzQWEAhf9B.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\UzQWEAhf9B.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1EA9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1ECA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1EDA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1EFA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1EFB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp57CF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp57D0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp57E1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp57E2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp57F3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp57F4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5804.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5815.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5825.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5826.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5837.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5848.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7078.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7089.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp909F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp90AF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp90C0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp90D0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp90E1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp90F2.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpAAD4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAAD5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAAF5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAAF6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAB16.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpAB27.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpAB37.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC939.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC93A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC94B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC94C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC94D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC95D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpDA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE4F6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE506.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE517.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE537.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE548.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE568.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UzQWEAhf9B.exe
"C:\Users\user\Desktop\UzQWEAhf9B.exe"
malicious
C:\Users\user\Desktop\UzQWEAhf9B.exe
"C:\Users\user\Desktop\UzQWEAhf9B.exe"
malicious
C:\Users\user\Desktop\UzQWEAhf9B.exe
"C:\Users\user\Desktop\UzQWEAhf9B.exe"
malicious
C:\Users\user\Desktop\UzQWEAhf9B.exe
"C:\Users\user\Desktop\UzQWEAhf9B.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
http://185.222.58.236:55615/
185.222.58.236
malicious
185.222.58.236:55615
malicious
https://api.ipify.
unknown
malicious
https://api.ipify.orgcoo
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.222.58.236:55615
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.58.236
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UzQWEAhf9B_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EA1000
trusted library allocation
page read and write
malicious
3F46000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3EB2000
trusted library allocation
page read and write
3FD0000
trusted library allocation
page read and write
108B000
heap
page read and write
7705000
heap
page read and write
11B0000
heap
page execute and read and write
56D0000
trusted library section
page read and write
7C80000
trusted library allocation
page execute and read and write
598E000
stack
page read and write
3F09000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
55BE000
stack
page read and write
1163000
trusted library allocation
page read and write
FBF000
heap
page read and write
5224000
trusted library allocation
page read and write
691A000
trusted library allocation
page read and write
10A6000
trusted library allocation
page execute and read and write
57F0000
trusted library allocation
page read and write
68F5000
trusted library allocation
page read and write
3F73000
trusted library allocation
page read and write
7B7D000
stack
page read and write
F38000
stack
page read and write
1172000
trusted library allocation
page read and write
7064000
trusted library allocation
page read and write
1073000
trusted library allocation
page execute and read and write
587A000
trusted library allocation
page read and write
B90000
heap
page read and write
10B5000
trusted library allocation
page execute and read and write
66D3000
heap
page read and write
5740000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
68F9000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
3EA1000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
7726000
heap
page read and write
5252000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
1200000
heap
page read and write
2D1E000
stack
page read and write
1030000
heap
page read and write
3FA5000
trusted library allocation
page read and write
6710000
heap
page read and write
B75000
heap
page read and write
1060000
trusted library allocation
page read and write
83F0000
trusted library allocation
page execute and read and write
2D7E000
stack
page read and write
56E3000
heap
page read and write
2EBC000
stack
page read and write
8EAE000
stack
page read and write
6AB0000
heap
page read and write
5800000
trusted library allocation
page execute and read and write
5700000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
F70000
heap
page read and write
2ED0000
heap
page read and write
5945000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
14AF000
stack
page read and write
102E000
stack
page read and write
7082000
trusted library allocation
page read and write
52F0000
heap
page read and write
3F9F000
trusted library allocation
page read and write
1080000
heap
page read and write
BDD000
stack
page read and write
3002000
trusted library allocation
page read and write
53F0000
heap
page read and write
A88000
unkown
page readonly
6782000
trusted library allocation
page read and write
10E0000
heap
page read and write
5930000
trusted library allocation
page read and write
705F000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
1181000
heap
page read and write
2CB0000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
57D0000
trusted library allocation
page execute and read and write
57F0000
trusted library allocation
page execute and read and write
F70000
trusted library allocation
page read and write
1035000
heap
page read and write
10B7000
trusted library allocation
page execute and read and write
10D0000
trusted library allocation
page read and write
6F50000
heap
page read and write
B70000
heap
page read and write
526F000
trusted library allocation
page read and write
5D1E000
stack
page read and write
10FE000
heap
page read and write
6060000
heap
page read and write
882E000
stack
page read and write
587B000
stack
page read and write
522B000
trusted library allocation
page read and write
F80000
heap
page read and write
FEE000
stack
page read and write
FC1000
heap
page read and write
40BE000
trusted library allocation
page read and write
1109000
heap
page read and write
B80000
heap
page read and write
691F000
trusted library allocation
page read and write
866D000
stack
page read and write
70D2000
trusted library allocation
page read and write
66E8000
heap
page read and write
537E000
stack
page read and write
7054000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
76FB000
heap
page read and write
7100000
trusted library allocation
page execute and read and write
6A00000
trusted library allocation
page read and write
6DCE000
stack
page read and write
1160000
trusted library allocation
page read and write
11C9000
heap
page read and write
57A0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
13AE000
stack
page read and write
5860000
trusted library allocation
page read and write
9180000
trusted library allocation
page read and write
10B2000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
54BE000
stack
page read and write
403D000
trusted library allocation
page read and write
7F790000
trusted library allocation
page execute and read and write
2D70000
heap
page read and write
2D30000
trusted library allocation
page execute and read and write
2DBB000
stack
page read and write
690F000
trusted library allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
3FAC000
trusted library allocation
page read and write
53F3000
heap
page read and write
83E0000
heap
page read and write
8A2E000
stack
page read and write
56E0000
heap
page read and write
5A3E000
stack
page read and write
7076000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
7071000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
7056000
trusted library allocation
page read and write
6790000
trusted library allocation
page execute and read and write
5711000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
524D000
trusted library allocation
page read and write
3FBD000
trusted library allocation
page read and write
738F000
stack
page read and write
5320000
trusted library allocation
page read and write
6660000
heap
page read and write
2CA0000
trusted library allocation
page read and write
8C6E000
stack
page read and write
6915000
trusted library allocation
page read and write
7701000
heap
page read and write
6729000
heap
page read and write
F3E000
stack
page read and write
5330000
heap
page execute and read and write
554E000
stack
page read and write
1154000
trusted library allocation
page read and write
5275000
trusted library allocation
page read and write
2D90000
heap
page read and write
140E000
stack
page read and write
B1A000
stack
page read and write
6A10000
trusted library allocation
page read and write
FE0000
heap
page read and write
5A4B000
trusted library allocation
page read and write
4EDC000
stack
page read and write
10A0000
trusted library allocation
page read and write
6D8E000
stack
page read and write
6932000
trusted library allocation
page read and write
1153000
trusted library allocation
page execute and read and write
3193000
trusted library allocation
page read and write
7094000
trusted library allocation
page read and write
10A2000
trusted library allocation
page read and write
1530000
heap
page read and write
6940000
trusted library allocation
page read and write
7068000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
69EE000
stack
page read and write
547E000
stack
page read and write
3F7E000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
109D000
trusted library allocation
page execute and read and write
3FBB000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
7A70000
heap
page read and write
104B000
heap
page read and write
8C97000
heap
page read and write
5990000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
3FB8000
trusted library allocation
page read and write
3F75000
trusted library allocation
page read and write
8D6F000
stack
page read and write
5820000
trusted library section
page read and write
862E000
stack
page read and write
5324000
trusted library allocation
page read and write
116D000
trusted library allocation
page execute and read and write
56F8000
heap
page read and write
1087000
heap
page read and write
6747000
heap
page read and write
2C8E000
stack
page read and write
4FDD000
stack
page read and write
605D000
stack
page read and write
56F0000
heap
page read and write
118B000
trusted library allocation
page execute and read and write
8DAE000
stack
page read and write
130F000
stack
page read and write
2CC0000
heap
page execute and read and write
5A40000
trusted library allocation
page read and write
A00000
unkown
page readonly
592E000
stack
page read and write
643E000
stack
page read and write
6780000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
107D000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
69AD000
stack
page read and write
58ED000
stack
page read and write
7085000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
2E9E000
stack
page read and write
5880000
trusted library allocation
page read and write
6924000
trusted library allocation
page read and write
8C82000
heap
page read and write
587D000
trusted library allocation
page read and write
F40000
heap
page read and write
7090000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
3FB5000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
1182000
trusted library allocation
page read and write
82DD000
stack
page read and write
6717000
heap
page read and write
1510000
trusted library allocation
page execute and read and write
1187000
trusted library allocation
page execute and read and write
FA0000
heap
page read and write
11A0000
trusted library allocation
page read and write
A02000
unkown
page readonly
10BB000
trusted library allocation
page execute and read and write
570B000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
572E000
trusted library allocation
page read and write
1176000
trusted library allocation
page execute and read and write
6674000
heap
page read and write
6A6E000
stack
page read and write
7052000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
68EE000
stack
page read and write
5241000
trusted library allocation
page read and write
53B0000
trusted library allocation
page execute and read and write
5800000
trusted library section
page read and write
54F0000
trusted library allocation
page read and write
717B000
stack
page read and write
55FE000
stack
page read and write
3EAE000
trusted library allocation
page read and write
705C000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
6704000
heap
page read and write
2EE1000
trusted library allocation
page read and write
67DE000
stack
page read and write
52A0000
trusted library allocation
page read and write
FB4000
heap
page read and write
1115000
heap
page read and write
5750000
trusted library allocation
page read and write
58D0000
trusted library section
page read and write
6F4E000
stack
page read and write
2CD8000
trusted library allocation
page read and write
6E0E000
stack
page read and write
5280000
trusted library allocation
page read and write
EF7000
stack
page read and write
1070000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4000000
trusted library allocation
page read and write
8B2D000
stack
page read and write
76F0000
heap
page read and write
10B0000
trusted library allocation
page read and write
F8A000
heap
page read and write
8270000
trusted library allocation
page execute and read and write
68F0000
trusted library allocation
page read and write
66A2000
heap
page read and write
6708000
heap
page read and write
E3B000
stack
page read and write
706E000
trusted library allocation
page read and write
52E0000
heap
page read and write
670C000
heap
page read and write
56CE000
stack
page read and write
3FC3000
trusted library allocation
page read and write
150F000
stack
page read and write
653E000
stack
page read and write
5550000
heap
page execute and read and write
308A000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
71B0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
2C90000
trusted library allocation
page execute and read and write
6739000
heap
page read and write
7120000
trusted library allocation
page execute and read and write
115D000
trusted library allocation
page execute and read and write
8B30000
heap
page read and write
673F000
heap
page read and write
7078000
trusted library allocation
page read and write
663E000
stack
page read and write
5246000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
67E0000
trusted library allocation
page execute and read and write
117A000
trusted library allocation
page execute and read and write
1074000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
10E8000
heap
page read and write
7180000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
707D000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
3EE9000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
56FE000
stack
page read and write
5CDD000
stack
page read and write
6745000
heap
page read and write
5930000
trusted library allocation
page execute and read and write
421E000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
3FAF000
trusted library allocation
page read and write
6E4E000
stack
page read and write
70C0000
trusted library allocation
page read and write
6935000
trusted library allocation
page read and write
6908000
trusted library allocation
page read and write
3F82000
trusted library allocation
page read and write
102B000
heap
page read and write
70B0000
trusted library allocation
page read and write
71A0000
heap
page read and write
690A000
trusted library allocation
page read and write
58C0000
heap
page read and write
1165000
heap
page read and write
F8E000
heap
page read and write
83DE000
stack
page read and write
8C80000
heap
page read and write
6920000
trusted library allocation
page read and write
7721000
heap
page read and write
68F2000
trusted library allocation
page read and write
6670000
heap
page read and write
7C90000
trusted library allocation
page execute and read and write
5880000
trusted library allocation
page read and write
7F970000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
11FE000
stack
page read and write
892E000
stack
page read and write
There are 342 hidden memdumps, click here to show them.