IOC Report
gYjK72gL17.exe

loading gif

Files

File Path
Type
Category
Malicious
gYjK72gL17.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\DBKFHCFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\EGDGIIJJECFIDHJJKKFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCGHJEBGHJKEBFHIJDHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HDBGDHDAECBGDHJKFIDGCBFBKF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJKEBGHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJKEBGHJKFIDGCAAFCAF
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\KKJKKJJKJEGIECAKJJEBFBAKKE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\252e7d07-b478-4722-bb94-6b2eaa7af594.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\264edf46-72ae-453e-8261-d41926552db7.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\355871f4-f58a-4aa9-aa0a-9fd00255b8bc.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\75eb5b88-57b2-4210-8cf3-258c564005e8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8f35d30d-7e2b-4cb4-8012-3ff345bc9805.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-676AB0D9-1FEC.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF388e8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF388f7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39684.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39694.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (859)
downloaded
Chrome Cache Entry: 84
ASCII text
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (2410)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 88
SVG Scalable Vector Graphics image
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\gYjK72gL17.exe
"C:\Users\user\Desktop\gYjK72gL17.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 --field-trial-handle=2324,i,1475862429204762952,15165259420851730460,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2320,i,3391580961989094564,10660087592265685708,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2308 --field-trial-handle=2188,i,279746520434431833,257325066205650014,262144 /prefetch:3
malicious

URLs

Name
IP
Malicious
http://185.231.69.191/ec05bb5a9eb90166/mozglue.dll
185.231.69.191
malicious
http://185.231.69.191/
185.231.69.191
malicious
http://185.231.69.191/ec05bb5a9eb90166/nss3.dll
185.231.69.191
malicious
http://185.231.69.191/ec05bb5a9eb90166/softokn3.dll
185.231.69.191
malicious
http://185.231.69.191/ec05bb5a9eb90166/msvcp140.dll
185.231.69.191
malicious
185.231.69.191/f190e2808a5419c3.php
malicious
http://185.231.69.191/ec05bb5a9eb90166/sqlite3.dll
185.231.69.191
malicious
http://185.231.69.191/ec05bb5a9eb90166/freebl3.dll
185.231.69.191
malicious
http://185.231.69.191/ec05bb5a9eb90166/vcruntime140.dll
185.231.69.191
malicious
http://185.231.69.191/f190e2808a5419c3.php
185.231.69.191
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://185.231.69.191/f190e2808a5419c3.phpft
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://185.231.69.191/ec05bb5a9eb90166/freebl3.dllCf
unknown
http://www.broofa.com
unknown
http://ocsp.sectigo.com0
unknown
http://185.231.69.191/f190e2808a5419c3.php2L
unknown
http://185.231.69.191ata
unknown
http://185.231.69.191/f190e2808a5419c3.phpata
unknown
http://185.231.69.191/f190e2808a5419c3.phpf
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.231.69.191/f190e2808a5419c3.phprowser
unknown
http://185.231.69.191/f190e2808a5419c3.phpJj
unknown
http://185.231.69.191/f190e2808a5419c3.phpirefox
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
http://185.231.69.191f190e2808a5419c3.php59aef09ac94adad262762b7dcff87lt-release
unknown
http://185.231.69.191/ec05bb5a9eb90166/mozglue.dllGg
unknown
http://185.231.69.191/ec05bb5a9eb90166/vcruntime140.dll$a/
unknown
http://185.231.69.191/ec05bb5a9eb90166/softokn3.dllkg
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.231.69.191/ec05bb5a9eb90166/freebl3.dll3g
unknown
http://185.231.69.191/f190e2808a5419c3.php-minuser-l1-1-0
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.68
https://apis.google.com
unknown
http://185.231.69.191/f190e2808a5419c3.phpdll
unknown
http://www.sqlite.org/copyright.html.
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
http://185.231.69.191/f190e2808a5419c3.phpzL
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://sectigo.com/CPS0
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.231.69.191/f190e2808a5419c3.phperbird
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.231.69.191/f190e2808a5419c3.phpme
unknown
http://185.231.69.191/f190e2808a5419c3.php)
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.231.69.191/ec05bb5a9eb90166/nss3.dllk
unknown
https://www.google.com/async/newtab_promos
142.250.181.68
http://185.231.69.191
unknown
http://185.231.69.191/f190e2808a5419c3.phpnL
unknown
http://185.231.69.191/f190e2808a5419c3.phpEcF
unknown
http://185.231.69.191/f190e2808a5419c3.phpbL
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
http://185.231.69.191/_u
unknown
http://185.231.69.191/ec05bb5a9eb90166/softokn3.dll/f
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.68
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.68
http://185.231.69.191/ec05bb5a9eb90166/nss3.dllv
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.231.69.191/f190e2808a5419c3.phpcation
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://185.231.69.191/ec05bb5a9eb90166/msvcp140.dllMf
unknown
http://185.231.69.191/f190e2808a5419c3.phpF
unknown
https://support.mozilla.org
unknown
http://185.231.69.191/f190e2808a5419c3.phpP
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
172.217.17.46
www.google.com
142.250.181.68
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
185.231.69.191
unknown
Ukraine
malicious
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1527000
heap
page read and write
malicious
1EB000
unkown
page readonly
malicious
6CA40000
unkown
page readonly
1840000
trusted library allocation
page read and write
9AFD000
heap
page read and write
1C0000
unkown
page readonly
13F4000
heap
page read and write
9B01000
heap
page read and write
397F000
stack
page read and write
13F4000
heap
page read and write
6CC1F000
unkown
page write copy
61E01000
direct allocation
page execute read
1721000
heap
page read and write
13F4000
heap
page read and write
9B1F000
heap
page read and write
1721000
heap
page read and write
1F7000
unkown
page read and write
327000
unkown
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
9C30000
heap
page read and write
9AFE000
heap
page read and write
275000
unkown
page read and write
156E000
heap
page read and write
9B1F000
heap
page read and write
9B14000
heap
page read and write
13CE000
stack
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
1721000
heap
page read and write
9B19000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
359F000
stack
page read and write
13F4000
heap
page read and write
9C48000
heap
page read and write
9B14000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
6CA0E000
unkown
page read and write
9AFB000
heap
page read and write
9BF0000
heap
page read and write
9B14000
heap
page read and write
161C000
heap
page read and write
61ED0000
direct allocation
page read and write
13F4000
heap
page read and write
9AE0000
heap
page read and write
9B1F000
heap
page read and write
15E3000
heap
page read and write
9B99000
heap
page read and write
1721000
heap
page read and write
9B07000
heap
page read and write
6CA41000
unkown
page execute read
13F4000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
6CC20000
unkown
page read and write
1551000
heap
page read and write
13F4000
heap
page read and write
1C0000
unkown
page readonly
13F4000
heap
page read and write
9AFE000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
9AFE000
heap
page read and write
9AEB000
heap
page read and write
13F4000
heap
page read and write
9AFC000
heap
page read and write
1721000
heap
page read and write
9B07000
heap
page read and write
3F8000
unkown
page read and write
9CA1000
heap
page read and write
61EB7000
direct allocation
page readonly
13F4000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
3AED000
stack
page read and write
13F4000
heap
page read and write
9B00000
heap
page read and write
9AF1000
heap
page read and write
9DBC000
heap
page read and write
9DC0000
heap
page read and write
15C6000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
9AFE000
heap
page read and write
9AED000
heap
page read and write
9B1F000
heap
page read and write
9B07000
heap
page read and write
1721000
heap
page read and write
9AED000
heap
page read and write
10D72000
heap
page read and write
9AE0000
trusted library allocation
page read and write
13F4000
heap
page read and write
9C45000
heap
page read and write
61EB4000
direct allocation
page read and write
438000
unkown
page execute read
6CC25000
unkown
page readonly
432000
unkown
page read and write
9B1F000
heap
page read and write
13F4000
heap
page read and write
9B96000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
9AFA000
heap
page read and write
1721000
heap
page read and write
371D000
stack
page read and write
9C10000
heap
page read and write
9CF0000
trusted library allocation
page read and write
13F4000
heap
page read and write
9B07000
heap
page read and write
9AFE000
heap
page read and write
9B32000
heap
page read and write
13F4000
heap
page read and write
6CC1E000
unkown
page read and write
9B1F000
heap
page read and write
9AEB000
heap
page read and write
1830000
heap
page read and write
1721000
heap
page read and write
1740000
heap
page read and write
381D000
stack
page read and write
9B1F000
heap
page read and write
9B07000
heap
page read and write
1566000
heap
page read and write
13F4000
heap
page read and write
9B14000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
9B1F000
heap
page read and write
9AFC000
heap
page read and write
9B07000
heap
page read and write
9DCA000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
35DE000
stack
page read and write
1721000
heap
page read and write
9B14000
heap
page read and write
15D0000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
6C980000
unkown
page readonly
1738000
heap
page read and write
15D6000
heap
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
9C32000
heap
page read and write
9B1F000
heap
page read and write
1380000
heap
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
B2F000
unkown
page readonly
13F4000
heap
page read and write
697000
unkown
page execute read
9DC4000
heap
page read and write
9AFA000
heap
page read and write
14F0000
heap
page read and write
9AFB000
heap
page read and write
11280000
heap
page read and write
1721000
heap
page read and write
9B1F000
heap
page read and write
9B1F000
heap
page read and write
36DD000
stack
page read and write
13F4000
heap
page read and write
61ECC000
direct allocation
page read and write
B2F000
unkown
page readonly
13F4000
heap
page read and write
61E00000
direct allocation
page execute and read and write
13F4000
heap
page read and write
1721000
heap
page read and write
9B14000
heap
page read and write
187D000
stack
page read and write
6CA12000
unkown
page readonly
9B14000
heap
page read and write
13E0000
heap
page read and write
9AE4000
heap
page read and write
1721000
heap
page read and write
9AF3000
heap
page read and write
13F4000
heap
page read and write
244000
unkown
page read and write
9AFE000
heap
page read and write
3B70000
trusted library allocation
page read and write
9B03000
heap
page read and write
14FC000
heap
page read and write
9B07000
heap
page read and write
1586000
heap
page read and write
9AFE000
heap
page read and write
15CB000
heap
page read and write
13F4000
heap
page read and write
107E0000
heap
page read and write
13F4000
heap
page read and write
3B71000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
9B1F000
heap
page read and write
1333000
stack
page read and write
9B0A000
heap
page read and write
13F4000
heap
page read and write
6C9FD000
unkown
page readonly
197E000
stack
page read and write
39ED000
stack
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
9AFE000
heap
page read and write
1721000
heap
page read and write
61ECD000
direct allocation
page readonly
9B14000
heap
page read and write
13F4000
heap
page read and write
9B1F000
heap
page read and write
13F4000
heap
page read and write
61ED4000
direct allocation
page readonly
13F4000
heap
page read and write
9B14000
heap
page read and write
1721000
heap
page read and write
9C36000
heap
page read and write
9B07000
heap
page read and write
3980000
heap
page read and write
9B05000
heap
page read and write
9DC8000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
14F3000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
15DD000
heap
page read and write
13F4000
heap
page read and write
9B1E000
heap
page read and write
9B1F000
heap
page read and write
9D20000
trusted library allocation
page read and write
9C3C000
heap
page read and write
13F4000
heap
page read and write
13F0000
heap
page read and write
6CBDF000
unkown
page readonly
387E000
stack
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
9B32000
heap
page read and write
1586000
heap
page read and write
9C34000
heap
page read and write
1721000
heap
page read and write
9B14000
heap
page read and write
1721000
heap
page read and write
9B14000
heap
page read and write
1520000
heap
page read and write
13F4000
heap
page read and write
9AF4000
heap
page read and write
1721000
heap
page read and write
123B000
stack
page read and write
13F4000
heap
page read and write
9B14000
heap
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
9B06000
heap
page read and write
1338000
stack
page read and write
9B04000
heap
page read and write
9AFF000
heap
page read and write
1721000
heap
page read and write
349E000
stack
page read and write
9B03000
heap
page read and write
9AFE000
heap
page read and write
14FE000
heap
page read and write
9BE0000
heap
page read and write
9DA0000
heap
page read and write
9B1E000
heap
page read and write
9C91000
heap
page read and write
9B07000
heap
page read and write
13F4000
heap
page read and write
290000
unkown
page read and write
9C4E000
heap
page read and write
107EA000
heap
page read and write
9B07000
heap
page read and write
9C51000
heap
page read and write
13F4000
heap
page read and write
1721000
heap
page read and write
1721000
heap
page read and write
9C71000
heap
page read and write
40A000
unkown
page execute read
9B1E000
heap
page read and write
1720000
heap
page read and write
9B14000
heap
page read and write
6C981000
unkown
page execute read
9B07000
heap
page read and write
9B14000
heap
page read and write
61ED3000
direct allocation
page read and write
9AFB000
heap
page read and write
1C1000
unkown
page execute read
9B07000
heap
page read and write
13F4000
heap
page read and write
1721000
heap
page read and write
13F4000
heap
page read and write
9B03000
heap
page read and write
9BA8000
heap
page read and write
294000
unkown
page read and write
9B05000
heap
page read and write
697000
unkown
page execute read
9B14000
heap
page read and write
171E000
stack
page read and write
9AE0000
trusted library allocation
page read and write
13F4000
heap
page read and write
9B14000
heap
page read and write
177E000
heap
page read and write
There are 298 hidden memdumps, click here to show them.