IOC Report
NjjLYnPSZr.exe

loading gif

Files

File Path
Type
Category
Malicious
NjjLYnPSZr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\s1951-LPl
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NjjLYnPSZr.exe
"C:\Users\user\Desktop\NjjLYnPSZr.exe"
malicious
C:\Program Files (x86)\GgYqMgcqoXPMXvtyiyEZaESyRKxvUmwsKaYTNWNknbnRFLfF\XFLTednCZUTqje.exe
"C:\Program Files (x86)\GgYqMgcqoXPMXvtyiyEZaESyRKxvUmwsKaYTNWNknbnRFLfF\XFLTednCZUTqje.exe"
malicious
C:\Windows\SysWOW64\compact.exe
"C:\Windows\SysWOW64\compact.exe"
malicious
C:\Program Files (x86)\GgYqMgcqoXPMXvtyiyEZaESyRKxvUmwsKaYTNWNknbnRFLfF\XFLTednCZUTqje.exe
"C:\Program Files (x86)\GgYqMgcqoXPMXvtyiyEZaESyRKxvUmwsKaYTNWNknbnRFLfF\XFLTednCZUTqje.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.mybodyradar.net/qyz6/?Sh=cO/WbHS7dDlPjWOw24pePOdtBvzI7qrstwS5E88tqn3GEGw6O6zMXAiSEd+QRtw+ArL2+ZdGEPoP/wr/W49OxjdcbcDVqf77kjZAc/w1Hn9qnxIMaTPUER4=&f6SpQ=_n84nZ4HGta
3.33.130.190
malicious
http://www.sacidasorte.com/dcai/?Sh=JzKwzxEjjJDs1ynMHer+TNevqF7oFKk+RBNCM6w6NpGOWZMZrcBh0esk0Vp2cdNARH8NLeIYDalhXOdQ0Ma7tvgTEF7hsrDYV+tcKJvJSVI5izhoL98hwXM=&f6SpQ=_n84nZ4HGta
3.33.130.190
malicious
http://www.beescy.xyz/m4qv/
162.0.213.72
malicious
http://www.66hc7.com/x35b/?Sh=fVDKJz+SStMVbfQUmkYKwfd/Kz5vW54YQ3dZU+tucUYAFBvCN7d4q6mFay3q8TR2KAYtpV66b4jE73PrL/8YW0e6Mz+digafyc3ZonBVmSzoReAw1BtBLHs=&f6SpQ=_n84nZ4HGta
162.209.189.212
malicious
http://www.beescy.xyz/m4qv/?Sh=P2TusARkbEgcEs+mDyMHtP9emvoSKlJZWWEgC4tjmOg8nAhT+FFe9yeelcBnkIXwjfDCMJlqRnnZfo12xo8UG7kWIL0+yfipd64llhGw+b1VwhgkmL0TKqs=&f6SpQ=_n84nZ4HGta
162.0.213.72
malicious
http://www.go2super.app/uqfz/?Sh=mcURcygGZpi8BUAEri2LzCX8yukoHIUSB9ATV0AA66/eXSD2DbYq2fDOBcTf2y0GiA7pk1o8xA7eBrRh6Cv9Vx9YWZ7NmBQtUSw3jvSSlGdRHD15Z6r2w2o=&f6SpQ=_n84nZ4HGta
3.33.130.190
malicious
http://www.personalcaresale.shop/7ug6/
104.21.21.230
malicious
http://www.66hc7.com/x35b/
162.209.189.212
malicious
http://www.zt555.shop/uj7x/
118.99.50.8
malicious
http://www.corverd.store/3nzp/
81.88.48.71
malicious
http://www.mybodyradar.net/qyz6/
3.33.130.190
malicious
http://www.ainude2.cloud/wzoz/
84.32.84.32
malicious
http://www.yourtech-agency.com/99um/?f6SpQ=_n84nZ4HGta&Sh=sejrBqbnhxLzIpZobXocfoJh7+Ax68vpI3pksmQcQlCqcURGXTbbLy2S/SU0nQLTr9eIuSCZyPnks+fy4cbgfRvRA7W8zuFue70e+ik0nvs8B1GRgQpORnQ=
109.234.166.180
malicious
http://www.go2super.app/uqfz/
3.33.130.190
malicious
http://www.corverd.store/3nzp/?Sh=PglkqFvbbyb87SegldF7644R50nw13706su3sEKMhHJ419d8UFlSgmN6uEUbiABfJzkrsK6wePLWTRJFKAJP15xlx/rUOqsRMQGimgyXa3wd/uL7sq2sISc=&f6SpQ=_n84nZ4HGta
81.88.48.71
malicious
http://www.yourtech-agency.com/99um/
109.234.166.180
malicious
http://www.yosoyemy.com/o1rp?Sh=TBsR9lfn
unknown
http://www.zt555.shop
unknown
http://yourtech-agency.com/99um/?f6SpQ=_n84nZ4HGta&Sh=sejrBqbnhxLzIpZobXocfoJh7
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.yosoyemy.com/o1rp/?Sh=TBsR9lfn+qQhrzhd4VN7whgaax1SSLbEYlfYc+CfPbvAogjyvhThgxnzNfioE4F1AGXhUEA9gsdduAUKMlkxrWhulp0A29FjViMz3Iaz4UFzPouUBmhdpGY=&f6SpQ=_n84nZ4HGta
34.120.137.41
https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://goge8opp.com:301
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.1.1/gsap.min.js
unknown
http://www.yosoyemy.com/o1rp/
34.120.137.41
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sacidasorte.com
3.33.130.190
malicious
kloeti.pc205kopl.com
162.209.189.212
malicious
www.tigun.top
23.249.190.35
malicious
www.beescy.xyz
162.0.213.72
malicious
go2super.app
3.33.130.190
malicious
corverd.store
81.88.48.71
malicious
www.personalcaresale.shop
104.21.21.230
malicious
yourtech-agency.com
109.234.166.180
malicious
mybodyradar.net
3.33.130.190
malicious
ainude2.cloud
84.32.84.32
malicious
www.ainude2.cloud
unknown
malicious
www.zt555.shop
unknown
malicious
www.sacidasorte.com
unknown
malicious
www.go2super.app
unknown
malicious
www.yourtech-agency.com
unknown
malicious
www.66hc7.com
unknown
malicious
www.mybodyradar.net
unknown
malicious
www.yosoyemy.com
unknown
malicious
www.corverd.store
unknown
malicious
connect.hostinger.com
34.120.137.41
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
109.234.166.180
yourtech-agency.com
France
malicious
162.0.213.72
www.beescy.xyz
Canada
malicious
162.209.189.212
kloeti.pc205kopl.com
United States
malicious
118.99.50.8
unknown
Hong Kong
malicious
84.32.84.32
ainude2.cloud
Lithuania
malicious
104.21.21.230
www.personalcaresale.shop
United States
malicious
3.33.130.190
sacidasorte.com
United States
malicious
81.88.48.71
corverd.store
Italy
malicious
34.120.137.41
connect.hostinger.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
35A0000
trusted library allocation
page read and write
malicious
5500000
system
page execute and read and write
malicious
3490000
unkown
page execute and read and write
malicious
DF1000
unkown
page execute and read and write
malicious
35F0000
trusted library allocation
page read and write
malicious
1E70000
unclassified section
page execute and read and write
malicious
D60000
unclassified section
page execute and read and write
malicious
30E0000
system
page execute and read and write
malicious
AE0000
unkown
page readonly
3481000
heap
page read and write
1F84000
unclassified section
page execute and read and write
3481000
heap
page read and write
3481000
heap
page read and write
1090000
unkown
page readonly
3481000
heap
page read and write
5578000
system
page execute and read and write
31C4000
heap
page read and write
3481000
heap
page read and write
F34000
heap
page read and write
5F4000
heap
page read and write
32A8000
heap
page read and write
1D7E82BE000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
5F4000
heap
page read and write
3221000
heap
page read and write
570000
heap
page read and write
3C8E000
unkown
page read and write
3481000
heap
page read and write
8039000
heap
page read and write
30A8000
stack
page read and write
3481000
heap
page read and write
2DE4000
heap
page read and write
1200000
unkown
page readonly
3481000
heap
page read and write
37D8000
unkown
page read and write
3481000
heap
page read and write
32D0000
heap
page read and write
1D7E8000000
trusted library allocation
page read and write
809D000
heap
page read and write
3C4C000
unclassified section
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3580000
heap
page read and write
37E0000
direct allocation
page execute and read and write
BD0000
unkown
page readonly
919000
heap
page read and write
32D9000
heap
page read and write
8034000
heap
page read and write
3481000
heap
page read and write
32B9000
heap
page read and write
3481000
heap
page read and write
91E000
heap
page read and write
3226000
heap
page read and write
5016000
unclassified section
page read and write
B6E000
unkown
page readonly
3481000
heap
page read and write
31C4000
heap
page read and write
3481000
heap
page read and write
B60000
unkown
page readonly
876E000
stack
page read and write
3481000
heap
page read and write
3E20000
unkown
page read and write
3481000
heap
page read and write
2C40000
unkown
page readonly
322C000
heap
page read and write
2655C000
system
page read and write
3481000
heap
page read and write
4E84000
unclassified section
page read and write
2C40000
unkown
page readonly
3481000
heap
page read and write
1D7E64EC000
system
page execute and read and write
1D7E65D0000
heap
page read and write
86749FE000
stack
page read and write
A50000
unkown
page readonly
3481000
heap
page read and write
B60000
unkown
page readonly
2DF2000
unkown
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1D7E82A5000
trusted library allocation
page read and write
B61000
unkown
page execute read
B5A000
stack
page read and write
35AA000
heap
page read and write
3226000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
5588000
system
page execute and read and write
2A90000
unkown
page execute and read and write
AD1000
heap
page read and write
3481000
heap
page read and write
3633000
heap
page read and write
3217000
heap
page read and write
F6D000
heap
page read and write
1210000
heap
page read and write
3481000
heap
page read and write
BF0000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
41F4000
unclassified section
page read and write
3481000
heap
page read and write
A50000
unkown
page readonly
49CE000
unclassified section
page read and write
2EB2000
unkown
page read and write
3222000
heap
page read and write
3481000
heap
page read and write
B40000
unkown
page read and write
32C6000
heap
page read and write
870000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
F20000
unkown
page read and write
306B000
stack
page read and write
B61000
unkown
page execute read
35A4000
unkown
page execute and read and write
3481000
heap
page read and write
3481000
heap
page read and write
2984000
unclassified section
page execute and read and write
3481000
heap
page read and write
2C30000
heap
page read and write
5F4000
heap
page read and write
A30000
unkown
page readonly
AD1000
heap
page read and write
890000
unkown
page readonly
3481000
heap
page read and write
10FF000
stack
page read and write
B61000
unkown
page execute read
67FE000
stack
page read and write
1591000
unkown
page readonly
11F0000
unkown
page read and write
91E000
heap
page read and write
30CC000
unkown
page read and write
D60000
direct allocation
page read and write
DF0000
unkown
page readonly
86751FE000
stack
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
2DE4000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1460000
heap
page read and write
80A9000
heap
page read and write
1030000
unkown
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
5F0000
heap
page read and write
AD1000
heap
page read and write
80A5000
heap
page read and write
80A2000
heap
page read and write
5CE000
stack
page read and write
3481000
heap
page read and write
BC0000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
F7E000
stack
page read and write
B51000
unkown
page readonly
3481000
heap
page read and write
B5A000
stack
page read and write
8130000
trusted library allocation
page read and write
3481000
heap
page read and write
321B000
heap
page read and write
3481000
heap
page read and write
3226000
heap
page read and write
80B4000
heap
page read and write
F3E000
stack
page read and write
118E000
direct allocation
page execute and read and write
3481000
heap
page read and write
556D000
system
page execute and read and write
86759FF000
stack
page read and write
1210000
heap
page read and write
55EB000
system
page execute and read and write
4B60000
unclassified section
page read and write
3481000
heap
page read and write
51C000
stack
page read and write
321D000
heap
page read and write
1D7E8201000
trusted library allocation
page read and write
2DF2000
unkown
page read and write
3481000
heap
page read and write
FF0000
direct allocation
page execute and read and write
3481000
heap
page read and write
32CC000
heap
page read and write
3481000
heap
page read and write
2BEC000
unkown
page read and write
87AF000
stack
page read and write
802F000
heap
page read and write
3481000
heap
page read and write
913000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
BE0000
heap
page read and write
B60000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1D7E82C4000
trusted library allocation
page read and write
1030000
unkown
page read and write
91E000
heap
page read and write
3481000
heap
page read and write
1021000
unkown
page readonly
3481000
heap
page read and write
3487000
heap
page read and write
11EF000
stack
page read and write
3481000
heap
page read and write
6540000
trusted library allocation
page read and write
5F4000
heap
page read and write
804B000
heap
page read and write
3481000
heap
page read and write
EFC000
stack
page read and write
12C1000
direct allocation
page execute and read and write
3481000
heap
page read and write
397E000
direct allocation
page execute and read and write
BE0000
unkown
page readonly
46AA000
unclassified section
page read and write
1D7E8100000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
37A0000
trusted library allocation
page read and write
32C3000
heap
page read and write
D0E000
stack
page read and write
3481000
heap
page read and write
BE0000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
31C4000
heap
page read and write
3481000
heap
page read and write
5594000
system
page execute and read and write
3481000
heap
page read and write
1D7E8200000
trusted library allocation
page read and write
3532000
unkown
page execute and read and write
913000
heap
page read and write
3481000
heap
page read and write
10E0000
heap
page read and write
32EA000
heap
page read and write
1021000
unkown
page readonly
8051000
heap
page read and write
1D7E6620000
heap
page read and write
91E000
heap
page read and write
3481000
heap
page read and write
1D7E810A000
trusted library allocation
page read and write
3760000
heap
page read and write
D60000
direct allocation
page read and write
26442000
system
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
900000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
5F4000
heap
page read and write
3481000
heap
page read and write
31C0000
heap
page read and write
3481000
heap
page read and write
1119000
direct allocation
page execute and read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1D7E65F0000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1100000
heap
page read and write
4CF2000
unclassified section
page read and write
3481000
heap
page read and write
3646000
unkown
page read and write
90E000
heap
page read and write
3481000
heap
page read and write
390D000
direct allocation
page execute and read and write
3227000
heap
page read and write
1D7E7FA0000
trusted library allocation
page read and write
3481000
heap
page read and write
8082000
heap
page read and write
B77000
unkown
page readonly
82A0000
heap
page read and write
DF1000
unkown
page execute read
3580000
trusted library allocation
page read and write
3481000
heap
page read and write
111D000
direct allocation
page execute and read and write
8032000
heap
page read and write
3481000
heap
page read and write
1D7E7FA0000
trusted library allocation
page read and write
BE0000
heap
page read and write
EFF000
stack
page read and write
3481000
heap
page read and write
A30000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
880000
unkown
page readonly
3481000
heap
page read and write
2DE0000
heap
page read and write
3481000
heap
page read and write
8087000
heap
page read and write
3481000
heap
page read and write
483C000
unclassified section
page read and write
3481000
heap
page read and write
B60000
unkown
page readonly
3274000
heap
page read and write
90A000
heap
page read and write
322C000
heap
page read and write
805B000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
919000
heap
page read and write
B6E000
unkown
page readonly
BF0000
heap
page read and write
3481000
heap
page read and write
122F000
heap
page read and write
BD0000
unkown
page readonly
3AB1000
direct allocation
page execute and read and write
375C000
heap
page read and write
3481000
heap
page read and write
5F4000
heap
page read and write
803D000
heap
page read and write
1131000
heap
page read and write
3481000
heap
page read and write
32FF000
heap
page read and write
590000
direct allocation
page read and write
3481000
heap
page read and write
1D7E810E000
trusted library allocation
page read and write
396A000
unkown
page read and write
31B0000
heap
page read and write
3481000
heap
page read and write
10B0000
unkown
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
890000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
1010000
unkown
page read and write
B51000
unkown
page readonly
3481000
heap
page read and write
1310000
unkown
page readonly
3481000
heap
page read and write
10B0000
unkown
page read and write
1470000
unclassified section
page execute and read and write
3481000
heap
page read and write
F30000
heap
page read and write
1D7E64B0000
system
page execute and read and write
3470000
heap
page read and write
5F4000
heap
page read and write
1D7E8117000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
B77000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
32E4000
heap
page read and write
100E000
stack
page read and write
321D000
heap
page read and write
26502000
system
page read and write
3481000
heap
page read and write
330C000
heap
page read and write
572C000
unkown
page read and write
A60000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3FB2000
unkown
page read and write
8090000
heap
page read and write
9FC000
stack
page read and write
3481000
heap
page read and write
80AA000
heap
page read and write
1D7E6622000
heap
page read and write
683E000
stack
page read and write
F30000
heap
page read and write
2671C000
system
page read and write
8099000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1D7E82CE000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
A40000
unkown
page readonly
808C000
heap
page read and write
3481000
heap
page read and write
AD0000
unkown
page readonly
8FA000
stack
page read and write
AD7000
heap
page read and write
B75000
unkown
page read and write
1D7E8121000
trusted library allocation
page read and write
8FA000
stack
page read and write
3481000
heap
page read and write
32F4000
heap
page read and write
3481000
heap
page read and write
26B04000
system
page read and write
AE0000
unkown
page readonly
4386000
unclassified section
page read and write
5F4000
heap
page read and write
30CC000
unkown
page read and write
3480000
heap
page read and write
3481000
heap
page read and write
1218000
heap
page read and write
3481000
heap
page read and write
80A0000
heap
page read and write
3B32000
unclassified section
page read and write
1D7E660C000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
880000
unkown
page readonly
AF0000
unkown
page readonly
1010000
unkown
page read and write
CD9000
unkown
page read and write
3481000
heap
page read and write
1D7E6622000
heap
page read and write
91E000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1332000
direct allocation
page execute and read and write
A60000
heap
page read and write
108E000
stack
page read and write
32B4000
heap
page read and write
37A0000
trusted library allocation
page read and write
11EF000
stack
page read and write
5F4000
heap
page read and write
3481000
heap
page read and write
F00000
unkown
page readonly
B77000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
B61000
unkown
page execute read
3481000
heap
page read and write
1310000
unkown
page readonly
2DE0000
heap
page read and write
1D7E8111000
trusted library allocation
page read and write
3481000
heap
page read and write
806E000
heap
page read and write
3481000
heap
page read and write
1D7E661B000
heap
page read and write
B6E000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
37A0000
trusted library allocation
page read and write
100E000
stack
page read and write
580000
heap
page read and write
1100000
heap
page read and write
2BAF000
stack
page read and write
DF0000
unkown
page readonly
32FD000
heap
page read and write
3226000
heap
page read and write
AD0000
unkown
page readonly
8056000
heap
page read and write
3481000
heap
page read and write
8FB000
stack
page read and write
D10000
direct allocation
page read and write
3481000
heap
page read and write
934000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
808F000
heap
page read and write
B75000
unkown
page read and write
FF0000
heap
page read and write
321B000
heap
page read and write
1D7E6580000
heap
page read and write
BFA000
heap
page read and write
3481000
heap
page read and write
2C30000
heap
page read and write
5F4000
heap
page read and write
12BD000
direct allocation
page execute and read and write
4144000
unkown
page read and write
3481000
heap
page read and write
86741FB000
stack
page read and write
1200000
unkown
page readonly
E40000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3210000
heap
page read and write
924000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
36F0000
trusted library allocation
page execute and read and write
32F9000
heap
page read and write
3481000
heap
page read and write
29A0000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
16A0000
unkown
page readonly
3481000
heap
page read and write
34B4000
unkown
page read and write
AD0000
heap
page read and write
3221000
heap
page read and write
4518000
unclassified section
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3160000
heap
page read and write
3226000
heap
page read and write
10C0000
unkown
page read and write
8120000
trusted library allocation
page read and write
F34000
heap
page read and write
A40000
unkown
page readonly
1D7E65F7000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3306000
heap
page read and write
51A8000
unclassified section
page read and write
3909000
direct allocation
page execute and read and write
924000
heap
page read and write
BCE000
stack
page read and write
1591000
unkown
page readonly
16A1000
unkown
page readonly
D60000
direct allocation
page read and write
EFC000
stack
page read and write
1D7E7F90000
heap
page read and write
1F12000
unclassified section
page execute and read and write
FF0000
heap
page read and write
3B22000
direct allocation
page execute and read and write
3640000
trusted library allocation
page read and write
F69000
heap
page read and write
AF0000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
B75000
unkown
page read and write
1090000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
320F000
stack
page read and write
B77000
unkown
page readonly
3481000
heap
page read and write
B40000
unkown
page read and write
1D7E64F0000
system
page execute and read and write
3481000
heap
page read and write
8024000
heap
page read and write
3481000
heap
page read and write
BD0000
unkown
page read and write
42D6000
unkown
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3AFC000
unkown
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
F00000
unkown
page readonly
3481000
heap
page read and write
BC0000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
37D1000
heap
page read and write
F20000
unkown
page read and write
3481000
heap
page read and write
31AE000
stack
page read and write
8096000
heap
page read and write
9FC000
stack
page read and write
91E000
heap
page read and write
3481000
heap
page read and write
BD0000
unkown
page read and write
3481000
heap
page read and write
CCF000
stack
page read and write
3AAD000
direct allocation
page execute and read and write
10E0000
heap
page read and write
1D7E6590000
heap
page read and write
3BF2000
unclassified section
page read and write
2F0C000
unkown
page read and write
FDE000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1108000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1218000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
1D7E8103000
trusted library allocation
page read and write
B75000
unkown
page read and write
91D000
heap
page read and write
4468000
unkown
page read and write
3FA4000
unkown
page execute and read and write
B6E000
unkown
page readonly
3481000
heap
page read and write
1108000
heap
page read and write
870000
unkown
page readonly
3481000
heap
page read and write
3481000
heap
page read and write
29A0000
unkown
page readonly
3481000
heap
page read and write
3E0C000
unclassified section
page read and write
10E5000
heap
page read and write
3481000
heap
page read and write
There are 577 hidden memdumps, click here to show them.