IOC Report
indent PWS-020199.exe

loading gif

Files

File Path
Type
Category
Malicious
indent PWS-020199.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\indent PWS-020199.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\3e3-f82u
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\indent PWS-020199.exe
"C:\Users\user\Desktop\indent PWS-020199.exe"
malicious
C:\Users\user\Desktop\indent PWS-020199.exe
"C:\Users\user\Desktop\indent PWS-020199.exe"
malicious
C:\Program Files (x86)\gViiywGAqDFnuDeYrObRKFjHQKnadWhwklVyFyfLKFwXTeSDVALGZtmQjPClruEOWSCT\lcrjuTMWUAGqsgBEuAeJAHVUCegE.exe
"C:\Program Files (x86)\gViiywGAqDFnuDeYrObRKFjHQKnadWhwklVyFyfLKFwXTeSDVALGZtmQjPClruEOWSCT\lcrjuTMWUAGqsgBEuAeJAHVUCegE.exe"
malicious
C:\Windows\SysWOW64\netiougc.exe
"C:\Windows\SysWOW64\netiougc.exe"
malicious
C:\Program Files (x86)\gViiywGAqDFnuDeYrObRKFjHQKnadWhwklVyFyfLKFwXTeSDVALGZtmQjPClruEOWSCT\lcrjuTMWUAGqsgBEuAeJAHVUCegE.exe
"C:\Program Files (x86)\gViiywGAqDFnuDeYrObRKFjHQKnadWhwklVyFyfLKFwXTeSDVALGZtmQjPClruEOWSCT\lcrjuTMWUAGqsgBEuAeJAHVUCegE.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.eylmpwjot.store/3mcu/
43.132.189.227
malicious
http://www.hellokong.xyz/ov93/
203.161.49.220
malicious
http://www.netgain360.online/7w6o/
66.96.162.130
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.searchvity.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.eylmpwjot.store
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.searchvity.com/?dn=
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.artvectorcraft.store/jabf/
142.250.74.211
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mareomnia.com/ya74/?dBOL8fg=
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.netgain360.online
66.96.162.130
malicious
www.hellokong.xyz
203.161.49.220
malicious
www.eylmpwjot.store
43.132.189.227
malicious
www.artvectorcraft.store
unknown
malicious
www.xxikcn20.icu
unknown
malicious
ghs.google.com
142.250.74.211
www.mareomnia.com
81.4.100.198

IPs

IP
Domain
Country
Malicious
43.132.189.227
www.eylmpwjot.store
Japan
malicious
66.96.162.130
www.netgain360.online
United States
malicious
203.161.49.220
www.hellokong.xyz
Malaysia
malicious
81.4.100.198
www.mareomnia.com
Netherlands
142.250.74.211
ghs.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
35B0000
trusted library allocation
page read and write
malicious
35F0000
trusted library allocation
page read and write
malicious
2600000
unkown
page execute and read and write
malicious
1360000
unclassified section
page execute and read and write
malicious
17D0000
unclassified section
page execute and read and write
malicious
3210000
system
page execute and read and write
malicious
33C8000
heap
page read and write
58E0000
heap
page read and write
1FE2000
system
page read and write
3651000
heap
page read and write
7692000
trusted library allocation
page read and write
3651000
heap
page read and write
7FA0000
heap
page read and write
175C3EA6000
trusted library allocation
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
96E000
heap
page read and write
11C8000
heap
page read and write
2400000
heap
page read and write
DF0000
unkown
page readonly
E69000
unkown
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3294000
heap
page read and write
2EC0000
unkown
page readonly
3651000
heap
page read and write
3651000
heap
page read and write
5744000
system
page execute and read and write
79B0000
trusted library allocation
page execute and read and write
5BE5000
heap
page read and write
3651000
heap
page read and write
1A10000
trusted library allocation
page execute and read and write
C3C000
stack
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
2D34000
heap
page read and write
175C3A20000
trusted library allocation
page read and write
3651000
heap
page read and write
330C000
heap
page read and write
3651000
heap
page read and write
175C3A20000
trusted library allocation
page read and write
610000
unkown
page readonly
5930000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
647000
unkown
page readonly
2CC15FE000
stack
page read and write
3E12000
unclassified section
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
1690000
trusted library allocation
page read and write
3651000
heap
page read and write
16B8000
heap
page read and write
B66E000
stack
page read and write
175C21A3000
heap
page read and write
337D000
heap
page read and write
844E000
stack
page read and write
33EB000
heap
page read and write
1028000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
5B10000
trusted library section
page readonly
69AE000
stack
page read and write
2D30000
heap
page read and write
3361000
heap
page read and write
3651000
heap
page read and write
175C3C00000
trusted library allocation
page read and write
33A7000
heap
page read and write
3998000
unkown
page read and write
32DE000
stack
page read and write
C8BE000
stack
page read and write
3933000
heap
page read and write
18B0000
unkown
page readonly
11C8000
heap
page read and write
175C3E01000
trusted library allocation
page read and write
3651000
heap
page read and write
E66000
unkown
page read and write
1500000
unkown
page read and write
3651000
heap
page read and write
175C21A0000
heap
page read and write
33D9000
heap
page read and write
1A0E000
stack
page read and write
3651000
heap
page read and write
63E000
unkown
page readonly
3651000
heap
page read and write
48CA000
unclassified section
page read and write
3651000
heap
page read and write
11B0000
unkown
page readonly
3651000
heap
page read and write
3651000
heap
page read and write
1000000
unkown
page readonly
D3B000
stack
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
7FD2000
heap
page read and write
B670000
trusted library section
page read and write
175C3EBE000
trusted library allocation
page read and write
63E000
unkown
page readonly
3651000
heap
page read and write
175C217A000
heap
page read and write
CBFE000
stack
page read and write
3651000
heap
page read and write
81A8000
heap
page read and write
3651000
heap
page read and write
12E0000
heap
page read and write
3651000
heap
page read and write
16A0000
trusted library allocation
page read and write
3366000
heap
page read and write
81DE000
heap
page read and write
14F7000
stack
page read and write
3651000
heap
page read and write
5900000
heap
page read and write
572A000
system
page execute and read and write
328C000
unkown
page read and write
237E000
stack
page read and write
5D00000
heap
page read and write
131F000
stack
page read and write
3651000
heap
page read and write
36F7000
unkown
page execute and read and write
3651000
heap
page read and write
1EC7000
unclassified section
page execute and read and write
16F8000
heap
page read and write
3651000
heap
page read and write
1A37000
heap
page read and write
3651000
heap
page read and write
820000
heap
page read and write
645000
unkown
page read and write
21FC000
system
page read and write
620000
unkown
page readonly
3651000
heap
page read and write
13D0000
heap
page read and write
7BC000
stack
page read and write
16B0000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
2400000
heap
page read and write
3651000
heap
page read and write
850F000
stack
page read and write
3651000
heap
page read and write
88BE000
stack
page read and write
63E000
unkown
page readonly
3651000
heap
page read and write
3440000
heap
page execute and read and write
2E60000
unkown
page read and write
18AE000
stack
page read and write
168D000
trusted library allocation
page execute and read and write
3651000
heap
page read and write
3294000
heap
page read and write
96A000
heap
page read and write
330C000
heap
page read and write
1650000
trusted library allocation
page read and write
810000
unkown
page readonly
3651000
heap
page read and write
5AF0000
trusted library allocation
page execute and read and write
3651000
heap
page read and write
3651000
heap
page read and write
950000
unkown
page readonly
3651000
heap
page read and write
3651000
heap
page read and write
610000
unkown
page readonly
5A3F000
stack
page read and write
5922000
trusted library allocation
page read and write
3651000
heap
page read and write
FF2000
unkown
page readonly
1500000
unkown
page read and write
5920000
trusted library allocation
page read and write
7F90000
heap
page read and write
16E5000
heap
page read and write
19C0000
trusted library allocation
page read and write
2D30000
heap
page read and write
3651000
heap
page read and write
630000
unkown
page readonly
3C7D000
direct allocation
page execute and read and write
2510000
unkown
page readonly
5910000
trusted library allocation
page execute and read and write
328C000
unkown
page read and write
250F000
stack
page read and write
3651000
heap
page read and write
1670000
trusted library allocation
page read and write
3651000
heap
page read and write
7E9E000
stack
page read and write
5CF0000
heap
page read and write
810000
unkown
page readonly
3651000
heap
page read and write
1731000
direct allocation
page execute and read and write
3ADD000
direct allocation
page execute and read and write
3370000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3300000
heap
page read and write
4A5C000
unclassified section
page read and write
631000
unkown
page execute read
960000
heap
page read and write
3651000
heap
page read and write
175C3D21000
trusted library allocation
page read and write
3651000
heap
page read and write
175C20D0000
heap
page read and write
3651000
heap
page read and write
5BB0000
trusted library allocation
page read and write
3651000
heap
page read and write
3411000
trusted library allocation
page read and write
2384000
heap
page read and write
3651000
heap
page read and write
3D00000
trusted library allocation
page read and write
3590000
heap
page read and write
81C0000
heap
page read and write
11B0000
heap
page read and write
4451000
trusted library allocation
page read and write
175C2034000
system
page execute and read and write
3651000
heap
page read and write
8185000
heap
page read and write
30CC000
unkown
page read and write
175C3D0E000
trusted library allocation
page read and write
3651000
heap
page read and write
175C2170000
heap
page read and write
8190000
heap
page read and write
3651000
heap
page read and write
800000
unkown
page readonly
331D000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
1A30000
heap
page read and write
1480000
direct allocation
page execute and read and write
647000
unkown
page readonly
2380000
heap
page read and write
647000
unkown
page readonly
2E3F000
stack
page read and write
334E000
stack
page read and write
5CED000
stack
page read and write
3640000
heap
page read and write
3651000
heap
page read and write
11B0000
unkown
page readonly
2E50000
unkown
page read and write
7FAC000
heap
page read and write
7F0000
unkown
page readonly
3317000
heap
page read and write
3651000
heap
page read and write
16F0000
heap
page read and write
3651000
heap
page read and write
81CF000
heap
page read and write
1674000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
2D34000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
631000
unkown
page execute read
5751000
system
page execute and read and write
3651000
heap
page read and write
2EB0000
heap
page read and write
3651000
heap
page read and write
33FB000
trusted library allocation
page read and write
113A000
stack
page read and write
CAFE000
stack
page read and write
10A0000
unkown
page readonly
C6FE000
stack
page read and write
79D0000
trusted library allocation
page read and write
7A1F000
trusted library allocation
page read and write
3651000
heap
page read and write
2D1E000
stack
page read and write
3651000
heap
page read and write
340E000
trusted library allocation
page read and write
960000
heap
page read and write
3290000
heap
page read and write
96E000
heap
page read and write
3651000
heap
page read and write
7EF70000
trusted library allocation
page execute and read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
4459000
trusted library allocation
page read and write
1020000
heap
page read and write
3651000
heap
page read and write
900000
unkown
page read and write
33B4000
heap
page read and write
3651000
heap
page read and write
2384000
heap
page read and write
121F000
stack
page read and write
3430000
trusted library allocation
page read and write
920000
heap
page read and write
11A0000
unkown
page readonly
2CC1DFF000
stack
page read and write
3651000
heap
page read and write
3370000
heap
page read and write
1660000
heap
page read and write
1A20000
trusted library allocation
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
337A000
heap
page read and write
2E50000
unkown
page read and write
57A6000
system
page execute and read and write
330E000
heap
page read and write
3651000
heap
page read and write
339D000
heap
page read and write
BA0000
unkown
page readonly
3651000
heap
page read and write
5B90000
trusted library allocation
page read and write
8191000
heap
page read and write
32C7000
unclassified section
page execute and read and write
14FF000
stack
page read and write
15A9000
direct allocation
page execute and read and write
800000
unkown
page readonly
3651000
heap
page read and write
12E0000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
984000
heap
page read and write
3651000
heap
page read and write
33A0000
heap
page read and write
3C81000
direct allocation
page execute and read and write
2CF7000
unkown
page execute and read and write
3651000
heap
page read and write
3651000
heap
page read and write
32F0000
trusted library allocation
page read and write
2D1E000
stack
page read and write
3651000
heap
page read and write
E40000
heap
page read and write
40F7000
unkown
page execute and read and write
554C000
stack
page read and write
3416000
trusted library allocation
page read and write
7F0000
unkown
page readonly
74D2000
trusted library allocation
page read and write
161E000
direct allocation
page execute and read and write
3651000
heap
page read and write
994000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
5BC0000
trusted library allocation
page execute and read and write
175C219C000
heap
page read and write
3651000
heap
page read and write
16BE000
heap
page read and write
175C20F0000
heap
page read and write
3373000
heap
page read and write
3651000
heap
page read and write
593E000
stack
page read and write
2F9B000
stack
page read and write
647000
unkown
page readonly
3AD9000
direct allocation
page execute and read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
16A7000
trusted library allocation
page execute and read and write
175C3D00000
trusted library allocation
page read and write
83CC000
stack
page read and write
11C0000
heap
page read and write
33F0000
trusted library allocation
page read and write
3651000
heap
page read and write
2FB2000
unkown
page read and write
3300000
heap
page read and write
3651000
heap
page read and write
7A20000
trusted library section
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
1510000
unkown
page readonly
3D00000
trusted library allocation
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
362C000
trusted library allocation
page read and write
3317000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
175C3BF0000
heap
page read and write
3651000
heap
page read and write
CABE000
stack
page read and write
FF0000
unkown
page readonly
3651000
heap
page read and write
23A0000
unkown
page read and write
56C0000
system
page execute and read and write
8196000
heap
page read and write
645000
unkown
page read and write
3651000
heap
page read and write
930000
unkown
page read and write
11A0000
heap
page read and write
169A000
trusted library allocation
page execute and read and write
1696000
trusted library allocation
page execute and read and write
7AE4000
trusted library allocation
page read and write
3651000
heap
page read and write
38C0000
trusted library allocation
page execute and read and write
3651000
heap
page read and write
11C0000
heap
page read and write
33D3000
heap
page read and write
5734000
system
page execute and read and write
28C7000
unclassified section
page execute and read and write
3651000
heap
page read and write
160E000
stack
page read and write
DEE000
stack
page read and write
E2E000
stack
page read and write
645000
unkown
page read and write
96A000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
BA0000
unkown
page readonly
32E0000
trusted library allocation
page read and write
911000
unkown
page readonly
950000
unkown
page readonly
3614000
trusted library allocation
page read and write
3B4E000
direct allocation
page execute and read and write
3651000
heap
page read and write
2D20000
unkown
page readonly
3651000
heap
page read and write
5D2E000
heap
page read and write
2380000
heap
page read and write
1711000
unkown
page readonly
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
106A000
stack
page read and write
930000
unkown
page read and write
767E000
trusted library allocation
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
7AB0000
trusted library allocation
page read and write
18B0000
unkown
page readonly
11E0000
heap
page read and write
13FE000
stack
page read and write
39B0000
direct allocation
page execute and read and write
175C3A20000
trusted library allocation
page read and write
3375000
heap
page read and write
63E000
unkown
page readonly
3651000
heap
page read and write
3651000
heap
page read and write
3650000
heap
page read and write
F30000
unkown
page readonly
5890000
trusted library allocation
page read and write
12C0000
unkown
page readonly
81CA000
heap
page read and write
3651000
heap
page read and write
C9BE000
stack
page read and write
35F8000
trusted library allocation
page read and write
11A0000
unkown
page readonly
630000
unkown
page readonly
33CF000
heap
page read and write
341D000
trusted library allocation
page read and write
2E70000
unkown
page read and write
3651000
heap
page read and write
175C2180000
heap
page read and write
3651000
heap
page read and write
3806000
unkown
page read and write
81B4000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
5B20000
heap
page read and write
3387000
heap
page read and write
3651000
heap
page read and write
920000
heap
page read and write
3651000
heap
page read and write
3317000
heap
page read and write
3651000
heap
page read and write
900000
unkown
page read and write
3651000
heap
page read and write
84CE000
stack
page read and write
3651000
heap
page read and write
116C000
stack
page read and write
3651000
heap
page read and write
DA0000
heap
page read and write
3651000
heap
page read and write
820000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
5B40000
heap
page execute and read and write
3317000
heap
page read and write
1F22000
system
page read and write
175C2030000
system
page execute and read and write
3810000
trusted library allocation
page read and write
203C000
system
page read and write
175C3ECE000
trusted library allocation
page read and write
81A5000
heap
page read and write
167D000
trusted library allocation
page execute and read and write
1000000
unkown
page readonly
175C218C000
heap
page read and write
620000
unkown
page readonly
3651000
heap
page read and write
2FD8000
stack
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
1673000
trusted library allocation
page execute and read and write
B56E000
stack
page read and write
19AF000
stack
page read and write
106A000
stack
page read and write
17C8000
direct allocation
page execute and read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
81A0000
heap
page read and write
2EC0000
unkown
page readonly
3CF2000
direct allocation
page execute and read and write
3D00000
trusted library allocation
page read and write
3651000
heap
page read and write
8180000
trusted library allocation
page read and write
2CC0000
unkown
page read and write
174D000
direct allocation
page execute and read and write
3370000
trusted library allocation
page execute and read and write
116C000
stack
page read and write
840D000
stack
page read and write
3651000
heap
page read and write
631000
unkown
page execute read
630000
unkown
page readonly
3356000
heap
page read and write
175C3D0A000
trusted library allocation
page read and write
337D000
heap
page read and write
12D0000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
5943000
heap
page read and write
3451000
trusted library allocation
page read and write
2C89000
unkown
page execute and read and write
3651000
heap
page read and write
3651000
heap
page read and write
3E6C000
unclassified section
page read and write
7BC000
stack
page read and write
3651000
heap
page read and write
3937000
heap
page read and write
848F000
stack
page read and write
331C000
heap
page read and write
2CBFDFC000
stack
page read and write
3366000
heap
page read and write
3D52000
unclassified section
page read and write
3B2A000
unkown
page read and write
A9E000
stack
page read and write
C6BE000
stack
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
6BA000
stack
page read and write
402C000
unclassified section
page read and write
5B8C000
stack
page read and write
2D20000
unkown
page readonly
600000
unkown
page readonly
12D0000
heap
page read and write
E6C000
unkown
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
1711000
unkown
page readonly
F20000
heap
page read and write
3656000
heap
page read and write
630000
unkown
page readonly
4738000
unclassified section
page read and write
39A8000
heap
page read and write
3375000
heap
page read and write
3651000
heap
page read and write
3590000
trusted library allocation
page read and write
3651000
heap
page read and write
16A2000
trusted library allocation
page read and write
380A000
heap
page read and write
58B0000
trusted library allocation
page read and write
600000
unkown
page readonly
176E000
heap
page read and write
12E6000
heap
page read and write
5940000
heap
page read and write
911000
unkown
page readonly
B9F000
stack
page read and write
3651000
heap
page read and write
3435000
trusted library allocation
page read and write
2CC0000
unkown
page read and write
57FC000
unkown
page read and write
331D000
heap
page read and write
3373000
heap
page read and write
3651000
heap
page read and write
7A10000
trusted library allocation
page read and write
3CBC000
unkown
page read and write
3651000
heap
page read and write
3308000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
2CC0DFE000
stack
page read and write
3072000
unkown
page read and write
2510000
unkown
page readonly
3294000
heap
page read and write
3651000
heap
page read and write
23A0000
unkown
page read and write
16AB000
trusted library allocation
page execute and read and write
375B000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
331F000
heap
page read and write
32E0000
heap
page read and write
3651000
heap
page read and write
15AD000
direct allocation
page execute and read and write
5BE0000
heap
page read and write
175C3EC4000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
78B0000
heap
page read and write
5D40000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
819B000
heap
page read and write
1510000
unkown
page readonly
3651000
heap
page read and write
1746000
direct allocation
page execute and read and write
3651000
heap
page read and write
12C0000
unkown
page readonly
2EB0000
heap
page read and write
3387000
heap
page read and write
F31000
unkown
page readonly
39AD000
stack
page read and write
7E5E000
stack
page read and write
175C3D14000
trusted library allocation
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
33A2000
heap
page read and write
175C2120000
heap
page read and write
3651000
heap
page read and write
33EC000
stack
page read and write
175A000
heap
page read and write
34B4000
trusted library allocation
page read and write
8290000
trusted library allocation
page read and write
88FF000
stack
page read and write
E30000
heap
page read and write
2776000
system
page read and write
2FB2000
unkown
page read and write
3651000
heap
page read and write
81C7000
heap
page read and write
3651000
heap
page read and write
79C0000
trusted library section
page read and write
5B30000
heap
page read and write
337A000
heap
page read and write
3280000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
14FF000
stack
page read and write
58FC000
unkown
page read and write
81D3000
heap
page read and write
3651000
heap
page read and write
45A6000
unclassified section
page read and write
3651000
heap
page read and write
1320000
direct allocation
page read and write
13FE000
stack
page read and write
1753000
heap
page read and write
175C1F90000
system
page execute and read and write
DF0000
unkown
page readonly
3651000
heap
page read and write
5D58000
heap
page read and write
34B0000
trusted library allocation
page read and write
2CC05FE000
stack
page read and write
1692000
trusted library allocation
page read and write
1683000
trusted library allocation
page read and write
2E3F000
stack
page read and write
631000
unkown
page execute read
8520000
heap
page read and write
3391000
heap
page read and write
DE0000
unkown
page readonly
3317000
heap
page read and write
3361000
heap
page read and write
3779000
heap
page read and write
11D0000
heap
page read and write
78BE000
heap
page read and write
645000
unkown
page read and write
6BA000
stack
page read and write
1E59000
unclassified section
page execute and read and write
5D44000
heap
page read and write
164D000
stack
page read and write
DE0000
unkown
page readonly
3651000
heap
page read and write
3651000
heap
page read and write
3651000
heap
page read and write
175C3D03000
trusted library allocation
page read and write
175C3D10000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
16F2000
heap
page read and write
There are 661 hidden memdumps, click here to show them.