IOC Report
2998MOD PO.exe

loading gif

Files

File Path
Type
Category
Malicious
2998MOD PO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2998MOD PO.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ea64OHKq
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2998MOD PO.exe
"C:\Users\user\Desktop\2998MOD PO.exe"
malicious
C:\Users\user\Desktop\2998MOD PO.exe
"C:\Users\user\Desktop\2998MOD PO.exe"
malicious
C:\Users\user\Desktop\2998MOD PO.exe
"C:\Users\user\Desktop\2998MOD PO.exe"
malicious
C:\Program Files (x86)\uZYYnmPedNYIjWqPsWOYKeetmwkKyGZUKAuFniHMcygNfALrFzFrLvWGPJTnONRCeIDRYuvUw\sePlrCtAXqpc.exe
"C:\Program Files (x86)\uZYYnmPedNYIjWqPsWOYKeetmwkKyGZUKAuFniHMcygNfALrFzFrLvWGPJTnONRCeIDRYuvUw\sePlrCtAXqpc.exe"
malicious
C:\Windows\SysWOW64\colorcpl.exe
"C:\Windows\SysWOW64\colorcpl.exe"
malicious
C:\Program Files (x86)\uZYYnmPedNYIjWqPsWOYKeetmwkKyGZUKAuFniHMcygNfALrFzFrLvWGPJTnONRCeIDRYuvUw\sePlrCtAXqpc.exe
"C:\Program Files (x86)\uZYYnmPedNYIjWqPsWOYKeetmwkKyGZUKAuFniHMcygNfALrFzFrLvWGPJTnONRCeIDRYuvUw\sePlrCtAXqpc.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.fontbureau.com/designers?
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.ecosia.org/newtab/
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ladylawher.org
3.33.130.190
malicious
www.ladylawher.org
unknown

IPs

IP
Domain
Country
Malicious
3.33.130.190
ladylawher.org
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4A40000
trusted library allocation
page read and write
malicious
18F0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
49F0000
trusted library allocation
page read and write
malicious
1E20000
unclassified section
page execute and read and write
malicious
2F60000
unkown
page execute and read and write
malicious
4DF0000
system
page execute and read and write
malicious
7FE8000
heap
page read and write
24A4000
heap
page read and write
3051000
heap
page read and write
5E2D000
heap
page read and write
F04000
trusted library allocation
page read and write
25F0000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
DB0000
unkown
page readonly
DB0000
unkown
page readonly
50D0000
trusted library allocation
page read and write
3051000
heap
page read and write
2F61000
heap
page read and write
DB1000
unkown
page execute read
7FD1000
heap
page read and write
1230000
trusted library allocation
page read and write
AE0000
unkown
page readonly
8A0000
unkown
page read and write
2F66000
heap
page read and write
3051000
heap
page read and write
2B2B000
trusted library allocation
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
2F5D000
heap
page read and write
140E000
stack
page read and write
DC7000
unkown
page readonly
3051000
heap
page read and write
ECE000
stack
page read and write
891000
unkown
page readonly
54C0000
trusted library allocation
page read and write
2F66000
heap
page read and write
3051000
heap
page read and write
2B11000
trusted library allocation
page read and write
5400000
trusted library section
page read and write
3051000
heap
page read and write
C88000
heap
page read and write
8310000
heap
page read and write
4366000
trusted library allocation
page read and write
F03000
trusted library allocation
page execute and read and write
3051000
heap
page read and write
1210000
heap
page read and write
5E4A000
heap
page read and write
1280000
heap
page read and write
7FD1000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
2F6C000
heap
page read and write
54E5000
heap
page read and write
3051000
heap
page read and write
43A9000
trusted library allocation
page read and write
6D7000
unkown
page read and write
78D0000
trusted library allocation
page read and write
4AD7000
heap
page read and write
1180000
heap
page execute and read and write
4389000
unkown
page execute and read and write
7FD1000
heap
page read and write
2E6F000
stack
page read and write
8002000
heap
page read and write
2B00000
heap
page read and write
4FFB000
trusted library allocation
page read and write
2FBB000
heap
page read and write
FE0000
unkown
page readonly
F10000
trusted library allocation
page read and write
52AC000
unclassified section
page read and write
6F22000
trusted library allocation
page read and write
2F40000
heap
page read and write
16302000
system
page read and write
CB0000
unkown
page readonly
54E0000
heap
page read and write
3051000
heap
page read and write
3917000
unkown
page execute and read and write
2FB5000
heap
page read and write
C45000
heap
page read and write
CF1000
heap
page read and write
7FD1000
heap
page read and write
29BC000
unkown
page read and write
1260000
heap
page read and write
537E000
stack
page read and write
3051000
heap
page read and write
F50000
heap
page read and write
3051000
heap
page read and write
820000
unkown
page readonly
78C0000
trusted library allocation
page read and write
E6AE000
stack
page read and write
3051000
heap
page read and write
78BD000
stack
page read and write
2BF0000
heap
page read and write
12E0000
heap
page read and write
3051000
heap
page read and write
1410000
heap
page read and write
5093000
heap
page read and write
906000
heap
page read and write
3051000
heap
page read and write
F26000
trusted library allocation
page execute and read and write
2F6B000
heap
page read and write
2E70000
unkown
page readonly
50B2000
trusted library allocation
page read and write
3051000
heap
page read and write
891000
unkown
page readonly
7FD1000
heap
page read and write
2FA3000
heap
page read and write
7FD6000
heap
page read and write
7FD1000
heap
page read and write
DA0000
unkown
page read and write
55F0000
trusted library allocation
page read and write
DBE000
unkown
page readonly
EBEF000
stack
page read and write
7FD1000
heap
page read and write
1C1D000
direct allocation
page execute and read and write
2FB2000
heap
page read and write
126E000
stack
page read and write
7FD1000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
869F000
stack
page read and write
1651C000
system
page read and write
3051000
heap
page read and write
B2BD000
stack
page read and write
15F0000
heap
page read and write
B08000
heap
page read and write
3051000
heap
page read and write
1A79000
direct allocation
page execute and read and write
CC0000
unkown
page readonly
7FE5000
heap
page read and write
E96F000
stack
page read and write
50B0000
trusted library allocation
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
E66E000
stack
page read and write
5640000
trusted library allocation
page execute and read and write
1950000
direct allocation
page execute and read and write
F2A000
trusted library allocation
page execute and read and write
810000
unkown
page readonly
7FD1000
heap
page read and write
7FD1000
heap
page read and write
1470000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
D0A000
heap
page read and write
2DA4000
unkown
page read and write
B1BD000
stack
page read and write
3051000
heap
page read and write
787D000
stack
page read and write
7FD1000
heap
page read and write
4FF0000
trusted library allocation
page read and write
800000
unkown
page readonly
2E7F000
stack
page read and write
1210000
unkown
page read and write
2B29000
trusted library allocation
page read and write
3051000
heap
page read and write
17EF000
stack
page read and write
2EFE000
stack
page read and write
3051000
heap
page read and write
5CC000
stack
page read and write
3051000
heap
page read and write
2B0E000
stack
page read and write
3015000
heap
page read and write
4D89000
unkown
page execute and read and write
2BE4000
heap
page read and write
7FD1000
heap
page read and write
14D8000
heap
page read and write
CC0000
unkown
page readonly
3051000
heap
page read and write
D90000
unkown
page read and write
2A80000
system
page execute and read and write
3051000
heap
page read and write
5D26000
heap
page read and write
3051000
heap
page read and write
800000
unkown
page readonly
DA0000
heap
page read and write
3051000
heap
page read and write
120B000
stack
page read and write
3051000
heap
page read and write
D3A000
stack
page read and write
3051000
heap
page read and write
440000
unkown
page readonly
810000
unkown
page readonly
87E000
stack
page read and write
3051000
heap
page read and write
302C000
heap
page read and write
24A0000
heap
page read and write
5D50000
heap
page read and write
3051000
heap
page read and write
15D0000
unkown
page readonly
1280000
heap
page read and write
3051000
heap
page read and write
1430000
heap
page read and write
8009000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
D80000
unkown
page readonly
80D0000
trusted library allocation
page read and write
5D20000
heap
page read and write
F8C000
stack
page read and write
7FD1000
heap
page read and write
3051000
heap
page read and write
1170000
trusted library allocation
page execute and read and write
5330000
heap
page read and write
25EF000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
DE0000
unkown
page read and write
2F5B000
heap
page read and write
24E0000
heap
page read and write
3051000
heap
page read and write
EAAE000
stack
page read and write
760000
unkown
page readonly
301A000
heap
page read and write
8020000
heap
page read and write
3051000
heap
page read and write
24E0000
heap
page read and write
3150000
heap
page read and write
3B19000
trusted library allocation
page read and write
3051000
heap
page read and write
2F61000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
1270000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
513C000
stack
page read and write
3170000
heap
page read and write
3051000
heap
page read and write
DC7000
unkown
page readonly
4E1E000
direct allocation
page execute and read and write
2FE2000
heap
page read and write
7FD1000
heap
page read and write
876E000
stack
page read and write
4A90000
trusted library allocation
page read and write
3051000
heap
page read and write
440000
unkown
page readonly
5092000
unclassified section
page read and write
2FC8000
heap
page read and write
900000
heap
page read and write
DB1000
unkown
page execute read
D70000
unkown
page readonly
500E000
trusted library allocation
page read and write
115E000
stack
page read and write
8A0000
unkown
page read and write
4923000
heap
page read and write
C9F000
heap
page read and write
3051000
heap
page read and write
2BE0000
heap
page read and write
3051000
heap
page read and write
F1D000
trusted library allocation
page execute and read and write
DC5000
unkown
page read and write
3051000
heap
page read and write
1220000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
450000
unkown
page readonly
5050000
trusted library allocation
page read and write
5E10000
heap
page read and write
50C0000
trusted library allocation
page execute and read and write
800D000
heap
page read and write
C80000
heap
page read and write
DA0000
heap
page read and write
F3B000
trusted library allocation
page execute and read and write
4F51000
direct allocation
page execute and read and write
1E10000
heap
page read and write
D4D000
heap
page read and write
3051000
heap
page read and write
50A0000
heap
page read and write
830E000
stack
page read and write
2E70000
unkown
page readonly
5E54000
heap
page read and write
2EBE000
stack
page read and write
7FD1000
heap
page read and write
23F0000
unkown
page read and write
830000
heap
page read and write
460000
unkown
page readonly
5D56000
heap
page read and write
24A0000
heap
page read and write
B5A0000
trusted library section
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
8012000
heap
page read and write
55EE000
stack
page read and write
4C04000
heap
page read and write
1255000
trusted library allocation
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
8B9000
stack
page read and write
12E0000
heap
page read and write
830000
heap
page read and write
D70000
unkown
page readonly
11CE000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
52E0000
trusted library allocation
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
12FA000
stack
page read and write
4920000
trusted library allocation
page read and write
3010000
heap
page read and write
3050000
heap
page read and write
3051000
heap
page read and write
D90000
unkown
page readonly
3989000
unkown
page execute and read and write
CB0000
unkown
page readonly
3051000
heap
page read and write
F32000
trusted library allocation
page read and write
3051000
heap
page read and write
4929000
heap
page read and write
828E000
stack
page read and write
1250000
trusted library allocation
page read and write
1960000
unkown
page readonly
D3A000
stack
page read and write
3051000
heap
page read and write
2FC8000
heap
page read and write
3051000
heap
page read and write
DE0000
unkown
page readonly
3051000
heap
page read and write
ADF000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
15D0000
unkown
page readonly
6F00000
trusted library allocation
page read and write
D90000
unkown
page readonly
EAEE000
stack
page read and write
CD0000
unkown
page readonly
B00000
heap
page read and write
3051000
heap
page read and write
4C10000
trusted library allocation
page read and write
E86E000
stack
page read and write
244C000
unkown
page read and write
2F66000
heap
page read and write
27A2000
unkown
page read and write
25F0000
unkown
page readonly
3051000
heap
page read and write
7FD1000
heap
page read and write
4B40000
trusted library allocation
page execute and read and write
E9AE000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
2849000
unclassified section
page execute and read and write
5E62000
heap
page read and write
F37000
trusted library allocation
page execute and read and write
2FB2000
heap
page read and write
14F0000
heap
page read and write
3051000
heap
page read and write
B1F000
heap
page read and write
EF0000
trusted library allocation
page read and write
871F000
stack
page read and write
2FE9000
heap
page read and write
5022000
trusted library allocation
page read and write
26E2000
unkown
page read and write
2F66000
heap
page read and write
3051000
heap
page read and write
27D7000
unclassified section
page execute and read and write
501D000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
2F5D000
heap
page read and write
4FF4000
trusted library allocation
page read and write
13EF000
stack
page read and write
9EB000
stack
page read and write
460000
unkown
page readonly
4C6D000
stack
page read and write
3249000
unclassified section
page execute and read and write
3051000
heap
page read and write
5016000
trusted library allocation
page read and write
3051000
heap
page read and write
900000
heap
page read and write
2FB5000
heap
page read and write
743E000
stack
page read and write
2FF6000
heap
page read and write
D90000
unkown
page read and write
2FD3000
heap
page read and write
8FE000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
DBE000
unkown
page readonly
F0D000
trusted library allocation
page execute and read and write
D80000
unkown
page readonly
4EF7000
system
page execute and read and write
7FD1000
heap
page read and write
3051000
heap
page read and write
2F97000
heap
page read and write
3051000
heap
page read and write
10FC000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
14D8000
heap
page read and write
14D0000
heap
page read and write
1440000
direct allocation
page read and write
3051000
heap
page read and write
CD0000
unkown
page readonly
7FD1000
heap
page read and write
3051000
heap
page read and write
7FD1000
heap
page read and write
820000
unkown
page readonly
2F6C000
heap
page read and write
C20000
heap
page read and write
7FD1000
heap
page read and write
3051000
heap
page read and write
2FA7000
heap
page read and write
3B11000
trusted library allocation
page read and write
7FD0000
heap
page read and write
5694000
unclassified section
page read and write
3051000
heap
page read and write
54D0000
trusted library allocation
page read and write
3B58000
trusted library allocation
page read and write
29BC000
unkown
page read and write
3051000
heap
page read and write
54B0000
heap
page read and write
126A000
heap
page read and write
B00000
heap
page read and write
18EF000
stack
page read and write
2F66000
heap
page read and write
3051000
heap
page read and write
DF1000
unkown
page readonly
2BE4000
heap
page read and write
4EA0000
system
page execute and read and write
8016000
heap
page read and write
7FD1000
heap
page read and write
1210000
unkown
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
5D00000
heap
page read and write
DC5000
unkown
page read and write
3051000
heap
page read and write
2F62000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
DBE000
unkown
page readonly
2FDF000
heap
page read and write
3051000
heap
page read and write
82CF000
stack
page read and write
1C01000
direct allocation
page execute and read and write
7FE2000
heap
page read and write
501C000
unkown
page read and write
4B18000
trusted library allocation
page read and write
3051000
heap
page read and write
300A000
heap
page read and write
AE0000
unkown
page readonly
3051000
heap
page read and write
2F48000
heap
page read and write
3051000
heap
page read and write
1160000
trusted library allocation
page read and write
DBE000
unkown
page readonly
880000
unkown
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
4CA000
stack
page read and write
3051000
heap
page read and write
B08000
heap
page read and write
3051000
heap
page read and write
DC5000
unkown
page read and write
2D9F000
trusted library allocation
page read and write
3051000
heap
page read and write
753E000
stack
page read and write
16904000
system
page read and write
F00000
trusted library allocation
page read and write
ADF000
stack
page read and write
4CAC000
stack
page read and write
3051000
heap
page read and write
4A4C000
heap
page read and write
762000
unkown
page readonly
4DA9000
direct allocation
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
C8E000
heap
page read and write
3051000
heap
page read and write
5D4C000
heap
page read and write
4EA3000
system
page execute and read and write
120E000
stack
page read and write
880000
unkown
page read and write
86DE000
stack
page read and write
52D0000
trusted library allocation
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
10FC000
stack
page read and write
3051000
heap
page read and write
14CE000
stack
page read and write
3051000
heap
page read and write
2F66000
heap
page read and write
5420000
trusted library section
page readonly
5310000
heap
page read and write
DC7000
unkown
page readonly
4BF0000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
3051000
heap
page read and write
7FD1000
heap
page read and write
3051000
heap
page read and write
1AEE000
direct allocation
page execute and read and write
F22000
trusted library allocation
page read and write
DC5000
unkown
page read and write
3C49000
unclassified section
page execute and read and write
1A7D000
direct allocation
page execute and read and write
4BF0000
trusted library allocation
page read and write
DB1000
unkown
page execute read
3051000
heap
page read and write
3051000
heap
page read and write
7740000
heap
page read and write
450000
unkown
page readonly
7FD1000
heap
page read and write
7FEA000
heap
page read and write
12A0000
unkown
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
E8D000
stack
page read and write
14F7000
heap
page read and write
3051000
heap
page read and write
CC2000
heap
page read and write
4FD2000
unclassified section
page read and write
3051000
heap
page read and write
7FDB000
heap
page read and write
7FF4000
heap
page read and write
7F9E000
stack
page read and write
3051000
heap
page read and write
820C000
stack
page read and write
3051000
heap
page read and write
1C98000
direct allocation
page execute and read and write
105F000
stack
page read and write
DC7000
unkown
page readonly
1474000
heap
page read and write
FF0000
heap
page read and write
3051000
heap
page read and write
7FD1000
heap
page read and write
1474000
heap
page read and write
FE0000
unkown
page readonly
5090000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
16242000
system
page read and write
4F4D000
direct allocation
page execute and read and write
4C00000
heap
page read and write
4CA000
stack
page read and write
7300000
heap
page read and write
C60000
heap
page read and write
3051000
heap
page read and write
2A58000
stack
page read and write
3051000
heap
page read and write
87E000
stack
page read and write
2F97000
heap
page read and write
3051000
heap
page read and write
5380000
heap
page execute and read and write
3051000
heap
page read and write
5030000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
4FC2000
direct allocation
page execute and read and write
4DAD000
direct allocation
page execute and read and write
5011000
trusted library allocation
page read and write
C40000
heap
page read and write
3051000
heap
page read and write
DE0000
unkown
page readonly
4C80000
direct allocation
page execute and read and write
87AF000
stack
page read and write
7FE0000
heap
page read and write
3051000
heap
page read and write
DF1000
unkown
page readonly
5CC000
stack
page read and write
1470000
heap
page read and write
2FBB000
heap
page read and write
DE0000
unkown
page read and write
DB0000
unkown
page readonly
DB0000
unkown
page readonly
1C16000
direct allocation
page execute and read and write
14D0000
heap
page read and write
3051000
heap
page read and write
24A4000
heap
page read and write
3051000
heap
page read and write
CB5000
heap
page read and write
7FD1000
heap
page read and write
9B7000
stack
page read and write
5CFE000
stack
page read and write
5D1A000
heap
page read and write
824D000
stack
page read and write
2BE4000
heap
page read and write
5E00000
heap
page read and write
2E3E000
stack
page read and write
3051000
heap
page read and write
2F5B000
heap
page read and write
2CB9000
trusted library allocation
page read and write
DB1000
unkown
page execute read
1270000
unkown
page readonly
3051000
heap
page read and write
7FD9000
heap
page read and write
3051000
heap
page read and write
1960000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
26E2000
unkown
page read and write
C30000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
4C75000
heap
page read and write
12A0000
unkown
page read and write
There are 601 hidden memdumps, click here to show them.