IOC Report
n395XXd8UE.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps108642010010Label

Files

File Path
Type
Category
Malicious
Download
n395XXd8UE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\460659\Pixels.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\460659\D
data
dropped
C:\Users\user\AppData\Local\Temp\Appendix
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Brisbane
data
dropped
C:\Users\user\AppData\Local\Temp\Ce
data
dropped
C:\Users\user\AppData\Local\Temp\Essex
data
dropped
C:\Users\user\AppData\Local\Temp\Fair
Microsoft Cabinet archive data, 488341 bytes, 10 files, at 0x2c +A "Brisbane" +A "Reload", ID 6157, number 1, 29 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\FNP_Act_Installer.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\ISUIServices.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\foretoken.xlsx
data
dropped
C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Honors
data
dropped
C:\Users\user\AppData\Local\Temp\Jill
data
dropped
C:\Users\user\AppData\Local\Temp\List
data
dropped
C:\Users\user\AppData\Local\Temp\Metal
data
dropped
C:\Users\user\AppData\Local\Temp\Mh
data
dropped
C:\Users\user\AppData\Local\Temp\Mlb
data
dropped
C:\Users\user\AppData\Local\Temp\Participate
data
dropped
C:\Users\user\AppData\Local\Temp\Questionnaire
data
dropped
C:\Users\user\AppData\Local\Temp\Ratio
PGP Secret Sub-key -
dropped
C:\Users\user\AppData\Local\Temp\Reload
data
dropped
C:\Users\user\AppData\Local\Temp\Something
ASCII text, with very long lines (344), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Something.cmd
ASCII text, with very long lines (344), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Static
data
dropped
C:\Users\user\AppData\Local\Temp\Titled
data
dropped
C:\Users\user\AppData\Local\Temp\Under
data
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\n395XXd8UE.exe
"C:\Users\user\Desktop\n395XXd8UE.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Something Something.cmd & Something.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 460659
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "Club" Metal
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b 460659\Pixels.com + Titled + Under + Brisbane + Questionnaire + List + Mh + Honors + Reload + Essex 460659\Pixels.com
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Participate + ..\Appendix + ..\Ratio + ..\Mlb + ..\Ce + ..\Static + ..\Jill D
malicious
C:\Users\user\AppData\Local\Temp\460659\Pixels.com
Pixels.com D
malicious
C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\ISDbg.exe
"C:\Users\user\AppData\Local\Temp\HZZMW0TWL4J83CO5TMC3G8MY83R\ISDbg.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\extrac32.exe
extrac32 /Y /E Fair
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://naturelovetop.top/api
172.67.151.175
malicious
https://gg.agroundyogasuspect.shop/cp_sh.eml
172.67.195.182
http://www.autoitscript.com/autoit3/X
unknown
http://www.macrovision.com/fnp/2004/11/activation
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.autoitscript.com/autoit3/
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
http://169.254.169.254http://169.254.169.254/latest/meta-datalatest/meta-data/public-ipv4latest/meta
unknown
http://www.info-zip.org/
unknown
https://flexerasoftware.flexnetoperations.com/control/inst/ActivationService-CCUninstalling
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
naturelovetop.top
172.67.151.175
malicious
gg.agroundyogasuspect.shop
172.67.195.182
cegu.shop
unknown
YFCNqUytcOspLsEfHj.YFCNqUytcOspLsEfHj
unknown

IPs

IP
Domain
Country
Malicious
172.67.151.175
naturelovetop.top
United States
malicious
172.67.195.182
gg.agroundyogasuspect.shop
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
A313000
heap
page read and write
malicious
A2BC000
heap
page read and write
4914000
trusted library allocation
page read and write
4917000
trusted library allocation
page read and write
BB0000
unkown
page readonly
891000
heap
page read and write
3DF7000
trusted library allocation
page read and write
13BE000
heap
page read and write
28CF000
stack
page read and write
6F921000
unkown
page read and write
4912000
trusted library allocation
page read and write
4918000
trusted library allocation
page read and write
6FB000
heap
page read and write
6AF000
stack
page read and write
4918000
trusted library allocation
page read and write
293D000
heap
page read and write
6F910000
unkown
page readonly
F04000
unkown
page readonly
4917000
trusted library allocation
page read and write
6C402000
unkown
page read and write
49C9000
trusted library allocation
page read and write
491D000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
7BD000
unkown
page readonly
6D5000
heap
page read and write
49BE000
trusted library allocation
page read and write
30C000
stack
page read and write
29B0000
heap
page read and write
82D000
heap
page read and write
29FC000
heap
page read and write
3E91000
trusted library allocation
page read and write
2736000
unkown
page readonly
49BA000
trusted library allocation
page read and write
4911000
trusted library allocation
page read and write
3AE2000
heap
page read and write
4918000
trusted library allocation
page read and write
300C000
stack
page read and write
803000
heap
page read and write
5E78000
heap
page read and write
4FB000
stack
page read and write
4910000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
49B2000
trusted library allocation
page read and write
470E000
stack
page read and write
13BE000
heap
page read and write
6F1C1000
unkown
page execute read
3D91000
trusted library allocation
page read and write
400000
unkown
page readonly
2934000
heap
page read and write
4916000
trusted library allocation
page read and write
3AE2000
heap
page read and write
491C000
trusted library allocation
page read and write
4912000
trusted library allocation
page read and write
4911000
trusted library allocation
page read and write
4914000
trusted library allocation
page read and write
866000
heap
page read and write
6CE000
stack
page read and write
49AB000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
49BF000
trusted library allocation
page read and write
4916000
trusted library allocation
page read and write
6C221000
unkown
page execute read
290E000
heap
page read and write
49F5000
trusted library allocation
page read and write
6F0000
heap
page read and write
2929000
heap
page read and write
4A45000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
6C40D000
unkown
page read and write
478E000
stack
page read and write
4914000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
7FF000
heap
page read and write
EDF000
unkown
page readonly
6C40B000
unkown
page read and write
866000
heap
page read and write
3DEB000
trusted library allocation
page read and write
2C10000
heap
page read and write
740000
heap
page read and write
3E91000
trusted library allocation
page read and write
295E000
stack
page read and write
280F000
stack
page read and write
3FF000
stack
page read and write
370000
heap
page read and write
49C1000
trusted library allocation
page read and write
29E9000
heap
page read and write
4917000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2375000
heap
page read and write
7F1000
unkown
page write copy
BB1000
unkown
page execute read
ED0000
unkown
page read and write
434000
unkown
page read and write
BB0000
unkown
page readonly
49F4000
trusted library allocation
page read and write
918000
heap
page read and write
71E000
stack
page read and write
13BE000
heap
page read and write
401000
unkown
page execute read
4AAF000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
491A000
trusted library allocation
page read and write
372D000
heap
page read and write
6D0000
heap
page read and write
2786000
unkown
page read and write
2BAF000
stack
page read and write
287E000
stack
page read and write
811000
heap
page read and write
510000
heap
page read and write
491E000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
49E3000
trusted library allocation
page read and write
AA3D000
trusted library allocation
page read and write
7E0000
heap
page read and write
9E0000
heap
page read and write
491A000
trusted library allocation
page read and write
A07000
heap
page read and write
2560000
heap
page read and write
6CE000
stack
page read and write
247E000
stack
page read and write
74F000
stack
page read and write
49CD000
trusted library allocation
page read and write
49EC000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
49DC000
trusted library allocation
page read and write
4911000
trusted library allocation
page read and write
49C9000
trusted library allocation
page read and write
4A87000
trusted library allocation
page read and write
862000
heap
page read and write
510000
heap
page read and write
3D91000
trusted library allocation
page read and write
29FC000
heap
page read and write
63E000
stack
page read and write
409000
unkown
page readonly
95E000
stack
page read and write
284F000
stack
page read and write
49E7000
trusted library allocation
page read and write
4917000
trusted library allocation
page read and write
88D000
heap
page read and write
49ED000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
4917000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
49DD000
trusted library allocation
page read and write
13BE000
heap
page read and write
5F0000
heap
page read and write
660000
heap
page read and write
2938000
heap
page read and write
13BE000
heap
page read and write
2D30000
heap
page read and write
3D91000
trusted library allocation
page read and write
2912000
heap
page read and write
5F0000
heap
page read and write
49BC000
trusted library allocation
page read and write
29B0000
heap
page read and write
4916000
trusted library allocation
page read and write
401000
unkown
page execute read
3DEF000
trusted library allocation
page read and write
29CE000
heap
page read and write
21FE000
stack
page read and write
5E70000
heap
page read and write
3E91000
trusted library allocation
page read and write
BB1000
unkown
page execute read
29B8000
heap
page read and write
9F0000
heap
page read and write
13BE000
heap
page read and write
13BE000
heap
page read and write
5BE000
stack
page read and write
2935000
heap
page read and write
4913000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
491E000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
49DD000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
873000
heap
page read and write
8EE000
stack
page read and write
3E00000
trusted library allocation
page read and write
2571000
unkown
page execute read
4ADF000
trusted library allocation
page read and write
10001000
unkown
page execute read
22A0000
heap
page read and write
49C6000
trusted library allocation
page read and write
98000
stack
page read and write
3D91000
trusted library allocation
page read and write
4916000
trusted library allocation
page read and write
77F000
stack
page read and write
49A3000
trusted library allocation
page read and write
29E9000
heap
page read and write
4A4C000
trusted library allocation
page read and write
1E0000
heap
page read and write
722000
heap
page read and write
82E000
heap
page read and write
3E91000
trusted library allocation
page read and write
3AE2000
heap
page read and write
2F14000
heap
page read and write
70E000
stack
page read and write
3DFC000
trusted library allocation
page read and write
49C9000
trusted library allocation
page read and write
49AF000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
22D0000
heap
page read and write
A1F000
stack
page read and write
3D91000
trusted library allocation
page read and write
3DC000
stack
page read and write
63E000
stack
page read and write
29ED000
heap
page read and write
4AA6000
trusted library allocation
page read and write
13BE000
heap
page read and write
3E91000
trusted library allocation
page read and write
7F3000
heap
page read and write
491B000
trusted library allocation
page read and write
4914000
trusted library allocation
page read and write
4912000
trusted library allocation
page read and write
49C9000
trusted library allocation
page read and write
13BE000
heap
page read and write
63C000
stack
page read and write
4913000
trusted library allocation
page read and write
49DF000
trusted library allocation
page read and write
675000
heap
page read and write
299F000
stack
page read and write
29FC000
heap
page read and write
91E000
stack
page read and write
3D91000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
19A000
stack
page read and write
748000
heap
page read and write
3DF4000
trusted library allocation
page read and write
49C8000
trusted library allocation
page read and write
C84000
heap
page read and write
491B000
trusted library allocation
page read and write
6F226000
unkown
page readonly
3E91000
trusted library allocation
page read and write
22E0000
heap
page read and write
3D91000
trusted library allocation
page read and write
47CF000
stack
page read and write
879000
heap
page read and write
891000
heap
page read and write
13BE000
heap
page read and write
ECF000
unkown
page write copy
3D91000
trusted library allocation
page read and write
3DF8000
trusted library allocation
page read and write
3AE2000
heap
page read and write
4910000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2ECE000
stack
page read and write
721000
unkown
page execute read
6F922000
unkown
page readonly
49BB000
trusted library allocation
page read and write
63C000
stack
page read and write
7F5000
unkown
page readonly
2929000
heap
page read and write
4A67000
trusted library allocation
page read and write
29FC000
heap
page read and write
6F911000
unkown
page execute read
3D91000
trusted library allocation
page read and write
63E000
stack
page read and write
49A6000
trusted library allocation
page read and write
409000
unkown
page readonly
49F3000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
4915000
trusted library allocation
page read and write
7ED000
unkown
page write copy
7C0000
heap
page read and write
3E09000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3037000
heap
page read and write
3DA000
stack
page read and write
49BB000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
474F000
stack
page read and write
3D91000
trusted library allocation
page read and write
42C000
unkown
page read and write
2918000
heap
page read and write
3E91000
trusted library allocation
page read and write
680000
heap
page read and write
32C0000
trusted library allocation
page read and write
500000
unkown
page readonly
49FE000
trusted library allocation
page read and write
49EA000
trusted library allocation
page read and write
ECF000
unkown
page write copy
47D0000
heap
page read and write
3E0A000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
85F000
heap
page read and write
3AE1000
heap
page read and write
32C0000
trusted library allocation
page read and write
763000
heap
page read and write
670000
heap
page read and write
3E05000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
2FCF000
stack
page read and write
2854000
unkown
page readonly
29EC000
heap
page read and write
812000
heap
page read and write
803000
heap
page read and write
49C0000
trusted library allocation
page read and write
49CB000
trusted library allocation
page read and write
47F0000
heap
page read and write
4500000
trusted library allocation
page read and write
2E00000
heap
page read and write
29AF000
stack
page read and write
13BE000
heap
page read and write
40C000
unkown
page read and write
7E8000
heap
page read and write
3AE2000
heap
page read and write
AAAE000
trusted library allocation
page read and write
3AE2000
heap
page read and write
910000
heap
page read and write
9F4000
heap
page read and write
4ACC000
trusted library allocation
page read and write
13BE000
heap
page read and write
13BE000
heap
page read and write
500000
unkown
page readonly
3E01000
trusted library allocation
page read and write
7E3000
unkown
page readonly
A910000
trusted library allocation
page read and write
237B000
heap
page read and write
4912000
trusted library allocation
page read and write
3328000
heap
page read and write
3AE2000
heap
page read and write
3D91000
trusted library allocation
page read and write
420000
unkown
page read and write
28BF000
stack
page read and write
29F6000
heap
page read and write
49B5000
trusted library allocation
page read and write
6C405000
unkown
page write copy
6C220000
unkown
page readonly
1414000
heap
page read and write
10002000
unkown
page readonly
ED1000
unkown
page write copy
2E11000
heap
page read and write
4915000
trusted library allocation
page read and write
49DB000
trusted library allocation
page read and write
4913000
trusted library allocation
page read and write
6C414000
unkown
page readonly
750000
heap
page read and write
491B000
trusted library allocation
page read and write
4AAA000
trusted library allocation
page read and write
49D8000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
A00000
heap
page read and write
3E91000
trusted library allocation
page read and write
4A0000
heap
page read and write
3D91000
trusted library allocation
page read and write
280E000
stack
page read and write
2779000
unkown
page read and write
2CC000
stack
page read and write
278E000
unkown
page readonly
815000
heap
page read and write
491F000
trusted library allocation
page read and write
67E000
stack
page read and write
2929000
heap
page read and write
2E10000
heap
page read and write
4A7A000
trusted library allocation
page read and write
800000
heap
page read and write
4918000
trusted library allocation
page read and write
666000
heap
page read and write
AA39000
trusted library allocation
page read and write
13BE000
heap
page read and write
81E000
stack
page read and write
2792000
unkown
page readonly
13BE000
heap
page read and write
10000000
unkown
page readonly
40C000
unkown
page write copy
49B7000
trusted library allocation
page read and write
4916000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
6F1C0000
unkown
page readonly
49E6000
trusted library allocation
page read and write
6C3AA000
unkown
page readonly
49AC000
trusted library allocation
page read and write
815000
heap
page read and write
2910000
heap
page read and write
3D91000
trusted library allocation
page read and write
491F000
trusted library allocation
page read and write
277F000
unkown
page read and write
82A000
heap
page read and write
4916000
trusted library allocation
page read and write
3AE2000
heap
page read and write
3E91000
trusted library allocation
page read and write
3AE2000
heap
page read and write
288E000
stack
page read and write
3D91000
trusted library allocation
page read and write
4913000
trusted library allocation
page read and write
4916000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
43C000
stack
page read and write
2564000
heap
page read and write
E3F000
unkown
page readonly
19B000
stack
page read and write
3D91000
trusted library allocation
page read and write
49BE000
trusted library allocation
page read and write
7B0000
heap
page read and write
3D91000
trusted library allocation
page read and write
99E000
stack
page read and write
491C000
trusted library allocation
page read and write
29E9000
heap
page read and write
28F8000
heap
page read and write
C80000
heap
page read and write
3D91000
trusted library allocation
page read and write
10003000
unkown
page read and write
640000
heap
page read and write
9CF7000
heap
page read and write
3D91000
trusted library allocation
page read and write
2370000
heap
page read and write
310C000
stack
page read and write
2929000
heap
page read and write
680000
heap
page read and write
3AE2000
heap
page read and write
3DEC000
trusted library allocation
page read and write
3F0D000
trusted library allocation
page read and write
9725000
heap
page read and write
49BD000
trusted library allocation
page read and write
721000
heap
page read and write
229E000
stack
page read and write
4AAE000
trusted library allocation
page read and write
873000
heap
page read and write
3BE000
stack
page read and write
78F000
stack
page read and write
29FC000
heap
page read and write
EDF000
unkown
page readonly
49C2000
trusted library allocation
page read and write
6F223000
unkown
page read and write
49DA000
trusted library allocation
page read and write
400000
unkown
page readonly
49FA000
trusted library allocation
page read and write
7F7000
heap
page read and write
3AE2000
heap
page read and write
1FC000
stack
page read and write
3E91000
trusted library allocation
page read and write
49C9000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
4916000
trusted library allocation
page read and write
780000
heap
page read and write
2810000
heap
page read and write
3DFD000
trusted library allocation
page read and write
3AE2000
heap
page read and write
4914000
trusted library allocation
page read and write
A03000
heap
page read and write
3188000
heap
page read and write
4ABA000
trusted library allocation
page read and write
2570000
unkown
page readonly
6D0000
heap
page read and write
3E0D000
trusted library allocation
page read and write
720000
unkown
page readonly
491F000
trusted library allocation
page read and write
49CE000
trusted library allocation
page read and write
293D000
heap
page read and write
2912000
heap
page read and write
4910000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
9F4000
heap
page read and write
7F7000
heap
page read and write
29FF000
heap
page read and write
3AE1000
heap
page read and write
49B1000
trusted library allocation
page read and write
9EF000
stack
page read and write
E3F000
unkown
page readonly
28F0000
heap
page read and write
3E91000
trusted library allocation
page read and write
82D000
heap
page read and write
2937000
heap
page read and write
491A000
trusted library allocation
page read and write
49E1000
trusted library allocation
page read and write
815000
heap
page read and write
4912000
trusted library allocation
page read and write
491C000
trusted library allocation
page read and write
4A72000
trusted library allocation
page read and write
85B000
heap
page read and write
3D91000
trusted library allocation
page read and write
49B1000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
49D4000
trusted library allocation
page read and write
7F3000
heap
page read and write
7F7000
heap
page read and write
4610000
heap
page read and write
29D2000
heap
page read and write
811000
heap
page read and write
49D3000
trusted library allocation
page read and write
862000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
820000
heap
page read and write
29F5000
heap
page read and write
2780000
unkown
page write copy
13BE000
heap
page read and write
1E4000
heap
page read and write
F04000
unkown
page readonly
13BE000
heap
page read and write
3D91000
trusted library allocation
page read and write
88D000
heap
page read and write
6FE000
heap
page read and write
811000
heap
page read and write
49FE000
trusted library allocation
page read and write
7BE000
stack
page read and write
3DF3000
trusted library allocation
page read and write
13BE000
heap
page read and write
3316000
heap
page read and write
3DF0000
trusted library allocation
page read and write
28D0000
heap
page read and write
293E000
heap
page read and write
46B000
unkown
page read and write
5FE000
stack
page read and write
There are 501 hidden memdumps, click here to show them.