IOC Report
UPDATED Q-LOT24038.exe

loading gif

Files

File Path
Type
Category
Malicious
UPDATED Q-LOT24038.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\23X395L
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\unbarricadoed
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UPDATED Q-LOT24038.exe
"C:\Users\user\Desktop\UPDATED Q-LOT24038.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\UPDATED Q-LOT24038.exe"
malicious
C:\Program Files (x86)\ZluZQcGQgpPDwbgMlZRKrBAZygNfeAiqnmUAiLwmJEhatQWs\LPXBsvFDomujkZ.exe
"C:\Program Files (x86)\ZluZQcGQgpPDwbgMlZRKrBAZygNfeAiqnmUAiLwmJEhatQWs\LPXBsvFDomujkZ.exe"
malicious
C:\Windows\SysWOW64\auditpol.exe
"C:\Windows\SysWOW64\auditpol.exe"
malicious
C:\Program Files (x86)\ZluZQcGQgpPDwbgMlZRKrBAZygNfeAiqnmUAiLwmJEhatQWs\LPXBsvFDomujkZ.exe
"C:\Program Files (x86)\ZluZQcGQgpPDwbgMlZRKrBAZygNfeAiqnmUAiLwmJEhatQWs\LPXBsvFDomujkZ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.luxe.guru/s9un/
52.20.84.62
malicious
http://www.theclydefund.info/pt4m/
3.33.130.190
malicious
http://www.newdaydawning.net/paa2/
44.213.25.70
malicious
http://www.stayup.top/gubb/
203.161.43.245
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.luxe.guru/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.theclydefund.info
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://newdaydawning.net/paa2/?78pd9P=n7l4pK2vJUox4BGQd6S9BuAb4HmjCvTxbp1eoNPi6Q2eN5D
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
theclydefund.info
3.33.130.190
malicious
www.luxe.guru
52.20.84.62
malicious
azkwupgf.as66588.com
147.92.40.174
malicious
newdaydawning.net
44.213.25.70
malicious
www.stayup.top
203.161.43.245
malicious
www.theclydefund.info
unknown
malicious
www.63582.photo
unknown
malicious
www.bonusgame2024.online
unknown
malicious
www.newdaydawning.net
unknown
malicious

IPs

IP
Domain
Country
Malicious
52.20.84.62
www.luxe.guru
United States
malicious
44.213.25.70
newdaydawning.net
United States
malicious
203.161.43.245
www.stayup.top
Malaysia
malicious
147.92.40.174
azkwupgf.as66588.com
Hong Kong
malicious
3.33.130.190
theclydefund.info
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5880000
system
page execute and read and write
malicious
5C60000
unclassified section
page execute and read and write
malicious
3110000
system
page execute and read and write
malicious
41A0000
unclassified section
page execute and read and write
malicious
3760000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
2E70000
unkown
page execute and read and write
malicious
37B0000
trusted library allocation
page read and write
malicious
1DBE5980000
system
page execute and read and write
2A50000
heap
page read and write
3621000
heap
page read and write
BB1000
unkown
page execute read
3FE0000
heap
page read and write
3621000
heap
page read and write
3F9E000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
83BC000
heap
page read and write
11D8000
unkown
page read and write
47F8000
unclassified section
page read and write
301E000
stack
page read and write
83CC000
heap
page read and write
3621000
heap
page read and write
1DBE5ADC000
heap
page read and write
3621000
heap
page read and write
8450000
trusted library allocation
page read and write
22EF000
stack
page read and write
FF1000
unkown
page readonly
8340000
trusted library allocation
page read and write
3172000
unkown
page read and write
3E6E000
heap
page read and write
339E000
heap
page read and write
490000
unkown
page write copy
3621000
heap
page read and write
3AAE000
stack
page read and write
38B0000
trusted library allocation
page execute and read and write
2C13000
heap
page read and write
15BF000
stack
page read and write
5A0000
unkown
page readonly
3D91000
direct allocation
page execute and read and write
5AAC000
unkown
page read and write
3621000
heap
page read and write
2C13000
heap
page read and write
3621000
heap
page read and write
3F9E000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
4A7000
unkown
page read and write
EB0000
unkown
page readonly
3621000
heap
page read and write
1DBE760F000
trusted library allocation
page read and write
3621000
heap
page read and write
838F000
heap
page read and write
3621000
heap
page read and write
BB0000
unkown
page readonly
1DBE77BE000
trusted library allocation
page read and write
11D5000
unkown
page read and write
3621000
heap
page read and write
3432000
heap
page read and write
342A000
heap
page read and write
278C000
stack
page read and write
3621000
heap
page read and write
590000
unkown
page readonly
2370000
heap
page read and write
3621000
heap
page read and write
9C0000
heap
page read and write
4310000
direct allocation
page read and write
3621000
heap
page read and write
5EEF000
stack
page read and write
5C0000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
483E000
direct allocation
page read and write
3621000
heap
page read and write
621000
unkown
page readonly
3F58000
heap
page read and write
1300000
unkown
page read and write
2BBE000
stack
page read and write
BC7000
unkown
page readonly
1DBE5AC0000
heap
page read and write
3621000
heap
page read and write
53DFDFD000
stack
page read and write
1300000
unkown
page read and write
2E43000
heap
page read and write
8660000
heap
page read and write
2E17000
heap
page read and write
3621000
heap
page read and write
1DBE5AB0000
heap
page read and write
8AEE000
stack
page read and write
2F01000
heap
page read and write
2ED1000
unkown
page execute and read and write
3F9E000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
170000
heap
page read and write
342A000
heap
page read and write
3190000
heap
page read and write
BC7000
unkown
page readonly
12FC000
stack
page read and write
3621000
heap
page read and write
45A000
stack
page read and write
EA0000
unkown
page readonly
3621000
heap
page read and write
FE0000
unkown
page read and write
3A3E000
heap
page read and write
610000
unkown
page read and write
750000
unkown
page read and write
2DEE000
stack
page read and write
3F9E000
heap
page read and write
3F14000
heap
page read and write
E90000
unkown
page readonly
F60000
unkown
page readonly
36D1000
direct allocation
page execute and read and write
83CF000
heap
page read and write
1DBE5A1B000
system
page execute and read and write
4310000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
1DBE7500000
trusted library allocation
page read and write
3621000
heap
page read and write
6B9E000
stack
page read and write
3AC0000
direct allocation
page execute and read and write
1340000
heap
page read and write
400E000
unkown
page read and write
43ED000
heap
page read and write
FE0000
unkown
page read and write
2BC0000
direct allocation
page read and write
1DBE77CE000
trusted library allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
610000
unkown
page read and write
3621000
heap
page read and write
89F000
stack
page read and write
3621000
heap
page read and write
483E000
direct allocation
page read and write
1DBE74C0000
trusted library allocation
page read and write
47CD000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3482000
heap
page read and write
BE0000
unkown
page readonly
3621000
heap
page read and write
3E02000
direct allocation
page execute and read and write
5930000
system
page execute and read and write
1E0000
unkown
page readonly
3F58000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
15FE000
stack
page read and write
55C000
stack
page read and write
83D2000
heap
page read and write
110000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3DFC000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
19A0000
unkown
page readonly
F50000
heap
page read and write
3F01000
heap
page read and write
1348000
heap
page read and write
F80000
unkown
page readonly
342A000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3F11000
heap
page read and write
3172000
unkown
page read and write
3621000
heap
page read and write
FF1000
unkown
page readonly
3621000
heap
page read and write
2470000
unkown
page execute and read and write
3400000
direct allocation
page execute and read and write
34D9000
heap
page read and write
3C5E000
direct allocation
page execute and read and write
3621000
heap
page read and write
160F000
stack
page read and write
3621000
heap
page read and write
5992000
system
page execute and read and write
1F0000
unkown
page readonly
3621000
heap
page read and write
3234000
heap
page read and write
3621000
heap
page read and write
8360000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
F1A000
stack
page read and write
5B0000
unkown
page readonly
341F000
heap
page read and write
3B58000
unkown
page read and write
3418000
heap
page read and write
328C000
unkown
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
1DBE5AC9000
heap
page read and write
3621000
heap
page read and write
E90000
unkown
page readonly
3621000
heap
page read and write
3621000
heap
page read and write
1340000
heap
page read and write
5A0000
unkown
page readonly
3621000
heap
page read and write
47CD000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
31FF000
stack
page read and write
34C7000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
8351000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
30FF000
stack
page read and write
3621000
heap
page read and write
5916000
system
page execute and read and write
400000
unkown
page readonly
BB1000
unkown
page execute read
2BC0000
direct allocation
page read and write
47CD000
direct allocation
page read and write
2C13000
heap
page read and write
3621000
heap
page read and write
3F58000
heap
page read and write
46A0000
direct allocation
page read and write
3621000
heap
page read and write
44D4000
unclassified section
page read and write
3621000
heap
page read and write
46A0000
direct allocation
page read and write
2EC0000
direct allocation
page read and write
3E7C000
unkown
page read and write
F60000
unkown
page readonly
3A6C000
stack
page read and write
1DBE73B0000
heap
page read and write
660000
heap
page read and write
2B30000
heap
page read and write
100000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
259D2000
system
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
34DF000
heap
page read and write
DE0000
unkown
page readonly
774000
heap
page read and write
352D000
direct allocation
page execute and read and write
3621000
heap
page read and write
2E00000
unkown
page read and write
3000000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
593C000
system
page execute and read and write
3F11000
heap
page read and write
3621000
heap
page read and write
4B1C000
unclassified section
page read and write
483E000
direct allocation
page read and write
3621000
heap
page read and write
34A9000
heap
page read and write
47CD000
direct allocation
page read and write
19A0000
unkown
page readonly
3621000
heap
page read and write
3765000
heap
page read and write
341F000
heap
page read and write
3621000
heap
page read and write
1DBE760C000
trusted library allocation
page read and write
2C13000
heap
page read and write
2ED0000
heap
page read and write
1320000
unkown
page readonly
2C13000
heap
page read and write
3E23000
heap
page read and write
34A3000
heap
page read and write
83C3000
heap
page read and write
4433000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
2C13000
heap
page read and write
1320000
unkown
page readonly
BBE000
unkown
page readonly
47CD000
direct allocation
page read and write
3834000
unkown
page read and write
5FEF000
stack
page read and write
3621000
heap
page read and write
3074000
heap
page read and write
3F58000
heap
page read and write
808000
heap
page read and write
83BF000
heap
page read and write
401000
unkown
page execute read
3621000
heap
page read and write
BB1000
unkown
page execute read
83AD000
heap
page read and write
3498000
heap
page read and write
3621000
heap
page read and write
2380000
unkown
page readonly
2BC0000
direct allocation
page read and write
2ED0000
heap
page read and write
3621000
heap
page read and write
3232000
unkown
page read and write
15E000
stack
page read and write
3F06000
heap
page read and write
650000
unkown
page readonly
34B1000
heap
page read and write
EB0000
unkown
page readonly
60E000
stack
page read and write
3080000
unkown
page readonly
8AAF000
stack
page read and write
3621000
heap
page read and write
770000
heap
page read and write
5B0000
unkown
page readonly
3621000
heap
page read and write
660000
heap
page read and write
3A77000
heap
page read and write
2C13000
heap
page read and write
2E6C000
unkown
page read and write
3621000
heap
page read and write
BB1000
unkown
page execute read
3C10000
heap
page read and write
2C13000
heap
page read and write
2C13000
heap
page read and write
3888000
heap
page read and write
46A0000
direct allocation
page read and write
431E000
heap
page read and write
3F58000
heap
page read and write
3621000
heap
page read and write
1DBE7612000
trusted library allocation
page read and write
4310000
direct allocation
page read and write
498A000
unclassified section
page read and write
332D000
heap
page read and write
2C13000
heap
page read and write
342A000
heap
page read and write
3234000
heap
page read and write
8365000
heap
page read and write
34BA000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
F50000
heap
page read and write
835B000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
53E0DFF000
stack
page read and write
135F000
heap
page read and write
3621000
heap
page read and write
3F58000
heap
page read and write
47C9000
direct allocation
page read and write
160F000
stack
page read and write
482000
unkown
page readonly
1DBE7603000
trusted library allocation
page read and write
1610000
unkown
page readonly
2A20000
heap
page read and write
BE0000
unkown
page readonly
3621000
heap
page read and write
342A000
heap
page read and write
3421000
heap
page read and write
DE0000
unkown
page readonly
3F68000
heap
page read and write
3DF7000
heap
page read and write
1660000
heap
page read and write
4AB000
unkown
page readonly
1DBE5A1E000
system
page execute and read and write
366E000
stack
page read and write
342F000
heap
page read and write
3800000
trusted library allocation
page read and write
3621000
heap
page read and write
8AF000
stack
page read and write
3621000
heap
page read and write
4310000
direct allocation
page read and write
F70000
unkown
page readonly
630000
unkown
page read and write
190000
heap
page read and write
1DBE5BE0000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
2E1A000
heap
page read and write
25912000
system
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3F58000
heap
page read and write
3621000
heap
page read and write
3BED000
direct allocation
page execute and read and write
2C13000
heap
page read and write
5C0000
heap
page read and write
483E000
direct allocation
page read and write
2DDB000
stack
page read and write
3070000
heap
page read and write
8BEF000
stack
page read and write
1DBE7614000
trusted library allocation
page read and write
2E05000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
1DBE74C0000
trusted library allocation
page read and write
47C9000
direct allocation
page read and write
1DBE7600000
trusted library allocation
page read and write
3621000
heap
page read and write
47C9000
direct allocation
page read and write
2C00000
heap
page read and write
4AB000
unkown
page readonly
4CAE000
unclassified section
page read and write
1DBE7701000
trusted library allocation
page read and write
3621000
heap
page read and write
3485000
heap
page read and write
3750000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
83C9000
heap
page read and write
3E4A000
heap
page read and write
34B5000
heap
page read and write
55C000
stack
page read and write
39DE000
stack
page read and write
FDE000
stack
page read and write
3234000
heap
page read and write
3621000
heap
page read and write
4310000
direct allocation
page read and write
12FC000
stack
page read and write
3960000
trusted library allocation
page read and write
3621000
heap
page read and write
2EAE000
stack
page read and write
3F9E000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3430000
heap
page read and write
3F9C000
heap
page read and write
800000
heap
page read and write
45A000
stack
page read and write
3329000
heap
page read and write
3473000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3482000
heap
page read and write
621000
unkown
page readonly
3621000
heap
page read and write
3742000
direct allocation
page execute and read and write
163E000
stack
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
EA0000
unkown
page readonly
3F9E000
heap
page read and write
3F9E000
heap
page read and write
3621000
heap
page read and write
9FB000
heap
page read and write
3621000
heap
page read and write
1DBE5AEC000
heap
page read and write
3A6F000
stack
page read and write
3F9E000
heap
page read and write
1D0000
unkown
page readonly
3621000
heap
page read and write
BC7000
unkown
page readonly
BC5000
unkown
page read and write
3F57000
heap
page read and write
9FF000
stack
page read and write
8389000
heap
page read and write
2F20000
heap
page read and write
348B000
heap
page read and write
2E05000
heap
page read and write
3485000
heap
page read and write
1DBE74B0000
heap
page read and write
34FE000
heap
page read and write
2A00000
heap
page read and write
36CD000
direct allocation
page execute and read and write
1DBE5AF3000
heap
page read and write
3621000
heap
page read and write
3CEA000
unkown
page read and write
8D2F000
stack
page read and write
3070000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3F2C000
unclassified section
page read and write
3AB3000
heap
page read and write
2C13000
heap
page read and write
3621000
heap
page read and write
4433000
direct allocation
page read and write
3621000
heap
page read and write
3DDE000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3915000
heap
page read and write
5920000
system
page execute and read and write
9CA000
heap
page read and write
349F000
heap
page read and write
3F58000
heap
page read and write
BC5000
unkown
page read and write
1D0000
unkown
page readonly
3621000
heap
page read and write
3080000
unkown
page readonly
770000
heap
page read and write
3621000
heap
page read and write
8356000
heap
page read and write
4433000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
46A0000
direct allocation
page read and write
BC5000
unkown
page read and write
630000
unkown
page read and write
F70000
unkown
page readonly
3621000
heap
page read and write
3621000
heap
page read and write
4433000
direct allocation
page read and write
3621000
heap
page read and write
4501000
heap
page read and write
2F43000
unkown
page execute and read and write
774000
heap
page read and write
2E00000
heap
page read and write
3621000
heap
page read and write
650000
unkown
page readonly
3621000
heap
page read and write
4273000
unclassified section
page execute and read and write
808000
heap
page read and write
8399000
heap
page read and write
7BE000
stack
page read and write
490000
unkown
page read and write
47CD000
direct allocation
page read and write
3621000
heap
page read and write
4310000
direct allocation
page read and write
3621000
heap
page read and write
83B6000
heap
page read and write
4433000
direct allocation
page read and write
3621000
heap
page read and write
3123000
heap
page read and write
3621000
heap
page read and write
30F8000
stack
page read and write
482000
unkown
page readonly
34EA000
heap
page read and write
2C13000
heap
page read and write
34E4000
heap
page read and write
3621000
heap
page read and write
3529000
direct allocation
page execute and read and write
3621000
heap
page read and write
3621000
heap
page read and write
1348000
heap
page read and write
3E0A000
heap
page read and write
F90000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
8B4000
stack
page read and write
8343000
heap
page read and write
3477000
heap
page read and write
F1A000
stack
page read and write
3E12000
unclassified section
page read and write
2C13000
heap
page read and write
3621000
heap
page read and write
175000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
483E000
direct allocation
page read and write
3720000
heap
page read and write
F80000
unkown
page readonly
3621000
heap
page read and write
47C9000
direct allocation
page read and write
3F9E000
heap
page read and write
BB0000
unkown
page readonly
3F70000
heap
page read and write
3621000
heap
page read and write
483E000
direct allocation
page read and write
3621000
heap
page read and write
2E17000
heap
page read and write
3ED2000
unclassified section
page read and write
3498000
heap
page read and write
3621000
heap
page read and write
2380000
unkown
page readonly
3621000
heap
page read and write
3621000
heap
page read and write
8368000
heap
page read and write
3F07000
heap
page read and write
1DE000
stack
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
2B7E000
stack
page read and write
3F58000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3760000
trusted library allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
8374000
heap
page read and write
1DBE7700000
trusted library allocation
page read and write
2C02000
heap
page read and write
3621000
heap
page read and write
BBE000
unkown
page readonly
47C9000
direct allocation
page read and write
2FDF000
stack
page read and write
3BE9000
direct allocation
page execute and read and write
2370000
heap
page read and write
4433000
direct allocation
page read and write
37A0000
unclassified section
page execute and read and write
9A000
stack
page read and write
3621000
heap
page read and write
F90000
heap
page read and write
8394000
heap
page read and write
3F02000
heap
page read and write
BBE000
unkown
page readonly
3960000
trusted library allocation
page read and write
3621000
heap
page read and write
359E000
direct allocation
page execute and read and write
1DBE77AC000
trusted library allocation
page read and write
3621000
heap
page read and write
800000
heap
page read and write
BB0000
unkown
page readonly
3430000
heap
page read and write
8D6E000
stack
page read and write
3F11000
heap
page read and write
3621000
heap
page read and write
2E12000
heap
page read and write
2E10000
unkown
page read and write
11D2000
unkown
page read and write
401000
unkown
page execute read
53E05FE000
stack
page read and write
3621000
heap
page read and write
3F10000
heap
page execute and read and write
2B40000
direct allocation
page read and write
3D8D000
direct allocation
page execute and read and write
3621000
heap
page read and write
590000
unkown
page readonly
3621000
heap
page read and write
3960000
trusted library allocation
page read and write
3621000
heap
page read and write
F55000
heap
page read and write
46A0000
direct allocation
page read and write
3621000
heap
page read and write
BBE000
unkown
page readonly
3F58000
heap
page read and write
1F0000
unkown
page readonly
1E0000
unkown
page readonly
3621000
heap
page read and write
3E89000
heap
page read and write
3200000
heap
page read and write
3621000
heap
page read and write
3D10000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
53DF5FB000
stack
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3230000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3620000
heap
page read and write
3621000
heap
page read and write
BC7000
unkown
page readonly
3F9E000
heap
page read and write
3750000
heap
page read and write
BB0000
unkown
page readonly
1DBE77C4000
trusted library allocation
page read and write
9CE000
heap
page read and write
8E6F000
stack
page read and write
1DBE7621000
trusted library allocation
page read and write
750000
unkown
page read and write
3464000
heap
page read and write
8350000
heap
page read and write
3621000
heap
page read and write
BC5000
unkown
page read and write
2C13000
heap
page read and write
FDE000
stack
page read and write
3621000
heap
page read and write
11BE000
stack
page read and write
3621000
heap
page read and write
2C13000
heap
page read and write
3EC3000
heap
page read and write
1610000
unkown
page readonly
2F24000
heap
page read and write
400000
unkown
page readonly
47C9000
direct allocation
page read and write
1DBE5ACF000
heap
page read and write
3220000
heap
page read and write
3621000
heap
page read and write
46A0000
direct allocation
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
348B000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3F58000
heap
page read and write
3F07000
heap
page read and write
3E63000
heap
page read and write
863C000
stack
page read and write
3DFE000
heap
page read and write
3074000
heap
page read and write
25FD4000
system
page read and write
2DF0000
unkown
page read and write
3621000
heap
page read and write
3A42000
heap
page read and write
4201000
unclassified section
page execute and read and write
8C2E000
stack
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3201000
heap
page read and write
1E0000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3410000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
2DF0000
unkown
page read and write
2E19000
heap
page read and write
3F9E000
heap
page read and write
3F58000
heap
page read and write
1DBE5AF0000
heap
page read and write
27CB000
stack
page read and write
1690000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
There are 703 hidden memdumps, click here to show them.