Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SOA SEPT 2024.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\78-E67-I
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
modified
|
||
C:\Users\user\AppData\Local\Temp\incalculable
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SOA SEPT 2024.exe
|
"C:\Users\user\Desktop\SOA SEPT 2024.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\SOA SEPT 2024.exe"
|
||
C:\Program Files (x86)\HLGeXaXCmdtRKBLbIBbwNlSpEqeGpdmGGJGpzBLWqHzLEHt\QQySqvmGrp.exe
|
"C:\Program Files (x86)\HLGeXaXCmdtRKBLbIBbwNlSpEqeGpdmGGJGpzBLWqHzLEHt\QQySqvmGrp.exe"
|
||
C:\Windows\SysWOW64\wextract.exe
|
"C:\Windows\SysWOW64\wextract.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.n0pme6.top/2i77/
|
198.44.251.203
|
||
http://www.n0pme6.top/2i77/?78Vh=6f5dTP90xF&ehkd=LTODvrhkMVqC3PKCaJdvO2t6hDsejrMuF+eBTdKoQS/6ei5HfNTQm76vsHOzwLCg1kh0lrMBTIeoxNiIEVh8EQZRdYH26u2LqJt1YWeMJrh5ZIo+pKpB+Wc3K2X12eL+1JIO5dLCeoUs
|
198.44.251.203
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://www.n0pme6.top
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://login.live.c.
|
unknown
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.n0pme6.top
|
198.44.251.203
|
||
servehimfoundation.org
|
84.32.84.32
|
||
www.timetime.store
|
unknown
|
||
www.servehimfoundation.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
84.32.84.32
|
servehimfoundation.org
|
Lithuania
|
||
198.44.251.203
|
www.n0pme6.top
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
53E0000
|
unclassified section
|
page execute and read and write
|
||
4850000
|
unkown
|
page execute and read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
4640000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
unclassified section
|
page execute and read and write
|
||
780000
|
system
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3ECE000
|
heap
|
page read and write
|
||
232F51C0000
|
heap
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3129000
|
heap
|
page read and write
|
||
35E0000
|
unclassified section
|
page execute and read and write
|
||
4521000
|
heap
|
page read and write
|
||
7F2F000
|
stack
|
page read and write
|
||
7C4B000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
232F382D000
|
system
|
page execute and read and write
|
||
2850000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
494E000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F56C4000
|
trusted library allocation
|
page read and write
|
||
295F000
|
unkown
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
4C92000
|
unclassified section
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
232F5601000
|
trusted library allocation
|
page read and write
|
||
3E50000
|
unkown
|
page execute and read and write
|
||
AF0000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
2774000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2C12000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page execute and read and write
|
||
8F3000
|
unkown
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FDA000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
27BC000
|
stack
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
748000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
49A9000
|
direct allocation
|
page execute and read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
48D9000
|
direct allocation
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
3E4E000
|
heap
|
page read and write
|
||
33832000
|
system
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F5400000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
7CA9000
|
heap
|
page read and write
|
||
494E000
|
direct allocation
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3FDA000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2960000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
5EA000
|
stack
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
494E000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
16A1000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
7C75000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
836E000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
82DE000
|
stack
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3E57000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B09000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3FEE000
|
heap
|
page read and write
|
||
34CD000
|
direct allocation
|
page execute and read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7CA2000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4C209FE000
|
stack
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
7C5B000
|
heap
|
page read and write
|
||
7DEF000
|
stack
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
4733000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
F30000
|
unkown
|
page read and write
|
||
49AD000
|
direct allocation
|
page execute and read and write
|
||
3200000
|
direct allocation
|
page execute and read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
7C46000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
A6A000
|
stack
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
70B000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
7CAF000
|
heap
|
page read and write
|
||
7C9C000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
547C000
|
system
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
CAB000
|
unkown
|
page read and write
|
||
7C39000
|
heap
|
page read and write
|
||
EBB000
|
system
|
page execute and read and write
|
||
4521000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
232F5512000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
34D1000
|
direct allocation
|
page execute and read and write
|
||
4C1F1FB000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
232F51E0000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
7C51000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
59B3000
|
unclassified section
|
page execute and read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FEB000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3550000
|
direct allocation
|
page read and write
|
||
494E000
|
direct allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
3023000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
3FC9000
|
heap
|
page read and write
|
||
232F550E000
|
trusted library allocation
|
page read and write
|
||
33772000
|
system
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
3FEA000
|
heap
|
page execute and read and write
|
||
2C05000
|
heap
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
3F70000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
51A2000
|
system
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
232F51E0000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
direct allocation
|
page execute and read and write
|
||
52BC000
|
system
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3EB5000
|
heap
|
page read and write
|
||
3E5E000
|
heap
|
page read and write
|
||
4B4D000
|
direct allocation
|
page execute and read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page readonly
|
||
990000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
494E000
|
direct allocation
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4E95000
|
unkown
|
page execute and read and write
|
||
169F000
|
stack
|
page read and write
|
||
4E23000
|
unkown
|
page execute and read and write
|
||
7C7A000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
BD0000
|
heap
|
page read and write
|
||
4CEC000
|
unclassified section
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
unkown
|
page read and write
|
||
3F71000
|
heap
|
page read and write
|
||
79AC000
|
stack
|
page read and write
|
||
3F71000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
829F000
|
stack
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
2D01000
|
heap
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
2FA2000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
831F000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
57E000
|
unkown
|
page readonly
|
||
CD2000
|
unkown
|
page read and write
|
||
3124000
|
heap
|
page read and write
|
||
232F38DA000
|
heap
|
page read and write
|
||
232F5300000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
232F550A000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
direct allocation
|
page execute and read and write
|
||
19E000
|
stack
|
page read and write
|
||
7C58000
|
heap
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
232F38C0000
|
heap
|
page read and write
|
||
A6A000
|
stack
|
page read and write
|
||
2720000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
2740000
|
unkown
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F5521000
|
trusted library allocation
|
page read and write
|
||
7C6F000
|
heap
|
page read and write
|
||
4733000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3F54000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
4C211FE000
|
stack
|
page read and write
|
||
7C56000
|
heap
|
page read and write
|
||
83AF000
|
stack
|
page read and write
|
||
48D9000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
3EDC000
|
heap
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
EC7000
|
system
|
page execute and read and write
|
||
B6C000
|
heap
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
7EEF000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
2C46000
|
heap
|
page read and write
|
||
232F38EC000
|
heap
|
page read and write
|
||
7C94000
|
heap
|
page read and write
|
||
4C1F9FF000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F5500000
|
trusted library allocation
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
100000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4733000
|
direct allocation
|
page read and write
|
||
7ED0000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
33A4C000
|
system
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
CB5000
|
unkown
|
page read and write
|
||
571000
|
unkown
|
page execute read
|
||
232F56BE000
|
trusted library allocation
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
5426000
|
unclassified section
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
B09000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
825E000
|
stack
|
page read and write
|
||
7CB8000
|
heap
|
page read and write
|
||
C1E000
|
unkown
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2960000
|
unkown
|
page readonly
|
||
C6E000
|
stack
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
7C43000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
3120000
|
heap
|
page read and write
|
||
7BBE000
|
stack
|
page read and write
|
||
232F51E0000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
670000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
48DD000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
57E000
|
unkown
|
page readonly
|
||
494E000
|
direct allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F5515000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
C8B000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
47FC000
|
heap
|
page read and write
|
||
232F56CE000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
EC9000
|
system
|
page execute and read and write
|
||
7C7E000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
4620000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4B51000
|
direct allocation
|
page execute and read and write
|
||
7C5E000
|
heap
|
page read and write
|
||
46D3000
|
heap
|
page read and write
|
||
3E7B000
|
heap
|
page read and write
|
||
587000
|
unkown
|
page readonly
|
||
5262000
|
system
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
7C60000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2740000
|
unkown
|
page read and write
|
||
33FC6000
|
system
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
2C3C000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
7E6C000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FE0000
|
unclassified section
|
page execute and read and write
|
||
4521000
|
heap
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
3001000
|
heap
|
page read and write
|
||
3450000
|
unkown
|
page execute and read and write
|
||
232F38D0000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
587000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
48D9000
|
direct allocation
|
page read and write
|
||
232F38DF000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
312D000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
332D000
|
direct allocation
|
page execute and read and write
|
||
B82000
|
heap
|
page read and write
|
||
3329000
|
direct allocation
|
page execute and read and write
|
||
2C46000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
EAB000
|
system
|
page execute and read and write
|
||
E40000
|
system
|
page execute and read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3542000
|
direct allocation
|
page execute and read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F37E0000
|
system
|
page execute and read and write
|
||
585000
|
unkown
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2720000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7BFE000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4733000
|
direct allocation
|
page read and write
|
||
571000
|
unkown
|
page execute read
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3FBD000
|
heap
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
48D9000
|
direct allocation
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
4EAC000
|
unclassified section
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F3901000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
59F6000
|
system
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
7CA6000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
3D70000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
48DD000
|
direct allocation
|
page read and write
|
||
232F38FE000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
3C70000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
3388C000
|
system
|
page read and write
|
||
4880000
|
direct allocation
|
page execute and read and write
|
||
B75000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
4BD2000
|
unclassified section
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
1790000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
339E000
|
direct allocation
|
page execute and read and write
|
||
48DD000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4482000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
232F382F000
|
system
|
page execute and read and write
|
||
B14000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
48D9000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
452A000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
EA1000
|
system
|
page execute and read and write
|
||
232F39F0000
|
heap
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
F1E000
|
system
|
page execute and read and write
|
||
B6C000
|
heap
|
page read and write
|
||
C31000
|
unkown
|
page readonly
|
||
2A13000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
232F56A5000
|
trusted library allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
5AC000
|
stack
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
48DD000
|
direct allocation
|
page read and write
|
||
7EAC000
|
stack
|
page read and write
|
||
232F5503000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page read and write
|
||
48D9000
|
direct allocation
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
12D0000
|
unkown
|
page readonly
|
||
4733000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
2A50000
|
unkown
|
page execute and read and write
|
||
C60000
|
heap
|
page read and write
|
||
3EDC000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
48DD000
|
direct allocation
|
page read and write
|
||
4733000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
5A25000
|
unclassified section
|
page execute and read and write
|
||
3E61000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
464D000
|
heap
|
page read and write
|
||
232F5510000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
unclassified section
|
page execute and read and write
|
||
232F38FA000
|
heap
|
page read and write
|
||
48DD000
|
direct allocation
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
2774000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4521000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
4C201FE000
|
stack
|
page read and write
|
There are 640 hidden memdumps, click here to show them.