IOC Report
7AeSqNv1rC.exe

loading gif

Files

File Path
Type
Category
Malicious
7AeSqNv1rC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\7AeSqNv1rC.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\clip[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\GIEHIDHJDBFI\AKKFHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\GIEHIDHJDBFI\BFHJJJ
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIEHIDHJDBFI\BGHJJD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIEHIDHJDBFI\BGHJJD-shm
data
dropped
C:\ProgramData\GIEHIDHJDBFI\DBKEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHIDHJDBFI\DGIJEC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIEHIDHJDBFI\ECGDBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GIEHIDHJDBFI\ECGDBF-shm
data
dropped
C:\ProgramData\GIEHIDHJDBFI\HIIIEC
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\GIEHIDHJDBFI\IIEHJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GIEHIDHJDBFI\KFHJJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nholman[1].htm
JSON data
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7AeSqNv1rC.exe
"C:\Users\user\Desktop\7AeSqNv1rC.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GIEHIDHJDBFI" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cowod.hopto.org
unknown
malicious
http://cowod.hopto.org_DEBUG.zip/c
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
malicious
https://t.me/ae5ed
unknown
malicious
https://49.12.106.214/mozglue.dll
49.12.106.214
malicious
https://49.12.106.214/
49.12.106.214
malicious
https://49.12.106.214/nss3.dll
49.12.106.214
malicious
https://49.12.106.214/softokn3.dll
49.12.106.214
malicious
https://49.12.106.214/freebl3.dll
49.12.106.214
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://community.akamai.steamstatic.
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://cowod.hoptoGDGHCGD
unknown
https://49.12.106.214/softokn3.dllV
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://www.fontbureau.com/designers
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
http://www.sajatypeworks.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://49.12.106.214
unknown
http://185.215.113.117/inc/clip.exeZ
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
http://185.215.113.117/nholman/L
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://cowod.hopto.
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://cowod.hopto
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
http://185.215.113.117/nholman/x
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://185.215.113.117/nholman/~
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://cowod.hopto.DGHCGD
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
http://www.carterandcone.coml
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://185.215.113.117/inc/clip.exe
185.215.113.117
http://cowod.FBKEBGDGHCGD
unknown
https://49.12.106.214/freebl3.dllj
unknown
https://steamcommunity.com/w
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://www.fontbureau.com/designersG
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
http://185.215.113.117/
unknown
http://185.215.113.117/inc/clip.exe2kkkkm-data;
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://www.fontbureau.com/designers?
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://49.12.106.214/mozglue.dllp
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://www.goodfont.co.kr
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://steamcommunity.com/discussions/
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://store.steampowered.com/stats/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious

IPs

IP
Domain
Country
Malicious
49.12.106.214
unknown
Germany
malicious
104.102.49.254
steamcommunity.com
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
185.215.113.117
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
2CD1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
11F0000
heap
page read and write
malicious
2CBF000
stack
page read and write
2A8F000
stack
page read and write
126E000
stack
page read and write
13F0000
heap
page read and write
860000
heap
page read and write
F51000
stack
page read and write
13DD000
heap
page read and write
2C10000
heap
page read and write
2C50000
heap
page read and write
4E4B000
stack
page read and write
1B99B000
heap
page read and write
63A000
remote allocation
page execute and read and write
6C8B5000
unkown
page readonly
27E0000
heap
page read and write
F5D000
stack
page read and write
1CEFA000
heap
page read and write
129B000
heap
page read and write
27A0000
heap
page read and write
5100000
heap
page read and write
2D90000
heap
page read and write
1B9AA000
heap
page read and write
1C1E0000
heap
page read and write
1C26D000
heap
page read and write
1030000
trusted library allocation
page read and write
6C631000
unkown
page execute read
22558000
direct allocation
page execute read
2C80000
heap
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
11D7000
heap
page read and write
1C5EF000
heap
page read and write
1D8C8000
heap
page read and write
2279A000
direct allocation
page readonly
4D4E000
stack
page read and write
2B60000
trusted library section
page readonly
1B05F000
heap
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
1B9D4000
heap
page read and write
1C5E8000
heap
page read and write
475E000
stack
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
A60000
unkown
page readonly
12CD8000
trusted library allocation
page read and write
1C43A000
stack
page read and write
1C20C000
heap
page read and write
1C1CF000
stack
page read and write
7FFD9B786000
trusted library allocation
page read and write
1B980000
heap
page read and write
1D8BC000
heap
page read and write
526F000
stack
page read and write
AD000
stack
page read and write
1434000
heap
page read and write
7FD000
stack
page read and write
1D8D8000
heap
page read and write
289B000
heap
page read and write
10B0000
heap
page read and write
1C33B000
stack
page read and write
5A1000
remote allocation
page execute and read and write
1C7F4000
heap
page read and write
6C8AF000
unkown
page write copy
1CEED000
heap
page read and write
22551000
direct allocation
page execute read
1C7F6000
heap
page read and write
5D80000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1146000
heap
page read and write
23A0000
heap
page read and write
516E000
stack
page read and write
2390000
heap
page read and write
3A9CF000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
880000
heap
page read and write
1CAF2000
trusted library allocation
page read and write
FB0000
heap
page read and write
FD0000
heap
page read and write
12E72000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
467000
remote allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
1070000
heap
page read and write
1D7AE000
stack
page read and write
23EE000
stack
page read and write
14FDE000
stack
page read and write
1B773000
heap
page read and write
479E000
stack
page read and write
137E000
heap
page read and write
5D8E000
heap
page read and write
2C70000
heap
page read and write
12A3E000
stack
page read and write
19C8E000
stack
page read and write
54F5C000
stack
page read and write
2C30000
heap
page read and write
1C5D0000
heap
page read and write
48DDE000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1148000
heap
page read and write
9F20000
unclassified section
page read and write
210000
heap
page read and write
220000
heap
page read and write
55A000
remote allocation
page execute and read and write
1D6AF000
stack
page read and write
B80000
heap
page read and write
1CAD0000
trusted library allocation
page read and write
1D8AE000
stack
page read and write
7FFD9B6FB000
trusted library allocation
page execute and read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
7FFD9B6D2000
trusted library allocation
page read and write
2B50000
heap
page read and write
10DD000
heap
page read and write
12C5000
heap
page read and write
1D8EF000
heap
page read and write
1170000
heap
page read and write
1020000
heap
page read and write
6C6AD000
unkown
page readonly
1C265000
heap
page read and write
2C20000
heap
page readonly
1B770000
heap
page read and write
2C7E000
stack
page read and write
2970000
heap
page read and write
23F0000
heap
page read and write
10DF000
heap
page read and write
2D98000
heap
page read and write
1C1F0000
heap
page read and write
1D8B0000
heap
page read and write
4FEE000
stack
page read and write
2275F000
direct allocation
page readonly
226B6000
direct allocation
page execute read
582000
remote allocation
page execute and read and write
1426000
heap
page read and write
47C0000
heap
page read and write
2CCD000
heap
page read and write
1D090000
heap
page read and write
6C86F000
unkown
page readonly
1400000
heap
page read and write
BC0000
heap
page read and write
1CEF1000
heap
page read and write
12E12000
trusted library allocation
page read and write
B95000
heap
page read and write
E5C000
stack
page read and write
10E5000
heap
page read and write
1AE000
stack
page read and write
1D8D1000
heap
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
4D0F000
stack
page read and write
28B77000
heap
page read and write
10320000
heap
page read and write
6C8AE000
unkown
page read and write
2AA0000
heap
page read and write
12CE1000
trusted library allocation
page read and write
54E5B000
stack
page read and write
1000000
trusted library allocation
page read and write
2C82000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
12BC000
heap
page read and write
1037E000
stack
page read and write
1C2D1000
heap
page read and write
232D000
stack
page read and write
7FF485070000
trusted library allocation
page execute and read and write
27DB000
heap
page read and write
2B30000
heap
page read and write
2279F000
direct allocation
page readonly
2E7E000
unkown
page read and write
26FE000
stack
page read and write
104BB000
stack
page read and write
176DE000
stack
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
14F7D000
stack
page read and write
BA0000
heap
page read and write
5509C000
stack
page read and write
1C21D000
heap
page read and write
1C25D000
heap
page read and write
2C3E000
stack
page read and write
2750000
heap
page read and write
4710000
heap
page read and write
22792000
direct allocation
page read and write
27D0000
heap
page read and write
297C000
heap
page read and write
11BC000
heap
page read and write
1C74D000
heap
page read and write
5BEE000
stack
page read and write
1AA000
stack
page read and write
1C5AE000
stack
page read and write
1B5B0000
trusted library allocation
page read and write
2275D000
direct allocation
page execute read
46B000
remote allocation
page execute and read and write
2C96000
heap
page read and write
26FF000
unkown
page read and write
12CD1000
trusted library allocation
page read and write
1C72F000
heap
page read and write
1769E000
stack
page read and write
1CF00000
heap
page read and write
116D000
heap
page read and write
B90000
heap
page read and write
2F7F000
unkown
page read and write
1B26C000
stack
page read and write
2720000
heap
page read and write
22768000
direct allocation
page readonly
23D000
stack
page read and write
1B610000
heap
page execute and read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
EF4000
stack
page read and write
2EAE4000
heap
page read and write
2CB0000
heap
page read and write
1D1AE000
stack
page read and write
13E4000
heap
page read and write
29CE000
stack
page read and write
10ED000
stack
page read and write
4E8E000
stack
page read and write
2C7E000
stack
page read and write
28AC000
stack
page read and write
563000
remote allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
54F9B000
stack
page read and write
FC0000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
29AC000
stack
page read and write
1B5F0000
heap
page read and write
26FA000
stack
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
78D0000
heap
page read and write
4F8E000
stack
page read and write
1B96D000
stack
page read and write
6C630000
unkown
page readonly
6C6BE000
unkown
page read and write
239A000
stack
page read and write
1C477000
heap
page read and write
78E0000
heap
page read and write
2890000
heap
page read and write
6C8B0000
unkown
page read and write
2279D000
direct allocation
page readonly
7BC000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
1151000
heap
page read and write
1B6A0000
heap
page read and write
A60000
unkown
page readonly
1076000
heap
page read and write
23AE000
unkown
page read and write
2C55000
heap
page read and write
150DF000
stack
page read and write
34A58000
heap
page read and write
19C1F000
stack
page read and write
1CED0000
heap
page read and write
A62000
unkown
page readonly
1B9AC000
heap
page read and write
10B3000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
5D86000
heap
page read and write
1515D000
stack
page read and write
463000
remote allocation
page execute and read and write
BE0000
heap
page read and write
9F1E000
stack
page read and write
6C6D1000
unkown
page execute read
4ED5D000
heap
page read and write
1025000
heap
page read and write
1C1FB000
heap
page read and write
4C0F000
stack
page read and write
7FFD9B6E2000
trusted library allocation
page read and write
40931000
heap
page read and write
670000
remote allocation
page execute and read and write
1D010000
trusted library section
page read and write
870000
heap
page read and write
1B5F5000
heap
page read and write
2B75000
heap
page read and write
6C6D0000
unkown
page readonly
1AD00000
trusted library allocation
page read and write
107C000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
2B70000
heap
page read and write
129FC000
stack
page read and write
22C0B000
heap
page read and write
2C77000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
1B970000
heap
page read and write
22550000
direct allocation
page execute and read and write
55D000
remote allocation
page execute and read and write
6C6C2000
unkown
page readonly
2CC0000
heap
page execute and read and write
114D000
stack
page read and write
50EF000
stack
page read and write
136E000
stack
page read and write
F4D000
stack
page read and write
2600000
heap
page read and write
1047F000
stack
page read and write
There are 276 hidden memdumps, click here to show them.