IOC Report
oLCnCWQDhK.exe

loading gif

Files

File Path
Type
Category
Malicious
oLCnCWQDhK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\78-E67-I
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified
C:\Users\user\AppData\Local\Temp\sulfhydric
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oLCnCWQDhK.exe
"C:\Users\user\Desktop\oLCnCWQDhK.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\oLCnCWQDhK.exe"
malicious
C:\Program Files (x86)\WTxtoIHnwgYQnMauPcJdJlcdhoLvMzBRBwfYcbyutNlTfhPKsepkKmlKAsefUSVxgYQEoQLZSaAhnGS\EthPSueuMbeZ.exe
"C:\Program Files (x86)\WTxtoIHnwgYQnMauPcJdJlcdhoLvMzBRBwfYcbyutNlTfhPKsepkKmlKAsefUSVxgYQEoQLZSaAhnGS\EthPSueuMbeZ.exe"
malicious
C:\Windows\SysWOW64\wextract.exe
"C:\Windows\SysWOW64\wextract.exe"
malicious
C:\Program Files (x86)\WTxtoIHnwgYQnMauPcJdJlcdhoLvMzBRBwfYcbyutNlTfhPKsepkKmlKAsefUSVxgYQEoQLZSaAhnGS\EthPSueuMbeZ.exe
"C:\Program Files (x86)\WTxtoIHnwgYQnMauPcJdJlcdhoLvMzBRBwfYcbyutNlTfhPKsepkKmlKAsefUSVxgYQEoQLZSaAhnGS\EthPSueuMbeZ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.n0pme6.top/2i77/?FBeh=LTODvrhkMVqC3PKCaJdvO2t6hDsejrMuF+eBTdKoQS/6ei5HfNTQm76vsHOzwLCg1kh0lrMBTIeoxNiIEVh8EQZRdYH26u2LqJt1YWeMJrh5ZIo+pKpB+Wc3K2X12eL+1JIO5dLCeoUs&DfhDq=hvZ8HhLP1L
198.44.251.203
malicious
http://www.n0pme6.top/2i77/
198.44.251.203
malicious
http://www.n0pme6.top
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.n0pme6.top
198.44.251.203
malicious
servehimfoundation.org
84.32.84.32
malicious
www.timetime.store
unknown
malicious
www.servehimfoundation.org
unknown
malicious

IPs

IP
Domain
Country
Malicious
84.32.84.32
servehimfoundation.org
Lithuania
malicious
198.44.251.203
www.n0pme6.top
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2CC0000
system
page execute and read and write
malicious
30D0000
unkown
page execute and read and write
malicious
2F70000
unclassified section
page execute and read and write
malicious
4950000
trusted library allocation
page read and write
malicious
49A0000
trusted library allocation
page read and write
malicious
690000
system
page execute and read and write
malicious
3550000
unclassified section
page execute and read and write
malicious
25B1DC00000
trusted library allocation
page read and write
3542000
direct allocation
page execute and read and write
417F000
heap
page execute and read and write
2E4D000
heap
page read and write
45A0000
direct allocation
page read and write
316C000
unkown
page read and write
482000
unkown
page readonly
7CC1000
heap
page read and write
3081000
heap
page read and write
486D000
direct allocation
page read and write
3081000
heap
page read and write
1260000
heap
page read and write
C77000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
25B1C1F2000
heap
page read and write
2E95000
heap
page read and write
36C0000
unkown
page execute and read and write
1210000
system
page execute and read and write
D80000
heap
page read and write
14B0000
heap
page read and write
4740000
direct allocation
page read and write
C60000
unkown
page readonly
3081000
heap
page read and write
4C0C000
heap
page read and write
A05000
heap
page read and write
11E0000
unkown
page readonly
4869000
direct allocation
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
7D22000
heap
page read and write
2D94000
heap
page read and write
3000000
heap
page read and write
3081000
heap
page read and write
4040000
heap
page read and write
1430000
unkown
page read and write
3081000
heap
page read and write
C6E000
unkown
page readonly
4440000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
48DE000
direct allocation
page read and write
40C0000
heap
page read and write
8AF000
stack
page read and write
2DFE000
heap
page read and write
482000
unkown
page readonly
2E7A000
heap
page read and write
3081000
heap
page read and write
2ED3000
heap
page read and write
34CD000
direct allocation
page execute and read and write
7D1F000
heap
page read and write
C77000
unkown
page readonly
4DBD000
direct allocation
page execute and read and write
A57000
heap
page read and write
1240000
unkown
page readonly
1230000
unkown
page readonly
3200000
direct allocation
page execute and read and write
3081000
heap
page read and write
332D000
direct allocation
page execute and read and write
84A61FE000
stack
page read and write
3081000
heap
page read and write
813000
heap
page read and write
1E0000
heap
page read and write
3081000
heap
page read and write
48DE000
direct allocation
page read and write
7D25000
heap
page read and write
E80000
unkown
page readonly
4F61000
direct allocation
page execute and read and write
1350000
unkown
page read and write
1A41000
unkown
page readonly
2FD0000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
25B1C0C0000
system
page execute and read and write
3030000
heap
page read and write
3081000
heap
page read and write
2DFE000
heap
page read and write
3081000
heap
page read and write
2EC2000
heap
page read and write
2D90000
heap
page read and write
DCE000
stack
page read and write
100000
heap
page read and write
7CA9000
heap
page read and write
3E40000
heap
page read and write
25B1C0FB000
system
page execute and read and write
4B50000
trusted library allocation
page read and write
14D0000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
940000
heap
page read and write
813000
heap
page read and write
1285000
system
page execute and read and write
3081000
heap
page read and write
4B50000
trusted library allocation
page read and write
3081000
heap
page read and write
800000
heap
page read and write
D50000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
D50000
unkown
page readonly
25B1DECE000
trusted library allocation
page read and write
93E000
stack
page read and write
3081000
heap
page read and write
4B50000
trusted library allocation
page read and write
7D35000
heap
page read and write
3081000
heap
page read and write
E70000
unkown
page readonly
3081000
heap
page read and write
5B5F000
stack
page read and write
2EB7000
heap
page read and write
12C1000
unkown
page readonly
3081000
heap
page read and write
492000
unkown
page read and write
3081000
heap
page read and write
3F2D000
heap
page read and write
750000
direct allocation
page read and write
3F63000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
A17000
heap
page read and write
2E85000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
14B8000
heap
page read and write
DD0000
unkown
page read and write
3081000
heap
page read and write
7F60000
heap
page read and write
B01000
heap
page read and write
CA0000
unkown
page readonly
3081000
heap
page read and write
46C3000
direct allocation
page read and write
1230000
unkown
page readonly
2D90000
heap
page read and write
3081000
heap
page read and write
40CC000
heap
page read and write
3081000
heap
page read and write
DE1000
unkown
page readonly
25B1DEC4000
trusted library allocation
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
1C8A6000
system
page read and write
2F52000
unkown
page read and write
1295000
system
page execute and read and write
3081000
heap
page read and write
5A5E000
stack
page read and write
13D0000
heap
page read and write
3081000
heap
page read and write
2E92000
unkown
page read and write
3081000
heap
page read and write
4BCE000
stack
page read and write
3FAC000
heap
page read and write
813000
heap
page read and write
3081000
heap
page read and write
14F5000
heap
page read and write
2E60000
heap
page read and write
3081000
heap
page read and write
8FE000
stack
page read and write
84A69FE000
stack
page read and write
3081000
heap
page read and write
3F91000
heap
page read and write
3081000
heap
page read and write
25B1DD21000
trusted library allocation
page read and write
C61000
unkown
page execute read
E70000
unkown
page readonly
FFC000
stack
page read and write
486D000
direct allocation
page read and write
14F5000
heap
page read and write
2E37000
heap
page read and write
3081000
heap
page read and write
CB0000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
9AE000
stack
page read and write
7D19000
heap
page read and write
3F94000
heap
page read and write
48DE000
direct allocation
page read and write
25B1DE01000
trusted library allocation
page read and write
2DF9000
heap
page read and write
C6E000
unkown
page readonly
3081000
heap
page read and write
C75000
unkown
page read and write
3081000
heap
page read and write
1206000
heap
page read and write
46C3000
direct allocation
page read and write
EFA000
stack
page read and write
2DFE000
heap
page read and write
12A3000
system
page execute and read and write
813000
heap
page read and write
3081000
heap
page read and write
2E00000
heap
page read and write
A4D000
heap
page read and write
2FE0000
unkown
page readonly
3081000
heap
page read and write
2D6F000
stack
page read and write
3B2F000
stack
page read and write
CD0000
direct allocation
page read and write
3180000
heap
page read and write
3BB2000
unclassified section
page execute and read and write
4183000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
A17000
heap
page read and write
813000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
25B1C1DC000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
7CD0000
heap
page read and write
40EF000
heap
page read and write
34D1000
direct allocation
page execute and read and write
2E8F000
heap
page read and write
A8C000
heap
page read and write
3081000
heap
page read and write
4020000
heap
page read and write
3081000
heap
page read and write
3F2B000
heap
page read and write
4AE3000
heap
page read and write
3081000
heap
page read and write
4930000
trusted library allocation
page read and write
82EE000
stack
page read and write
25B1DD03000
trusted library allocation
page read and write
12C1000
unkown
page readonly
3081000
heap
page read and write
4AB000
unkown
page readonly
7CBC000
heap
page read and write
3081000
heap
page read and write
2F1F000
stack
page read and write
14B8000
heap
page read and write
2EA3000
heap
page read and write
25B1C1EB000
heap
page read and write
3081000
heap
page read and write
52BC000
unclassified section
page read and write
2FAC000
unkown
page read and write
2DFA000
heap
page read and write
25B1DEA5000
trusted library allocation
page read and write
3081000
heap
page read and write
4F5D000
direct allocation
page execute and read and write
3081000
heap
page read and write
CB0000
unkown
page readonly
B83000
heap
page read and write
372E000
stack
page read and write
A70000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
DF0000
unkown
page read and write
25B1C1F2000
heap
page read and write
48DE000
direct allocation
page read and write
7A20000
trusted library allocation
page read and write
3081000
heap
page read and write
3F99000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
813000
heap
page read and write
3081000
heap
page read and write
2E60000
heap
page read and write
2F00000
direct allocation
page read and write
3081000
heap
page read and write
4C7C000
stack
page read and write
2DFE000
heap
page read and write
D1A000
stack
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
2DF3000
heap
page read and write
7CCE000
heap
page read and write
7D15000
heap
page read and write
25B1DD00000
trusted library allocation
page read and write
36E6000
unkown
page read and write
1250000
unkown
page readonly
339E000
direct allocation
page execute and read and write
7D12000
heap
page read and write
3081000
heap
page read and write
4869000
direct allocation
page read and write
2FD0000
heap
page read and write
A59000
heap
page read and write
C60000
unkown
page readonly
25B1DB40000
heap
page read and write
C75000
unkown
page read and write
2D40000
heap
page read and write
83CF000
stack
page read and write
4C81000
heap
page read and write
46C3000
direct allocation
page read and write
175F000
stack
page read and write
3081000
heap
page read and write
4869000
direct allocation
page read and write
3081000
heap
page read and write
2DF3000
heap
page read and write
2DE8000
heap
page read and write
D60000
unkown
page readonly
C6E000
unkown
page readonly
4180000
heap
page read and write
2FB0000
heap
page read and write
4869000
direct allocation
page read and write
45A0000
direct allocation
page read and write
3081000
heap
page read and write
4FD2000
direct allocation
page execute and read and write
5836000
unclassified section
page read and write
D60000
unkown
page readonly
56DC000
stack
page read and write
2D94000
heap
page read and write
4869000
direct allocation
page read and write
2E40000
heap
page read and write
3081000
heap
page read and write
2D94000
heap
page read and write
2DA0000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
A60000
heap
page read and write
3081000
heap
page read and write
490000
unkown
page read and write
2FE0000
unkown
page readonly
D80000
heap
page read and write
3081000
heap
page read and write
2E4D000
heap
page read and write
C75000
unkown
page read and write
3081000
heap
page read and write
25B1C190000
heap
page read and write
2FB4000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
4AB000
unkown
page readonly
25B1DA90000
heap
page read and write
4190000
heap
page read and write
3081000
heap
page read and write
4A8000
unkown
page read and write
1250000
unkown
page readonly
14B0000
heap
page read and write
3C2A000
heap
page read and write
486D000
direct allocation
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
2DF5000
heap
page read and write
3081000
heap
page read and write
4AA0000
trusted library allocation
page execute and read and write
12B0000
unkown
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
2E7F000
heap
page read and write
3081000
heap
page read and write
493E000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
C61000
unkown
page execute read
2E99000
heap
page read and write
7CC6000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
25B1DB50000
trusted library allocation
page read and write
7CB6000
heap
page read and write
3081000
heap
page read and write
4740000
direct allocation
page read and write
C60000
unkown
page readonly
45A0000
direct allocation
page read and write
2C98000
stack
page read and write
3F88000
heap
page read and write
2F23000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
25B1C0F9000
system
page execute and read and write
127B000
system
page execute and read and write
C90000
unkown
page readonly
2E73000
heap
page read and write
9A000
stack
page read and write
3081000
heap
page read and write
45A0000
direct allocation
page read and write
3081000
heap
page read and write
EFA000
stack
page read and write
9C5000
heap
page read and write
4C90000
direct allocation
page execute and read and write
25B1C1C7000
heap
page read and write
7F1E000
stack
page read and write
3081000
heap
page read and write
2EC7000
heap
page read and write
1861000
unkown
page readonly
3081000
heap
page read and write
3732000
unkown
page execute and read and write
401000
unkown
page execute read
67A000
stack
page read and write
2DF9000
heap
page read and write
7CC8000
heap
page read and write
3081000
heap
page read and write
2E5D000
heap
page read and write
3081000
heap
page read and write
2DFE000
heap
page read and write
DF0000
unkown
page read and write
490000
unkown
page write copy
3081000
heap
page read and write
1320000
unkown
page read and write
2E67000
heap
page read and write
C61000
unkown
page execute read
7DA0000
trusted library allocation
page read and write
813000
heap
page read and write
A59000
heap
page read and write
2E8C000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
A12000
heap
page read and write
1C32C000
system
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
7CF0000
heap
page read and write
C77000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
16B0000
unkown
page readonly
B6A000
heap
page read and write
10FC000
stack
page read and write
832F000
stack
page read and write
25B1DD0E000
trusted library allocation
page read and write
12D0000
unkown
page read and write
4E2E000
direct allocation
page execute and read and write
3081000
heap
page read and write
2C5B000
stack
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
45A0000
direct allocation
page read and write
3081000
heap
page read and write
4869000
direct allocation
page read and write
3081000
heap
page read and write
1860000
unkown
page readonly
63C000
stack
page read and write
4C0E000
stack
page read and write
48DE000
direct allocation
page read and write
2D90000
heap
page read and write
1240000
unkown
page readonly
2DF5000
heap
page read and write
3081000
heap
page read and write
4740000
direct allocation
page read and write
50FC000
unclassified section
page read and write
78E000
stack
page read and write
A0E000
stack
page read and write
3081000
heap
page read and write
FFC000
stack
page read and write
813000
heap
page read and write
3081000
heap
page read and write
8B4000
stack
page read and write
12D0000
unkown
page read and write
14CB000
heap
page read and write
3001000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
2E04000
heap
page read and write
6E0000
heap
page read and write
400000
unkown
page readonly
1330000
heap
page read and write
2DFE000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
49F0000
trusted library allocation
page read and write
813000
heap
page read and write
3081000
heap
page read and write
25B1DB50000
trusted library allocation
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
7D0C000
heap
page read and write
1390000
heap
page read and write
3081000
heap
page read and write
7CEE000
heap
page read and write
2FE0000
heap
page read and write
45A0000
direct allocation
page read and write
DD0000
unkown
page read and write
5B9E000
stack
page read and write
4740000
direct allocation
page read and write
46C3000
direct allocation
page read and write
1390000
heap
page read and write
319E000
heap
page read and write
12A1000
system
page execute and read and write
25B1DE00000
trusted library allocation
page read and write
838E000
stack
page read and write
2DE0000
heap
page read and write
C6E000
unkown
page readonly
B60000
heap
page read and write
3081000
heap
page read and write
2E73000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
1C112000
system
page read and write
312D000
heap
page read and write
3081000
heap
page read and write
46C3000
direct allocation
page read and write
13D0000
heap
page read and write
2ECA000
heap
page read and write
4086000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
A10000
heap
page read and write
7CE000
stack
page read and write
3B40000
unclassified section
page execute and read and write
7CCB000
heap
page read and write
5C9F000
stack
page read and write
25B1C1A0000
heap
page read and write
4C10000
heap
page read and write
84A51FB000
stack
page read and write
7F5F000
stack
page read and write
3081000
heap
page read and write
4869000
direct allocation
page read and write
2F20000
direct allocation
page read and write
401000
unkown
page execute read
D1A000
stack
page read and write
3081000
heap
page read and write
16B0000
unkown
page readonly
3081000
heap
page read and write
3081000
heap
page read and write
A75000
heap
page read and write
1C052000
system
page read and write
700000
heap
page read and write
CA0000
unkown
page readonly
A57000
heap
page read and write
DE1000
unkown
page readonly
A2B000
heap
page read and write
3081000
heap
page read and write
1A40000
unkown
page readonly
CD0000
direct allocation
page read and write
3081000
heap
page read and write
3F8B000
heap
page read and write
A24000
heap
page read and write
813000
heap
page read and write
3081000
heap
page read and write
7CB3000
heap
page read and write
C90000
unkown
page readonly
3081000
heap
page read and write
B9A000
heap
page read and write
25B1C1C0000
heap
page read and write
813000
heap
page read and write
3081000
heap
page read and write
4114000
heap
page read and write
3081000
heap
page read and write
E90000
unkown
page readonly
1410000
unkown
page readonly
486D000
direct allocation
page read and write
4FE2000
unclassified section
page read and write
14EB000
heap
page read and write
3081000
heap
page read and write
400000
unkown
page readonly
E80000
unkown
page readonly
48DE000
direct allocation
page read and write
7D28000
heap
page read and write
3081000
heap
page read and write
45A0000
direct allocation
page read and write
3081000
heap
page read and write
486D000
direct allocation
page read and write
13D8000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
4162000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
B6E000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
802000
heap
page read and write
1350000
unkown
page read and write
4180000
heap
page read and write
E90000
unkown
page readonly
2E1F000
stack
page read and write
3081000
heap
page read and write
740000
heap
page read and write
3081000
heap
page read and write
7D04000
heap
page read and write
4740000
direct allocation
page read and write
7CD3000
heap
page read and write
2E4D000
heap
page read and write
3081000
heap
page read and write
14D0000
unkown
page readonly
813000
heap
page read and write
2F0C000
heap
page read and write
813000
heap
page read and write
1200000
heap
page read and write
D70000
unkown
page readonly
7CEA000
heap
page read and write
2E67000
heap
page read and write
1260000
heap
page read and write
55DC000
stack
page read and write
7CE5000
heap
page read and write
7CDF000
heap
page read and write
A05000
heap
page read and write
3081000
heap
page read and write
1330000
unkown
page read and write
3081000
heap
page read and write
316C000
unkown
page read and write
B8D000
heap
page read and write
3C2C000
heap
page read and write
3081000
heap
page read and write
B10000
heap
page read and write
486D000
direct allocation
page read and write
2E5D000
heap
page read and write
9C0000
heap
page read and write
A00000
heap
page read and write
1330000
heap
page read and write
4740000
direct allocation
page read and write
730000
heap
page read and write
25B1DEBE000
trusted library allocation
page read and write
491000
unkown
page write copy
1512000
unkown
page read and write
C75000
unkown
page read and write
3D40000
heap
page read and write
48DE000
direct allocation
page read and write
2E10000
heap
page read and write
418F000
heap
page read and write
3081000
heap
page read and write
2E04000
heap
page read and write
3081000
heap
page read and write
813000
heap
page read and write
3081000
heap
page read and write
4B70000
trusted library allocation
page read and write
3080000
heap
page read and write
3081000
heap
page read and write
2E52000
heap
page read and write
25B1C1EF000
heap
page read and write
3129000
heap
page read and write
D70000
unkown
page readonly
3081000
heap
page read and write
C61000
unkown
page execute read
3329000
direct allocation
page execute and read and write
C77000
unkown
page readonly
3081000
heap
page read and write
12B0000
unkown
page read and write
1200000
heap
page read and write
3081000
heap
page read and write
2E92000
unkown
page read and write
13EF000
heap
page read and write
3081000
heap
page read and write
3081000
heap
page read and write
13F9000
heap
page read and write
3B32000
heap
page read and write
25B1DD11000
trusted library allocation
page read and write
813000
heap
page read and write
3081000
heap
page read and write
1410000
unkown
page readonly
12F8000
system
page execute and read and write
46C3000
direct allocation
page read and write
84A59FD000
stack
page read and write
2EBD000
heap
page read and write
486D000
direct allocation
page read and write
2D94000
heap
page read and write
1430000
unkown
page read and write
7EDC000
stack
page read and write
4740000
direct allocation
page read and write
3FA1000
heap
page read and write
3081000
heap
page read and write
4DB9000
direct allocation
page execute and read and write
2D94000
heap
page read and write
813000
heap
page read and write
10FC000
stack
page read and write
3081000
heap
page read and write
CD0000
direct allocation
page read and write
3081000
heap
page read and write
135D000
stack
page read and write
2DA0000
unkown
page readonly
C60000
unkown
page readonly
13D8000
heap
page read and write
2FB0000
heap
page read and write
3081000
heap
page read and write
46C3000
direct allocation
page read and write
2FE4000
heap
page read and write
2FB4000
heap
page read and write
2F02000
heap
page read and write
4A61000
heap
page read and write
11E0000
unkown
page readonly
50A2000
unclassified section
page read and write
4930000
heap
page read and write
There are 668 hidden memdumps, click here to show them.