IOC Report
lByv6mqTCJ.exe

loading gif

Files

File Path
Type
Category
Malicious
lByv6mqTCJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\13612MI5K
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lByv6mqTCJ.exe
"C:\Users\user\Desktop\lByv6mqTCJ.exe"
malicious
C:\Program Files (x86)\qCxIpusqZONCCjzbpJDffXbRFAcIKoXbBEQoEJrcdiBpRvwrym\ooaSzUjoYqoTW.exe
"C:\Program Files (x86)\qCxIpusqZONCCjzbpJDffXbRFAcIKoXbBEQoEJrcdiBpRvwrym\ooaSzUjoYqoTW.exe"
malicious
C:\Windows\SysWOW64\grpconv.exe
"C:\Windows\SysWOW64\grpconv.exe"
malicious
C:\Program Files (x86)\qCxIpusqZONCCjzbpJDffXbRFAcIKoXbBEQoEJrcdiBpRvwrym\ooaSzUjoYqoTW.exe
"C:\Program Files (x86)\qCxIpusqZONCCjzbpJDffXbRFAcIKoXbBEQoEJrcdiBpRvwrym\ooaSzUjoYqoTW.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.085bet.xyz/nn3h/
45.194.36.12
malicious
http://www.trapkitten.website/ucuo/
195.161.68.8
malicious
http://www.nakama2-sshl.xyz/bgpi/
183.181.83.131
malicious
http://www.rjscorp.org/cei6/?2z=PtRhXbM&PJ9L=wjh3rahD5O8YyXDPiPgI2jcIa9PhSWViTP6mKxO94t21NngHPpPWFw/W8Bs1fVklZglLQeYSd7bpiR31wlDzTqFVQD+LW583mR1Tetwe2kyAmXAyEFXhKtTdwvrG/oT0lA==
3.33.130.190
malicious
http://www.rjscorp.org/cei6/
3.33.130.190
malicious
http://www.comedy.finance/mwd0/?PJ9L=zsNMsRGwEFvVUID2nvwzyJklFTuhYiH3MBMxsvplKOF6Mot/KgyF89prR2KXiWv2/O5FSCYG4KxKtJQmoSRR8B5YKwFVkQBt4uWwdNPaISGNJHiwitW0fGlJLbvQSjZk/A==&2z=PtRhXbM
13.248.169.48
malicious
http://www.mudanya-nakliyat.xyz/tkqd/
85.159.66.93
malicious
http://www.nakama2-sshl.xyz/bgpi/?PJ9L=YTBtpahDWzdXKpondkv4unjklxOnnU8zYfk5eJgvm8+FRFKzirlrJKz42G/aqidm6CRQYg/EPrqYrXSvoqI47MOsphbaLGnzH8fia9Q2y/K0qDU8XdfqR00415ssDP2dWw==&2z=PtRhXbM
183.181.83.131
malicious
http://www.mudanya-nakliyat.xyz/tkqd/?PJ9L=gK3QMDONvn1ERFi3le5iq9CigfqrIypj3GmKmlk3fya6bSQAZ6Mmquf2H7jJBtRUywZhV3/ctEceSqN2mfA4IjI7ZNYjXHB3esnYbISz5Gf8jiahD8UpXyLU85TiP8RgbQ==&2z=PtRhXbM
85.159.66.93
malicious
http://www.jophy.life/umni/
162.0.238.246
malicious
http://www.085bet.xyz/nn3h/?PJ9L=0X/3r3PU8xeQ+UpzBpepRVcIT4+X7S/8fyuzw9u5zzT5DQpczFdmzE38B+SQag3b+0hUKu1k9LV6hnarOtmdXHDrfjsm00b18tkifTWDLiTHQlouOXMCIVM1BtqJliAH1Q==&2z=PtRhXbM
45.194.36.12
malicious
http://www.jophy.life/umni/?2z=PtRhXbM&PJ9L=JmqTC62v8P7mi6uPhLDAp9iaIjXSB8PwqG0a5mqRptE5j7gES97YNZljt2Ht2eKQTLeZ3UNIpnjTdZAH1rWC29igZO3jlkfdeSpr3eIJWfELnBNobLhFHVBS/RUmS3PasQ==
162.0.238.246
malicious
http://www.comedy.finance/mwd0/
13.248.169.48
malicious
http://www.wdeb18.top/vy4k/?PJ9L=d32l86geEWYHZjxTvbwjbSU9LAKscW6mTUIXWgcYKnqJcO8pcs3M8TeLmvZmGSd++zsCnZUgxj5ZgSRZm5GNnST7Zdxi7nq5Mi/W1p3900gY77wjz5lHrGRPWDQkbfDtqg==&2z=PtRhXbM
206.119.82.147
malicious
http://www.trapkitten.website/ucuo/?PJ9L=F2idnr0OHvaqOr51MpBBHVyFl1qtLQKAl/KaTPRWCGeZjFeJnhqhzch+KjyhoQK5CvQXQgMRpx/N5s0yRowiXacxk2STcCVUR6hfHsh5g/iR2diS6k4PTHt/uTzg7spZGA==&2z=PtRhXbM
195.161.68.8
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://nakama2-sshl.xyz/bgpi/?PJ9L=YTBtpahDWzdXKpondkv4unjklxOnnU8zYfk5eJgvm8
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.mudanya-nakliyat.xyz
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.nakama2-sshl.xyz
183.181.83.131
malicious
rjscorp.org
3.33.130.190
malicious
www.jophy.life
162.0.238.246
malicious
wdeb18.top
206.119.82.147
malicious
www.trapkitten.website
195.161.68.8
malicious
www.comedy.finance
13.248.169.48
malicious
cluster580fc23f.abcty2.com
45.194.36.12
malicious
natroredirect.natrocdn.com
85.159.66.93
malicious
www.48vlu.shop
unknown
malicious
www.wdeb18.top
unknown
malicious
www.085bet.xyz
unknown
malicious
www.mudanya-nakliyat.xyz
unknown
malicious
www.kabaribukota.press
unknown
malicious
www.pussy.coupons
unknown
malicious
www.rjscorp.org
unknown
malicious
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
162.0.238.246
www.jophy.life
Canada
malicious
13.248.169.48
www.comedy.finance
United States
malicious
45.194.36.12
cluster580fc23f.abcty2.com
Seychelles
malicious
206.119.82.147
wdeb18.top
United States
malicious
183.181.83.131
www.nakama2-sshl.xyz
Japan
malicious
195.161.68.8
www.trapkitten.website
Russian Federation
malicious
3.33.130.190
rjscorp.org
United States
malicious
85.159.66.93
natroredirect.natrocdn.com
Turkey
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4330000
trusted library allocation
page read and write
malicious
411000
unkown
page execute and read and write
malicious
5530000
unkown
page execute and read and write
malicious
2A10000
trusted library allocation
page read and write
malicious
4430000
unclassified section
page execute and read and write
malicious
1750000
unclassified section
page execute and read and write
malicious
620000
system
page execute and read and write
malicious
CB0000
unkown
page read and write
4231000
heap
page read and write
1234000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
190D000
direct allocation
page execute and read and write
BE0000
unkown
page read and write
2A50000
heap
page read and write
28E9000
heap
page read and write
5214000
system
page execute and read and write
51BF000
system
page execute and read and write
4231000
heap
page read and write
4231000
heap
page read and write
44C0000
trusted library allocation
page read and write
7947000
heap
page read and write
CAE000
stack
page read and write
4231000
heap
page read and write
457E000
stack
page read and write
2CFC000
unkown
page read and write
196D5E80000
trusted library allocation
page read and write
1234000
heap
page read and write
4231000
heap
page read and write
E20000
heap
page read and write
4231000
heap
page read and write
4DE5000
unclassified section
page execute and read and write
7971000
heap
page read and write
16BF000
stack
page read and write
175E000
heap
page read and write
4231000
heap
page read and write
2A50000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4130000
unkown
page execute and read and write
3030000
unclassified section
page execute and read and write
4231000
heap
page read and write
A3A000
stack
page read and write
13A5000
heap
page read and write
4231000
heap
page read and write
AF0000
unkown
page readonly
7937000
heap
page read and write
78FD000
heap
page read and write
4231000
heap
page read and write
AE0000
unkown
page readonly
196D63A5000
trusted library allocation
page read and write
2A14000
heap
page read and write
3276000
unkown
page read and write
138A000
heap
page read and write
485D000
direct allocation
page execute and read and write
4CE000
unkown
page readonly
4231000
heap
page read and write
4231000
heap
page read and write
100E000
stack
page read and write
BC0000
unkown
page readonly
4231000
heap
page read and write
196D63C4000
trusted library allocation
page read and write
B80000
unkown
page readonly
4231000
heap
page read and write
17E0000
direct allocation
page execute and read and write
7912000
heap
page read and write
1480000
heap
page read and write
4231000
heap
page read and write
196D4570000
heap
page read and write
4231000
heap
page read and write
139F000
heap
page read and write
4231000
heap
page read and write
139F000
heap
page read and write
1481000
heap
page read and write
7974000
heap
page read and write
4231000
heap
page read and write
28A1000
heap
page read and write
D30000
heap
page read and write
5136000
unclassified section
page read and write
411000
unkown
page execute read
2D30000
unkown
page execute and read and write
4231000
heap
page read and write
139F000
heap
page read and write
196D620F000
trusted library allocation
page read and write
4231000
heap
page read and write
1394000
heap
page read and write
4231000
heap
page read and write
28C7000
heap
page read and write
4D5000
unkown
page read and write
1234000
heap
page read and write
2A10000
heap
page read and write
196D45CC000
heap
page read and write
7964000
heap
page read and write
1470C000
system
page read and write
7916000
heap
page read and write
48D2000
direct allocation
page execute and read and write
15AF000
heap
page read and write
175A000
heap
page read and write
410000
unkown
page readonly
196D6221000
trusted library allocation
page read and write
545A000
unclassified section
page read and write
101F000
stack
page read and write
196D620A000
trusted library allocation
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
139D000
heap
page read and write
4231000
heap
page read and write
790F000
heap
page read and write
E20000
heap
page read and write
4C1000
unkown
page execute read
87A27FE000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
78CF000
heap
page read and write
196D5E80000
trusted library allocation
page read and write
2C40000
unkown
page readonly
4420000
trusted library allocation
page execute and read and write
7C0000
unkown
page readonly
44C0000
trusted library allocation
page read and write
3A30000
unclassified section
page execute and read and write
BB0000
unkown
page readonly
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
2897000
heap
page read and write
4231000
heap
page read and write
774000
heap
page read and write
6A0000
heap
page read and write
4CE000
unkown
page readonly
4231000
heap
page read and write
2A3E000
stack
page read and write
44C0000
trusted library allocation
page read and write
4231000
heap
page read and write
D2E000
stack
page read and write
2813000
heap
page read and write
196D44A0000
system
page execute and read and write
28CD000
heap
page read and write
2808000
heap
page read and write
1160000
heap
page read and write
78C2000
heap
page read and write
4231000
heap
page read and write
A3A000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
7C0000
heap
page read and write
4231000
heap
page read and write
1010000
unkown
page read and write
CB0000
unkown
page read and write
13B0000
heap
page read and write
4231000
heap
page read and write
CAE000
stack
page read and write
196D6040000
heap
page read and write
2A40000
unkown
page read and write
4231000
heap
page read and write
BC0000
unkown
page readonly
2886000
heap
page read and write
4231000
heap
page read and write
4861000
direct allocation
page execute and read and write
4231000
heap
page read and write
FFB000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
139F000
heap
page read and write
796A000
heap
page read and write
285E000
heap
page read and write
196D44C9000
system
page execute and read and write
78EB000
heap
page read and write
795C000
heap
page read and write
7974000
heap
page read and write
410000
unkown
page readonly
139A000
heap
page read and write
7A60000
trusted library allocation
page read and write
1234000
heap
page read and write
4231000
heap
page read and write
2B30000
heap
page read and write
4231000
heap
page read and write
BA0000
unkown
page readonly
770000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
450D000
heap
page read and write
D70000
unkown
page read and write
116A000
heap
page read and write
4231000
heap
page read and write
28B8000
heap
page read and write
5C34000
unclassified section
page read and write
AE0000
unkown
page readonly
BF1000
unkown
page readonly
2630000
unclassified section
page execute and read and write
1234000
heap
page read and write
B00000
unkown
page readonly
28A4000
heap
page read and write
101F000
stack
page read and write
87A37FE000
stack
page read and write
4231000
heap
page read and write
78D2000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
139F000
heap
page read and write
4231000
heap
page read and write
13A5000
heap
page read and write
2813000
heap
page read and write
4231000
heap
page read and write
116E000
heap
page read and write
4231000
heap
page read and write
1050000
heap
page read and write
E28000
heap
page read and write
28F0000
unkown
page readonly
EFC000
stack
page read and write
43E4000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
1234000
heap
page read and write
4231000
heap
page read and write
196D6203000
trusted library allocation
page read and write
7902000
heap
page read and write
1050000
heap
page read and write
51A1000
system
page execute and read and write
4231000
heap
page read and write
793D000
heap
page read and write
27F0000
heap
page read and write
4231000
heap
page read and write
BF1000
unkown
page readonly
4231000
heap
page read and write
4231000
heap
page read and write
2C40000
unkown
page readonly
4231000
heap
page read and write
196D45B7000
heap
page read and write
138E000
heap
page read and write
28A1000
heap
page read and write
139A000
heap
page read and write
4231000
heap
page read and write
196D45BF000
heap
page read and write
7A0000
unkown
page readonly
1394000
heap
page read and write
4231000
heap
page read and write
792A000
heap
page read and write
4D5000
unkown
page read and write
4231000
heap
page read and write
4CE000
unkown
page readonly
28BF000
stack
page read and write
139F000
heap
page read and write
6EE000
stack
page read and write
1234000
heap
page read and write
196D63BE000
trusted library allocation
page read and write
2A40000
unkown
page read and write
72F000
stack
page read and write
7915000
heap
page read and write
7988000
heap
page read and write
28E9000
heap
page read and write
4356000
heap
page read and write
7947000
heap
page read and write
453D000
stack
page read and write
CD0000
unkown
page read and write
7982000
heap
page read and write
4D7000
unkown
page readonly
1909000
direct allocation
page execute and read and write
7982000
heap
page read and write
28D0000
heap
page read and write
4231000
heap
page read and write
7942000
heap
page read and write
7978000
heap
page read and write
EFC000
stack
page read and write
790D000
heap
page read and write
1750000
direct allocation
page read and write
4231000
heap
page read and write
7B0000
unkown
page readonly
3408000
unkown
page read and write
27F8000
heap
page read and write
4C1000
unkown
page execute read
D60000
unkown
page read and write
1230000
heap
page read and write
B3C000
stack
page read and write
4231000
heap
page read and write
3E8000
stack
page read and write
1C30000
unclassified section
page execute and read and write
4231000
heap
page read and write
4231000
heap
page read and write
3BE2000
unkown
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4C1000
unkown
page execute read
51B1000
system
page execute and read and write
2813000
heap
page read and write
800F000
stack
page read and write
1AAD000
direct allocation
page execute and read and write
B90000
heap
page read and write
4D7000
unkown
page readonly
4231000
heap
page read and write
196D5E60000
heap
page read and write
4231000
heap
page read and write
87A17FC000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
7A0000
unkown
page readonly
BA0000
unkown
page readonly
44C0000
trusted library allocation
page read and write
196D6213000
trusted library allocation
page read and write
4231000
heap
page read and write
BB0000
unkown
page readonly
4E57000
unclassified section
page execute and read and write
1234000
heap
page read and write
4231000
heap
page read and write
287E000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4BBC000
unclassified section
page read and write
4231000
heap
page read and write
E28000
heap
page read and write
78D4000
heap
page read and write
1AB1000
direct allocation
page execute and read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
51BD000
system
page execute and read and write
196D63CE000
trusted library allocation
page read and write
D40000
unkown
page readonly
531C000
unkown
page read and write
BD0000
heap
page read and write
4231000
heap
page read and write
29F0000
trusted library allocation
page read and write
4231000
heap
page read and write
4D5000
unkown
page read and write
4231000
heap
page read and write
2813000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
15BE000
stack
page read and write
2897000
heap
page read and write
1370000
heap
page read and write
28AB000
heap
page read and write
7980000
heap
page read and write
1030000
unkown
page readonly
28E0000
heap
page read and write
1750000
direct allocation
page read and write
4511000
heap
page read and write
1481000
heap
page read and write
78FB000
heap
page read and write
4231000
heap
page read and write
78F1000
heap
page read and write
4231000
heap
page read and write
2813000
heap
page read and write
796F000
heap
page read and write
46B9000
direct allocation
page execute and read and write
46BD000
direct allocation
page execute and read and write
196D45DF000
heap
page read and write
1010000
unkown
page read and write
4231000
heap
page read and write
B6A000
stack
page read and write
4231000
heap
page read and write
4590000
direct allocation
page execute and read and write
774000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
1B22000
direct allocation
page execute and read and write
4231000
heap
page read and write
1197000
heap
page read and write
B00000
unkown
page readonly
797D000
heap
page read and write
D60000
unkown
page read and write
28F0000
unkown
page readonly
116E000
heap
page read and write
4231000
heap
page read and write
78F6000
heap
page read and write
AF0000
unkown
page readonly
CC1000
unkown
page readonly
14432000
system
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
280A000
heap
page read and write
2819000
heap
page read and write
2A14000
heap
page read and write
B60000
unkown
page readonly
3AB000
stack
page read and write
4231000
heap
page read and write
E3F000
heap
page read and write
2CFC000
unkown
page read and write
196D6301000
trusted library allocation
page read and write
15F1000
unkown
page readonly
1234000
heap
page read and write
1234000
heap
page read and write
16FE000
stack
page read and write
1234000
heap
page read and write
4C0000
unkown
page readonly
196D45E2000
heap
page read and write
359A000
unkown
page read and write
B60000
unkown
page readonly
1234000
heap
page read and write
4CE000
unkown
page readonly
28A4000
heap
page read and write
280A000
heap
page read and write
7937000
heap
page read and write
13B0000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
116A000
heap
page read and write
4231000
heap
page read and write
472E000
direct allocation
page execute and read and write
28CD000
heap
page read and write
7908000
heap
page read and write
1160000
heap
page read and write
4231000
heap
page read and write
4D7000
unkown
page readonly
4231000
heap
page read and write
78DD000
heap
page read and write
2808000
heap
page read and write
CD0000
unkown
page read and write
4231000
heap
page read and write
1020000
unkown
page readonly
115F000
stack
page read and write
1020000
unkown
page readonly
1700000
direct allocation
page read and write
5AA2000
unclassified section
page read and write
4582000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
DBC000
unkown
page read and write
3D74000
unkown
page read and write
1260000
unkown
page readonly
148C000
heap
page read and write
4231000
heap
page read and write
13B1000
unkown
page readonly
4231000
heap
page read and write
4231000
heap
page read and write
196D6100000
trusted library allocation
page read and write
7FCE000
stack
page read and write
4231000
heap
page read and write
4B30000
unkown
page execute and read and write
4231000
heap
page read and write
795E000
heap
page read and write
2813000
heap
page read and write
B6A000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
196D6200000
trusted library allocation
page read and write
4231000
heap
page read and write
17CF000
heap
page read and write
4231000
heap
page read and write
196D45DB000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
2C3F000
stack
page read and write
2A54000
heap
page read and write
5F57000
unkown
page execute and read and write
28E0000
heap
page read and write
4231000
heap
page read and write
29F0000
heap
page read and write
13A6000
heap
page read and write
2AE2000
unkown
page read and write
4231000
heap
page read and write
BE0000
unkown
page read and write
4231000
heap
page read and write
1380000
heap
page read and write
87A1FFD000
stack
page read and write
795C000
heap
page read and write
1340000
heap
page read and write
196D45E2000
heap
page read and write
7B0000
unkown
page readonly
4C0000
unkown
page readonly
4231000
heap
page read and write
B70000
unkown
page readonly
4231000
heap
page read and write
4C0000
unkown
page readonly
797A000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
1C2F000
stack
page read and write
1481000
heap
page read and write
2A22000
unkown
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
D40000
unkown
page readonly
52C8000
unclassified section
page read and write
4231000
heap
page read and write
196D6215000
trusted library allocation
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
5130000
system
page execute and read and write
4231000
heap
page read and write
4380000
trusted library allocation
page read and write
BD0000
heap
page read and write
78D9000
heap
page read and write
1260000
heap
page read and write
372C000
unkown
page read and write
196D5E80000
trusted library allocation
page read and write
4D5000
unkown
page read and write
48E2000
unclassified section
page read and write
4231000
heap
page read and write
79C8000
heap
page read and write
280F000
heap
page read and write
4231000
heap
page read and write
7921000
heap
page read and write
13B1000
unkown
page readonly
5EE5000
unkown
page execute and read and write
3730000
unkown
page execute and read and write
5197000
system
page execute and read and write
144F2000
system
page read and write
7B40000
heap
page read and write
4C1000
unkown
page execute read
B70000
unkown
page readonly
4233000
heap
page read and write
2A80000
heap
page read and write
4231000
heap
page read and write
4D7000
unkown
page readonly
2B30000
heap
page read and write
15F1000
unkown
page readonly
87A2FFE000
stack
page read and write
1396000
heap
page read and write
4231000
heap
page read and write
55EC000
unclassified section
page read and write
860000
unkown
page read and write
28B8000
heap
page read and write
CC1000
unkown
page readonly
28AB000
heap
page read and write
7942000
heap
page read and write
4231000
heap
page read and write
4230000
heap
page read and write
2B3C000
unkown
page read and write
1030000
unkown
page readonly
4231000
heap
page read and write
B3C000
stack
page read and write
1580000
direct allocation
page read and write
774000
heap
page read and write
1260000
unkown
page readonly
2A54000
heap
page read and write
1631000
heap
page read and write
4231000
heap
page read and write
1750000
direct allocation
page read and write
B90000
heap
page read and write
D30000
heap
page read and write
4231000
heap
page read and write
49A2000
unclassified section
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
4C0000
unkown
page readonly
196D4560000
heap
page read and write
2892000
heap
page read and write
196D45B0000
heap
page read and write
4231000
heap
page read and write
B80000
unkown
page readonly
28C7000
heap
page read and write
4231000
heap
page read and write
28D0000
heap
page read and write
802F000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
197E000
direct allocation
page execute and read and write
4231000
heap
page read and write
4231000
heap
page read and write
14C86000
system
page read and write
2819000
heap
page read and write
2A22000
unkown
page read and write
49FC000
unclassified section
page read and write
139B000
heap
page read and write
793D000
heap
page read and write
4231000
heap
page read and write
7610000
trusted library allocation
page read and write
EFC000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
7C0000
unkown
page readonly
4231000
heap
page read and write
2A10000
heap
page read and write
There are 562 hidden memdumps, click here to show them.