IOC Report
RFQ 0400-ENPI-RQMA.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ 0400-ENPI-RQMA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ 0400-ENPI-RQMA.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\C3vB7APK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ 0400-ENPI-RQMA.exe
"C:\Users\user\Desktop\RFQ 0400-ENPI-RQMA.exe"
malicious
C:\Users\user\Desktop\RFQ 0400-ENPI-RQMA.exe
"C:\Users\user\Desktop\RFQ 0400-ENPI-RQMA.exe"
malicious
C:\Program Files (x86)\qFgkKdcrcNUsYBUTPurGEnMHfMasRAlTboeKQkbdiNEZEXHgzpjLlVBNYWEKR\KdcHSkcpIgYD.exe
"C:\Program Files (x86)\qFgkKdcrcNUsYBUTPurGEnMHfMasRAlTboeKQkbdiNEZEXHgzpjLlVBNYWEKR\KdcHSkcpIgYD.exe"
malicious
C:\Windows\SysWOW64\replace.exe
"C:\Windows\SysWOW64\replace.exe"
malicious
C:\Program Files (x86)\qFgkKdcrcNUsYBUTPurGEnMHfMasRAlTboeKQkbdiNEZEXHgzpjLlVBNYWEKR\KdcHSkcpIgYD.exe
"C:\Program Files (x86)\qFgkKdcrcNUsYBUTPurGEnMHfMasRAlTboeKQkbdiNEZEXHgzpjLlVBNYWEKR\KdcHSkcpIgYD.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://assets.iv.lt/header.html
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.iv.lt/domenai/
unknown
http://www.sajatypeworks.com
unknown
http://www.sakkal.comar
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://assets.iv.lt/default.css
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://assets.iv.lt/images/icon.png
unknown
https://assets.iv.lt/images/thumbnail.png
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.iv.lt/duomenu-centras/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
https://www.iv.lt/profesionalus-hostingas/
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://www.iv.lt/talpinimo-planai/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://assets.iv.lt/footer.html
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.iv.lt/neribotas-svetainiu-talpinimas/
unknown
https://www.iv.lt/
unknown
https://www.iv.lt/svetainiu-kurimo-irankis/
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://www.iv.lt/el-pasto-filtras/
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.iv.lt/vps-serveriai/
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://klientams.iv.lt/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.iv.lt/sertifikatai/
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.maxiwalls.com
79.98.25.1
malicious

IPs

IP
Domain
Country
Malicious
79.98.25.1
www.maxiwalls.com
Lithuania
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1300000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2FE0000
trusted library allocation
page read and write
malicious
4B50000
system
page execute and read and write
malicious
3020000
trusted library allocation
page read and write
malicious
17E0000
unclassified section
page execute and read and write
malicious
2B50000
unkown
page execute and read and write
malicious
57F0000
trusted library allocation
page read and write
2B26000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
7BFA000
heap
page read and write
2A54000
heap
page read and write
EC2000
unkown
page readonly
2E01000
heap
page read and write
2B2C000
heap
page read and write
2E01000
heap
page read and write
2BA8000
heap
page read and write
2FB6000
heap
page read and write
736000
heap
page read and write
2BC0000
heap
page read and write
FDE000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
F50000
heap
page read and write
55C000
stack
page read and write
2E01000
heap
page read and write
BDB000
stack
page read and write
16DA000
heap
page read and write
29E0000
unkown
page read and write
2E01000
heap
page read and write
2AB4000
heap
page read and write
5761000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
7FD60000
trusted library allocation
page execute and read and write
4E5F000
stack
page read and write
FDA000
heap
page read and write
950000
unkown
page readonly
2BE5000
heap
page read and write
2E01000
heap
page read and write
2BDF000
heap
page read and write
1785000
heap
page read and write
328D000
direct allocation
page execute and read and write
2B32000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
1643000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2434000
heap
page read and write
7BE0000
heap
page read and write
202000
unkown
page read and write
34BD000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
9C5000
unkown
page read and write
2C04000
heap
page read and write
162F000
stack
page read and write
87E000
stack
page read and write
E40000
heap
page read and write
7BD0000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4B17000
trusted library allocation
page read and write
9C5000
unkown
page read and write
34B0000
trusted library allocation
page execute and read and write
16DE000
heap
page read and write
2E01000
heap
page read and write
B8F000
heap
page read and write
2E01000
heap
page read and write
2C01000
heap
page read and write
78FB000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
97F000
stack
page read and write
17B6000
heap
page read and write
7B20000
trusted library allocation
page execute and read and write
9110000
trusted library allocation
page read and write
5A60000
heap
page execute and read and write
7D60000
trusted library allocation
page read and write
1450000
heap
page read and write
5A40000
heap
page read and write
2E01000
heap
page read and write
2A00000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
7ADE000
stack
page read and write
2E01000
heap
page read and write
2AB4000
heap
page read and write
2502000
unkown
page read and write
9BE000
unkown
page readonly
2E01000
heap
page read and write
836F000
stack
page read and write
D70000
heap
page read and write
2FEC000
unkown
page execute and read and write
1337000
stack
page read and write
2BB7000
heap
page read and write
9C5000
unkown
page read and write
575E000
trusted library allocation
page read and write
271C000
unkown
page read and write
D70000
heap
page read and write
1AB7000
heap
page read and write
730000
heap
page read and write
2BC0000
heap
page read and write
5A0000
unkown
page readonly
590000
unkown
page readonly
EA0000
heap
page read and write
2E01000
heap
page read and write
164D000
trusted library allocation
page execute and read and write
2E01000
heap
page read and write
7D65000
trusted library allocation
page read and write
149E000
stack
page read and write
C70000
unkown
page readonly
2E01000
heap
page read and write
EBDE000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
9B1000
unkown
page execute read
2E01000
heap
page read and write
2E01000
heap
page read and write
1003000
unkown
page read and write
10D2000
system
page read and write
2E01000
heap
page read and write
7C80000
trusted library allocation
page read and write
2D5E000
stack
page read and write
B367000
trusted library allocation
page read and write
2F09000
heap
page read and write
730000
heap
page read and write
5A0000
unkown
page readonly
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
77A0000
heap
page read and write
2E01000
heap
page read and write
165D000
direct allocation
page execute and read and write
16C0000
trusted library allocation
page read and write
78EB000
heap
page read and write
2E01000
heap
page read and write
1C0E000
unclassified section
page execute and read and write
7C7F000
stack
page read and write
2D1D000
stack
page read and write
EB9F000
stack
page read and write
2E01000
heap
page read and write
2280000
unkown
page readonly
1711000
heap
page read and write
C70000
unkown
page readonly
D50000
unkown
page readonly
29E0000
unkown
page read and write
970000
unkown
page readonly
1650000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
342D000
direct allocation
page execute and read and write
1AA0000
trusted library allocation
page read and write
57D0000
heap
page read and write
5C70000
heap
page read and write
1640000
trusted library allocation
page read and write
E71000
unkown
page readonly
ADC000
stack
page read and write
2442000
unkown
page read and write
2E01000
heap
page read and write
D60000
unkown
page readonly
6F1000
unkown
page readonly
700000
unkown
page read and write
2E01000
heap
page read and write
16A0000
trusted library allocation
page execute and read and write
2B85000
heap
page read and write
7B30000
trusted library section
page read and write
7C28000
heap
page read and write
3280000
trusted library allocation
page read and write
5744000
trusted library allocation
page read and write
87E000
stack
page read and write
2BBB000
heap
page read and write
2A50000
heap
page read and write
7EA0000
trusted library allocation
page read and write
2E01000
heap
page read and write
9B1000
unkown
page execute read
15A1000
unkown
page readonly
3C24000
unclassified section
page read and write
2E01000
heap
page read and write
1D0000
unkown
page readonly
170F000
heap
page read and write
720000
unkown
page readonly
1D0000
unkown
page readonly
7BE6000
heap
page read and write
1641000
direct allocation
page execute and read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
FD0000
heap
page read and write
2E01000
heap
page read and write
3160000
direct allocation
page execute and read and write
16F7000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2380000
unkown
page read and write
7C1B000
heap
page read and write
5A50000
trusted library allocation
page execute and read and write
2BEA000
heap
page read and write
2E01000
heap
page read and write
D3C000
stack
page read and write
EA0000
heap
page read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
D3C000
stack
page read and write
2D9E000
stack
page read and write
FC0000
unkown
page read and write
34C7000
trusted library allocation
page read and write
82DF000
stack
page read and write
16D0000
heap
page read and write
825F000
stack
page read and write
2E01000
heap
page read and write
576D000
trusted library allocation
page read and write
78FD000
heap
page read and write
1370000
heap
page read and write
9BE000
unkown
page readonly
2E01000
heap
page read and write
79DE000
stack
page read and write
2E01000
heap
page read and write
3110000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
4B65000
trusted library allocation
page read and write
ECDE000
stack
page read and write
2E01000
heap
page read and write
1520000
heap
page read and write
2E01000
heap
page read and write
5833000
heap
page read and write
C3A000
stack
page read and write
3780000
trusted library allocation
page read and write
2DF0000
heap
page read and write
2B73000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
E50000
unkown
page read and write
2E01000
heap
page read and write
7C04000
heap
page read and write
2280000
unkown
page readonly
2E01000
heap
page read and write
2B20000
heap
page read and write
2E01000
heap
page read and write
5A30000
heap
page read and write
FC0000
unkown
page read and write
2B8C000
heap
page read and write
163D000
trusted library allocation
page execute and read and write
2E01000
heap
page read and write
1390000
direct allocation
page execute and read and write
950000
unkown
page readonly
32B0000
heap
page read and write
2E01000
heap
page read and write
23DC000
unkown
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2B78000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2B17000
heap
page read and write
2E01000
heap
page read and write
55C000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2B1D000
heap
page read and write
2B04000
unkown
page read and write
7CE0000
trusted library allocation
page read and write
960000
unkown
page readonly
2E01000
heap
page read and write
D40000
unkown
page readonly
4D5C000
unkown
page read and write
2E01000
heap
page read and write
9A0000
heap
page read and write
2AF0000
heap
page read and write
2B1B000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
5C79000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
590000
unkown
page readonly
2E01000
heap
page read and write
3154000
heap
page read and write
2E01000
heap
page read and write
FDA000
heap
page read and write
97F000
stack
page read and write
3110000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
5A0C000
stack
page read and write
127F000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
970000
unkown
page readonly
1763000
heap
page read and write
2E01000
heap
page read and write
9C7000
unkown
page readonly
271C000
unkown
page read and write
27FB000
stack
page read and write
3260000
trusted library allocation
page read and write
3622000
unclassified section
page read and write
2442000
unkown
page read and write
13AC000
system
page read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
2E01000
heap
page read and write
5C0000
heap
page read and write
3768000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
2E01000
heap
page read and write
2BA8000
heap
page read and write
E47000
heap
page read and write
2A60000
unkown
page readonly
2E01000
heap
page read and write
2E01000
heap
page read and write
9B0000
unkown
page readonly
E5A000
heap
page read and write
2BB7000
heap
page read and write
1630000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
12BE000
stack
page read and write
110E000
stack
page read and write
5C9E000
heap
page read and write
2E01000
heap
page read and write
2B26000
heap
page read and write
167B000
trusted library allocation
page execute and read and write
2E01000
heap
page read and write
57E0000
trusted library allocation
page execute and read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2BAD000
heap
page read and write
700000
unkown
page read and write
2B27000
heap
page read and write
1C7C000
unclassified section
page execute and read and write
2E01000
heap
page read and write
4BEB000
system
page execute and read and write
FF6000
heap
page read and write
E79E000
stack
page read and write
2B85000
heap
page read and write
2B2C000
heap
page read and write
1704000
heap
page read and write
E50000
unkown
page read and write
1690000
trusted library allocation
page read and write
9C7000
unkown
page readonly
2E01000
heap
page read and write
15A0000
unkown
page readonly
2E01000
heap
page read and write
2E01000
heap
page read and write
1633000
trusted library allocation
page execute and read and write
9BE000
unkown
page readonly
6F1000
unkown
page readonly
2E01000
heap
page read and write
F40000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2F31000
heap
page read and write
2A00000
heap
page read and write
4BB3000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
2BE5000
heap
page read and write
5790000
trusted library allocation
page read and write
2E01000
heap
page read and write
9C7000
unkown
page readonly
2E01000
heap
page read and write
1656000
direct allocation
page execute and read and write
1030000
heap
page read and write
6DE000
stack
page read and write
5B0000
unkown
page readonly
6E0000
unkown
page read and write
1715000
heap
page read and write
2E01000
heap
page read and write
2BAD000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
4C42000
system
page execute and read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
3110000
trusted library allocation
page read and write
2B8C000
heap
page read and write
2E01000
heap
page read and write
45A000
stack
page read and write
1210000
unkown
page readonly
7BE1000
heap
page read and write
7BE1000
heap
page read and write
2E01000
heap
page read and write
2B1B000
heap
page read and write
C3A000
stack
page read and write
FDE000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
29C0000
unkown
page readonly
5830000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
832E000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
D40000
unkown
page readonly
7C30000
heap
page read and write
1E0000
unkown
page readonly
1AB0000
heap
page read and write
3727000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
EA9E000
stack
page read and write
2E01000
heap
page read and write
9B0000
unkown
page readonly
B70000
heap
page read and write
2E01000
heap
page read and write
7905000
heap
page read and write
1F0000
unkown
page readonly
2E01000
heap
page read and write
2E01000
heap
page read and write
32C1000
trusted library allocation
page read and write
2E01000
heap
page read and write
7B7E000
stack
page read and write
7D6E000
trusted library allocation
page read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
2E01000
heap
page read and write
EC0000
unkown
page readonly
2E01000
heap
page read and write
2B78000
heap
page read and write
1634000
trusted library allocation
page read and write
5C60000
heap
page read and write
7BE1000
heap
page read and write
2B26000
heap
page read and write
2B10000
heap
page read and write
2C04000
heap
page read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
17DF000
stack
page read and write
2AB0000
heap
page read and write
2B00000
heap
page read and write
14B9000
direct allocation
page execute and read and write
52FB000
stack
page read and write
2A50000
heap
page read and write
2B22000
heap
page read and write
63BD000
stack
page read and write
2430000
heap
page read and write
1E0000
unkown
page readonly
B70000
heap
page read and write
63FE000
stack
page read and write
2E01000
heap
page read and write
5A20000
heap
page read and write
9B1000
unkown
page execute read
1794000
system
page read and write
2370000
unkown
page read and write
6DE000
stack
page read and write
7E3C000
stack
page read and write
383C000
unclassified section
page read and write
2E01000
heap
page read and write
2A60000
unkown
page readonly
990000
unkown
page read and write
3285000
trusted library allocation
page read and write
2A70000
system
page execute and read and write
30DF000
heap
page read and write
2430000
heap
page read and write
2E01000
heap
page read and write
9B0000
unkown
page readonly
EA5E000
stack
page read and write
5740000
trusted library allocation
page read and write
960000
unkown
page readonly
2E01000
heap
page read and write
D50000
unkown
page readonly
7C24000
heap
page read and write
3289000
direct allocation
page execute and read and write
3270000
heap
page execute and read and write
2E01000
heap
page read and write
3562000
unclassified section
page read and write
9A0000
heap
page read and write
9BE000
unkown
page readonly
B78000
heap
page read and write
34A2000
direct allocation
page execute and read and write
2E01000
heap
page read and write
1360000
heap
page read and write
2AB4000
heap
page read and write
2FC0000
heap
page read and write
1660000
trusted library allocation
page read and write
123A000
stack
page read and write
FD0000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2B82000
heap
page read and write
7BDE000
heap
page read and write
2E01000
heap
page read and write
7D80000
trusted library allocation
page execute and read and write
7E90000
heap
page read and write
83F000
stack
page read and write
2E01000
heap
page read and write
B78000
heap
page read and write
5B6E000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
31CF000
stack
page read and write
2BDF000
heap
page read and write
1A9E000
stack
page read and write
720000
unkown
page readonly
2E01000
heap
page read and write
2B82000
heap
page read and write
7C18000
heap
page read and write
2A54000
heap
page read and write
2434000
heap
page read and write
5CB0000
heap
page read and write
1672000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
FAF000
stack
page read and write
3290000
trusted library allocation
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2B98000
heap
page read and write
2BBB000
heap
page read and write
2B67000
heap
page read and write
7BE1000
heap
page read and write
2E01000
heap
page read and write
E9E000
stack
page read and write
7BF5000
heap
page read and write
2DDE000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2BEF000
heap
page read and write
2E01000
heap
page read and write
2BEF000
heap
page read and write
2BCD000
heap
page read and write
5800000
trusted library allocation
page read and write
2E01000
heap
page read and write
42C1000
trusted library allocation
page read and write
377E000
trusted library allocation
page read and write
166A000
trusted library allocation
page execute and read and write
2E01000
heap
page read and write
E75E000
stack
page read and write
45A000
stack
page read and write
9C7000
unkown
page readonly
4BC5000
system
page execute and read and write
16FB000
heap
page read and write
5A10000
trusted library section
page readonly
2E01000
heap
page read and write
2E01000
heap
page read and write
7B10000
trusted library section
page read and write
2B98000
heap
page read and write
17C9000
heap
page read and write
7BE1000
heap
page read and write
2E01000
heap
page read and write
5B0000
unkown
page readonly
1677000
trusted library allocation
page execute and read and write
1192000
system
page read and write
9B1000
unkown
page execute read
14DE000
stack
page read and write
1210000
unkown
page readonly
2E01000
heap
page read and write
7C20000
heap
page read and write
2E01000
heap
page read and write
FB1000
unkown
page readonly
6E0000
unkown
page read and write
4C9E000
trusted library allocation
page read and write
FB1000
unkown
page readonly
2E01000
heap
page read and write
2BCD000
heap
page read and write
16D8000
direct allocation
page execute and read and write
120F000
stack
page read and write
2E0E000
heap
page read and write
7BEB000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
78C0000
heap
page read and write
829E000
stack
page read and write
29C0000
unkown
page readonly
990000
unkown
page read and write
7E7D000
stack
page read and write
2E01000
heap
page read and write
2BEA000
heap
page read and write
117E000
stack
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
7AE0000
trusted library section
page read and write
9B0000
unkown
page readonly
2E01000
heap
page read and write
1662000
trusted library allocation
page read and write
31D0000
trusted library section
page read and write
2E01000
heap
page read and write
7BE1000
heap
page read and write
3060000
trusted library allocation
page read and write
73C2000
trusted library allocation
page read and write
7BE1000
heap
page read and write
12C0000
direct allocation
page read and write
3431000
direct allocation
page execute and read and write
7BF0000
heap
page read and write
2E00000
heap
page read and write
1666000
trusted library allocation
page execute and read and write
14BD000
direct allocation
page execute and read and write
152E000
direct allocation
page execute and read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
5766000
trusted library allocation
page read and write
2F7E000
unkown
page execute and read and write
2E01000
heap
page read and write
42C8000
trusted library allocation
page read and write
2A38000
stack
page read and write
2E01000
heap
page read and write
2C01000
heap
page read and write
241E000
stack
page read and write
574B000
trusted library allocation
page read and write
2E01000
heap
page read and write
5C55000
heap
page read and write
7BE1000
heap
page read and write
D60000
unkown
page readonly
1040000
heap
page read and write
18CE000
stack
page read and write
30E3000
heap
page read and write
2B1A000
heap
page read and write
32FE000
direct allocation
page execute and read and write
E70000
unkown
page readonly
2E01000
heap
page read and write
53FB000
stack
page read and write
83F000
stack
page read and write
1510000
trusted library allocation
page read and write
9C5000
unkown
page read and write
7C11000
heap
page read and write
2E01000
heap
page read and write
2E01000
heap
page read and write
E95E000
stack
page read and write
FFF000
heap
page read and write
2E01000
heap
page read and write
7BF2000
heap
page read and write
821E000
stack
page read and write
1F0000
unkown
page readonly
5C0000
heap
page read and write
2E01000
heap
page read and write
5C50000
heap
page read and write
7BF8000
heap
page read and write
There are 642 hidden memdumps, click here to show them.