IOC Report
F2024-202202.exe

loading gif

Files

File Path
Type
Category
Malicious
F2024-202202.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2y9KZy13
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Mazatl
ASCII text, with very long lines (29758), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut3BCF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3BFF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\putrefactible
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\F2024-202202.exe
"C:\Users\user\Desktop\F2024-202202.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\F2024-202202.exe"
malicious
C:\Program Files (x86)\UXVNQUrSRqPxRBadJxKVFWzheeXuHYzhxNkawFDyQsGqAmMlIMgVqlRJUDHmkbuivlSB\HCyQCFLUGWqlxNRVXC.exe
"C:\Program Files (x86)\UXVNQUrSRqPxRBadJxKVFWzheeXuHYzhxNkawFDyQsGqAmMlIMgVqlRJUDHmkbuivlSB\HCyQCFLUGWqlxNRVXC.exe"
malicious
C:\Windows\SysWOW64\openfiles.exe
"C:\Windows\SysWOW64\openfiles.exe"
malicious
C:\Program Files (x86)\UXVNQUrSRqPxRBadJxKVFWzheeXuHYzhxNkawFDyQsGqAmMlIMgVqlRJUDHmkbuivlSB\HCyQCFLUGWqlxNRVXC.exe
"C:\Program Files (x86)\UXVNQUrSRqPxRBadJxKVFWzheeXuHYzhxNkawFDyQsGqAmMlIMgVqlRJUDHmkbuivlSB\HCyQCFLUGWqlxNRVXC.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.make-l.ru/0so0/
194.58.112.174
malicious
http://www.kguyreoalpha.shop/0so0/
43.132.225.97
malicious
http://www.goodroothealth.com/0so0/?X430XLq0=CY1s0XH7bNWttwV9rZ4SbfagXQ6dqpRCQvxAN47rZ58SWMnAte1QXQdn29aNO6h1oK8GMPzGoaIoZ8sBEayCkb2ait1G89/ayPLVJ4jhwFoJQSPoL8Uww1rncwUMKC4qFA==&Wd=vjk8lhT0U4
66.113.136.229
malicious
http://www.kguyreoalpha.shop/0so0/?X430XLq0=ZXsyqv6OWO1jdfmZwPHK8dAntN05Z+dsmugw9BJBTbqyaa2WOVN+U2naZpjsCmE4tUAeXtTgCCsmM8Dup6ejRXHoa4TAR4CFgRPYrdUpMYgqMRztZg/3Zk7YYa9ZW1B17w==&Wd=vjk8lhT0U4
43.132.225.97
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.kguyreoalpha.shop
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.goodroothealth.com
66.113.136.229
malicious
www.kguyreoalpha.shop
43.132.225.97
malicious
www.make-l.ru
194.58.112.174
malicious
www.waldil.online
188.114.96.3
malicious
www.sweet777.work
unknown
malicious

IPs

IP
Domain
Country
Malicious
43.132.225.97
www.kguyreoalpha.shop
Japan
malicious
194.58.112.174
www.make-l.ru
Russian Federation
malicious
66.113.136.229
www.goodroothealth.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2650000
trusted library allocation
page read and write
malicious
4400000
unclassified section
page execute and read and write
malicious
33E0000
unkown
page execute and read and write
malicious
5F0000
trusted library allocation
page read and write
malicious
4AC0000
system
page execute and read and write
malicious
130000
system
page execute and read and write
malicious
3280000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
1534000
heap
page read and write
1454000
heap
page read and write
2354000
heap
page read and write
7580000
trusted library allocation
page read and write
2841000
heap
page read and write
764D000
stack
page read and write
29E0000
unkown
page execute and read and write
2841000
heap
page read and write
2841000
heap
page read and write
2160000
heap
page read and write
4B21000
system
page execute and read and write
3D40000
direct allocation
page read and write
2AB0000
heap
page read and write
117000
unkown
page readonly
181000
unkown
page execute read
850000
unkown
page readonly
26B05701000
trusted library allocation
page read and write
840000
unkown
page readonly
27EB000
heap
page read and write
3EE0000
direct allocation
page read and write
2841000
heap
page read and write
73FB000
heap
page read and write
2841000
heap
page read and write
4110000
trusted library allocation
page execute and read and write
10E000
unkown
page readonly
26B03A8C000
heap
page read and write
F3C000
unkown
page read and write
27E0000
heap
page read and write
2819000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
1534000
heap
page read and write
740A000
heap
page read and write
2841000
heap
page read and write
690000
unkown
page read and write
2841000
heap
page read and write
73F6000
heap
page read and write
26B05420000
heap
page read and write
2841000
heap
page read and write
117000
unkown
page readonly
D80000
unkown
page readonly
7EF000
stack
page read and write
26B057BE000
trusted library allocation
page read and write
26B05600000
trusted library allocation
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
26B03A10000
heap
page read and write
115000
unkown
page read and write
2C02000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
3280000
direct allocation
page read and write
2841000
heap
page read and write
27AB000
heap
page read and write
2E24000
heap
page read and write
C0000
unkown
page readonly
3EE0000
direct allocation
page read and write
F38000
unkown
page read and write
2841000
heap
page read and write
2E00000
heap
page read and write
2841000
heap
page read and write
D0000
unkown
page readonly
1445000
heap
page read and write
2841000
heap
page read and write
840000
unkown
page readonly
7445000
heap
page read and write
20E4000
heap
page read and write
2841000
heap
page read and write
2472000
unkown
page read and write
26B03A7A000
heap
page read and write
2841000
heap
page read and write
3A5C000
system
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
4B31000
system
page execute and read and write
2841000
heap
page read and write
2354000
heap
page read and write
C20000
heap
page read and write
2C13000
heap
page read and write
2841000
heap
page read and write
2230000
unkown
page readonly
2841000
heap
page read and write
D51000
unkown
page readonly
D3E000
stack
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
735E000
stack
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
1534000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
7465000
heap
page read and write
400D000
direct allocation
page read and write
47C2000
direct allocation
page execute and read and write
2841000
heap
page read and write
2C13000
heap
page read and write
73F1000
heap
page read and write
1391000
unkown
page readonly
27BE000
heap
page read and write
200E000
stack
page read and write
23F000
unkown
page read and write
11FC000
stack
page read and write
4B94000
system
page execute and read and write
1534000
heap
page read and write
400D000
direct allocation
page read and write
28DF000
stack
page read and write
7423000
heap
page read and write
26B05250000
trusted library allocation
page read and write
2758000
heap
page read and write
279C000
heap
page read and write
2D98000
unkown
page read and write
2841000
heap
page read and write
3E63000
direct allocation
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
1435000
heap
page read and write
89A000
heap
page read and write
27BA000
heap
page read and write
B0000
unkown
page readonly
2350000
heap
page read and write
D60000
unkown
page read and write
1454000
heap
page read and write
115000
unkown
page read and write
7B5E000
heap
page read and write
2E17000
heap
page read and write
6E0000
heap
page read and write
3E63000
direct allocation
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
C00000
unkown
page readonly
11BE000
stack
page read and write
16A000
stack
page read and write
28E4000
heap
page read and write
742D000
heap
page read and write
2841000
heap
page read and write
7452000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
36D1000
direct allocation
page execute and read and write
2841000
heap
page read and write
2841000
heap
page read and write
9F0000
unkown
page readonly
400D000
direct allocation
page read and write
F3D000
unkown
page read and write
28F0000
unkown
page readonly
4009000
direct allocation
page read and write
DA0000
unkown
page read and write
2C13000
heap
page read and write
3E63000
direct allocation
page read and write
148E000
heap
page read and write
2BA0000
direct allocation
page read and write
9BF61FE000
stack
page read and write
BB000
stack
page read and write
313E000
stack
page read and write
474D000
direct allocation
page execute and read and write
1474000
heap
page read and write
4EBF000
stack
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
248000
unkown
page readonly
2841000
heap
page read and write
2763000
heap
page read and write
2960000
heap
page read and write
3240000
direct allocation
page read and write
400D000
direct allocation
page read and write
10E000
unkown
page readonly
101000
unkown
page execute read
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2A80000
heap
page read and write
3D40000
direct allocation
page read and write
2841000
heap
page read and write
745E000
heap
page read and write
26B03AA3000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
27FE000
heap
page read and write
138E000
stack
page read and write
3D40000
direct allocation
page read and write
1445000
heap
page read and write
275E000
heap
page read and write
281E000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
400D000
direct allocation
page read and write
760C000
stack
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
3123000
heap
page read and write
2841000
heap
page read and write
2C13000
heap
page read and write
D60000
unkown
page read and write
2841000
heap
page read and write
1444000
heap
page read and write
2841000
heap
page read and write
6321000
unclassified section
page execute and read and write
F00000
heap
page read and write
2841000
heap
page read and write
26B05614000
trusted library allocation
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
23A0000
heap
page read and write
36CD000
direct allocation
page execute and read and write
739E000
stack
page read and write
990000
unkown
page readonly
2841000
heap
page read and write
D0000
unkown
page readonly
2841000
heap
page read and write
2841000
heap
page read and write
7463000
heap
page read and write
2C13000
heap
page read and write
222F000
stack
page read and write
26B03A7F000
heap
page read and write
1464000
heap
page read and write
2841000
heap
page read and write
4009000
direct allocation
page read and write
2C13000
heap
page read and write
2841000
heap
page read and write
461E000
direct allocation
page execute and read and write
13E0000
heap
page read and write
4B3D000
system
page execute and read and write
1000000
unkown
page readonly
1523000
heap
page read and write
2841000
heap
page read and write
4DBF000
stack
page read and write
27C3000
heap
page read and write
60E000
stack
page read and write
2C13000
heap
page read and write
9F0000
unkown
page readonly
4901000
unkown
page execute and read and write
2841000
heap
page read and write
3D40000
direct allocation
page read and write
2841000
heap
page read and write
27D6000
heap
page read and write
1472000
heap
page read and write
64E000
stack
page read and write
2841000
heap
page read and write
27DE000
stack
page read and write
3A00000
unclassified section
page execute and read and write
275E000
heap
page read and write
3EE0000
direct allocation
page read and write
2841000
heap
page read and write
EEF000
stack
page read and write
400D000
direct allocation
page read and write
1492000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
26B05603000
trusted library allocation
page read and write
407E000
direct allocation
page read and write
F29000
unkown
page read and write
148E000
heap
page read and write
2841000
heap
page read and write
504000
heap
page read and write
C00000
unkown
page readonly
73D9000
heap
page read and write
DB0000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
41C0000
trusted library allocation
page read and write
3D40000
direct allocation
page read and write
26B05611000
trusted library allocation
page read and write
16A000
stack
page read and write
2C13000
heap
page read and write
73FE000
heap
page read and write
D21000
unkown
page readonly
670000
unkown
page readonly
3742000
direct allocation
page execute and read and write
3EE0000
direct allocation
page read and write
248000
unkown
page readonly
2841000
heap
page read and write
5D0000
trusted library allocation
page read and write
47D2000
unclassified section
page read and write
3EE0000
direct allocation
page read and write
100000
unkown
page readonly
2A60000
heap
page read and write
2758000
heap
page read and write
DB0000
heap
page read and write
9BF59FF000
stack
page read and write
332D000
heap
page read and write
27D0000
heap
page read and write
117000
unkown
page readonly
10E000
unkown
page readonly
29C000
unkown
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
73FF000
heap
page read and write
181000
unkown
page execute read
27F1000
heap
page read and write
2841000
heap
page read and write
3F01000
unkown
page execute and read and write
239E000
stack
page read and write
148E000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
C20000
heap
page read and write
134D000
stack
page read and write
3280000
direct allocation
page read and write
26B057A6000
trusted library allocation
page read and write
100000
unkown
page readonly
27D0000
heap
page read and write
1400000
direct allocation
page execute and read and write
117000
unkown
page readonly
243000
unkown
page write copy
2841000
heap
page read and write
7458000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
F00000
heap
page read and write
2841000
heap
page read and write
14DA000
heap
page read and write
89A000
heap
page read and write
2E2A000
heap
page read and write
4751000
direct allocation
page execute and read and write
2841000
heap
page read and write
4009000
direct allocation
page read and write
26B057CE000
trusted library allocation
page read and write
82C000
unkown
page read and write
2841000
heap
page read and write
3801000
heap
page read and write
2C13000
heap
page read and write
2841000
heap
page read and write
5301000
unkown
page execute and read and write
26B03A40000
heap
page read and write
27E8000
heap
page read and write
2C13000
heap
page read and write
7AEE000
stack
page read and write
26B03AA3000
heap
page read and write
89E000
heap
page read and write
1534000
heap
page read and write
148E000
heap
page read and write
1464000
heap
page read and write
73E3000
heap
page read and write
504000
heap
page read and write
30FF000
stack
page read and write
26B0388C000
system
page execute and read and write
73E6000
heap
page read and write
D80000
unkown
page readonly
4238000
heap
page read and write
2E17000
heap
page read and write
2841000
heap
page read and write
4009000
direct allocation
page read and write
2E13000
heap
page read and write
830000
unkown
page readonly
2841000
heap
page read and write
2841000
heap
page read and write
28E4000
heap
page read and write
2841000
heap
page read and write
12E0000
heap
page read and write
2841000
heap
page read and write
299000
unkown
page read and write
1534000
heap
page read and write
27BE000
heap
page read and write
45AD000
direct allocation
page execute and read and write
20E0000
heap
page read and write
2841000
heap
page read and write
2E3A000
heap
page read and write
4CBC000
unkown
page read and write
741D000
heap
page read and write
43F5000
heap
page read and write
C10000
unkown
page readonly
2841000
heap
page read and write
148E000
heap
page read and write
1391000
unkown
page readonly
1A0000
unkown
page readonly
2841000
heap
page read and write
5D0000
heap
page read and write
7461000
heap
page read and write
2C13000
heap
page read and write
180000
unkown
page readonly
1F1000
unkown
page readonly
3E63000
direct allocation
page read and write
27BA000
heap
page read and write
7442000
heap
page read and write
27C3000
heap
page read and write
26B03AA9000
heap
page read and write
28E0000
heap
page read and write
9BF69FE000
stack
page read and write
4115000
heap
page read and write
2841000
heap
page read and write
7A6E000
stack
page read and write
1B0000
unkown
page readonly
2C00000
heap
page read and write
2841000
heap
page read and write
2E05000
heap
page read and write
51B8000
unclassified section
page read and write
670000
unkown
page readonly
890000
heap
page read and write
2841000
heap
page read and write
744B000
heap
page read and write
26B0388E000
system
page execute and read and write
86E000
stack
page read and write
2841000
heap
page read and write
830000
unkown
page readonly
B0000
unkown
page readonly
2841000
heap
page read and write
2823000
heap
page read and write
3E63000
direct allocation
page read and write
1A0000
unkown
page readonly
2A3B000
stack
page read and write
650000
unkown
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
27F5000
heap
page read and write
2776000
heap
page read and write
407E000
direct allocation
page read and write
3000000
heap
page read and write
235000
unkown
page readonly
2841000
heap
page read and write
2841000
heap
page read and write
26B05250000
trusted library allocation
page read and write
2841000
heap
page read and write
7660000
heap
page read and write
1E0000
unkown
page read and write
2090000
direct allocation
page read and write
4521000
unclassified section
page execute and read and write
2841000
heap
page read and write
D21000
unkown
page readonly
26B05250000
trusted library allocation
page read and write
352D000
direct allocation
page execute and read and write
2841000
heap
page read and write
235000
unkown
page readonly
2841000
heap
page read and write
8BA000
stack
page read and write
2841000
heap
page read and write
7459000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
1C0D000
stack
page read and write
2C13000
heap
page read and write
2841000
heap
page read and write
2813000
heap
page read and write
148E000
heap
page read and write
74E0000
heap
page read and write
148E000
heap
page read and write
4B40000
system
page execute and read and write
74D0000
trusted library allocation
page read and write
B99000
stack
page read and write
2763000
heap
page read and write
2841000
heap
page read and write
1E0000
unkown
page read and write
2796000
heap
page read and write
73EB000
heap
page read and write
746F000
heap
page read and write
2841000
heap
page read and write
4009000
direct allocation
page read and write
650000
unkown
page read and write
2841000
heap
page read and write
4FC000
stack
page read and write
C0000
unkown
page readonly
5921000
unclassified section
page execute and read and write
9BC000
stack
page read and write
1B0000
unkown
page readonly
2841000
heap
page read and write
1454000
heap
page read and write
3E63000
direct allocation
page read and write
2841000
heap
page read and write
1D0000
heap
page read and write
1418000
heap
page read and write
1455000
heap
page read and write
115000
unkown
page read and write
2B90000
heap
page read and write
9BF51FB000
stack
page read and write
850000
unkown
page readonly
1465000
heap
page read and write
23B2000
unkown
page read and write
115000
unkown
page read and write
F38000
unkown
page read and write
3400000
direct allocation
page execute and read and write
690000
unkown
page read and write
2841000
heap
page read and write
48EC000
unclassified section
page read and write
2841000
heap
page read and write
6E0000
heap
page read and write
2763000
heap
page read and write
2841000
heap
page read and write
27DA000
heap
page read and write
3782000
system
page read and write
10E000
unkown
page readonly
7AAF000
stack
page read and write
23A0000
heap
page read and write
26B037F0000
system
page execute and read and write
2E05000
heap
page read and write
C10000
unkown
page readonly
268C000
unkown
page read and write
2769000
heap
page read and write
3501000
unkown
page execute and read and write
2841000
heap
page read and write
101000
unkown
page execute read
504000
heap
page read and write
323F000
stack
page read and write
DA0000
unkown
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
8BA000
stack
page read and write
2841000
heap
page read and write
73F8000
heap
page read and write
26B03A9B000
heap
page read and write
500000
heap
page read and write
2841000
heap
page read and write
26B05621000
trusted library allocation
page read and write
4480000
direct allocation
page execute and read and write
4FC000
stack
page read and write
148E000
heap
page read and write
2841000
heap
page read and write
1534000
heap
page read and write
2841000
heap
page read and write
23F000
unkown
page write copy
11CE000
stack
page read and write
745C000
heap
page read and write
60E000
stack
page read and write
2841000
heap
page read and write
2230000
unkown
page readonly
2841000
heap
page read and write
746A000
heap
page read and write
100000
unkown
page readonly
2841000
heap
page read and write
41C0000
trusted library allocation
page read and write
2841000
heap
page read and write
7A2F000
stack
page read and write
1C0000
unkown
page readonly
1F0000
heap
page read and write
2E12000
heap
page read and write
3529000
direct allocation
page execute and read and write
2BDE000
stack
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2748000
heap
page read and write
275A000
heap
page read and write
2C13000
heap
page read and write
2841000
heap
page read and write
2E2B000
heap
page read and write
2C13000
heap
page read and write
1C0000
unkown
page readonly
26B03AA0000
heap
page read and write
1410000
heap
page read and write
9BF71FF000
stack
page read and write
990000
unkown
page readonly
746B000
heap
page read and write
1A0000
heap
page read and write
26B03920000
heap
page read and write
446A000
heap
page read and write
20F000
unkown
page readonly
26B03AA9000
heap
page read and write
F08000
heap
page read and write
2841000
heap
page read and write
7B2F000
stack
page read and write
2350000
heap
page read and write
148E000
heap
page read and write
3D40000
direct allocation
page read and write
8B9000
heap
page read and write
28E0000
heap
page read and write
407E000
direct allocation
page read and write
D40000
unkown
page read and write
26B0560E000
trusted library allocation
page read and write
F1B000
unkown
page read and write
2763000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
148E000
heap
page read and write
2F01000
heap
page read and write
1455000
heap
page read and write
2740000
heap
page read and write
79EE000
stack
page read and write
45A9000
direct allocation
page execute and read and write
407E000
direct allocation
page read and write
2841000
heap
page read and write
1534000
heap
page read and write
2841000
heap
page read and write
7428000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
4892000
unclassified section
page read and write
6A0000
unkown
page read and write
2841000
heap
page read and write
1534000
heap
page read and write
3280000
direct allocation
page read and write
42CC000
heap
page read and write
2841000
heap
page read and write
9BC000
stack
page read and write
27AF000
heap
page read and write
4F21000
unclassified section
page execute and read and write
1438000
heap
page read and write
339E000
heap
page read and write
268C000
unkown
page read and write
2841000
heap
page read and write
F8000
stack
page read and write
2C13000
heap
page read and write
DE0000
heap
page read and write
DE0000
heap
page read and write
101000
unkown
page execute read
2841000
heap
page read and write
1534000
heap
page read and write
4009000
direct allocation
page read and write
3329000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
1D0000
heap
page read and write
3842000
system
page read and write
D40000
unkown
page read and write
20F000
unkown
page readonly
1000000
unkown
page readonly
23B2000
unkown
page read and write
2841000
heap
page read and write
11DB000
stack
page read and write
890000
heap
page read and write
2690000
trusted library allocation
page read and write
24CC000
unkown
page read and write
89E000
heap
page read and write
26B0560A000
trusted library allocation
page read and write
1200000
heap
page read and write
359E000
direct allocation
page execute and read and write
41C0000
trusted library allocation
page read and write
2840000
heap
page read and write
1474000
heap
page read and write
180000
unkown
page readonly
2841000
heap
page read and write
1300000
heap
page read and write
2763000
heap
page read and write
2841000
heap
page read and write
1F1000
unkown
page readonly
28F0000
unkown
page readonly
2841000
heap
page read and write
7EF000
stack
page read and write
1524000
heap
page read and write
2841000
heap
page read and write
F08000
heap
page read and write
26B057C4000
trusted library allocation
page read and write
43F9000
heap
page read and write
100000
unkown
page readonly
2841000
heap
page read and write
3200000
heap
page read and write
407E000
direct allocation
page read and write
D51000
unkown
page readonly
26B03A70000
heap
page read and write
2841000
heap
page read and write
2841000
heap
page read and write
14DA000
heap
page read and write
26B05500000
trusted library allocation
page read and write
2769000
heap
page read and write
2C13000
heap
page read and write
3EE0000
direct allocation
page read and write
4AAC000
unclassified section
page read and write
407E000
direct allocation
page read and write
27EC000
stack
page read and write
7467000
heap
page read and write
2841000
heap
page read and write
2763000
heap
page read and write
101000
unkown
page execute read
There are 654 hidden memdumps, click here to show them.