IOC Report
A2028041200SD.exe

loading gif

Files

File Path
Type
Category
Malicious
A2028041200SD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\-4EF4J77B
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\aut5BF2.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\hurtling
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\A2028041200SD.exe
"C:\Users\user\Desktop\A2028041200SD.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\A2028041200SD.exe"
malicious
C:\Program Files (x86)\sldRxWQECDhSfMeMiXnjUkxYhWJfedEYWNhutcWNsBrhHcHEOsaCNhiHMaHBiSPnnLbdpmTDmXShT\zJGHFZpQDL.exe
"C:\Program Files (x86)\sldRxWQECDhSfMeMiXnjUkxYhWJfedEYWNhutcWNsBrhHcHEOsaCNhiHMaHBiSPnnLbdpmTDmXShT\zJGHFZpQDL.exe"
malicious
C:\Windows\SysWOW64\winrs.exe
"C:\Windows\SysWOW64\winrs.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.beylikduzu616161.xyz/2nga/
188.114.97.3
malicious
http://www.superiorfencing.net/bwyw/
103.230.159.86
malicious
http://www.maitreyatoys.world/dvmh/
194.245.148.189
malicious
http://www.orbitoasis.online/k6yn/
66.29.132.194
malicious
http://www.earbudsstore.shop/0gis/
194.195.220.41
malicious
http://www.dailyfuns.info/n9b0/
209.74.77.109
malicious
http://www.dating-apps-az-dn5.xyz/pn0u/
199.59.243.227
malicious
http://www.mydreamdeal.click/1ag2/
188.114.96.3
malicious
http://www.thaor56.online/cboa/
202.92.5.23
malicious
http://www.75178.club/a4h7/
23.167.152.41
malicious
http://www.zxyck.net/gxyh/
118.107.250.103
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.earbudsstore.shop/0gis?gp=1&js=1&uuid=1732091041.9737598049&other_args=eyJ1cmkiOiAiLzBnaX
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://zkdamdjj.shop/vluw/?prh4=Qny9vPKZpQxlYqiHBli6Dgd1W9OHStFoVbvPUumHvVgYiZzoUIcT00lHd/ClJ1QqOMs
unknown
http://www.dating-apps-az-dn5.xyz
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://joker.com/?pk_campaign=Parking&pk_kwd=text
unknown
http://www70.earbudsstore.shop/
unknown
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.mydreamdeal.click
188.114.96.3
malicious
www.maitreyatoys.world
194.245.148.189
malicious
www.zxyck.net
118.107.250.103
malicious
www.dating-apps-az-dn5.xyz
199.59.243.227
malicious
superiorfencing.net
103.230.159.86
malicious
thaor56.online
202.92.5.23
malicious
www.zkdamdjj.shop
188.114.97.3
malicious
www.earbudsstore.shop
194.195.220.41
malicious
www.beylikduzu616161.xyz
188.114.97.3
malicious
www.dailyfuns.info
209.74.77.109
malicious
orbitoasis.online
66.29.132.194
malicious
gtml.huksa.huhusddfnsuegcdn.com
23.167.152.41
www.75178.club
unknown
www.orbitoasis.online
unknown
www.superiorfencing.net
unknown
www.thaor56.online
unknown
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
194.195.220.41
www.earbudsstore.shop
Germany
malicious
209.74.77.109
www.dailyfuns.info
United States
malicious
188.114.97.3
www.zkdamdjj.shop
European Union
malicious
103.230.159.86
superiorfencing.net
Australia
malicious
194.245.148.189
www.maitreyatoys.world
Germany
malicious
188.114.96.3
www.mydreamdeal.click
European Union
malicious
66.29.132.194
orbitoasis.online
United States
malicious
118.107.250.103
www.zxyck.net
Hong Kong
malicious
199.59.243.227
www.dating-apps-az-dn5.xyz
United States
malicious
202.92.5.23
thaor56.online
Viet Nam
malicious
23.167.152.41
gtml.huksa.huhusddfnsuegcdn.com
Reserved
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B90000
trusted library allocation
page read and write
malicious
3250000
unclassified section
page execute and read and write
malicious
2BE0000
trusted library allocation
page read and write
malicious
5400000
unclassified section
page execute and read and write
malicious
24B0000
system
page execute and read and write
malicious
8020000
system
page execute and read and write
malicious
640000
system
page execute and read and write
malicious
4A00000
unkown
page execute and read and write
malicious
3550000
direct allocation
page read and write
2812000
heap
page read and write
887000
heap
page read and write
289C000
unkown
page read and write
7996000
heap
page read and write
2A71000
heap
page read and write
83F000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
91A000
stack
page read and write
79A0000
heap
page read and write
2613000
heap
page read and write
79EC000
heap
page read and write
309E000
direct allocation
page execute and read and write
FC0000
heap
page read and write
10B2000
heap
page read and write
7A0B000
heap
page read and write
104A000
heap
page read and write
2B10000
unkown
page readonly
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
99E000
unkown
page readonly
86B000
heap
page read and write
3740000
direct allocation
page read and write
A81000
unkown
page execute read
1054000
heap
page read and write
10B2000
heap
page read and write
2A71000
heap
page read and write
7980000
trusted library allocation
page read and write
ED2000
unkown
page read and write
7C4000
heap
page read and write
2A71000
heap
page read and write
2613000
heap
page read and write
1118000
heap
page read and write
9B4000
unkown
page readonly
5563000
unkown
page execute and read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
846000
heap
page read and write
DDB000
stack
page read and write
3673000
direct allocation
page read and write
2C00000
unkown
page execute and read and write
A97000
unkown
page readonly
2A71000
heap
page read and write
2824000
heap
page read and write
83F000
heap
page read and write
B10000
heap
page read and write
2805000
heap
page read and write
3550000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
892000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
8B0000
unkown
page readonly
3B38000
unclassified section
page read and write
47C8000
unclassified section
page read and write
386D000
direct allocation
page read and write
21579500000
trusted library allocation
page read and write
5F63000
unclassified section
page execute and read and write
2A71000
heap
page read and write
388E000
direct allocation
page read and write
3673000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
881000
heap
page read and write
2A71000
heap
page read and write
78D0000
trusted library allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
21577A3C000
heap
page read and write
2157940A000
trusted library allocation
page read and write
2A71000
heap
page read and write
97D000
unkown
page readonly
2613000
heap
page read and write
8F1000
heap
page read and write
A8E000
unkown
page readonly
2A71000
heap
page read and write
2920000
heap
page read and write
1274000
heap
page execute and read and write
2613000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
9AA000
unkown
page read and write
7A0A000
heap
page read and write
8BB8BFE000
stack
page read and write
3819000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
892000
heap
page read and write
2A71000
heap
page read and write
A1C000
stack
page read and write
215793C0000
heap
page read and write
2A71000
heap
page read and write
E60000
unkown
page readonly
7C4000
heap
page read and write
2A71000
heap
page read and write
4000000
unclassified section
page execute and read and write
25EE000
stack
page read and write
386D000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
36F0000
direct allocation
page read and write
59D2000
system
page read and write
80FA000
system
page execute and read and write
105C000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
E5E000
stack
page read and write
2A71000
heap
page read and write
9AA000
unkown
page write copy
3869000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
388E000
direct allocation
page read and write
834000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2DF8000
heap
page read and write
2800000
heap
page read and write
2A71000
heap
page read and write
B00000
unkown
page read and write
828000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
895000
heap
page read and write
89B000
heap
page read and write
DFB000
stack
page read and write
3212000
unclassified section
page read and write
381D000
direct allocation
page read and write
215795A5000
trusted library allocation
page read and write
3740000
direct allocation
page read and write
2A71000
heap
page read and write
4B63000
unkown
page execute and read and write
2E2D000
heap
page read and write
E00000
unkown
page read and write
A70000
unkown
page readonly
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
6F88000
system
page read and write
A1C000
stack
page read and write
4312000
unclassified section
page read and write
10B2000
heap
page read and write
3EE000
stack
page read and write
215795BE000
trusted library allocation
page read and write
638000
stack
page read and write
3550000
direct allocation
page read and write
2A71000
heap
page read and write
AB0000
heap
page read and write
3142000
direct allocation
page execute and read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
880000
heap
page read and write
2831000
heap
page read and write
2A71000
heap
page read and write
80D6000
system
page execute and read and write
36C3000
direct allocation
page read and write
2A71000
heap
page read and write
10B2000
heap
page read and write
36F0000
direct allocation
page read and write
2613000
heap
page read and write
E90000
unkown
page read and write
8F0000
unkown
page readonly
31D1000
direct allocation
page execute and read and write
9AF000
unkown
page write copy
8D6000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
79B4000
heap
page read and write
3FEE000
unclassified section
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
97D000
unkown
page readonly
2924000
heap
page read and write
2A71000
heap
page read and write
21579417000
trusted library allocation
page read and write
A60000
unkown
page readonly
1278000
heap
page read and write
10B2000
heap
page read and write
7A0E000
heap
page read and write
247B000
stack
page read and write
386D000
direct allocation
page read and write
3740000
direct allocation
page read and write
320000
heap
page read and write
281B000
heap
page read and write
90F000
heap
page read and write
1119000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2D00000
trusted library allocation
page execute and read and write
3242000
direct allocation
page execute and read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
36F0000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
845000
heap
page read and write
3550000
direct allocation
page read and write
2901000
heap
page read and write
EBE000
heap
page read and write
2A71000
heap
page read and write
A50000
unkown
page readonly
2A71000
heap
page read and write
7A05000
heap
page read and write
2613000
heap
page read and write
2924000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
1063000
heap
page read and write
6AD2000
system
page read and write
2A71000
heap
page read and write
8A0000
unkown
page readonly
3500000
direct allocation
page read and write
2A71000
heap
page read and write
79EE000
heap
page read and write
2A71000
heap
page read and write
10B2000
heap
page read and write
2D83000
heap
page read and write
2F2D000
direct allocation
page execute and read and write
99E000
unkown
page readonly
2A71000
heap
page read and write
21577A52000
heap
page read and write
2A71000
heap
page read and write
79D8000
heap
page read and write
2613000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
54F1000
unclassified section
page execute and read and write
A80000
unkown
page readonly
2A71000
heap
page read and write
845000
heap
page read and write
A95000
unkown
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
8151000
system
page execute and read and write
7B30000
heap
page read and write
2613000
heap
page read and write
388E000
direct allocation
page read and write
B00000
unkown
page read and write
2A71000
heap
page read and write
B10000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
7A01000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2DB0000
trusted library allocation
page read and write
E00000
unkown
page read and write
3CB000
stack
page read and write
83F000
heap
page read and write
AFE000
stack
page read and write
2613000
heap
page read and write
31B0000
heap
page read and write
2570000
direct allocation
page read and write
37E24000
system
page read and write
21579200000
trusted library allocation
page read and write
180D000
stack
page read and write
10B2000
heap
page read and write
79A5000
heap
page read and write
2F29000
direct allocation
page execute and read and write
2A71000
heap
page read and write
1052000
heap
page read and write
7A01000
heap
page read and write
215778E0000
heap
page read and write
1431000
unkown
page readonly
83F000
heap
page read and write
108A000
heap
page read and write
108E000
heap
page read and write
2A71000
heap
page read and write
8B9000
heap
page read and write
2A71000
heap
page read and write
4AF1000
unkown
page execute and read and write
2E29000
heap
page read and write
2E00000
direct allocation
page execute and read and write
2550000
heap
page read and write
38DE000
direct allocation
page read and write
8F5000
heap
page read and write
3869000
direct allocation
page read and write
7A10000
heap
page read and write
3A0000
heap
page read and write
7A19000
heap
page read and write
10B2000
heap
page read and write
2A71000
heap
page read and write
2613000
heap
page read and write
302D000
direct allocation
page execute and read and write
35A0000
direct allocation
page read and write
10B2000
heap
page read and write
3600000
unkown
page execute and read and write
91A000
stack
page read and write
2A71000
heap
page read and write
1118000
heap
page read and write
2B70000
trusted library allocation
page read and write
6DF6000
system
page read and write
2A71000
heap
page read and write
2600000
heap
page read and write
2C50000
trusted library allocation
page read and write
2A71000
heap
page read and write
1C0E000
stack
page read and write
215779D0000
heap
page read and write
834000
heap
page read and write
83A000
heap
page read and write
78E6000
heap
page read and write
EA0000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2C40000
heap
page read and write
1275000
heap
page read and write
3673000
direct allocation
page read and write
2A71000
heap
page read and write
2CD0000
direct allocation
page read and write
8F0000
unkown
page readonly
1430000
unkown
page readonly
21579200000
trusted library allocation
page read and write
80DE000
system
page execute and read and write
2A71000
heap
page read and write
3819000
direct allocation
page read and write
2A71000
heap
page read and write
21579410000
trusted library allocation
page read and write
2157784B000
system
page execute and read and write
2A71000
heap
page read and write
36C3000
direct allocation
page read and write
7A06000
heap
page read and write
8FB000
heap
page read and write
8BB9BFE000
stack
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
E60000
unkown
page readonly
2817000
heap
page read and write
21579400000
trusted library allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
21577A4B000
heap
page read and write
8F1000
unkown
page execute read
2A71000
heap
page read and write
2500000
heap
page read and write
21579501000
trusted library allocation
page read and write
8BB83FB000
stack
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A00000
heap
page read and write
89B000
heap
page read and write
3819000
direct allocation
page read and write
2A71000
heap
page read and write
3CCA000
unclassified section
page read and write
2CCF000
stack
page read and write
2520000
heap
page read and write
62F8000
system
page read and write
1066000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2157940E000
trusted library allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
A50000
unkown
page readonly
5563000
unclassified section
page execute and read and write
2A71000
heap
page read and write
83A000
heap
page read and write
890000
unkown
page readonly
2A71000
heap
page read and write
2A71000
heap
page read and write
826C000
unkown
page read and write
2A71000
heap
page read and write
5912000
system
page read and write
2613000
heap
page read and write
661C000
system
page read and write
2B70000
heap
page read and write
8A0000
unkown
page readonly
104B000
heap
page read and write
5E00000
trusted library allocation
page read and write
2920000
heap
page read and write
A97000
unkown
page readonly
38DE000
direct allocation
page read and write
2DB0000
trusted library allocation
page read and write
1066000
heap
page read and write
2A71000
heap
page read and write
3673000
direct allocation
page read and write
AB0000
heap
page read and write
10A0000
unkown
page readonly
EA0000
heap
page read and write
4636000
unclassified section
page read and write
2613000
heap
page read and write
7C4000
heap
page read and write
2D87000
heap
page read and write
2A71000
heap
page read and write
6C64000
system
page read and write
2A71000
heap
page read and write
281A000
heap
page read and write
35A0000
direct allocation
page read and write
A81000
unkown
page execute read
8F1000
unkown
page execute read
EA8000
heap
page read and write
2B95000
heap
page read and write
2A71000
heap
page read and write
C57000
unkown
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
890000
unkown
page readonly
2613000
heap
page read and write
2A71000
heap
page read and write
AFE000
stack
page read and write
2A71000
heap
page read and write
326C000
unclassified section
page read and write
2831000
heap
page read and write
31B4000
heap
page read and write
2A70000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
310000
heap
page read and write
21579403000
trusted library allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
B16000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2157784E000
system
page execute and read and write
80EE000
system
page execute and read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
36C3000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
21577A4F000
heap
page read and write
8EA000
heap
page read and write
21579415000
trusted library allocation
page read and write
37822000
system
page read and write
2A71000
heap
page read and write
78E2000
heap
page read and write
2A71000
heap
page read and write
390000
heap
page read and write
5FD4000
system
page read and write
3814000
unclassified section
page read and write
37762000
system
page read and write
60FE000
stack
page read and write
2A71000
heap
page read and write
388E000
direct allocation
page read and write
381D000
direct allocation
page read and write
21577A2F000
heap
page read and write
EA8000
heap
page read and write
2DB0000
trusted library allocation
page read and write
7EBC000
stack
page read and write
2A71000
heap
page read and write
836000
heap
page read and write
44A4000
unclassified section
page read and write
21577A20000
heap
page read and write
2A71000
heap
page read and write
2613000
heap
page read and write
79F4000
heap
page read and write
2B0F000
stack
page read and write
11E5000
heap
page read and write
2C23000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
836000
heap
page read and write
2A71000
heap
page read and write
2BCF000
stack
page read and write
648A000
system
page read and write
EBF000
unkown
page read and write
7B2C000
stack
page read and write
2A71000
heap
page read and write
3401000
heap
page read and write
109F000
stack
page read and write
3029000
direct allocation
page execute and read and write
215777D0000
system
page execute and read and write
78DE000
heap
page read and write
79C7000
heap
page read and write
2A71000
heap
page read and write
8A8000
heap
page read and write
2A71000
heap
page read and write
7A0000
heap
page read and write
2A71000
heap
page read and write
2D20000
direct allocation
page read and write
2A71000
heap
page read and write
A95000
unkown
page read and write
2A71000
heap
page read and write
1129000
heap
page read and write
83B000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
60BE000
stack
page read and write
2805000
heap
page read and write
8C9000
heap
page read and write
2A71000
heap
page read and write
8A8000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
30D1000
direct allocation
page execute and read and write
1275000
heap
page read and write
8BB93FE000
stack
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
10A0000
unkown
page readonly
E80000
unkown
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
3E5C000
unclassified section
page read and write
6940000
system
page read and write
1054000
heap
page read and write
101A000
heap
page read and write
2560000
heap
page read and write
A80000
unkown
page readonly
101E000
heap
page read and write
79FB000
heap
page read and write
1275000
heap
page read and write
802E000
stack
page read and write
2A71000
heap
page read and write
243C000
stack
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
4180000
unclassified section
page read and write
ED4000
heap
page read and write
3600000
unclassified section
page execute and read and write
2A71000
heap
page read and write
E80000
unkown
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
6C0000
heap
page read and write
2A71000
heap
page read and write
2602000
heap
page read and write
381D000
direct allocation
page read and write
67AE000
system
page read and write
21577A00000
heap
page read and write
80FD000
system
page execute and read and write
2A71000
heap
page read and write
1052000
heap
page read and write
2A71000
heap
page read and write
10A2000
heap
page read and write
3152000
unclassified section
page read and write
7A13000
heap
page read and write
7C0000
heap
page read and write
79A2000
heap
page read and write
2A71000
heap
page read and write
E1C000
stack
page read and write
2C5A000
heap
page read and write
2A71000
heap
page read and write
35A0000
direct allocation
page read and write
BF1000
unkown
page readonly
7A13000
heap
page read and write
105C000
heap
page read and write
2A71000
heap
page read and write
8B0000
unkown
page readonly
2E9E000
heap
page read and write
2613000
heap
page read and write
2A71000
heap
page read and write
7990000
heap
page read and write
2A71000
heap
page read and write
8B3000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
799B000
heap
page read and write
2A71000
heap
page read and write
83F000
heap
page read and write
BF1000
unkown
page readonly
4A00000
unclassified section
page execute and read and write
1148000
heap
page read and write
2A72000
heap
page read and write
9B4000
unkown
page readonly
2A71000
heap
page read and write
2A00000
heap
page read and write
79AA000
heap
page read and write
2A71000
heap
page read and write
DEF000
stack
page read and write
2F00000
direct allocation
page execute and read and write
2B10000
unkown
page readonly
2A71000
heap
page read and write
83F000
heap
page read and write
2D20000
direct allocation
page read and write
2A71000
heap
page read and write
820000
heap
page read and write
A8E000
unkown
page readonly
21579421000
trusted library allocation
page read and write
806F000
stack
page read and write
109F000
stack
page read and write
2A71000
heap
page read and write
A60000
unkown
page readonly
215795C4000
trusted library allocation
page read and write
1010000
heap
page read and write
36E000
stack
page read and write
2A71000
heap
page read and write
887000
heap
page read and write
A70000
unkown
page readonly
21577A29000
heap
page read and write
2A71000
heap
page read and write
2B00000
heap
page read and write
36F0000
direct allocation
page read and write
8BF000
heap
page read and write
79A8000
heap
page read and write
381D000
direct allocation
page read and write
2A9000
stack
page read and write
21579200000
trusted library allocation
page read and write
3869000
direct allocation
page read and write
2613000
heap
page read and write
2A71000
heap
page read and write
2D20000
direct allocation
page read and write
8C2000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
2817000
heap
page read and write
31CD000
direct allocation
page execute and read and write
30CD000
direct allocation
page execute and read and write
895000
heap
page read and write
2D00000
heap
page read and write
4000000
unkown
page execute and read and write
2A71000
heap
page read and write
2F9E000
direct allocation
page execute and read and write
2A71000
heap
page read and write
5A2C000
system
page read and write
7991000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
3819000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
79CD000
heap
page read and write
25AE000
stack
page read and write
79D2000
heap
page read and write
10B2000
heap
page read and write
38DE000
direct allocation
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
1056000
heap
page read and write
2840000
unkown
page read and write
There are 639 hidden memdumps, click here to show them.