IOC Report
5yCKVE324w.exe

loading gifFilesProcessesURLsIPsMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
5yCKVE324w.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\rapes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5yCKVE324w.exe
"C:\Users\user\Desktop\5yCKVE324w.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
"C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
malicious

URLs

Name
IP
Malicious
http://176.113.115.6/Ni9kiput/index.phpfs
unknown
http://176.113.115.6/Ni9kiput/index.php
unknown
http://176.113.115.6/Ni9kiput/index.phpb
unknown
http://176.113.115.6/Ni9kiput/index.phpo
unknown
http://176.113.115.6/Ni9kiput/index.php.s
unknown
http://176.113.115.6/Ni9kiput/index.php;
unknown
http://176.113.115.6/Ni9kiput/index.phpy
unknown
http://176.113.115.6/Ni9kiput/index.php(5/
unknown
http://176.113.115.6/Ni9kiput/index.phpV
unknown

IPs

IP
Domain
Country
Malicious
176.113.115.6
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4C90000
direct allocation
page read and write
malicious
951000
unkown
page execute and read and write
malicious
E41000
unkown
page execute and read and write
malicious
5190000
direct allocation
page read and write
malicious
E41000
unkown
page execute and read and write
malicious
5130000
direct allocation
page read and write
malicious
E10000
direct allocation
page read and write
43CF000
stack
page read and write
9BD000
unkown
page write copy
12E8000
unkown
page execute and write copy
4D11000
heap
page read and write
4811000
heap
page read and write
C5F000
stack
page read and write
669E000
stack
page read and write
40CE000
stack
page read and write
4ACE000
stack
page read and write
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4D11000
heap
page read and write
4CCC000
stack
page read and write
4CA1000
heap
page read and write
308E000
stack
page read and write
1490000
heap
page read and write
2DCF000
stack
page read and write
4C90000
direct allocation
page read and write
1140000
unkown
page execute and read and write
4811000
heap
page read and write
4811000
heap
page read and write
12E8000
unkown
page execute and write copy
9EF000
heap
page read and write
45CE000
stack
page read and write
38CE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
358E000
stack
page read and write
14B4000
heap
page read and write
167E000
heap
page read and write
4811000
heap
page read and write
E10000
direct allocation
page read and write
1284000
heap
page read and write
4CA1000
heap
page read and write
6B41000
heap
page read and write
5380000
direct allocation
page execute and read and write
39CF000
stack
page read and write
5290000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
354F000
stack
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
1277000
heap
page read and write
4CA1000
heap
page read and write
6EBE000
stack
page read and write
368F000
stack
page read and write
4811000
heap
page read and write
52C0000
direct allocation
page execute and read and write
4811000
heap
page read and write
5310000
direct allocation
page execute and read and write
168E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
66A0000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
5360000
direct allocation
page execute and read and write
14B0000
heap
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
8A31000
heap
page read and write
51F5000
direct allocation
page read and write
58FE000
stack
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
378E000
stack
page read and write
12BF000
heap
page read and write
C50000
unkown
page execute and read and write
E40000
unkown
page readonly
143E000
stack
page read and write
66A5000
heap
page read and write
498E000
stack
page read and write
4CA0000
heap
page read and write
54B4000
heap
page read and write
561C000
stack
page read and write
5300000
direct allocation
page execute and read and write
52F0000
direct allocation
page execute and read and write
14B4000
heap
page read and write
DC7000
heap
page read and write
E10000
direct allocation
page read and write
C61000
unkown
page execute and write copy
4811000
heap
page read and write
E10000
direct allocation
page read and write
458F000
stack
page read and write
12DE000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
14B4000
heap
page read and write
3B4E000
stack
page read and write
102F000
unkown
page execute and read and write
3A4F000
stack
page read and write
14A0000
direct allocation
page read and write
444F000
stack
page read and write
484E000
stack
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
DA0000
heap
page read and write
1283000
heap
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
125B000
heap
page read and write
12B3000
heap
page read and write
52B0000
direct allocation
page execute and read and write
45CE000
stack
page read and write
344E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
EAD000
unkown
page write copy
4CA1000
heap
page read and write
2EC7000
heap
page read and write
3D8F000
stack
page read and write
4CA1000
heap
page read and write
14A0000
direct allocation
page read and write
565D000
stack
page read and write
14B4000
heap
page read and write
4E00000
direct allocation
page execute and read and write
EAD000
unkown
page write copy
54CF000
stack
page read and write
46CF000
stack
page read and write
14A0000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
4DA0000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
490E000
stack
page read and write
108B000
stack
page read and write
DCD000
heap
page read and write
4811000
heap
page read and write
14B4000
heap
page read and write
4CA1000
heap
page read and write
5340000
direct allocation
page execute and read and write
14A0000
direct allocation
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
494F000
stack
page read and write
53CE000
stack
page read and write
4811000
heap
page read and write
523F000
stack
page read and write
4CA1000
heap
page read and write
3E4E000
stack
page read and write
4E00000
direct allocation
page execute and read and write
4811000
heap
page read and write
1305000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
2C8F000
stack
page read and write
48CF000
stack
page read and write
1650000
direct allocation
page read and write
52F0000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
2E90000
heap
page read and write
52F0000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
318F000
stack
page read and write
338F000
stack
page read and write
1300000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
12CD000
heap
page read and write
3CCF000
stack
page read and write
4DCF000
stack
page read and write
40CE000
stack
page read and write
464F000
stack
page read and write
4811000
heap
page read and write
E10000
direct allocation
page read and write
4B4F000
stack
page read and write
D3D000
stack
page read and write
1660000
direct allocation
page execute and read and write
32CF000
stack
page read and write
6EFB000
stack
page read and write
E30000
direct allocation
page read and write
3F8E000
stack
page read and write
124C000
heap
page read and write
380E000
stack
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
394E000
stack
page read and write
C1E000
unkown
page execute and read and write
1140000
unkown
page execute and read and write
440E000
stack
page read and write
4CA1000
heap
page read and write
4CB5000
heap
page read and write
430F000
stack
page read and write
4CA1000
heap
page read and write
125E000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
C60000
unkown
page execute and read and write
14A0000
direct allocation
page read and write
4811000
heap
page read and write
66A6000
heap
page read and write
37CF000
stack
page read and write
4811000
heap
page read and write
DB0000
heap
page read and write
4CA1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
1650000
direct allocation
page read and write
163E000
stack
page read and write
4D10000
heap
page read and write
57FD000
stack
page read and write
4811000
heap
page read and write
9D9000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
3F4E000
stack
page read and write
41CF000
stack
page read and write
E41000
unkown
page execute and write copy
EAF000
unkown
page execute and read and write
5A5000
heap
page read and write
14A0000
direct allocation
page read and write
5195000
direct allocation
page read and write
360F000
stack
page read and write
470E000
stack
page read and write
12B2000
heap
page read and write
5D0000
heap
page read and write
1251000
heap
page read and write
EA6000
unkown
page execute and read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
4E30000
direct allocation
page execute and read and write
E41000
unkown
page execute and write copy
448E000
stack
page read and write
3B0F000
stack
page read and write
14B4000
heap
page read and write
14B4000
heap
page read and write
36CE000
stack
page read and write
4821000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
158E000
stack
page read and write
304F000
stack
page read and write
1150000
unkown
page execute and read and write
4CA1000
heap
page read and write
E30000
direct allocation
page read and write
14A0000
direct allocation
page read and write
120A000
heap
page read and write
14A0000
direct allocation
page read and write
102F000
unkown
page execute and read and write
1282000
heap
page read and write
310F000
stack
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
6C80000
heap
page read and write
34CF000
stack
page read and write
144E000
stack
page read and write
4CA1000
heap
page read and write
374F000
stack
page read and write
14B4000
heap
page read and write
4830000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4A0F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4BCF000
stack
page read and write
4CA1000
heap
page read and write
DC0000
heap
page read and write
480F000
stack
page read and write
52A0000
direct allocation
page execute and read and write
4811000
heap
page read and write
4811000
heap
page read and write
4FBB000
stack
page read and write
EAD000
unkown
page write copy
51CE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
12C6000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
2EA0000
heap
page read and write
4CA1000
heap
page read and write
14A0000
direct allocation
page read and write
E10000
direct allocation
page read and write
4CA1000
heap
page read and write
12B2000
heap
page read and write
4E50000
direct allocation
page execute and read and write
EAD000
unkown
page write copy
12DC000
heap
page read and write
4E00000
direct allocation
page execute and read and write
125E000
heap
page read and write
4C8C000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
3DCE000
stack
page read and write
4CA1000
heap
page read and write
B3F000
unkown
page execute and read and write
4CA1000
heap
page read and write
14B4000
heap
page read and write
4CA1000
heap
page read and write
6FCC000
stack
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
888C000
stack
page read and write
12C2000
heap
page read and write
324F000
stack
page read and write
15BF000
stack
page read and write
5370000
direct allocation
page execute and read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
37CF000
stack
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
6B50000
heap
page read and write
4B8E000
stack
page read and write
4E60000
direct allocation
page execute and read and write
4811000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
14B4000
heap
page read and write
4A8F000
stack
page read and write
D9E000
stack
page read and write
12BB000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
3A0E000
stack
page read and write
4C90000
direct allocation
page read and write
EAF000
unkown
page execute and read and write
E40000
unkown
page read and write
3F4F000
stack
page read and write
46CF000
stack
page read and write
434E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
328E000
stack
page read and write
4CA1000
heap
page read and write
129E000
heap
page read and write
47CE000
stack
page read and write
3E4E000
stack
page read and write
3D0E000
stack
page read and write
3F0E000
stack
page read and write
1246000
heap
page read and write
364E000
stack
page read and write
450F000
stack
page read and write
3C8E000
stack
page read and write
167A000
heap
page read and write
4CA1000
heap
page read and write
14B4000
heap
page read and write
388F000
stack
page read and write
120E000
heap
page read and write
127C000
heap
page read and write
4C8F000
stack
page read and write
4CA1000
heap
page read and write
408F000
stack
page read and write
5330000
direct allocation
page execute and read and write
14A0000
direct allocation
page read and write
DF6000
unkown
page execute and read and write
53A0000
direct allocation
page execute and read and write
12CD000
heap
page read and write
8A2C000
stack
page read and write
4CA1000
heap
page read and write
4A4E000
stack
page read and write
4CA1000
heap
page read and write
418E000
stack
page read and write
52F0000
direct allocation
page execute and read and write
33CE000
stack
page read and write
5310000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
526F000
stack
page read and write
15FE000
stack
page read and write
448E000
stack
page read and write
480F000
stack
page read and write
1279000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
1138000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
2E8E000
stack
page read and write
4811000
heap
page read and write
2B8F000
stack
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
6B50000
heap
page read and write
6A2F000
stack
page read and write
4811000
heap
page read and write
513E000
stack
page read and write
4811000
heap
page read and write
3A4F000
stack
page read and write
300B000
stack
page read and write
67EE000
stack
page read and write
454E000
stack
page read and write
52F0000
direct allocation
page execute and read and write
468E000
stack
page read and write
C48000
unkown
page execute and read and write
3CCF000
stack
page read and write
330E000
stack
page read and write
14A0000
direct allocation
page read and write
E0C000
stack
page read and write
4811000
heap
page read and write
E10000
direct allocation
page read and write
310F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
52D0000
direct allocation
page execute and read and write
EA6000
unkown
page execute and read and write
4811000
heap
page read and write
3F8E000
stack
page read and write
4CA1000
heap
page read and write
692E000
stack
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
129E000
heap
page read and write
110E000
unkown
page execute and read and write
4E80000
direct allocation
page execute and read and write
148E000
stack
page read and write
12C2000
heap
page read and write
368F000
stack
page read and write
590000
heap
page read and write
1150000
unkown
page execute and write copy
3E0F000
stack
page read and write
12C2000
heap
page read and write
4811000
heap
page read and write
980000
heap
page read and write
12C7000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
5130000
direct allocation
page read and write
5130000
direct allocation
page read and write
3BCE000
stack
page read and write
52F0000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
6A60000
heap
page read and write
4811000
heap
page read and write
110E000
unkown
page execute and read and write
1151000
unkown
page execute and write copy
13FE000
stack
page read and write
420E000
stack
page read and write
340F000
stack
page read and write
5350000
direct allocation
page execute and read and write
52F0000
direct allocation
page execute and read and write
14A0000
direct allocation
page read and write
4CA1000
heap
page read and write
67AF000
stack
page read and write
12C2000
heap
page read and write
390F000
stack
page read and write
C3C000
stack
page read and write
3A8E000
stack
page read and write
12BA000
heap
page read and write
129E000
heap
page read and write
E10000
direct allocation
page read and write
390F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
9DB000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
12B2000
heap
page read and write
4CA1000
heap
page read and write
52F0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
5280000
direct allocation
page execute and read and write
3A8E000
stack
page read and write
52E0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
12CD000
heap
page read and write
4811000
heap
page read and write
2F4E000
stack
page read and write
4CA1000
heap
page read and write
6B4E000
heap
page read and write
4CA1000
heap
page read and write
3E0F000
stack
page read and write
1447000
heap
page read and write
4811000
heap
page read and write
354F000
stack
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
5A0000
heap
page read and write
350E000
stack
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
1440000
heap
page read and write
4CA1000
heap
page read and write
6DBE000
stack
page read and write
4811000
heap
page read and write
14B4000
heap
page read and write
1200000
heap
page read and write
E1E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
99B000
heap
page read and write
2F0F000
stack
page read and write
4CF5000
direct allocation
page read and write
3C4F000
stack
page read and write
5300000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
408F000
stack
page read and write
E10000
direct allocation
page read and write
434D000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
3ECF000
stack
page read and write
478F000
stack
page read and write
129E000
heap
page read and write
4CA1000
heap
page read and write
36CE000
stack
page read and write
414F000
stack
page read and write
4C90000
direct allocation
page read and write
E10000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
2E0E000
stack
page read and write
4CA1000
heap
page read and write
300F000
stack
page read and write
4811000
heap
page read and write
404E000
stack
page read and write
4811000
heap
page read and write
394E000
stack
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
12E6000
unkown
page execute and read and write
320F000
stack
page read and write
330F000
stack
page read and write
4E10000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
950000
unkown
page readonly
4811000
heap
page read and write
54B0000
heap
page read and write
4811000
heap
page read and write
8A30000
heap
page read and write
4C90000
direct allocation
page read and write
13E0000
heap
page read and write
444F000
stack
page read and write
428F000
stack
page read and write
52F0000
direct allocation
page execute and read and write
4811000
heap
page read and write
14B4000
heap
page read and write
4CA1000
heap
page read and write
2CCE000
stack
page read and write
DA0000
heap
page read and write
12E6000
unkown
page execute and read and write
5340000
direct allocation
page execute and read and write
41CF000
stack
page read and write
4CA1000
heap
page read and write
E10000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
4811000
heap
page read and write
E10000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
9B6000
unkown
page execute and read and write
C60000
unkown
page execute and write copy
4CA1000
heap
page read and write
4D11000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
9C0000
heap
page read and write
4CA1000
heap
page read and write
1670000
heap
page read and write
12C2000
heap
page read and write
12B2000
heap
page read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
575E000
stack
page read and write
4CA1000
heap
page read and write
2FCF000
stack
page read and write
4D0F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
458F000
stack
page read and write
4811000
heap
page read and write
4CB0000
heap
page read and write
4910000
trusted library allocation
page read and write
4811000
heap
page read and write
344E000
stack
page read and write
4CA1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4810000
heap
page read and write
4C90000
direct allocation
page read and write
A0A000
heap
page read and write
4CA1000
heap
page read and write
990000
heap
page read and write
12CD000
heap
page read and write
358E000
stack
page read and write
340F000
stack
page read and write
9BF000
unkown
page execute and read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
4CA1000
heap
page read and write
3B8F000
stack
page read and write
516E000
stack
page read and write
14B4000
heap
page read and write
380E000
stack
page read and write
5330000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
3B8F000
stack
page read and write
52CF000
stack
page read and write
3D0E000
stack
page read and write
314E000
stack
page read and write
3BCE000
stack
page read and write
4CA1000
heap
page read and write
4E10000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
2EC0000
heap
page read and write
52E0000
direct allocation
page execute and read and write
950000
unkown
page read and write
118A000
stack
page read and write
4C90000
direct allocation
page read and write
42CE000
stack
page read and write
551E000
stack
page read and write
4CA1000
heap
page read and write
93E000
stack
page read and write
14A0000
direct allocation
page read and write
5390000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
4CC0000
heap
page read and write
4811000
heap
page read and write
8FD000
stack
page read and write
4D11000
heap
page read and write
9BD000
unkown
page write copy
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4811000
heap
page read and write
52F0000
direct allocation
page execute and read and write
951000
unkown
page execute and write copy
4811000
heap
page read and write
1150000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
400F000
stack
page read and write
E10000
direct allocation
page read and write
31CE000
stack
page read and write
4E00000
direct allocation
page execute and read and write
1150000
unkown
page execute and write copy
4811000
heap
page read and write
5320000
direct allocation
page execute and read and write
6B40000
heap
page read and write
14A0000
direct allocation
page read and write
68EF000
stack
page read and write
52C000
stack
page read and write
4CA1000
heap
page read and write
4E20000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
1151000
unkown
page execute and write copy
4C0E000
stack
page read and write
4CA1000
heap
page read and write
E10000
direct allocation
page read and write
14B4000
heap
page read and write
DF8000
unkown
page execute and write copy
11F0000
heap
page read and write
A20000
heap
page read and write
420E000
stack
page read and write
470E000
stack
page read and write
430F000
stack
page read and write
E40000
unkown
page read and write
E40000
unkown
page readonly
4811000
heap
page read and write
4811000
heap
page read and write
14B4000
heap
page read and write
154E000
stack
page read and write
A17000
heap
page read and write
1138000
unkown
page execute and read and write
There are 677 hidden memdumps, click here to show them.