IOC Report
wy6S9pbZsY.exe

loading gifFilesProcessesURLsIPsMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
wy6S9pbZsY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\rapes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wy6S9pbZsY.exe
"C:\Users\user\Desktop\wy6S9pbZsY.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
"C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
malicious

URLs

Name
IP
Malicious
http://176.113.115.6/Ni9kiput/index.php$
unknown
http://176.113.115.6/Ni9kiput/index.php
unknown
http://176.113.115.6/ecurity=Impersonation
unknown
http://176.113.115.6/Ni9kiput/index.php/Ni9kiput/index.php
unknown
http://176.113.115.6/Ni9kiput/index.phpP6
unknown
http://176.113.115.6/Ni9kiput/index.phpj
unknown
http://176.113.115.6/Ni9kiput/index.phpw
unknown
http://176.113.115.6/
unknown
http://176.113.115.6/Ni9kiput/index.phpV
unknown

IPs

IP
Domain
Country
Malicious
176.113.115.6
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
B91000
unkown
page execute and read and write
malicious
B91000
unkown
page execute and read and write
malicious
5190000
direct allocation
page read and write
malicious
2A1000
unkown
page execute and read and write
malicious
5380000
direct allocation
page read and write
malicious
B91000
unkown
page execute and read and write
malicious
4BF0000
direct allocation
page read and write
malicious
4AA0000
direct allocation
page read and write
malicious
4621000
heap
page read and write
28F0000
direct allocation
page read and write
4F6E000
stack
page read and write
4621000
heap
page read and write
D82000
unkown
page execute and read and write
311E000
stack
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
5330000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
4771000
heap
page read and write
4621000
heap
page read and write
3030000
direct allocation
page read and write
54F0000
direct allocation
page execute and read and write
4631000
heap
page read and write
4621000
heap
page read and write
752000
unkown
page execute and read and write
5FE0000
heap
page read and write
1520000
heap
page read and write
B60000
heap
page read and write
15D4000
heap
page read and write
2BDF000
stack
page read and write
4771000
heap
page read and write
36CE000
stack
page read and write
E10000
heap
page read and write
11FE000
stack
page read and write
15D4000
heap
page read and write
29A0000
direct allocation
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4C3F000
stack
page read and write
4771000
heap
page read and write
295E000
stack
page read and write
28F0000
direct allocation
page read and write
5570000
direct allocation
page execute and read and write
473F000
stack
page read and write
387E000
stack
page read and write
5A6000
unkown
page execute and read and write
3F4F000
stack
page read and write
333F000
stack
page read and write
D4A000
heap
page read and write
4621000
heap
page read and write
3AFE000
stack
page read and write
EA4000
unkown
page execute and read and write
4771000
heap
page read and write
4771000
heap
page read and write
E96000
unkown
page execute and read and write
EA4000
unkown
page execute and write copy
28F0000
direct allocation
page read and write
2C2F000
stack
page read and write
5380000
direct allocation
page execute and read and write
62AE000
stack
page read and write
7F0000
heap
page read and write
E10000
heap
page read and write
BF6000
unkown
page execute and read and write
4EE0000
direct allocation
page read and write
4B05000
direct allocation
page read and write
3EDE000
stack
page read and write
EA4000
unkown
page execute and write copy
11A0000
heap
page read and write
D82000
unkown
page execute and read and write
4C40000
direct allocation
page execute and read and write
28F0000
direct allocation
page read and write
E10000
heap
page read and write
3B1E000
stack
page read and write
F3E000
stack
page read and write
4EE0000
direct allocation
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4C0E000
stack
page read and write
36FF000
stack
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
D20000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
5300000
direct allocation
page execute and read and write
498E000
stack
page read and write
E1D000
heap
page read and write
5360000
direct allocation
page execute and read and write
4771000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
4EE0000
direct allocation
page read and write
5150000
trusted library allocation
page read and write
4621000
heap
page read and write
2D1F000
stack
page read and write
372F000
stack
page read and write
4C10000
direct allocation
page execute and read and write
5300000
direct allocation
page execute and read and write
439F000
stack
page read and write
67CB000
stack
page read and write
4EF1000
heap
page read and write
4BB0000
trusted library allocation
page read and write
299E000
stack
page read and write
51EE000
stack
page read and write
1042000
unkown
page execute and read and write
602E000
stack
page read and write
4621000
heap
page read and write
2FAF000
stack
page read and write
B70000
heap
page read and write
3B8F000
stack
page read and write
15D0000
heap
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
35EF000
stack
page read and write
4BDF000
stack
page read and write
3030000
direct allocation
page read and write
4621000
heap
page read and write
7EB0000
heap
page read and write
576D000
stack
page read and write
28F0000
direct allocation
page read and write
29D0000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
306000
unkown
page execute and read and write
BFD000
unkown
page write copy
BF6000
unkown
page execute and read and write
BFD000
unkown
page write copy
4621000
heap
page read and write
4A60000
trusted library allocation
page read and write
6B10000
heap
page read and write
1780000
direct allocation
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
52E0000
direct allocation
page execute and read and write
487F000
stack
page read and write
477E000
stack
page read and write
29A0000
direct allocation
page read and write
34AF000
stack
page read and write
4C10000
direct allocation
page execute and read and write
312E000
stack
page read and write
B90000
unkown
page read and write
358E000
stack
page read and write
4ADE000
stack
page read and write
28F0000
direct allocation
page read and write
5300000
direct allocation
page execute and read and write
3E4E000
stack
page read and write
29A0000
direct allocation
page read and write
E60000
unkown
page execute and read and write
697E000
stack
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4621000
heap
page read and write
2A1000
unkown
page execute and write copy
4CC0000
direct allocation
page execute and read and write
3B2E000
stack
page read and write
916000
heap
page read and write
1780000
direct allocation
page read and write
6B20000
heap
page read and write
BFF000
unkown
page execute and read and write
54BF000
stack
page read and write
4771000
heap
page read and write
BFD000
unkown
page write copy
4771000
heap
page read and write
4621000
heap
page read and write
DDB000
heap
page read and write
349F000
stack
page read and write
890000
heap
page read and write
4EE0000
direct allocation
page read and write
E03000
heap
page read and write
4771000
heap
page read and write
44FE000
stack
page read and write
1780000
direct allocation
page read and write
3AEF000
stack
page read and write
427E000
stack
page read and write
4771000
heap
page read and write
1780000
direct allocation
page read and write
55C0000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
5500000
direct allocation
page execute and read and write
E20000
heap
page read and write
4771000
heap
page read and write
D10000
heap
page read and write
4C60000
direct allocation
page execute and read and write
8D9000
heap
page read and write
46CF000
stack
page read and write
286E000
stack
page read and write
4D11000
heap
page read and write
17AB000
heap
page read and write
3F8E000
stack
page read and write
5580000
direct allocation
page execute and read and write
4621000
heap
page read and write
4621000
heap
page read and write
DFB000
heap
page read and write
344F000
stack
page read and write
30EF000
stack
page read and write
4621000
heap
page read and write
D40000
heap
page read and write
154E000
stack
page read and write
40CE000
stack
page read and write
4E20000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
2910000
direct allocation
page read and write
908000
heap
page read and write
54D0000
direct allocation
page execute and read and write
413E000
stack
page read and write
51F5000
direct allocation
page read and write
548D000
stack
page read and write
4D60000
direct allocation
page execute and read and write
DA1000
heap
page read and write
4621000
heap
page read and write
B90000
unkown
page read and write
EA5000
unkown
page execute and write copy
4F2B000
stack
page read and write
103E000
stack
page read and write
EA4000
unkown
page execute and read and write
15D4000
heap
page read and write
DA1000
heap
page read and write
3FDF000
stack
page read and write
7EB000
stack
page read and write
4621000
heap
page read and write
D8F000
heap
page read and write
3DAD000
stack
page read and write
4771000
heap
page read and write
324F000
stack
page read and write
4621000
heap
page read and write
28F0000
direct allocation
page read and write
4621000
heap
page read and write
52F0000
direct allocation
page execute and read and write
B91000
unkown
page execute and write copy
4771000
heap
page read and write
4771000
heap
page read and write
4D2F000
stack
page read and write
448E000
stack
page read and write
4771000
heap
page read and write
77D000
stack
page read and write
415E000
stack
page read and write
43BE000
stack
page read and write
D85000
heap
page read and write
4771000
heap
page read and write
159E000
stack
page read and write
4EF0000
heap
page read and write
4621000
heap
page read and write
30F0000
heap
page read and write
361E000
stack
page read and write
423F000
stack
page read and write
158E000
stack
page read and write
2E6F000
stack
page read and write
44DF000
stack
page read and write
314F000
stack
page read and write
5380000
direct allocation
page read and write
DBB000
heap
page read and write
EA5000
unkown
page execute and write copy
29D7000
heap
page read and write
49BF000
stack
page read and write
11DD000
stack
page read and write
4771000
heap
page read and write
15D4000
heap
page read and write
50AE000
stack
page read and write
452E000
stack
page read and write
2920000
heap
page read and write
2A0000
unkown
page read and write
4621000
heap
page read and write
CA0000
heap
page read and write
437F000
stack
page read and write
30DF000
stack
page read and write
34EE000
stack
page read and write
4621000
heap
page read and write
5540000
direct allocation
page execute and read and write
4621000
heap
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
429E000
stack
page read and write
63FB000
stack
page read and write
4EE0000
direct allocation
page read and write
16DA000
heap
page read and write
D4E000
heap
page read and write
4790000
heap
page read and write
30D000
unkown
page write copy
E96000
unkown
page execute and read and write
3E0F000
stack
page read and write
4EE0000
direct allocation
page read and write
29A0000
direct allocation
page read and write
6B1E000
heap
page read and write
4C80000
direct allocation
page execute and read and write
3BCE000
stack
page read and write
4621000
heap
page read and write
5530000
direct allocation
page execute and read and write
4771000
heap
page read and write
D82000
unkown
page execute and read and write
4EE0000
direct allocation
page read and write
7C5000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4771000
heap
page read and write
1770000
heap
page read and write
E08000
heap
page read and write
4EE0000
direct allocation
page read and write
4D60000
direct allocation
page execute and read and write
2ADF000
stack
page read and write
28F0000
direct allocation
page read and write
385F000
stack
page read and write
EA4000
unkown
page execute and write copy
3C6E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
42AE000
stack
page read and write
B90000
unkown
page readonly
3EBE000
stack
page read and write
4621000
heap
page read and write
52EF000
stack
page read and write
4771000
heap
page read and write
444F000
stack
page read and write
4771000
heap
page read and write
2E9E000
stack
page read and write
4621000
heap
page read and write
3EAF000
stack
page read and write
394E000
stack
page read and write
15D4000
heap
page read and write
DFA000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
E1D000
heap
page read and write
5B4000
unkown
page execute and read and write
4771000
heap
page read and write
52CF000
stack
page read and write
322F000
stack
page read and write
28AC000
stack
page read and write
4621000
heap
page read and write
43EE000
stack
page read and write
4621000
heap
page read and write
4C10000
direct allocation
page execute and read and write
362E000
stack
page read and write
35BF000
stack
page read and write
616E000
stack
page read and write
4EE0000
direct allocation
page read and write
4621000
heap
page read and write
5310000
direct allocation
page execute and read and write
4621000
heap
page read and write
397F000
stack
page read and write
466E000
stack
page read and write
DB9000
heap
page read and write
4621000
heap
page read and write
4AFF000
stack
page read and write
5500000
direct allocation
page execute and read and write
6B20000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
39EE000
stack
page read and write
10DC000
stack
page read and write
53A0000
direct allocation
page execute and read and write
D94000
heap
page read and write
2FEE000
stack
page read and write
4771000
heap
page read and write
EA4000
unkown
page execute and read and write
4621000
heap
page read and write
2E5F000
stack
page read and write
4EE0000
direct allocation
page read and write
4EF1000
heap
page read and write
4621000
heap
page read and write
39AF000
stack
page read and write
5350000
direct allocation
page execute and read and write
1780000
direct allocation
page read and write
15D4000
heap
page read and write
29A0000
direct allocation
page read and write
337E000
stack
page read and write
17BC000
heap
page read and write
2B2F000
stack
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
80D4000
heap
page read and write
3C1F000
stack
page read and write
EA5000
unkown
page execute and write copy
14FF000
stack
page read and write
80AC000
stack
page read and write
4771000
heap
page read and write
5340000
direct allocation
page execute and read and write
43DE000
stack
page read and write
4771000
heap
page read and write
4EF1000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4EE0000
direct allocation
page read and write
334F000
stack
page read and write
34BE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
4621000
heap
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
28F0000
direct allocation
page read and write
BFD000
unkown
page write copy
4BCF000
stack
page read and write
39DE000
stack
page read and write
4770000
heap
page read and write
E8D000
unkown
page execute and read and write
3D5F000
stack
page read and write
4632000
heap
page read and write
15D4000
heap
page read and write
59D000
unkown
page execute and read and write
408F000
stack
page read and write
28F0000
direct allocation
page read and write
29C0000
direct allocation
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
DBE000
heap
page read and write
292C000
heap
page read and write
4D40000
direct allocation
page execute and read and write
4EE0000
direct allocation
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
430F000
stack
page read and write
416E000
stack
page read and write
354F000
stack
page read and write
CA5000
heap
page read and write
4D10000
heap
page read and write
37CF000
stack
page read and write
4621000
heap
page read and write
AFA000
stack
page read and write
492000
unkown
page execute and read and write
4EB4000
heap
page read and write
5300000
direct allocation
page execute and read and write
4771000
heap
page read and write
15D4000
heap
page read and write
4771000
heap
page read and write
28F0000
direct allocation
page read and write
40FF000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4621000
heap
page read and write
DB8000
heap
page read and write
1060000
heap
page read and write
169E000
stack
page read and write
6B11000
heap
page read and write
480F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
4771000
heap
page read and write
4771000
heap
page read and write
401E000
stack
page read and write
52D0000
direct allocation
page execute and read and write
4621000
heap
page read and write
4C2C000
stack
page read and write
326E000
stack
page read and write
1780000
direct allocation
page read and write
29A0000
direct allocation
page read and write
4771000
heap
page read and write
5500000
direct allocation
page execute and read and write
3EEE000
stack
page read and write
2910000
direct allocation
page read and write
4621000
heap
page read and write
17A0000
heap
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
B90000
unkown
page readonly
30EE000
stack
page read and write
4621000
heap
page read and write
15D4000
heap
page read and write
390F000
stack
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
29A0000
direct allocation
page read and write
15D4000
heap
page read and write
29C0000
direct allocation
page read and write
16C0000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4621000
heap
page read and write
3C3E000
stack
page read and write
462F000
stack
page read and write
44BF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
4621000
heap
page read and write
4D11000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
DF4000
heap
page read and write
15D4000
heap
page read and write
4621000
heap
page read and write
5B5000
unkown
page execute and write copy
1780000
direct allocation
page read and write
376E000
stack
page read and write
1780000
direct allocation
page read and write
16D0000
heap
page read and write
43AF000
stack
page read and write
35FE000
stack
page read and write
4D60000
direct allocation
page execute and read and write
4A8F000
stack
page read and write
15D4000
heap
page read and write
4771000
heap
page read and write
A3C000
stack
page read and write
41CF000
stack
page read and write
4771000
heap
page read and write
506F000
stack
page read and write
55CD000
stack
page read and write
29A0000
direct allocation
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
5300000
direct allocation
page execute and read and write
D93000
heap
page read and write
4621000
heap
page read and write
4D60000
direct allocation
page execute and read and write
347F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4C70000
direct allocation
page execute and read and write
E10000
heap
page read and write
2A0000
unkown
page readonly
4ACE000
stack
page read and write
3ABF000
stack
page read and write
2EAE000
stack
page read and write
3C2F000
stack
page read and write
5500000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
4771000
heap
page read and write
B90000
unkown
page read and write
B50000
heap
page read and write
4B3E000
stack
page read and write
D91000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
4D7F000
stack
page read and write
4771000
heap
page read and write
2927000
heap
page read and write
B90000
unkown
page readonly
5320000
direct allocation
page execute and read and write
B91000
unkown
page execute and write copy
5500000
direct allocation
page execute and read and write
4EE0000
direct allocation
page read and write
494F000
stack
page read and write
4771000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
3D6F000
stack
page read and write
4780000
heap
page read and write
653D000
stack
page read and write
38AE000
stack
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
484E000
stack
page read and write
29A0000
direct allocation
page read and write
5300000
direct allocation
page execute and read and write
4771000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4CA0000
direct allocation
page execute and read and write
389E000
stack
page read and write
4771000
heap
page read and write
80B1000
heap
page read and write
3E9F000
stack
page read and write
323E000
stack
page read and write
626F000
stack
page read and write
5500000
direct allocation
page execute and read and write
4771000
heap
page read and write
1780000
direct allocation
page read and write
49FE000
stack
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
5510000
direct allocation
page execute and read and write
4621000
heap
page read and write
339E000
stack
page read and write
29A0000
direct allocation
page read and write
399F000
stack
page read and write
2FAF000
stack
page read and write
28F0000
direct allocation
page read and write
15CE000
stack
page read and write
2D6E000
stack
page read and write
28F0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
4621000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
458F000
stack
page read and write
4621000
heap
page read and write
4EC0000
heap
page read and write
425F000
stack
page read and write
29A0000
direct allocation
page read and write
30F7000
heap
page read and write
29A0000
direct allocation
page read and write
53BE000
stack
page read and write
1780000
direct allocation
page read and write
373E000
stack
page read and write
8F0000
heap
page read and write
335F000
stack
page read and write
BFD000
unkown
page write copy
BF6000
unkown
page execute and read and write
4621000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4771000
heap
page read and write
4771000
heap
page read and write
5500000
direct allocation
page execute and read and write
4621000
heap
page read and write
4621000
heap
page read and write
1042000
unkown
page execute and read and write
4C00000
direct allocation
page execute and read and write
386F000
stack
page read and write
4C55000
direct allocation
page read and write
DC6000
heap
page read and write
D9F000
heap
page read and write
4621000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
281E000
stack
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
3D0E000
stack
page read and write
4621000
heap
page read and write
1780000
direct allocation
page read and write
3047000
heap
page read and write
E60000
unkown
page execute and read and write
3E7F000
stack
page read and write
476F000
stack
page read and write
4EF1000
heap
page read and write
53E5000
direct allocation
page read and write
30F000
unkown
page execute and read and write
B3D000
stack
page read and write
55A0000
direct allocation
page execute and read and write
336F000
stack
page read and write
5300000
direct allocation
page execute and read and write
5560000
direct allocation
page execute and read and write
4DB0000
direct allocation
page execute and read and write
4771000
heap
page read and write
325E000
stack
page read and write
DFB000
heap
page read and write
4D50000
direct allocation
page execute and read and write
119E000
stack
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
45FF000
stack
page read and write
402E000
stack
page read and write
368F000
stack
page read and write
45CE000
stack
page read and write
434E000
stack
page read and write
4621000
heap
page read and write
C30000
heap
page read and write
E08000
heap
page read and write
E06000
heap
page read and write
4621000
heap
page read and write
35DF000
stack
page read and write
4621000
heap
page read and write
44EF000
stack
page read and write
3FBF000
stack
page read and write
5300000
direct allocation
page execute and read and write
31FF000
stack
page read and write
29A0000
direct allocation
page read and write
2D5E000
stack
page read and write
4621000
heap
page read and write
4BEC000
stack
page read and write
15D4000
heap
page read and write
4C10000
direct allocation
page execute and read and write
7C0000
heap
page read and write
380E000
stack
page read and write
5520000
direct allocation
page execute and read and write
4771000
heap
page read and write
4621000
heap
page read and write
3A8E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
411F000
stack
page read and write
4621000
heap
page read and write
5500000
direct allocation
page execute and read and write
BFD000
unkown
page write copy
1440000
heap
page read and write
4621000
heap
page read and write
461F000
stack
page read and write
51CE000
stack
page read and write
371F000
stack
page read and write
63AF000
stack
page read and write
2FDE000
stack
page read and write
4D0F000
stack
page read and write
3A4F000
stack
page read and write
463E000
stack
page read and write
80B0000
heap
page read and write
860000
heap
page read and write
8CE000
heap
page read and write
2D2F000
stack
page read and write
420E000
stack
page read and write
3FEF000
stack
page read and write
321F000
stack
page read and write
4771000
heap
page read and write
C9E000
stack
page read and write
4621000
heap
page read and write
3D3F000
stack
page read and write
4621000
heap
page read and write
BFF000
unkown
page execute and read and write
4621000
heap
page read and write
DDF000
heap
page read and write
56CC000
stack
page read and write
426F000
stack
page read and write
4D80000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
190F000
stack
page read and write
4621000
heap
page read and write
15D4000
heap
page read and write
4771000
heap
page read and write
533E000
stack
page read and write
CEE000
stack
page read and write
28EE000
stack
page read and write
DDF000
heap
page read and write
64FC000
stack
page read and write
4621000
heap
page read and write
67C000
stack
page read and write
4771000
heap
page read and write
3FFE000
stack
page read and write
302E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
1780000
direct allocation
page read and write
5500000
direct allocation
page execute and read and write
2FEE000
stack
page read and write
4621000
heap
page read and write
4EF1000
heap
page read and write
291F000
stack
page read and write
4EB0000
heap
page read and write
E8D000
unkown
page execute and read and write
375E000
stack
page read and write
4621000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4621000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
34DE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
5380000
direct allocation
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
3D9E000
stack
page read and write
5550000
direct allocation
page execute and read and write
BFF000
unkown
page execute and read and write
30D000
unkown
page write copy
48BE000
stack
page read and write
DDF000
heap
page read and write
E96000
unkown
page execute and read and write
3BFF000
stack
page read and write
4621000
heap
page read and write
89B000
heap
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
4DBE000
stack
page read and write
55B0000
direct allocation
page execute and read and write
28F0000
direct allocation
page read and write
16DE000
heap
page read and write
5330000
direct allocation
page execute and read and write
4EE0000
direct allocation
page read and write
570000
unkown
page execute and read and write
2C1E000
stack
page read and write
4621000
heap
page read and write
4D11000
heap
page read and write
3C5D000
stack
page read and write
4621000
heap
page read and write
4771000
heap
page read and write
470E000
stack
page read and write
39BE000
stack
page read and write
4771000
heap
page read and write
4621000
heap
page read and write
5FE6000
heap
page read and write
586E000
stack
page read and write
4EBF000
stack
page read and write
6A7F000
stack
page read and write
558E000
stack
page read and write
4771000
heap
page read and write
3ADF000
stack
page read and write
B91000
unkown
page execute and write copy
4621000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4771000
heap
page read and write
4771000
heap
page read and write
412F000
stack
page read and write
451E000
stack
page read and write
4621000
heap
page read and write
1535000
heap
page read and write
383F000
stack
page read and write
5300000
direct allocation
page execute and read and write
DDF000
heap
page read and write
80BF000
heap
page read and write
1042000
unkown
page execute and read and write
663E000
stack
page read and write
1780000
direct allocation
page read and write
5FE5000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4771000
heap
page read and write
4771000
heap
page read and write
4620000
heap
page read and write
543F000
stack
page read and write
4621000
heap
page read and write
1530000
heap
page read and write
33AE000
stack
page read and write
180E000
stack
page read and write
DF5000
heap
page read and write
1780000
direct allocation
page read and write
4621000
heap
page read and write
51AF000
stack
page read and write
DFB000
heap
page read and write
5B4000
unkown
page execute and write copy
4621000
heap
page read and write
5590000
direct allocation
page execute and read and write
E8D000
unkown
page execute and read and write
3CCF000
stack
page read and write
5390000
direct allocation
page execute and read and write
4C7E000
stack
page read and write
4621000
heap
page read and write
E60000
unkown
page execute and read and write
29A0000
direct allocation
page read and write
612F000
stack
page read and write
2F9F000
stack
page read and write
3040000
heap
page read and write
4EF1000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4C90000
direct allocation
page execute and read and write
63B0000
heap
page read and write
There are 799 hidden memdumps, click here to show them.