IOC Report
FRCe39S0oE.exe

loading gifFilesProcessesURLsIPsMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
FRCe39S0oE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\PqFatgo[1].exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\10341500101\PqFatgo.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\Tasks\rapes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FRCe39S0oE.exe
"C:\Users\user\Desktop\FRCe39S0oE.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
"C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
malicious
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://176.113.115.6/Ni9kiput/index.php
176.113.115.6
http://176.113.115.7/files/2043702969/PqFatgo.exe
176.113.115.7

IPs

IP
Domain
Country
Malicious
176.113.115.6
unknown
Russian Federation
malicious
176.113.115.7
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
E91000
unkown
page execute and read and write
malicious
171000
unkown
page execute and read and write
malicious
4DE0000
direct allocation
page read and write
malicious
4E10000
direct allocation
page read and write
malicious
4960000
direct allocation
page read and write
malicious
4960000
direct allocation
page read and write
malicious
171000
unkown
page execute and read and write
malicious
B52000
heap
page read and write
B94000
heap
page read and write
3A9E000
stack
page read and write
28F0000
direct allocation
page read and write
61D000
unkown
page execute and read and write
4A60000
trusted library allocation
page read and write
44CF000
stack
page read and write
C1E000
stack
page read and write
284E000
stack
page read and write
5020000
direct allocation
page execute and read and write
B16000
heap
page read and write
4981000
heap
page read and write
824C000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
28F0000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
4961000
heap
page read and write
DAE000
stack
page read and write
28D0000
heap
page read and write
4F60000
direct allocation
page execute and read and write
341F000
stack
page read and write
31AF000
stack
page read and write
4961000
heap
page read and write
E30000
heap
page read and write
44D1000
heap
page read and write
4970000
direct allocation
page read and write
44D1000
heap
page read and write
AC1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
486E000
stack
page read and write
41EF000
stack
page read and write
44D1000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
4981000
heap
page read and write
4981000
heap
page read and write
4B50000
direct allocation
page execute and read and write
4981000
heap
page read and write
320F000
stack
page read and write
4960000
direct allocation
page read and write
4981000
heap
page read and write
3F5F000
stack
page read and write
2FCE000
stack
page read and write
B94000
heap
page read and write
28F0000
direct allocation
page read and write
5000000
direct allocation
page execute and read and write
B94000
heap
page read and write
C7A000
heap
page read and write
4F60000
direct allocation
page execute and read and write
3AAE000
stack
page read and write
4981000
heap
page read and write
35AE000
stack
page read and write
EF6000
unkown
page execute and read and write
34CE000
stack
page read and write
422E000
stack
page read and write
1DD000
unkown
page write copy
396E000
stack
page read and write
44D1000
heap
page read and write
43B000
unkown
page execute and read and write
4F1F000
stack
page read and write
A7E000
heap
page read and write
309E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
B3F000
heap
page read and write
B17000
heap
page read and write
40AF000
stack
page read and write
44D1000
heap
page read and write
A7A000
heap
page read and write
5000000
direct allocation
page execute and read and write
B94000
heap
page read and write
338E000
stack
page read and write
2D0F000
stack
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
4970000
direct allocation
page read and write
496F000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
1DD000
unkown
page write copy
4961000
heap
page read and write
37DF000
stack
page read and write
B3C000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
6230000
heap
page read and write
4981000
heap
page read and write
4F60000
direct allocation
page execute and read and write
7CA000
stack
page read and write
B10000
heap
page read and write
4981000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
310E000
stack
page read and write
44D1000
heap
page read and write
30AE000
stack
page read and write
1080000
unkown
page execute and read and write
44D1000
heap
page read and write
F60000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
43CE000
stack
page read and write
4981000
heap
page read and write
F60000
direct allocation
page read and write
4981000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
482000
unkown
page execute and write copy
305F000
stack
page read and write
44D1000
heap
page read and write
46DF000
stack
page read and write
4F60000
direct allocation
page execute and read and write
44D1000
heap
page read and write
2E2E000
stack
page read and write
36EE000
stack
page read and write
133D000
unkown
page execute and read and write
B94000
heap
page read and write
4990000
heap
page read and write
B94000
heap
page read and write
3CDF000
stack
page read and write
F60000
direct allocation
page read and write
AA5000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
171000
unkown
page execute and write copy
44D1000
heap
page read and write
B3F000
heap
page read and write
4970000
direct allocation
page read and write
400E000
stack
page read and write
838E000
stack
page read and write
4B90000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
49C5000
direct allocation
page read and write
4F40000
direct allocation
page execute and read and write
37EF000
stack
page read and write
B14000
heap
page read and write
6D70000
heap
page read and write
4960000
heap
page read and write
3D8E000
stack
page read and write
28F0000
direct allocation
page read and write
4981000
heap
page read and write
4DE0000
direct allocation
page read and write
469000
unkown
page execute and read and write
4981000
heap
page read and write
2D4E000
stack
page read and write
346E000
stack
page read and write
4981000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4981000
heap
page read and write
472E000
stack
page read and write
44D1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
41DF000
stack
page read and write
4981000
heap
page read and write
28F0000
direct allocation
page read and write
45EE000
stack
page read and write
44AE000
stack
page read and write
28F0000
direct allocation
page read and write
4981000
heap
page read and write
7BD000
stack
page read and write
B94000
heap
page read and write
EFF000
unkown
page execute and read and write
61F000
unkown
page execute and write copy
4FB0000
direct allocation
page execute and read and write
EFD000
unkown
page write copy
F60000
direct allocation
page read and write
4960000
direct allocation
page read and write
360000
unkown
page execute and read and write
4F90000
direct allocation
page execute and read and write
2900000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
483000
unkown
page execute and write copy
AD0000
heap
page read and write
359E000
stack
page read and write
64BF000
stack
page read and write
4970000
direct allocation
page read and write
F60000
direct allocation
page read and write
28CE000
stack
page read and write
44D1000
heap
page read and write
5010000
direct allocation
page execute and read and write
39CE000
stack
page read and write
B3B000
heap
page read and write
46EF000
stack
page read and write
2CDE000
stack
page read and write
F70000
heap
page read and write
28F0000
direct allocation
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
334F000
stack
page read and write
3BDE000
stack
page read and write
381E000
stack
page read and write
4B60000
direct allocation
page execute and read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
AEB000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
2A0F000
stack
page read and write
3E5E000
stack
page read and write
4970000
direct allocation
page read and write
B94000
heap
page read and write
3FAE000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
B94000
heap
page read and write
4960000
direct allocation
page read and write
B94000
heap
page read and write
170000
unkown
page readonly
2850000
direct allocation
page read and write
F60000
direct allocation
page read and write
3ACF000
stack
page read and write
4981000
heap
page read and write
2850000
direct allocation
page read and write
4981000
heap
page read and write
4F90000
direct allocation
page execute and read and write
3D1E000
stack
page read and write
61F000
unkown
page execute and write copy
4AC0000
direct allocation
page execute and read and write
ABD000
heap
page read and write
63BE000
stack
page read and write
2C9F000
stack
page read and write
1194000
unkown
page execute and read and write
F60000
direct allocation
page read and write
4981000
heap
page read and write
414E000
stack
page read and write
495F000
stack
page read and write
B26000
heap
page read and write
44D1000
heap
page read and write
40DE000
stack
page read and write
459F000
stack
page read and write
4981000
heap
page read and write
2850000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
4981000
heap
page read and write
4F60000
direct allocation
page execute and read and write
2F1F000
stack
page read and write
4E4E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
4FC0000
direct allocation
page execute and read and write
BC5000
heap
page read and write
49C5000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
4981000
heap
page read and write
3F6F000
stack
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
11A2000
unkown
page execute and read and write
11A2000
unkown
page execute and write copy
4981000
heap
page read and write
170000
unkown
page readonly
4E75000
direct allocation
page read and write
B94000
heap
page read and write
4981000
heap
page read and write
4970000
direct allocation
page read and write
3A5F000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
2F2F000
stack
page read and write
3D2E000
stack
page read and write
DEE000
stack
page read and write
61D000
unkown
page execute and read and write
1E0000
unkown
page execute and read and write
B17000
heap
page read and write
B17000
heap
page read and write
3E2F000
stack
page read and write
44D1000
heap
page read and write
374E000
stack
page read and write
4970000
direct allocation
page read and write
123F000
stack
page read and write
2F5E000
stack
page read and write
B3B000
heap
page read and write
3FCF000
stack
page read and write
44D1000
heap
page read and write
3CEF000
stack
page read and write
445F000
stack
page read and write
170000
unkown
page read and write
B2D000
heap
page read and write
44D1000
heap
page read and write
B10000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
5030000
direct allocation
page execute and read and write
B10000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
5040000
direct allocation
page execute and read and write
4981000
heap
page read and write
3B0E000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
3E8F000
stack
page read and write
E47000
heap
page read and write
AF8000
heap
page read and write
2C0F000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
471E000
stack
page read and write
64FE000
stack
page read and write
449E000
stack
page read and write
410F000
stack
page read and write
BCE000
stack
page read and write
28F0000
direct allocation
page read and write
2850000
direct allocation
page read and write
4981000
heap
page read and write
663E000
stack
page read and write
B94000
heap
page read and write
B52000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
C60000
heap
page read and write
4981000
heap
page read and write
B94000
heap
page read and write
44D1000
heap
page read and write
E2E000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
F3E000
stack
page read and write
28F0000
direct allocation
page read and write
4AE0000
direct allocation
page execute and read and write
2A97000
heap
page read and write
11A3000
unkown
page execute and write copy
B90000
heap
page read and write
4B20000
direct allocation
page execute and read and write
398F000
stack
page read and write
45D0000
trusted library allocation
page read and write
B94000
heap
page read and write
44D1000
heap
page read and write
6D7E000
heap
page read and write
2850000
direct allocation
page read and write
B52000
heap
page read and write
3D4F000
stack
page read and write
2A90000
heap
page read and write
2DDF000
stack
page read and write
4F60000
direct allocation
page execute and read and write
CAE000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
345E000
stack
page read and write
332E000
stack
page read and write
4981000
heap
page read and write
A30000
heap
page read and write
B3C000
heap
page read and write
4960000
direct allocation
page read and write
4A80000
trusted library allocation
page read and write
32EF000
stack
page read and write
170000
unkown
page readonly
44D1000
heap
page read and write
2B9F000
stack
page read and write
8700000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
B94000
heap
page read and write
3B9F000
stack
page read and write
AA0000
heap
page read and write
4981000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
43B000
unkown
page execute and read and write
4F70000
direct allocation
page execute and read and write
4981000
heap
page read and write
B3B000
heap
page read and write
50B0000
heap
page read and write
28F0000
direct allocation
page read and write
B94000
heap
page read and write
A70000
heap
page read and write
B94000
heap
page read and write
4981000
heap
page read and write
B94000
heap
page read and write
4F60000
heap
page read and write
395E000
stack
page read and write
331E000
stack
page read and write
2E1E000
stack
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
F50000
heap
page read and write
6D80000
heap
page read and write
4B30000
direct allocation
page execute and read and write
482000
unkown
page execute and read and write
F8C000
heap
page read and write
B39000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
F60000
direct allocation
page read and write
4981000
heap
page read and write
673F000
stack
page read and write
AB6000
heap
page read and write
1DD000
unkown
page write copy
485E000
stack
page read and write
E90000
unkown
page readonly
342F000
stack
page read and write
4970000
direct allocation
page read and write
4981000
heap
page read and write
B25000
heap
page read and write
A9E000
stack
page read and write
31DE000
stack
page read and write
370F000
stack
page read and write
116F000
stack
page read and write
2A60000
heap
page read and write
ACE000
heap
page read and write
C7E000
heap
page read and write
4981000
heap
page read and write
1DF000
unkown
page execute and read and write
4981000
heap
page read and write
1189000
unkown
page execute and read and write
3E1F000
stack
page read and write
4981000
heap
page read and write
B94000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
B14000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
3ECE000
stack
page read and write
2850000
direct allocation
page read and write
E8B000
stack
page read and write
4B80000
direct allocation
page execute and read and write
6D80000
heap
page read and write
F7A000
heap
page read and write
421E000
stack
page read and write
4981000
heap
page read and write
2F8F000
stack
page read and write
4961000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4970000
direct allocation
page read and write
C5E000
stack
page read and write
4981000
heap
page read and write
B94000
heap
page read and write
EFD000
unkown
page write copy
4970000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
BE0000
heap
page read and write
44D1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
2DEF000
stack
page read and write
4F4F000
stack
page read and write
848E000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
4F70000
direct allocation
page execute and read and write
360000
unkown
page execute and read and write
428E000
stack
page read and write
144F000
stack
page read and write
170000
unkown
page read and write
4961000
heap
page read and write
3C4E000
stack
page read and write
382E000
stack
page read and write
2A1E000
stack
page read and write
35CF000
stack
page read and write
85FB000
stack
page read and write
B3F000
heap
page read and write
4981000
heap
page read and write
36AF000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
ABB000
heap
page read and write
B94000
heap
page read and write
44D1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
B94000
heap
page read and write
B10000
heap
page read and write
355F000
stack
page read and write
4961000
heap
page read and write
44D1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
348F000
stack
page read and write
4981000
heap
page read and write
A40000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
B2D000
heap
page read and write
B3B000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
B3C000
heap
page read and write
482000
unkown
page execute and write copy
474000
unkown
page execute and read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
1DD000
unkown
page write copy
65FF000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
482000
unkown
page execute and read and write
B94000
heap
page read and write
E90000
unkown
page read and write
F60000
direct allocation
page read and write
28F0000
direct allocation
page read and write
36DE000
stack
page read and write
4F90000
direct allocation
page execute and read and write
6236000
heap
page read and write
4981000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
360E000
stack
page read and write
4970000
direct allocation
page read and write
44D1000
heap
page read and write
B94000
heap
page read and write
4F90000
direct allocation
page execute and read and write
324E000
stack
page read and write
44D1000
heap
page read and write
409F000
stack
page read and write
834C000
stack
page read and write
4961000
heap
page read and write
2850000
direct allocation
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4980000
heap
page read and write
1DF000
unkown
page execute and read and write
2850000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
4FA0000
direct allocation
page execute and read and write
1D6000
unkown
page execute and read and write
4E1E000
stack
page read and write
4F80000
direct allocation
page execute and read and write
30CF000
stack
page read and write
4981000
heap
page read and write
EFD000
stack
page read and write
44D1000
heap
page read and write
6750000
heap
page read and write
4981000
heap
page read and write
280F000
stack
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
424F000
stack
page read and write
4981000
heap
page read and write
B94000
heap
page read and write
4981000
heap
page read and write
431F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
8110000
heap
page read and write
AC3000
heap
page read and write
4981000
heap
page read and write
45DE000
stack
page read and write
E6F000
stack
page read and write
F60000
direct allocation
page read and write
AC4000
heap
page read and write
4981000
heap
page read and write
40EE000
stack
page read and write
44D1000
heap
page read and write
4E10000
direct allocation
page read and write
483000
unkown
page execute and write copy
4981000
heap
page read and write
44D1000
heap
page read and write
45AF000
stack
page read and write
4981000
heap
page read and write
1DD000
unkown
page write copy
115B000
unkown
page execute and read and write
2850000
direct allocation
page read and write
86FC000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
B3B000
heap
page read and write
4981000
heap
page read and write
133F000
unkown
page execute and write copy
4AE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
4981000
heap
page read and write
3C0F000
stack
page read and write
2907000
heap
page read and write
4981000
heap
page read and write
2CEF000
stack
page read and write
2F6E000
stack
page read and write
8718000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
3F9D000
stack
page read and write
432F000
stack
page read and write
4981000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
481F000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
474000
unkown
page execute and read and write
B10000
heap
page read and write
44D1000
heap
page read and write
AEF000
heap
page read and write
4981000
heap
page read and write
B14000
heap
page read and write
2850000
direct allocation
page read and write
469000
unkown
page execute and read and write
A30000
heap
page read and write
E91000
unkown
page execute and write copy
4981000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
3E6E000
stack
page read and write
306F000
stack
page read and write
4981000
heap
page read and write
28F0000
direct allocation
page read and write
F60000
direct allocation
page read and write
4AE0000
direct allocation
page execute and read and write
B14000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
6235000
heap
page read and write
2850000
direct allocation
page read and write
A20000
heap
page read and write
388E000
stack
page read and write
F60000
direct allocation
page read and write
32DF000
stack
page read and write
28F0000
direct allocation
page read and write
B94000
heap
page read and write
ABF000
heap
page read and write
B94000
heap
page read and write
4B70000
direct allocation
page execute and read and write
482F000
stack
page read and write
2A5E000
stack
page read and write
4981000
heap
page read and write
4B00000
direct allocation
page execute and read and write
369F000
stack
page read and write
B14000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
435E000
stack
page read and write
B3C000
stack
page read and write
44D1000
heap
page read and write
B94000
heap
page read and write
44D1000
heap
page read and write
AEE000
heap
page read and write
2E8E000
stack
page read and write
B94000
heap
page read and write
28F0000
direct allocation
page read and write
356F000
stack
page read and write
392F000
stack
page read and write
4A9F000
stack
page read and write
171000
unkown
page execute and write copy
44D1000
heap
page read and write
B94000
heap
page read and write
4970000
direct allocation
page read and write
446F000
stack
page read and write
B94000
heap
page read and write
391F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
BC0000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
44D0000
heap
page read and write
C70000
heap
page read and write
499E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
B94000
heap
page read and write
F60000
direct allocation
page read and write
3BEE000
stack
page read and write
44D1000
heap
page read and write
6CB000
stack
page read and write
4981000
heap
page read and write
4E45000
direct allocation
page read and write
45D0000
trusted library allocation
page read and write
BA0000
heap
page read and write
44D1000
heap
page read and write
B17000
heap
page read and write
2850000
direct allocation
page read and write
6D71000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
171000
unkown
page execute and write copy
B53000
heap
page read and write
44D1000
heap
page read and write
288E000
stack
page read and write
4981000
heap
page read and write
4DE0000
direct allocation
page read and write
AF0000
heap
page read and write
F60000
direct allocation
page read and write
4981000
heap
page read and write
4F30000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4981000
heap
page read and write
4F90000
direct allocation
page execute and read and write
871B000
heap
page read and write
B94000
heap
page read and write
4970000
direct allocation
page read and write
31EE000
stack
page read and write
8114000
heap
page read and write
5010000
direct allocation
page execute and read and write
B94000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
44D1000
heap
page read and write
4F60000
direct allocation
page execute and read and write
2E4F000
stack
page read and write
2B0F000
stack
page read and write
6BC000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
482000
unkown
page execute and write copy
4970000
direct allocation
page read and write
4F50000
direct allocation
page execute and read and write
1D6000
unkown
page execute and read and write
4AE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
50B4000
heap
page read and write
4981000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4981000
heap
page read and write
B94000
heap
page read and write
3BAF000
stack
page read and write
4F90000
direct allocation
page execute and read and write
3A6F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
438F000
stack
page read and write
4981000
heap
page read and write
44D1000
heap
page read and write
4981000
heap
page read and write
E40000
heap
page read and write
436E000
stack
page read and write
2850000
direct allocation
page read and write
2850000
direct allocation
page read and write
319F000
stack
page read and write
384F000
stack
page read and write
There are 720 hidden memdumps, click here to show them.