IOC Report
rwilsss.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
rwilsss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rwilsss.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\DBz1OY4KN
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rwilsss.exe
"C:\Users\user\Desktop\rwilsss.exe"
malicious
C:\Users\user\Desktop\rwilsss.exe
"C:\Users\user\Desktop\rwilsss.exe"
malicious
C:\Program Files (x86)\HMmyAJwmsdHStRLvkEUXapVqdJhAMrBqiJHYgTKOappQiUXvkZWEjRTRwDALj\956BZGpkmvZDS0Ds.exe
"C:\Program Files (x86)\HMmyAJwmsdHStRLvkEUXapVqdJhAMrBqiJHYgTKOappQiUXvkZWEjRTRwDALj\PsHAzHvUXGbhc.exe"
malicious
C:\Windows\SysWOW64\cipher.exe
"C:\Windows\SysWOW64\cipher.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.hellosweetie.net/e7k4/
104.166.91.35
malicious
http://www.link6-tesla-nd6.xyz/swvy/
172.64.80.1
malicious
http://www.link6-tesla-nd6.xyz/swvy/?fR=XmKRY/t03EXKotfV27rpDi4Y7n4N3D4pVt6OywdHmo1/t4zPfsyxQcTruN1gdpMmfgSMn23VTjbybs3ZENJsdIgpWTI6AOV1xHSAMA6v7RrhmW1TPsqc/lc=&qNfTm=It7h28
172.64.80.1
malicious
http://www.hellosweetie.net/e7k4/?fR=PCaq+8SJhdNev9S780c3MbnLxcb9xrw0LZhyuWsfCuz+E7fQV66LHSkbKMkqmntN/Wo7RToQsXo9VJ/le6MACc/ER0UdFwyMaQgiHOq8F/NNUaNt2b5IJfg=&qNfTm=It7h28
104.166.91.35
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.greyareaclothing.store/hnau/?qNfTm=It7h28&fR=ff1YCXiTWW4cronbiq9MGdiWlqGOzdA8w4Ki7N0QaK1i9QkYzKHUVEZHk15HQFwSEDwxmz8E4etY1UkfuJt9MSgwr7jqtLW+NVd7ppd4VdPtV/YghcXnRLg=
103.224.182.242
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://duckduckgo.com/?q=
unknown
http://www.fontbureau.com/designers?
unknown
http://www.greyareaclothing.store/hnau/?qNfTm=It7h28&fR=ff1YCXiTWW4cronbiq9MGdiWlqGOzdA8w4Ki7N0QaK1i
unknown
https://zz.bdstatic.com/linksubmit/push.js
unknown
http://www.tiro.com
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://push.zhanzhang.baidu.com/push.js
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
https://www.ecosia.org/newtab/v20
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.link6-tesla-nd6.xyz
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hellosweetie.net
104.166.91.35
malicious
www.link6-tesla-nd6.xyz
172.64.80.1
malicious
www.greyareaclothing.store
103.224.182.242
www.vaishnavi.xyz
unknown

IPs

IP
Domain
Country
Malicious
172.64.80.1
www.link6-tesla-nd6.xyz
United States
malicious
104.166.91.35
www.hellosweetie.net
United States
malicious
103.224.182.242
www.greyareaclothing.store
Australia

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
400000
remote allocation
page execute and read and write
malicious
6F0000
system
page execute and read and write
malicious
DB0000
trusted library allocation
page read and write
malicious
5910000
unclassified section
page execute and read and write
malicious
D60000
trusted library allocation
page read and write
malicious
2E70000
unkown
page execute and read and write
malicious
1880000
unclassified section
page execute and read and write
malicious
145F000
stack
page read and write
A7A000
heap
page read and write
EFC000
stack
page read and write
B61000
heap
page read and write
B8F000
unkown
page readonly
6276000
heap
page read and write
B1A000
heap
page read and write
148D000
heap
page read and write
4892000
heap
page read and write
816F000
stack
page read and write
B61000
heap
page read and write
FE5000
heap
page read and write
B61000
heap
page read and write
5A3C000
system
page read and write
B61000
heap
page read and write
B2D000
heap
page read and write
B61000
heap
page read and write
4AAE000
direct allocation
page execute and read and write
524B000
stack
page read and write
BEA000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
1FAEAFA0000
heap
page read and write
12F7000
stack
page read and write
128C000
system
page execute and read and write
B61000
heap
page read and write
791A000
heap
page read and write
56C6000
trusted library allocation
page read and write
A85000
heap
page read and write
B61000
heap
page read and write
3BF9000
unclassified section
page execute and read and write
B61000
heap
page read and write
5C60000
trusted library allocation
page read and write
1746000
direct allocation
page execute and read and write
116E000
heap
page read and write
B61000
heap
page read and write
1230000
system
page execute and read and write
16D0000
trusted library allocation
page read and write
B61000
heap
page read and write
5648000
unclassified section
page read and write
8D0000
heap
page read and write
4710000
trusted library allocation
page read and write
7ABC000
heap
page read and write
B99000
unkown
page readonly
B61000
heap
page read and write
B61000
heap
page read and write
1060000
heap
page read and write
16A0000
heap
page read and write
169F000
stack
page read and write
B61000
heap
page read and write
2B05C000
system
page read and write
4179000
trusted library allocation
page read and write
1FAECB03000
trusted library allocation
page read and write
B61000
heap
page read and write
4C52000
direct allocation
page execute and read and write
B61000
heap
page read and write
7A8B000
heap
page read and write
17C8000
direct allocation
page execute and read and write
F20000
unkown
page readonly
1100000
unkown
page read and write
7AAA000
heap
page read and write
F0A000
unkown
page readonly
58D0000
trusted library allocation
page read and write
B38000
heap
page read and write
4660000
trusted library allocation
page execute and read and write
83073FE000
stack
page read and write
B61000
heap
page read and write
5850000
trusted library allocation
page read and write
B61000
heap
page read and write
A8B000
heap
page read and write
45B0000
trusted library allocation
page read and write
B61000
heap
page read and write
2AD82000
system
page read and write
16F0000
trusted library allocation
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
105E000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
62A7000
heap
page read and write
10E0000
unkown
page readonly
1FAECB10000
trusted library allocation
page read and write
B61000
heap
page read and write
4F3C000
unclassified section
page read and write
B61000
heap
page read and write
2D7F000
stack
page read and write
1FAECB13000
trusted library allocation
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
16ED000
trusted library allocation
page execute and read and write
B33000
heap
page read and write
C70000
heap
page read and write
1FAEAFD3000
heap
page read and write
B61000
heap
page read and write
A10000
heap
page read and write
31C2000
trusted library allocation
page read and write
AF6000
heap
page read and write
5AA0000
heap
page read and write
58E0000
heap
page execute and read and write
1FAECCCE000
trusted library allocation
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
1282000
system
page execute and read and write
5CA0000
trusted library allocation
page read and write
B61000
heap
page read and write
58B0000
trusted library allocation
page read and write
B61000
heap
page read and write
BD0000
heap
page read and write
B99000
unkown
page readonly
1310000
heap
page read and write
B61000
heap
page read and write
489E000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
7FDF000
stack
page read and write
ACB000
heap
page read and write
10A0000
stack
page read and write
B61000
heap
page read and write
7B30000
trusted library section
page read and write
31BD000
trusted library allocation
page read and write
5762000
system
page read and write
135E000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
2BA4000
heap
page read and write
B20000
unkown
page readonly
AF1000
heap
page read and write
7A60000
heap
page read and write
2D80000
unkown
page readonly
B61000
heap
page read and write
BCE000
stack
page read and write
B61000
heap
page read and write
7902000
heap
page read and write
B25000
heap
page read and write
7AE0000
trusted library allocation
page execute and read and write
B61000
heap
page read and write
12A8000
system
page execute and read and write
31F9000
unclassified section
page execute and read and write
B61000
heap
page read and write
19D0000
trusted library allocation
page read and write
182E000
stack
page read and write
B61000
heap
page read and write
7ABE000
stack
page read and write
8F4000
heap
page read and write
F20000
unkown
page readonly
AD5000
heap
page read and write
B61000
heap
page read and write
77CE000
heap
page read and write
B61000
heap
page read and write
809E000
stack
page read and write
7C2E000
stack
page read and write
B61000
heap
page read and write
3381000
unkown
page execute and read and write
B61000
heap
page read and write
B80000
unkown
page readonly
B61000
heap
page read and write
AC6000
heap
page read and write
ADF000
heap
page read and write
6260000
heap
page read and write
174D000
direct allocation
page execute and read and write
B61000
heap
page read and write
56C1000
trusted library allocation
page read and write
B4A000
heap
page read and write
B61000
heap
page read and write
56BE000
trusted library allocation
page read and write
7AA5000
heap
page read and write
5178000
trusted library allocation
page read and write
136D000
stack
page read and write
B61000
heap
page read and write
67B000
stack
page read and write
1717000
trusted library allocation
page execute and read and write
1491000
heap
page read and write
83083FE000
stack
page read and write
B61000
heap
page read and write
113E000
heap
page read and write
1700000
trusted library allocation
page read and write
B61000
heap
page read and write
129C000
system
page execute and read and write
13AE000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
F30000
heap
page read and write
8F4000
heap
page read and write
B86E000
stack
page read and write
B80000
heap
page read and write
2B4E000
stack
page read and write
B61000
heap
page read and write
132F000
stack
page read and write
1418000
heap
page read and write
B61000
heap
page read and write
1416000
heap
page read and write
56F3000
heap
page read and write
F38000
heap
page read and write
B20000
unkown
page readonly
B30000
unkown
page readonly
7AA8000
heap
page read and write
1FAEAE41000
system
page execute and read and write
B61000
heap
page read and write
6148000
system
page read and write
E42000
unkown
page readonly
161E000
direct allocation
page execute and read and write
1330000
unkown
page readonly
13D0000
heap
page read and write
5C90000
heap
page read and write
B61000
heap
page read and write
7AB2000
heap
page read and write
B61000
heap
page read and write
6B8000
stack
page read and write
316E000
stack
page read and write
BAAE000
stack
page read and write
1FAECCA6000
trusted library allocation
page read and write
7A9E000
heap
page read and write
19E7000
heap
page read and write
1480000
direct allocation
page execute and read and write
B61000
heap
page read and write
B61000
heap
page read and write
A85000
heap
page read and write
56AB000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
4A3D000
direct allocation
page execute and read and write
B61000
heap
page read and write
1FAEAFD0000
heap
page read and write
ABA000
heap
page read and write
F30000
heap
page read and write
B61000
heap
page read and write
80DF000
stack
page read and write
56CD000
trusted library allocation
page read and write
7D2E000
stack
page read and write
A85000
heap
page read and write
F55000
heap
page read and write
54B6000
unclassified section
page read and write
7A7B000
heap
page read and write
10E0000
unkown
page readonly
B61000
heap
page read and write
7A81000
heap
page read and write
B3D000
heap
page read and write
B61000
heap
page read and write
A60000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
2AE9C000
system
page read and write
147E000
heap
page read and write
5A1C000
stack
page read and write
478D000
stack
page read and write
8306BFC000
stack
page read and write
B61000
heap
page read and write
EFC000
stack
page read and write
7370000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
1FAEADF0000
system
page execute and read and write
F30000
heap
page read and write
534D000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
2BA0000
heap
page read and write
B61000
heap
page read and write
4BDD000
direct allocation
page execute and read and write
56A4000
trusted library allocation
page read and write
1010000
unkown
page read and write
B61000
heap
page read and write
1706000
trusted library allocation
page execute and read and write
BEA000
stack
page read and write
1060000
heap
page read and write
58C0000
heap
page read and write
6279000
heap
page read and write
27F9000
unclassified section
page execute and read and write
73E2000
trusted library allocation
page read and write
1320000
heap
page read and write
2AE42000
system
page read and write
1830000
heap
page read and write
5FB6000
system
page read and write
4BE1000
direct allocation
page execute and read and write
2B444000
system
page read and write
1066000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
1702000
trusted library allocation
page read and write
1D91000
unclassified section
page execute and read and write
1485000
heap
page read and write
A81000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
306E000
stack
page read and write
1071000
unkown
page readonly
B80000
unkown
page readonly
13DA000
heap
page read and write
116C000
unkown
page read and write
B61000
heap
page read and write
1130000
heap
page read and write
5710000
trusted library allocation
page read and write
47CE000
stack
page read and write
77C0000
heap
page read and write
B61000
heap
page read and write
AD9000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
A85000
heap
page read and write
2C70000
heap
page read and write
1720000
heap
page read and write
B61000
heap
page read and write
4171000
trusted library allocation
page read and write
801E000
stack
page read and write
B61000
heap
page read and write
2BA4000
heap
page read and write
8308BFE000
stack
page read and write
5740000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
7F6C000
stack
page read and write
171B000
trusted library allocation
page execute and read and write
AD5000
heap
page read and write
2B0C000
stack
page read and write
B61000
heap
page read and write
1FAECC01000
trusted library allocation
page read and write
7A99000
heap
page read and write
1731000
direct allocation
page execute and read and write
B61000
heap
page read and write
B61000
heap
page read and write
4710000
trusted library allocation
page read and write
B61000
heap
page read and write
B9AE000
stack
page read and write
5C95000
heap
page read and write
113A000
heap
page read and write
B61000
heap
page read and write
10DE000
stack
page read and write
B61000
heap
page read and write
5870000
trusted library allocation
page execute and read and write
A85000
heap
page read and write
F00000
unkown
page readonly
7AB1000
heap
page read and write
7A86000
heap
page read and write
16E3000
trusted library allocation
page execute and read and write
1FAEC850000
trusted library allocation
page read and write
1FAEC9B0000
heap
page read and write
B61000
heap
page read and write
1FAEAFB0000
heap
page read and write
73BE000
stack
page read and write
1FAEAFAA000
heap
page read and write
805F000
stack
page read and write
7A93000
heap
page read and write
16C0000
unkown
page readonly
15AD000
direct allocation
page execute and read and write
B61000
heap
page read and write
1FAECA00000
trusted library allocation
page read and write
16E4000
trusted library allocation
page read and write
4896000
heap
page read and write
B61000
heap
page read and write
7AC0000
trusted library section
page read and write
B61000
heap
page read and write
7360000
trusted library allocation
page read and write
7D6E000
stack
page read and write
2B8E000
stack
page read and write
B61000
heap
page read and write
A10000
trusted library allocation
page read and write
1010000
unkown
page read and write
7DAE000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
56F0000
heap
page read and write
7AAD000
heap
page read and write
B61000
heap
page read and write
15A9000
direct allocation
page execute and read and write
5C50000
trusted library allocation
page read and write
485D000
stack
page read and write
47E9000
unkown
page execute and read and write
B61000
heap
page read and write
1FAEAFBD000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
4C62000
unclassified section
page read and write
16E0000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
45BC000
heap
page read and write
B61000
heap
page read and write
AEC000
heap
page read and write
1FAECCC4000
trusted library allocation
page read and write
4D22000
unclassified section
page read and write
5822000
system
page read and write
481C000
stack
page read and write
B81000
unkown
page execute read
5780000
heap
page read and write
A85000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
1FAECB21000
trusted library allocation
page read and write
B61000
heap
page read and write
5E24000
system
page read and write
56E0000
trusted library allocation
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
F10000
unkown
page readonly
1FAEAFD3000
heap
page read and write
770000
heap
page read and write
B96E000
stack
page read and write
12FF000
system
page execute and read and write
113E000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B07000
heap
page read and write
B61000
heap
page read and write
19E0000
heap
page read and write
B10000
unkown
page readonly
3010000
heap
page execute and read and write
1FAECB0E000
trusted library allocation
page read and write
A8A000
heap
page read and write
4769000
heap
page read and write
2BA0000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
1120000
heap
page read and write
3DE9000
unkown
page execute and read and write
5C70000
trusted library allocation
page execute and read and write
56A0000
trusted library allocation
page read and write
1100000
unkown
page read and write
AEC000
heap
page read and write
B61000
heap
page read and write
7BE0000
trusted library allocation
page execute and read and write
E40000
unkown
page readonly
1080000
unkown
page read and write
48D0000
heap
page read and write
33E9000
unkown
page execute and read and write
1FAEAEF0000
heap
page read and write
3020000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
13DE000
heap
page read and write
170A000
trusted library allocation
page execute and read and write
B61000
heap
page read and write
5720000
trusted library allocation
page read and write
B60000
heap
page read and write
B61000
heap
page read and write
F58000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
8F0000
heap
page read and write
2C70000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B96000
unkown
page read and write
7379000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
105E000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
3000000
trusted library allocation
page execute and read and write
B30000
unkown
page readonly
A7C000
heap
page read and write
1040000
heap
page read and write
B61000
heap
page read and write
58A0000
heap
page read and write
B61000
heap
page read and write
1159000
unkown
page read and write
B61000
heap
page read and write
1710000
trusted library allocation
page read and write
806F000
stack
page read and write
B61000
heap
page read and write
F9A000
stack
page read and write
78E0000
heap
page read and write
A7C000
heap
page read and write
1FAECCBE000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
B61000
heap
page read and write
FE0000
heap
page read and write
5324000
unclassified section
page read and write
B61000
heap
page read and write
17D0000
direct allocation
page read and write
B61000
heap
page read and write
4907000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
1FAECB00000
trusted library allocation
page read and write
C8B000
heap
page read and write
B61000
heap
page read and write
1169000
unkown
page read and write
1080000
unkown
page read and write
1FAEC850000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
1130000
heap
page read and write
A7A000
heap
page read and write
AD9000
heap
page read and write
B10000
unkown
page readonly
6270000
heap
page read and write
B61000
heap
page read and write
1330000
unkown
page readonly
B03000
heap
page read and write
1FAEAF20000
heap
page read and write
B61000
heap
page read and write
8307BFE000
stack
page read and write
B61000
heap
page read and write
57A2000
trusted library allocation
page read and write
B61000
heap
page read and write
1071000
unkown
page readonly
16FD000
trusted library allocation
page execute and read and write
B96000
unkown
page read and write
4910000
direct allocation
page execute and read and write
10B0000
stack
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
EFB000
stack
page read and write
1405000
heap
page read and write
51E9000
unkown
page execute and read and write
5890000
trusted library section
page readonly
B81000
unkown
page execute read
1158000
heap
page read and write
113A000
heap
page read and write
2D80000
unkown
page readonly
3171000
trusted library allocation
page read and write
A8B000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
F10000
unkown
page readonly
B8F000
unkown
page readonly
B61000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
F00000
unkown
page readonly
14B7000
heap
page read and write
B61000
heap
page read and write
B61000
heap
page read and write
16C1000
unkown
page readonly
8F4000
heap
page read and write
A67000
heap
page read and write
4A39000
direct allocation
page execute and read and write
5C4E000
stack
page read and write
2D7F000
stack
page read and write
4710000
trusted library allocation
page read and write
B1C000
stack
page read and write
B61000
heap
page read and write
1FAEAED0000
heap
page read and write
7A70000
heap
page read and write
B61000
heap
page read and write
4900000
trusted library allocation
page read and write
1712000
trusted library allocation
page read and write
5790000
trusted library allocation
page execute and read and write
1DF9000
unclassified section
page execute and read and write
57A0000
trusted library allocation
page read and write
1FAEAFCC000
heap
page read and write
1FAEC850000
trusted library allocation
page read and write
14BF000
heap
page read and write
ADF000
heap
page read and write
1FAEAE3D000
system
page execute and read and write
131F000
stack
page read and write
46DF000
heap
page read and write
B61000
heap
page read and write
B0D000
heap
page read and write
There are 555 hidden memdumps, click here to show them.