IOC Report
rPO2025KTI-1059.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
rPO2025KTI-1059.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\4F950583
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\aut36AB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\wainage
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rPO2025KTI-1059.exe
"C:\Users\user\Desktop\rPO2025KTI-1059.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\rPO2025KTI-1059.exe"
malicious
C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe
"C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\XjCOvb8A.exe"
malicious
C:\Windows\SysWOW64\sfc.exe
"C:\Windows\SysWOW64\sfc.exe"
malicious
C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe
"C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\YS2ARIjS4Cbv.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.hypend.xyz/tekh/?SPxhT=hn5X&bp3L7N0=z5gEihOGDB7WnuLTAQO9muKZThSiJ7F9a5OrXridUNi/TfNTZzeYN00B2pODk5SFuZ2ppKxBKG8kLwcZQB+wXl8A+kxFIWVn/epyP/VxgVdiOj9y8RN5pJo=
209.74.79.41
https://www.ecosia.org/newtab/v20
unknown
https://duckduckgo.com/ac/?q=
unknown
https://duckduckgo.com/?q=
unknown
http://www.hypend.xyz/tekh/
209.74.79.41
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ac.ecosia.org?q=
unknown
http://www.play-venom-rush.xyz/yt8q/?bp3L7N0=WRKjTn0dll6Qz3UyE21xyejj49mCaCQ97raCxfAySAXOx/ipnyZtE+tC+uiKhs02kc3wz6Sff6xAEylRtbwChhdQGjE6qMic59Cp4/1xZp7iacP8ILZzcp8=&SPxhT=hn5X
172.64.80.1
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://www.hlkjhu.online/8gml/?bp3L7N0=uagn24tKD9XwqPketrL8vPAAyfhmu7pATFdWjn4YGNyEFoo5H0iTa23WeYKqrGs+/MsKrZvXmlVRnmZA8Xnd/jKaPpngkZRqMSkJ9VYmBlbKsStinMnI1pA=&SPxhT=hn5X
52.223.13.41
https://www.google.com/images/branding/product/ico/googleg_alldph
unknown
http://www.play-venom-rush.xyz/yt8q/
172.64.80.1
http://www.hypend.xyz
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hlkjhu.online
52.223.13.41
www.play-venom-rush.xyz
172.64.80.1
www.hypend.xyz
209.74.79.41

IPs

IP
Domain
Country
Malicious
209.74.79.41
www.hypend.xyz
United States
52.223.13.41
www.hlkjhu.online
United States
172.64.80.1
www.play-venom-rush.xyz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2C20000
unkown
page execute and read and write
malicious
3230000
system
page execute and read and write
malicious
7FE0000
unclassified section
page execute and read and write
malicious
3FA0000
unclassified section
page execute and read and write
malicious
36E0000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
D90000
system
page execute and read and write
malicious
3730000
trusted library allocation
page read and write
malicious
1E9F000
stack
page read and write
35C1000
heap
page read and write
812E000
heap
page read and write
40B3000
direct allocation
page read and write
35C1000
heap
page read and write
7B0000
unkown
page readonly
35C1000
heap
page read and write
FB0000
unkown
page read and write
1749000
heap
page read and write
3377000
heap
page read and write
3D72000
unclassified section
page read and write
35C1000
heap
page read and write
C90000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
F50000
unkown
page readonly
4130000
direct allocation
page read and write
3413000
heap
page read and write
3F90000
direct allocation
page read and write
87BE000
stack
page read and write
8220000
trusted library allocation
page read and write
13CF000
stack
page read and write
1710000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
1381000
unkown
page readonly
3C40000
unkown
page execute and read and write
998000
unkown
page read and write
3D2D000
direct allocation
page execute and read and write
35C1000
heap
page read and write
1FA0000
heap
page read and write
3AFE000
direct allocation
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
AA0000
unkown
page readonly
35C0000
heap
page read and write
14D0000
heap
page read and write
891F000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
8141000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
174A000
heap
page read and write
3413000
heap
page read and write
35C1000
heap
page read and write
361B000
heap
page read and write
25202F81000
system
page execute and read and write
35C1000
heap
page read and write
40B3000
direct allocation
page read and write
7F2000
unkown
page write copy
F4E000
stack
page read and write
42CE000
direct allocation
page read and write
77A000
stack
page read and write
35C1000
heap
page read and write
E1B000
system
page execute and read and write
F80000
unkown
page read and write
35C1000
heap
page read and write
3ED1000
direct allocation
page execute and read and write
3605000
heap
page read and write
FD9000
unkown
page readonly
3313000
heap
page read and write
35C1000
heap
page read and write
1724000
heap
page read and write
4259000
direct allocation
page read and write
35C1000
heap
page read and write
3332000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
33DF000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
700000
unkown
page readonly
FF0000
unkown
page readonly
32D0000
heap
page read and write
35C1000
heap
page read and write
3C40000
heap
page read and write
4374000
unclassified section
page read and write
425D000
direct allocation
page read and write
4130000
direct allocation
page read and write
3302000
heap
page read and write
35C1000
heap
page read and write
335D000
heap
page read and write
2B20000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
170A000
heap
page read and write
3413000
heap
page read and write
10BA000
heap
page read and write
EFC000
stack
page read and write
FC1000
unkown
page execute read
35C1000
heap
page read and write
3A00000
heap
page read and write
16FB000
heap
page read and write
25204ECE000
trusted library allocation
page read and write
3ECD000
direct allocation
page execute and read and write
35C1000
heap
page read and write
8148000
heap
page read and write
FCF000
unkown
page readonly
33C0000
direct allocation
page read and write
FCF000
unkown
page readonly
B0A000
stack
page read and write
35C1000
heap
page read and write
2F72000
system
page read and write
4259000
direct allocation
page read and write
25202F84000
system
page execute and read and write
33B0000
heap
page read and write
32B4000
heap
page read and write
842F000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
252030C0000
heap
page read and write
35C1000
heap
page read and write
4130000
direct allocation
page read and write
16DB000
heap
page read and write
3362000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
731000
unkown
page execute read
3400000
heap
page read and write
35C1000
heap
page read and write
252030F0000
heap
page read and write
339C000
heap
page read and write
FD9000
unkown
page readonly
3D29000
direct allocation
page execute and read and write
3304000
heap
page read and write
35CF000
heap
page read and write
3304000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
40B3000
direct allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
FC0000
unkown
page readonly
3200000
heap
page read and write
335D000
heap
page read and write
C50000
unkown
page read and write
330D000
heap
page read and write
690E000
stack
page read and write
28BE000
stack
page read and write
33C5000
heap
page read and write
FD6000
unkown
page read and write
35C1000
heap
page read and write
4259000
direct allocation
page read and write
3574000
system
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
3313000
heap
page read and write
3624000
heap
page read and write
35C1000
heap
page read and write
BF6000
heap
page read and write
4259000
direct allocation
page read and write
8172000
heap
page read and write
36C0000
heap
page read and write
AFC000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
3402000
heap
page read and write
2BFC000
unkown
page read and write
3B9E000
heap
page read and write
B90000
unkown
page read and write
33C0000
direct allocation
page read and write
13DB000
stack
page read and write
3B2D000
heap
page read and write
2790000
unkown
page readonly
63C0000
unclassified section
page execute and read and write
13BF000
stack
page read and write
10B0000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
3413000
heap
page read and write
7D0000
unkown
page readonly
35C1000
heap
page read and write
1FD0000
direct allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
2FF8000
stack
page read and write
1828000
heap
page read and write
A80000
unkown
page readonly
C9E000
heap
page read and write
A90000
unkown
page readonly
3250000
heap
page read and write
3600000
heap
page read and write
6650000
trusted library allocation
page read and write
4130000
direct allocation
page read and write
2BFC000
unkown
page read and write
3F8C000
unclassified section
page read and write
425D000
direct allocation
page read and write
B60000
unkown
page readonly
3413000
heap
page read and write
14E0000
heap
page read and write
3413000
heap
page read and write
59AF000
stack
page read and write
7F0000
unkown
page read and write
40B3000
direct allocation
page read and write
35C1000
heap
page read and write
3413000
heap
page read and write
35C1000
heap
page read and write
32C0000
heap
page read and write
3D9E000
direct allocation
page execute and read and write
3399000
heap
page read and write
33D5000
heap
page read and write
730000
unkown
page readonly
35C1000
heap
page read and write
3370000
heap
page read and write
7E0000
heap
page read and write
35C1000
heap
page read and write
425D000
direct allocation
page read and write
35C1000
heap
page read and write
16FB000
heap
page read and write
1749000
heap
page read and write
3176000
unkown
page read and write
33BE000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
2C14000
heap
page read and write
2790000
unkown
page readonly
35C1000
heap
page read and write
4640000
unkown
page execute and read and write
10BA000
heap
page read and write
3389000
heap
page read and write
35C1000
heap
page read and write
3605000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
FB0000
unkown
page read and write
FCF000
unkown
page readonly
3612000
heap
page read and write
35C1000
heap
page read and write
28D0000
heap
page read and write
3850000
trusted library allocation
page execute and read and write
2910000
heap
page read and write
3F90000
direct allocation
page read and write
35C1000
heap
page read and write
E8D000
system
page execute and read and write
2F8C000
stack
page read and write
252030CA000
heap
page read and write
35C1000
heap
page read and write
10BE000
heap
page read and write
25204B20000
heap
page read and write
7F7000
unkown
page readonly
7E4000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
2FCC000
system
page read and write
3DCC000
unclassified section
page read and write
3F90000
direct allocation
page read and write
BE1000
unkown
page readonly
4130000
direct allocation
page read and write
35C1000
heap
page read and write
87FF000
stack
page read and write
35C1000
heap
page read and write
252030F3000
heap
page read and write
F50000
unkown
page readonly
7F0000
unkown
page read and write
1749000
heap
page read and write
3F42000
direct allocation
page execute and read and write
3617000
heap
page read and write
35C1000
heap
page read and write
3C31000
direct allocation
page execute and read and write
3384000
heap
page read and write
FD6000
unkown
page read and write
815E000
heap
page read and write
3C44000
heap
page read and write
16FC000
heap
page read and write
3413000
heap
page read and write
338E000
heap
page read and write
3377000
heap
page read and write
35C1000
heap
page read and write
A90000
unkown
page readonly
35C1000
heap
page read and write
7C0000
unkown
page readonly
33C0000
direct allocation
page read and write
35C1000
heap
page read and write
38FF000
stack
page read and write
7D0000
unkown
page readonly
83AD000
stack
page read and write
394C000
heap
page read and write
35C1000
heap
page read and write
FC1000
unkown
page execute read
35C1000
heap
page read and write
318C000
system
page read and write
25204D00000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
7BF000
unkown
page readonly
330D000
heap
page read and write
E2B000
system
page execute and read and write
35C1000
heap
page read and write
36C0000
trusted library allocation
page read and write
C9A000
heap
page read and write
35C1000
heap
page read and write
361A000
heap
page read and write
3340000
direct allocation
page read and write
FD6000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
E12000
system
page execute and read and write
814E000
heap
page read and write
35C1000
heap
page read and write
3413000
heap
page read and write
170A000
heap
page read and write
35C1000
heap
page read and write
5040000
unkown
page execute and read and write
10E8000
heap
page read and write
35C1000
heap
page read and write
42CE000
direct allocation
page read and write
38DB000
heap
page read and write
35C1000
heap
page read and write
F8E000
stack
page read and write
730000
unkown
page readonly
35C1000
heap
page read and write
25204C00000
trusted library allocation
page read and write
42CE000
direct allocation
page read and write
7EE000
unkown
page read and write
B50000
heap
page read and write
F70000
heap
page read and write
586F000
stack
page read and write
40B3000
direct allocation
page read and write
88DE000
stack
page read and write
A80000
unkown
page readonly
3B29000
heap
page read and write
B50000
heap
page read and write
6F0000
unkown
page readonly
35C1000
heap
page read and write
336D000
heap
page read and write
35C1000
heap
page read and write
37AE000
heap
page read and write
35C1000
heap
page read and write
2A3C000
unkown
page read and write
35C1000
heap
page read and write
3CA2000
direct allocation
page execute and read and write
45C0000
unclassified section
page execute and read and write
35C1000
heap
page read and write
2C10000
heap
page read and write
4FC0000
unclassified section
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
700000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
38D7000
heap
page read and write
25203040000
heap
page read and write
35C1000
heap
page read and write
3A89000
direct allocation
page execute and read and write
35C1000
heap
page read and write
32B4000
heap
page read and write
BD1000
unkown
page readonly
E37000
system
page execute and read and write
336D000
heap
page read and write
3413000
heap
page read and write
35C1000
heap
page read and write
28D4000
heap
page read and write
330D000
heap
page read and write
33CB000
heap
page read and write
7E0000
heap
page read and write
FC1000
unkown
page execute read
8159000
heap
page read and write
32B4000
heap
page read and write
3413000
heap
page read and write
3220000
heap
page read and write
8169000
heap
page read and write
35C1000
heap
page read and write
16D4000
heap
page read and write
816E000
heap
page read and write
FD6000
unkown
page read and write
35C1000
heap
page read and write
816B000
heap
page read and write
3900000
trusted library allocation
page read and write
35C1000
heap
page read and write
59C0000
unclassified section
page execute and read and write
35C1000
heap
page read and write
3CB2000
unclassified section
page read and write
3413000
heap
page read and write
35C1000
heap
page read and write
25203020000
heap
page read and write
FC0000
unkown
page readonly
BE1000
unkown
page readonly
FC0000
unkown
page readonly
3370000
heap
page read and write
16EB000
heap
page read and write
B70000
unkown
page readonly
425D000
direct allocation
page read and write
42CE000
direct allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
EE05DFE000
stack
page read and write
2FBB000
stack
page read and write
35C1000
heap
page read and write
3302000
heap
page read and write
1380000
unkown
page readonly
BF0000
unkown
page read and write
35C1000
heap
page read and write
1749000
heap
page read and write
35C1000
heap
page read and write
353E000
stack
page read and write
1EDE000
stack
page read and write
35C1000
heap
page read and write
33CF000
heap
page read and write
35C1000
heap
page read and write
2EB2000
system
page read and write
35C1000
heap
page read and write
3701000
heap
page read and write
35C1000
heap
page read and write
6F0000
unkown
page readonly
992000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
3309000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
2FE4000
unkown
page read and write
35C1000
heap
page read and write
25204E01000
trusted library allocation
page read and write
25204EAE000
trusted library allocation
page read and write
887F000
stack
page read and write
425D000
direct allocation
page read and write
883E000
stack
page read and write
3413000
heap
page read and write
35C1000
heap
page read and write
2050000
heap
page read and write
2922000
unkown
page read and write
35C1000
heap
page read and write
425D000
direct allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
EE065FE000
stack
page read and write
3384000
heap
page read and write
BD1000
unkown
page readonly
3F90000
direct allocation
page read and write
C3E000
unkown
page read and write
35C1000
heap
page read and write
8430000
heap
page read and write
EE04DFC000
stack
page read and write
10B0000
heap
page read and write
35C1000
heap
page read and write
77A000
stack
page read and write
1769000
heap
page read and write
16A0000
heap
page read and write
25203070000
heap
page read and write
3617000
heap
page read and write
4557000
unclassified section
page execute and read and write
16F9000
heap
page read and write
BF0000
heap
page read and write
330D000
heap
page read and write
1380000
unkown
page readonly
35C1000
heap
page read and write
3C00000
direct allocation
page execute and read and write
35C1000
heap
page read and write
1711000
unkown
page readonly
35C1000
heap
page read and write
4130000
direct allocation
page read and write
35C1000
heap
page read and write
252030DC000
heap
page read and write
35C1000
heap
page read and write
16A8000
heap
page read and write
8230000
trusted library allocation
page read and write
B80000
heap
page read and write
32B0000
heap
page read and write
35C1000
heap
page read and write
F90000
unkown
page readonly
335E000
heap
page read and write
E10000
system
page execute and read and write
3413000
heap
page read and write
3F50000
direct allocation
page read and write
25204D03000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
B90000
unkown
page read and write
3320000
heap
page read and write
FF0000
unkown
page readonly
B40000
unkown
page readonly
C9A000
heap
page read and write
35C1000
heap
page read and write
25204D15000
trusted library allocation
page read and write
7F7000
unkown
page readonly
25204D0F000
trusted library allocation
page read and write
330D000
heap
page read and write
42CE000
direct allocation
page read and write
35C1000
heap
page read and write
AA0000
unkown
page readonly
8146000
heap
page read and write
3413000
heap
page read and write
3790000
heap
page read and write
35C1000
heap
page read and write
836C000
stack
page read and write
7C0000
unkown
page readonly
16C3000
heap
page read and write
2C10000
heap
page read and write
35C1000
heap
page read and write
3F90000
direct allocation
page read and write
522C000
stack
page read and write
35C1000
heap
page read and write
DB0000
heap
page read and write
512F000
unkown
page read and write
3413000
heap
page read and write
16D2000
heap
page read and write
B70000
unkown
page readonly
35C1000
heap
page read and write
2B20000
unkown
page readonly
7EE000
unkown
page write copy
35C1000
heap
page read and write
16FB000
heap
page read and write
170A000
heap
page read and write
BF0000
unkown
page read and write
3F90000
direct allocation
page read and write
532F000
stack
page read and write
710000
unkown
page readonly
813C000
heap
page read and write
35C1000
heap
page read and write
F0C000
stack
page read and write
35C1000
heap
page read and write
83EE000
stack
page read and write
29E2000
unkown
page read and write
28D0000
heap
page read and write
694E000
stack
page read and write
35C1000
heap
page read and write
3800000
heap
page read and write
13FD000
stack
page read and write
35C1000
heap
page read and write
7B0000
unkown
page readonly
EFC000
stack
page read and write
B60000
unkown
page readonly
35C1000
heap
page read and write
C9E000
heap
page read and write
8172000
heap
page read and write
D4A000
stack
page read and write
35C1000
heap
page read and write
33BB000
heap
page read and write
7BF000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
362E000
heap
page read and write
28D4000
heap
page read and write
7E4000
unkown
page readonly
252030EC000
heap
page read and write
3900000
trusted library allocation
page read and write
35C1000
heap
page read and write
B40000
unkown
page readonly
35C1000
heap
page read and write
AFC000
stack
page read and write
16EB000
heap
page read and write
EE055FD000
stack
page read and write
817C000
heap
page read and write
16DB000
heap
page read and write
2C14000
heap
page read and write
37A0000
trusted library allocation
page read and write
1380000
unkown
page readonly
31D7000
unkown
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
25204970000
trusted library allocation
page read and write
B0A000
stack
page read and write
2910000
heap
page read and write
35C1000
heap
page read and write
3900000
trusted library allocation
page read and write
BE0000
unkown
page read and write
FCF000
unkown
page readonly
25204EC4000
trusted library allocation
page read and write
35C1000
heap
page read and write
3330000
heap
page read and write
170B000
heap
page read and write
36F2000
heap
page read and write
10BE000
heap
page read and write
35C1000
heap
page read and write
25202F20000
system
page execute and read and write
35C1000
heap
page read and write
FC0000
unkown
page readonly
8165000
heap
page read and write
35C1000
heap
page read and write
32F0000
heap
page read and write
25204970000
trusted library allocation
page read and write
F70000
heap
page read and write
25204970000
trusted library allocation
page read and write
362E000
heap
page read and write
B80000
heap
page read and write
3960000
direct allocation
page execute and read and write
35C1000
heap
page read and write
25204EBE000
trusted library allocation
page read and write
FD9000
unkown
page readonly
35C1000
heap
page read and write
FC1000
unkown
page execute read
3619000
heap
page read and write
35C1000
heap
page read and write
16EB000
heap
page read and write
357E000
stack
page read and write
35C1000
heap
page read and write
35BE000
stack
page read and write
C90000
heap
page read and write
3923000
heap
page read and write
2922000
unkown
page read and write
32F8000
heap
page read and write
4259000
direct allocation
page read and write
25204D21000
trusted library allocation
page read and write
4506000
unclassified section
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
710000
unkown
page readonly
576F000
stack
page read and write
8153000
heap
page read and write
16D2000
heap
page read and write
3A6F000
stack
page read and write
35C1000
heap
page read and write
4259000
direct allocation
page read and write
BE0000
unkown
page read and write
CB9000
heap
page read and write
3240000
unkown
page execute and read and write
35C1000
heap
page read and write
FD9000
unkown
page readonly
814B000
heap
page read and write
42CE000
direct allocation
page read and write
39FE000
stack
page read and write
1FC0000
direct allocation
page execute and read and write
17D8000
heap
page read and write
BF0000
heap
page read and write
33A3000
heap
page read and write
34FE000
stack
page read and write
35C1000
heap
page read and write
3A01000
heap
page read and write
35C1000
heap
page read and write
3C2D000
direct allocation
page execute and read and write
35C1000
heap
page read and write
DFE000
stack
page read and write
40B3000
direct allocation
page read and write
58AE000
stack
page read and write
35C1000
heap
page read and write
2FCB000
stack
page read and write
F80000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
F90000
unkown
page readonly
337E000
stack
page read and write
35C1000
heap
page read and write
C60000
unkown
page read and write
731000
unkown
page execute read
35C1000
heap
page read and write
8130000
heap
page read and write
3A8D000
direct allocation
page execute and read and write
330D000
heap
page read and write
35C1000
heap
page read and write
There are 656 hidden memdumps, click here to show them.