IOC Report
packing list G25469.exe

loading gif

Files

File Path
Type
Category
Malicious
packing list G25469.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autB244.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\phagocytosed
data
dropped
C:\Users\user\AppData\Local\Temp\tCJ05791
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\packing list G25469.exe
"C:\Users\user\Desktop\packing list G25469.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\packing list G25469.exe"
malicious
C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
"C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe"
malicious
C:\Windows\SysWOW64\sort.exe
"C:\Windows\SysWOW64\sort.exe"
malicious
C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
"C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.reglagrisi.xyz/0zz8/
85.159.66.93
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.pemedee.shop/34mw/?66yHIJy0=lV2cRmnx0FXilEhPfZpPq92dnG52j/QoqXjGTFXGCyRw3OEGJ+HF1fmQ5H3Wo7ce76AoiMuOhG4wkWS+FEimc0ozfubLJga7WYw3/1RzG4ZgP834S4sDnL3IAG89uzHPig==&kb0=y00p-fqpV0lDx
3.33.130.190
http://www.reglagrisi.xyz/0zz8/?66yHIJy0=7cEP14LQRsmKYf0RxKlrVIQIxmtU9D+RldOl4BCMwEJUAVNxY1goksq2QoLfI57UCvTcV6taODognwi8704pJ4gcp3yiRXYMqiAP6sz3W4747Aq9y3ZRdxST32LjlURtCA==&kb0=y00p-fqpV0lDx
85.159.66.93
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.zripidro-priek.sbs/z4gi/?66yHIJy0=tobef8QUjNtUGsCsZYmGO1WvWH56aIAOgrSm2aMJLZ6iUqk1KnrnzENErAzxTvM0Kt9VGCxiYM8pqeYnhdhOa5dKpcotDhPK6/abxg2wjtQ4wVR0RbZFA0B3ye13cpOI8A==&kb0=y00p-fqpV0lDx
104.21.49.253
http://www.zripidro-priek.sbs
unknown
http://www.cognetix.website/qttd/
209.74.64.59
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.cognetix.website/qttd/?66yHIJy0=ZvCBpOBACo8OAP3s1LOntf8DB/mM6FnXsWNgstfKSYdbGQSfJ8wq0qnRN0l90UAeuSPeR5WzZqkUYpE1Yg3SfGIW8QzsnQZV+EE7c+vVMu1pn444qRf10NViSNzmoeqFEg==&kb0=y00p-fqpV0lDx
209.74.64.59
http://www.doodmuhendislik.online/gvzn/
85.159.66.93
https://www.ecosia.org/newtab/
unknown
http://www.zripidro-priek.sbs/z4gi/
104.21.49.253
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.doodmuhendislik.online/gvzn/?66yHIJy0=o7KupOcAdWG3nNYrbq63Y8DzVnVB0qlwhMl7Hzztm2YkQ+XZ5fWrExX6f74/Q+gqqRwMkXMPRKrB5xjKrizfc0njWqGlsy1S02QFwmKvno45o6r8NJKsDvPhV7F8JiCX6A==&kb0=y00p-fqpV0lDx
85.159.66.93
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.reglagrisi.xyz
unknown
malicious
www.zripidro-priek.sbs
104.21.49.253
www.cognetix.website
209.74.64.59
pemedee.shop
3.33.130.190
natroredirect.natrocdn.com
85.159.66.93
www.pemedee.shop
unknown
www.doodmuhendislik.online
unknown

IPs

IP
Domain
Country
Malicious
209.74.64.59
www.cognetix.website
United States
104.21.49.253
www.zripidro-priek.sbs
United States
3.33.130.190
pemedee.shop
United States
85.159.66.93
natroredirect.natrocdn.com
Turkey

Memdumps

Base Address
Regiontype
Protect
Malicious
5000000
unkown
page execute and read and write
malicious
5E00000
unclassified section
page execute and read and write
malicious
53D0000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
2910000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
3C50000
unclassified section
page execute and read and write
malicious
28C0000
trusted library allocation
page read and write
malicious
27A1000
heap
page read and write
2CB0000
heap
page read and write
4A00000
unclassified section
page execute and read and write
74E5000
heap
page read and write
7558000
heap
page read and write
3A9E000
direct allocation
page execute and read and write
11E1000
heap
page read and write
3110000
unkown
page readonly
325C000
unclassified section
page read and write
3A29000
direct allocation
page execute and read and write
BF4000
unkown
page readonly
7531000
heap
page read and write
705B000
unclassified section
page execute and read and write
BFD000
stack
page read and write
2F60000
direct allocation
page read and write
2AE0000
heap
page read and write
27A1000
heap
page read and write
807000
unkown
page readonly
576000
heap
page read and write
5AD000
stack
page read and write
3ADD000
direct allocation
page read and write
27A1000
heap
page read and write
2F40000
heap
page read and write
2F9E000
stack
page read and write
560000
heap
page read and write
24AE4FBE000
trusted library allocation
page read and write
FE0000
unkown
page readonly
642000
heap
page read and write
27A1000
heap
page read and write
3AD9000
direct allocation
page read and write
550000
heap
page read and write
27A1000
heap
page read and write
2DCE000
direct allocation
page execute and read and write
13C0000
unkown
page readonly
1561000
unkown
page readonly
DD8000
unkown
page read and write
1561000
unkown
page readonly
3516000
unkown
page read and write
7FE000
unkown
page readonly
56DF000
stack
page read and write
382D000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
5429000
system
page execute and read and write
27A1000
heap
page read and write
1200000
unkown
page readonly
24AE4F00000
trusted library allocation
page read and write
5BE000
heap
page read and write
13A0000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
2BF0000
unkown
page read and write
27A1000
heap
page read and write
2CB4000
heap
page read and write
12D2000
heap
page read and write
3013000
heap
page read and write
27A1000
heap
page read and write
1348000
heap
page read and write
56D000
heap
page read and write
27A1000
heap
page read and write
FF0000
unkown
page readonly
3AFA000
unclassified section
page read and write
13D0000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
24AE4CC0000
trusted library allocation
page read and write
AFA000
stack
page read and write
3213000
heap
page read and write
27A1000
heap
page read and write
3013000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
2CC2000
unkown
page read and write
27A1000
heap
page read and write
7410000
trusted library allocation
page read and write
F8E000
stack
page read and write
60A000
heap
page read and write
3810000
direct allocation
page read and write
2F50000
heap
page read and write
5EE000
stack
page read and write
27A1000
heap
page read and write
7A5B000
unclassified section
page execute and read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
BEF000
unkown
page write copy
27A1000
heap
page read and write
198000
stack
page read and write
571000
heap
page read and write
1116000
heap
page read and write
27A1000
heap
page read and write
2C4C000
unkown
page read and write
27A1000
heap
page read and write
2FD0000
heap
page read and write
28B0000
heap
page read and write
5CF000
heap
page read and write
3933000
direct allocation
page read and write
74E2000
heap
page read and write
2FDE000
stack
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
7B8F000
stack
page read and write
3013000
heap
page read and write
BEA000
unkown
page read and write
3AD9000
direct allocation
page read and write
2AB0000
unkown
page readonly
28C0000
trusted library allocation
page read and write
DDB000
unkown
page read and write
24AE33D0000
heap
page read and write
2EFD000
direct allocation
page execute and read and write
3002000
heap
page read and write
7410000
heap
page read and write
807000
unkown
page readonly
102F000
stack
page read and write
FA1000
unkown
page readonly
27A1000
heap
page read and write
637000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
3933000
direct allocation
page read and write
27A1000
heap
page read and write
1212000
heap
page read and write
2D59000
direct allocation
page execute and read and write
27A1000
heap
page read and write
74E8000
heap
page read and write
27A1000
heap
page read and write
7539000
heap
page read and write
27A1000
heap
page read and write
E50000
unkown
page readonly
74D1000
heap
page read and write
24AE3442000
heap
page read and write
3ADD000
direct allocation
page read and write
3013000
heap
page read and write
571000
heap
page read and write
5DC000
heap
page read and write
27A1000
heap
page read and write
2A10000
trusted library allocation
page execute and read and write
5DC000
heap
page read and write
24AE3380000
heap
page read and write
24AE4E00000
trusted library allocation
page read and write
39B0000
direct allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
3AD9000
direct allocation
page read and write
29AE000
stack
page read and write
5400000
unclassified section
page execute and read and write
2AD0000
unkown
page read and write
134B000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
2AAF000
stack
page read and write
3205000
heap
page read and write
27A1000
heap
page read and write
3013000
heap
page read and write
2AF0000
unkown
page readonly
141E000
stack
page read and write
E66000
heap
page read and write
27A1000
heap
page read and write
3BD1000
direct allocation
page execute and read and write
3301000
heap
page read and write
A80000
unkown
page readonly
74F4000
heap
page read and write
12B0000
heap
page read and write
6C5B000
unkown
page execute and read and write
3810000
direct allocation
page read and write
5CF000
heap
page read and write
2C8E000
stack
page read and write
FB0000
unkown
page read and write
3013000
heap
page read and write
27A1000
heap
page read and write
56B000
heap
page read and write
309C000
unclassified section
page read and write
618000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
383A000
unkown
page read and write
7555000
heap
page read and write
BDE000
unkown
page readonly
3224000
heap
page read and write
7A0F000
stack
page read and write
3013000
heap
page read and write
7512000
heap
page read and write
7FE000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
3042000
unclassified section
page read and write
27A1000
heap
page read and write
BEA000
unkown
page write copy
5D9000
heap
page read and write
805000
unkown
page read and write
2BA5000
heap
page read and write
321B000
heap
page read and write
39B0000
direct allocation
page read and write
27A1000
heap
page read and write
618000
heap
page read and write
35CF000
stack
page read and write
FD0000
heap
page read and write
1DD0000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
39B0000
direct allocation
page read and write
65C000
heap
page read and write
5E3000
heap
page read and write
27A1000
heap
page read and write
2AD0000
unkown
page read and write
27A1000
heap
page read and write
3013000
heap
page read and write
27A1000
heap
page read and write
450000
heap
page read and write
751D000
heap
page read and write
3720000
direct allocation
page read and write
3810000
direct allocation
page read and write
7FE000
unkown
page readonly
2B7E000
stack
page read and write
27A1000
heap
page read and write
FD8000
heap
page read and write
624000
heap
page read and write
24AE32D1000
system
page execute and read and write
27A1000
heap
page read and write
110D000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
1440000
unkown
page read and write
5439000
system
page execute and read and write
2AE0000
heap
page read and write
39B0000
direct allocation
page read and write
1CCE000
stack
page read and write
3720000
direct allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
637000
heap
page read and write
2D5D000
direct allocation
page execute and read and write
1348000
heap
page read and write
FA1000
unkown
page readonly
2F72000
direct allocation
page execute and read and write
105D000
stack
page read and write
FB0000
unkown
page read and write
24AE3442000
heap
page read and write
2F82000
unclassified section
page read and write
5E3000
heap
page read and write
1431000
unkown
page readonly
FD0000
heap
page read and write
514000
heap
page read and write
27A1000
heap
page read and write
1347000
heap
page execute and read and write
27A1000
heap
page read and write
3B4E000
direct allocation
page read and write
3200000
unkown
page execute and read and write
27A1000
heap
page read and write
1750000
unkown
page readonly
568000
heap
page read and write
1478000
heap
page read and write
FF0000
unkown
page readonly
3810000
direct allocation
page read and write
24AE342C000
heap
page read and write
2F9C000
unkown
page read and write
2960000
trusted library allocation
page read and write
3217000
heap
page read and write
B31000
unkown
page execute read
7FE000
unkown
page readonly
27A1000
heap
page read and write
FEF000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
2BA9000
heap
page read and write
27A1000
heap
page read and write
7F1000
unkown
page execute read
754E000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
2EF0000
heap
page read and write
28CB000
heap
page read and write
5FF000
heap
page read and write
1DE0000
direct allocation
page read and write
BBD000
unkown
page readonly
1570000
heap
page read and write
3C00000
unkown
page execute and read and write
27A1000
heap
page read and write
74D6000
heap
page read and write
11D0000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
5C735FE000
stack
page read and write
13A0000
unkown
page readonly
648000
heap
page read and write
807000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
1478000
heap
page read and write
74D0000
heap
page read and write
7F1000
unkown
page execute read
36D0000
direct allocation
page read and write
27A1000
heap
page read and write
60E000
heap
page read and write
24AE3280000
system
page execute and read and write
27A1000
heap
page read and write
24AE4F01000
trusted library allocation
page read and write
1165000
heap
page read and write
59F0000
trusted library allocation
page read and write
110C000
heap
page read and write
5D9000
heap
page read and write
3ADD000
direct allocation
page read and write
74EA000
heap
page read and write
39B0000
direct allocation
page read and write
3013000
heap
page read and write
11E1000
heap
page read and write
754A000
heap
page read and write
3013000
heap
page read and write
5CA000
heap
page read and write
7553000
heap
page read and write
7F1000
unkown
page execute read
13D0000
heap
page read and write
2CB4000
heap
page read and write
5420000
system
page execute and read and write
27A1000
heap
page read and write
7F0000
unkown
page readonly
2D82000
unkown
page read and write
5E3000
heap
page read and write
2AAF000
stack
page read and write
27A0000
heap
page read and write
24AE4CC0000
trusted library allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
BFD000
stack
page read and write
3013000
heap
page read and write
5445000
system
page execute and read and write
27A1000
heap
page read and write
3720000
direct allocation
page read and write
FD8000
heap
page read and write
55DC000
unkown
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
29EE000
heap
page read and write
24AE343B000
heap
page read and write
27A1000
heap
page read and write
11CF000
stack
page read and write
1431000
unkown
page readonly
27A1000
heap
page read and write
174F000
stack
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
4000000
unclassified section
page execute and read and write
E40000
unkown
page readonly
3205000
heap
page read and write
136C000
stack
page read and write
3E01000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
13B0000
unkown
page readonly
5C72DFE000
stack
page read and write
F90000
unkown
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
310F000
stack
page read and write
5B1000
heap
page read and write
E50000
unkown
page readonly
541E000
system
page execute and read and write
10DE000
heap
page read and write
2F2E000
stack
page read and write
27A1000
heap
page read and write
1570000
heap
page read and write
39B0000
direct allocation
page read and write
27A1000
heap
page read and write
24AE32D4000
system
page execute and read and write
805000
unkown
page read and write
27A1000
heap
page read and write
805000
unkown
page read and write
27A1000
heap
page read and write
15B000
stack
page read and write
27A1000
heap
page read and write
1117000
heap
page read and write
5DC000
heap
page read and write
1420000
unkown
page read and write
27A1000
heap
page read and write
1AE1000
unkown
page readonly
3013000
heap
page read and write
27A1000
heap
page read and write
57E9000
unkown
page execute and read and write
2AB0000
unkown
page readonly
27A1000
heap
page read and write
29AE000
stack
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
112F000
heap
page read and write
27A1000
heap
page read and write
1EB0000
heap
page read and write
24AE4D00000
trusted library allocation
page read and write
27A1000
heap
page read and write
3B4E000
direct allocation
page read and write
1420000
unkown
page read and write
2C10000
heap
page read and write
AFA000
stack
page read and write
27A1000
heap
page read and write
389E000
heap
page read and write
27A1000
heap
page read and write
4E0000
heap
page read and write
63D000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
665B000
unclassified section
page execute and read and write
1750000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
3933000
direct allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
585B000
unkown
page execute and read and write
57C000
heap
page read and write
27A1000
heap
page read and write
1070000
heap
page read and write
27A1000
heap
page read and write
24AE4E03000
trusted library allocation
page read and write
126A000
stack
page read and write
27A1000
heap
page read and write
24AE4FCE000
trusted library allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
36CF000
stack
page read and write
126A000
stack
page read and write
3933000
direct allocation
page read and write
BBD000
unkown
page readonly
24AE4E10000
trusted library allocation
page read and write
11F3000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
24AE3417000
heap
page read and write
3829000
heap
page read and write
3933000
direct allocation
page read and write
7F0000
unkown
page readonly
60E000
heap
page read and write
1AE1000
unkown
page readonly
27A1000
heap
page read and write
624000
heap
page read and write
27A1000
heap
page read and write
3500000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
2CC2000
unkown
page read and write
2F9C000
unkown
page read and write
27A1000
heap
page read and write
11E2000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
13B0000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
3013000
heap
page read and write
A90000
unkown
page readonly
27A1000
heap
page read and write
2E7C000
stack
page read and write
F90000
unkown
page read and write
5D9000
heap
page read and write
7B0F000
stack
page read and write
A80000
unkown
page readonly
11D0000
unkown
page readonly
56B000
heap
page read and write
3217000
heap
page read and write
24AE4E0E000
trusted library allocation
page read and write
3000000
heap
page read and write
3110000
unkown
page readonly
3BCD000
direct allocation
page execute and read and write
27A1000
heap
page read and write
234EC000
system
page read and write
27A1000
heap
page read and write
514000
heap
page read and write
10D0000
heap
page read and write
E30000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
5F0000
heap
page read and write
E40000
unkown
page readonly
2FD4000
heap
page read and write
5F0000
heap
page read and write
3013000
heap
page read and write
7424000
heap
page read and write
805000
unkown
page read and write
2FD4000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
238D4000
system
page read and write
3C42000
direct allocation
page execute and read and write
65C000
heap
page read and write
58A000
heap
page read and write
74DB000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
751B000
heap
page read and write
3AD9000
direct allocation
page read and write
576000
heap
page read and write
3384000
unkown
page read and write
27A1000
heap
page read and write
642000
heap
page read and write
576000
heap
page read and write
7F1000
unkown
page execute read
27A1000
heap
page read and write
BF4000
unkown
page readonly
12C0000
heap
page read and write
5C7000
heap
page read and write
A70000
unkown
page readonly
27A1000
heap
page read and write
A70000
unkown
page readonly
E70000
heap
page read and write
27A1000
heap
page read and write
1460000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
3000000
heap
page read and write
2EBB000
stack
page read and write
798D000
stack
page read and write
2F10000
heap
page read and write
36A8000
unkown
page read and write
79CE000
stack
page read and write
27A1000
heap
page read and write
514000
heap
page read and write
807000
unkown
page readonly
63D000
heap
page read and write
2DDC000
unkown
page read and write
FE0000
unkown
page readonly
24AE341F000
heap
page read and write
2BE0000
unkown
page read and write
134B000
heap
page read and write
549C000
system
page execute and read and write
5CF000
heap
page read and write
7A4E000
stack
page read and write
3623000
heap
page read and write
27A1000
heap
page read and write
24AE343F000
heap
page read and write
750C000
heap
page read and write
5F0000
heap
page read and write
3810000
direct allocation
page read and write
27A1000
heap
page read and write
E60000
heap
page read and write
24AE3370000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
24AE4E21000
trusted library allocation
page read and write
74DE000
heap
page read and write
24AE3410000
heap
page read and write
3013000
heap
page read and write
27A1000
heap
page read and write
E60000
heap
page read and write
27A1000
heap
page read and write
11CF000
stack
page read and write
1440000
unkown
page read and write
27A1000
heap
page read and write
2BFC000
stack
page read and write
F8E000
stack
page read and write
27A1000
heap
page read and write
7F0000
unkown
page readonly
27A1000
heap
page read and write
2C1A000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
1161000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
604000
heap
page read and write
7545000
heap
page read and write
27A1000
heap
page read and write
74E0000
heap
page read and write
3ADD000
direct allocation
page read and write
510000
heap
page read and write
2AF0000
unkown
page readonly
4E9000
stack
page read and write
1348000
heap
page read and write
27A1000
heap
page read and write
1200000
unkown
page readonly
4F0000
heap
page read and write
27A1000
heap
page read and write
7517000
heap
page read and write
103B000
stack
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
3968000
unclassified section
page read and write
1460000
unkown
page readonly
625B000
unkown
page execute and read and write
27A1000
heap
page read and write
7540000
heap
page read and write
24AE33E0000
heap
page read and write
2B3E000
stack
page read and write
27A1000
heap
page read and write
3013000
heap
page read and write
1470000
heap
page read and write
23212000
system
page read and write
27A1000
heap
page read and write
134C000
heap
page read and write
B31000
unkown
page execute read
18CE000
stack
page read and write
5C725FE000
stack
page read and write
3B4E000
direct allocation
page read and write
2F01000
direct allocation
page execute and read and write
1117000
heap
page read and write
27A1000
heap
page read and write
24AE4FA7000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3644000
unclassified section
page read and write
27A1000
heap
page read and write
57C000
heap
page read and write
2CB0000
heap
page read and write
27A1000
heap
page read and write
7B4E000
stack
page read and write
4600000
unkown
page execute and read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
3900000
direct allocation
page execute and read and write
27A1000
heap
page read and write
65E9000
unclassified section
page execute and read and write
B30000
unkown
page readonly
648000
heap
page read and write
1498000
heap
page read and write
27A1000
heap
page read and write
3ADD000
direct allocation
page read and write
7ACE000
stack
page read and write
3212000
heap
page read and write
3000000
heap
page read and write
24AE4FC4000
trusted library allocation
page read and write
970000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
BDE000
unkown
page readonly
3200000
heap
page read and write
3AD9000
direct allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
7F0000
unkown
page readonly
3810000
direct allocation
page read and write
2AC0000
trusted library allocation
page read and write
7A8F000
stack
page read and write
3B4E000
direct allocation
page read and write
27A1000
heap
page read and write
611000
heap
page read and write
1DD4000
heap
page read and write
27A1000
heap
page read and write
560000
heap
page read and write
1117000
heap
page read and write
5C71DFC000
stack
page read and write
101B000
stack
page read and write
3AD9000
direct allocation
page read and write
27A1000
heap
page read and write
E30000
unkown
page readonly
3933000
direct allocation
page read and write
1470000
heap
page read and write
3ADD000
direct allocation
page read and write
B30000
unkown
page readonly
A90000
unkown
page readonly
37D6000
unclassified section
page read and write
136C000
stack
page read and write
27A1000
heap
page read and write
E70000
heap
page read and write
13C0000
unkown
page readonly
27A1000
heap
page read and write
27A1000
heap
page read and write
24AE4E0C000
trusted library allocation
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
3B4E000
direct allocation
page read and write
232D2000
system
page read and write
2C30000
direct allocation
page execute and read and write
3700000
heap
page read and write
2A7C000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
2F40000
unkown
page read and write
1117000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
27A1000
heap
page read and write
611000
heap
page read and write
2F40000
unkown
page read and write
576000
heap
page read and write
576000
heap
page read and write
10DA000
heap
page read and write
74C0000
trusted library allocation
page read and write
3A2D000
direct allocation
page execute and read and write
3B4E000
direct allocation
page read and write
There are 686 hidden memdumps, click here to show them.