IOC Report
Fi#U015f.exe

loading gif

Files

File Path
Type
Category
Malicious
Fi#U015f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2780E4D
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\aut1A69.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\plainstones
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fi#U015f.exe
"C:\Users\user\Desktop\Fi#U015f.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Fi#U015f.exe"
malicious
C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
"C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe"
malicious
C:\Windows\SysWOW64\icsunattend.exe
"C:\Windows\SysWOW64\icsunattend.exe"
malicious
C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
"C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.nartex-uf.online/9ul0/
31.31.196.177
malicious
http://www.a1shop.shop/5cnx/?Zvupu44p=oUaJUx3W91XKGFwkbiDYgYplg4TZBQwbgtCkXvgonjE8SHvx+U3TNstQnLVJ8Y9FFWXzakAfwSz/u1Ky3cg6+EUlRRQZaMEAQAdSQfgWtonXK7S514myqW5G+fyl7DTuYQ==&RhqLA=IdOhgVq
13.248.169.48
malicious
http://www.aktmarket.xyz/4mbo/?RhqLA=IdOhgVq&Zvupu44p=TaoaspSuXCWG+J6Qu2ekK1wrjY2r/s8nGO1Ev0B6QwWm63/Js3V07H2UbHrGJNHujJI3HhKgRchyd4beF5Q/e8GQOUHjh0/XAeWf+xbcrSf/780Hk7JHgoJ90GAMQodVPQ==
13.248.169.48
malicious
http://www.a1shop.shop/5cnx/
13.248.169.48
malicious
http://www.aktmarket.xyz/4mbo/
13.248.169.48
malicious
http://www.nartex-uf.online/9ul0/?Zvupu44p=/8kciQFlGVV+s671hjTEMgvePijKoQKbVww8Emk+/ImbSDpFBlkIfEUbLp7Rr+tD2T8CwWTvaBp6p+1LgixmeUAbCHLl0Y/2eq8XbxFkjwUJTy71Wn7hwUVQgvRbUyIDUA==&RhqLA=IdOhgVq
31.31.196.177
malicious
http://www.funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgk/nttef79vSlz7njgVLZEtWvcnUQ3+FUHCaATxq3UQzYQ==
172.104.82.74
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.a1shop.shop
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://files.reg.ru/fonts/inter/Inter-Medium.woff2)
unknown
https://server194.hosting.reg.ru/manager
unknown
https://2domains.ru
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)
unknown
https://www.ecosia.org/newtab/
unknown
https://www.reg.ru/support/#request
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://files.reg.ru/fonts/inter/Inter-Regular.woff)
unknown
https://files.reg.ru/fonts/inter/Inter-Medium.woff)
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://files.reg.ru/fonts/inter/Inter-Regular.woff2)
unknown
http://funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo
unknown
https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reg.ru?target=_blank
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.nartex-uf.online
31.31.196.177
malicious
www.aktmarket.xyz
13.248.169.48
malicious
funnystory.online
172.104.82.74
malicious
www.a1shop.shop
13.248.169.48
malicious
cssa.auction
107.167.84.42
www.cssa.auction
unknown
www.funnystory.online
unknown

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.aktmarket.xyz
United States
malicious
31.31.196.177
www.nartex-uf.online
Russian Federation
malicious
172.104.82.74
funnystory.online
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3400000
unclassified section
page execute and read and write
malicious
4120000
trusted library allocation
page read and write
malicious
2A00000
unkown
page execute and read and write
malicious
2BF0000
unclassified section
page execute and read and write
malicious
2140000
system
page execute and read and write
malicious
430000
system
page execute and read and write
malicious
CB0000
trusted library allocation
page read and write
malicious
A4B000
heap
page read and write
2413000
heap
page read and write
2BA0000
direct allocation
page read and write
4220000
trusted library allocation
page execute and read and write
3543000
direct allocation
page read and write
540000
unkown
page readonly
6B1000
heap
page read and write
2701000
heap
page read and write
37AE000
direct allocation
page read and write
2C2D000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
9DC000
heap
page read and write
BB1000
heap
page read and write
22BF000
stack
page read and write
BB1000
heap
page read and write
2C9E000
heap
page read and write
6D0000
heap
page read and write
C10000
unkown
page readonly
75C1000
heap
page read and write
BB1000
heap
page read and write
105F000
stack
page read and write
2900000
unkown
page readonly
375E000
direct allocation
page read and write
BB1000
heap
page read and write
765000
unkown
page read and write
681000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
18A000
stack
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
4430000
heap
page read and write
1BB000
stack
page read and write
BB1000
heap
page read and write
7BB000
stack
page read and write
C20000
heap
page read and write
BB1000
heap
page read and write
698000
heap
page read and write
2413000
heap
page read and write
BB1000
heap
page read and write
6B0000
unkown
page readonly
2413000
heap
page read and write
160000
unkown
page readonly
E68000
heap
page read and write
767000
unkown
page readonly
BB1000
heap
page read and write
2413000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
92A000
heap
page read and write
13F1000
unkown
page readonly
DEE000
stack
page read and write
BB1000
heap
page read and write
757F000
heap
page read and write
A20000
unkown
page readonly
751000
unkown
page execute read
728000
heap
page read and write
AA7000
heap
page read and write
630000
unkown
page read and write
BB1000
heap
page read and write
4AAC000
unclassified section
page read and write
97E000
stack
page read and write
BC1000
heap
page execute and read and write
9F7000
heap
page read and write
705000
heap
page read and write
37AE000
direct allocation
page read and write
9F5000
heap
page read and write
47C2000
direct allocation
page execute and read and write
3543000
direct allocation
page read and write
47D2000
unclassified section
page read and write
2F9A000
unkown
page read and write
524000
heap
page read and write
BB1000
heap
page read and write
712000
heap
page read and write
4D2F000
stack
page read and write
500000
heap
page read and write
434E000
stack
page read and write
E60000
heap
page read and write
BB1000
heap
page read and write
692000
heap
page read and write
BB1000
heap
page read and write
6F1000
heap
page read and write
A55000
heap
page read and write
7D0000
system
page execute and read and write
830000
unkown
page readonly
271354C4000
trusted library allocation
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
3739000
direct allocation
page read and write
BC5000
heap
page read and write
EEE000
unkown
page readonly
21F0000
heap
page read and write
BB1000
heap
page read and write
2C76000
unkown
page read and write
730000
unkown
page read and write
BB1000
heap
page read and write
2320000
heap
page read and write
271338A0000
heap
page read and write
5026000
unclassified section
page read and write
2413000
heap
page read and write
6D0000
heap
page read and write
C90000
unkown
page read and write
271337B0000
heap
page read and write
271354CE000
trusted library allocation
page read and write
69D000
heap
page read and write
BB1000
heap
page read and write
AA7000
heap
page read and write
BB1000
heap
page read and write
9F0000
unkown
page readonly
BB1000
heap
page read and write
696000
heap
page read and write
75E000
unkown
page readonly
442D000
stack
page read and write
2413000
heap
page read and write
3084000
heap
page read and write
BB1000
heap
page read and write
2E2D000
direct allocation
page execute and read and write
BB1000
heap
page read and write
2400000
heap
page read and write
4E2F000
stack
page read and write
BB1000
heap
page read and write
EEE000
unkown
page readonly
2413000
heap
page read and write
687000
heap
page read and write
2422000
unkown
page read and write
7571000
heap
page read and write
338DC000
system
page read and write
42D6000
heap
page read and write
4243000
heap
page read and write
BB1000
heap
page read and write
800000
heap
page read and write
7F7000
system
page execute and read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
E41000
unkown
page execute read
95C000
heap
page read and write
36E9000
direct allocation
page read and write
1EA000
stack
page read and write
75D2000
heap
page read and write
751000
unkown
page execute read
271351F0000
heap
page read and write
C20000
heap
page read and write
35C0000
direct allocation
page read and write
BB1000
heap
page read and write
51B8000
unclassified section
page read and write
BB1000
heap
page read and write
13F1000
unkown
page readonly
BB1000
heap
page read and write
C00000
unkown
page readonly
959000
heap
page read and write
530000
unkown
page readonly
BB1000
heap
page read and write
37AE000
direct allocation
page read and write
721000
heap
page read and write
3470000
direct allocation
page read and write
E00000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
28FF000
stack
page read and write
BB1000
heap
page read and write
7550000
heap
page read and write
9BC000
stack
page read and write
27133770000
heap
page read and write
690000
unkown
page read and write
534A000
unclassified section
page read and write
92E000
heap
page read and write
3543000
direct allocation
page read and write
43EC000
stack
page read and write
33CC4000
system
page read and write
2330000
unkown
page readonly
69D000
heap
page read and write
2C29000
heap
page read and write
84D000
stack
page read and write
6FC000
heap
page read and write
75EA000
heap
page read and write
7B4F000
stack
page read and write
BB1000
heap
page read and write
75E5000
heap
page read and write
920000
heap
page read and write
2713377A000
heap
page read and write
75CC000
heap
page read and write
BB1000
heap
page read and write
447E000
stack
page read and write
136E000
stack
page read and write
F04000
unkown
page readonly
BB1000
heap
page read and write
4B0000
heap
page read and write
2619000
heap
page read and write
BB1000
heap
page read and write
2B00000
heap
page read and write
BB1000
heap
page read and write
2324000
heap
page read and write
BB1000
heap
page read and write
7BCF000
stack
page read and write
9F7000
heap
page read and write
E40000
unkown
page readonly
BB1000
heap
page read and write
7576000
heap
page read and write
BB1000
heap
page read and write
45A9000
direct allocation
page execute and read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
E04000
heap
page read and write
850000
unkown
page readonly
2A0E000
stack
page read and write
BB1000
heap
page read and write
6B0000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
2324000
heap
page read and write
33D0000
direct allocation
page read and write
210B000
stack
page read and write
BB1000
heap
page read and write
F04000
unkown
page readonly
72B000
heap
page read and write
BB1000
heap
page read and write
767000
unkown
page readonly
CB0000
unkown
page readonly
2900000
heap
page read and write
759C000
heap
page read and write
BB1000
heap
page read and write
75D8000
heap
page read and write
8BA000
stack
page read and write
35C0000
direct allocation
page read and write
2BA0000
direct allocation
page read and write
6E5000
heap
page read and write
6A3000
heap
page read and write
2413000
heap
page read and write
271354BE000
trusted library allocation
page read and write
27135090000
trusted library allocation
page read and write
7B8E000
stack
page read and write
BB1000
heap
page read and write
69D000
heap
page read and write
C70000
unkown
page read and write
176E000
stack
page read and write
22FE000
stack
page read and write
7FC000
stack
page read and write
AB123FE000
stack
page read and write
750000
unkown
page readonly
27135303000
trusted library allocation
page read and write
3739000
direct allocation
page read and write
180000
unkown
page readonly
758A000
heap
page read and write
CD0000
heap
page read and write
71B000
heap
page read and write
BB1000
heap
page read and write
765000
unkown
page read and write
700000
unkown
page read and write
BB1000
heap
page read and write
3593000
direct allocation
page read and write
7C6F000
stack
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
290E000
stack
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
24E2000
unkown
page read and write
BB1000
heap
page read and write
4E94000
unclassified section
page read and write
757B000
heap
page read and write
550000
heap
page read and write
C10000
unkown
page readonly
3739000
direct allocation
page read and write
BB1000
heap
page read and write
2B50000
direct allocation
page read and write
3610000
direct allocation
page read and write
C70000
unkown
page read and write
BB1000
heap
page read and write
AB11BFE000
stack
page read and write
7DB000
stack
page read and write
AB113FC000
stack
page read and write
C6E000
stack
page read and write
BB1000
heap
page read and write
2FCD000
direct allocation
page execute and read and write
75E000
unkown
page readonly
4C2C000
stack
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
2413000
heap
page read and write
520000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
33602000
system
page read and write
9A0000
heap
page read and write
2D00000
direct allocation
page execute and read and write
2605000
heap
page read and write
27135321000
trusted library allocation
page read and write
BB1000
heap
page read and write
170000
unkown
page readonly
75A3000
heap
page read and write
DF0000
unkown
page read and write
36ED000
direct allocation
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
36E9000
direct allocation
page read and write
3020000
heap
page read and write
698000
heap
page read and write
2617000
heap
page read and write
42D0000
trusted library allocation
page read and write
375E000
direct allocation
page read and write
6F0000
unkown
page read and write
3593000
direct allocation
page read and write
BB1000
heap
page read and write
BB0000
heap
page read and write
756B000
heap
page read and write
3470000
direct allocation
page read and write
712000
heap
page read and write
BB1000
heap
page read and write
6FC000
heap
page read and write
763000
heap
page read and write
73E000
heap
page read and write
BB1000
heap
page read and write
7566000
heap
page read and write
BB1000
heap
page read and write
3420000
direct allocation
page read and write
780000
system
page execute and read and write
7563000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
4FC000
stack
page read and write
438E000
stack
page read and write
35C0000
direct allocation
page read and write
BB1000
heap
page read and write
C81000
unkown
page readonly
271337A2000
heap
page read and write
3371C000
system
page read and write
B05000
heap
page read and write
2413000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
3610000
direct allocation
page read and write
75D000
heap
page read and write
2A4E000
stack
page read and write
BB1000
heap
page read and write
170000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
520000
heap
page read and write
43FF000
heap
page read and write
2AE4000
unkown
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
550000
heap
page read and write
7B0E000
stack
page read and write
830000
unkown
page readonly
750000
unkown
page readonly
3593000
direct allocation
page read and write
BB1000
heap
page read and write
B05000
heap
page read and write
4FC000
stack
page read and write
BB1000
heap
page read and write
375E000
direct allocation
page read and write
27135313000
trusted library allocation
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
A4D000
heap
page read and write
E00000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
42D0000
trusted library allocation
page read and write
BB1000
heap
page read and write
730000
unkown
page read and write
27135090000
trusted library allocation
page read and write
750000
unkown
page readonly
3610000
direct allocation
page read and write
474D000
direct allocation
page execute and read and write
375E000
direct allocation
page read and write
BB1000
heap
page read and write
AA8000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
2E08000
unkown
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
461E000
direct allocation
page execute and read and write
69D000
heap
page read and write
BB1000
heap
page read and write
700000
heap
page read and write
2B4F000
stack
page read and write
261E000
heap
page read and write
3042000
direct allocation
page execute and read and write
BB1000
heap
page read and write
1060000
unkown
page readonly
BB1000
heap
page read and write
759000
heap
page read and write
75DC000
heap
page read and write
42D0000
trusted library allocation
page read and write
680000
heap
page read and write
BB1000
heap
page read and write
EFA000
unkown
page read and write
27135200000
trusted library allocation
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
767000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
4751000
direct allocation
page execute and read and write
2713379F000
heap
page read and write
BB1000
heap
page read and write
700000
heap
page read and write
E60000
heap
page read and write
BB1000
heap
page read and write
7C2E000
stack
page read and write
6E0000
heap
page read and write
8BA000
stack
page read and write
DB1000
unkown
page readonly
27135300000
trusted library allocation
page read and write
BB1000
heap
page read and write
A42000
heap
page read and write
4170000
trusted library allocation
page read and write
84D000
system
page execute and read and write
BB1000
heap
page read and write
3420000
direct allocation
page read and write
3787000
unclassified section
page execute and read and write
8AC000
stack
page read and write
BB1000
heap
page read and write
92E000
heap
page read and write
1EA000
stack
page read and write
2900000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
21B0000
heap
page read and write
9A0000
heap
page read and write
BB1000
heap
page read and write
27133670000
system
page execute and read and write
EFF000
unkown
page write copy
E04000
heap
page read and write
373D000
direct allocation
page read and write
6A3000
heap
page read and write
9F0000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
BC2000
heap
page read and write
271336D5000
system
page execute and read and write
1060000
unkown
page readonly
BB1000
heap
page read and write
160000
unkown
page readonly
BB1000
heap
page read and write
180000
unkown
page readonly
2DF9000
unkown
page execute and read and write
69D000
heap
page read and write
9BC000
stack
page read and write
9BA000
heap
page read and write
BB1000
heap
page read and write
9B0000
heap
page read and write
ECD000
unkown
page readonly
3201000
heap
page read and write
2413000
heap
page read and write
2E29000
direct allocation
page execute and read and write
45AD000
direct allocation
page execute and read and write
920000
heap
page read and write
2413000
heap
page read and write
6E0000
heap
page read and write
DF0000
unkown
page read and write
BB1000
heap
page read and write
7710000
trusted library allocation
page read and write
2713378C000
heap
page read and write
67E000
stack
page read and write
2605000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
3420000
direct allocation
page read and write
2413000
heap
page read and write
BC2000
heap
page read and write
BB1000
heap
page read and write
CB0000
unkown
page readonly
BB1000
heap
page read and write
3420000
direct allocation
page read and write
BB1000
heap
page read and write
CD0000
heap
page read and write
21E0000
heap
page read and write
757E000
heap
page read and write
692000
heap
page read and write
EFA000
unkown
page write copy
DB1000
unkown
page readonly
4403000
heap
page read and write
2190000
heap
page read and write
2402000
heap
page read and write
BB1000
heap
page read and write
3543000
direct allocation
page read and write
72D0000
trusted library allocation
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
373D000
direct allocation
page read and write
36E9000
direct allocation
page read and write
630000
unkown
page read and write
C00000
unkown
page readonly
766E000
heap
page read and write
BB1000
heap
page read and write
8EE000
stack
page read and write
4474000
heap
page read and write
75E000
unkown
page readonly
BB1000
heap
page read and write
BB1000
heap
page read and write
850000
unkown
page readonly
B05000
heap
page read and write
BB1000
heap
page read and write
3080000
heap
page read and write
BB1000
heap
page read and write
92A000
heap
page read and write
4120000
heap
page read and write
BB1000
heap
page read and write
27135401000
trusted library allocation
page read and write
1F8000
stack
page read and write
2330000
unkown
page readonly
2E9E000
direct allocation
page execute and read and write
2617000
heap
page read and write
7650000
trusted library allocation
page read and write
6ED000
heap
page read and write
860000
heap
page read and write
E41000
unkown
page execute read
BB1000
heap
page read and write
752000
heap
page read and write
1F0000
heap
page read and write
765000
unkown
page read and write
524000
heap
page read and write
2713530A000
trusted library allocation
page read and write
E68000
heap
page read and write
705000
heap
page read and write
767000
unkown
page readonly
540000
unkown
page readonly
36ED000
direct allocation
page read and write
BB1000
heap
page read and write
2A23000
heap
page read and write
BB1000
heap
page read and write
2BA0000
direct allocation
page read and write
2600000
heap
page read and write
2413000
heap
page read and write
373D000
direct allocation
page read and write
4480000
direct allocation
page execute and read and write
37F9000
unclassified section
page execute and read and write
26FC000
unkown
page read and write
BB1000
heap
page read and write
530000
unkown
page readonly
ECD000
unkown
page readonly
BB1000
heap
page read and write
2D87000
unkown
page execute and read and write
C81000
unkown
page readonly
BB1000
heap
page read and write
2713379B000
heap
page read and write
524000
heap
page read and write
751000
unkown
page execute read
2612000
heap
page read and write
BB1000
heap
page read and write
7CE000
stack
page read and write
3470000
direct allocation
page read and write
716000
heap
page read and write
765000
unkown
page read and write
BB1000
heap
page read and write
69D000
heap
page read and write
271354B0000
trusted library allocation
page read and write
75AD000
heap
page read and write
9F7000
heap
page read and write
336C2000
system
page read and write
75A7000
heap
page read and write
BC2000
heap
page read and write
BC000
stack
page read and write
75E000
unkown
page readonly
751000
unkown
page execute read
750000
unkown
page readonly
27135070000
heap
page read and write
520000
unkown
page readonly
75E8000
heap
page read and write
9F7000
heap
page read and write
BB1000
heap
page read and write
E40000
unkown
page readonly
BB1000
heap
page read and write
35C0000
direct allocation
page read and write
2413000
heap
page read and write
2413000
heap
page read and write
7EB000
system
page execute and read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
690000
unkown
page read and write
BB1000
heap
page read and write
BB1000
heap
page read and write
A20000
unkown
page readonly
2320000
heap
page read and write
36ED000
direct allocation
page read and write
AB12BFE000
stack
page read and write
BB1000
heap
page read and write
27135310000
trusted library allocation
page read and write
36ED000
direct allocation
page read and write
27135090000
trusted library allocation
page read and write
29F0000
heap
page read and write
950000
trusted library allocation
page read and write
950000
heap
page read and write
2422000
unkown
page read and write
2FD1000
direct allocation
page execute and read and write
BB1000
heap
page read and write
840000
unkown
page readonly
7578000
heap
page read and write
840000
unkown
page readonly
731000
heap
page read and write
36E9000
direct allocation
page read and write
9EC000
heap
page read and write
2713530E000
trusted library allocation
page read and write
C90000
unkown
page read and write
BB1000
heap
page read and write
4892000
unclassified section
page read and write
271336D8000
system
page execute and read and write
29F0000
heap
page read and write
949000
heap
page read and write
28D0000
direct allocation
page read and write
26FC000
unkown
page read and write
7DB000
system
page execute and read and write
7666000
heap
page read and write
681000
unkown
page readonly
BB1000
heap
page read and write
7ACF000
stack
page read and write
BB1000
heap
page read and write
9BE000
heap
page read and write
75E0000
heap
page read and write
There are 620 hidden memdumps, click here to show them.