IOC Report
hNgIvHRuTU.dll

loading gif

Files

File Path
Type
Category
Malicious
hNgIvHRuTU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\WINDOWS\qeriuwjhrf (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\tasksche.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\hNgIvHRuTU.dll,PlayGame
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\hNgIvHRuTU.dll",#1
malicious
C:\Windows\mssecsvr.exe
C:\WINDOWS\mssecsvr.exe
malicious
C:\Windows\mssecsvr.exe
C:\WINDOWS\mssecsvr.exe -m security
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\hNgIvHRuTU.dll",PlayGame
malicious
C:\Windows\mssecsvr.exe
C:\WINDOWS\mssecsvr.exe
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\hNgIvHRuTU.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hNgIvHRuTU.dll",#1

URLs

Name
IP
Malicious
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-098f-a7ce-9f0e9ab6a8f5
199.59.243.228
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-12c5-b838-b08634650e
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com//i
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
103.224.212.215
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/s
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-098f-a7ce-9f0e9ab6a8
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-119b-90f6-837dd48231ad
199.59.243.228
http://ww25.iuqerfsoLF
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-119b-90f6-837dd48231
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comyC
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comgsohB&
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-12c5-b838-b08634650efc
199.59.243.228
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comc
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/S
unknown
http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
77026.bodis.com
199.59.243.228
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
103.224.212.215
ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.97
unknown
unknown
malicious
192.168.2.96
unknown
unknown
malicious
192.168.2.99
unknown
unknown
malicious
192.168.2.98
unknown
unknown
malicious
192.168.2.91
unknown
unknown
malicious
192.168.2.90
unknown
unknown
malicious
192.168.2.93
unknown
unknown
malicious
192.168.2.92
unknown
unknown
malicious
192.168.2.95
unknown
unknown
malicious
192.168.2.94
unknown
unknown
malicious
192.168.2.104
unknown
unknown
malicious
192.168.2.105
unknown
unknown
malicious
192.168.2.102
unknown
unknown
malicious
192.168.2.103
unknown
unknown
malicious
192.168.2.108
unknown
unknown
malicious
192.168.2.109
unknown
unknown
malicious
192.168.2.106
unknown
unknown
malicious
101.5.197.1
unknown
China
78.130.181.2
unknown
Bulgaria
78.130.181.1
unknown
Bulgaria
101.5.197.2
unknown
China
192.168.2.148
unknown
unknown
192.168.2.149
unknown
unknown
192.168.2.146
unknown
unknown
35.81.47.1
unknown
United States
192.168.2.147
unknown
unknown
192.168.2.140
unknown
unknown
13.229.164.1
unknown
United States
192.168.2.141
unknown
unknown
13.229.164.2
unknown
United States
192.168.2.144
unknown
unknown
192.168.2.145
unknown
unknown
25.38.30.167
unknown
United Kingdom
192.168.2.142
unknown
unknown
192.168.2.143
unknown
unknown
31.52.246.6
unknown
United Kingdom
31.52.246.1
unknown
United Kingdom
192.168.2.159
unknown
unknown
192.168.2.157
unknown
unknown
192.168.2.158
unknown
unknown
35.81.47.184
unknown
United States
41.240.115.2
unknown
Sudan
192.168.2.151
unknown
unknown
192.168.2.152
unknown
unknown
41.240.115.1
unknown
Sudan
192.168.2.150
unknown
unknown
192.168.2.155
unknown
unknown
192.168.2.156
unknown
unknown
192.168.2.153
unknown
unknown
126.75.17.59
unknown
Japan
192.168.2.154
unknown
unknown
2.139.197.109
unknown
Spain
129.17.117.58
unknown
United States
192.168.2.126
unknown
unknown
192.168.2.247
unknown
unknown
192.168.2.127
unknown
unknown
192.168.2.248
unknown
unknown
192.168.2.124
unknown
unknown
192.168.2.245
unknown
unknown
218.112.212.165
unknown
Japan
192.168.2.125
unknown
unknown
192.168.2.246
unknown
unknown
13.229.164.57
unknown
United States
192.168.2.128
unknown
unknown
192.168.2.249
unknown
unknown
116.101.184.130
unknown
Viet Nam
192.168.2.129
unknown
unknown
192.168.2.240
unknown
unknown
192.168.2.122
unknown
unknown
192.168.2.243
unknown
unknown
192.168.2.123
unknown
unknown
192.168.2.244
unknown
unknown
192.168.2.120
unknown
unknown
192.168.2.241
unknown
unknown
192.168.2.121
unknown
unknown
192.168.2.242
unknown
unknown
129.17.117.1
unknown
United States
192.168.2.137
unknown
unknown
192.168.2.138
unknown
unknown
192.168.2.135
unknown
unknown
192.168.2.136
unknown
unknown
192.168.2.139
unknown
unknown
192.168.2.250
unknown
unknown
192.168.2.130
unknown
unknown
192.168.2.251
unknown
unknown
192.168.2.133
unknown
unknown
192.168.2.254
unknown
unknown
192.168.2.134
unknown
unknown
192.168.2.131
unknown
unknown
192.168.2.252
unknown
unknown
192.168.2.132
unknown
unknown
192.168.2.253
unknown
unknown
144.29.150.72
unknown
United States
208.140.179.1
unknown
United States
208.140.179.2
unknown
United States
192.168.2.225
unknown
unknown
192.168.2.226
unknown
unknown
192.168.2.223
unknown
unknown
192.168.2.224
unknown
unknown
192.168.2.229
unknown
unknown
There are 90 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
40F000
unkown
page write copy
malicious
40F000
unkown
page write copy
malicious
710000
unkown
page readonly
malicious
710000
unkown
page readonly
malicious
1D5C000
heap
page read and write
malicious
40F000
unkown
page write copy
malicious
2282000
heap
page read and write
malicious
710000
unkown
page readonly
malicious
40F000
unkown
page write copy
malicious
710000
unkown
page readonly
malicious
42E000
unkown
page read and write
malicious
40F000
unkown
page write copy
malicious
710000
unkown
page readonly
malicious
710000
unkown
page readonly
malicious
8D0E000
stack
page read and write
2F6A000
heap
page read and write
1F0000
heap
page read and write
E9F000
stack
page read and write
8DD000
stack
page read and write
10DF000
stack
page read and write
D44E000
stack
page read and write
4D0F000
stack
page read and write
68CE000
stack
page read and write
CEE000
stack
page read and write
40B000
unkown
page write copy
29A0000
heap
page read and write
27BE000
stack
page read and write
BD8F000
stack
page read and write
2D7F000
stack
page read and write
FDF000
stack
page read and write
C3CF000
stack
page read and write
A5CF000
stack
page read and write
840F000
stack
page read and write
2960000
heap
page read and write
4F30000
heap
page read and write
9C000
stack
page read and write
C90E000
stack
page read and write
C7E000
stack
page read and write
181D000
stack
page read and write
8E0F000
stack
page read and write
2DB0000
heap
page read and write
40B000
unkown
page write copy
DE4E000
stack
page read and write
997000
heap
page read and write
7C8F000
stack
page read and write
7B8E000
stack
page read and write
2F7E000
stack
page read and write
CA0000
heap
page read and write
624F000
stack
page read and write
5A4F000
stack
page read and write
354E000
stack
page read and write
2E7F000
stack
page read and write
2CBE000
stack
page read and write
510E000
stack
page read and write
4850000
heap
page read and write
2F60000
heap
page read and write
35DE000
stack
page read and write
298F000
stack
page read and write
B50E000
stack
page read and write
530F000
stack
page read and write
D11000
heap
page read and write
2F3E000
stack
page read and write
538E000
stack
page read and write
9C0E000
stack
page read and write
808E000
stack
page read and write
930000
heap
page read and write
BECF000
stack
page read and write
9C000
stack
page read and write
D27000
heap
page read and write
EA8F000
stack
page read and write
D6CE000
stack
page read and write
6C4F000
stack
page read and write
D30E000
stack
page read and write
DA4F000
stack
page read and write
DCCF000
stack
page read and write
40A000
unkown
page readonly
327C000
stack
page read and write
718E000
stack
page read and write
3300000
heap
page read and write
6D8F000
stack
page read and write
750000
heap
page read and write
ED4E000
stack
page read and write
664E000
stack
page read and write
B74F000
stack
page read and write
A1E000
stack
page read and write
2DFF000
stack
page read and write
1D49000
heap
page read and write
69CF000
stack
page read and write
520F000
stack
page read and write
97E000
heap
page read and write
96CF000
stack
page read and write
910000
heap
page read and write
72CE000
stack
page read and write
B60F000
stack
page read and write
1A9F000
stack
page read and write
431000
unkown
page read and write
2B7F000
stack
page read and write
6B4E000
stack
page read and write
A88E000
stack
page read and write
D1CE000
stack
page read and write
5ECF000
stack
page read and write
AC0F000
stack
page read and write
40A000
unkown
page readonly
C68E000
stack
page read and write
CA0000
heap
page read and write
430E000
stack
page read and write
C2CE000
stack
page read and write
303F000
stack
page read and write
818F000
stack
page read and write
BAF000
stack
page read and write
401000
unkown
page execute read
E98E000
stack
page read and write
32C0000
heap
page read and write
444F000
stack
page read and write
171D000
stack
page read and write
2950000
heap
page read and write
CF0F000
stack
page read and write
40B000
unkown
page write copy
6010000
heap
page read and write
EC0E000
stack
page read and write
BC4F000
stack
page read and write
E1CF000
stack
page read and write
93E000
heap
page read and write
81CE000
stack
page read and write
40A000
unkown
page readonly
A10E000
stack
page read and write
93A000
heap
page read and write
401000
unkown
page execute read
1F0000
heap
page read and write
E34E000
stack
page read and write
D40F000
stack
page read and write
E7F000
stack
page read and write
674F000
stack
page read and write
B24F000
stack
page read and write
8CCF000
stack
page read and write
2C3F000
stack
page read and write
9C000
stack
page read and write
400000
unkown
page readonly
660F000
stack
page read and write
40F000
unkown
page write copy
32D0000
heap
page read and write
A98F000
stack
page read and write
570F000
stack
page read and write
D90F000
stack
page read and write
458E000
stack
page read and write
894E000
stack
page read and write
FA0000
heap
page read and write
D18F000
stack
page read and write
4A4F000
stack
page read and write
BF0E000
stack
page read and write
A20F000
stack
page read and write
CAB000
heap
page read and write
C04E000
stack
page read and write
394E000
stack
page read and write
BB4E000
stack
page read and write
EBCF000
stack
page read and write
CCF000
stack
page read and write
4ACE000
stack
page read and write
B9CF000
stack
page read and write
A60000
heap
page read and write
4D4E000
stack
page read and write
290C000
stack
page read and write
966000
heap
page read and write
9DD000
stack
page read and write
B78E000
stack
page read and write
C3D000
stack
page read and write
D1F000
heap
page read and write
3420000
heap
page read and write
2A3E000
stack
page read and write
40A000
unkown
page readonly
934E000
stack
page read and write
994F000
stack
page read and write
B3CE000
stack
page read and write
47CF000
stack
page read and write
400000
unkown
page readonly
A6E000
stack
page read and write
2267000
heap
page read and write
29EE000
stack
page read and write
740E000
stack
page read and write
DF8E000
stack
page read and write
3E0F000
stack
page read and write
558F000
stack
page read and write
750F000
stack
page read and write
AD0000
heap
page read and write
764F000
stack
page read and write
323B000
stack
page read and write
ED0F000
stack
page read and write
41CF000
stack
page read and write
C50F000
stack
page read and write
B00E000
stack
page read and write
E30F000
stack
page read and write
401000
unkown
page execute read
E6CF000
stack
page read and write
42CF000
stack
page read and write
A4CE000
stack
page read and write
431000
unkown
page read and write
6AB000
stack
page read and write
E94F000
stack
page read and write
650E000
stack
page read and write
560E000
stack
page read and write
F4E000
stack
page read and write
A60000
heap
page read and write
408F000
stack
page read and write
D1F000
heap
page read and write
A84F000
stack
page read and write
434E000
stack
page read and write
D08E000
stack
page read and write
DB8F000
stack
page read and write
930F000
stack
page read and write
40B000
unkown
page write copy
CDCF000
stack
page read and write
754E000
stack
page read and write
F8D000
stack
page read and write
8E4E000
stack
page read and write
D58E000
stack
page read and write
2B7F000
stack
page read and write
2A3F000
stack
page read and write
678E000
stack
page read and write
584F000
stack
page read and write
32C0000
heap
page read and write
9A2000
heap
page read and write
880E000
stack
page read and write
CC8F000
stack
page read and write
19D000
stack
page read and write
307B000
stack
page read and write
AA0000
heap
page read and write
195F000
stack
page read and write
2A7E000
stack
page read and write
1280000
heap
page read and write
3A4F000
stack
page read and write
3CCF000
stack
page read and write
CF0000
heap
page read and write
A38E000
stack
page read and write
5F0E000
stack
page read and write
401000
unkown
page execute read
E58F000
stack
page read and write
431000
unkown
page read and write
63CE000
stack
page read and write
E44F000
stack
page read and write
E84E000
stack
page read and write
380E000
stack
page read and write
2B7E000
stack
page read and write
D7CF000
stack
page read and write
844E000
stack
page read and write
9A4000
heap
page read and write
2DFE000
stack
page read and write
9D0F000
stack
page read and write
37CF000
stack
page read and write
AA0000
heap
page read and write
3A8E000
stack
page read and write
D04F000
stack
page read and write
40A000
unkown
page readonly
B28E000
stack
page read and write
908F000
stack
page read and write
344E000
stack
page read and write
30BE000
stack
page read and write
28CE000
stack
page read and write
B10F000
stack
page read and write
2CBF000
stack
page read and write
E80F000
stack
page read and write
594F000
stack
page read and write
317F000
stack
page read and write
2BBE000
stack
page read and write
307B000
stack
page read and write
9A8F000
stack
page read and write
400000
unkown
page readonly
CED000
heap
page read and write
944F000
stack
page read and write
980F000
stack
page read and write
D94E000
stack
page read and write
BFF000
stack
page read and write
E48E000
stack
page read and write
7DCF000
stack
page read and write
64CF000
stack
page read and write
AD8E000
stack
page read and write
5C4F000
stack
page read and write
7F0F000
stack
page read and write
D54F000
stack
page read and write
C40000
heap
page read and write
AFCF000
stack
page read and write
330E000
stack
page read and write
EE8E000
stack
page read and write
CB4F000
stack
page read and write
359F000
stack
page read and write
6F0E000
stack
page read and write
9F8F000
stack
page read and write
1C3E000
stack
page read and write
87CF000
stack
page read and write
390F000
stack
page read and write
868F000
stack
page read and write
C80000
heap
page read and write
8BCE000
stack
page read and write
AAE000
stack
page read and write
C14F000
stack
page read and write
31BE000
stack
page read and write
DD0E000
stack
page read and write
890F000
stack
page read and write
A5E000
stack
page read and write
E5CE000
stack
page read and write
B8CE000
stack
page read and write
704E000
stack
page read and write
3F8E000
stack
page read and write
CF4E000
stack
page read and write
9BCF000
stack
page read and write
830E000
stack
page read and write
294E000
stack
page read and write
28CB000
stack
page read and write
7A4E000
stack
page read and write
2C7F000
stack
page read and write
548F000
stack
page read and write
EE4F000
stack
page read and write
C78F000
stack
page read and write
A74E000
stack
page read and write
454F000
stack
page read and write
400000
unkown
page readonly
34CE000
stack
page read and write
A60E000
stack
page read and write
340F000
stack
page read and write
BC8E000
stack
page read and write
700F000
stack
page read and write
EF0000
heap
page read and write
401000
unkown
page execute read
A0CF000
stack
page read and write
400000
unkown
page readonly
2CFE000
stack
page read and write
4E4F000
stack
page read and write
2C7F000
stack
page read and write
7E0E000
stack
page read and write
AE8F000
stack
page read and write
D68000
heap
page read and write
AA5000
heap
page read and write
D72000
heap
page read and write
7B4F000
stack
page read and write
A70F000
stack
page read and write
78CF000
stack
page read and write
AD4F000
stack
page read and write
574E000
stack
page read and write
494F000
stack
page read and write
614E000
stack
page read and write
C18E000
stack
page read and write
31BE000
stack
page read and write
AF0000
heap
page read and write
40B000
unkown
page write copy
4A8E000
stack
page read and write
AECE000
stack
page read and write
40A000
unkown
page readonly
4F8F000
stack
page read and write
2DA0000
heap
page read and write
C2E000
stack
page read and write
CA8000
heap
page read and write
91CF000
stack
page read and write
948E000
stack
page read and write
7F4E000
stack
page read and write
638F000
stack
page read and write
55CE000
stack
page read and write
534E000
stack
page read and write
DCF000
stack
page read and write
BDCE000
stack
page read and write
D10000
heap
page read and write
3D0E000
stack
page read and write
AD7000
heap
page read and write
32BF000
stack
page read and write
A48F000
stack
page read and write
465F000
stack
page read and write
86CE000
stack
page read and write
6A0E000
stack
page read and write
40B000
unkown
page write copy
AB0E000
stack
page read and write
36CE000
stack
page read and write
984E000
stack
page read and write
D28000
heap
page read and write
CDE000
heap
page read and write
854F000
stack
page read and write
6DCE000
stack
page read and write
DF4F000
stack
page read and write
8A4F000
stack
page read and write
28BF000
stack
page read and write
A1E000
stack
page read and write
E08F000
stack
page read and write
199E000
stack
page read and write
920E000
stack
page read and write
9E8E000
stack
page read and write
BA0E000
stack
page read and write
2D90000
heap
page read and write
1AFE000
stack
page read and write
95CE000
stack
page read and write
40CE000
stack
page read and write
31BE000
stack
page read and write
35F0000
heap
page read and write
480E000
stack
page read and write
628E000
stack
page read and write
358E000
stack
page read and write
A9CE000
stack
page read and write
C00F000
stack
page read and write
4E8E000
stack
page read and write
CE0E000
stack
page read and write
DBCE000
stack
page read and write
368F000
stack
page read and write
30BE000
stack
page read and write
EACE000
stack
page read and write
290E000
stack
page read and write
8F8E000
stack
page read and write
3E4E000
stack
page read and write
82CF000
stack
page read and write
688F000
stack
page read and write
45CE000
stack
page read and write
AF5000
heap
page read and write
4860000
heap
page read and write
AF5000
heap
page read and write
5B4F000
stack
page read and write
2DBF000
stack
page read and write
DA8E000
stack
page read and write
A24E000
stack
page read and write
50CF000
stack
page read and write
B4CF000
stack
page read and write
307E000
stack
page read and write
1F0000
heap
page read and write
D80E000
stack
page read and write
348E000
stack
page read and write
B14E000
stack
page read and write
11D0000
heap
page read and write
6ECF000
stack
page read and write
C54E000
stack
page read and write
C50000
heap
page read and write
AF0000
heap
page read and write
4FCE000
stack
page read and write
342A000
heap
page read and write
29FF000
stack
page read and write
6B0F000
stack
page read and write
90CE000
stack
page read and write
46CF000
stack
page read and write
BB0F000
stack
page read and write
185E000
stack
page read and write
7A0F000
stack
page read and write
293E000
stack
page read and write
2C7E000
stack
page read and write
804F000
stack
page read and write
600F000
stack
page read and write
C88000
heap
page read and write
C9E000
stack
page read and write
830000
heap
page read and write
2C90000
heap
page read and write
7CCE000
stack
page read and write
2F3E000
stack
page read and write
2F7D000
stack
page read and write
28FE000
stack
page read and write
C40E000
stack
page read and write
D07000
heap
page read and write
728F000
stack
page read and write
C64F000
stack
page read and write
484E000
stack
page read and write
E0CE000
stack
page read and write
970E000
stack
page read and write
355E000
stack
page read and write
9E4F000
stack
page read and write
AC4E000
stack
page read and write
2E3E000
stack
page read and write
8A8E000
stack
page read and write
E70E000
stack
page read and write
B64E000
stack
page read and write
A34F000
stack
page read and write
8B8F000
stack
page read and write
B38F000
stack
page read and write
958F000
stack
page read and write
5DCE000
stack
page read and write
73CF000
stack
page read and write
998E000
stack
page read and write
C6E000
stack
page read and write
42F000
unkown
page write copy
4C0E000
stack
page read and write
3F4F000
stack
page read and write
AACF000
stack
page read and write
6EC000
stack
page read and write
714F000
stack
page read and write
D68F000
stack
page read and write
F60000
heap
page read and write
A5E000
stack
page read and write
400000
unkown
page readonly
BEE000
stack
page read and write
19D000
stack
page read and write
5C8E000
stack
page read and write
E20E000
stack
page read and write
2B3F000
stack
page read and write
4BCF000
stack
page read and write
9D4E000
stack
page read and write
790E000
stack
page read and write
CA4E000
stack
page read and write
401000
unkown
page execute read
CA0F000
stack
page read and write
1BFB000
stack
page read and write
F90000
heap
page read and write
858E000
stack
page read and write
EDE000
stack
page read and write
2EFF000
stack
page read and write
DE0F000
stack
page read and write
778F000
stack
page read and write
19D000
stack
page read and write
1D4D000
heap
page read and write
6C8E000
stack
page read and write
77CE000
stack
page read and write
3B8F000
stack
page read and write
C28F000
stack
page read and write
5D8F000
stack
page read and write
CCCE000
stack
page read and write
B88F000
stack
page read and write
EF8F000
stack
page read and write
4DDF000
stack
page read and write
3BCE000
stack
page read and write
1D3E000
stack
page read and write
C8CF000
stack
page read and write
CB8E000
stack
page read and write
D2CF000
stack
page read and write
C7CE000
stack
page read and write
D1B000
heap
page read and write
768E000
stack
page read and write
9FCE000
stack
page read and write
8F4F000
stack
page read and write
9ACE000
stack
page read and write
2C9A000
heap
page read and write
There are 509 hidden memdumps, click here to show them.