IOC Report
ImPgtzz6o4.dll

loading gif

Files

File Path
Type
Category
Malicious
ImPgtzz6o4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\WINDOWS\qeriuwjhrf (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\tasksche.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ImPgtzz6o4.dll,PlayGame
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1
malicious
C:\Windows\mssecsvc.exe
C:\WINDOWS\mssecsvc.exe
malicious
C:\Windows\mssecsvc.exe
C:\WINDOWS\mssecsvc.exe -m security
malicious
C:\Windows\tasksche.exe
C:\WINDOWS\tasksche.exe /i
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",PlayGame
malicious
C:\Windows\mssecsvc.exe
C:\WINDOWS\mssecsvc.exe
malicious
C:\Windows\tasksche.exe
C:\WINDOWS\tasksche.exe /i
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comm
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
104.16.167.228
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comNL8
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8=
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/F
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/;L
unknown
https://www.kryptoslogic.com
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comS=
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6
unknown
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
104.16.167.228

IPs

IP
Domain
Country
Malicious
192.168.2.97
unknown
unknown
malicious
192.168.2.96
unknown
unknown
malicious
192.168.2.99
unknown
unknown
malicious
192.168.2.98
unknown
unknown
malicious
192.168.2.91
unknown
unknown
malicious
192.168.2.90
unknown
unknown
malicious
192.168.2.93
unknown
unknown
malicious
192.168.2.92
unknown
unknown
malicious
192.168.2.95
unknown
unknown
malicious
192.168.2.94
unknown
unknown
malicious
192.168.2.104
unknown
unknown
malicious
192.168.2.105
unknown
unknown
malicious
192.168.2.102
unknown
unknown
malicious
192.168.2.103
unknown
unknown
malicious
192.168.2.108
unknown
unknown
malicious
192.168.2.109
unknown
unknown
malicious
192.168.2.106
unknown
unknown
malicious
192.168.2.107
unknown
unknown
malicious
80.165.219.37
unknown
Denmark
31.57.181.202
unknown
Iran (ISLAMIC Republic Of)
192.168.2.148
unknown
unknown
192.168.2.149
unknown
unknown
192.168.2.146
unknown
unknown
192.168.2.147
unknown
unknown
192.168.2.140
unknown
unknown
192.168.2.141
unknown
unknown
192.168.2.144
unknown
unknown
192.168.2.145
unknown
unknown
192.168.2.142
unknown
unknown
192.168.2.143
unknown
unknown
28.233.50.1
unknown
United States
192.168.2.159
unknown
unknown
192.168.2.157
unknown
unknown
192.168.2.158
unknown
unknown
192.168.2.151
unknown
unknown
70.179.99.57
unknown
United States
70.179.99.1
unknown
United States
192.168.2.152
unknown
unknown
192.168.2.150
unknown
unknown
192.168.2.155
unknown
unknown
216.45.203.2
unknown
United States
216.45.203.1
unknown
United States
192.168.2.156
unknown
unknown
179.117.52.1
unknown
Brazil
192.168.2.153
unknown
unknown
192.168.2.154
unknown
unknown
134.49.104.11
unknown
United States
114.75.42.141
unknown
Australia
218.64.246.1
unknown
China
192.168.2.126
unknown
unknown
192.168.2.247
unknown
unknown
192.168.2.127
unknown
unknown
192.168.2.248
unknown
unknown
192.168.2.124
unknown
unknown
192.168.2.245
unknown
unknown
192.168.2.125
unknown
unknown
192.168.2.246
unknown
unknown
192.168.2.128
unknown
unknown
14.80.182.1
unknown
Korea Republic of
192.168.2.249
unknown
unknown
192.168.2.129
unknown
unknown
192.168.2.240
unknown
unknown
192.168.2.122
unknown
unknown
192.168.2.243
unknown
unknown
192.168.2.123
unknown
unknown
192.168.2.244
unknown
unknown
192.168.2.120
unknown
unknown
192.168.2.241
unknown
unknown
192.168.2.121
unknown
unknown
192.168.2.242
unknown
unknown
80.165.219.1
unknown
Denmark
42.34.73.1
unknown
Korea Republic of
1.54.112.1
unknown
Viet Nam
121.161.175.1
unknown
Korea Republic of
42.34.73.2
unknown
Korea Republic of
192.168.2.137
unknown
unknown
192.168.2.138
unknown
unknown
192.168.2.135
unknown
unknown
192.168.2.136
unknown
unknown
192.168.2.139
unknown
unknown
42.34.73.141
unknown
Korea Republic of
192.168.2.250
unknown
unknown
192.168.2.130
unknown
unknown
192.168.2.251
unknown
unknown
192.168.2.133
unknown
unknown
192.168.2.254
unknown
unknown
192.168.2.134
unknown
unknown
192.168.2.131
unknown
unknown
192.168.2.252
unknown
unknown
192.168.2.132
unknown
unknown
192.168.2.253
unknown
unknown
200.211.71.1
unknown
Brazil
200.211.71.2
unknown
Brazil
114.33.204.1
unknown
Taiwan; Republic of China (ROC)
192.168.2.225
unknown
unknown
192.168.2.226
unknown
unknown
192.168.2.223
unknown
unknown
192.168.2.224
unknown
unknown
192.168.2.229
unknown
unknown
192.168.2.227
unknown
unknown
There are 90 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EC1000
heap
page read and write
malicious
710000
unkown
page readonly
malicious
40F000
unkown
page write copy
malicious
710000
unkown
page readonly
malicious
40F000
unkown
page write copy
malicious
40F000
unkown
page write copy
malicious
23DD000
heap
page read and write
malicious
40F000
unkown
page write copy
malicious
42E000
unkown
page read and write
malicious
710000
unkown
page readonly
malicious
40F000
unkown
page write copy
malicious
710000
unkown
page readonly
malicious
710000
unkown
page readonly
malicious
710000
unkown
page readonly
malicious
2E4E000
stack
page read and write
D06F000
stack
page read and write
AFEF000
stack
page read and write
C92E000
stack
page read and write
CCAF000
stack
page read and write
986E000
stack
page read and write
C00000
heap
page read and write
6C6F000
stack
page read and write
E9AE000
stack
page read and write
401000
unkown
page execute read
F8F000
stack
page read and write
D98000
heap
page read and write
4BEF000
stack
page read and write
492E000
stack
page read and write
87EF000
stack
page read and write
B12F000
stack
page read and write
8BAF000
stack
page read and write
2A1F000
stack
page read and write
EAEE000
stack
page read and write
2E20000
heap
page read and write
B7E000
stack
page read and write
76AE000
stack
page read and write
2F3A000
heap
page read and write
7F2F000
stack
page read and write
C3EF000
stack
page read and write
2E2E000
stack
page read and write
496E000
stack
page read and write
D8D000
heap
page read and write
2CEE000
stack
page read and write
C7EE000
stack
page read and write
D92F000
stack
page read and write
4590000
heap
page read and write
A9EE000
stack
page read and write
4D6E000
stack
page read and write
2CAF000
stack
page read and write
95F000
stack
page read and write
2CEE000
stack
page read and write
BB6E000
stack
page read and write
C2AF000
stack
page read and write
E72E000
stack
page read and write
2CDE000
stack
page read and write
1ADE000
stack
page read and write
B50000
heap
page read and write
1A9F000
stack
page read and write
6DEE000
stack
page read and write
FB0000
heap
page read and write
D1AF000
stack
page read and write
B9D000
heap
page read and write
408000
unkown
page readonly
6B6E000
stack
page read and write
B5E000
heap
page read and write
396E000
stack
page read and write
CDE000
stack
page read and write
5EEF000
stack
page read and write
9FEE000
stack
page read and write
B9E000
stack
page read and write
EFAF000
stack
page read and write
AC2F000
stack
page read and write
7B6F000
stack
page read and write
2F4F000
stack
page read and write
D42F000
stack
page read and write
E4AE000
stack
page read and write
B66E000
stack
page read and write
BC6F000
stack
page read and write
63EE000
stack
page read and write
742E000
stack
page read and write
6CAE000
stack
page read and write
F2F000
stack
page read and write
792E000
stack
page read and write
856F000
stack
page read and write
896E000
stack
page read and write
CE2E000
stack
page read and write
321E000
stack
page read and write
B55000
heap
page read and write
401000
unkown
page execute read
780000
heap
page read and write
ADAE000
stack
page read and write
B02E000
stack
page read and write
4CEF000
stack
page read and write
319F000
stack
page read and write
436E000
stack
page read and write
BBC000
heap
page read and write
C6AE000
stack
page read and write
D32E000
stack
page read and write
356F000
stack
page read and write
2F40000
heap
page read and write
806F000
stack
page read and write
2F9E000
stack
page read and write
562E000
stack
page read and write
7DEF000
stack
page read and write
702F000
stack
page read and write
A4AF000
stack
page read and write
892F000
stack
page read and write
2BDE000
stack
page read and write
D38000
heap
page read and write
D0E000
stack
page read and write
A22F000
stack
page read and write
4D2E000
stack
page read and write
C52F000
stack
page read and write
2EBE000
stack
page read and write
E1EF000
stack
page read and write
40F000
unkown
page write copy
43E000
stack
page read and write
73EF000
stack
page read and write
DE2F000
stack
page read and write
D96E000
stack
page read and write
650000
heap
page read and write
37EF000
stack
page read and write
B7AE000
stack
page read and write
DEF000
heap
page read and write
B5A000
heap
page read and write
E5EE000
stack
page read and write
D46E000
stack
page read and write
3270000
heap
page read and write
C8EF000
stack
page read and write
B8AF000
stack
page read and write
B50000
heap
page read and write
D7D000
heap
page read and write
B2AE000
stack
page read and write
2B60000
heap
page read and write
6B2F000
stack
page read and write
309E000
stack
page read and write
CBAE000
stack
page read and write
2AAB000
stack
page read and write
2A5E000
stack
page read and write
D7EF000
stack
page read and write
FC0000
heap
page read and write
2AEC000
stack
page read and write
602F000
stack
page read and write
2DEF000
stack
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
666E000
stack
page read and write
40B000
unkown
page write copy
4AAF000
stack
page read and write
91EF000
stack
page read and write
31DE000
stack
page read and write
2F0F000
stack
page read and write
95EE000
stack
page read and write
2F30000
heap
page read and write
78EF000
stack
page read and write
982F000
stack
page read and write
9C000
stack
page read and write
A26E000
stack
page read and write
446F000
stack
page read and write
410000
unkown
page readonly
3000000
heap
page read and write
BC0000
heap
page read and write
431000
unkown
page read and write
BEEF000
stack
page read and write
F7E000
stack
page read and write
2DC0000
heap
page read and write
706E000
stack
page read and write
2B0E000
stack
page read and write
309E000
stack
page read and write
AEAF000
stack
page read and write
CB6F000
stack
page read and write
D1EE000
stack
page read and write
1E9E000
stack
page read and write
185E000
stack
page read and write
9D2F000
stack
page read and write
5DEE000
stack
page read and write
B40000
heap
page read and write
431000
unkown
page read and write
B26F000
stack
page read and write
DCD000
heap
page read and write
AFE000
stack
page read and write
A3AE000
stack
page read and write
9FAF000
stack
page read and write
68AF000
stack
page read and write
932F000
stack
page read and write
331E000
stack
page read and write
35AE000
stack
page read and write
6F2E000
stack
page read and write
400000
unkown
page readonly
41EF000
stack
page read and write
52AF000
stack
page read and write
D5B000
heap
page read and write
346E000
stack
page read and write
DF6F000
stack
page read and write
422E000
stack
page read and write
50AF000
stack
page read and write
410000
unkown
page readonly
DF0000
heap
page read and write
40E000
unkown
page write copy
7BAE000
stack
page read and write
CF6E000
stack
page read and write
EFEE000
stack
page read and write
846E000
stack
page read and write
B62F000
stack
page read and write
C06E000
stack
page read and write
400000
unkown
page readonly
19D000
stack
page read and write
2E1E000
stack
page read and write
40E000
unkown
page write copy
382E000
stack
page read and write
48AE000
stack
page read and write
E5AF000
stack
page read and write
3D2E000
stack
page read and write
3CEF000
stack
page read and write
7CEE000
stack
page read and write
77EE000
stack
page read and write
9BEF000
stack
page read and write
72AF000
stack
page read and write
54EE000
stack
page read and write
49AE000
stack
page read and write
E6EF000
stack
page read and write
40B000
unkown
page write copy
401000
unkown
page execute read
BA2E000
stack
page read and write
AB2E000
stack
page read and write
ED2F000
stack
page read and write
CA6E000
stack
page read and write
BF2E000
stack
page read and write
2DEF000
stack
page read and write
BB2F000
stack
page read and write
B76F000
stack
page read and write
A9AF000
stack
page read and write
E0AF000
stack
page read and write
F6E000
stack
page read and write
8CEF000
stack
page read and write
BDEE000
stack
page read and write
40B000
unkown
page write copy
DA6F000
stack
page read and write
5DAF000
stack
page read and write
64EF000
stack
page read and write
3E6E000
stack
page read and write
D30000
heap
page read and write
54AF000
stack
page read and write
40A000
unkown
page readonly
D7D000
heap
page read and write
B25000
heap
page read and write
996F000
stack
page read and write
DFA000
heap
page read and write
3BEE000
stack
page read and write
53AF000
stack
page read and write
9AAF000
stack
page read and write
40A000
unkown
page readonly
32DF000
stack
page read and write
DBAF000
stack
page read and write
936E000
stack
page read and write
40EE000
stack
page read and write
8FAE000
stack
page read and write
94AE000
stack
page read and write
29E0000
heap
page read and write
486F000
stack
page read and write
1C0000
heap
page read and write
B9EF000
stack
page read and write
86EE000
stack
page read and write
A4EE000
stack
page read and write
9EAE000
stack
page read and write
B3AF000
stack
page read and write
2DDF000
stack
page read and write
48FE000
stack
page read and write
40B000
unkown
page write copy
1F0000
heap
page read and write
752F000
stack
page read and write
493F000
stack
page read and write
408000
unkown
page readonly
716F000
stack
page read and write
7E2E000
stack
page read and write
F0EF000
stack
page read and write
C42E000
stack
page read and write
14D000
stack
page read and write
BE0000
heap
page read and write
D2EF000
stack
page read and write
40A000
unkown
page readonly
400000
unkown
page readonly
B4EF000
stack
page read and write
2E30000
heap
page read and write
882E000
stack
page read and write
2F1F000
stack
page read and write
C66F000
stack
page read and write
CA2F000
stack
page read and write
58AE000
stack
page read and write
BCAE000
stack
page read and write
E82F000
stack
page read and write
BDAF000
stack
page read and write
D10000
heap
page read and write
36AF000
stack
page read and write
55EF000
stack
page read and write
400000
unkown
page readonly
DCEF000
stack
page read and write
2A5E000
stack
page read and write
BC6000
heap
page read and write
85AE000
stack
page read and write
63AF000
stack
page read and write
65F000
heap
page read and write
62AE000
stack
page read and write
2EFE000
stack
page read and write
6EEF000
stack
page read and write
512E000
stack
page read and write
667000
heap
page read and write
2B6F000
stack
page read and write
67AE000
stack
page read and write
A86F000
stack
page read and write
40A000
unkown
page readonly
582F000
stack
page read and write
3F6F000
stack
page read and write
2F2F000
stack
page read and write
1D9E000
stack
page read and write
3360000
heap
page read and write
832E000
stack
page read and write
408000
unkown
page readonly
71AE000
stack
page read and write
2F9D000
stack
page read and write
3A6F000
stack
page read and write
2B20000
heap
page read and write
2E60000
heap
page read and write
341F000
stack
page read and write
80AE000
stack
page read and write
4FAF000
stack
page read and write
65B000
heap
page read and write
1F0000
heap
page read and write
199E000
stack
page read and write
CCEE000
stack
page read and write
5AAF000
stack
page read and write
BBF000
heap
page read and write
1B0000
heap
page read and write
842F000
stack
page read and write
300A000
heap
page read and write
31DE000
stack
page read and write
D80000
heap
page read and write
F1F000
stack
page read and write
6A2E000
stack
page read and write
8D2E000
stack
page read and write
F20000
heap
page read and write
A8AE000
stack
page read and write
D6EE000
stack
page read and write
1EAE000
heap
page read and write
2BAF000
stack
page read and write
2F5E000
stack
page read and write
616E000
stack
page read and write
E0EE000
stack
page read and write
69EF000
stack
page read and write
D0AE000
stack
page read and write
3AAE000
stack
page read and write
E36E000
stack
page read and write
9D6E000
stack
page read and write
B3EE000
stack
page read and write
45AF000
stack
page read and write
59AF000
stack
page read and write
36EE000
stack
page read and write
40E000
unkown
page write copy
4EAE000
stack
page read and write
D6AF000
stack
page read and write
392F000
stack
page read and write
FB7000
heap
page read and write
C56E000
stack
page read and write
972E000
stack
page read and write
40A000
unkown
page readonly
8F6F000
stack
page read and write
401000
unkown
page execute read
DE6E000
stack
page read and write
AEEE000
stack
page read and write
A12E000
stack
page read and write
23C2000
heap
page read and write
766F000
stack
page read and write
6030000
heap
page read and write
408000
unkown
page readonly
40A000
unkown
page readonly
9E6F000
stack
page read and write
D56F000
stack
page read and write
30DE000
stack
page read and write
42F000
unkown
page write copy
EEAE000
stack
page read and write
572F000
stack
page read and write
C7AF000
stack
page read and write
441F000
stack
page read and write
3420000
heap
page read and write
652E000
stack
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
40B000
unkown
page write copy
81EE000
stack
page read and write
401000
unkown
page execute read
48EE000
stack
page read and write
195D000
stack
page read and write
7A6E000
stack
page read and write
A5EF000
stack
page read and write
586E000
stack
page read and write
662F000
stack
page read and write
A70000
heap
page read and write
AAEF000
stack
page read and write
2B7B000
stack
page read and write
6DAF000
stack
page read and write
676F000
stack
page read and write
2F9E000
stack
page read and write
E32F000
stack
page read and write
A5F000
stack
page read and write
29D0000
heap
page read and write
A72F000
stack
page read and write
82EF000
stack
page read and write
31DB000
stack
page read and write
95AF000
stack
page read and write
AC6E000
stack
page read and write
FAD000
stack
page read and write
8E6E000
stack
page read and write
2CAF000
stack
page read and write
D73000
heap
page read and write
BC5000
heap
page read and write
1BDF000
stack
page read and write
68EE000
stack
page read and write
B8EE000
stack
page read and write
96EF000
stack
page read and write
40B000
unkown
page write copy
E1F000
stack
page read and write
B16E000
stack
page read and write
72EE000
stack
page read and write
3BAF000
stack
page read and write
99AE000
stack
page read and write
400000
unkown
page readonly
ED6E000
stack
page read and write
5CAF000
stack
page read and write
DAAE000
stack
page read and write
EC2E000
stack
page read and write
DFAE000
stack
page read and write
A0EF000
stack
page read and write
305F000
stack
page read and write
EAAF000
stack
page read and write
2B5F000
stack
page read and write
432F000
stack
page read and write
A76E000
stack
page read and write
331E000
stack
page read and write
9AEE000
stack
page read and write
E46F000
stack
page read and write
5BAF000
stack
page read and write
8AAE000
stack
page read and write
A36F000
stack
page read and write
1F0000
heap
page read and write
431000
unkown
page read and write
DD2E000
stack
page read and write
90EE000
stack
page read and write
19D000
stack
page read and write
2BAE000
stack
page read and write
A62E000
stack
page read and write
400000
unkown
page readonly
D5AE000
stack
page read and write
410000
unkown
page readonly
410000
unkown
page readonly
2B50000
heap
page read and write
49F0000
heap
page read and write
476F000
stack
page read and write
D4E000
stack
page read and write
B20000
heap
page read and write
401000
unkown
page execute read
47E000
stack
page read and write
E96F000
stack
page read and write
401000
unkown
page execute read
626F000
stack
page read and write
9C000
stack
page read and write
CCF000
stack
page read and write
3FAE000
stack
page read and write
C2EE000
stack
page read and write
2BBC000
stack
page read and write
3E2F000
stack
page read and write
7A2F000
stack
page read and write
CF2F000
stack
page read and write
516E000
stack
page read and write
40E000
unkown
page write copy
77AF000
stack
page read and write
2F50000
heap
page read and write
C9F000
stack
page read and write
2FDF000
stack
page read and write
FBE000
stack
page read and write
2B9E000
stack
page read and write
90AF000
stack
page read and write
9C2E000
stack
page read and write
1D2F000
stack
page read and write
1EB2000
heap
page read and write
DBEE000
stack
page read and write
CDEF000
stack
page read and write
E86E000
stack
page read and write
D90000
heap
page read and write
5ED000
stack
page read and write
EE6F000
stack
page read and write
8BEE000
stack
page read and write
AD6F000
stack
page read and write
EBEF000
stack
page read and write
40AF000
stack
page read and write
B52E000
stack
page read and write
32A0000
heap
page read and write
4AEE000
stack
page read and write
E22E000
stack
page read and write
756E000
stack
page read and write
51AE000
stack
page read and write
81AF000
stack
page read and write
7F6E000
stack
page read and write
2C9F000
stack
page read and write
C16F000
stack
page read and write
8A6F000
stack
page read and write
45FE000
stack
page read and write
28F0000
heap
page read and write
309B000
stack
page read and write
2B2A000
heap
page read and write
19D000
stack
page read and write
946F000
stack
page read and write
401000
unkown
page execute read
B80000
heap
page read and write
4E6F000
stack
page read and write
400000
unkown
page readonly
7CAF000
stack
page read and write
285B000
stack
page read and write
466E000
stack
page read and write
D82E000
stack
page read and write
401000
unkown
page execute read
ABE000
stack
page read and write
9C000
stack
page read and write
30DD000
stack
page read and write
C1AE000
stack
page read and write
C02F000
stack
page read and write
922E000
stack
page read and write
86AF000
stack
page read and write
50EE000
stack
page read and write
3170000
heap
page read and write
291E000
stack
page read and write
289C000
stack
page read and write
1C2E000
stack
page read and write
2A9F000
stack
page read and write
44AE000
stack
page read and write
8E2F000
stack
page read and write
5F2E000
stack
page read and write
There are 526 hidden memdumps, click here to show them.