IOC Report
KJKJJJECFI.exe

loading gif

Files

File Path
Type
Category
Malicious
KJKJJJECFI.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\qsbtcxh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\regex_1[1].htm
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\4476cd9c
data
dropped
C:\Users\user\AppData\Local\Temp\ivls
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Oct 4 13:16:50 2023, mtime=Thu Apr 4 09:36:55 2024, atime=Thu Apr 4 09:36:52 2024, length=6699592, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KJKJJJECFI.exe
"C:\Users\user\Desktop\KJKJJJECFI.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Roaming\NBFoundation\Sendevsvc.exe
"C:\Users\user\AppData\Roaming\NBFoundation\Sendevsvc.exe"

URLs

Name
IP
Malicious
pleasurecanbesafe.com/7vAficZogD/index.php
malicious
https://www.math.utah.edu/docs/info/regex_1.html/
unknown
http://www.vmware.com/0
unknown
https://www.math.utah.edu/docs/info/regex_1.html0
unknown
http://care-eyes.com/careueyes/v1/pay/query_license.php&method=leftcodesubscriptionend
unknown
http://care-eyes.com/careueyes/v1/config/switch.datenablehttp://care-eyes.com/careueyes/v1/config/sw
unknown
http://care-eyes.com/careueyes/v1/main/feedback_msg.php?uuid=%s&tm=%I64d&ver=%s&it=%shttp://care-eye
unknown
https://care-eyes.com/what-is-pomodoro-technique/
unknown
https://www.math.utah.edu/docs/info/regex_1.htmly
unknown
http://www.vmware.com/0/
unknown
https://care-eyes.com?about
unknown
https://bit.ly/3feVIiYfinder
unknown
https://www.math.utah.edu/docs/info/regex_1.htmlws
unknown
http://crl4.digicer
unknown
http://www.symauth.com/cps0(
unknown
https://d.symcb.co
unknown
http://c0rl.m
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
http://care-eyes.com/invite/query_rewards.phpid=http://care-eyes.com/invite.html?inv=%s/RtlGetNtVers
unknown
https://care-eyes.com/how-to-use-magicx-feature/%.2fs$8
unknown
https://care-eyes.com/buy.html?uuid=%s&tm=%I64d&ver=%s&it=%sd
unknown
https://bit.ly/3feVIiY
unknown
https://bit.ly/3feVIiYUEyes
unknown
https://www.math.utah.edu/docs/info/regex_1.htmlU
unknown
https://care-eyes.com/license-reset.html
unknown
https://api.myip.la/en?jsonhttp://ip-api.com/jsonhttps://ipv4.ip.nf/me.jsonhttps://freegeoip.app/jso
unknown
http://www.symauth.com/rpa00
unknown
http://www.info-zip.org/
unknown
https://care-eyes.com/how-to-use-sunrise-sunset-feature/openslider_orange_progressslider_orange_bart
unknown
https://www.math.utah.edu/docs/info/regex_1.html
155.101.98.133
https://www.math.utah.edu/
unknown
http://care-eyes.com/careueyes/v1/analyzer/tj.html?uuid=%s&tm=%I64d&ver=%s&it=%s&reg=%dhttp://care-e
unknown
https://care-eyes.com/uninstall.htmlcom.careueyes.dimmer.json%s?activate=%dchannelconfig.datupd
unknown
http://crl3.d
unknown
https://care-eyes.com/how-to-use-magicx-feature/%.2fs$
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.math.utah.edu
155.101.98.133

IPs

IP
Domain
Country
Malicious
155.101.98.133
www.math.utah.edu
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533}
uuid
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM
GdiICMGammaRange

Memdumps

Base Address
Regiontype
Protect
Malicious
6040000
direct allocation
page read and write
malicious
5BCD000
heap
page read and write
malicious
4C77000
trusted library allocation
page read and write
malicious
2981000
unkown
page execute read
malicious
566B000
trusted library allocation
page read and write
malicious
1A16000
heap
page read and write
31B4000
heap
page read and write
1596000
heap
page read and write
15B0000
heap
page read and write
15A3000
heap
page read and write
47AC000
heap
page read and write
15B8000
heap
page read and write
1A13000
heap
page read and write
31B4000
heap
page read and write
1A6C000
heap
page read and write
31B4000
heap
page read and write
5120000
remote allocation
page read and write
5B00000
unkown
page read and write
331B000
heap
page read and write
3D1000
unkown
page execute read
3313000
heap
page read and write
3880000
trusted library section
page read and write
13AC000
unkown
page write copy
14BE000
stack
page read and write
1A2A000
heap
page read and write
47AC000
heap
page read and write
4E7D000
direct allocation
page read and write
38DB000
heap
page read and write
19F3000
heap
page read and write
1593000
heap
page read and write
1A18000
heap
page read and write
3313000
heap
page read and write
49E8000
heap
page read and write
15BC000
heap
page read and write
38D3000
heap
page read and write
15A8000
heap
page read and write
1A1B000
heap
page read and write
1A24000
heap
page read and write
4B9C000
stack
page read and write
1596000
heap
page read and write
29E6000
unkown
page readonly
1A2A000
heap
page read and write
31B4000
heap
page read and write
38D3000
heap
page read and write
331B000
heap
page read and write
5623000
trusted library allocation
page read and write
5D2F000
stack
page read and write
1A10000
heap
page read and write
1A1B000
heap
page read and write
38D3000
heap
page read and write
38D3000
heap
page read and write
31B4000
heap
page read and write
15C7000
heap
page read and write
331B000
heap
page read and write
38D5000
heap
page read and write
15B6000
heap
page read and write
38DB000
heap
page read and write
38D3000
heap
page read and write
31B4000
heap
page read and write
3313000
heap
page read and write
3110000
heap
page read and write
5AF1000
unkown
page read and write
19F6000
heap
page read and write
3313000
heap
page read and write
31B4000
heap
page read and write
15A7000
heap
page read and write
3313000
heap
page read and write
1A18000
heap
page read and write
158A000
heap
page read and write
331B000
heap
page read and write
38D3000
heap
page read and write
31B4000
heap
page read and write
19AE000
stack
page read and write
331B000
heap
page read and write
1597000
heap
page read and write
38D3000
heap
page read and write
4740000
heap
page read and write
4E79000
direct allocation
page read and write
8B5000
unkown
page readonly
331B000
heap
page read and write
331B000
heap
page read and write
1A07000
heap
page read and write
14C0000
heap
page read and write
885000
unkown
page write copy
331B000
heap
page read and write
15C6000
heap
page read and write
31B4000
heap
page read and write
5AF1000
unkown
page read and write
19F6000
heap
page read and write
3D0000
unkown
page readonly
31B4000
heap
page read and write
38D3000
heap
page read and write
3313000
heap
page read and write
6129000
trusted library allocation
page read and write
1A18000
heap
page read and write
4EEE000
direct allocation
page read and write
1A1B000
heap
page read and write
3D91000
heap
page read and write
147E000
stack
page read and write
31B4000
heap
page read and write
1960000
heap
page read and write
31B0000
heap
page read and write
2D40000
heap
page read and write
5A9D000
heap
page read and write
38D0000
heap
page read and write
1A6A000
heap
page read and write
2EA8000
heap
page read and write
53E9000
heap
page read and write
59EF000
heap
page read and write
331B000
heap
page read and write
38D3000
heap
page read and write
37D0000
heap
page read and write
14D9000
unkown
page readonly
1A24000
heap
page read and write
887000
unkown
page write copy
12FA000
stack
page read and write
3D91000
heap
page read and write
1A73000
heap
page read and write
15C6000
heap
page read and write
47AC000
heap
page read and write
3313000
heap
page read and write
3AD9000
trusted library allocation
page read and write
1596000
heap
page read and write
1598000
heap
page read and write
5FE0000
unkown
page read and write
13AA000
unkown
page write copy
14D0000
heap
page read and write
5AF1000
unkown
page read and write
52C6000
heap
page read and write
3661000
heap
page read and write
303C000
stack
page read and write
4748000
heap
page read and write
1A1D000
heap
page read and write
88C000
unkown
page write copy
42EF000
trusted library allocation
page read and write
47AC000
heap
page read and write
1970000
heap
page read and write
4741000
heap
page read and write
31B4000
heap
page read and write
331B000
heap
page read and write
5C2E000
stack
page read and write
1A6F000
heap
page read and write
331B000
heap
page read and write
159F000
heap
page read and write
3315000
heap
page read and write
1A2A000
heap
page read and write
5120000
remote allocation
page read and write
67D2000
unkown
page read and write
331B000
heap
page read and write
3190000
heap
page read and write
15BC000
heap
page read and write
15C6000
heap
page read and write
3313000
heap
page read and write
1593000
heap
page read and write
13D2000
unkown
page read and write
9B9000
unkown
page readonly
35910000
direct allocation
page execute read
1A19000
heap
page read and write
19B0000
heap
page read and write
31B4000
heap
page read and write
515E000
stack
page read and write
4A9D000
stack
page read and write
31B4000
heap
page read and write
47AC000
heap
page read and write
EF0000
unkown
page readonly
1E5C000
stack
page read and write
15B9000
heap
page read and write
14D9000
unkown
page readonly
31B4000
heap
page read and write
47AC000
heap
page read and write
5AF1000
unkown
page read and write
1AC7000
heap
page read and write
3B6F000
trusted library allocation
page read and write
4219000
trusted library allocation
page read and write
3313000
heap
page read and write
38DB000
heap
page read and write
15B2000
heap
page read and write
1AC5000
heap
page read and write
3664000
heap
page read and write
38D3000
heap
page read and write
3890000
trusted library section
page read and write
47AC000
heap
page read and write
15BD000
heap
page read and write
331B000
heap
page read and write
47AC000
heap
page read and write
42AF000
trusted library allocation
page read and write
294D000
stack
page read and write
1A6A000
heap
page read and write
38D3000
heap
page read and write
1A18000
heap
page read and write
38DB000
heap
page read and write
38DB000
heap
page read and write
31B4000
heap
page read and write
47AC000
heap
page read and write
14AF000
unkown
page readonly
1E70000
heap
page read and write
47AC000
heap
page read and write
38DB000
heap
page read and write
159A000
heap
page read and write
158A000
heap
page read and write
1A22000
heap
page read and write
EF1000
unkown
page execute read
612D000
trusted library allocation
page read and write
47AC000
heap
page read and write
4313000
heap
page read and write
38D3000
heap
page read and write
38D3000
heap
page read and write
3660000
heap
page read and write
29E1000
unkown
page write copy
31B4000
heap
page read and write
4840000
trusted library allocation
page read and write
1A2C000
heap
page read and write
331B000
heap
page read and write
1975000
heap
page read and write
5CA9000
heap
page read and write
525F000
stack
page read and write
50AE000
stack
page read and write
15A7000
heap
page read and write
3313000
heap
page read and write
1A9B000
heap
page read and write
47AC000
heap
page read and write
47AC000
heap
page read and write
1973000
heap
page read and write
19F7000
heap
page read and write
47AC000
heap
page read and write
1A49000
heap
page read and write
3313000
heap
page read and write
47AC000
heap
page read and write
19F5000
heap
page read and write
15B9000
heap
page read and write
353E000
stack
page read and write
1DDE000
stack
page read and write
5740000
direct allocation
page read and write
1560000
heap
page read and write
1A08000
heap
page read and write
38DB000
heap
page read and write
2D70000
heap
page read and write
47AC000
heap
page read and write
3000000
heap
page read and write
98F000
unkown
page readonly
3671000
heap
page read and write
19F3000
heap
page read and write
35910000
direct allocation
page execute read
15C8000
heap
page read and write
19FF000
heap
page read and write
31B4000
heap
page read and write
477C000
heap
page read and write
47AC000
heap
page read and write
1A11000
heap
page read and write
1599000
heap
page read and write
331B000
heap
page read and write
159F000
heap
page read and write
9B9000
unkown
page readonly
1A11000
heap
page read and write
38DB000
heap
page read and write
15B0000
heap
page read and write
4CDF000
stack
page read and write
3313000
heap
page read and write
13A9000
unkown
page read and write
3313000
heap
page read and write
3313000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3313000
heap
page read and write
1A6F000
heap
page read and write
1597000
heap
page read and write
3313000
heap
page read and write
4E79000
heap
page read and write
31B4000
heap
page read and write
1568000
heap
page read and write
47AC000
heap
page read and write
1A2B000
heap
page read and write
31B4000
heap
page read and write
3664000
heap
page read and write
1A6F000
heap
page read and write
1A2A000
heap
page read and write
1A2A000
heap
page read and write
19EA000
heap
page read and write
1A6F000
heap
page read and write
13A5000
unkown
page read and write
1A02000
heap
page read and write
3D80000
heap
page execute and read and write
331B000
heap
page read and write
1A11000
heap
page read and write
15A7000
heap
page read and write
19F6000
heap
page read and write
1597000
heap
page read and write
5AF1000
unkown
page read and write
31B4000
heap
page read and write
19F7000
heap
page read and write
38D3000
heap
page read and write
331B000
heap
page read and write
31B4000
heap
page read and write
15A3000
heap
page read and write
38D3000
heap
page read and write
3313000
heap
page read and write
5EAE000
stack
page read and write
47AC000
heap
page read and write
13A7000
unkown
page write copy
1597000
heap
page read and write
331B000
heap
page read and write
31A0000
direct allocation
page read and write
47AC000
heap
page read and write
38D3000
heap
page read and write
15BF000
heap
page read and write
19F7000
heap
page read and write
1A1B000
heap
page read and write
13BA000
unkown
page read and write
1A19000
heap
page read and write
3764000
heap
page read and write
3D90000
heap
page read and write
1598000
heap
page read and write
3890000
trusted library allocation
page read and write
38D3000
heap
page read and write
1AC0000
heap
page read and write
15E6000
heap
page read and write
5348000
heap
page read and write
1A6F000
heap
page read and write
5E6E000
stack
page read and write
1593000
heap
page read and write
38D3000
heap
page read and write
175E000
stack
page read and write
1A6F000
heap
page read and write
1A2B000
heap
page read and write
38DB000
heap
page read and write
6590000
unkown
page read and write
31B4000
heap
page read and write
885000
unkown
page read and write
3313000
heap
page read and write
31B4000
heap
page read and write
15C6000
heap
page read and write
31B4000
heap
page read and write
1A1B000
heap
page read and write
47AC000
heap
page read and write
1E77000
heap
page read and write
38DB000
heap
page read and write
5AF1000
unkown
page read and write
38DB000
heap
page read and write
15BF000
heap
page read and write
31B4000
heap
page read and write
1A6A000
heap
page read and write
15C6000
heap
page read and write
313A000
stack
page read and write
1A13000
heap
page read and write
4FAE000
stack
page read and write
15BC000
heap
page read and write
8B5000
unkown
page readonly
29CF000
unkown
page readonly
1591000
heap
page read and write
31FC000
heap
page read and write
1A18000
heap
page read and write
1360000
heap
page read and write
15BA000
heap
page read and write
1597000
heap
page read and write
1A6F000
heap
page read and write
4797000
heap
page read and write
331B000
heap
page read and write
EF1000
unkown
page execute read
1A6F000
heap
page read and write
15B1000
heap
page read and write
88B000
unkown
page read and write
159A000
heap
page read and write
47AC000
heap
page read and write
2C20000
heap
page read and write
1CDE000
stack
page read and write
331B000
heap
page read and write
5AF1000
unkown
page read and write
495C000
stack
page read and write
13AB000
unkown
page read and write
15C6000
heap
page read and write
15BE000
heap
page read and write
1A02000
heap
page read and write
47AC000
heap
page read and write
31B4000
heap
page read and write
1598000
heap
page read and write
331B000
heap
page read and write
38DB000
heap
page read and write
31B4000
heap
page read and write
3966000
heap
page read and write
1C9E000
stack
page read and write
3313000
heap
page read and write
74D000
unkown
page readonly
38DB000
heap
page read and write
1A50000
heap
page read and write
47AC000
heap
page read and write
5B77000
heap
page read and write
331B000
heap
page read and write
386F000
stack
page read and write
47AC000
heap
page read and write
3313000
heap
page read and write
3313000
heap
page read and write
3313000
heap
page read and write
3313000
heap
page read and write
15C6000
heap
page read and write
375D000
stack
page read and write
14AF000
unkown
page readonly
1A6A000
heap
page read and write
38D3000
heap
page read and write
47AC000
heap
page read and write
15C6000
heap
page read and write
38DB000
heap
page read and write
31B4000
heap
page read and write
47AC000
heap
page read and write
3664000
heap
page read and write
19FA000
heap
page read and write
47AC000
heap
page read and write
38D3000
heap
page read and write
331B000
heap
page read and write
31B4000
heap
page read and write
3313000
heap
page read and write
47AC000
heap
page read and write
40A0000
heap
page read and write
38DB000
heap
page read and write
15B6000
heap
page read and write
19F7000
heap
page read and write
6000000
trusted library allocation
page read and write
1A3A000
heap
page read and write
5AF1000
unkown
page read and write
1598000
heap
page read and write
331B000
heap
page read and write
15B8000
heap
page read and write
586D000
direct allocation
page read and write
363E000
stack
page read and write
15C7000
heap
page read and write
3313000
heap
page read and write
3251000
heap
page read and write
331B000
heap
page read and write
47AC000
heap
page read and write
15C7000
heap
page read and write
31B4000
heap
page read and write
47AC000
heap
page read and write
15C6000
heap
page read and write
15C9000
heap
page read and write
31B4000
heap
page read and write
38DB000
heap
page read and write
1A2A000
heap
page read and write
1520000
heap
page read and write
4D50000
direct allocation
page read and write
15A3000
heap
page read and write
3310000
heap
page read and write
19FA000
heap
page read and write
19EA000
heap
page read and write
3FB0000
trusted library allocation
page read and write
4797000
heap
page read and write
159F000
heap
page read and write
4848000
heap
page read and write
47AC000
heap
page read and write
331B000
heap
page read and write
15C8000
heap
page read and write
678A000
unkown
page read and write
47AC000
heap
page read and write
5AF1000
unkown
page read and write
38D3000
heap
page read and write
48C5000
heap
page read and write
47AC000
heap
page read and write
64E7000
unkown
page read and write
3870000
trusted library allocation
page read and write
5AF1000
unkown
page read and write
5AF0000
unkown
page read and write
31B4000
heap
page read and write
15C6000
heap
page read and write
38D3000
heap
page read and write
5AF1000
unkown
page read and write
3660000
heap
page read and write
1A2A000
heap
page read and write
31B4000
heap
page read and write
31B4000
heap
page read and write
15C7000
heap
page read and write
1A8A000
heap
page read and write
1A15000
heap
page read and write
31B4000
heap
page read and write
47AC000
heap
page read and write
15FA000
stack
page read and write
371E000
stack
page read and write
38D3000
heap
page read and write
31B4000
heap
page read and write
47AC000
heap
page read and write
3850000
trusted library allocation
page read and write
31B4000
heap
page read and write
38D3000
heap
page read and write
3313000
heap
page read and write
1A18000
heap
page read and write
15B8000
heap
page read and write
290C000
stack
page read and write
58DE000
direct allocation
page read and write
3BD3000
heap
page read and write
38DB000
heap
page read and write
38D3000
heap
page read and write
158A000
heap
page read and write
31B4000
heap
page read and write
1597000
heap
page read and write
38DB000
heap
page read and write
1A2A000
heap
page read and write
38DB000
heap
page read and write
126D000
unkown
page readonly
38D3000
heap
page read and write
3D1000
unkown
page execute read
1A5A000
heap
page read and write
1A2B000
heap
page read and write
3313000
heap
page read and write
4C2F000
trusted library allocation
page read and write
13CE000
unkown
page read and write
5AF1000
unkown
page read and write
43E0000
heap
page read and write
74D000
unkown
page readonly
31B4000
heap
page read and write
3D0000
unkown
page readonly
3311000
heap
page read and write
5422000
heap
page read and write
47AC000
heap
page read and write
4E5F000
stack
page read and write
5AF1000
unkown
page read and write
47AC000
heap
page read and write
1A49000
heap
page read and write
1A6F000
heap
page read and write
15C7000
heap
page read and write
1A2B000
heap
page read and write
3315000
heap
page read and write
3661000
heap
page read and write
8B2000
unkown
page read and write
5FAE000
stack
page read and write
31B4000
heap
page read and write
15C6000
heap
page read and write
38DB000
heap
page read and write
126D000
unkown
page readonly
3F90000
trusted library allocation
page read and write
1A2A000
heap
page read and write
1597000
heap
page read and write
3180000
heap
page read and write
3313000
heap
page read and write
31B4000
heap
page read and write
1593000
heap
page read and write
29EC000
unkown
page write copy
47AC000
heap
page read and write
18FA000
stack
page read and write
EF0000
unkown
page readonly
15B8000
heap
page read and write
1AA1000
heap
page read and write
38D5000
heap
page read and write
619E000
trusted library allocation
page read and write
19FB000
heap
page read and write
15D7000
heap
page read and write
38DB000
heap
page read and write
3313000
heap
page read and write
FFA000
stack
page read and write
47AC000
heap
page read and write
4730000
heap
page read and write
4812000
heap
page read and write
31B4000
heap
page read and write
19C8000
heap
page read and write
63C4000
unkown
page read and write
5869000
direct allocation
page read and write
1AB4000
heap
page read and write
1A1B000
heap
page read and write
47AC000
heap
page read and write
5AF1000
unkown
page read and write
4A5D000
stack
page read and write
3313000
heap
page read and write
38D3000
heap
page read and write
4BDE000
stack
page read and write
38DB000
heap
page read and write
31B4000
heap
page read and write
3313000
heap
page read and write
5AF1000
unkown
page read and write
15B6000
heap
page read and write
47AC000
heap
page read and write
47AC000
heap
page read and write
5DCC000
heap
page read and write
13A5000
unkown
page write copy
47AC000
heap
page read and write
1599000
heap
page read and write
5120000
remote allocation
page read and write
15C6000
heap
page read and write
1598000
heap
page read and write
31B4000
heap
page read and write
38DB000
heap
page read and write
38D3000
heap
page read and write
3760000
heap
page read and write
38D3000
heap
page read and write
38D3000
heap
page read and write
331B000
heap
page read and write
331B000
heap
page read and write
38D3000
heap
page read and write
331B000
heap
page read and write
1A13000
heap
page read and write
3830000
heap
page execute and read and write
1A6A000
heap
page read and write
4D5E000
stack
page read and write
185F000
stack
page read and write
19C0000
heap
page read and write
47AC000
heap
page read and write
15C6000
heap
page read and write
1594000
heap
page read and write
31B4000
heap
page read and write
331B000
heap
page read and write
31B4000
heap
page read and write
3870000
trusted library section
page read and write
13D5000
unkown
page readonly
2EA0000
heap
page read and write
47AC000
heap
page read and write
47AC000
heap
page read and write
331B000
heap
page read and write
5D6D000
stack
page read and write
33FE000
unkown
page read and write
331B000
heap
page read and write
38DB000
heap
page read and write
1A6F000
heap
page read and write
15B1000
heap
page read and write
4E70000
heap
page read and write
15BE000
heap
page read and write
15B9000
heap
page read and write
4600000
heap
page read and write
89A000
unkown
page read and write
331B000
heap
page read and write
159E000
heap
page read and write
98F000
unkown
page readonly
159F000
heap
page read and write
3FD0000
trusted library allocation
page read and write
321C000
heap
page read and write
3312000
heap
page read and write
1597000
heap
page read and write
38DB000
heap
page read and write
4797000
heap
page read and write
47AC000
heap
page read and write
34FF000
unkown
page read and write
1A24000
heap
page read and write
19FE000
heap
page read and write
38DB000
heap
page read and write
331B000
heap
page read and write
1598000
heap
page read and write
331B000
heap
page read and write
38DB000
heap
page read and write
47AC000
heap
page read and write
38DB000
heap
page read and write
13D5000
unkown
page readonly
3313000
heap
page read and write
31F0000
heap
page read and write
6602000
unkown
page read and write
38D3000
heap
page read and write
331B000
heap
page read and write
31B4000
heap
page read and write
331B000
heap
page read and write
There are 631 hidden memdumps, click here to show them.