IOC Report
ursnif_IAT_corrected.exe.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll"
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll,DllRegisterServer
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll",#1

URLs

Name
IP
Malicious
http://linetwork.top/drew/NXo6zedpn_2B_/2BcanAQX/FnyJMATt_2F48kv6_2FGokp/FknJiZ4BPO/rcHYyBUZQ99j1sGoQ/3iqH_2FJ2MwI/44xXh3ewHre/Z3uYW8oE7cSgpQ/KoDoLpaNqGjAzcl7PDDtU/W4U8yO0BLXfpg6Fg/1LkQrB_2FwF36_2/F24Alce0F3ZIABc8fP/582wfkRmY/YYSggLyv6WiREP5aRpD7/BrtAiO3VnPYflPLClgV/qChVx2f_2BaPtkYL4DoePx/ugW_2FeHancyO/tXrlnouq/Hh9J5BBA0FEI0HWw67W05n9/zd1N.jlk
62.173.145.183
malicious
http://onlinetwork.top/
unknown
malicious
http://onlinetwork.top/)
unknown
malicious
http://onlinetwork.top/drew/u5bDuKFkXxAro/J7u_2BcQ/WcM5Uj0RwbHtvwyTUfix6_2/BcSLCk9FBn/ntIlUfYV61xDv7
unknown
malicious
http://linetwork.top/drew/NXo6zedpn_2B_/2BcanAQX/FnyJMATt_2F48kv6_2FGokp/FknJiZ4BPO/rcHYyBUZQ99j1sGo
unknown
malicious
http://onlinetwork.top/M
unknown
malicious
http://onlinetwork.top/drew/wmWOP2SQu9/lkwlizEoFo7LtzQm_/2FQKnjOJS7Fs/1omPLrC4w2x/K
unknown
malicious
http://linetwork.top/drew/cLUzScwIGd6lPZFBgwJAB/boGs7r3rpKnEEW26/IZwhyzcbrBr1vrh/pacdkNsvfXz_2BJd7M/
unknown
malicious
http://onlinetwork.top/drew/fkPc2r0gVHV/J_2FZDZ2sHG5ME/g7AZzNZ7pG5EAQpQ0yMPw/2o1hBcleFqeXJ_2F/_2BIHR
unknown
malicious
http://linetwork.top/drew/bBjIYvLPS6LWM/5hSIaVH5/Wq734Z_2BJdIJMJo3F9GITO/_2FcMitcTe/kWvqzZ_2B_2FKKbPA/PasXIoBqTiXU/g_2FlZW7Y_2/B41HTf6QrjFt_2/BVrbTt4PzlSq49i2n_2Bd/eYvDRtuGLt_2Fv6B/tiuwwj_2BAQltrY/i8qwn6NTmmAuX65G3U/G0pEw9pKd/5FnOrAI7ls4u0lmSvnEp/39rOvZP_2BCYyBu8UVC/tWjDwJwf88LN44CDcCSZK_/2BvPg5_2BjQiD/eLQzVCVR/WPugjRuufv7WeRl3hdeCsRv/aT5ChRiLQy/6L.jlk
62.173.145.183
malicious
http://linetwork.top/drew/fJ29sqPsP/PB4FnwvByjBglXFYEjZ1/hXe9prWt3B5GwuDq98v/uxK6HJV9Vv2hGb4_2BzE87/_2B7cwHJr4KZl/Z2JNy_2F/FQTy6SE98GzpaP4OycRAbeK/FNb75e_2BZ/vDSt33A5GpRAp0Wp5/3sRCo7L7mC_2/FRcDNZgk7ge/0DV7I1SHotZIJK/MawMR4TykLq9DH4qoWZqU/9lh5zRf0UXFuxlAr/44doOlzEgahzUed/pTo7pwfqznm_2FNsdD/ONqwlJdhn/hTW0RFx_2FoxngXj4_2B/7VTtckioJ/RQjhyCJh.jlk
62.173.145.183
malicious
http://linetwork.top/drew/cLUzScwIGd6lPZFBgwJAB/boGs7r3rpKnEEW26/IZwhyzcbrBr1vrh/pacdkNsvfXz_2BJd7M/nIUnH5UJy/lraLufWTWWuSthVJSQnB/skwB6_2F4mYx1hncPnC/DX7TcGWo1RJRVk4zslIVLg/yTztrtFucPEpP/M0MfTI80/ZOv2XL0MhanRoGMyGX9uAoo/dmIzHKJR6c/gnzW6jLfOR7yWUymL/vvx15g4IZ4jD/aDLfgoeX_2F/HE40tKUB0xmnED/5US9_2FwaFREdIsGRoa7p/JuiKle06sqYmlLWx/l.jlk
62.173.145.183
malicious
http://onlinetwork.top/drew/pkd6zgqwUDZasB/ZfiTcB208ordqnfSoXwRp/L_2FtDxOUhf3arTi/7kXxmpxOwIKTj9W/FF
unknown
malicious
http://linetwork.top/7
unknown
malicious
http://onlinetwork.top/drew/rlvNc0Gi62Z2w3Lq/XhEo009f5SrCecB/UqNEgSpKb_2FxSk3FP/SwVmULm50/faoxFounD5
unknown
malicious
http://linetwork.top/
unknown
malicious
http://config.ed4
unknown
http://config.edge.skype
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
linetwork.top
62.173.145.183
malicious
onlinetwork.top
31.41.44.194
malicious

IPs

IP
Domain
Country
Malicious
62.173.145.183
linetwork.top
Russian Federation
malicious
31.41.44.194
onlinetwork.top
Russian Federation
malicious
192.168.2.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1AC8000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
1379000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4B09000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
49B9000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4A49000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
4FF8000
heap
page read and write
malicious
1AC8000
heap
page read and write
malicious
4F88000
heap
page read and write
malicious
4EA8000
heap
page read and write
malicious
888000
heap
page read and write
896000
heap
page read and write
20F0A508000
heap
page read and write
2E3A000
unclassified section
page read and write
87C000
stack
page read and write
810000
heap
page read and write
20F0AF52000
heap
page read and write
2945000
heap
page read and write
20F0AF94000
heap
page read and write
20F0AFA2000
heap
page read and write
20F0AF91000
heap
page read and write
4AC8000
heap
page read and write
2DA0000
heap
page read and write
A5147FE000
stack
page read and write
20F0AFB3000
heap
page read and write
A5146FF000
stack
page read and write
548F000
stack
page read and write
4AC8000
heap
page read and write
2BDE000
heap
page read and write
20F0AFD6000
heap
page read and write
D16F9F9000
stack
page read and write
20F0AF91000
heap
page read and write
26DF2288000
heap
page read and write
53DE000
stack
page read and write
F6D5D0F000
stack
page read and write
A5145F7000
stack
page read and write
28D06C70000
heap
page read and write
2B89000
heap
page read and write
2E94000
heap
page read and write
7F1000
unclassified section
page execute read
26DF2150000
heap
page read and write
20F0AFA2000
heap
page read and write
28D06E90000
trusted library allocation
page read and write
F8E000
stack
page read and write
28D06E89000
heap
page read and write
2585C802000
unkown
page read and write
28D06C50000
trusted library allocation
page read and write
20F0A4C2000
heap
page read and write
20F0AFA3000
heap
page read and write
8BB000
stack
page read and write
20F0AE02000
heap
page read and write
26DF21C0000
heap
page read and write
28D07B90000
trusted library allocation
page read and write
4EAB000
heap
page read and write
2E95000
heap
page read and write
2B97000
heap
page read and write
20F0AF83000
heap
page read and write
36D178A000
stack
page read and write
20F0AFA3000
heap
page read and write
2CE0000
heap
page read and write
4AC8000
heap
page read and write
FCD000
stack
page read and write
4AC8000
heap
page read and write
21E08116000
heap
page read and write
28D06CAF000
heap
page read and write
4B88000
heap
page read and write
AB7000
heap
page read and write
45CA000
stack
page read and write
53A0000
trusted library allocation
page read and write
20F0AF91000
heap
page read and write
4A38000
heap
page read and write
20F0AFB4000
heap
page read and write
28D06A90000
trusted library allocation
page read and write
4F8B000
heap
page read and write
4BDD000
stack
page read and write
2D5E000
stack
page read and write
EFE000
stack
page read and write
DFE000
stack
page read and write
20F0AFA5000
heap
page read and write
4B88000
heap
page read and write
4B1F000
stack
page read and write
72382CB000
stack
page read and write
4B88000
heap
page read and write
36D1AFE000
stack
page read and write
7238CFB000
stack
page read and write
20F0AFB5000
heap
page read and write
9F0000
trusted library allocation
page read and write
20F0AF7F000
heap
page read and write
32A0000
trusted library allocation
page read and write
20F0AFA2000
heap
page read and write
20F0AF84000
heap
page read and write
26DF2265000
heap
page read and write
20F0A4B2000
heap
page read and write
20F0AF8B000
heap
page read and write
D16FAFE000
stack
page read and write
87B000
heap
page read and write
289B000
stack
page read and write
2CE5000
heap
page read and write
21E080C0000
heap
page read and write
20F0A413000
heap
page read and write
2E2C000
stack
page read and write
22E8DFE0000
heap
page read and write
10000000
unkown
page readonly
2900000
trusted library allocation
page read and write
20F0AF24000
heap
page read and write
547E000
stack
page read and write
16D0000
heap
page read and write
20F0AFA2000
heap
page read and write
22E8E250000
heap
page read and write
1ACB000
heap
page read and write
52BD000
stack
page read and write
20F0A488000
heap
page read and write
2BC5000
heap
page read and write
20F0AF91000
heap
page read and write
A5144FE000
stack
page read and write
7D0000
trusted library allocation
page read and write
D16F87B000
stack
page read and write
22E8E302000
heap
page read and write
2B96000
heap
page read and write
26DF21F0000
trusted library allocation
page read and write
554E000
stack
page read and write
700000
heap
page read and write
464A000
stack
page read and write
4B5E000
stack
page read and write
7238A7E000
stack
page read and write
537F000
stack
page read and write
539F000
stack
page read and write
2BE4000
heap
page read and write
4A38000
heap
page read and write
28D06E10000
heap
page readonly
26DF2302000
heap
page read and write
21E08120000
heap
page read and write
2585C900000
trusted library allocation
page read and write
4A38000
heap
page read and write
28D06E80000
heap
page read and write
2E4A000
heap
page read and write
600000
heap
page read and write
2B81000
heap
page read and write
541F000
stack
page read and write
83A000
heap
page read and write
D52D8FE000
stack
page read and write
4EAB000
heap
page read and write
28D06C60000
heap
page read and write
20F0AFE5000
heap
page read and write
2B59000
heap
page read and write
2B5A000
heap
page read and write
20F0A4E2000
heap
page read and write
20F0A516000
heap
page read and write
164E000
stack
page read and write
46D0000
heap
page read and write
10000000
unkown
page readonly
2EC5000
heap
page read and write
2E39000
unclassified section
page readonly
E3C000
stack
page read and write
2BEC000
heap
page read and write
28D06CCB000
heap
page read and write
2585C7A0000
heap
page read and write
20F0AFA2000
heap
page read and write
460D000
stack
page read and write
20F0AFA2000
heap
page read and write
20F0AF73000
heap
page read and write
2B99000
heap
page read and write
4FFB000
heap
page read and write
4AC8000
heap
page read and write
28D06CAF000
heap
page read and write
22E8E28A000
heap
page read and write
2E31000
unclassified section
page execute read
10005000
unkown
page read and write
45EC000
unclassified section
page readonly
2DCC000
stack
page read and write
26DF2213000
heap
page read and write
5640000
heap
page read and write
46A0000
heap
page read and write
20F0AF89000
heap
page read and write
2BC5000
heap
page read and write
28D06CD0000
heap
page read and write
20F0A45C000
heap
page read and write
20F0AF91000
heap
page read and write
5380000
trusted library allocation
page read and write
2E65000
heap
page read and write
21E07F70000
heap
page read and write
28D06CD0000
heap
page read and write
5F0000
heap
page read and write
4A8C000
stack
page read and write
2585C828000
heap
page read and write
4C00000
heap
page read and write
10006000
unkown
page readonly
527A000
stack
page read and write
1ACB000
heap
page read and write
4FFB000
heap
page read and write
398F000
stack
page read and write
20F0B400000
heap
page read and write
28D06CA7000
heap
page read and write
D16FC7E000
stack
page read and write
2BDF000
heap
page read and write
2AFC000
unclassified section
page readonly
2BC1000
heap
page read and write
10006000
unkown
page readonly
2D30000
heap
page read and write
20F0AF91000
heap
page read and write
4A38000
heap
page read and write
20F0A460000
heap
page read and write
2BE4000
heap
page read and write
2585C730000
heap
page read and write
26DF2263000
heap
page read and write
36D1C7F000
stack
page read and write
2BA1000
heap
page read and write
36D1B7F000
stack
page read and write
2AFA000
unclassified section
page read and write
F00000
heap
page read and write
2AF0000
unclassified section
page read and write
2E3C000
unclassified section
page readonly
26DF223C000
heap
page read and write
458D000
stack
page read and write
3340000
heap
page read and write
285C000
stack
page read and write
468E000
stack
page read and write
10003000
unkown
page readonly
2585C810000
unkown
page read and write
28D06E20000
trusted library allocation
page read and write
965000
heap
page read and write
CFD000
stack
page read and write
4660000
trusted library allocation
page read and write
20F0A2E0000
heap
page read and write
A513FBD000
stack
page read and write
20F0A4E4000
heap
page read and write
20F0A461000
heap
page read and write
28D06CAF000
heap
page read and write
22E8E200000
heap
page read and write
168E000
stack
page read and write
22E8E308000
heap
page read and write
72387F8000
stack
page read and write
4790000
heap
page read and write
10003000
unkown
page readonly
2E0C000
stack
page read and write
898000
heap
page read and write
2B10000
heap
page read and write
D52D49D000
stack
page read and write
2585C915000
trusted library allocation
page read and write
22E8E27D000
heap
page read and write
4670000
heap
page read and write
20F0AF00000
heap
page read and write
20F0B41A000
heap
page read and write
20F0A400000
heap
page read and write
7238EF8000
stack
page read and write
7238BFE000
stack
page read and write
A513F3B000
stack
page read and write
20F0AF91000
heap
page read and write
2B99000
heap
page read and write
2BE0000
heap
page read and write
150C000
stack
page read and write
388E000
stack
page read and write
76C000
stack
page read and write
535E000
stack
page read and write
7238B78000
stack
page read and write
20F0A502000
heap
page read and write
4A38000
heap
page read and write
10001000
unkown
page execute read
20F0AFB3000
heap
page read and write
52FA000
stack
page read and write
20F0AFB6000
heap
page read and write
544E000
stack
page read and write
7F0000
unclassified section
page read and write
888000
heap
page read and write
4B88000
heap
page read and write
20F0AFB8000
heap
page read and write
A51427E000
stack
page read and write
2B4B000
heap
page read and write
20F0AF94000
heap
page read and write
45EA000
unclassified section
page read and write
2EB1000
heap
page read and write
20F0AF8F000
heap
page read and write
2EB1000
heap
page read and write
20F0AFB8000
heap
page read and write
2E30000
unclassified section
page read and write
2B50000
heap
page read and write
10005000
unkown
page read and write
2585C923000
heap
page read and write
16CD000
stack
page read and write
20F0AFB3000
heap
page read and write
28D06E30000
trusted library allocation
page read and write
723834E000
stack
page read and write
1000000
heap
page read and write
21E080A0000
heap
page read and write
20F0AF88000
heap
page read and write
21E0812C000
heap
page read and write
4A38000
heap
page read and write
2BB8000
heap
page read and write
10003000
unkown
page readonly
10000000
unkown
page readonly
2E27000
heap
page read and write
89F000
heap
page read and write
F6D60FB000
stack
page read and write
7F9000
unclassified section
page readonly
21E080FB000
heap
page read and write
F6D63FE000
stack
page read and write
2585C740000
trusted library allocation
page read and write
28D06E00000
trusted library allocation
page read and write
20F0A4FB000
heap
page read and write
22E8E050000
heap
page read and write
3A8A000
stack
page read and write
4F8B000
heap
page read and write
20F0AFB2000
heap
page read and write
45E9000
unclassified section
page readonly
A65000
heap
page read and write
22E8E229000
heap
page read and write
21E08120000
heap
page read and write
2ADC000
stack
page read and write
28D06D60000
trusted library allocation
page read and write
25F0000
heap
page read and write
20F0AFB5000
heap
page read and write
2585C813000
unkown
page read and write
20F0B402000
heap
page read and write
20F0A43C000
heap
page read and write
21E08106000
heap
page read and write
26DF2226000
heap
page read and write
22E8E26F000
heap
page read and write
533E000
stack
page read and write
20F0AFC0000
heap
page read and write
F6D64FF000
stack
page read and write
20F0AFA4000
heap
page read and write
10001000
unkown
page execute read
20F0AF86000
heap
page read and write
10001000
unkown
page execute read
22E8E150000
trusted library allocation
page read and write
54BF000
stack
page read and write
20F0AF87000
heap
page read and write
36D1BF9000
stack
page read and write
20F0A3E0000
remote allocation
page read and write
A51437C000
stack
page read and write
20F0A370000
trusted library allocation
page read and write
531F000
stack
page read and write
87B000
heap
page read and write
21E0812B000
heap
page read and write
10001000
unkown
page execute read
4B88000
heap
page read and write
20F0AF4D000
heap
page read and write
10006000
unkown
page readonly
20F0B402000
heap
page read and write
20F0AF90000
heap
page read and write
960000
heap
page read and write
723887E000
stack
page read and write
4B88000
heap
page read and write
10006000
unkown
page readonly
4B88000
heap
page read and write
22E8E313000
heap
page read and write
2B4D000
stack
page read and write
2585C800000
unkown
page read and write
2585C902000
trusted library allocation
page read and write
20F0AFD6000
heap
page read and write
4A38000
heap
page read and write
21E08120000
heap
page read and write
53CD000
stack
page read and write
10003000
unkown
page readonly
20F0AF91000
heap
page read and write
D16FA79000
stack
page read and write
20F0B403000
heap
page read and write
26DF2313000
heap
page read and write
2A5D000
stack
page read and write
20F0AF89000
heap
page read and write
3B8E000
stack
page read and write
20F0AFB3000
heap
page read and write
20F0B402000
heap
page read and write
20F0AF65000
heap
page read and write
2B81000
heap
page read and write
7FC000
unclassified section
page readonly
26DF2160000
heap
page read and write
26DF2300000
heap
page read and write
F6D62F7000
stack
page read and write
1ACB000
heap
page read and write
4F8B000
heap
page read and write
28D07980000
trusted library allocation
page read and write
2BE1000
heap
page read and write
21E08380000
heap
page read and write
523D000
stack
page read and write
20F0AF49000
heap
page read and write
20F0AF4D000
heap
page read and write
AB0000
heap
page read and write
28D06BE0000
heap
page read and write
4EAB000
heap
page read and write
20F0A513000
heap
page read and write
2585CC02000
heap
page read and write
538A000
stack
page read and write
20F0AF7B000
heap
page read and write
2EA4000
heap
page read and write
2BE0000
heap
page read and write
26DF2229000
heap
page read and write
2E40000
heap
page read and write
20F0AF18000
heap
page read and write
10005000
unkown
page read and write
2EBE000
heap
page read and write
20F0AFC0000
heap
page read and write
20F0AFA6000
heap
page read and write
4A90000
heap
page read and write
20F0A340000
heap
page read and write
F6D5C8C000
stack
page read and write
20F0A3E0000
remote allocation
page read and write
2B1A000
heap
page read and write
7FA000
unclassified section
page read and write
26DF2200000
heap
page read and write
22E8EA02000
trusted library allocation
page read and write
A51447B000
stack
page read and write
20F0A45D000
heap
page read and write
2BC1000
heap
page read and write
28D06DC0000
trusted library allocation
page read and write
22E8E256000
heap
page read and write
21E08117000
heap
page read and write
2B71000
heap
page read and write
20F0AF77000
heap
page read and write
20F0A3E0000
remote allocation
page read and write
20F0AFC6000
heap
page read and write
26DF2258000
heap
page read and write
4B88000
heap
page read and write
F6D61FB000
stack
page read and write
4B88000
heap
page read and write
55C0000
trusted library allocation
page read and write
20F0AFD7000
heap
page read and write
2BEB000
heap
page read and write
20F0A47A000
heap
page read and write
4B90000
heap
page read and write
3D8A000
stack
page read and write
1ACB000
heap
page read and write
26DF2C02000
trusted library allocation
page read and write
20F0A462000
heap
page read and write
CB0000
heap
page read and write
D52DBFE000
stack
page read and write
28D06A80000
heap
page read and write
7238977000
stack
page read and write
22E8E300000
heap
page read and write
21E08385000
heap
page read and write
7AB000
stack
page read and write
10005000
unkown
page read and write
4A38000
heap
page read and write
4AC8000
heap
page read and write
4AB0000
heap
page read and write
2CDD000
stack
page read and write
2E20000
heap
page read and write
22E8E213000
heap
page read and write
20F0AFB5000
heap
page read and write
28D06C68000
heap
page read and write
13F8000
heap
page read and write
2EBE000
heap
page read and write
20F0AFD1000
heap
page read and write
4AC8000
heap
page read and write
2BB8000
heap
page read and write
81B000
heap
page read and write
20F0AF80000
heap
page read and write
7F0000
trusted library allocation
page read and write
2EA4000
heap
page read and write
20F0AF84000
heap
page read and write
28D06E85000
heap
page read and write
2D60000
heap
page read and write
4A38000
heap
page read and write
86B000
heap
page read and write
10000000
unkown
page readonly
7238DF9000
stack
page read and write
76B000
stack
page read and write
F6D5D8F000
stack
page read and write
2AF1000
unclassified section
page execute read
21E080F0000
heap
page read and write
4AC8000
heap
page read and write
28D06BC0000
heap
page read and write
4F8B000
heap
page read and write
20F0A45E000
heap
page read and write
20F0A429000
heap
page read and write
54F0000
trusted library allocation
page read and write
2D2E000
stack
page read and write
89B000
heap
page read and write
45E0000
unclassified section
page read and write
66D000
stack
page read and write
EBE000
stack
page read and write
72383CF000
stack
page read and write
26DF228C000
heap
page read and write
4FFB000
heap
page read and write
22E8E23C000
heap
page read and write
2EBB000
heap
page read and write
20F0A4C5000
heap
page read and write
A60000
heap
page read and write
4FFB000
heap
page read and write
2A9E000
stack
page read and write
2940000
heap
page read and write
22E8E202000
heap
page read and write
36D1A7E000
stack
page read and write
4EAB000
heap
page read and write
550F000
stack
page read and write
20F0AFA5000
heap
page read and write
2B4E000
heap
page read and write
558E000
stack
page read and write
378F000
stack
page read and write
20F0AF83000
heap
page read and write
2C4C000
stack
page read and write
540A000
stack
page read and write
20F0AF91000
heap
page read and write
20F0B402000
heap
page read and write
2AF9000
unclassified section
page readonly
D16FBF9000
stack
page read and write
21E08101000
heap
page read and write
2E76000
heap
page read and write
4AC8000
heap
page read and write
20F0AFD1000
heap
page read and write
2B50000
heap
page read and write
54CE000
stack
page read and write
22E8DFF0000
heap
page read and write
4640000
heap
page read and write
20F0A2D0000
heap
page read and write
20F0AF91000
heap
page read and write
20F0A47A000
heap
page read and write
45E1000
unclassified section
page execute read
3C8F000
stack
page read and write
There are 529 hidden memdumps, click here to show them.