IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGIJDGCAEBFIIECAKFHI
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\BKJDGCGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGCBKECA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DHDBGHCBAEGCBFHJEBFI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EGIDAAFIEHIEHJKFHCAEGCBFHJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HCBAKJEHDBGHIEBGCGDGHCAKEB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JEBKJDAFHJDGDHJKKEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 78
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 80
Unicode text, UTF-8 text, with very long lines (819)
downloaded
Chrome Cache Entry: 81
ASCII text
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 84
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=2204,i,6037110496372164923,5542102993344952383,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/msvcp140.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/vcruntime140.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllault
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllG
unknown
https://www.google.com
unknown
http://185.215.113.206/746f34465cf17784/nss3.dllf
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/6c4adf523b719729.phpl
unknown
http://185.215.113.206/6c4adf523b719729.phpJDGCAEBFIIECAKFHI
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/6c4adf523b719729.phpf
unknown
http://185.215.113.206/6c4adf523b719729.php(J
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://185.215.113.206/kA
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.185.196
https://apis.google.com
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllg
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.206/6c4adf523b719729.phpA
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.206/6c4adf523b719729.phpTK
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/6c4adf523b719729.phpLK
unknown
http://185.215.113.206/6c4adf523b719729.phpBGHCBAEGCBFHJEBFI
unknown
http://185.215.113.206/6c4adf523b719729.phpXK&
unknown
http://185.215.113.206/6c4adf523b719729.phpKn
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.185.196
http://185.215.113.206/746f34465cf17784/freebl3.dll(
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.185.196
https://play.google.com/log?format=json&hasfast=true
172.217.23.110
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.196
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.186.46
http://185.215.113.206/6c4adf523b719729.phpion:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dll7
unknown
http://185.215.113.206EGD
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://clients6.google.com
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.186.46
play.google.com
172.217.23.110
www.google.com
142.250.185.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.186.46
plus.l.google.com
United States
172.217.23.110
play.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.196
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
441000
unkown
page execute and read and write
malicious
130E000
heap
page read and write
malicious
5100000
direct allocation
page read and write
malicious
4C71000
heap
page read and write
4C71000
heap
page read and write
1D1CE000
stack
page read and write
6C889000
unkown
page readonly
237D0000
heap
page read and write
1D766000
heap
page read and write
1D34E000
stack
page read and write
1D49D000
stack
page read and write
4C60000
direct allocation
page read and write
1D76F000
heap
page read and write
4C71000
heap
page read and write
12C4000
heap
page read and write
589000
unkown
page execute and read and write
237D0000
trusted library allocation
page read and write
1D76F000
heap
page read and write
4CD0000
heap
page read and write
4B1F000
stack
page read and write
1D759000
heap
page read and write
238A0000
heap
page read and write
1D788000
heap
page read and write
1D770000
heap
page read and write
4C71000
heap
page read and write
12C4000
heap
page read and write
338E000
stack
page read and write
324E000
stack
page read and write
1D77E000
heap
page read and write
1D756000
heap
page read and write
6F861000
unkown
page execute read
2EFE000
stack
page read and write
1D770000
heap
page read and write
489F000
stack
page read and write
4C71000
heap
page read and write
1D756000
heap
page read and write
388E000
stack
page read and write
4C90000
heap
page read and write
4C71000
heap
page read and write
3ACF000
stack
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
23AF1000
heap
page read and write
8B4000
unkown
page execute and read and write
39CE000
stack
page read and write
4C71000
heap
page read and write
1D768000
heap
page read and write
35CF000
stack
page read and write
3D4F000
stack
page read and write
5AE000
unkown
page execute and read and write
12C4000
heap
page read and write
450E000
stack
page read and write
1D771000
heap
page read and write
1D44F000
stack
page read and write
61ECC000
direct allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1D740000
heap
page read and write
1D77E000
heap
page read and write
5100000
direct allocation
page read and write
440000
unkown
page readonly
12C4000
heap
page read and write
118C000
stack
page read and write
4C71000
heap
page read and write
167E000
stack
page read and write
48DE000
stack
page read and write
5250000
direct allocation
page execute and read and write
44CF000
stack
page read and write
6C7AF000
unkown
page write copy
4C71000
heap
page read and write
4C72000
heap
page read and write
3C4E000
stack
page read and write
4C71000
heap
page read and write
238A8000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
46C000
unkown
page execute and read and write
23880000
heap
page read and write
61ECD000
direct allocation
page readonly
23840000
heap
page read and write
6F8DD000
unkown
page readonly
4C71000
heap
page read and write
1D77E000
heap
page read and write
4C71000
heap
page read and write
12C4000
heap
page read and write
4C71000
heap
page read and write
4C60000
direct allocation
page read and write
1393000
heap
page read and write
1D77E000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D756000
heap
page read and write
143E000
stack
page read and write
1D76C000
heap
page read and write
4C71000
heap
page read and write
61ED4000
direct allocation
page readonly
23859000
heap
page read and write
61ED0000
direct allocation
page read and write
61E00000
direct allocation
page execute and read and write
1D76D000
heap
page read and write
2384D000
heap
page read and write
9BB000
unkown
page execute and read and write
5E7000
unkown
page execute and read and write
554000
unkown
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
52B0000
direct allocation
page execute and read and write
1D08F000
stack
page read and write
6F8F2000
unkown
page readonly
23AED000
heap
page read and write
50E0000
heap
page read and write
12C4000
heap
page read and write
9B5000
unkown
page execute and read and write
5BB000
unkown
page execute and read and write
1D766000
heap
page read and write
400E000
stack
page read and write
98E000
unkown
page execute and read and write
12C4000
heap
page read and write
5280000
direct allocation
page execute and read and write
5270000
direct allocation
page execute and read and write
6C7AE000
unkown
page read and write
1367000
heap
page read and write
4C71000
heap
page read and write
12D0000
heap
page read and write
23841000
heap
page read and write
4C60000
direct allocation
page read and write
6F8EE000
unkown
page read and write
348F000
stack
page read and write
13CC000
heap
page read and write
4C71000
heap
page read and write
2393E000
stack
page read and write
1D775000
heap
page read and write
12C4000
heap
page read and write
1D76A000
heap
page read and write
61ED3000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
1D785000
heap
page read and write
1D789000
heap
page read and write
12C4000
heap
page read and write
1D76A000
heap
page read and write
12C4000
heap
page read and write
370F000
stack
page read and write
34CE000
stack
page read and write
2F00000
heap
page read and write
4C60000
direct allocation
page read and write
1383000
heap
page read and write
4C70000
heap
page read and write
1D6DC000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D766000
heap
page read and write
1D742000
heap
page read and write
2EBB000
stack
page read and write
4C71000
heap
page read and write
1D768000
heap
page read and write
4C71000
heap
page read and write
360E000
stack
page read and write
4C71000
heap
page read and write
237E0000
heap
page read and write
526000
unkown
page execute and read and write
12C4000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D0CE000
stack
page read and write
1D756000
heap
page read and write
4C71000
heap
page read and write
3E8F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
6F860000
unkown
page readonly
6C887000
unkown
page read and write
5260000
direct allocation
page execute and read and write
1D76A000
heap
page read and write
1D76F000
heap
page read and write
23A3F000
stack
page read and write
12C4000
heap
page read and write
6C7E1000
unkown
page execute read
2E7E000
stack
page read and write
4A1E000
stack
page read and write
1308000
heap
page read and write
61EB7000
direct allocation
page readonly
512B000
direct allocation
page read and write
414E000
stack
page read and write
4C71000
heap
page read and write
4C60000
direct allocation
page read and write
13E8000
heap
page read and write
1D784000
heap
page read and write
1D59D000
stack
page read and write
428D000
stack
page read and write
1D30F000
stack
page read and write
479E000
stack
page read and write
23A50000
trusted library allocation
page read and write
12C4000
heap
page read and write
4C71000
heap
page read and write
23AFB000
heap
page read and write
4C60000
direct allocation
page read and write
1D76A000
heap
page read and write
4C71000
heap
page read and write
1D787000
heap
page read and write
3C0F000
stack
page read and write
4750000
heap
page read and write
237D0000
trusted library allocation
page read and write
1D770000
heap
page read and write
43CE000
stack
page read and write
108C000
stack
page read and write
12C4000
heap
page read and write
1D767000
heap
page read and write
1D77E000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
410F000
stack
page read and write
23AF9000
heap
page read and write
1D769000
heap
page read and write
1CF8E000
stack
page read and write
1D77E000
heap
page read and write
1D767000
heap
page read and write
1D76A000
heap
page read and write
1D750000
heap
page read and write
4C80000
heap
page read and write
3ECE000
stack
page read and write
3D8E000
stack
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
2F0E000
heap
page read and write
398F000
stack
page read and write
334F000
stack
page read and write
4C71000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4C71000
heap
page read and write
474F000
stack
page read and write
1D77E000
heap
page read and write
6AE000
unkown
page execute and read and write
134D000
heap
page read and write
1D76F000
heap
page read and write
4C71000
heap
page read and write
6C7B0000
unkown
page read and write
11E0000
heap
page read and write
6C5D1000
unkown
page execute read
1D764000
heap
page read and write
B68000
unkown
page execute and read and write
513B000
stack
page read and write
61E01000
direct allocation
page execute read
441000
unkown
page execute and write copy
9CA000
unkown
page execute and read and write
440000
unkown
page read and write
23800000
heap
page read and write
12C0000
heap
page read and write
6C7E0000
unkown
page readonly
12C4000
heap
page read and write
9CA000
unkown
page execute and write copy
688000
unkown
page execute and read and write
12C4000
heap
page read and write
5EA000
unkown
page execute and read and write
157E000
stack
page read and write
374E000
stack
page read and write
4C60000
direct allocation
page read and write
1D74D000
heap
page read and write
1D5DD000
stack
page read and write
1D756000
heap
page read and write
12C4000
heap
page read and write
6C841000
unkown
page readonly
6C5D0000
unkown
page readonly
4C71000
heap
page read and write
1D860000
trusted library allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
460F000
stack
page read and write
1D77F000
heap
page read and write
320F000
stack
page read and write
12C4000
heap
page read and write
5DB000
unkown
page execute and read and write
6A8000
unkown
page execute and read and write
4C60000
direct allocation
page read and write
13CA000
heap
page read and write
5280000
direct allocation
page execute and read and write
5100000
direct allocation
page read and write
1D76A000
heap
page read and write
12C4000
heap
page read and write
153E000
stack
page read and write
9CB000
unkown
page execute and write copy
52A0000
direct allocation
page execute and read and write
1D767000
heap
page read and write
3FCF000
stack
page read and write
12C4000
heap
page read and write
5280000
direct allocation
page execute and read and write
1D768000
heap
page read and write
1D789000
heap
page read and write
4C71000
heap
page read and write
1D756000
heap
page read and write
464E000
stack
page read and write
12C4000
heap
page read and write
4C5F000
stack
page read and write
1D770000
heap
page read and write
6C76F000
unkown
page readonly
1D86B000
heap
page read and write
1D775000
heap
page read and write
4B5E000
stack
page read and write
12C4000
heap
page read and write
23852000
heap
page read and write
1D20E000
stack
page read and write
12C4000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
1300000
heap
page read and write
4C71000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1D77E000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
1D756000
heap
page read and write
23820000
heap
page read and write
4C71000
heap
page read and write
1D773000
heap
page read and write
6C7B5000
unkown
page readonly
4C71000
heap
page read and write
1D763000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
23846000
heap
page read and write
1D763000
heap
page read and write
23AF5000
heap
page read and write
1D76D000
heap
page read and write
523F000
stack
page read and write
4C71000
heap
page read and write
300F000
stack
page read and write
B69000
unkown
page execute and write copy
23860000
heap
page read and write
49DF000
stack
page read and write
12C4000
heap
page read and write
4C71000
heap
page read and write
50B0000
trusted library allocation
page read and write
1188000
stack
page read and write
1D786000
heap
page read and write
1D770000
heap
page read and write
3B0E000
stack
page read and write
2F07000
heap
page read and write
61EB4000
direct allocation
page read and write
1D769000
heap
page read and write
1182000
stack
page read and write
12C4000
heap
page read and write
1D763000
heap
page read and write
1D773000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
438F000
stack
page read and write
310F000
stack
page read and write
4C71000
heap
page read and write
1352000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
424F000
stack
page read and write
12C4000
heap
page read and write
384F000
stack
page read and write
72A000
unkown
page execute and read and write
1D74B000
heap
page read and write
2F0B000
heap
page read and write
12C4000
heap
page read and write
There are 354 hidden memdumps, click here to show them.