IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CAKKJKKECFIDGDHIJEGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBAKJKJJJECFIEBFHIEGHJDAFI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CBFBKFIDHIDGHJKFBGHC
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\DGDBKFBAKFBFHIECFBFIJKJKKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECGDHIDA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECGDHIDAAFHIIDGDBFIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KKECFIEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 76
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (3503)
downloaded
Chrome Cache Entry: 79
ASCII text
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 82
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=2120,i,11807956331036332796,14599083191770811504,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/msvcp140.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/vcruntime140.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dlll
unknown
http://185.215.113.206DHC
unknown
http://185.215.113.206/4
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://185.215.113.206/746f34465cf17784/softokn3.dlld4
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.215.113.206/6c4adf523b719729.phpRUNTIME140.dllD
unknown
http://185.215.113.206/746f34465cf17784/msvcp140.dllW4&
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.206/6c4adf523b719729.phpu
unknown
http://185.215.113.206/6c4adf523b719729.phpa
unknown
https://www.google.com
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dll5y9
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Visual
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/6c4adf523b719729.phpM
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.185.132
https://apis.google.com
unknown
http://185.215.113.206/6c4adf523b719729.phpY
unknown
http://185.215.113.206/6c4adf523b719729.phpodus.wallet
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dllf
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllux
unknown
http://185.215.113.206/6c4adf523b719729.phpA
unknown
http://185.215.113.206/6c4adf523b719729.phpC
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.206/6c4adf523b719729.php=
unknown
https://mozilla.org0/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllEx
unknown
http://185.215.113.206/6c4adf523b719729.php1
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.185.132
http://185.215.113.206/6c4adf523b719729.php-
unknown
http://185.215.113.206/746f34465cf17784/nss3.dll8
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://185.215.113.206/6c4adf523b719729.php9
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ava
unknown
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.185.132
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.132
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.181.238
http://185.215.113.206/6c4adf523b719729.phpion:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dll%y
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://clients6.google.com
unknown
There are 66 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.181.238
play.google.com
142.250.185.206
www.google.com
142.250.185.132
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
142.250.181.238
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.132
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
261000
unkown
page execute and read and write
malicious
E4E000
heap
page read and write
malicious
4B90000
direct allocation
page read and write
malicious
DC4000
heap
page read and write
410E000
stack
page read and write
DC4000
heap
page read and write
4711000
heap
page read and write
35CE000
stack
page read and write
4711000
heap
page read and write
1D1C9000
heap
page read and write
4B60000
heap
page read and write
DC4000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
DC4000
heap
page read and write
1CEBF000
stack
page read and write
2B8E000
heap
page read and write
4730000
heap
page read and write
4711000
heap
page read and write
348E000
stack
page read and write
424E000
stack
page read and write
23564000
heap
page read and write
DC4000
heap
page read and write
CF2000
stack
page read and write
1D1EE000
heap
page read and write
394F000
stack
page read and write
4711000
heap
page read and write
30CE000
stack
page read and write
4711000
heap
page read and write
2AAF000
stack
page read and write
4711000
heap
page read and write
DC4000
heap
page read and write
4711000
heap
page read and write
6F870000
unkown
page readonly
4711000
heap
page read and write
232A1000
heap
page read and write
1D1D4000
heap
page read and write
4711000
heap
page read and write
E48000
heap
page read and write
1D1DA000
heap
page read and write
3F8F000
stack
page read and write
1CAFF000
stack
page read and write
1CF0D000
stack
page read and write
233BE000
stack
page read and write
1D1E3000
heap
page read and write
1D1C6000
heap
page read and write
4CCF000
stack
page read and write
E10000
direct allocation
page read and write
4711000
heap
page read and write
6C5C1000
unkown
page execute read
4711000
heap
page read and write
DC4000
heap
page read and write
407000
unkown
page execute and read and write
E40000
heap
page read and write
DC4000
heap
page read and write
4A8000
unkown
page execute and read and write
1D1C6000
heap
page read and write
4BBB000
direct allocation
page read and write
210000
heap
page read and write
1D1F7000
heap
page read and write
1D1DA000
heap
page read and write
2AEE000
stack
page read and write
6D0000
unkown
page execute and read and write
4711000
heap
page read and write
4711000
heap
page read and write
6C7A5000
unkown
page readonly
1D1C6000
heap
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
6F8FE000
unkown
page read and write
232BC000
heap
page read and write
7F5000
unkown
page execute and write copy
6C869000
unkown
page readonly
DC4000
heap
page read and write
1D1E0000
heap
page read and write
4711000
heap
page read and write
E10000
direct allocation
page read and write
1D1D7000
heap
page read and write
234C0000
trusted library allocation
page read and write
232B5000
heap
page read and write
380F000
stack
page read and write
1D1E3000
heap
page read and write
3A9000
unkown
page execute and read and write
DC4000
heap
page read and write
1D1D7000
heap
page read and write
CF8000
stack
page read and write
2B2E000
stack
page read and write
4CE000
unkown
page execute and read and write
2F8F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
460E000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
4711000
heap
page read and write
3ACE000
stack
page read and write
1D1EF000
heap
page read and write
2B80000
heap
page read and write
4711000
heap
page read and write
120E000
stack
page read and write
61ECC000
direct allocation
page read and write
36CF000
stack
page read and write
1D1EE000
heap
page read and write
DC4000
heap
page read and write
61ED4000
direct allocation
page readonly
470F000
stack
page read and write
1D1E0000
heap
page read and write
DC4000
heap
page read and write
1D1BB000
heap
page read and write
4711000
heap
page read and write
6F871000
unkown
page execute read
EC1000
heap
page read and write
1D1B2000
heap
page read and write
6C75F000
unkown
page readonly
4711000
heap
page read and write
4711000
heap
page read and write
EA8000
heap
page read and write
420F000
stack
page read and write
3D0F000
stack
page read and write
D3D000
stack
page read and write
4D10000
direct allocation
page execute and read and write
3A8F000
stack
page read and write
DC4000
heap
page read and write
1D1D3000
heap
page read and write
2356F000
heap
page read and write
1D1E0000
heap
page read and write
4D00000
direct allocation
page execute and read and write
2E8F000
stack
page read and write
110E000
stack
page read and write
4711000
heap
page read and write
6F902000
unkown
page readonly
61ECD000
direct allocation
page readonly
1D04E000
stack
page read and write
220000
heap
page read and write
E10000
direct allocation
page read and write
4711000
heap
page read and write
1D1EE000
heap
page read and write
2D8F000
stack
page read and write
232A3000
heap
page read and write
4711000
heap
page read and write
44CE000
stack
page read and write
DC4000
heap
page read and write
3E8E000
stack
page read and write
61EB7000
direct allocation
page readonly
1CC7E000
stack
page read and write
1D1F8000
heap
page read and write
434F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
346000
unkown
page execute and read and write
23260000
heap
page read and write
E10000
direct allocation
page read and write
4711000
heap
page read and write
4720000
heap
page read and write
1D1C6000
heap
page read and write
4711000
heap
page read and write
2330A000
heap
page read and write
3C0E000
stack
page read and write
DC4000
heap
page read and write
234BE000
stack
page read and write
232AF000
heap
page read and write
1D1EE000
heap
page read and write
998000
unkown
page execute and read and write
7E5000
unkown
page execute and read and write
3DB000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
23240000
trusted library allocation
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
1CC3F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
1D1DF000
heap
page read and write
DC4000
heap
page read and write
9DE000
stack
page read and write
4711000
heap
page read and write
384E000
stack
page read and write
2B6E000
stack
page read and write
1CB3E000
stack
page read and write
1D1EE000
heap
page read and write
F06000
heap
page read and write
7DC000
unkown
page execute and read and write
61E01000
direct allocation
page execute read
DC4000
heap
page read and write
1D1DA000
heap
page read and write
4777000
heap
page read and write
61EB4000
direct allocation
page read and write
1D1F6000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4C8000
unkown
page execute and read and write
1D14C000
stack
page read and write
260000
unkown
page readonly
4711000
heap
page read and write
4711000
heap
page read and write
6C7A0000
unkown
page read and write
1D1D9000
heap
page read and write
320E000
stack
page read and write
E10000
direct allocation
page read and write
374000
unkown
page execute and read and write
4711000
heap
page read and write
4711000
heap
page read and write
3FCE000
stack
page read and write
2B70000
direct allocation
page execute and read and write
CFC000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
2B87000
heap
page read and write
61ED3000
direct allocation
page read and write
1D2D0000
trusted library allocation
page read and write
1D1DF000
heap
page read and write
260000
unkown
page read and write
DC4000
heap
page read and write
1D1DF000
heap
page read and write
1D1E0000
heap
page read and write
1D1D6000
heap
page read and write
F2D000
heap
page read and write
6C79E000
unkown
page read and write
4711000
heap
page read and write
E30000
direct allocation
page read and write
4711000
heap
page read and write
1D1F9000
heap
page read and write
4711000
heap
page read and write
61ED0000
direct allocation
page read and write
4715000
heap
page read and write
261000
unkown
page execute and write copy
1D1D8000
heap
page read and write
23240000
trusted library allocation
page read and write
4711000
heap
page read and write
DC4000
heap
page read and write
1D1F5000
heap
page read and write
DC4000
heap
page read and write
1D1EE000
heap
page read and write
1D1C0000
heap
page read and write
4711000
heap
page read and write
6C5C0000
unkown
page readonly
232A8000
heap
page read and write
2C8F000
stack
page read and write
4711000
heap
page read and write
1D1E1000
heap
page read and write
3D4E000
stack
page read and write
D7E000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
4711000
heap
page read and write
1D00E000
stack
page read and write
1CD7E000
stack
page read and write
4711000
heap
page read and write
448F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
E10000
direct allocation
page read and write
28C000
unkown
page execute and read and write
1D1DC000
heap
page read and write
1D1DD000
heap
page read and write
3CE000
unkown
page execute and read and write
4711000
heap
page read and write
DC4000
heap
page read and write
31CF000
stack
page read and write
45CF000
stack
page read and write
DC4000
heap
page read and write
358F000
stack
page read and write
438E000
stack
page read and write
4711000
heap
page read and write
E30000
direct allocation
page read and write
E10000
direct allocation
page read and write
398E000
stack
page read and write
1D1D7000
heap
page read and write
308F000
stack
page read and write
DC4000
heap
page read and write
E10000
direct allocation
page read and write
4810000
trusted library allocation
page read and write
E10000
direct allocation
page read and write
1D1E5000
heap
page read and write
4711000
heap
page read and write
40A000
unkown
page execute and read and write
23281000
heap
page read and write
DC4000
heap
page read and write
1D1EE000
heap
page read and write
6C7C1000
unkown
page execute read
4711000
heap
page read and write
1D1E5000
heap
page read and write
1C9FE000
stack
page read and write
54A000
unkown
page execute and read and write
7B5000
unkown
page execute and read and write
1D1DD000
heap
page read and write
6C79F000
unkown
page write copy
370E000
stack
page read and write
E94000
heap
page read and write
3FB000
unkown
page execute and read and write
DC4000
heap
page read and write
1D1D9000
heap
page read and write
1BC000
stack
page read and write
330F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
DC4000
heap
page read and write
E10000
direct allocation
page read and write
1D1DF000
heap
page read and write
1D2D1000
heap
page read and write
4711000
heap
page read and write
4710000
heap
page read and write
4711000
heap
page read and write
DC4000
heap
page read and write
DBB000
stack
page read and write
E10000
direct allocation
page read and write
1D1EE000
heap
page read and write
F29000
heap
page read and write
40CF000
stack
page read and write
DC0000
heap
page read and write
1D1D8000
heap
page read and write
4711000
heap
page read and write
1D1B0000
heap
page read and write
4711000
heap
page read and write
344F000
stack
page read and write
6F8ED000
unkown
page readonly
1D1D6000
heap
page read and write
23556000
heap
page read and write
DC4000
heap
page read and write
1D1DA000
heap
page read and write
E0E000
stack
page read and write
999000
unkown
page execute and write copy
6C867000
unkown
page read and write
1D1C6000
heap
page read and write
23240000
heap
page read and write
1CDBE000
stack
page read and write
1D1D3000
heap
page read and write
E10000
direct allocation
page read and write
1D1C6000
heap
page read and write
2B8B000
heap
page read and write
1D1DA000
heap
page read and write
9F0000
heap
page read and write
3BCF000
stack
page read and write
2355E000
heap
page read and write
7F6000
unkown
page execute and write copy
61E00000
direct allocation
page execute and read and write
1D1C6000
heap
page read and write
3E4F000
stack
page read and write
DC4000
heap
page read and write
6C821000
unkown
page readonly
4711000
heap
page read and write
F04000
heap
page read and write
4711000
heap
page read and write
DC4000
heap
page read and write
334E000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
1D1F4000
heap
page read and write
1D1D6000
heap
page read and write
1D1DA000
heap
page read and write
4BCB000
stack
page read and write
7F5000
unkown
page execute and read and write
E10000
direct allocation
page read and write
E10000
direct allocation
page read and write
DC4000
heap
page read and write
1D1BD000
heap
page read and write
4711000
heap
page read and write
1D1D8000
heap
page read and write
DC4000
heap
page read and write
1D1F9000
heap
page read and write
23567000
heap
page read and write
6C7C0000
unkown
page readonly
1D1E0000
heap
page read and write
1D1D3000
heap
page read and write
There are 350 hidden memdumps, click here to show them.