IOC Report
4QihT6CwD8.exe

loading gif

Files

File Path
Type
Category
Malicious
4QihT6CwD8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-console-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-datetime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-debug-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-errorhandling-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-file-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-file-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-file-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-handle-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-interlocked-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-libraryloader-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-localization-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-memory-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-namedpipe-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-processenvironment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-processthreads-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-processthreads-l1-1-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-profile-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-synch-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-synch-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-sysinfo-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-timezone-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-core-util-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-conio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-convert-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-environment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-filesystem-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-locale-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-math-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-multibyte-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-private-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-process-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-runtime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-time-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\api-ms-win-crt-utility-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\nssdbm3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\3F5A6467\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\40885317949963744506502.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\aut40C4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut4104.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\lophophorine
data
dropped
C:\Users\user\AppData\Local\Temp\orographically
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4QihT6CwD8.exe
"C:\Users\user\Desktop\4QihT6CwD8.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\4QihT6CwD8.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
C:\Windows\system32\timeout.exe 3

URLs

Name
IP
Malicious
http://ln6b9.shop/LN341/index.php
104.21.2.6
malicious
http://www.mozilla.com/en-US/blocklist/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ln6b9.shop/LN341/index.phpAx
unknown
http://ocsp.thawte.com0
unknown
http://ip-api.com/json
unknown
http://www.mozilla.com0
unknown
https://dotbit.me/a/
unknown

Domains

Name
IP
Malicious
ln6b9.shop
104.21.2.6
malicious

IPs

IP
Domain
Country
Malicious
104.21.2.6
ln6b9.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
6C30000
direct allocation
page read and write
malicious
5E4C000
direct allocation
page read and write
malicious
1160000
direct allocation
page read and write
malicious
4D98000
direct allocation
page read and write
malicious
127C000
heap
page read and write
1253000
heap
page read and write
4DA8000
direct allocation
page read and write
1253000
heap
page read and write
5A10000
direct allocation
page read and write
4D90000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
11E9000
heap
page read and write
3BDE000
direct allocation
page read and write
1253000
heap
page read and write
1282000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
3B6D000
direct allocation
page read and write
7E0000
heap
page read and write
351000
unkown
page execute read
1253000
heap
page read and write
4DA8000
direct allocation
page read and write
4DE8000
direct allocation
page read and write
3B6D000
direct allocation
page read and write
4D94000
direct allocation
page read and write
3EC000
unkown
page readonly
4DA0000
direct allocation
page read and write
3B6D000
direct allocation
page read and write
4D94000
direct allocation
page read and write
1253000
heap
page read and write
11E9000
heap
page read and write
98E000
stack
page read and write
351000
unkown
page execute read
3013000
heap
page read and write
5B60000
direct allocation
page read and write
38A0000
direct allocation
page read and write
58CE000
stack
page read and write
1268000
heap
page read and write
327F000
heap
page read and write
127C000
heap
page read and write
5A20000
direct allocation
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
3A40000
direct allocation
page read and write
127C000
heap
page read and write
5C20000
direct allocation
page read and write
1188000
heap
page read and write
6290000
direct allocation
page read and write
127C000
heap
page read and write
38A0000
direct allocation
page read and write
4D94000
direct allocation
page read and write
1140000
direct allocation
page execute and read and write
4DA0000
direct allocation
page read and write
3296000
heap
page read and write
38A0000
direct allocation
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
3B6D000
direct allocation
page read and write
11E9000
heap
page read and write
327F000
heap
page read and write
3480000
heap
page read and write
350000
unkown
page readonly
350000
unkown
page readonly
127C000
heap
page read and write
3B69000
direct allocation
page read and write
4DB4000
direct allocation
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
2D70000
heap
page read and write
11E9000
heap
page read and write
1253000
heap
page read and write
438000
unkown
page readonly
5B30000
direct allocation
page read and write
4DF8000
direct allocation
page read and write
5BA0000
direct allocation
page read and write
5A10000
direct allocation
page read and write
5A20000
direct allocation
page read and write
39C3000
direct allocation
page read and write
5C50000
direct allocation
page read and write
35F0000
heap
page read and write
67E0000
direct allocation
page read and write
5A80000
direct allocation
page read and write
DBF000
stack
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
5D40000
direct allocation
page read and write
4DD0000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
3B6D000
direct allocation
page read and write
37FF000
stack
page read and write
3B69000
direct allocation
page read and write
11E9000
heap
page read and write
8BE000
stack
page read and write
2DA0000
heap
page read and write
DFF000
stack
page read and write
39C3000
direct allocation
page read and write
1253000
heap
page read and write
3286000
heap
page read and write
1253000
heap
page read and write
6F80000
direct allocation
page read and write
1253000
heap
page read and write
12A7000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
94E000
stack
page read and write
4D94000
direct allocation
page read and write
5C90000
direct allocation
page read and write
127C000
heap
page read and write
775C000
stack
page read and write
127C000
heap
page read and write
424000
unkown
page readonly
4E60000
direct allocation
page read and write
1253000
heap
page read and write
73C000
stack
page read and write
1253000
heap
page read and write
38A0000
direct allocation
page read and write
412000
unkown
page readonly
4D94000
direct allocation
page read and write
1253000
heap
page read and write
123D000
heap
page read and write
11E9000
heap
page read and write
327F000
heap
page read and write
1F40000
heap
page read and write
3BDE000
direct allocation
page read and write
4D94000
direct allocation
page read and write
11BA000
heap
page read and write
127C000
heap
page read and write
5A10000
direct allocation
page read and write
127C000
heap
page read and write
3350000
heap
page read and write
4D94000
direct allocation
page read and write
1D7E000
stack
page read and write
127C000
heap
page read and write
325F000
heap
page read and write
4DB8000
direct allocation
page read and write
5A10000
direct allocation
page read and write
56DC000
stack
page read and write
127C000
heap
page read and write
2D1B000
stack
page read and write
1282000
heap
page read and write
127C000
heap
page read and write
575E000
stack
page read and write
2CB0000
heap
page read and write
4D94000
direct allocation
page read and write
4E18000
direct allocation
page read and write
328E000
heap
page read and write
5CB8000
direct allocation
page read and write
3000000
heap
page read and write
11C2000
heap
page read and write
127C000
heap
page read and write
5B50000
direct allocation
page read and write
4D94000
direct allocation
page read and write
11D3000
heap
page read and write
3246000
heap
page read and write
325B000
heap
page read and write
F4E000
stack
page read and write
42C000
unkown
page readonly
127C000
heap
page read and write
6F64000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
3A40000
direct allocation
page read and write
DEF000
stack
page read and write
5D30000
direct allocation
page read and write
197D000
stack
page read and write
4DB4000
direct allocation
page read and write
127C000
heap
page read and write
5B10000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
32FD000
stack
page read and write
127C000
heap
page read and write
3A40000
direct allocation
page read and write
3284000
heap
page read and write
324F000
heap
page read and write
127C000
heap
page read and write
1120000
heap
page read and write
127C000
heap
page read and write
3BDE000
direct allocation
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
521E000
stack
page read and write
127C000
heap
page read and write
38A0000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
35CE000
stack
page read and write
2FED000
stack
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
4D98000
direct allocation
page read and write
6F7C000
direct allocation
page read and write
3212000
heap
page read and write
1253000
heap
page read and write
38A0000
direct allocation
page read and write
1253000
heap
page read and write
5A10000
direct allocation
page read and write
1253000
heap
page read and write
1154000
heap
page read and write
4DA0000
direct allocation
page read and write
127C000
heap
page read and write
127C000
heap
page read and write
3BDE000
direct allocation
page read and write
3B6D000
direct allocation
page read and write
1282000
heap
page read and write
DCF000
stack
page read and write
3BDE000
direct allocation
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
44C000
unkown
page readonly
1253000
heap
page read and write
1253000
heap
page read and write
59CE000
stack
page read and write
2D0A000
stack
page read and write
3280000
heap
page read and write
5C60000
direct allocation
page read and write
5C50000
direct allocation
page read and write
1263000
heap
page read and write
3268000
heap
page read and write
127C000
heap
page read and write
5C60000
direct allocation
page read and write
127C000
heap
page read and write
39C3000
direct allocation
page read and write
3B69000
direct allocation
page read and write
3600000
heap
page read and write
7D0000
heap
page read and write
35CE000
stack
page read and write
4DA8000
direct allocation
page read and write
327F000
heap
page read and write
2DFD000
stack
page read and write
3A40000
direct allocation
page read and write
3265000
heap
page read and write
F0E000
stack
page read and write
7100000
direct allocation
page read and write
1253000
heap
page read and write
412000
unkown
page readonly
3002000
heap
page read and write
327F000
heap
page read and write
5A20000
direct allocation
page read and write
55DD000
stack
page read and write
127C000
heap
page read and write
4DCC000
direct allocation
page read and write
1253000
heap
page read and write
2D50000
heap
page read and write
127C000
heap
page read and write
11D3000
heap
page read and write
5DB0000
direct allocation
page read and write
4D94000
direct allocation
page read and write
3267000
heap
page read and write
4D9C000
direct allocation
page read and write
900000
heap
page read and write
1253000
heap
page read and write
5A10000
direct allocation
page read and write
11E9000
heap
page read and write
1253000
heap
page read and write
3264000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
585F000
stack
page read and write
1253000
heap
page read and write
1150000
heap
page read and write
1253000
heap
page read and write
1282000
heap
page read and write
3B69000
direct allocation
page read and write
4D94000
direct allocation
page read and write
4DB0000
direct allocation
page read and write
11B2000
heap
page read and write
2D77000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
39C3000
direct allocation
page read and write
3470000
heap
page read and write
559E000
stack
page read and write
11E9000
heap
page read and write
765C000
stack
page read and write
2DB0000
heap
page readonly
5B00000
direct allocation
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
127C000
heap
page read and write
3231000
heap
page read and write
327F000
heap
page read and write
1253000
heap
page read and write
4D94000
direct allocation
page read and write
1253000
heap
page read and write
32BF000
heap
page read and write
3A40000
direct allocation
page read and write
3296000
heap
page read and write
4DF0000
direct allocation
page read and write
127C000
heap
page read and write
4D80000
heap
page read and write
1263000
heap
page read and write
2CDB000
stack
page read and write
1253000
heap
page read and write
360B000
heap
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
7A0000
heap
page read and write
66D4000
direct allocation
page read and write
1253000
heap
page read and write
327F000
heap
page read and write
1253000
heap
page read and write
5DB0000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
420000
unkown
page write copy
1253000
heap
page read and write
127C000
heap
page read and write
4DA4000
direct allocation
page read and write
327F000
heap
page read and write
127C000
heap
page read and write
3271000
heap
page read and write
11D1000
heap
page read and write
5B10000
direct allocation
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
720E000
direct allocation
page read and write
990000
heap
page read and write
346E000
unkown
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
127C000
heap
page read and write
5AC0000
direct allocation
page read and write
3244000
heap
page read and write
7080000
heap
page read and write
4D94000
direct allocation
page read and write
5CB0000
direct allocation
page read and write
127C000
heap
page read and write
44C000
unkown
page readonly
5D94000
direct allocation
page read and write
39C3000
direct allocation
page read and write
4D9C000
direct allocation
page read and write
1253000
heap
page read and write
531E000
stack
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
3280000
heap
page read and write
3286000
heap
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
41C000
unkown
page write copy
1253000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
327F000
heap
page read and write
1253000
heap
page read and write
5A10000
direct allocation
page read and write
1253000
heap
page read and write
7300000
trusted library allocation
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
127C000
heap
page read and write
1253000
heap
page read and write
438000
unkown
page readonly
327F000
heap
page read and write
DDB000
stack
page read and write
3200000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
3BDE000
direct allocation
page read and write
3621000
heap
page read and write
3A40000
direct allocation
page read and write
1253000
heap
page read and write
4E68000
direct allocation
page read and write
1253000
heap
page read and write
3013000
heap
page read and write
2D70000
heap
page read and write
3B69000
direct allocation
page read and write
3B69000
direct allocation
page read and write
127C000
heap
page read and write
4D94000
direct allocation
page read and write
358F000
unkown
page read and write
4E68000
direct allocation
page read and write
1253000
heap
page read and write
7200000
direct allocation
page read and write
4D94000
direct allocation
page read and write
5C50000
direct allocation
page read and write
1253000
heap
page read and write
424000
unkown
page readonly
545F000
stack
page read and write
3280000
heap
page read and write
4D94000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
1180000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
7401000
heap
page read and write
FF0000
heap
page read and write
3EC000
unkown
page readonly
127C000
heap
page read and write
5E28000
direct allocation
page read and write
39C3000
direct allocation
page read and write
5A10000
direct allocation
page read and write
123D000
heap
page read and write
1253000
heap
page read and write
11B3000
heap
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
11EA000
heap
page read and write
1253000
heap
page read and write
11E9000
heap
page read and write
3312000
heap
page read and write
4E20000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
4D9C000
direct allocation
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
7212000
direct allocation
page read and write
1253000
heap
page read and write
41C000
unkown
page read and write
5B90000
direct allocation
page read and write
11C2000
heap
page read and write
42C000
unkown
page readonly
76A000
stack
page read and write
8FF000
stack
page read and write
5D40000
direct allocation
page read and write
1253000
heap
page read and write
5E50000
direct allocation
page read and write
11E9000
heap
page read and write
3623000
heap
page read and write
535E000
stack
page read and write
6FC000
stack
page read and write
3301000
heap
page read and write
549D000
stack
page read and write
1253000
heap
page read and write
1253000
heap
page read and write
4D94000
direct allocation
page read and write
There are 434 hidden memdumps, click here to show them.