IOC Report
6BE4RDldhw.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6BE4RDldhw.exe
"C:\Users\user\Desktop\6BE4RDldhw.exe"
malicious

URLs

Name
IP
Malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi8
unknown
malicious
https://taksonsdfg.co.in/05
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi:
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_YjnxmyasmzaIb
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgiDASYC
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_Yjnxmyasmza
unknown
malicious
https://taksonsdfg.co.in:443/2345678765432123456789876543/243_YjnxmyasmzaX
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiqr
unknown
malicious
https://taksonsdfg.co.in/9r6k
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-RangesLas
unknown
malicious
https://taksonsdfg.co.in/H
unknown
malicious
https://taksonsdfg.co.in/234567876543212P
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi
108.170.55.202
malicious
https://taksonsdfg.co.in/2345678765432121$
unknown
malicious
https://taksonsdfg.co.in:443/2345678765432123456789876543/243_Yjnxmyasmza0u
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmzaaq
unknown
malicious
https://taksonsdfg.co.in/yr
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi43/243_Yjnxmyasmza0u
unknown
malicious
https://taksonsdfg.co.in/1r
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmzakb
unknown
malicious
https://taksonsdfg.co.in:443/2345678765432123456789876543/243_Yjnxmyasmza
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_Yjnxmyasmzaqb
unknown
malicious
https://taksonsdfg.co.in/)r
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgim
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmzak
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgig3ok
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmza
108.170.55.202
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi$
unknown
malicious
https://taksonsdfg.co.in/Qu
unknown
malicious
https://taksonsdfg.co.in/cgi-s
unknown
malicious
https://taksonsdfg.co.in/Qr
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi1Content-LengthAllowWarningViaUpgradeTransfer-
unknown
malicious
https://taksonsdfg.co.in/Ir
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgi43/243_Yjnxmyasmza
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiLocationETagAuthentication-InfoAgeAccept-R
unknown
malicious
https://taksonsdfg.co.in/Ar
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi)r
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_YjnxmyasmzaCb
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmza8
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmza7
unknown
malicious
https://taksonsdfg.co.in/234567876543212a
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_Yjnxmyasmza-bRk
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_Yjnxmyasmzakb
unknown
malicious
https://taksonsdfg.co.in/
unknown
malicious
https://taksonsdfg.co.in/4
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi4
unknown
malicious
https://taksonsdfg.co.in:443/cgi-sys/suspendedpage.cgiP
unknown
malicious
https://taksonsdfg.co.in/iu
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgiU3
unknown
malicious
https://taksonsdfg.co.in/234567876543212
unknown
malicious
https://taksonsdfg.co.in/ar
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi$
unknown
malicious
https://taksonsdfg.co.in/cgi-sys/suspendedpage.cgi43/243_YjnxmyasmzaWb
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmza$
unknown
malicious
https://taksonsdfg.co.in
unknown
malicious
https://taksonsdfg.co.in/2345678765432123456789876543/243_Yjnxmyasmza#
unknown
malicious
https://taksonsdfg.co.in/Yr
unknown
malicious
http://www.pmail.com
unknown
https://www.veeble.org/contact/
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
taksonsdfg.co.in
108.170.55.202
malicious

IPs

IP
Domain
Country
Malicious
108.170.55.202
taksonsdfg.co.in
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8FA000
heap
page read and write
2330000
heap
page read and write
8FA000
heap
page read and write
933000
heap
page read and write
206F3000
heap
page read and write
93E000
heap
page read and write
8D5000
heap
page read and write
909000
heap
page read and write
905000
heap
page read and write
8BA000
heap
page read and write
8D5000
heap
page read and write
8BF000
heap
page read and write
8D5000
heap
page read and write
8F0000
heap
page read and write
8E6000
heap
page read and write
8F0000
heap
page read and write
901000
heap
page read and write
8F3000
heap
page read and write
91A000
heap
page read and write
92F000
heap
page read and write
91B000
heap
page read and write
8CB000
heap
page read and write
8BF000
heap
page read and write
914000
heap
page read and write
8FA000
heap
page read and write
8D7000
heap
page read and write
1FAD4000
direct allocation
page read and write
7E790000
direct allocation
page read and write
8D5000
heap
page read and write
93E000
heap
page read and write
901000
heap
page read and write
7F650000
direct allocation
page read and write
8C5000
heap
page read and write
917000
heap
page read and write
8D5000
heap
page read and write
7FAE0000
direct allocation
page read and write
7F460000
direct allocation
page read and write
8F0000
heap
page read and write
928000
heap
page read and write
92B000
heap
page read and write
927000
heap
page read and write
927000
heap
page read and write
917000
heap
page read and write
909000
heap
page read and write
8F5000
heap
page read and write
93C000
heap
page read and write
206F3000
heap
page read and write
6B5000
heap
page read and write
8F5000
heap
page read and write
8E3000
heap
page read and write
917000
heap
page read and write
8D4000
heap
page read and write
8F3000
heap
page read and write
8EE000
heap
page read and write
922000
heap
page read and write
93E000
heap
page read and write
8FA000
heap
page read and write
931000
heap
page read and write
8CB000
heap
page read and write
1FE3F000
stack
page read and write
8C5000
heap
page read and write
20350000
heap
page read and write
901000
heap
page read and write
8B9000
heap
page read and write
7E3D0000
direct allocation
page read and write
914000
heap
page read and write
932000
heap
page read and write
48A000
unkown
page read and write
915000
heap
page read and write
8FC000
heap
page read and write
2430000
direct allocation
page read and write
8BA000
heap
page read and write
924000
heap
page read and write
901000
heap
page read and write
93A000
heap
page read and write
914000
heap
page read and write
8CD000
heap
page read and write
909000
heap
page read and write
92B000
heap
page read and write
903000
heap
page read and write
8C4000
heap
page read and write
901000
heap
page read and write
932000
heap
page read and write
914000
heap
page read and write
48F000
unkown
page readonly
2052E000
stack
page read and write
1FBFF000
stack
page read and write
1FBFA000
stack
page read and write
901000
heap
page read and write
919000
heap
page read and write
6B0000
heap
page read and write
8CE000
heap
page read and write
8BA000
heap
page read and write
8C5000
heap
page read and write
92F000
heap
page read and write
7FC6F000
direct allocation
page read and write
8CB000
heap
page read and write
8F5000
heap
page read and write
8CE000
heap
page read and write
206D1000
heap
page read and write
8EE000
heap
page read and write
8FC000
heap
page read and write
8F8000
heap
page read and write
8D5000
heap
page read and write
8EE000
heap
page read and write
8BF000
heap
page read and write
903000
heap
page read and write
8CF000
heap
page read and write
8FC000
heap
page read and write
901000
heap
page read and write
901000
heap
page read and write
8CB000
heap
page read and write
8DD000
heap
page read and write
914000
heap
page read and write
919000
heap
page read and write
8BF000
heap
page read and write
2062E000
stack
page read and write
8BA000
heap
page read and write
931000
heap
page read and write
8F5000
heap
page read and write
7F7C0000
direct allocation
page read and write
92B000
heap
page read and write
8CC000
heap
page read and write
909000
heap
page read and write
245C000
direct allocation
page read and write
203EE000
stack
page read and write
8FD000
heap
page read and write
7F930000
direct allocation
page read and write
8FC000
heap
page read and write
8EE000
heap
page read and write
1FAC6000
direct allocation
page read and write
90B000
heap
page read and write
931000
heap
page read and write
8BF000
heap
page read and write
922000
heap
page read and write
92C000
heap
page read and write
8D7000
heap
page read and write
8D7000
heap
page read and write
8D7000
heap
page read and write
924000
heap
page read and write
927000
heap
page read and write
909000
heap
page read and write
914000
heap
page read and write
8EE000
heap
page read and write
1FAF8000
direct allocation
page read and write
934000
heap
page read and write
8F5000
heap
page read and write
206F3000
heap
page read and write
206DB000
heap
page read and write
8EE000
heap
page read and write
929000
heap
page read and write
8EE000
heap
page read and write
901000
heap
page read and write
2463000
direct allocation
page read and write
8BA000
heap
page read and write
903000
heap
page read and write
8BA000
heap
page read and write
933000
heap
page read and write
93E000
heap
page read and write
8BF000
heap
page read and write
90B000
heap
page read and write
8FC000
heap
page read and write
8F0000
heap
page read and write
206D1000
heap
page read and write
8CD000
heap
page read and write
938000
heap
page read and write
933000
heap
page read and write
7F840000
direct allocation
page read and write
7FA50000
direct allocation
page read and write
918000
heap
page read and write
8F0000
heap
page read and write
8CB000
heap
page read and write
92C000
heap
page read and write
901000
heap
page read and write
91D000
heap
page read and write
937000
heap
page read and write
901000
heap
page read and write
7F7C0000
direct allocation
page read and write
1FD3E000
stack
page read and write
92B000
heap
page read and write
8FC000
heap
page read and write
204EF000
stack
page read and write
901000
heap
page read and write
8C5000
heap
page read and write
909000
heap
page read and write
903000
heap
page read and write
8FC000
heap
page read and write
92D000
heap
page read and write
2478000
direct allocation
page read and write
92E000
heap
page read and write
2CDA000
heap
page read and write
8C6000
heap
page read and write
8D7000
heap
page read and write
903000
heap
page read and write
8C5000
heap
page read and write
8D7000
heap
page read and write
8DE000
heap
page read and write
8D7000
heap
page read and write
91D000
heap
page read and write
903000
heap
page read and write
7F740000
direct allocation
page read and write
917000
heap
page read and write
90B000
heap
page read and write
8E6000
heap
page read and write
93E000
heap
page read and write
914000
heap
page read and write
903000
heap
page read and write
8FC000
heap
page read and write
206DA000
heap
page read and write
8CB000
heap
page read and write
8F3000
heap
page read and write
91D000
heap
page read and write
919000
heap
page read and write
8FA000
heap
page read and write
917000
heap
page read and write
8CC000
heap
page read and write
246A000
direct allocation
page read and write
932000
heap
page read and write
909000
heap
page read and write
2EF7000
direct allocation
page execute and read and write
917000
heap
page read and write
8F3000
heap
page read and write
903000
heap
page read and write
909000
heap
page read and write
932000
heap
page read and write
8F3000
heap
page read and write
7F930000
direct allocation
page read and write
2FEC000
direct allocation
page execute and read and write
8CE000
heap
page read and write
901000
heap
page read and write
8FA000
heap
page read and write
923000
heap
page read and write
939000
heap
page read and write
919000
heap
page read and write
919000
heap
page read and write
917000
heap
page read and write
8C7000
heap
page read and write
903000
heap
page read and write
8F3000
heap
page read and write
924000
heap
page read and write
206D3000
heap
page read and write
8BA000
heap
page read and write
939000
heap
page read and write
2CCF000
heap
page read and write
7F5D0000
direct allocation
page read and write
7FA30000
direct allocation
page read and write
92B000
heap
page read and write
91B000
heap
page read and write
931000
heap
page read and write
8FC000
heap
page read and write
90B000
heap
page read and write
93E000
heap
page read and write
8F0000
heap
page read and write
8F5000
heap
page read and write
8FC000
heap
page read and write
8F5000
heap
page read and write
8F5000
heap
page read and write
924000
heap
page read and write
206D1000
heap
page read and write
93C000
heap
page read and write
206D2000
heap
page read and write
936000
heap
page read and write
8EE000
heap
page read and write
903000
heap
page read and write
8E4000
heap
page read and write
8F0000
heap
page read and write
939000
heap
page read and write
8D7000
heap
page read and write
8BF000
heap
page read and write
903000
heap
page read and write
91A000
heap
page read and write
92F000
heap
page read and write
93B000
heap
page read and write
90B000
heap
page read and write
924000
heap
page read and write
927000
heap
page read and write
934000
heap
page read and write
92C000
heap
page read and write
935000
heap
page read and write
8BF000
heap
page read and write
92F000
heap
page read and write
922000
heap
page read and write
8CA000
heap
page read and write
93E000
heap
page read and write
2471000
direct allocation
page read and write
8CB000
heap
page read and write
922000
heap
page read and write
90B000
heap
page read and write
92C000
heap
page read and write
8FC000
heap
page read and write
936000
heap
page read and write
206F1000
heap
page read and write
909000
heap
page read and write
901000
heap
page read and write
8F5000
heap
page read and write
8EC000
heap
page read and write
91A000
heap
page read and write
922000
heap
page read and write
7F4E0000
direct allocation
page read and write
8DE000
heap
page read and write
91A000
heap
page read and write
8D5000
heap
page read and write
1FE7E000
stack
page read and write
7FC10000
direct allocation
page read and write
90B000
heap
page read and write
933000
heap
page read and write
1FABF000
direct allocation
page read and write
7FC90000
direct allocation
page read and write
917000
heap
page read and write
21E0000
heap
page read and write
903000
heap
page read and write
8F0000
heap
page read and write
909000
heap
page read and write
8D7000
heap
page read and write
92D000
heap
page read and write
8BA000
heap
page read and write
7EEB0000
direct allocation
page read and write
1FACD000
direct allocation
page read and write
8D7000
heap
page read and write
84E000
heap
page read and write
8F3000
heap
page read and write
8EE000
heap
page read and write
8FA000
heap
page read and write
935000
heap
page read and write
915000
heap
page read and write
2E9E000
direct allocation
page read and write
8FA000
heap
page read and write
92F000
heap
page read and write
2024E000
stack
page read and write
8EE000
heap
page read and write
932000
heap
page read and write
909000
heap
page read and write
91A000
heap
page read and write
92F000
heap
page read and write
8C5000
heap
page read and write
830000
heap
page read and write
7F020000
direct allocation
page read and write
8CB000
heap
page read and write
7FABF000
direct allocation
page read and write
2336000
heap
page read and write
930000
heap
page read and write
8BF000
heap
page read and write
8FC000
heap
page read and write
8CB000
heap
page read and write
92F000
heap
page read and write
922000
heap
page read and write
909000
heap
page read and write
2FEE000
direct allocation
page execute and read and write
203A0000
remote allocation
page read and write
917000
heap
page read and write
8F5000
heap
page read and write
2C31000
heap
page read and write
928000
heap
page read and write
91F000
heap
page read and write
8F3000
heap
page read and write
927000
heap
page read and write
7F650000
direct allocation
page read and write
917000
heap
page read and write
8D7000
heap
page read and write
8CE000
heap
page read and write
923000
heap
page read and write
8D7000
heap
page read and write
8CB000
heap
page read and write
93A000
heap
page read and write
8E2000
heap
page read and write
478000
unkown
page write copy
914000
heap
page read and write
48A000
unkown
page write copy
920000
heap
page read and write
8D7000
heap
page read and write
914000
heap
page read and write
1FAB0000
direct allocation
page read and write
917000
heap
page read and write
8C2000
heap
page read and write
92B000
heap
page read and write
8D7000
heap
page read and write
8FA000
heap
page read and write
901000
heap
page read and write
8EE000
heap
page read and write
91D000
heap
page read and write
909000
heap
page read and write
206D3000
heap
page read and write
917000
heap
page read and write
206F0000
heap
page read and write
8FA000
heap
page read and write
8C5000
heap
page read and write
924000
heap
page read and write
7E810000
direct allocation
page read and write
8BF000
heap
page read and write
917000
heap
page read and write
909000
heap
page read and write
938000
heap
page read and write
903000
heap
page read and write
8F8000
heap
page read and write
92B000
heap
page read and write
8C6000
heap
page read and write
904000
heap
page read and write
8BA000
heap
page read and write
650000
heap
page read and write
8C5000
heap
page read and write
933000
heap
page read and write
2A7E000
heap
page read and write
8BF000
heap
page read and write
92F000
heap
page read and write
927000
heap
page read and write
8FA000
heap
page read and write
206D3000
heap
page read and write
8FC000
heap
page read and write
91D000
heap
page read and write
906000
heap
page read and write
909000
heap
page read and write
8CC000
heap
page read and write
8F3000
heap
page read and write
244D000
direct allocation
page read and write
8BF000
heap
page read and write
92F000
heap
page read and write
7F0A0000
direct allocation
page read and write
2CB6000
heap
page read and write
929000
heap
page read and write
931000
heap
page read and write
2020D000
stack
page read and write
8BA000
heap
page read and write
8BA000
heap
page read and write
203A0000
remote allocation
page read and write
901000
heap
page read and write
8CF000
heap
page read and write
7EF30000
direct allocation
page read and write
203A0000
remote allocation
page read and write
935000
heap
page read and write
484000
unkown
page read and write
8EE000
heap
page read and write
93E000
heap
page read and write
2CD3000
heap
page read and write
7F930000
direct allocation
page read and write
914000
heap
page read and write
8FC000
heap
page read and write
933000
heap
page read and write
8C5000
heap
page read and write
909000
heap
page read and write
7F460000
direct allocation
page read and write
8D7000
heap
page read and write
917000
heap
page read and write
8E6000
heap
page read and write
2034D000
stack
page read and write
90B000
heap
page read and write
922000
heap
page read and write
909000
heap
page read and write
8FC000
heap
page read and write
901000
heap
page read and write
933000
heap
page read and write
915000
heap
page read and write
8EE000
heap
page read and write
206F3000
heap
page read and write
933000
heap
page read and write
935000
heap
page read and write
8C5000
heap
page read and write
8E4000
heap
page read and write
928000
heap
page read and write
927000
heap
page read and write
8F0000
heap
page read and write
903000
heap
page read and write
8D5000
heap
page read and write
8BF000
heap
page read and write
933000
heap
page read and write
901000
heap
page read and write
2200000
direct allocation
page execute and read and write
8F0000
heap
page read and write
8CB000
heap
page read and write
22A0000
heap
page read and write
8AB000
heap
page read and write
206D3000
heap
page read and write
1FFCE000
stack
page read and write
8C5000
heap
page read and write
8D5000
heap
page read and write
7F7C0000
direct allocation
page read and write
90B000
heap
page read and write
92D000
heap
page read and write
92F000
heap
page read and write
8F5000
heap
page read and write
8BF000
heap
page read and write
8D5000
heap
page read and write
917000
heap
page read and write
8C6000
heap
page read and write
8FA000
heap
page read and write
229C000
stack
page read and write
1FAB8000
direct allocation
page read and write
8F3000
heap
page read and write
8E6000
heap
page read and write
8BA000
heap
page read and write
8F3000
heap
page read and write
8E6000
heap
page read and write
8F3000
heap
page read and write
478000
unkown
page read and write
92B000
heap
page read and write
8DB000
heap
page read and write
8E9000
heap
page read and write
7F190000
direct allocation
page read and write
8CB000
heap
page read and write
922000
heap
page read and write
922000
heap
page read and write
206D3000
heap
page read and write
8FC000
heap
page read and write
931000
heap
page read and write
8F5000
heap
page read and write
90B000
heap
page read and write
8FA000
heap
page read and write
8C5000
heap
page read and write
7FC00000
direct allocation
page read and write
909000
heap
page read and write
8E6000
heap
page read and write
23C6000
direct allocation
page read and write
901000
heap
page read and write
90B000
heap
page read and write
1FAF1000
direct allocation
page read and write
8D7000
heap
page read and write
8FA000
heap
page read and write
8E1000
heap
page read and write
8F3000
heap
page read and write
8BF000
heap
page read and write
1FAEA000
direct allocation
page read and write
8E6000
heap
page read and write
1F0000
heap
page read and write
8BA000
heap
page read and write
909000
heap
page read and write
924000
heap
page read and write
901000
heap
page read and write
903000
heap
page read and write
903000
heap
page read and write
8EE000
heap
page read and write
2454000
direct allocation
page read and write
914000
heap
page read and write
91C000
heap
page read and write
840000
heap
page read and write
8F6000
heap
page read and write
2E71000
direct allocation
page execute read
8F3000
heap
page read and write
206D3000
heap
page read and write
922000
heap
page read and write
909000
heap
page read and write
8CB000
heap
page read and write
8BA000
heap
page read and write
8F5000
heap
page read and write
28BA000
heap
page read and write
93E000
heap
page read and write
914000
heap
page read and write
93E000
heap
page read and write
928000
heap
page read and write
2D54000
heap
page read and write
8EE000
heap
page read and write
7EEB0000
direct allocation
page read and write
8F8000
heap
page read and write
93B000
heap
page read and write
8CB000
heap
page read and write
8EE000
heap
page read and write
8FA000
heap
page read and write
8C5000
heap
page read and write
1FF7F000
stack
page read and write
8DB000
heap
page read and write
91E000
heap
page read and write
924000
heap
page read and write
909000
heap
page read and write
92B000
heap
page read and write
917000
heap
page read and write
19D000
stack
page read and write
901000
heap
page read and write
8BF000
heap
page read and write
8E6000
heap
page read and write
8D5000
heap
page read and write
8CC000
heap
page read and write
917000
heap
page read and write
937000
heap
page read and write
206D7000
heap
page read and write
8F5000
heap
page read and write
8F5000
heap
page read and write
92F000
heap
page read and write
8BF000
heap
page read and write
8FA000
heap
page read and write
934000
heap
page read and write
917000
heap
page read and write
8D7000
heap
page read and write
8F3000
heap
page read and write
915000
heap
page read and write
8F0000
heap
page read and write
8CB000
heap
page read and write
8CB000
heap
page read and write
28B0000
heap
page read and write
909000
heap
page read and write
89E000
heap
page read and write
93E000
heap
page read and write
7F930000
direct allocation
page read and write
903000
heap
page read and write
8F8000
heap
page read and write
914000
heap
page read and write
206D3000
heap
page read and write
909000
heap
page read and write
909000
heap
page read and write
8F5000
heap
page read and write
8F3000
heap
page read and write
2010E000
stack
page read and write
914000
heap
page read and write
92B000
heap
page read and write
90C000
heap
page read and write
909000
heap
page read and write
92C000
heap
page read and write
914000
heap
page read and write
924000
heap
page read and write
8EE000
heap
page read and write
92B000
heap
page read and write
909000
heap
page read and write
924000
heap
page read and write
1FBFE000
stack
page execute and read and write
8CB000
heap
page read and write
8F3000
heap
page read and write
93B000
heap
page read and write
92F000
heap
page read and write
2CDE000
heap
page read and write
1FA8F000
direct allocation
page read and write
8D7000
heap
page read and write
206D0000
heap
page read and write
9B000
stack
page read and write
8F3000
heap
page read and write
22A3000
heap
page read and write
8B8000
heap
page read and write
919000
heap
page read and write
917000
heap
page read and write
922000
heap
page read and write
8F0000
heap
page read and write
8F5000
heap
page read and write
8F8000
heap
page read and write
8EE000
heap
page read and write
8CB000
heap
page read and write
7F7C0000
direct allocation
page read and write
93A000
heap
page read and write
7FC5F000
direct allocation
page read and write
2415000
direct allocation
page read and write
84A000
heap
page read and write
8D5000
heap
page read and write
8F0000
heap
page read and write
8FA000
heap
page read and write
8CC000
heap
page read and write
8F3000
heap
page read and write
915000
heap
page read and write
8F0000
heap
page read and write
8CD000
heap
page read and write
8D5000
heap
page read and write
914000
heap
page read and write
927000
heap
page read and write
91C000
heap
page read and write
8FA000
heap
page read and write
919000
heap
page read and write
8EE000
heap
page read and write
8C5000
heap
page read and write
7FBC0000
direct allocation
page read and write
8EE000
heap
page read and write
914000
heap
page read and write
8FA000
heap
page read and write
7F8A0000
direct allocation
page read and write
90C000
heap
page read and write
939000
heap
page read and write
8E2000
heap
page read and write
2CAB000
heap
page read and write
903000
heap
page read and write
917000
heap
page read and write
8EE000
heap
page read and write
8F3000
heap
page read and write
206D1000
heap
page read and write
8F3000
heap
page read and write
8F6000
heap
page read and write
91A000
heap
page read and write
90B000
heap
page read and write
8F8000
heap
page read and write
8F5000
heap
page read and write
7F930000
direct allocation
page read and write
8CE000
heap
page read and write
2C3C000
heap
page read and write
7F7C0000
direct allocation
page read and write
8D7000
heap
page read and write
90B000
heap
page read and write
922000
heap
page read and write
8BF000
heap
page read and write
7F8EF000
direct allocation
page read and write
931000
heap
page read and write
401000
unkown
page execute read
7F020000
direct allocation
page read and write
2E70000
direct allocation
page readonly
8BA000
heap
page read and write
8BA000
heap
page read and write
8FD000
heap
page read and write
91B000
heap
page read and write
919000
heap
page read and write
8F0000
heap
page read and write
903000
heap
page read and write
8BA000
heap
page read and write
7FC20000
direct allocation
page read and write
8BA000
heap
page read and write
8BF000
heap
page read and write
200CF000
stack
page read and write
8D5000
heap
page read and write
939000
heap
page read and write
909000
heap
page read and write
7FD70000
direct allocation
page read and write
1FAE3000
direct allocation
page read and write
400000
unkown
page readonly
8D7000
heap
page read and write
2220000
heap
page read and write
7F210000
direct allocation
page read and write
905000
heap
page read and write
917000
heap
page read and write
7F9B0000
direct allocation
page read and write
There are 699 hidden memdumps, click here to show them.