IOC Report
random(1).exe

loading gif

Files

File Path
Type
Category
Malicious
random(1).exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
malicious
C:\ProgramData\AFBAFBKEGCFBGCBFIDAK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECAKKKKJDBKKFIEBKEHDGCAFCB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FHIDAFHCBAKFCAAKFCFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIDAAFBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIDAAFBGDBKJJJKFIIIJ
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JKJDHDBK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJJJJDHIDBGHIDHIDAFBAECGHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
Chrome Cache Entry: 164
ASCII text, with very long lines (3722)
downloaded
Chrome Cache Entry: 165
ASCII text
downloaded
Chrome Cache Entry: 166
ASCII text, with very long lines (1437)
downloaded
Chrome Cache Entry: 167
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 168
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 169
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 170
ASCII text, with very long lines (5162), with no line terminators
downloaded
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\random(1).exe
"C:\Users\user\Desktop\random(1).exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2280,i,4646147605048899530,4272269093725665048,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
http://185.215.113.115/68b591d6548ec281/vcruntime140.dlln
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://185.215.113.115/68b591d6548ec281/vcruntime140.dllc
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239385917469_1PJ7CJICMRWKJR5SF&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://tse1.mm.bing.net/th?id=OADD2.10239400678274_1AGJJ9P2O7V6V1431&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.115/68b591d6548ec281/nss3.dllw
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://185.215.113.115/c4becf79229cb002.phpl
unknown
http://185.215.113.115/68b591d6548ec281/vcruntime140.dlls
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.115/68b591d6548ec281/freebl3.dllbN
unknown
http://185.215.113.115/c4becf79229cb002.phpp
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.215.113.115/c4becf79229cb002.phpAAFBGDBKJJJKFIIIJ
unknown
http://185.215.113.115/68b591d6548ec281/msvcp140.dll
185.215.113.115
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.115/68b591d6548ec281/msvcp140.dllBN
unknown
http://185.215.113.115/c4becf79229cb002.phprowser
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239400678275_1MGQ4V998SN0MOXXU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.115/c4becf79229cb002.phpC
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
185.215.113.115/c4becf79229cb002.php
http://185.215.113.115/68b591d6548ec281/vcruntime140.dll
185.215.113.115
http://185.215.113.115/68b591d6548ec281/vcruntime140.dll;
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.115c4becf79229cb002.phpser
unknown
http://185.215.113.115y
unknown
http://185.215.113.115/c4becf79229cb002.phpO
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.185.68
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239385917470_1O4L0U46N29EF81I2&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.115/c4becf79229cb002.phpW
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.115/c4becf79229cb002.phper
unknown
http://185.215.113.115/c4becf79229cb002.phpve
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.115/68b591d6548ec281/mozglue.dlle
unknown
https://mozilla.org0/
unknown
http://185.215.113.115/
185.215.113.115
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239354941422_128KB82EECTAVENHE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.115/68b591d6548ec281/softokn3.dllA
unknown
http://185.215.113.115/c4becf79229cb002.php%0
unknown
http://185.215.113.115/Y
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.185.68
http://185.215.113.115/68b591d6548ec281/vcruntime140.dll.
unknown
http://185.215.113.115
unknown
http://185.215.113.115/c4becf79229cb002.php3
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://185.215.113.115/68b591d6548ec281/freebl3.dll
185.215.113.115
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.115/68b591d6548ec281/nss3.dll
185.215.113.115
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.185.68
https://play.google.com/log?format=json&hasfast=true
142.250.185.174
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.68
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.uiLLJjqnhCQ.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo8NP2y291iiPDmfAN0GV3dvCuqlYA/cb=gapi.loaded_0
142.250.185.110
http://185.215.113.115/68b591d6548ec281/softokn3.dll
185.215.113.115
http://185.215.113.115/c4becf79229cb002.php
185.215.113.115
http://185.215.113.115/68b591d6548ec281/freebl3.dllO
unknown
http://185.215.113.115/c4becf79229cb002.phpR0
unknown
http://185.215.113.115/68b591d6548ec281/sqlite3.dll
185.215.113.115
https://support.mozilla.org
unknown
http://185.215.113.115/68b591d6548ec281/mozglue.dll
185.215.113.115
http://185.215.113.115/68b591d6548ec281/msvcp140.dllzN
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239354941421_1QFMKZTDAH37OHMPJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.115/68b591d6548ec281/sqlite3.dll=
unknown
https://clients6.google.com
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.185.110
play.google.com
142.250.185.174
www.google.com
142.250.185.68
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.115
unknown
Portugal
malicious
142.250.185.68
www.google.com
United States
142.250.185.110
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.174
play.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
8BD000
heap
page read and write
malicious
4BE0000
direct allocation
page read and write
malicious
C81000
unkown
page execute and read and write
malicious
4751000
heap
page read and write
61ED4000
direct allocation
page readonly
2A3F000
stack
page read and write
D35000
unkown
page execute and read and write
558C000
heap
page read and write
6C6FE000
unkown
page read and write
421F000
stack
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
500E000
stack
page read and write
557E000
heap
page read and write
5571000
heap
page read and write
4751000
heap
page read and write
6F870000
unkown
page readonly
4751000
heap
page read and write
3ADE000
stack
page read and write
C7E000
stack
page read and write
8F7000
heap
page read and write
4751000
heap
page read and write
510F000
stack
page read and write
ECC000
unkown
page execute and read and write
3C1E000
stack
page read and write
471F000
stack
page read and write
3F9F000
stack
page read and write
B6A2000
heap
page read and write
4751000
heap
page read and write
555F000
heap
page read and write
4751000
heap
page read and write
556C000
heap
page read and write
558C000
heap
page read and write
4751000
heap
page read and write
558C000
heap
page read and write
558C000
heap
page read and write
4740000
direct allocation
page read and write
95E000
heap
page read and write
556B000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
4D6E000
stack
page read and write
6E0000
heap
page read and write
4ECE000
stack
page read and write
309F000
stack
page read and write
1167000
unkown
page execute and read and write
61EB7000
direct allocation
page readonly
4D1F000
stack
page read and write
4751000
heap
page read and write
556F000
heap
page read and write
4751000
heap
page read and write
6F8ED000
unkown
page readonly
345F000
stack
page read and write
4750000
heap
page read and write
44DE000
stack
page read and write
6D0000
heap
page read and write
5584000
heap
page read and write
5571000
heap
page read and write
5574000
heap
page read and write
4751000
heap
page read and write
117F000
unkown
page execute and read and write
5574000
heap
page read and write
4751000
heap
page read and write
61ECD000
direct allocation
page readonly
6F902000
unkown
page readonly
5672000
heap
page read and write
5574000
heap
page read and write
5557000
heap
page read and write
6F871000
unkown
page execute read
4751000
heap
page read and write
556B000
heap
page read and write
395F000
stack
page read and write
2A97000
heap
page read and write
4751000
heap
page read and write
558C000
heap
page read and write
554B000
heap
page read and write
539C000
stack
page read and write
2F9E000
stack
page read and write
556B000
heap
page read and write
2BDE000
stack
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
5670000
trusted library allocation
page read and write
5559000
heap
page read and write
385E000
stack
page read and write
6C520000
unkown
page readonly
558C000
heap
page read and write
B8EE000
heap
page read and write
31DF000
stack
page read and write
B641000
heap
page read and write
558C000
heap
page read and write
5589000
heap
page read and write
5563000
heap
page read and write
61E01000
direct allocation
page execute read
4D60000
direct allocation
page execute and read and write
5571000
heap
page read and write
4740000
direct allocation
page read and write
B8E9000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
557E000
heap
page read and write
558C000
heap
page read and write
556C000
heap
page read and write
558C000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
556B000
heap
page read and write
5557000
heap
page read and write
4751000
heap
page read and write
EB8000
unkown
page execute and read and write
D54000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
4740000
direct allocation
page read and write
331F000
stack
page read and write
399E000
stack
page read and write
B850000
trusted library allocation
page read and write
B8E0000
heap
page read and write
556A000
heap
page read and write
3A9F000
stack
page read and write
4751000
heap
page read and write
117F000
unkown
page execute and write copy
4751000
heap
page read and write
514E000
stack
page read and write
557E000
heap
page read and write
B8F1000
heap
page read and write
61E00000
direct allocation
page execute and read and write
4751000
heap
page read and write
2A7C000
stack
page read and write
557E000
heap
page read and write
B84E000
stack
page read and write
4751000
heap
page read and write
4740000
direct allocation
page read and write
B648000
heap
page read and write
B600000
heap
page read and write
4751000
heap
page read and write
4770000
heap
page read and write
47B7000
heap
page read and write
557E000
heap
page read and write
349E000
stack
page read and write
113F000
unkown
page execute and read and write
5569000
heap
page read and write
2D1E000
stack
page read and write
556D000
heap
page read and write
381F000
stack
page read and write
2E1F000
stack
page read and write
4751000
heap
page read and write
963000
heap
page read and write
4751000
heap
page read and write
425E000
stack
page read and write
6C6BF000
unkown
page readonly
556F000
heap
page read and write
4D60000
direct allocation
page execute and read and write
335E000
stack
page read and write
4740000
direct allocation
page read and write
5571000
heap
page read and write
557E000
heap
page read and write
3E9E000
stack
page read and write
4760000
heap
page read and write
3E5F000
stack
page read and write
890000
heap
page read and write
4751000
heap
page read and write
35DE000
stack
page read and write
558C000
heap
page read and write
5571000
heap
page read and write
556D000
heap
page read and write
5563000
heap
page read and write
4751000
heap
page read and write
C80000
unkown
page readonly
5563000
heap
page read and write
5557000
heap
page read and write
4740000
direct allocation
page read and write
558C000
heap
page read and write
4751000
heap
page read and write
4BE0000
direct allocation
page read and write
555F000
heap
page read and write
B5E0000
trusted library allocation
page read and write
1180000
unkown
page execute and write copy
4740000
direct allocation
page read and write
4751000
heap
page read and write
4755000
heap
page read and write
6C700000
unkown
page read and write
557E000
heap
page read and write
B5E0000
heap
page read and write
899000
heap
page read and write
5569000
heap
page read and write
B74E000
stack
page read and write
8E2000
heap
page read and write
959000
heap
page read and write
435F000
stack
page read and write
556B000
heap
page read and write
4751000
heap
page read and write
4740000
direct allocation
page read and write
556B000
heap
page read and write
4740000
direct allocation
page read and write
4751000
heap
page read and write
4D70000
direct allocation
page execute and read and write
556B000
heap
page read and write
411E000
stack
page read and write
36DF000
stack
page read and write
3D1F000
stack
page read and write
5557000
heap
page read and write
ECA000
unkown
page write copy
321E000
stack
page read and write
4751000
heap
page read and write
4720000
heap
page read and write
461E000
stack
page read and write
4BE0000
direct allocation
page read and write
B655000
heap
page read and write
D04000
unkown
page execute and read and write
B8E8000
heap
page read and write
B65C000
heap
page read and write
B5E0000
trusted library allocation
page read and write
4751000
heap
page read and write
116F000
unkown
page execute and read and write
556D000
heap
page read and write
4D40000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
2A80000
heap
page read and write
5540000
heap
page read and write
61ECC000
direct allocation
page read and write
6C705000
unkown
page readonly
2F5F000
stack
page read and write
529D000
stack
page read and write
A8E000
stack
page read and write
556A000
heap
page read and write
6C6FF000
unkown
page write copy
555F000
heap
page read and write
588000
stack
page read and write
5557000
heap
page read and write
61ED0000
direct allocation
page read and write
4751000
heap
page read and write
5542000
heap
page read and write
4D50000
direct allocation
page execute and read and write
2A9B000
heap
page read and write
5571000
heap
page read and write
4740000
direct allocation
page read and write
4751000
heap
page read and write
913000
heap
page read and write
74E000
stack
page read and write
B643000
heap
page read and write
4751000
heap
page read and write
3FDE000
stack
page read and write
439E000
stack
page read and write
4740000
direct allocation
page read and write
978000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
555F000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
2CDF000
stack
page read and write
5565000
heap
page read and write
45DF000
stack
page read and write
4751000
heap
page read and write
5571000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
1058000
unkown
page execute and read and write
40DF000
stack
page read and write
4751000
heap
page read and write
5571000
heap
page read and write
5571000
heap
page read and write
D50000
unkown
page execute and read and write
2B9F000
stack
page read and write
359F000
stack
page read and write
89E000
heap
page read and write
4751000
heap
page read and write
951000
heap
page read and write
C81000
unkown
page execute and write copy
4751000
heap
page read and write
4751000
heap
page read and write
61EB4000
direct allocation
page read and write
B64F000
heap
page read and write
4751000
heap
page read and write
5557000
heap
page read and write
4D80000
direct allocation
page execute and read and write
DE7000
unkown
page execute and read and write
84E000
stack
page read and write
4850000
trusted library allocation
page read and write
4C1C000
stack
page read and write
4751000
heap
page read and write
558C000
heap
page read and write
4FCF000
stack
page read and write
558C000
heap
page read and write
5585000
heap
page read and write
5575000
heap
page read and write
96A000
heap
page read and write
5571000
heap
page read and write
5567000
heap
page read and write
524F000
stack
page read and write
48C000
stack
page read and write
4751000
heap
page read and write
4740000
direct allocation
page read and write
5574000
heap
page read and write
4751000
heap
page read and write
557E000
heap
page read and write
556B000
heap
page read and write
53DD000
stack
page read and write
54DD000
stack
page read and write
371E000
stack
page read and write
4751000
heap
page read and write
5569000
heap
page read and write
4751000
heap
page read and write
4740000
direct allocation
page read and write
5589000
heap
page read and write
556D000
heap
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
88E000
stack
page read and write
2E5E000
stack
page read and write
58E000
stack
page read and write
2A9E000
heap
page read and write
4751000
heap
page read and write
30DE000
stack
page read and write
3BDF000
stack
page read and write
583000
stack
page read and write
556A000
heap
page read and write
556F000
heap
page read and write
B6AA000
heap
page read and write
1325000
unkown
page execute and read and write
ECA000
unkown
page write copy
C80000
unkown
page read and write
556D000
heap
page read and write
3D5D000
stack
page read and write
4751000
heap
page read and write
6F8FE000
unkown
page read and write
4740000
direct allocation
page read and write
6E5000
heap
page read and write
B620000
heap
page read and write
4E8F000
stack
page read and write
5F0000
heap
page read and write
449F000
stack
page read and write
2A90000
heap
page read and write
970000
heap
page read and write
4751000
heap
page read and write
6C521000
unkown
page execute read
556D000
heap
page read and write
8DF000
heap
page read and write
556E000
heap
page read and write
There are 331 hidden memdumps, click here to show them.