IOC Report
triage_dropped_file

loading gif

Files

File Path
Type
Category
Malicious
triage_dropped_file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\qcoewlbpwb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0vyupr8u8lte8hs
data
dropped
C:\Users\user\AppData\Local\Temp\nspFB82.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\tznfsiydnl
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\triage_dropped_file.exe
"C:\Users\user\Desktop\triage_dropped_file.exe"
malicious
C:\Users\user\AppData\Local\Temp\qcoewlbpwb.exe
C:\Users\user\AppData\Local\Temp\qcoewlbpwb.exe C:\Users\user\AppData\Local\Temp\tznfsiydnl
malicious
C:\Users\user\AppData\Local\Temp\qcoewlbpwb.exe
C:\Users\user\AppData\Local\Temp\qcoewlbpwb.exe C:\Users\user\AppData\Local\Temp\tznfsiydnl
malicious

URLs

Name
IP
Malicious
www.cortesdisenosroutercnc.com/itq4/
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1410000
direct allocation
page read and write
malicious
29EB7626000
heap
page read and write
21212F80000
heap
page read and write
77C000
unkown
page read and write
29EB7659000
heap
page read and write
1D8D969C000
heap
page read and write
22B0C5C0000
heap
page read and write
1D8D96AE000
heap
page read and write
1D8D3E8A000
heap
page read and write
29EB7700000
heap
page read and write
EBD000
stack
page read and write
22B0C5FE000
heap
page read and write
3E4AC7F000
stack
page read and write
21213B93000
heap
page read and write
21213BCF000
heap
page read and write
1D8D9540000
trusted library allocation
page read and write
202E5302000
heap
page read and write
AEF000
heap
page read and write
1D8D3C40000
heap
page read and write
28DC89E0000
heap
page read and write
E50000
heap
page read and write
16D8D640000
heap
page read and write
212130ED000
heap
page read and write
21213B9B000
heap
page read and write
13D1000
unkown
page execute read
202E5229000
heap
page read and write
1D8D96EC000
heap
page read and write
22B0C62E000
heap
page read and write
202E5170000
heap
page read and write
2121303C000
heap
page read and write
755C8FF000
stack
page read and write
212130B4000
heap
page read and write
177B7D70000
remote allocation
page read and write
21213B92000
heap
page read and write
5C2BEFE000
stack
page read and write
202E5C02000
heap
page read and write
1D8D9400000
trusted library allocation
page read and write
1D8D96F4000
heap
page read and write
136E000
stack
page read and write
28DC8C85000
heap
page read and write
14FA000
heap
page read and write
AFA000
heap
page read and write
132E000
stack
page read and write
2026E856000
heap
page read and write
21213116000
heap
page read and write
13EA000
unkown
page readonly
1E0CFA02000
trusted library allocation
page read and write
2026E886000
heap
page read and write
21213000000
heap
page read and write
1D8D45D0000
trusted library allocation
page read and write
7B9000
unkown
page readonly
13D0000
unkown
page readonly
755CB7F000
stack
page read and write
9B7BFFB000
stack
page read and write
1D8D93EE000
trusted library allocation
page read and write
21213B7A000
heap
page read and write
21213B7C000
heap
page read and write
5C40FFE000
stack
page read and write
431B3F8000
stack
page read and write
21213B80000
heap
page read and write
177B7E58000
heap
page read and write
21213B7C000
heap
page read and write
16D8D902000
heap
page read and write
F44AEFC000
stack
page read and write
1D8D4718000
heap
page read and write
ACEFFFF000
stack
page read and write
21213B85000
heap
page read and write
AFE000
heap
page read and write
16D8D832000
heap
page read and write
9EF000
stack
page read and write
2026E902000
heap
page read and write
755CC7C000
stack
page read and write
29EB7648000
heap
page read and write
29EB7676000
heap
page read and write
202A3908000
heap
page read and write
13EA000
unkown
page readonly
7A6000
unkown
page read and write
22B0C612000
heap
page read and write
22261850000
heap
page read and write
21213113000
heap
page read and write
1D8D45E0000
trusted library allocation
page read and write
21213B80000
heap
page read and write
16D8D840000
heap
page read and write
21213088000
heap
page read and write
29EB9070000
trusted library allocation
page read and write
21213B99000
heap
page read and write
22B0C5A0000
heap
page read and write
1D8D96F6000
heap
page read and write
29EB763D000
heap
page read and write
1D8D3D40000
trusted library allocation
page read and write
16D8D864000
heap
page read and write
1D8D3D50000
trusted library section
page read and write
1D8D3E88000
heap
page read and write
3E4A57B000
stack
page read and write
1D8D9660000
heap
page read and write
8CE000
stack
page read and write
1D8D3BE0000
heap
page read and write
177B7E25000
heap
page read and write
408000
unkown
page readonly
16D8D865000
heap
page read and write
F44AFFE000
stack
page read and write
22B0C601000
heap
page read and write
1D8D3F13000
heap
page read and write
755C57A000
stack
page read and write
13F0000
unkown
page write copy
A7CB19A000
stack
page read and write
13F4000
unkown
page readonly
432767E000
stack
page read and write
13D0000
unkown
page readonly
21213B8E000
heap
page read and write
1D8D9540000
remote allocation
page read and write
1D8D3E9C000
heap
page read and write
E8ECA9B000
stack
page read and write
1E0CF279000
heap
page read and write
2026E802000
heap
page read and write
1D8D9410000
trusted library allocation
page read and write
14B0000
heap
page read and write
ACF00FD000
stack
page read and write
202E5285000
heap
page read and write
16D8D86C000
heap
page read and write
22B0C629000
heap
page read and write
22262202000
trusted library allocation
page read and write
ACEFA7B000
stack
page read and write
22B0C540000
heap
page read and write
2026E829000
heap
page read and write
2026E7C0000
trusted library allocation
page read and write
22B0C845000
heap
page read and write
13CE000
stack
page read and write
1D8D963E000
heap
page read and write
755BF2B000
stack
page read and write
22261A00000
heap
page read and write
202A3827000
heap
page read and write
1D8D4602000
heap
page read and write
16D8D85A000
heap
page read and write
1D8D3E3F000
heap
page read and write
202E5100000
heap
page read and write
1D8D4700000
heap
page read and write
16D8D842000
heap
page read and write
2026E86F000
heap
page read and write
1D8D45B1000
trusted library allocation
page read and write
1D8D9520000
trusted library allocation
page read and write
22B0C616000
heap
page read and write
1D8D4ED0000
trusted library section
page readonly
AFA000
heap
page read and write
E8ED37E000
stack
page read and write
16D8D833000
heap
page read and write
29EB7613000
heap
page read and write
21213062000
heap
page read and write
21213B8F000
heap
page read and write
28DC8D02000
heap
page read and write
21214002000
heap
page read and write
4FD9FFD000
stack
page read and write
13D0000
unkown
page readonly
22B0C62F000
heap
page read and write
21213B91000
heap
page read and write
21213BC3000
heap
page read and write
21213067000
heap
page read and write
5C2B73B000
stack
page read and write
202A3861000
heap
page read and write
29EB7520000
heap
page read and write
21213052000
heap
page read and write
13F4000
unkown
page readonly
755C77A000
stack
page read and write
1D8D3E91000
heap
page read and write
13EA000
unkown
page readonly
202A3800000
heap
page read and write
16D8D7A0000
trusted library allocation
page read and write
E8ECB9E000
stack
page read and write
1E0CF268000
heap
page read and write
21213BA2000
heap
page read and write
18EE000
stack
page read and write
21213B60000
heap
page read and write
212130A3000
heap
page read and write
1D8D9410000
trusted library allocation
page read and write
22261A83000
heap
page read and write
E8ED07E000
stack
page read and write
2121305A000
heap
page read and write
CFE000
stack
page read and write
22B0C617000
heap
page read and write
21214002000
heap
page read and write
13D0000
unkown
page readonly
13D1000
unkown
page execute read
1D8D9401000
trusted library allocation
page read and write
1D8D3F02000
heap
page read and write
786000
unkown
page read and write
16D8D844000
heap
page read and write
A7CB47E000
stack
page read and write
29EB90B0000
trusted library allocation
page read and write
1E0000
remote allocation
page read and write
A7CB5FD000
stack
page read and write
16D8D87A000
heap
page read and write
21213065000
heap
page read and write
4326FFC000
stack
page read and write
16D8D885000
heap
page read and write
F44B1FC000
stack
page read and write
16D8D868000
heap
page read and write
212130EF000
heap
page read and write
21213BAC000
heap
page read and write
202E528A000
heap
page read and write
1E0CF300000
heap
page read and write
28DC8C00000
heap
page read and write
4326BBB000
stack
page read and write
222617F0000
heap
page read and write
202A3853000
heap
page read and write
1E0CF020000
heap
page read and write
E8ECFFB000
stack
page read and write
29EB9130000
remote allocation
page read and write
1D8D9510000
trusted library allocation
page read and write
177B8602000
trusted library allocation
page read and write
16D8D857000
heap
page read and write
3E4AB7F000
stack
page read and write
1D8D4759000
heap
page read and write
16D8D85C000
heap
page read and write
1E0CF302000
heap
page read and write
755C47A000
stack
page read and write
1E0CF030000
heap
page read and write
1D8D4718000
heap
page read and write
5C2BA7E000
stack
page read and write
13F0000
unkown
page read and write
2121305F000
heap
page read and write
21213B91000
heap
page read and write
21213B7F000
heap
page read and write
202A3864000
heap
page read and write
1D8D3E13000
heap
page read and write
13D1000
unkown
page execute read
5C40DFE000
stack
page read and write
16D8D87C000
heap
page read and write
21213013000
heap
page read and write
28DC8D13000
heap
page read and write
21213B19000
heap
page read and write
22B0C606000
heap
page read and write
17EE000
stack
page read and write
177B7D70000
remote allocation
page read and write
177B7C40000
heap
page read and write
43272FC000
stack
page read and write
ACEFB7E000
stack
page read and write
2670000
heap
page read and write
13D1000
unkown
page execute read
13F0000
unkown
page write copy
22B0C614000
heap
page read and write
401000
unkown
page execute read
29EB7702000
heap
page read and write
16D8D846000
heap
page read and write
1D8D964B000
heap
page read and write
29EB7580000
heap
page read and write
29EB7602000
heap
page read and write
21213BC6000
heap
page read and write
21214002000
heap
page read and write
1D8D96F0000
heap
page read and write
21213B60000
heap
page read and write
177B7BD0000
heap
page read and write
21213BA2000
heap
page read and write
16D8D87B000
heap
page read and write
1E0000
remote allocation
page read and write
19A000
stack
page read and write
4FDA27D000
stack
page read and write
29EB7718000
heap
page read and write
431AFFE000
stack
page read and write
29EB9130000
remote allocation
page read and write
21213B61000
heap
page read and write
21213064000
heap
page read and write
14F0000
heap
page read and write
28DC8C4B000
heap
page read and write
1D8D4F00000
trusted library section
page readonly
16D8D847000
heap
page read and write
16D8D829000
heap
page read and write
40C000
unkown
page read and write
5C40EFB000
stack
page read and write
AC8000
heap
page read and write
21213880000
trusted library allocation
page read and write
212130C9000
heap
page read and write
755C87B000
stack
page read and write
1D8D9600000
heap
page read and write
A7CB4FE000
stack
page read and write
13D1000
unkown
page execute read
29EB7659000
heap
page read and write
13F0000
unkown
page write copy
202A3590000
heap
page read and write
202E51A0000
trusted library allocation
page read and write
16D8D87E000
heap
page read and write
1D8D93E8000
trusted library allocation
page read and write
21213B91000
heap
page read and write
21213B68000
heap
page read and write
13D0000
unkown
page readonly
2121305C000
heap
page read and write
1D8D45F0000
trusted library allocation
page read and write
AFD000
heap
page read and write
202A3880000
heap
page read and write
29EB7649000
heap
page read and write
F44B0FF000
stack
page read and write
1E0CF213000
heap
page read and write
1D8D962E000
heap
page read and write
1D8D3BD0000
heap
page read and write
21213B9B000
heap
page read and write
202A3862000
heap
page read and write
13D1000
unkown
page execute read
432747B000
stack
page read and write
3E4A67E000
stack
page read and write
431AC7C000
stack
page read and write
22B0C5FA000
heap
page read and write
431B0F7000
stack
page read and write
29EB762A000
heap
page read and write
1E0CF240000
heap
page read and write
202E5313000
heap
page read and write
4FD9DFE000
stack
page read and write
21213B7C000
heap
page read and write
9B7C177000
stack
page read and write
4FDA07E000
stack
page read and write
16D8D87F000
heap
page read and write
755CAFF000
stack
page read and write
DA0000
heap
page read and write
4FD9EFF000
stack
page read and write
13F4000
unkown
page readonly
3E4A15C000
stack
page read and write
9B7BBDE000
stack
page read and write
5C4077C000
stack
page read and write
29EB7600000
heap
page read and write
28DC8C79000
heap
page read and write
21213B85000
heap
page read and write
1D8D4EF0000
trusted library section
page readonly
9B7BB5E000
stack
page read and write
21213B8D000
heap
page read and write
782000
unkown
page read and write
21213940000
remote allocation
page read and write
432757C000
stack
page read and write
1D8D4EC0000
trusted library section
page readonly
28DC8B40000
trusted library allocation
page read and write
2026E840000
heap
page read and write
16D8D6A0000
heap
page read and write
21213B72000
heap
page read and write
28DC8C8B000
heap
page read and write
28DC8C53000
heap
page read and write
E8ED177000
stack
page read and write
202A3829000
heap
page read and write
AC0000
heap
page read and write
22B0C5F0000
heap
page read and write
21213BB8000
heap
page read and write
3E4AD7F000
stack
page read and write
16D8D863000
heap
page read and write
9B7C07E000
stack
page read and write
3E4AA7F000
stack
page read and write
22261B00000
heap
page read and write
22261A13000
heap
page read and write
28DC8D00000
heap
page read and write
4FDA17D000
stack
page read and write
202A3913000
heap
page read and write
AEF000
heap
page read and write
177B7D40000
trusted library allocation
page read and write
28DC9402000
trusted library allocation
page read and write
1E0CF25A000
heap
page read and write
29EB768A000
heap
page read and write
1D8D92C0000
trusted library allocation
page read and write
22B0C629000
heap
page read and write
A7CB6FC000
stack
page read and write
21213B91000
heap
page read and write
8D0000
trusted library allocation
page read and write
202E5200000
heap
page read and write
400000
unkown
page readonly
2026E813000
heap
page read and write
1D8D969E000
heap
page read and write
5C40CFB000
stack
page read and write
ACEFAFF000
stack
page read and write
9B7C27E000
stack
page read and write
212130FD000
heap
page read and write
ACEFDFE000
stack
page read and write
5C2BCFE000
stack
page read and write
21213BB8000
heap
page read and write
21213B23000
heap
page read and write
2026E790000
heap
page read and write
788000
unkown
page read and write
28DC89D0000
heap
page read and write
202A3700000
trusted library allocation
page read and write
401000
unkown
page execute read
1D8D3EFA000
heap
page read and write
29EB75B0000
trusted library allocation
page read and write
16D8D800000
heap
page read and write
1D8D9500000
trusted library allocation
page read and write
212130E4000
heap
page read and write
212130B1000
heap
page read and write
13F4000
unkown
page readonly
21214003000
heap
page read and write
F44ACFE000
stack
page read and write
13D1000
unkown
page execute read
21213B9B000
heap
page read and write
1D8D9613000
heap
page read and write
22B0C629000
heap
page read and write
22261B08000
heap
page read and write
16D8D86A000
heap
page read and write
21212F70000
heap
page read and write
16D8D84E000
heap
page read and write
21213B9E000
heap
page read and write
1D8D92D0000
trusted library allocation
page read and write
21213A02000
heap
page read and write
3E4A77C000
stack
page read and write
202E52E2000
heap
page read and write
202E52C5000
heap
page read and write
2121305D000
heap
page read and write
755CE7F000
stack
page read and write
22261A3C000
heap
page read and write
1D8D9530000
trusted library allocation
page read and write
202A388B000
heap
page read and write
5C2B7BE000
stack
page read and write
13F4000
unkown
page readonly
21213102000
heap
page read and write
1D8D4F10000
trusted library section
page readonly
28DC8C4E000
heap
page read and write
1D8D4759000
heap
page read and write
F44ADFF000
stack
page read and write
212130EA000
heap
page read and write
202A385F000
heap
page read and write
21213B9A000
heap
page read and write
21213BA2000
heap
page read and write
29EB7713000
heap
page read and write
21213B71000
heap
page read and write
4FD98BC000
stack
page read and write
9B000
stack
page read and write
177B7E29000
heap
page read and write
28DC8C8E000
heap
page read and write
202A385D000
heap
page read and write
202E52BD000
heap
page read and write
222617E0000
heap
page read and write
1E0CF324000
heap
page read and write
16D8D876000
heap
page read and write
3E4AE7E000
stack
page read and write
5C2BDFE000
stack
page read and write
13D0000
unkown
page readonly
4FD9C7E000
stack
page read and write
13EA000
unkown
page readonly
13EA000
unkown
page readonly
21214002000
heap
page read and write
28DC8C29000
heap
page read and write
755C377000
stack
page read and write
29EB7665000
heap
page read and write
1E0CF200000
heap
page read and write
177B7E13000
heap
page read and write
16D8D83D000
heap
page read and write
1D8D9404000
trusted library allocation
page read and write
21213BA2000
heap
page read and write
431AF77000
stack
page read and write
9B7C37F000
stack
page read and write
16D8D630000
heap
page read and write
F44A87B000
stack
page read and write
1D8D94F0000
trusted library allocation
page read and write
22B0C613000
heap
page read and write
22261A4E000
heap
page read and write
30000
heap
page read and write
FBB000
stack
page read and write
431B47F000
unkown
page read and write
1D8D96F9000
heap
page read and write
16D8D85F000
heap
page read and write
22B0C606000
heap
page read and write
1400000
direct allocation
page execute and read and write
202E523E000
heap
page read and write
16D8D86E000
heap
page read and write
28DC8C13000
heap
page read and write
FF0000
trusted library allocation
page read and write
22261A78000
heap
page read and write
21213B00000
heap
page read and write
202A35A0000
heap
page read and write
202E52CE000
heap
page read and write
16D8D861000
heap
page read and write
202A3802000
heap
page read and write
A7CB578000
stack
page read and write
16D8D859000
heap
page read and write
A2E000
stack
page read and write
29EB75D0000
trusted library allocation
page read and write
22B0C612000
heap
page read and write
755C9FE000
stack
page read and write
16D8D875000
heap
page read and write
13F0000
unkown
page write copy
1D8D9700000
heap
page read and write
22B0C840000
heap
page read and write
13F0000
unkown
page write copy
432727E000
stack
page read and write
21213BA2000
heap
page read and write
21214002000
heap
page read and write
29EB7649000
heap
page read and write
E8ECB1E000
stack
page read and write
177B7D70000
remote allocation
page read and write
202A3600000
heap
page read and write
13EA000
unkown
page readonly
7B9000
unkown
page readonly
AE0000
heap
page read and write
13F0000
unkown
page write copy
43273FC000
stack
page read and write
1D8D9621000
heap
page read and write
21213B81000
heap
page read and write
28DC8C3C000
heap
page read and write
202A3902000
heap
page read and write
1380000
heap
page read and write
13F4000
unkown
page readonly
21213029000
heap
page read and write
3E4A87F000
stack
page read and write
AEC000
heap
page read and write
F44AA7D000
stack
page read and write
22261A6A000
heap
page read and write
21213B53000
heap
page read and write
432787F000
stack
page read and write
16D8D825000
heap
page read and write
28DC8D08000
heap
page read and write
1D8D4EE0000
trusted library section
page readonly
22B0C611000
heap
page read and write
21213B5F000
heap
page read and write
177B7E02000
heap
page read and write
28DC8C71000
heap
page read and write
1D8D4713000
heap
page read and write
212130C2000
heap
page read and write
22261B02000
heap
page read and write
21214000000
heap
page read and write
ACEFEF7000
stack
page read and write
3E4A97D000
stack
page read and write
16D8D813000
heap
page read and write
21213940000
remote allocation
page read and write
13D0000
unkown
page readonly
21213B7C000
heap
page read and write
29EB7510000
heap
page read and write
CBF000
stack
page read and write
29EB7658000
heap
page read and write
4FD9D7E000
stack
page read and write
2ABF000
stack
page read and write
A9E000
stack
page read and write
1D8D5260000
trusted library allocation
page read and write
431B1F9000
stack
page read and write
29EB9202000
trusted library allocation
page read and write
F44ABFE000
stack
page read and write
431ACFE000
stack
page read and write
16EE000
stack
page read and write
212130AA000
heap
page read and write
177B7F02000
heap
page read and write
16D8D878000
heap
page read and write
22261A49000
heap
page read and write
21213BB3000
heap
page read and write
1E0CF090000
heap
page read and write
2026E865000
heap
page read and write
16D8D83B000
heap
page read and write
2026E85A000
heap
page read and write
2026E730000
heap
page read and write
22261A73000
heap
page read and write
21213B85000
heap
page read and write
202A385E000
heap
page read and write
22261A2A000
heap
page read and write
1D8D3E6E000
heap
page read and write
1D8D4600000
heap
page read and write
202E5270000
heap
page read and write
21213B92000
heap
page read and write
22261B13000
heap
page read and write
22261A53000
heap
page read and write
28DC8C49000
heap
page read and write
13EA000
unkown
page readonly
28DC8C47000
heap
page read and write
1D8D3E74000
heap
page read and write
1D8D93E0000
trusted library allocation
page read and write
21212FE0000
heap
page read and write
4FD9CFE000
stack
page read and write
202E5D00000
heap
page read and write
1E0CF190000
trusted library allocation
page read and write
21213B99000
heap
page read and write
22261A47000
heap
page read and write
16D8D860000
heap
page read and write
177B7E00000
heap
page read and write
1D8D45D3000
trusted library allocation
page read and write
1D8D93E0000
trusted library allocation
page read and write
1D8D4DE0000
trusted library allocation
page read and write
40A000
unkown
page read and write
431AD7E000
stack
page read and write
755C67E000
stack
page read and write
21214002000
heap
page read and write
21213BA2000
heap
page read and write
D50000
heap
page read and write
16D8D845000
heap
page read and write
13F4000
unkown
page readonly
21214021000
heap
page read and write
177B7E3D000
heap
page read and write
21213B9B000
heap
page read and write
1D8D9702000
heap
page read and write
1D8D9424000
trusted library allocation
page read and write
9B7BADC000
stack
page read and write
16D8D858000
heap
page read and write
21213B1B000
heap
page read and write
16D8D841000
heap
page read and write
202A3813000
heap
page read and write
1D8D3EA4000
heap
page read and write
21213B7D000
heap
page read and write
E8ED27E000
stack
page read and write
16D8D867000
heap
page read and write
21213B7D000
heap
page read and write
1D8D3E5A000
heap
page read and write
755C97F000
stack
page read and write
1E0000
remote allocation
page read and write
21213B82000
heap
page read and write
177B7BE0000
heap
page read and write
21213B7A000
heap
page read and write
1E0CF228000
heap
page read and write
1D8D9420000
trusted library allocation
page read and write
21213B7C000
heap
page read and write
202A3900000
heap
page read and write
21213B7C000
heap
page read and write
202A383C000
heap
page read and write
22B0C612000
heap
page read and write
1D8D965E000
heap
page read and write
202E5110000
heap
page read and write
22B0C5F6000
heap
page read and write
40A000
unkown
page write copy
21213B67000
heap
page read and write
1D8D94B0000
trusted library allocation
page read and write
432717E000
stack
page read and write
28DC8A40000
heap
page read and write
1D8D3E29000
heap
page read and write
21213B7D000
heap
page read and write
2026E800000
heap
page read and write
1D8D9540000
remote allocation
page read and write
264F000
stack
page read and write
AEC000
heap
page read and write
2026E913000
heap
page read and write
16D8D862000
heap
page read and write
1D8D3E00000
heap
page read and write
1E0CF202000
heap
page read and write
21213B91000
heap
page read and write
431B2FE000
stack
page read and write
400000
unkown
page readonly
21213940000
remote allocation
page read and write
21213B90000
heap
page read and write
755CA7F000
stack
page read and write
1D8D4615000
heap
page read and write
408000
unkown
page readonly
21213108000
heap
page read and write
ACEFD7B000
stack
page read and write
21213082000
heap
page read and write
202A4002000
trusted library allocation
page read and write
16D8E002000
trusted library allocation
page read and write
1D8D4702000
heap
page read and write
1D8D9540000
remote allocation
page read and write
21213B84000
heap
page read and write
1E0CF263000
heap
page read and write
21213B9E000
heap
page read and write
22261A4B000
heap
page read and write
21213BDC000
heap
page read and write
1D8D96FC000
heap
page read and write
8E0000
heap
page read and write
21214002000
heap
page read and write
22261950000
trusted library allocation
page read and write
29EB9130000
remote allocation
page read and write
7B3000
unkown
page read and write
1D8D3E78000
heap
page read and write
432777F000
stack
page read and write
202E5213000
heap
page read and write
22261A8F000
heap
page read and write
5C2BBFE000
stack
page read and write
21213082000
heap
page read and write
21213B55000
heap
page read and write
A7CB67F000
stack
page read and write
ADD000
heap
page read and write
ACEFC7B000
stack
page read and write
2026E720000
heap
page read and write
2026F202000
trusted library allocation
page read and write
There are 645 hidden memdumps, click here to show them.