IOC Report
Rd1Kf1A4cB.bin

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Rd1Kf1A4cB.exe
"C:\Users\user\Desktop\Rd1Kf1A4cB.exe"
malicious

URLs

Name
IP
Malicious
http://www.google.com/webhpbcsocksGlobal
unknown
http://www.google.com/webhp
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
227CCE67000
heap
page read and write
183D5B90000
heap
page read and write
38B47C000
stack
page read and write
2106A650000
heap
page read and write
294F8656000
heap
page read and write
EFCFE7D000
stack
page read and write
26082E13000
heap
page read and write
294F86EC000
heap
page read and write
2106A83A000
heap
page read and write
227CCE02000
heap
page read and write
21C018F2000
heap
page read and write
1DE16400000
heap
page read and write
77A000
heap
page read and write
19A7E102000
heap
page read and write
38B87F000
stack
page read and write
21C01901000
heap
page read and write
21C0190B000
heap
page read and write
19A7D3FC000
heap
page read and write
227CCE00000
heap
page read and write
294F9202000
heap
page read and write
5D0000
heap
page read and write
294F8D18000
heap
page read and write
1F3948E0000
trusted library allocation
page read and write
F017F7E000
stack
page read and write
1528CFC000
stack
page read and write
294F8D86000
heap
page read and write
1CC8B647000
heap
page read and write
89D647E000
stack
page read and write
1F38F43C000
heap
page read and write
183D5E6D000
heap
page read and write
B9DA90B000
stack
page read and write
DD7617B000
stack
page read and write
19A7D276000
heap
page read and write
1F390410000
trusted library section
page readonly
19A7D936000
heap
page read and write
1F38F48F000
heap
page read and write
2106A844000
heap
page read and write
19A7D2D6000
heap
page read and write
89D5CFA000
stack
page read and write
92317FB000
stack
page read and write
C6A647F000
stack
page read and write
21C0190B000
heap
page read and write
227CCE5C000
heap
page read and write
1F38F413000
heap
page read and write
183D6402000
heap
page read and write
294F8D8B000
heap
page read and write
294F8D95000
heap
page read and write
2106A6B0000
heap
page read and write
19A7D790000
trusted library allocation
page read and write
227CD602000
trusted library allocation
page read and write
26082E2A000
heap
page read and write
1FD727B000
stack
page read and write
E93FCFB000
stack
page read and write
294F8D8F000
heap
page read and write
23368205000
heap
page read and write
294F9202000
heap
page read and write
294F8DA6000
heap
page read and write
19A7E01D000
heap
page read and write
19A7D245000
heap
page read and write
ECCA87C000
stack
page read and write
21C018F1000
heap
page read and write
2106A861000
heap
page read and write
2106A845000
heap
page read and write
1CC8BF05000
heap
page read and write
26DE8308000
heap
page read and write
294F8629000
heap
page read and write
1F3948C0000
trusted library allocation
page read and write
1F38FBD0000
trusted library allocation
page read and write
26DE8300000
heap
page read and write
1528B7E000
stack
page read and write
2106A858000
heap
page read and write
1DE163F0000
trusted library allocation
page read and write
19A7E06D000
heap
page read and write
294F8D96000
heap
page read and write
ECCAF78000
stack
page read and write
2106A862000
heap
page read and write
294F86D8000
heap
page read and write
E94047E000
stack
page read and write
F017B2F000
stack
page read and write
2192DA13000
heap
page read and write
294F8708000
heap
page read and write
294F8D89000
heap
page read and write
607837E000
stack
page read and write
2106A831000
heap
page read and write
26DE81E0000
trusted library allocation
page read and write
B9DAEFF000
stack
page read and write
ECCA8FD000
stack
page read and write
1F394904000
trusted library allocation
page read and write
2106A857000
heap
page read and write
294F9221000
heap
page read and write
2192D9D0000
heap
page read and write
C6A64FF000
stack
page read and write
B9DB0FF000
stack
page read and write
1FD72FE000
stack
page read and write
1F394A63000
heap
page read and write
B9DAD7B000
stack
page read and write
2106A81F000
heap
page read and write
1528C7B000
stack
page read and write
21C01800000
heap
page read and write
1F38FD18000
heap
page read and write
23367F70000
heap
page read and write
294F8654000
heap
page read and write
1DE1644C000
heap
page read and write
294F8D8B000
heap
page read and write
6077E7E000
stack
page read and write
294F91A0000
remote allocation
page read and write
19A7D2B9000
heap
page read and write
E94067E000
stack
page read and write
1F38F360000
trusted library allocation
page read and write
1CC8BF00000
heap
page read and write
19A7D900000
heap
page read and write
41C000
unkown
page execute and read and write
294F8D84000
heap
page read and write
294F8D8D000
heap
page read and write
1F394C20000
remote allocation
page read and write
294F863C000
heap
page read and write
2192DA5F000
heap
page read and write
1F394990000
trusted library allocation
page read and write
19A7D39D000
heap
page read and write
96F000
stack
page read and write
923131E000
stack
page read and write
21C01923000
heap
page read and write
2192E202000
trusted library allocation
page read and write
294F864A000
heap
page read and write
DD75EFE000
stack
page read and write
1CC8B637000
heap
page read and write
1F38F429000
heap
page read and write
19A7D22A000
heap
page read and write
294F8D82000
heap
page read and write
19A7E015000
heap
page read and write
1CC8B627000
heap
page read and write
1CC8B825000
heap
page read and write
E93FE7F000
stack
page read and write
294F8D1A000
heap
page read and write
183D5DD0000
trusted library allocation
page read and write
C6A637E000
stack
page read and write
19A7E113000
heap
page read and write
1FD737E000
stack
page read and write
294F8D90000
heap
page read and write
19A7D27C000
heap
page read and write
1528E7E000
stack
page read and write
402000
unkown
page write copy
1F3948CE000
trusted library allocation
page read and write
2106A813000
heap
page read and write
EFCFAFE000
stack
page read and write
1DA96F00000
heap
page read and write
1F3903F0000
trusted library section
page readonly
294F83D0000
heap
page read and write
294F8D00000
heap
page read and write
2106A877000
heap
page read and write
E94027F000
stack
page read and write
19A7E100000
heap
page read and write
1FD74FE000
stack
page read and write
19A7E008000
heap
page read and write
294F8D74000
heap
page read and write
E94007E000
stack
page read and write
19A7D280000
heap
page read and write
294F8D90000
heap
page read and write
ECCAE79000
stack
page read and write
400000
unkown
page execute and read and write
294F9202000
heap
page read and write
DD75E7B000
stack
page read and write
19A7D238000
heap
page read and write
6077EFE000
stack
page read and write
1F3948E4000
trusted library allocation
page read and write
227CCE8A000
heap
page read and write
E94057E000
stack
page read and write
2192D970000
heap
page read and write
B9DAC7E000
stack
page read and write
21C018DB000
heap
page read and write
1F38F4FD000
heap
page read and write
F017AAA000
stack
page read and write
1F395000000
heap
page read and write
DD7647F000
stack
page read and write
19A7D251000
heap
page read and write
2106A863000
heap
page read and write
222FB7F000
stack
page read and write
1DE1644F000
heap
page read and write
2106A842000
heap
page read and write
1F394ADE000
heap
page read and write
19A7D232000
heap
page read and write
183D6500000
heap
page read and write
1CC8B6CB000
heap
page read and write
2192E160000
remote allocation
page read and write
183D5BA0000
heap
page read and write
DD75F7E000
stack
page read and write
1F394AED000
heap
page read and write
6077BDB000
stack
page read and write
1F390430000
trusted library section
page readonly
1F394A9B000
heap
page read and write
19C000
stack
page read and write
1DE16502000
heap
page read and write
19A7D2BC000
heap
page read and write
26082D10000
heap
page read and write
294F8D8B000
heap
page read and write
294F86FA000
heap
page read and write
2160000
heap
page read and write
26082E02000
heap
page read and write
294F86C9000
heap
page read and write
1528A7A000
stack
page read and write
294F83E0000
heap
page read and write
183D5E29000
heap
page read and write
ECCAC77000
stack
page read and write
183D5F02000
heap
page read and write
2192D960000
heap
page read and write
294F8DAF000
heap
page read and write
ECCAA7B000
stack
page read and write
38B67E000
stack
page read and write
227CCF13000
heap
page read and write
19A7D2CD000
heap
page read and write
1DE16C02000
trusted library allocation
page read and write
294F864C000
heap
page read and write
19A7D313000
heap
page read and write
19A7D24D000
heap
page read and write
19A7D904000
heap
page read and write
EFCFBFE000
stack
page read and write
294F8D8B000
heap
page read and write
1FD79FB000
stack
page read and write
294F8D87000
heap
page read and write
2106A87D000
heap
page read and write
294F8D78000
heap
page read and write
1F394A0F000
heap
page read and write
1F394900000
trusted library allocation
page read and write
F017BAE000
stack
page read and write
1F38F3F3000
trusted library allocation
page read and write
26082E89000
heap
page read and write
2192DA29000
heap
page read and write
294F86C3000
heap
page read and write
26DE8261000
heap
page read and write
183D5E13000
heap
page read and write
21C018D0000
heap
page read and write
89D617F000
stack
page read and write
294F9200000
heap
page read and write
1CC8B6CB000
heap
page read and write
294F86E5000
heap
page read and write
2106A846000
heap
page read and write
1DE163C0000
heap
page read and write
294F8DCF000
heap
page read and write
2106A840000
heap
page read and write
21C018F7000
heap
page read and write
294F8D84000
heap
page read and write
294F8649000
heap
page read and write
C6A5FEF000
stack
page read and write
21C0191A000
heap
page read and write
1F394A98000
heap
page read and write
1CC8B679000
heap
page read and write
607817E000
stack
page read and write
1CC8B820000
heap
page read and write
294F91A0000
remote allocation
page read and write
89D5DFA000
stack
page read and write
1F38F400000
heap
page read and write
1CC8B647000
heap
page read and write
183D5EC2000
heap
page read and write
1DA96F02000
heap
page read and write
1CC8B63A000
heap
page read and write
1F390780000
trusted library allocation
page read and write
294F8650000
heap
page read and write
19A7D3B7000
heap
page read and write
2106A868000
heap
page read and write
21C018F4000
heap
page read and write
19A7E00C000
heap
page read and write
2106A884000
heap
page read and write
1F3948F0000
trusted library allocation
page read and write
923139F000
stack
page read and write
401000
unkown
page execute read
19A7D278000
heap
page read and write
21C01911000
heap
page read and write
294F8D94000
heap
page read and write
1DA96DC0000
heap
page read and write
1DE16455000
heap
page read and write
294F9202000
heap
page read and write
294F8DA2000
heap
page read and write
21C018EF000
heap
page read and write
19A7D3E0000
heap
page read and write
19A7D906000
heap
page read and write
1DE16360000
heap
page read and write
294F8D90000
heap
page read and write
1CC8B6D2000
heap
page read and write
1CC8B647000
heap
page read and write
227CCBE0000
heap
page read and write
2106A902000
heap
page read and write
227CCE61000
heap
page read and write
294F8D95000
heap
page read and write
6E0000
heap
page read and write
2106A86B000
heap
page read and write
21C0191D000
heap
page read and write
294F86B2000
heap
page read and write
21C01924000
heap
page read and write
1DE16479000
heap
page read and write
294F8713000
heap
page read and write
2192DA41000
heap
page read and write
294F864E000
heap
page read and write
21C0190B000
heap
page read and write
1F38FD02000
heap
page read and write
89D667E000
stack
page read and write
1CC8B637000
heap
page read and write
19A7D802000
heap
page read and write
294F8670000
heap
page read and write
1FD7A7F000
stack
page read and write
607807E000
stack
page read and write
1F38FC00000
heap
page read and write
21C018E6000
heap
page read and write
26082CA0000
heap
page read and write
1CC8B613000
heap
page read and write
ECCAD7E000
stack
page read and write
26DE825B000
heap
page read and write
26082E5A000
heap
page read and write
294F8D84000
heap
page read and write
21C0191C000
heap
page read and write
19A7D2DF000
heap
page read and write
294F9202000
heap
page read and write
183D5E65000
heap
page read and write
227CCE2A000
heap
page read and write
2106A856000
heap
page read and write
294F9202000
heap
page read and write
1FD75FA000
stack
page read and write
227CCF00000
heap
page read and write
92316FC000
stack
page read and write
2106A87B000
heap
page read and write
2106B002000
trusted library allocation
page read and write
183D5F13000
heap
page read and write
294F86B6000
heap
page read and write
227CCBF0000
heap
page read and write
294F86F8000
heap
page read and write
1F3949F0000
trusted library allocation
page read and write
1FD78FC000
stack
page read and write
1F394A4A000
heap
page read and write
294F8DAB000
heap
page read and write
19A7D2A5000
heap
page read and write
294F8D97000
heap
page read and write
294F8D91000
heap
page read and write
1DE16452000
heap
page read and write
89D627E000
stack
page read and write
19A7D23C000
heap
page read and write
1CC8B627000
heap
page read and write
2106A7B0000
trusted library allocation
page read and write
26DE8213000
heap
page read and write
19A7CFE0000
heap
page read and write
1CC8B60E000
heap
page read and write
5D5000
heap
page read and write
418000
unkown
page readonly
EFCF59C000
stack
page read and write
2106A874000
heap
page read and write
89D57CC000
stack
page read and write
1F390300000
trusted library allocation
page read and write
38B57E000
stack
page read and write
294F8D94000
heap
page read and write
1DE1644B000
heap
page read and write
1DA96E28000
heap
page read and write
294F8C02000
heap
page read and write
19A7D913000
heap
page read and write
1CC8B7C0000
remote allocation
page read and write
1F3948C8000
trusted library allocation
page read and write
89D60FF000
stack
page read and write
21C01901000
heap
page read and write
2106A85A000
heap
page read and write
1CC8B7C0000
remote allocation
page read and write
19A7E002000
heap
page read and write
23367F00000
heap
page read and write
294F8702000
heap
page read and write
38B2FC000
stack
page read and write
19A7D258000
heap
page read and write
1F394A00000
heap
page read and write
26082CB0000
heap
page read and write
294F91A0000
remote allocation
page read and write
1F38F474000
heap
page read and write
ECCB07E000
unkown
page read and write
21C018B5000
heap
page read and write
B9DAE7B000
stack
page read and write
1F38F1F0000
heap
page read and write
26DE825E000
heap
page read and write
183D5E3E000
heap
page read and write
1F38FC02000
heap
page read and write
1DE16450000
heap
page read and write
1DE16458000
heap
page read and write
1528D7D000
stack
page read and write
1DE16454000
heap
page read and write
1DE1645B000
heap
page read and write
1CC8B6C5000
heap
page read and write
183D6532000
heap
page read and write
1CC8B650000
heap
page read and write
26082E00000
heap
page read and write
294F864F000
heap
page read and write
1F38FC15000
heap
page read and write
1DE16457000
heap
page read and write
E93FF7C000
stack
page read and write
19A7E000000
heap
page read and write
1F394A10000
trusted library allocation
page read and write
294F8D84000
heap
page read and write
294F8D7C000
heap
page read and write
1DE1645C000
heap
page read and write
9D000
stack
page read and write
26DE7FB0000
heap
page read and write
1F394AF9000
heap
page read and write
1F38F260000
heap
page read and write
183D5EB9000
heap
page read and write
2106A640000
heap
page read and write
21C0191A000
heap
page read and write
1DA96E79000
heap
page read and write
23367E70000
heap
page read and write
E94017D000
stack
page read and write
C6A63FB000
stack
page read and write
1F394C20000
remote allocation
page read and write
19A7D200000
heap
page read and write
E93F8FB000
stack
page read and write
6DF000
stack
page read and write
294F8D89000
heap
page read and write
26082E66000
heap
page read and write
1CC8B560000
heap
page read and write
26082E58000
heap
page read and write
1FD747F000
stack
page read and write
227CCD50000
trusted library allocation
page read and write
38B77C000
stack
page read and write
294F921A000
heap
page read and write
1CC8B668000
heap
page read and write
1F38F48B000
heap
page read and write
21C0191A000
heap
page read and write
294F8DAB000
heap
page read and write
1CC8B678000
heap
page read and write
1DE16477000
heap
page read and write
26DE8266000
heap
page read and write
1DA96D50000
heap
page read and write
DD7607B000
stack
page read and write
EFCFA7E000
stack
page read and write
38B27E000
stack
page read and write
26DE8281000
heap
page read and write
1CC8B678000
heap
page read and write
C6A5F6C000
stack
page read and write
1DE16350000
heap
page read and write
294F8DA7000
heap
page read and write
1DA96E40000
heap
page read and write
294F8D84000
heap
page read and write
9231AFF000
stack
page read and write
1F390420000
trusted library section
page readonly
26DE8225000
heap
page read and write
294F8440000
heap
page read and write
1FD77FF000
stack
page read and write
607827F000
stack
page read and write
590000
direct allocation
page execute and read and write
1F38F494000
heap
page read and write
21C01911000
heap
page read and write
227CCC50000
heap
page read and write
89D5EFE000
stack
page read and write
2106A860000
heap
page read and write
1F3903E0000
trusted library section
page readonly
19A7D272000
heap
page read and write
2192E130000
trusted library allocation
page read and write
294F8D9C000
heap
page read and write
1DE16447000
heap
page read and write
1528AFE000
stack
page read and write
294F8DD6000
heap
page read and write
DD76277000
stack
page read and write
21C018F1000
heap
page read and write
1CC8B7C0000
remote allocation
page read and write
294F9218000
heap
page read and write
26DE8256000
heap
page read and write
2192DA00000
heap
page read and write
89D5BF8000
stack
page read and write
19A7D030000
heap
page read and write
294F8D9E000
heap
page read and write
F017E7F000
stack
page read and write
1DE1646F000
heap
page read and write
21C017E0000
heap
page read and write
19A7E054000
heap
page read and write
89D62FF000
stack
page read and write
ECCAB78000
stack
page read and write
38AFFB000
stack
page read and write
19A7D2B9000
heap
page read and write
26DE823C000
heap
page read and write
294F8D84000
heap
page read and write
1F38FBC0000
trusted library allocation
page read and write
1DA96E02000
heap
page read and write
1DA96F13000
heap
page read and write
294F8D9E000
heap
page read and write
26DE8275000
heap
page read and write
1F394A21000
heap
page read and write
1CC8B5E8000
heap
page read and write
38B3FC000
stack
page read and write
19A7CFD0000
heap
page read and write
1F3948E1000
trusted library allocation
page read and write
1DE16508000
heap
page read and write
294F9221000
heap
page read and write
1F38F49F000
heap
page read and write
26082E6F000
heap
page read and write
26082F13000
heap
page read and write
23367F79000
heap
page read and write
227CCE7C000
heap
page read and write
183D5ECA000
heap
page read and write
294F8652000
heap
page read and write
19A7D213000
heap
page read and write
183D5C00000
heap
page read and write
1F394AE2000
heap
page read and write
53E000
stack
page read and write
1DE16500000
heap
page read and write
227CCE51000
heap
page read and write
294F864B000
heap
page read and write
1DE16459000
heap
page read and write
1CC8B637000
heap
page read and write
294F8DA6000
heap
page read and write
2106A87A000
heap
page read and write
1DA96E64000
heap
page read and write
1CC8B6D2000
heap
page read and write
2106A821000
heap
page read and write
19A7E043000
heap
page read and write
1CC8B64A000
heap
page read and write
1CC8B668000
heap
page read and write
1FD76FE000
stack
page read and write
294F8653000
heap
page read and write
1DA97602000
trusted library allocation
page read and write
19A7D267000
heap
page read and write
21C018E1000
heap
page read and write
1528DFF000
stack
page read and write
1F394C00000
trusted library allocation
page read and write
19A7D242000
heap
page read and write
1CC8B63A000
heap
page read and write
294F8689000
heap
page read and write
1F3948F0000
trusted library allocation
page read and write
1F394AF3000
heap
page read and write
1F390400000
trusted library section
page readonly
2106A86A000
heap
page read and write
26082F02000
heap
page read and write
2106A800000
heap
page read and write
294F921A000
heap
page read and write
EFCF97E000
stack
page read and write
1CC8B5E0000
heap
page read and write
19A7D2A8000
heap
page read and write
1F38F456000
heap
page read and write
21C01911000
heap
page read and write
222FA7B000
stack
page read and write
2106A85F000
heap
page read and write
2106A86D000
heap
page read and write
5B0000
heap
page read and write
1F38F502000
heap
page read and write
1CC8B6D4000
heap
page read and write
1F38F478000
heap
page read and write
294F8DA8000
heap
page read and write
1F3949E0000
trusted library allocation
page read and write
294F8658000
heap
page read and write
21C0190B000
heap
page read and write
294F8D74000
heap
page read and write
57E000
stack
page read and write
1F38FD13000
heap
page read and write
19A7D95C000
heap
page read and write
294F8D7B000
heap
page read and write
1F390210000
trusted library allocation
page read and write
1F38F513000
heap
page read and write
1CC8B63A000
heap
page read and write
1F394A20000
trusted library allocation
page read and write
1CC8B627000
heap
page read and write
294F8DC4000
heap
page read and write
ECCA97E000
stack
page read and write
26083602000
trusted library allocation
page read and write
222F87B000
stack
page read and write
1F394C20000
remote allocation
page read and write
1DA96E00000
heap
page read and write
294F9202000
heap
page read and write
26082E41000
heap
page read and write
19A7D9EF000
heap
page read and write
1CC8B63A000
heap
page read and write
26082E76000
heap
page read and write
1F38F46F000
heap
page read and write
1DE16499000
heap
page read and write
294F8625000
heap
page read and write
1DE16429000
heap
page read and write
23367F7F000
heap
page read and write
1F3947B0000
trusted library allocation
page read and write
294F8D8D000
heap
page read and write
19A7E002000
heap
page read and write
1DE1644D000
heap
page read and write
21C018E6000
heap
page read and write
1DE1643C000
heap
page read and write
294F8D84000
heap
page read and write
294F8659000
heap
page read and write
DD7637F000
stack
page read and write
26DE8200000
heap
page read and write
1F394A3D000
heap
page read and write
1DE16513000
heap
page read and write
222F97B000
stack
page read and write
EFCFF7D000
stack
page read and write
21C018B0000
heap
page read and write
294F8D22000
heap
page read and write
1F38F4B0000
heap
page read and write
1CC8B420000
heap
page read and write
2106A824000
heap
page read and write
26DE8313000
heap
page read and write
227CCE3C000
heap
page read and write
1CC8B627000
heap
page read and write
294F8DA1000
heap
page read and write
400000
unkown
page readonly
21C0191A000
heap
page read and write
1F38F3F0000
trusted library allocation
page read and write
2106A875000
heap
page read and write
EFCFD7E000
stack
page read and write
294F86A5000
heap
page read and write
19A7E11B000
heap
page read and write
89D607F000
stack
page read and write
1DA96D60000
heap
page read and write
B9DB1FE000
stack
page read and write
26DE8229000
heap
page read and write
227CCF08000
heap
page read and write
1DA96DF0000
trusted library allocation
page read and write
294F86AC000
heap
page read and write
E94037F000
stack
page read and write
1F38F370000
trusted library section
page read and write
2106A865000
heap
page read and write
1DA96E13000
heap
page read and write
183D5E88000
heap
page read and write
21C018F6000
heap
page read and write
1528BFE000
stack
page read and write
294F8D84000
heap
page read and write
21C01901000
heap
page read and write
294F8D57000
heap
page read and write
1DA96E68000
heap
page read and write
294F8DA2000
heap
page read and write
2192DA02000
heap
page read and write
89D5FFB000
stack
page read and write
26DE8010000
heap
page read and write
19A7D9D2000
heap
page read and write
23368200000
heap
page read and write
C6A627F000
stack
page read and write
2106A864000
heap
page read and write
1F394A2D000
heap
page read and write
21C016B0000
heap
page read and write
B9DAFF7000
stack
page read and write
294F8D85000
heap
page read and write
923129B000
stack
page read and write
2106A83C000
heap
page read and write
F017EF9000
stack
page read and write
2106A84D000
heap
page read and write
23367EE0000
heap
page read and write
2106A85C000
heap
page read and write
294F8D84000
heap
page read and write
1F38FD00000
heap
page read and write
2192E160000
remote allocation
page read and write
1DE164A1000
heap
page read and write
1DE16482000
heap
page read and write
294F8DB4000
heap
page read and write
F017FFC000
stack
page read and write
294F8D84000
heap
page read and write
1F3949D0000
trusted library allocation
page read and write
2192DB02000
heap
page read and write
26083470000
trusted library allocation
page read and write
1F3948C0000
trusted library allocation
page read and write
1CC8B637000
heap
page read and write
294F8D86000
heap
page read and write
1DE16446000
heap
page read and write
92319FE000
stack
page read and write
26DE7FA0000
heap
page read and write
38ABEC000
stack
page read and write
227CCF02000
heap
page read and write
23367F83000
heap
page read and write
26DE8802000
trusted library allocation
page read and write
294F8D8A000
heap
page read and write
30000
heap
page read and write
1DA96E59000
heap
page read and write
183D5E00000
heap
page read and write
294F8DAD000
heap
page read and write
1F38F200000
heap
page read and write
21C01911000
heap
page read and write
294F9244000
heap
page read and write
ECCAFFE000
stack
page read and write
1DE164A3000
heap
page read and write
770000
heap
page read and write
19A7D929000
heap
page read and write
294F8D74000
heap
page read and write
294F8613000
heap
page read and write
EFCFCFE000
stack
page read and write
1CC8B668000
heap
page read and write
21C01901000
heap
page read and write
2106A841000
heap
page read and write
294F9218000
heap
page read and write
26DE8302000
heap
page read and write
294F8600000
heap
page read and write
2192E160000
remote allocation
page read and write
2106A859000
heap
page read and write
294F8DA2000
heap
page read and write
19A7D2EE000
heap
page read and write
38B17E000
stack
page read and write
4F0000
trusted library allocation
page read and write
1F38F3D1000
trusted library allocation
page read and write
294F8D8B000
heap
page read and write
294F8DB3000
heap
page read and write
B9DA98E000
stack
page read and write
294F8716000
heap
page read and write
1CC8B647000
heap
page read and write
227CCE13000
heap
page read and write
1DE16413000
heap
page read and write
1F38FD18000
heap
page read and write
19A7D7D0000
trusted library allocation
page read and write
89D63FA000
stack
page read and write
294F8BA0000
trusted library allocation
page read and write
21C018F1000
heap
page read and write
294F8D8E000
heap
page read and write
1CC8B580000
heap
page read and write
222F35C000
stack
page read and write
92318F7000
stack
page read and write
There are 686 hidden memdumps, click here to show them.