IOC Report
1ibwQtrqNy.exe

loading gif

Files

File Path
Type
Category
Malicious
1ibwQtrqNy.exe
PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
initial sample
malicious
C:\Program Files (x86)\FLSCover\Rec528\Preview.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\FLSCover\Rec528\Rec528.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Program Files (x86)\FLSCover\Rec528\is-Q8OGG.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\FLSCover\Rec528\is-U3J98.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\FLSCover\Rec528\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-50VJD.tmp\is-2H2P0.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-5SERN.tmp\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-5SERN.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\IFLIjCfKSqd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\FLSCover\Rec528\Readme.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\FLSCover\Rec528\data\Config.xml (copy)
XML 1.0 document, ASCII text, with very long lines (5978), with CRLF line terminators
dropped
C:\Program Files (x86)\FLSCover\Rec528\data\is-O02RD.tmp
XML 1.0 document, ASCII text, with very long lines (5978), with CRLF line terminators
dropped
C:\Program Files (x86)\FLSCover\Rec528\finalrecovery.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\FLSCover\Rec528\is-0I9HC.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\FLSCover\Rec528\is-D912P.tmp
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\FLSCover\Rec528\is-EJ9G4.tmp
data
dropped
C:\Program Files (x86)\FLSCover\Rec528\unins000.dat
InnoSetup Log Rec528, version 0x2a, 3674 bytes, 123716\user, "C:\Program Files (x86)\FLSCover\Rec528"
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\stuk[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\dll[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\dll[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\plus[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\is-5SERN.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1ibwQtrqNy.exe
C:\Users\user\Desktop\1ibwQtrqNy.exe
malicious
C:\Program Files (x86)\FLSCover\Rec528\Rec528.exe
"C:\Program Files (x86)\FLSCover\Rec528\Rec528.exe"
malicious
C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\IFLIjCfKSqd.exe
malicious
C:\Users\user\AppData\Local\Temp\is-50VJD.tmp\is-2H2P0.tmp
"C:\Users\user\AppData\Local\Temp\is-50VJD.tmp\is-2H2P0.tmp" /SL4 $2048E "C:\Users\user\Desktop\1ibwQtrqNy.exe" 1911253 52224
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "Rec528.exe" /f & erase "C:\Program Files (x86)\FLSCover\Rec528\Rec528.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "Rec528.exe" /f

URLs

Name
IP
Malicious
http://45.12.253.72/default/stuk.php
45.12.253.72
malicious
http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinte
45.12.253.56
malicious
http://45.12.253.72/default/puk.php
45.12.253.72
malicious
http://45.12.253.75/dll.php
45.12.253.75
malicious
http://www.innosetup.com/
unknown
http://45.12.253.75/dll.phpd
unknown
http://www.imagemagick.org
unknown
https://macrorit.com/free-software.html
unknown
http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixintej
unknown
http://45.12.253.75/dll.phpi
unknown
http://45.12.253.75/dll.phph
unknown
http://45.12.253.75/dll.php%
unknown
http://45.12.253.72/del.php
unknown
http://45.12.253.75/dll.phpQ
unknown
http://www.finalrecovery.com/buy.htm
unknown
http://www.remobjects.com/?ps
unknown
http://45.12.253.75/dll.phpP
unknown
http://45.12.253.72/default/stuk.phpi
unknown
https://macrorit.com/disk-wiper-commercial-license-upgrade.html
unknown
http://45.12.253.75/dll.phpX
unknown
http://www.innosetup.comDVarFileInfo$
unknown
http://45.12.253.72/default/stuk.phpt
unknown
http://45.12.253.75/dll.phpL
unknown
http://45.12.253.75/dll.phpH
unknown
http://45.12.253.75/dll.phps
unknown
http://45.12.253.75/dll.php4
unknown
http://45.12.253.75/dll.php0
unknown
http://45.12.253.75/dll.phpp
unknown
http://www.innosetup.com
unknown
http://45.12.253.75/dll.php9
unknown
http://45.12.253.75/dll.php8
unknown
http://45.12.253.75/dll.phpx
unknown
http://www.remobjects.com/?psU
unknown
There are 23 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.12.253.72
unknown
Germany
malicious
45.12.253.75
unknown
Germany
malicious
45.12.253.98
unknown
Germany
malicious
45.12.253.56
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Rec528_is1
NoRepair

Memdumps

Base Address
Regiontype
Protect
Malicious
3260000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
37B1000
heap
page read and write
38B0000
trusted library allocation
page read and write
215F000
stack
page read and write
418A000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
3F2A000
stack
page read and write
400000
unkown
page readonly
42E3000
heap
page read and write
32E0000
direct allocation
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
4E23000
direct allocation
page read and write
173B000
heap
page read and write
41A2000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
21B0000
direct allocation
page read and write
1445000
unkown
page execute and write copy
660000
heap
page read and write
1FD1000
direct allocation
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
BCA000
heap
page read and write
1723000
heap
page read and write
37B1000
heap
page read and write
10019000
direct allocation
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
41A2000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
37B1000
heap
page read and write
4E05000
direct allocation
page read and write
30000
heap
page read and write
2340000
heap
page read and write
1544000
heap
page read and write
1550000
heap
page read and write
4AC0000
heap
page read and write
37B1000
heap
page read and write
4AF000
unkown
page write copy
6B8000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
1620000
direct allocation
page read and write
205E000
stack
page read and write
41A2000
heap
page read and write
37B1000
heap
page read and write
1650000
heap
page read and write
38B0000
trusted library allocation
page read and write
1749000
heap
page read and write
2164000
direct allocation
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
10010000
direct allocation
page readonly
AC0000
heap
page read and write
41A2000
heap
page read and write
173B000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
416C000
heap
page read and write
3060000
direct allocation
page read and write
BC0000
heap
page read and write
870000
heap
page read and write
418A000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
5C0000
heap
page read and write
37B1000
heap
page read and write
91000
unkown
page execute read
1544000
heap
page read and write
1723000
heap
page read and write
207C000
direct allocation
page read and write
42E3000
heap
page read and write
4BC000
unkown
page readonly
37B1000
heap
page read and write
173B000
heap
page read and write
1544000
heap
page read and write
39FF000
stack
page read and write
491F000
stack
page read and write
1544000
heap
page read and write
21A1000
direct allocation
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
66A000
heap
page read and write
40B0000
heap
page read and write
1544000
heap
page read and write
407E000
stack
page read and write
37B1000
heap
page read and write
21B0000
direct allocation
page read and write
401000
unkown
page execute read
5A0000
heap
page read and write
9C000
unkown
page readonly
145F000
unkown
page execute and write copy
37B1000
heap
page read and write
37B1000
heap
page read and write
510000
heap
page read and write
10001000
unkown
page execute read
3B7E000
stack
page read and write
6C1000
heap
page read and write
590000
heap
page read and write
10002000
unkown
page readonly
37B1000
heap
page read and write
37B1000
heap
page read and write
560000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
37B1000
heap
page read and write
1630000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
6BC000
heap
page read and write
37B1000
heap
page read and write
3060000
direct allocation
page read and write
E50000
heap
page read and write
4DF7000
direct allocation
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
4E11000
direct allocation
page read and write
30000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1645000
heap
page read and write
42E3000
heap
page read and write
400000
unkown
page readonly
37B1000
heap
page read and write
37B1000
heap
page read and write
42E3000
heap
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
37B1000
heap
page read and write
6E9000
heap
page read and write
37B1000
heap
page read and write
91000
unkown
page execute read
37B1000
heap
page read and write
42E3000
heap
page read and write
37B1000
heap
page read and write
10017000
direct allocation
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
A2000
unkown
page write copy
1723000
heap
page read and write
452000
unkown
page execute and read and write
18D000
stack
page read and write
37B1000
heap
page read and write
1FD8000
direct allocation
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
144B000
unkown
page execute and write copy
37B1000
heap
page read and write
37B1000
heap
page read and write
332D000
stack
page read and write
442E000
stack
page read and write
5D0000
heap
page read and write
37B1000
heap
page read and write
144D000
unkown
page execute and write copy
1723000
heap
page read and write
41A2000
heap
page read and write
1544000
heap
page read and write
10000000
unkown
page readonly
31CF000
stack
page read and write
37B1000
heap
page read and write
145D000
unkown
page execute and write copy
37B1000
heap
page read and write
4BC000
unkown
page readonly
4268000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
4E15000
direct allocation
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
1749000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
860000
direct allocation
page execute and read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
315F000
stack
page read and write
1544000
heap
page read and write
4E1F000
direct allocation
page read and write
6B8000
heap
page read and write
37B0000
heap
page read and write
6BD000
heap
page read and write
1348000
unkown
page readonly
41A2000
heap
page read and write
6C0000
heap
page read and write
37B1000
heap
page read and write
40C000
unkown
page write copy
1544000
heap
page read and write
42E4000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
2188000
direct allocation
page read and write
37B1000
heap
page read and write
37C2000
heap
page read and write
37B1000
heap
page read and write
173B000
heap
page read and write
37B1000
heap
page read and write
42E3000
heap
page read and write
418A000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
42E3000
heap
page read and write
218B000
direct allocation
page read and write
37B1000
heap
page read and write
1723000
heap
page read and write
9C000
unkown
page readonly
42E3000
heap
page read and write
42E3000
heap
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
3171000
heap
page read and write
37B1000
heap
page read and write
6B5000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
217C000
direct allocation
page read and write
97000
stack
page read and write
342F000
stack
page read and write
37B1000
heap
page read and write
600000
heap
page read and write
9C000
stack
page read and write
143B000
unkown
page execute and write copy
37B1000
heap
page read and write
4E1B000
direct allocation
page read and write
37B1000
heap
page read and write
145B000
unkown
page execute and write copy
173B000
heap
page read and write
401000
unkown
page execute read
37B1000
heap
page read and write
6B4000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
4CFD000
direct allocation
page read and write
1FC0000
direct allocation
page read and write
6C0000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
415E000
heap
page read and write
418A000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
173B000
heap
page read and write
85F000
stack
page read and write
1544000
heap
page read and write
4134000
heap
page read and write
1745000
heap
page read and write
4E21000
direct allocation
page read and write
37B1000
heap
page read and write
199000
stack
page read and write
37B1000
heap
page read and write
48C000
unkown
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
2174000
direct allocation
page read and write
605000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1457000
unkown
page execute and write copy
416C000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
10000000
direct allocation
page read and write
37B1000
heap
page read and write
3DBF000
stack
page read and write
1441000
unkown
page execute and write copy
37B1000
heap
page read and write
4D0B000
direct allocation
page read and write
7BA000
heap
page read and write
6EC000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
15EE000
stack
page read and write
413F000
heap
page read and write
173B000
heap
page read and write
9C000
stack
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
37B3000
heap
page read and write
37B1000
heap
page read and write
3B3F000
stack
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
4F0000
heap
page read and write
1544000
heap
page read and write
5FD000
stack
page read and write
1723000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
1FD1000
direct allocation
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
173B000
heap
page read and write
37B1000
heap
page read and write
38FE000
stack
page read and write
1723000
heap
page read and write
30000
heap
page read and write
3CBE000
stack
page read and write
8FC000
stack
page read and write
A4000
unkown
page readonly
2710000
trusted library allocation
page read and write
15F0000
heap
page read and write
37B1000
heap
page read and write
423A000
heap
page read and write
37B1000
heap
page read and write
496E000
stack
page read and write
37B1000
heap
page read and write
1723000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
4E09000
direct allocation
page read and write
41A2000
heap
page read and write
600000
heap
page read and write
3C7F000
stack
page read and write
5F4000
heap
page read and write
410000
unkown
page readonly
37B1000
heap
page read and write
64E000
stack
page read and write
173B000
heap
page read and write
1723000
heap
page read and write
37B1000
heap
page read and write
A2000
unkown
page read and write
A30000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
401000
unkown
page execute read
1540000
heap
page read and write
1271000
unkown
page readonly
37B1000
heap
page read and write
37B1000
heap
page read and write
2FF0000
direct allocation
page read and write
37B1000
heap
page read and write
6BC000
heap
page read and write
1749000
heap
page read and write
173B000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
A4000
unkown
page readonly
37B1000
heap
page read and write
4AE000
unkown
page read and write
1749000
heap
page read and write
37B1000
heap
page read and write
19C000
stack
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
32C0000
direct allocation
page read and write
1367000
unkown
page execute and write copy
37B1000
heap
page read and write
37B1000
heap
page read and write
407C000
stack
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
2620000
heap
page read and write
4A6F000
stack
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
1451000
unkown
page execute and write copy
410000
unkown
page readonly
37B1000
heap
page read and write
37B1000
heap
page read and write
55E000
stack
page read and write
144F000
unkown
page execute and write copy
37B1000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
48C000
unkown
page write copy
1FBF000
stack
page read and write
37B1000
heap
page read and write
38B0000
trusted library allocation
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
3A3E000
stack
page read and write
3050000
heap
page read and write
4BC0000
direct allocation
page read and write
6C0000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
5F0000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
3060000
heap
page read and write
3020000
direct allocation
page read and write
173B000
heap
page read and write
3DD0000
heap
page read and write
3F7E000
stack
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
40A000
unkown
page read and write
41A2000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
3E2E000
stack
page read and write
1544000
heap
page read and write
87A000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
452C000
stack
page read and write
1339000
unkown
page readonly
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
400000
unkown
page readonly
1700000
heap
page read and write
400000
unkown
page readonly
42E3000
heap
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
7B0000
heap
page read and write
37B1000
heap
page read and write
1610000
direct allocation
page read and write
4E0F000
direct allocation
page read and write
37B1000
heap
page read and write
90000
unkown
page readonly
4DF5000
direct allocation
page read and write
415F000
heap
page read and write
37B1000
heap
page read and write
10001000
direct allocation
page execute read
4E13000
direct allocation
page read and write
6EC000
heap
page read and write
37B1000
heap
page read and write
481E000
stack
page read and write
90000
unkown
page readonly
1544000
heap
page read and write
876000
heap
page read and write
37B1000
heap
page read and write
418A000
heap
page read and write
1640000
heap
page read and write
416C000
heap
page read and write
41A2000
heap
page read and write
37B1000
heap
page read and write
1544000
heap
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
46C000
unkown
page readonly
416C000
heap
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
2160000
direct allocation
page read and write
37B1000
heap
page read and write
37B1000
heap
page read and write
40A000
unkown
page write copy
37B1000
heap
page read and write
1749000
heap
page read and write
30CE000
stack
page read and write
37B1000
heap
page read and write
4DFF000
direct allocation
page read and write
42E3000
heap
page read and write
165A000
heap
page read and write
401000
unkown
page execute read
1723000
heap
page read and write
2174000
direct allocation
page read and write
37B1000
heap
page read and write
1749000
heap
page read and write
37B1000
heap
page read and write
416C000
heap
page read and write
There are 495 hidden memdumps, click here to show them.