IOC Report
KVAoyRsrZC.exe

loading gif

Files

File Path
Type
Category
Malicious
KVAoyRsrZC.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KVAoyRsrZC.exe
"C:\Users\user\Desktop\KVAoyRsrZC.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Windows\System32\Sgrmuserer.exe
C:\Windows\system32\Sgrmuserer.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dynamic.api.tilep
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
eu.minerpool.pw
91.92.248.9

IPs

IP
Domain
Country
Malicious
185.10.68.220
unknown
Seychelles
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a

Memdumps

Base Address
Regiontype
Protect
Malicious
22EE5C68000
heap
page read and write
200026F9000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C62000
heap
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2C43EA13000
heap
page read and write
20096720000
trusted library allocation
page read and write
1E279466000
heap
page read and write
20003F90000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
CDDC37E000
unkown
page readonly
294F0200000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
CDDC87E000
unkown
page readonly
22EE5C58000
heap
page read and write
2000266F000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2000400B000
heap
page read and write
20096720000
trusted library allocation
page read and write
20009A9B000
heap
page read and write
D776FFC000
stack
page read and write
20002683000
heap
page read and write
200027A0000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
D5496FE000
stack
page read and write
1879E84B000
heap
page read and write
20002500000
heap
page read and write
22EE5C42000
heap
page read and write
294F0090000
heap
page read and write
20003FE2000
heap
page read and write
1879E700000
heap
page read and write
20002780000
trusted library allocation
page read and write
22EE5C8F000
heap
page read and write
CDDBE7D000
stack
page read and write
20096720000
trusted library allocation
page read and write
1E2793C0000
remote allocation
page read and write
22EE5C4A000
heap
page read and write
200960F0000
trusted library allocation
page read and write
1E279413000
heap
page read and write
D549C7E000
stack
page read and write
1E279517000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C57000
heap
page read and write
200027A0000
trusted library allocation
page read and write
CDDBA7E000
unkown
page readonly
1E2793C0000
remote allocation
page read and write
20096720000
trusted library allocation
page read and write
1E279370000
trusted library allocation
page read and write
157D5718000
heap
page read and write
200027A0000
trusted library allocation
page read and write
1E279500000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C4D000
heap
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20002649000
heap
page read and write
D7775FE000
stack
page read and write
22EE6402000
trusted library allocation
page read and write
1879E800000
heap
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
200960B0000
trusted library allocation
page read and write
D549B7E000
unkown
page readonly
CDDCA7E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1879EE02000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2C43EA16000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C41000
heap
page read and write
20002780000
trusted library allocation
page read and write
22EE5C5D000
heap
page read and write
22EE5C70000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C8B000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
157D4E37000
heap
page read and write
2C43E910000
heap
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
2C43E9F0000
heap
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2C43EA02000
heap
page read and write
20096720000
trusted library allocation
page read and write
294F0202000
heap
page read and write
2000549B000
heap
page read and write
2C43F202000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
200860A0000
trusted library allocation
page read and write
1879E813000
heap
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20004A9B000
heap
page read and write
200860A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
157D4E48000
heap
page read and write
20096720000
trusted library allocation
page read and write
D549AFE000
stack
page read and write
20096720000
trusted library allocation
page read and write
1879E82B000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
22EE5C00000
heap
page read and write
1879E913000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1879E87E000
heap
page read and write
20096720000
trusted library allocation
page read and write
2000729B000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C59000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
157D4F02000
heap
page read and write
20096720000
trusted library allocation
page read and write
20003F90000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20004013000
heap
page read and write
D5497FE000
stack
page read and write
294F0A02000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20005E9B000
heap
page read and write
157D4C40000
heap
page read and write
20096720000
trusted library allocation
page read and write
CDDC47E000
stack
page read and write
D54A07E000
stack
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
157D4C20000
heap
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
A939F4B000
stack
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
1E279443000
heap
page read and write
1879E600000
heap
page read and write
2C43F080000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
200027B0000
heap
page read and write
2000268F000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2C43EA5E000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1E279513000
heap
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2C43EA00000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
1879E840000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C6B000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20003FFB000
heap
page read and write
20002780000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
1E27945E000
heap
page read and write
1E2793C0000
remote allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
294F022B000
heap
page read and write
4DC18CB000
stack
page read and write
20096720000
trusted library allocation
page read and write
22EE5C2B000
heap
page read and write
20096720000
trusted library allocation
page read and write
CDDC7FE000
stack
page read and write
20096720000
trusted library allocation
page read and write
22EE5C61000
heap
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
22EE5C8D000
heap
page read and write
2C43EA33000
heap
page read and write
1E279472000
heap
page read and write
20007C9B000
heap
page read and write
20002780000
trusted library allocation
page read and write
157D4D50000
trusted library allocation
page read and write
200027E5000
heap
page read and write
20002623000
heap
page read and write
294F0302000
heap
page read and write
200027A0000
trusted library allocation
page read and write
20002700000
heap
page read and write
157D5736000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20002639000
heap
page read and write
20004003000
heap
page read and write
D549E7E000
stack
page read and write
200027A0000
trusted library allocation
page read and write
20002730000
direct allocation
page execute read
22EE5C60000
heap
page read and write
22EE5C63000
heap
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
22EE5B70000
heap
page read and write
1E27B002000
trusted library allocation
page read and write
CDDC67E000
stack
page read and write
20002780000
trusted library allocation
page read and write
D77698B000
stack
page read and write
20096720000
trusted library allocation
page read and write
157D4D20000
heap
page read and write
20096720000
trusted library allocation
page read and write
1E279400000
heap
page read and write
1E27947D000
heap
page read and write
1879EE00000
heap
page read and write
157D4E30000
heap
page read and write
20096720000
trusted library allocation
page read and write
1E279340000
heap
page read and write
1E279502000
heap
page read and write
200960F0000
trusted library allocation
page read and write
22EE5C84000
heap
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
22EE5A90000
heap
page read and write
22EE5C5A000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
20002638000
heap
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
1E279310000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
294F022F000
heap
page read and write
CDDC77E000
unkown
page readonly
20002780000
trusted library allocation
page read and write
7FF635EB0000
unkown
page write copy
22EE5CAA000
heap
page read and write
20002790000
direct allocation
page execute and read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2000909B000
heap
page read and write
22EE5C54000
heap
page read and write
D54987E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
22EE5C66000
heap
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
22EE5C13000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C5C000
heap
page read and write
200027A0000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
D7774FE000
stack
page read and write
20003F90000
trusted library allocation
page read and write
D7771FF000
stack
page read and write
157D5732000
heap
page read and write
2000401B000
heap
page read and write
CDDB69B000
stack
page read and write
22EE5C5E000
heap
page read and write
4DC1E7E000
stack
page read and write
157D4EB1000
heap
page read and write
157D4E00000
heap
page read and write
D549D7E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
157D4E48000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
1E279402000
heap
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200025E0000
heap
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
157D573E000
heap
page read and write
1879ED90000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
200027E0000
heap
page read and write
20096720000
trusted library allocation
page read and write
157D4E87000
heap
page read and write
7FF635770000
unkown
page readonly
20002780000
trusted library allocation
page read and write
157D5702000
heap
page read and write
CDDC2FC000
stack
page read and write
CDDC57E000
unkown
page readonly
157D4E16000
heap
page read and write
20096720000
trusted library allocation
page read and write
2C43EA40000
heap
page read and write
1879E802000
heap
page read and write
157D4E68000
heap
page read and write
1879E620000
heap
page read and write
20096720000
trusted library allocation
page read and write
294F0190000
heap
page read and write
157D4E13000
heap
page read and write
1879EE15000
heap
page read and write
200027A0000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
2C43EA37000
heap
page read and write
294F023D000
heap
page read and write
20096720000
trusted library allocation
page read and write
20004090000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
294F0213000
heap
page read and write
D54977E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
22EE5C36000
heap
page read and write
1E279330000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
3260CBB000
stack
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
2C43EA48000
heap
page read and write
200027D1000
direct allocation
page execute and read and write
2000409B000
heap
page read and write
22EE5A70000
heap
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
294F00B0000
heap
page read and write
20002780000
trusted library allocation
page read and write
1879E864000
heap
page read and write
20002780000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1E279390000
trusted library allocation
page read and write
20002780000
direct allocation
page execute and read and write
2000689B000
heap
page read and write
1E279457000
heap
page read and write
20096720000
trusted library allocation
page read and write
200026B7000
heap
page read and write
22EE5C5B000
heap
page read and write
20096720000
trusted library allocation
page read and write
157D4E80000
heap
page read and write
4DC1CFF000
stack
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
CDDBF7E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
22EE5C97000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1879E900000
heap
page read and write
20003FD0000
heap
page read and write
200027A0000
trusted library allocation
page read and write
20003FDA000
heap
page read and write
507C2BB000
stack
page read and write
20096720000
trusted library allocation
page read and write
4DC19CF000
stack
page read and write
20096720000
trusted library allocation
page read and write
22EE5C67000
heap
page read and write
200960F0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1879E88A000
heap
page read and write
20096720000
trusted library allocation
page read and write
157D5602000
heap
page read and write
2C43E8F0000
heap
page read and write
22EE5D02000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
A93A5FE000
unkown
page readonly
200026AE000
heap
page read and write
200027C1000
direct allocation
page execute and read and write
CDDC97E000
stack
page read and write
CDDB79D000
stack
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
22EE5C8E000
heap
page read and write
294F023F000
heap
page read and write
D776EFD000
stack
page read and write
22EE5C92000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
200027A0000
trusted library allocation
page read and write
157D5700000
heap
page read and write
2000869B000
heap
page read and write
A93A4FD000
stack
page read and write
20096720000
trusted library allocation
page read and write
20002780000
trusted library allocation
page read and write
200960F0000
trusted library allocation
page read and write
200026B3000
heap
page read and write
20096720000
trusted library allocation
page read and write
1879E856000
heap
page read and write
20096720000
trusted library allocation
page read and write
294F01C0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
D7772FE000
stack
page read and write
20096720000
trusted library allocation
page read and write
D7773FE000
stack
page read and write
157D572E000
heap
page read and write
20002600000
heap
page read and write
200027A0000
trusted library allocation
page read and write
2C43EA54000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1E27942B000
heap
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
1879E902000
heap
page read and write
20096720000
trusted library allocation
page read and write
22EE5C6D000
heap
page read and write
7FF635D22000
unkown
page execute and write copy
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
22EE5C6A000
heap
page read and write
22EE5BA0000
trusted library allocation
page read and write
20096720000
trusted library allocation
page read and write
2000260C000
heap
page read and write
2C43EA60000
heap
page read and write
D54939B000
stack
page read and write
D7770FE000
stack
page read and write
20096720000
trusted library allocation
page read and write
D54A17E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
22EE5C47000
heap
page read and write
20096720000
trusted library allocation
page read and write
2C43EB02000
heap
page read and write
1879E83A000
heap
page read and write
D549F7E000
unkown
page readonly
20096720000
trusted library allocation
page read and write
There are 469 hidden memdumps, click here to show them.