IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_main.exe_59e5c191145a7e657df69e5cbadfff4911e783_61e28721_381d6b4d-05a1-4382-babe-90fa558ea39b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\73tsjpnle0jv48sgryqfs6ph8t.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7mmwpep245voy3fngkym99px3pj5vx36.bat
DOS batch file, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\cwjk513wjc7a1mlgh3.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\6rRRlGVV
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\ROF9A37w
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\TsG1eHIt
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\bMZx4vGr
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\eKTTDy2k
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\ogg99SMu
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\t291wOio
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\w3LkirgH
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF885.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Oct 11 14:54:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9CE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9EE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9FC.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA3B.tmp.txt
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\config.ini
Generic INItialization configuration [cnccli]
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p.conf
ASCII text
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p.su3
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\destinations\n53qvwtup4waekyrakvw2svm247ujbkgfwsr6blnwpantzo5nz2a.dat
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\destinations\wz7qkrnzqpr2zyylfckxtaxrsqsblspad7pbqa3ee5qc7klzdqfq.dat
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\ntcp2.keys
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\router.info
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\router.keys
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\ssu2.keys
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkg
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adl3rpvb.kiz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bk0bvscq.w15.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ccoqzpbb.p3k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csxx31s3.jgv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fmymk3jc.xit.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ltfi0pvo.yod.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mfjfzw1j.cxy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nvj4bko1.vwj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovhd124v.enx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vqxni0vi.5l3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wagdvozv.5zs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wamugexa.3oi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\installer.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\wfpblk.ini
Generic INItialization configuration [svc]
dropped
C:\Users\user\AppData\Local\Temp\wfpblk.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\2L2zlVsY
ASCII text
dropped
C:\Windows\Temp\Cw0MZxef
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\uUNWplSZ
data
dropped
C:\Windows\Temp\w7pEN9Cm
Generic INItialization configuration [SLPolicy]
dropped
C:\Windows\Temp\zMtJJthI
Generic INItialization configuration [cnccli]
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 59 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\7mmwpep245voy3fngkym99px3pj5vx36.bat"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
malicious
C:\Users\user\AppData\Local\Temp\73tsjpnle0jv48sgryqfs6ph8t.exe
"C:\Users\user\AppData\Local\Temp\73tsjpnle0jv48sgryqfs6ph8t.exe"
malicious
C:\Windows\System32\sc.exe
sc.exe stop RDP-Controller
malicious
C:\Windows\System32\sc.exe
sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
malicious
C:\Windows\System32\sc.exe
sc.exe failure RDP-Controller reset= 1 actions= restart/10000
malicious
C:\Windows\System32\sc.exe
sc.exe start RDP-Controller
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\cwjk513wjc7a1mlgh3.exe
"C:\Users\user\AppData\Local\Temp\cwjk513wjc7a1mlgh3.exe"
C:\Windows\System32\taskkill.exe
taskkill.exe /F /FI "SERVICES eq RDP-Controller"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 444 -p 2656 -ip 2656
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2656 -s 1188
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://i2pseed.creativecowpat.net:8443/
unknown
malicious
http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
unknown
malicious
https://reseed.memcpy.io/
unknown
malicious
https://reseed.i2pgit.org/
unknown
malicious
https://reseed-pl.i2pd.xyz/
unknown
malicious
https://reseed.onion.im/
unknown
malicious
https://reseed2.i2p.net/
unknown
malicious
https://banana.incognet.io/
unknown
malicious
https://reseed-fr.i2pd.xyz/
unknown
malicious
https://reseed.onion.im/O
unknown
malicious
https://i2p.novg.net/
unknown
malicious
https://i2p.ghativega.in/
unknown
malicious
https://www2.mk16.de/
unknown
malicious
https://reseed.onion.im/w
unknown
malicious
https://reseed.diva.exchange/
unknown
malicious
https://reseed.stormycloud.org/
unknown
malicious
https://reseed.diva.exchange/b.c
unknown
https://i2p.novg.net/K
unknown
https://reseed-fr.i2pd.xyz/I
unknown
http://stats.i2p/cgi-bin/newhosts.txt
unknown
http://127.0.0.1:8118
unknown
https://banana.incognet.io:443/i2pseeds.su3W
unknown
https://banana.incognet.io/W
unknown
https://i2p.mooo.com/netDb/
unknown
http://reg.i2p/hosts.txty-
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
unknown
https://www2.mk16.de/m
unknown
https://reseed.i2pgit.org/L
unknown
https://reseed.i2p-projekt.de/
unknown
https://reseed-pl.i2pd.xyz/3
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txti2p.su3/)
unknown
https://netdb.i2p2.no/
unknown
https://reseed.i2pgit.org/6
unknown
http://upx.sf.net
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/
unknown
http://reg.i2p/hosts.txt
unknown
https://reseed.stormycloud.org/HWUm~GTa
unknown
https://banana.incognet.io/i2pseeds.su3
unknown
https://reseed-pl.i2pd.xyz/F
unknown
https://reseed.memcpy.io/%
unknown
http://identiguy.i2p/hosts.txt
unknown
http://reg.i2p/hosts.txtf?
unknown
http://reg.i2p/hosts.txtei
unknown
https://reseed2.i2p.net/vp/p_lib.c
unknown
https://legit-website.com/i2pseeds.su3
unknown
http://reg.i2p/hosts.txt?~
unknown
https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
unknown
https://banana.incognet.io:443/i2pseeds.su3
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://
unknown
http://rus.i2p/hosts.txt
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
banana.incognet.io
23.137.250.108
malicious
reseed.diva.exchange
80.74.145.70
malicious

IPs

IP
Domain
Country
Malicious
80.74.145.70
reseed.diva.exchange
Switzerland
malicious
23.137.250.108
banana.incognet.io
Reserved
malicious
217.255.81.237
unknown
Germany
malicious
173.68.123.78
unknown
United States
malicious
23.128.248.23
unknown
Reserved
malicious
77.54.240.255
unknown
Portugal
malicious
2.178.241.192
unknown
Iran (ISLAMIC Republic Of)
45.126.126.80
unknown
Australia
146.70.24.213
unknown
United Kingdom
85.236.190.252
unknown
Russian Federation
23.137.249.66
unknown
Reserved
95.68.156.35
unknown
Russian Federation
89.87.222.219
unknown
France
91.149.236.241
unknown
Poland
2.191.228.230
unknown
Iran (ISLAMIC Republic Of)
62.210.85.80
unknown
France
124.169.148.215
unknown
Australia
151.242.80.51
unknown
Iran (ISLAMIC Republic Of)
82.38.134.93
unknown
United Kingdom
83.255.145.146
unknown
Sweden
45.30.192.252
unknown
United States
173.47.97.119
unknown
United States
87.225.96.167
unknown
Russian Federation
80.46.94.241
unknown
United Kingdom
50.100.197.208
unknown
Canada
99.174.64.226
unknown
United States
127.0.0.1
unknown
unknown
There are 17 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
ProgramId
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
FileId
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
LowerCaseLongPath
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
LongPathHash
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Name
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
OriginalFileName
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Publisher
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Version
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
BinFileVersion
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
BinaryType
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
ProductName
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
ProductVersion
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
LinkDate
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
BinProductVersion
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
AppxPackageFullName
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
AppxPackageRelativeId
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Size
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Language
malicious
\REGISTRY\A\{b201fa4e-0da6-9e2d-01fb-0bbb5cd21d2e}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\2656
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\2656
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\2656
CreationTime
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
280A000
direct allocation
page read and write
14002D000
direct allocation
page read and write
7FF710D86000
unkown
page read and write
C2965FD000
stack
page read and write
1D681FD000
stack
page read and write
2D26000
heap
page read and write
234FBFF000
stack
page read and write
7FF7C1ACE000
unkown
page readonly
142D8D9B000
heap
page read and write
B40000
heap
page read and write
2811000
direct allocation
page read and write
427567E000
stack
page read and write
7FF7C1AB1000
unkown
page execute read
7FFE11791000
unkown
page write copy
1D669FA000
stack
page read and write
7FFE11BE6000
unkown
page readonly
7FF710370000
unkown
page read and write
157C5EC7000
heap
page read and write
7FF64B930000
unkown
page readonly
1D63DFC000
stack
page read and write
21034340000
heap
page read and write
234D5FF000
stack
page read and write
1D66FFF000
stack
page read and write
7FF64B931000
unkown
page execute read
A50000
heap
page read and write
1D683FD000
stack
page read and write
142D8DBB000
heap
page read and write
7FFE1A50F000
unkown
page write copy
142D8E6E000
heap
page read and write
7FF710D88000
unkown
page write copy
7FFE1A4F1000
unkown
page execute read
23503FF000
stack
page read and write
7FF7C1ACE000
unkown
page readonly
23501FD000
stack
page read and write
296FD6C0000
heap
page read and write
157C62CE000
heap
page read and write
7FF7C1AC0000
unkown
page readonly
15AF5213000
heap
page read and write
157C5E68000
heap
page read and write
1E12A1E1000
heap
page read and write
7FFDFBAB2000
unkown
page read and write
7FFDFB7D9000
unkown
page read and write
1E12A3F0000
heap
page read and write
8AE000
unkown
page readonly
266A000
direct allocation
page read and write
15AF5200000
heap
page read and write
3E89000
heap
page read and write
7FF7C1AB0000
unkown
page readonly
7FF7C1ACA000
unkown
page write copy
7FFE11BD0000
unkown
page readonly
133E9BA5000
heap
page read and write
DC163FB000
stack
page read and write
66CE7E000
stack
page read and write
7FFE11521000
unkown
page write copy
7FFDFB9AA000
unkown
page readonly
866000
unkown
page read and write
7FFE11EE0000
unkown
page write copy
142D897D000
heap
page read and write
142D8DBE000
heap
page read and write
BA9000
heap
page read and write
E3F000
stack
page read and write
142D8DE8000
heap
page read and write
15AF5302000
heap
page read and write
142D8D99000
heap
page read and write
260E000
direct allocation
page read and write
7FFE11ED3000
unkown
page readonly
7FF7C1AB0000
unkown
page readonly
234E5FF000
stack
page read and write
1D681FF000
stack
page read and write
454D57E000
stack
page read and write
2C0D000
direct allocation
page execute and read and write
7FFE11BF4000
unkown
page write copy
26D0000
heap
page read and write
9BC000
heap
page read and write
7FFE1178D000
unkown
page read and write
7FF7C1ACE000
unkown
page readonly
427547D000
stack
page read and write
142D8EBC000
heap
page read and write
A550AFF000
stack
page read and write
1D65BFE000
stack
page read and write
853000
unkown
page read and write
2693000
direct allocation
page read and write
1D667FF000
stack
page read and write
B7A000
heap
page read and write
86E000
unkown
page read and write
133E9870000
heap
page read and write
9E0000
heap
page read and write
133E9A40000
heap
page read and write
8A1000
unkown
page read and write
7FF710361000
unkown
page execute read
133E9BA0000
heap
page read and write
14002D000
direct allocation
page read and write
2B8FC3F0000
heap
page read and write
157C629C000
heap
page read and write
7FF71096E000
unkown
page read and write
157C63E2000
heap
page read and write
7FF710370000
unkown
page write copy
234C1FE000
stack
page read and write
142D896E000
heap
page read and write
7FFE1A521000
unkown
page execute read
8A8000
unkown
page write copy
D7F000
stack
page read and write
15AF4DA0000
heap
page read and write
B92000
heap
page read and write
15AF5202000
heap
page read and write
7FF710D88000
unkown
page read and write
7FFE1A50E000
unkown
page read and write
157C5E73000
heap
page read and write
234F7F7000
stack
page read and write
2560000
heap
page read and write
23507FF000
stack
page read and write
157C5A0D000
heap
page read and write
7FFE1A53D000
unkown
page read and write
8A9000
unkown
page read and write
157C6290000
heap
page read and write
142D8978000
heap
page read and write
1F0000
direct allocation
page execute and read and write
1D65DFF000
stack
page read and write
1A0000
heap
page read and write
1D64FFF000
stack
page read and write
DC163F7000
stack
page read and write
3450000
heap
page read and write
B78000
heap
page read and write
157C62D3000
heap
page read and write
234C9FF000
stack
page read and write
7FFE1A544000
unkown
page readonly
7FFE126F0000
unkown
page readonly
7FFDFB7D9000
unkown
page read and write
142D8E2E000
heap
page read and write
7FFE11BF0000
unkown
page read and write
157C6464000
heap
page read and write
7FFE11EC1000
unkown
page execute read
142D82A2000
heap
page read and write
1D679F9000
stack
page read and write
2C49A945000
heap
page read and write
142D8E76000
heap
page read and write
234FFFD000
stack
page read and write
A5C000
heap
page read and write
7FFDFB9A4000
unkown
page read and write
1D64BFF000
stack
page read and write
14A000
stack
page read and write
157C63D2000
heap
page read and write
234F7F9000
stack
page read and write
841000
unkown
page read and write
234FDF7000
stack
page read and write
234C7FF000
stack
page read and write
142D8DB6000
heap
page read and write
142D8DAB000
heap
page read and write
1E12A1B0000
heap
page read and write
2616000
direct allocation
page read and write
142D8DBC000
heap
page read and write
7FFE1A502000
unkown
page readonly
7FFE1A50B000
unkown
page read and write
7FFE126F8000
unkown
page read and write
1D671FB000
stack
page read and write
1D679F7000
stack
page read and write
157C6271000
heap
page read and write
7FF710D89000
unkown
page write copy
E66B9FF000
stack
page read and write
7FFDFB9AA000
unkown
page readonly
157C6425000
heap
page read and write
23505FF000
stack
page read and write
2730000
direct allocation
page execute and read and write
27ED000
direct allocation
page read and write
7FF7C1AC0000
unkown
page readonly
190000
heap
page read and write
133E9830000
heap
page read and write
157C62EA000
heap
page read and write
4BCD000
heap
page read and write
3759000
heap
page read and write
157C6393000
heap
page read and write
142D8DBE000
heap
page read and write
210345A5000
heap
page read and write
7FFE126E1000
unkown
page execute read
1A020125000
heap
page read and write
234D1FE000
stack
page read and write
7FFE126FC000
unkown
page write copy
234C1F9000
stack
page read and write
8A6000
unkown
page read and write
66CEFF000
stack
page read and write
133E9800000
heap
page read and write
7FFE126E0000
unkown
page readonly
157C4E04000
heap
page read and write
234CBFD000
stack
page read and write
9B6000
heap
page read and write
142D8DA3000
heap
page read and write
7FFDFBAB2000
unkown
page read and write
844000
unkown
page read and write
2D8627D0000
heap
page read and write
142D896D000
heap
page read and write
C2968FE000
stack
page read and write
157C62EF000
heap
page read and write
1E12A3A0000
heap
page read and write
15AF5300000
heap
page read and write
15AF4DC0000
heap
page read and write
A550A7F000
stack
page read and write
142D8DB6000
heap
page read and write
841000
unkown
page read and write
1D66BFF000
stack
page read and write
7FFE1A4F1000
unkown
page execute read
7FFE126E1000
unkown
page execute read
F1A0B7E000
stack
page read and write
E66B5F9000
stack
page read and write
AD0000
heap
page read and write
296FD9C0000
heap
page read and write
2C49A940000
heap
page read and write
157C5E6A000
heap
page read and write
27CB000
direct allocation
page read and write
142D8DD6000
heap
page read and write
7FF64B94A000
unkown
page read and write
847000
unkown
page read and write
2C49AA10000
heap
page read and write
7FF64B931000
unkown
page execute read
157C5E6D000
heap
page read and write
7FFDFB7DF000
unkown
page read and write
142D8DAC000
heap
page read and write
7FFE11BD1000
unkown
page execute read
7FFE1A50B000
unkown
page read and write
142D89D0000
heap
page read and write
21034240000
heap
page read and write
2C49A930000
trusted library allocation
page read and write
142D89D6000
heap
page read and write
133E9879000
heap
page read and write
157C4DD3000
heap
page read and write
DC163F9000
stack
page read and write
7FF7C1AC8000
unkown
page read and write
180000
heap
page read and write
142D8190000
heap
page read and write
454CFBE000
stack
page read and write
7FFE11EC0000
unkown
page readonly
157C63BE000
heap
page read and write
87A000
unkown
page read and write
BC1000
heap
page read and write
1D665FF000
stack
page read and write
2520000
direct allocation
page execute and read and write
2B8FC3D0000
heap
page read and write
7FF7C1AB1000
unkown
page execute read
BC1000
heap
page read and write
157C4DA6000
heap
page read and write
27A3000
heap
page read and write
869000
unkown
page read and write
7FFE1A533000
unkown
page read and write
BDE31BD000
stack
page read and write
E66B5FE000
stack
page read and write
7FFDFBAB4000
unkown
page write copy
BA9000
heap
page read and write
157C4DC5000
heap
page read and write
66CBEB000
stack
page read and write
2B8FC2D0000
heap
page read and write
27DA000
direct allocation
page read and write
7FF710D8C000
unkown
page readonly
1D67FFD000
stack
page read and write
265B000
direct allocation
page read and write
142D81B0000
heap
page read and write
454D47E000
stack
page read and write
7FFDFB7E4000
unkown
page readonly
157C63D9000
heap
page read and write
8A1000
unkown
page read and write
7FFDFB7E4000
unkown
page readonly
454D679000
stack
page read and write
157C6272000
heap
page read and write
2C49A830000
heap
page read and write
142D89FE000
heap
page read and write
1D663FE000
stack
page read and write
1D677FD000
stack
page read and write
2565000
heap
page read and write
2B8FC530000
heap
page read and write
296FD8C0000
heap
page read and write
7FFE11BF0000
unkown
page read and write
7FFDFBAB4000
unkown
page write copy
15AF5313000
heap
page read and write
1D66DF7000
stack
page read and write
7FFE1A540000
unkown
page read and write
BDE34FF000
stack
page read and write
7FFE11771000
unkown
page execute read
990000
heap
page read and write
142D8DAD000
heap
page read and write
83E000
unkown
page read and write
142D8973000
heap
page read and write
400000
unkown
page readonly
27A5000
direct allocation
page read and write
7FFE11BF3000
unkown
page read and write
262E000
direct allocation
page read and write
2770000
direct allocation
page execute and read and write
2758000
direct allocation
page read and write
15AF4E39000
heap
page read and write
133E9810000
heap
page read and write
157C6424000
heap
page read and write
7FFE1A520000
unkown
page readonly
1A01FD90000
heap
page read and write
27BB000
direct allocation
page read and write
157C62A7000
heap
page read and write
2C49A970000
trusted library allocation
page read and write
7FFE1151D000
unkown
page read and write
157C4DD2000
heap
page read and write
1D683FF000
stack
page read and write
157C63DE000
heap
page read and write
7FFE1A520000
unkown
page readonly
F1A074D000
stack
page read and write
7FFE11501000
unkown
page execute read
157C6450000
heap
page read and write
7FF7C1ACA000
unkown
page read and write
157C4CE0000
heap
page read and write
1D643F9000
stack
page read and write
B49000
heap
page read and write
7FFDFB201000
unkown
page execute read
7FFE1A534000
unkown
page readonly
142D8DA8000
heap
page read and write
1A020120000
heap
page read and write
157C62F9000
heap
page read and write
142D8DA5000
heap
page read and write
157C5075000
heap
page read and write
7FF7C1AB0000
unkown
page readonly
853000
unkown
page read and write
26A1000
direct allocation
page read and write
7FF7C1AB1000
unkown
page execute read
880000
unkown
page read and write
7FF64B94F000
unkown
page readonly
210343B8000
heap
page read and write
7FFDFBAB7000
unkown
page readonly
1D679FF000
stack
page read and write
1D657FE000
stack
page read and write
7FFE11EC1000
unkown
page execute read
142D8978000
heap
page read and write
142D893D000
heap
page read and write
234FDFF000
stack
page read and write
210345A0000
heap
page read and write
157C5ED1000
heap
page read and write
2C49A910000
heap
page read and write
2BE0000
direct allocation
page execute and read and write
DC165FE000
stack
page read and write
269A000
direct allocation
page read and write
1A01FDE0000
heap
page read and write
454D37E000
stack
page read and write
234C5F6000
stack
page read and write
234D9FC000
stack
page read and write
160000
heap
page read and write
234F3FA000
stack
page read and write
234F7FD000
stack
page read and write
7FFE1A541000
unkown
page write copy
234D7FE000
stack
page read and write
86C000
unkown
page read and write
142D8DBB000
heap
page read and write
234E9FB000
stack
page read and write
7FFE1A533000
unkown
page read and write
1D647FF000
stack
page read and write
7FFE126FC000
unkown
page write copy
157C6272000
heap
page read and write
7FFE126E0000
unkown
page readonly
418D000
heap
page read and write
7FFE11ED3000
unkown
page readonly
7FF7C1ACA000
unkown
page read and write
234BDFC000
stack
page read and write
2D8626A5000
heap
page read and write
268C000
direct allocation
page read and write
7FFE11EDF000
unkown
page read and write
142D8926000
heap
page read and write
7FFE1A50E000
unkown
page read and write
234DBFF000
stack
page read and write
142D8294000
heap
page read and write
142D896A000
heap
page read and write
157C5A0F000
heap
page read and write
861000
unkown
page read and write
1D675F7000
stack
page read and write
1A01FDA0000
heap
page read and write
2C49AA18000
heap
page read and write
157C4DCC000
heap
page read and write
15AF4DD0000
trusted library allocation
page read and write
263C000
direct allocation
page read and write
BDE35FE000
stack
page read and write
7FFDFB201000
unkown
page execute read
142D8DBD000
heap
page read and write
210343B0000
heap
page read and write
454D2FF000
stack
page read and write
234E1FF000
stack
page read and write
234E7FF000
stack
page read and write
26D0000
direct allocation
page execute and read and write
157C62B5000
heap
page read and write
157C62EA000
heap
page read and write
234DFFE000
stack
page read and write
234C5FC000
stack
page read and write
234FDF9000
stack
page read and write
7FF7C1AB0000
unkown
page readonly
7FF710D7E000
unkown
page readonly
7FFE1A50F000
unkown
page write copy
14A000
stack
page read and write
DC163FF000
stack
page read and write
1D673FF000
stack
page read and write
7FF71096C000
unkown
page read and write
7FF7C1AB1000
unkown
page execute read
234F9FF000
stack
page read and write
157C5E1D000
heap
page read and write
234FDFD000
stack
page read and write
1D63FFE000
stack
page read and write
1D643FE000
stack
page read and write
157C6435000
heap
page read and write
2D8626B0000
heap
page read and write
234C3FE000
stack
page read and write
7FFE11BD1000
unkown
page execute read
1D661FF000
stack
page read and write
7FFE1A541000
unkown
page write copy
267D000
direct allocation
page read and write
142D8E7A000
heap
page read and write
2D8626D8000
heap
page read and write
83E000
unkown
page read and write
7FFDFBAB7000
unkown
page readonly
234EDF9000
stack
page read and write
865000
unkown
page read and write
157C62CE000
heap
page read and write
9B0000
heap
page read and write
861000
unkown
page read and write
27C4000
direct allocation
page read and write
2C0F000
direct allocation
page execute and read and write
2C49A950000
heap
page read and write
1D675FD000
stack
page read and write
2B8FC1E0000
heap
page read and write
7FFE1A544000
unkown
page readonly
3726000
heap
page read and write
7FFE11520000
unkown
page read and write
142D8248000
heap
page read and write
401000
unkown
page execute read
454CEBD000
stack
page read and write
7FFE1A4F0000
unkown
page readonly
859000
unkown
page read and write
2B8FC535000
heap
page read and write
1D675FF000
stack
page read and write
170000
heap
page read and write
279E000
direct allocation
page read and write
142D8DE8000
heap
page read and write
DC167FF000
stack
page read and write
7FFE1A512000
unkown
page readonly
B7A000
heap
page read and write
1D677F7000
stack
page read and write
26A8000
direct allocation
page read and write
7FF7C1ACE000
unkown
page readonly
7FFE1A512000
unkown
page readonly
7FF64B94F000
unkown
page readonly
1C0000
heap
page read and write
234C5FF000
stack
page read and write
427557F000
stack
page read and write
7FFDFB7DE000
unkown
page write copy
7FFE11EDC000
unkown
page read and write
234F1FB000
stack
page read and write
157C62FD000
heap
page read and write
1D655FF000
stack
page read and write
157C4DA0000
heap
page read and write
157C6460000
heap
page read and write
142D897D000
heap
page read and write
23501FF000
stack
page read and write
89D000
unkown
page read and write
B10000
heap
page read and write
1D64DFE000
stack
page read and write
7FFE11EC0000
unkown
page readonly
1D65FFE000
stack
page read and write
234F1F9000
stack
page read and write
454CF3E000
stack
page read and write
157C6455000
heap
page read and write
8AA000
unkown
page read and write
142D8180000
heap
page read and write
296FD7A9000
heap
page read and write
7FFE126FB000
unkown
page read and write
234F5F9000
stack
page read and write
234E3FE000
stack
page read and write
A5507FC000
stack
page read and write
234F3FF000
stack
page read and write
15AF5302000
heap
page read and write
2D8625B0000
heap
page read and write
15AF4E02000
unkown
page read and write
234F9FD000
stack
page read and write
157C63CE000
heap
page read and write
15AF4E70000
heap
page read and write
142D8DBB000
heap
page read and write
7FF64B941000
unkown
page write copy
2720000
heap
page read and write
7FFE1A534000
unkown
page readonly
AD3000
heap
page read and write
157C62D3000
heap
page read and write
276E000
direct allocation
page read and write
1D653FF000
stack
page read and write
2D8626A0000
heap
page read and write
7FF7C1AC0000
unkown
page readonly
E66B7FF000
stack
page read and write
142D8D50000
heap
page read and write
234BFFE000
stack
page read and write
1D679FD000
stack
page read and write
7FFE11EDC000
unkown
page read and write
15AF4F15000
trusted library allocation
page read and write
1E12A1D0000
heap
page read and write
7FF7C1AC8000
unkown
page read and write
157C6331000
heap
page read and write
142D89DF000
heap
page read and write
2818000
direct allocation
page read and write
7FFE1A53D000
unkown
page read and write
157C5411000
heap
page read and write
8B0000
unkown
page readonly
7FF710360000
unkown
page readonly
157C62B8000
heap
page read and write
2D20000
heap
page read and write
234F5FD000
stack
page read and write
15AF4E0B000
unkown
page read and write
234F5FF000
stack
page read and write
142D8DFA000
heap
page read and write
25FE000
direct allocation
page read and write
1D671FF000
stack
page read and write
7FFE11BF3000
unkown
page read and write
7FFDFB200000
unkown
page readonly
27A0000
heap
page read and write
15AF4E25000
unkown
page read and write
1D673FA000
stack
page read and write
1D651FE000
stack
page read and write
2D1F000
stack
page read and write
87A000
unkown
page read and write
7FFE11BF4000
unkown
page write copy
C2969FE000
stack
page read and write
15AF4F02000
trusted library allocation
page read and write
142D84A5000
heap
page read and write
2BD0000
direct allocation
page execute and read and write
157C4CD0000
heap
page read and write
157C62C3000
heap
page read and write
142D8D96000
heap
page read and write
25E8000
direct allocation
page read and write
1E12A3E0000
heap
page read and write
7FF64B94B000
unkown
page write copy
7FFE11EE0000
unkown
page write copy
7FFE11BE6000
unkown
page readonly
234DDFE000
stack
page read and write
157C5EBA000
heap
page read and write
2786000
direct allocation
page read and write
157C6459000
heap
page read and write
8AD000
unkown
page read and write
7FFE11EDF000
unkown
page read and write
23503FD000
stack
page read and write
296FD8A0000
heap
page read and write
83E000
unkown
page write copy
142D8240000
heap
page read and write
133E988E000
heap
page read and write
15AF5313000
heap
page read and write
BC1000
heap
page read and write
7FF64B94C000
unkown
page write copy
7FFE126F0000
unkown
page readonly
8A6000
unkown
page read and write
7FFE126F8000
unkown
page read and write
21034320000
heap
page read and write
234EDFF000
stack
page read and write
157C6250000
heap
page read and write
142D8DBB000
heap
page read and write
1D645F6000
stack
page read and write
157C5E26000
heap
page read and write
15AF4E00000
unkown
page read and write
7FFE11514000
unkown
page readonly
234CFFE000
stack
page read and write
264B000
direct allocation
page read and write
15AF5300000
heap
page read and write
7FF710D70000
unkown
page write copy
7FFE1A540000
unkown
page read and write
7FF64B942000
unkown
page readonly
7FFE1A4F0000
unkown
page readonly
157C62AE000
heap
page read and write
86E000
unkown
page read and write
27FC000
direct allocation
page read and write
1D675F9000
stack
page read and write
157C4DAC000
heap
page read and write
15AF4F24000
heap
page read and write
7FFE11770000
unkown
page readonly
F1A0A7F000
stack
page read and write
1E12A1D9000
heap
page read and write
234D3FF000
stack
page read and write
1D67DFD000
stack
page read and write
1D641FE000
stack
page read and write
142D84AB000
heap
page read and write
234F1FF000
stack
page read and write
1D645FC000
stack
page read and write
2803000
direct allocation
page read and write
157C5E3D000
heap
page read and write
142D899E000
heap
page read and write
7FFE11500000
unkown
page readonly
1E12A3C0000
heap
page read and write
142D84A0000
heap
page read and write
7FF710361000
unkown
page execute read
157C62CF000
heap
page read and write
234EDF7000
stack
page read and write
7FF710D7E000
unkown
page readonly
7FF7C1AC0000
unkown
page readonly
15AF4F00000
trusted library allocation
page read and write
157C5E78000
heap
page read and write
7FFDFB9A4000
unkown
page read and write
296FD9C5000
heap
page read and write
1A01FDE8000
heap
page read and write
7FFE11790000
unkown
page read and write
B15000
heap
page read and write
7FFE11784000
unkown
page readonly
142D8DA2000
heap
page read and write
1D685FF000
stack
page read and write
27F4000
direct allocation
page read and write
2B8FC2D7000
heap
page read and write
157C5E7A000
heap
page read and write
157C4D00000
heap
page read and write
157C507B000
heap
page read and write
1D671F9000
stack
page read and write
1D67DFF000
stack
page read and write
15AF4E13000
unkown
page read and write
89D000
unkown
page read and write
844000
unkown
page read and write
234CDFF000
stack
page read and write
2654000
direct allocation
page read and write
7FFE126FB000
unkown
page read and write
1D66DFD000
stack
page read and write
157C639B000
heap
page read and write
7FF64B941000
unkown
page read and write
234EFFF000
stack
page read and write
2D8626D0000
heap
page read and write
1D67BFD000
stack
page read and write
1A01FDC0000
heap
page read and write
142D897A000
heap
page read and write
7FFE1A502000
unkown
page readonly
1E12A3E5000
heap
page read and write
157C62F7000
heap
page read and write
157C5070000
heap
page read and write
234EBFE000
stack
page read and write
7FF64B942000
unkown
page readonly
1D66DFF000
stack
page read and write
157C5EE0000
heap
page read and write
234F5F7000
stack
page read and write
142D8DBD000
heap
page read and write
87E000
unkown
page read and write
1D66DF9000
stack
page read and write
7FFE11BD0000
unkown
page readonly
1D649FE000
stack
page read and write
296FD7A0000
heap
page read and write
7FF64B930000
unkown
page readonly
234FBFD000
stack
page read and write
1D67BFF000
stack
page read and write
157C62CF000
heap
page read and write
C7E000
stack
page read and write
157C62B5000
heap
page read and write
7FFE1A521000
unkown
page execute read
234EDFD000
stack
page read and write
7FF710D8C000
unkown
page readonly
7FFDFB7DF000
unkown
page read and write
869000
unkown
page read and write
880000
unkown
page read and write
27AC000
direct allocation
page read and write
1D659FD000
stack
page read and write
7FF710360000
unkown
page readonly
7FFDFB7DE000
unkown
page write copy
BA9000
heap
page read and write
2684000
direct allocation
page read and write
142D8963000
heap
page read and write
2635000
direct allocation
page read and write
157C4DF1000
heap
page read and write
157C5E6E000
heap
page read and write
7FFDFB200000
unkown
page readonly
7FF7C1ACA000
unkown
page write copy
There are 643 hidden memdumps, click here to show them.