IOC Report
IGAnbXyZVx.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IGAnbXyZVx.exe
"C:\Users\user\Desktop\IGAnbXyZVx.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
coursedonnyre.shop
malicious
strappystyio.shop
malicious
https://nurserrsjwuwq.shop/api
188.114.96.3
malicious
tearrybyiwo.shop
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
surveriysiop.shop
malicious
nurserrsjwuwq.shop
malicious
tendencerangej.shop
malicious
https://gravvitywio.store/api
104.21.16.12
malicious
captainynfanw.shop
malicious
fossillargeiw.shop
malicious
https://steamcommunity.com/profiles/76561199724331900;
unknown
malicious
appleboltelwk.shop
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://tendencerangej.shop/api
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=w4s3
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=pvBDaFhF2LLJ&l=e
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://gravvitywio.store/
unknown
https://gravvitywio.store/apil
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://fossillargeiw.shop/api
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://appleboltelwk.shop/
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
http://www.certum.pl/CPS0
unknown
https://tendencerangej.shop/ig
unknown
http://cevcsca2021.ocsp-certum.com07
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://appleboltelwk.shop/L
unknown
http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictnot
unknown
https://strappystyio.shop/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://coursedonnyre.shop/api
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=8vRVyaZK
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
http://repository.certum.pl/cevcsca2021.cer0
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://appleboltelwk.shop/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://subca.ocsp-certum.com02
unknown
https://gravvitywio.store/bc
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://www.certum.pl/CPS0
unknown
https://tendencerangej.shop/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://gravvitywio.store/rc
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://strappystyio.shop/api
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
There are 87 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gravvitywio.store
104.21.16.12
malicious
nurserrsjwuwq.shop
188.114.96.3
malicious
fossillargeiw.shop
unknown
malicious
strappystyio.shop
unknown
malicious
coursedonnyre.shop
unknown
malicious
captainynfanw.shop
unknown
malicious
tearrybyiwo.shop
unknown
malicious
surveriysiop.shop
unknown
malicious
appleboltelwk.shop
unknown
malicious
tendencerangej.shop
unknown
malicious
steamcommunity.com
104.102.49.254
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.96.3
nurserrsjwuwq.shop
European Union
malicious
104.21.16.12
gravvitywio.store
United States
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF7FE224000
unkown
page readonly
malicious
C0006DC000
direct allocation
page read and write
malicious
7FF7FE224000
unkown
page readonly
malicious
7FF7FE1C0000
unkown
page readonly
C000243000
direct allocation
page read and write
C000044000
direct allocation
page read and write
7FF7FDC17000
unkown
page write copy
C0001C9000
direct allocation
page read and write
7FF7FDBC0000
unkown
page read and write
28A7E388000
direct allocation
page read and write
7FF7FDBC5000
unkown
page write copy
C0002C5000
direct allocation
page read and write
7FF7FDBC7000
unkown
page read and write
339E000
heap
page read and write
C0000E2000
direct allocation
page read and write
28A7CF3C000
heap
page read and write
C00000E000
direct allocation
page read and write
C0001A7000
direct allocation
page read and write
C00016C000
direct allocation
page read and write
C0002AD000
direct allocation
page read and write
C000580000
direct allocation
page read and write
33B4000
heap
page read and write
7FF7FE1BC000
unkown
page readonly
C00004D000
direct allocation
page read and write
505D000
stack
page read and write
C0002D5000
direct allocation
page read and write
28A7CE65000
heap
page read and write
C0004AD000
direct allocation
page read and write
C000395000
direct allocation
page read and write
C000448000
direct allocation
page read and write
7FF7FD7B1000
unkown
page execute read
7FF7FE1F2000
unkown
page readonly
C000080000
direct allocation
page read and write
C0001F7000
direct allocation
page read and write
7FF7FE1EF000
unkown
page readonly
7FF7FD7B0000
unkown
page readonly
28A7E23F000
direct allocation
page read and write
C000600000
direct allocation
page read and write
7FF7FE1FA000
unkown
page readonly
C00010C000
direct allocation
page read and write
33A3000
heap
page read and write
C000375000
direct allocation
page read and write
4F30000
remote allocation
page read and write
C000178000
direct allocation
page read and write
C000198000
direct allocation
page read and write
C0002E9000
direct allocation
page read and write
3399000
heap
page read and write
7FF7FE1B1000
unkown
page readonly
C0002D9000
direct allocation
page read and write
C3C61FE000
stack
page read and write
C000060000
direct allocation
page read and write
7FF7FDC11000
unkown
page write copy
C0000B8000
direct allocation
page read and write
33B5000
heap
page read and write
562E000
stack
page read and write
C000012000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
7FF7FE1B7000
unkown
page readonly
3430000
heap
page read and write
C000269000
direct allocation
page read and write
7FF7FE20A000
unkown
page readonly
4F30000
remote allocation
page read and write
7FF7FE18D000
unkown
page readonly
C00024D000
direct allocation
page read and write
28A7E2DC000
direct allocation
page read and write
C000100000
direct allocation
page read and write
7FF7FDBCB000
unkown
page write copy
C0002F5000
direct allocation
page read and write
C0004F8000
direct allocation
page read and write
C00046D000
direct allocation
page read and write
3439000
heap
page read and write
7FF7FE52C000
unkown
page write copy
C00016A000
direct allocation
page read and write
C0005BC000
direct allocation
page read and write
7FF7FD7B0000
unkown
page readonly
3415000
heap
page read and write
356F000
stack
page read and write
7FF7FE1E7000
unkown
page readonly
C00038B000
direct allocation
page read and write
C00031B000
direct allocation
page read and write
28A7E2DF000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
7FF7FE213000
unkown
page readonly
C000052000
direct allocation
page read and write
28A7CE30000
heap
page read and write
7FF7FE49A000
unkown
page read and write
C0000D2000
direct allocation
page read and write
7FF7FE1FA000
unkown
page readonly
7FF7FE15D000
unkown
page readonly
7FF7FE540000
unkown
page readonly
4F0D000
stack
page read and write
C00048C000
direct allocation
page read and write
7FF7FE530000
unkown
page write copy
C000385000
direct allocation
page read and write
3140000
heap
page read and write
C0005C4000
direct allocation
page read and write
C000309000
direct allocation
page read and write
7FF7FE1C7000
unkown
page readonly
3101000
remote allocation
page execute and read and write
C0000EA000
direct allocation
page read and write
C0000F6000
direct allocation
page read and write
7FF7FE1E3000
unkown
page readonly
C0005B0000
direct allocation
page read and write
28A7CEF0000
direct allocation
page read and write
28A7E3B0000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
7FF7FE1F6000
unkown
page readonly
7FF7FE19D000
unkown
page readonly
C3C5FFF000
stack
page read and write
3417000
heap
page read and write
C000442000
direct allocation
page read and write
28A7E403000
direct allocation
page read and write
7FF7FE1D2000
unkown
page readonly
7FF7FE527000
unkown
page read and write
C0004A9000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
C000325000
direct allocation
page read and write
7FF7FE1AF000
unkown
page readonly
C0005A6000
direct allocation
page read and write
C000203000
direct allocation
page read and write
7FF7FE1BC000
unkown
page readonly
7FF7FE1D6000
unkown
page readonly
28A7E2D3000
direct allocation
page read and write
C0005AC000
direct allocation
page read and write
7FF7FE52D000
unkown
page write copy
C000156000
direct allocation
page read and write
C0004AB000
direct allocation
page read and write
C0002C3000
direct allocation
page read and write
C000466000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C0001A5000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C000592000
direct allocation
page read and write
C00050B000
direct allocation
page read and write
28A7E23D000
direct allocation
page read and write
7FF7FE15D000
unkown
page readonly
C000042000
direct allocation
page read and write
C0001F5000
direct allocation
page read and write
C0004B5000
direct allocation
page read and write
C0002CD000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C000176000
direct allocation
page read and write
7FF7FDBC8000
unkown
page write copy
7FF7FE540000
unkown
page readonly
C0001CB000
direct allocation
page read and write
7FF7FE1AC000
unkown
page readonly
C000598000
direct allocation
page read and write
31F0000
heap
page read and write
C00058A000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C0002FD000
direct allocation
page read and write
C00043A000
direct allocation
page read and write
7FF7FDBC0000
unkown
page write copy
339E000
heap
page read and write
C0000E0000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
31D0000
heap
page read and write
C00013C000
direct allocation
page read and write
7FF7FE1EB000
unkown
page readonly
C00005C000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C000327000
direct allocation
page read and write
C000370000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
28A7E2C4000
direct allocation
page read and write
28A7E2B0000
direct allocation
page read and write
7FF7FD7B1000
unkown
page execute read
3415000
heap
page read and write
C000285000
direct allocation
page read and write
C0000EC000
direct allocation
page read and write
307C000
stack
page read and write
C00015A000
direct allocation
page read and write
33B4000
heap
page read and write
C000349000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C3C65FE000
stack
page read and write
C00058C000
direct allocation
page read and write
7FF7FDC00000
unkown
page read and write
28A7CF10000
direct allocation
page read and write
332E000
stack
page read and write
28A7CE60000
heap
page read and write
7FF7FE52C000
unkown
page read and write
7FF7FE523000
unkown
page read and write
28A7E230000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C0002CB000
direct allocation
page read and write
C3C67FE000
stack
page read and write
C000530000
direct allocation
page read and write
C00025B000
direct allocation
page read and write
C000058000
direct allocation
page read and write
340D000
heap
page read and write
C000103000
direct allocation
page read and write
7FF7FE4B5000
unkown
page read and write
3411000
heap
page read and write
28A7CE94000
direct allocation
page read and write
7FF7FE1E3000
unkown
page readonly
7FF7FDC14000
unkown
page read and write
C00002D000
direct allocation
page read and write
C0004E4000
direct allocation
page read and write
C000586000
direct allocation
page read and write
C0005A4000
direct allocation
page read and write
C00024B000
direct allocation
page read and write
C00052A000
direct allocation
page read and write
7FF7FE1F2000
unkown
page readonly
C000000000
direct allocation
page read and write
338B000
heap
page read and write
7FF7FDC1C000
unkown
page readonly
C00013A000
direct allocation
page read and write
C0004BC000
direct allocation
page read and write
4F30000
remote allocation
page read and write
C0000DC000
direct allocation
page read and write
28A7CE9C000
direct allocation
page read and write
7FF7FE1DF000
unkown
page readonly
7FF7FE1C0000
unkown
page readonly
C00012A000
direct allocation
page read and write
7FF7FDBFF000
unkown
page write copy
3411000
heap
page read and write
7FF7FE1A9000
unkown
page readonly
C0005BE000
direct allocation
page read and write
28A7CE70000
heap
page read and write
C00028F000
direct allocation
page read and write
C0001E3000
direct allocation
page read and write
C3C63FF000
stack
page read and write
7FF7FE213000
unkown
page readonly
C00006C000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
3415000
heap
page read and write
C000432000
direct allocation
page read and write
C0002B7000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
C0002A3000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C0002D3000
direct allocation
page read and write
7FF7FE20A000
unkown
page readonly
C000064000
direct allocation
page read and write
C000226000
direct allocation
page read and write
C000674000
direct allocation
page read and write
7FF7FE1EF000
unkown
page readonly
C0000A4000
direct allocation
page read and write
28A7E269000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
7FF7FDBCA000
unkown
page read and write
30A0000
remote allocation
page execute and read and write
3417000
heap
page read and write
C000575000
direct allocation
page read and write
C0005C0000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
33AE000
heap
page read and write
C000066000
direct allocation
page read and write
7FF7FE1AC000
unkown
page readonly
C3C69FC000
stack
page read and write
7FF7FDC1A000
unkown
page read and write
28A7E2D9000
direct allocation
page read and write
3370000
heap
page read and write
3417000
heap
page read and write
C00007C000
direct allocation
page read and write
3215000
heap
page read and write
28A7CE98000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
28A7CD50000
heap
page read and write
7FF7FE1CC000
unkown
page readonly
C000014000
direct allocation
page read and write
28A7CE90000
direct allocation
page read and write
C0005A0000
direct allocation
page read and write
C0004EC000
direct allocation
page read and write
7FF7FE1D2000
unkown
page readonly
C000056000
direct allocation
page read and write
C000028000
direct allocation
page read and write
C000400000
direct allocation
page read and write
7FF7FE1C2000
unkown
page readonly
C00002A000
direct allocation
page read and write
C000068000
direct allocation
page read and write
C000480000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
33A3000
heap
page read and write
7FF7FE1C2000
unkown
page readonly
C0004A4000
direct allocation
page read and write
318E000
stack
page read and write
C00030D000
direct allocation
page read and write
C000464000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
7FF7FE530000
unkown
page write copy
C00030B000
direct allocation
page read and write
7FF7FE1B7000
unkown
page readonly
3411000
heap
page read and write
7FF7FE1CC000
unkown
page readonly
C0001D5000
direct allocation
page read and write
53EE000
stack
page read and write
C000359000
direct allocation
page read and write
C0005AA000
direct allocation
page read and write
7FF7FE1E7000
unkown
page readonly
28A7E2CB000
direct allocation
page read and write
C0001EB000
direct allocation
page read and write
C0005CA000
direct allocation
page read and write
C000023000
direct allocation
page read and write
366E000
stack
page read and write
33AD000
heap
page read and write
33B1000
heap
page read and write
C0000DE000
direct allocation
page read and write
C000174000
direct allocation
page read and write
C000084000
direct allocation
page read and write
33B1000
heap
page read and write
3210000
heap
page read and write
7FF7FE20E000
unkown
page readonly
C00005E000
direct allocation
page read and write
7FF7FE188000
unkown
page readonly
C0004FC000
direct allocation
page read and write
28A7E4B0000
direct allocation
page read and write
C0003F8000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
3415000
heap
page read and write
C0005C6000
direct allocation
page read and write
C000138000
direct allocation
page read and write
7FF7FE1DF000
unkown
page readonly
28A7E591000
direct allocation
page read and write
C00049E000
direct allocation
page read and write
C000594000
direct allocation
page read and write
C0004BA000
direct allocation
page read and write
C0002A9000
direct allocation
page read and write
C0004BE000
direct allocation
page read and write
C0001B7000
direct allocation
page read and write
C0002A7000
direct allocation
page read and write
C3C5BFD000
stack
page read and write
C000251000
direct allocation
page read and write
3417000
heap
page read and write
7FF7FE1AF000
unkown
page readonly
33B1000
heap
page read and write
3418000
heap
page read and write
28A7CF00000
direct allocation
page read and write
C00035E000
direct allocation
page read and write
3411000
heap
page read and write
C0000C2000
direct allocation
page read and write
C0004B0000
direct allocation
page read and write
C0004A2000
direct allocation
page read and write
C0004EA000
direct allocation
page read and write
28A7CF39000
heap
page read and write
C000018000
direct allocation
page read and write
3392000
heap
page read and write
7FF7FE1C7000
unkown
page readonly
3378000
heap
page read and write
C0003FC000
direct allocation
page read and write
7FF7FE1F6000
unkown
page readonly
303C000
stack
page read and write
C0001BF000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C000355000
direct allocation
page read and write
C0003D6000
direct allocation
page read and write
C000116000
direct allocation
page read and write
7FF7FE19D000
unkown
page readonly
C0001D3000
direct allocation
page read and write
C0001E9000
direct allocation
page read and write
C00063A000
direct allocation
page read and write
C00047A000
direct allocation
page read and write
7FF7FE1B1000
unkown
page readonly
C000166000
direct allocation
page read and write
28A7E470000
direct allocation
page read and write
C00026D000
direct allocation
page read and write
C000ACC000
direct allocation
page read and write
C00030F000
direct allocation
page read and write
C000016000
direct allocation
page read and write
28A7E4D0000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
336D000
stack
page read and write
C000152000
direct allocation
page read and write
C000800000
direct allocation
page read and write
7FF7FE1EB000
unkown
page readonly
C000323000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C000062000
direct allocation
page read and write
7FF7FE188000
unkown
page readonly
28A7E266000
direct allocation
page read and write
C3C5DFF000
stack
page read and write
C000434000
direct allocation
page read and write
552D000
stack
page read and write
28A7E530000
direct allocation
page read and write
7FF7FE20E000
unkown
page readonly
C000132000
direct allocation
page read and write
C0001F1000
direct allocation
page read and write
4F50000
heap
page read and write
C000004000
direct allocation
page read and write
C000241000
direct allocation
page read and write
7FF7FDC1C000
unkown
page readonly
28A7E262000
direct allocation
page read and write
C000402000
direct allocation
page read and write
33B6000
heap
page read and write
28A7CF30000
heap
page read and write
33B4000
heap
page read and write
C000184000
direct allocation
page read and write
C0005A2000
direct allocation
page read and write
340E000
heap
page read and write
C00042C000
direct allocation
page read and write
31CE000
stack
page read and write
C000010000
direct allocation
page read and write
C0003FA000
direct allocation
page read and write
C000188000
direct allocation
page read and write
7FF7FE18D000
unkown
page readonly
C000351000
direct allocation
page read and write
C0004A7000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
54EF000
stack
page read and write
C0002EB000
direct allocation
page read and write
C000333000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C000002000
direct allocation
page read and write
3427000
heap
page read and write
3397000
heap
page read and write
7FF7FE1D6000
unkown
page readonly
7FF7FE1A9000
unkown
page readonly
7FF7FDBFD000
unkown
page read and write
C0000C0000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
341B000
heap
page read and write
There are 406 hidden memdumps, click here to show them.