IOC Report
EKAHephXb2.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EKAHephXb2.exe
"C:\Users\user\Desktop\EKAHephXb2.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
reggwardssdqw.shop
malicious
licenseodqwmqn.shop
malicious
relaxatinownio.shop
malicious
keennylrwmqlw.shop
malicious
tendencctywop.shop
malicious
https://gravvitywio.store/api
104.21.16.12
malicious
https://steamcommunity.com/profiles/76561199724331900p
unknown
malicious
tryyudjasudqo.shop
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
tesecuuweqo.shop
malicious
eemmbryequo.shop
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=8vRVyaZK
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
http://repository.certum.pl/cevcsca2021.cer0
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=w4s3
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=pvBDaFhF2LLJ&l=e
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://gravvitywio.store/
unknown
http://www.opengis.net/gml
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
http://www.collada.org/2005/11/COLLADASchema
unknown
http://www.topografix.com/GPX/1/1
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://subca.ocsp-certum.com02
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
http://www.opengis.net/gml/3.2
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://gravvitywio.store/apib
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://www.certum.pl/CPS0
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://cevcsca2021.ocsp-certum.com07
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://store.steampowered.com/
unknown
http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://www.certum.pl/CPS0
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
http://earth.google.com/kml/2.2
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
http://earth.google.com/kml/2.0
unknown
http://earth.google.com/kml/2.1
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
http://www.opengis.net/kml/2.2
unknown
https://store.steampowered.com/mobile
unknown
http://www.opengis.net/gml/3.3/exr
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictCount
unknown
https://store.steampowered.com/about/
unknown
There are 84 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gravvitywio.store
104.21.16.12
malicious
tryyudjasudqo.shop
unknown
malicious
keennylrwmqlw.shop
unknown
malicious
reggwardssdqw.shop
unknown
malicious
tesecuuweqo.shop
unknown
malicious
tendencctywop.shop
unknown
malicious
eemmbryequo.shop
unknown
malicious
licenseodqwmqn.shop
unknown
malicious
relaxatinownio.shop
unknown
malicious
steamcommunity.com
104.102.49.254

IPs

IP
Domain
Country
Malicious
104.21.16.12
gravvitywio.store
United States
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
C000830000
direct allocation
page read and write
malicious
145E3200000
direct allocation
page read and write
malicious
7FF6CD034000
unkown
page readonly
malicious
410000
remote allocation
page execute and read and write
malicious
145E31A0000
direct allocation
page read and write
malicious
7FF6CD034000
unkown
page readonly
malicious
C0009F8000
direct allocation
page read and write
malicious
C000930000
direct allocation
page read and write
malicious
592000
heap
page read and write
C000090000
direct allocation
page read and write
145BDCC0000
direct allocation
page read and write
7FF6CCF9A000
unkown
page readonly
C000532000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C0004C8000
direct allocation
page read and write
C0002E5000
direct allocation
page read and write
C00024F000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
7FF6CCFB6000
unkown
page readonly
5B1000
heap
page read and write
7FF6CD003000
unkown
page readonly
7FF6CCF90000
unkown
page readonly
C00045E000
direct allocation
page read and write
C000546000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C000050000
direct allocation
page read and write
7FF6CD3C8000
unkown
page write copy
635000
heap
page read and write
62B000
heap
page read and write
C00005D000
direct allocation
page read and write
530000
heap
page read and write
C000057000
direct allocation
page read and write
C000024000
direct allocation
page read and write
145BDD50000
heap
page read and write
C000046000
direct allocation
page read and write
7FF6CCFC7000
unkown
page readonly
C00015C000
direct allocation
page read and write
C0005A4000
direct allocation
page read and write
C000A4E000
direct allocation
page read and write
7FF6CCFC1000
unkown
page readonly
C0004C4000
direct allocation
page read and write
145BDD55000
heap
page read and write
C000375000
direct allocation
page read and write
C000800000
direct allocation
page read and write
5CA000
heap
page read and write
7FF6CC9E9000
unkown
page write copy
C00010C000
direct allocation
page read and write
2C6AFFE000
stack
page read and write
C00001E000
direct allocation
page read and write
C0007AA000
direct allocation
page read and write
C000381000
direct allocation
page read and write
145BD930000
heap
page read and write
2C6B3FE000
stack
page read and write
C0002FB000
direct allocation
page read and write
145BDA10000
heap
page read and write
7FF6CC995000
unkown
page write copy
C00059E000
direct allocation
page read and write
145BDB68000
direct allocation
page read and write
7FF6CCFE2000
unkown
page readonly
C0002FD000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
7FF6CD3CB000
unkown
page readonly
C0001A8000
direct allocation
page read and write
C0007BA000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C000022000
direct allocation
page read and write
7FF6CD01A000
unkown
page readonly
145BDA68000
heap
page read and write
C0000D2000
direct allocation
page read and write
C0001F7000
direct allocation
page read and write
5CA000
heap
page read and write
5B4000
heap
page read and write
625000
heap
page read and write
7FF6CC511000
unkown
page execute read
C000120000
direct allocation
page read and write
C000548000
direct allocation
page read and write
C0002E3000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C000526000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C000528000
direct allocation
page read and write
7FF6CCF67000
unkown
page readonly
7FF6CCFEF000
unkown
page readonly
52E000
stack
page read and write
42D0000
remote allocation
page read and write
C00001A000
direct allocation
page read and write
C0005FC000
direct allocation
page read and write
C000062000
direct allocation
page read and write
299E000
stack
page read and write
C0000BA000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C000004000
direct allocation
page read and write
7FF6CCFDC000
unkown
page readonly
C000196000
direct allocation
page read and write
46A000
remote allocation
page execute and read and write
C000305000
direct allocation
page read and write
C000598000
direct allocation
page read and write
C0005C8000
direct allocation
page read and write
C000059000
direct allocation
page read and write
C0005B0000
direct allocation
page read and write
C0002B9000
direct allocation
page read and write
C0007DA000
direct allocation
page read and write
C000530000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
7FF6CCFDC000
unkown
page readonly
C000168000
direct allocation
page read and write
7FF6CCFD0000
unkown
page readonly
5CF000
heap
page read and write
C0000A8000
direct allocation
page read and write
7FF6CC9F0000
unkown
page write copy
C0000B4000
direct allocation
page read and write
5B4000
heap
page read and write
C00034D000
direct allocation
page read and write
C0005B4000
direct allocation
page read and write
C000618000
direct allocation
page read and write
C000480000
direct allocation
page read and write
C000253000
direct allocation
page read and write
840000
heap
page read and write
7FF6CC997000
unkown
page write copy
C00072E000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
7FF6CD01A000
unkown
page readonly
7FF6CD00A000
unkown
page readonly
C000624000
direct allocation
page read and write
7FF6CC510000
unkown
page readonly
145BDD20000
direct allocation
page read and write
C000313000
direct allocation
page read and write
145BDCE0000
direct allocation
page read and write
145E2EBC000
direct allocation
page read and write
7FF6CCFD7000
unkown
page readonly
C000281000
direct allocation
page read and write
C000031000
direct allocation
page read and write
2C6B9FE000
stack
page read and write
58B000
heap
page read and write
C0005FE000
direct allocation
page read and write
417D000
stack
page read and write
7FF6CD38A000
unkown
page read and write
C00079A000
direct allocation
page read and write
C000180000
direct allocation
page read and write
7FF6CCF95000
unkown
page readonly
C0001C2000
direct allocation
page read and write
C000277000
direct allocation
page read and write
7FF6CCFCC000
unkown
page readonly
7FF6CCF9A000
unkown
page readonly
540000
heap
page read and write
145E2EB4000
direct allocation
page read and write
C00034F000
direct allocation
page read and write
63E000
heap
page read and write
C000400000
direct allocation
page read and write
C000036000
direct allocation
page read and write
597000
heap
page read and write
2C6A9FC000
stack
page read and write
C000066000
direct allocation
page read and write
59D000
heap
page read and write
C000068000
direct allocation
page read and write
5C3000
heap
page read and write
C000886000
direct allocation
page read and write
7FF6CCF67000
unkown
page readonly
7FF6CD397000
unkown
page write copy
2C6B5FE000
stack
page read and write
C000542000
direct allocation
page read and write
7FF6CD006000
unkown
page readonly
7FF6CD006000
unkown
page readonly
C0001EB000
direct allocation
page read and write
C00052E000
direct allocation
page read and write
C000020000
direct allocation
page read and write
545000
heap
page read and write
C00024B000
direct allocation
page read and write
7FF6CD31B000
unkown
page read and write
C0000F0000
direct allocation
page read and write
C000474000
direct allocation
page read and write
598000
heap
page read and write
C0004B2000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
C0001D3000
direct allocation
page read and write
C0000F8000
direct allocation
page read and write
C00078A000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C0005BE000
direct allocation
page read and write
2C6B7FF000
stack
page read and write
C00013A000
direct allocation
page read and write
C0005F4000
direct allocation
page read and write
C00047A000
direct allocation
page read and write
C00058C000
direct allocation
page read and write
C000147000
direct allocation
page read and write
145E31FA000
direct allocation
page read and write
C00060E000
direct allocation
page read and write
C000556000
direct allocation
page read and write
C000432000
direct allocation
page read and write
145E3200000
direct allocation
page read and write
488E000
stack
page read and write
145BDD30000
direct allocation
page read and write
7FF6CD2FF000
unkown
page read and write
7FF6CCFCC000
unkown
page readonly
7FF6CD3C8000
unkown
page write copy
C00002C000
direct allocation
page read and write
440D000
stack
page read and write
7FF6CCFBC000
unkown
page readonly
C000293000
direct allocation
page read and write
C00033D000
direct allocation
page read and write
7FF6CCFF7000
unkown
page readonly
5CF000
heap
page read and write
7FF6CCF95000
unkown
page readonly
C000097000
direct allocation
page read and write
C0003BB000
direct allocation
page read and write
5E0000
heap
page read and write
C000118000
direct allocation
page read and write
145E2ECA000
direct allocation
page read and write
42D0000
remote allocation
page read and write
7FF6CCFEF000
unkown
page readonly
C000333000
direct allocation
page read and write
7FF6CCFC7000
unkown
page readonly
7FF6CD399000
unkown
page write copy
C00025B000
direct allocation
page read and write
C000596000
direct allocation
page read and write
2C6ADFF000
stack
page read and write
C000301000
direct allocation
page read and write
C000580000
direct allocation
page read and write
145E2F21000
direct allocation
page read and write
7FF6CCFFF000
unkown
page readonly
C0002D9000
direct allocation
page read and write
C0001E7000
direct allocation
page read and write
7FF6CCF90000
unkown
page readonly
C00077A000
direct allocation
page read and write
C0001F5000
direct allocation
page read and write
7FF6CCFE2000
unkown
page readonly
7FF6CCFD0000
unkown
page readonly
C0000D8000
direct allocation
page read and write
145E2F80000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
625000
heap
page read and write
C00026F000
direct allocation
page read and write
C0005A2000
direct allocation
page read and write
C000365000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C0002EF000
direct allocation
page read and write
7FF6CD394000
unkown
page write copy
7FF6CCFE6000
unkown
page readonly
7FF6CCFE6000
unkown
page readonly
C00044C000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
C0005B6000
direct allocation
page read and write
48DE000
stack
page read and write
C000389000
direct allocation
page read and write
C000070000
direct allocation
page read and write
C000540000
direct allocation
page read and write
145E2EC2000
direct allocation
page read and write
C000602000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C000145000
direct allocation
page read and write
C000006000
direct allocation
page read and write
7FF6CC99A000
unkown
page read and write
478D000
stack
page read and write
7FF6CC99B000
unkown
page write copy
C0004B0000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C00059A000
direct allocation
page read and write
C000351000
direct allocation
page read and write
1DC000
stack
page read and write
7FF6CD023000
unkown
page readonly
C0004AE000
direct allocation
page read and write
C000586000
direct allocation
page read and write
C000265000
direct allocation
page read and write
145E2F24000
direct allocation
page read and write
7FF6CC9D3000
unkown
page read and write
C000142000
direct allocation
page read and write
C00008D000
direct allocation
page read and write
C000470000
direct allocation
page read and write
C0005C4000
direct allocation
page read and write
7FF6CCFFB000
unkown
page readonly
C00016A000
direct allocation
page read and write
C00050B000
direct allocation
page read and write
4300000
heap
page read and write
C0002CF000
direct allocation
page read and write
C000335000
direct allocation
page read and write
4EE000
stack
page read and write
145BDA30000
heap
page read and write
C0005A8000
direct allocation
page read and write
7FF6CD38E000
unkown
page read and write
C000156000
direct allocation
page read and write
C0005A0000
direct allocation
page read and write
7FF6CD393000
unkown
page write copy
C00007E000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
C00048A000
direct allocation
page read and write
5CA000
heap
page read and write
C00053C000
direct allocation
page read and write
7FF6CD023000
unkown
page readonly
7FF6CCFFF000
unkown
page readonly
145E2EA0000
direct allocation
page read and write
C000154000
direct allocation
page read and write
C0005AC000
direct allocation
page read and write
C000026000
direct allocation
page read and write
C000271000
direct allocation
page read and write
2C6B1FE000
stack
page read and write
C00033B000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
4A0000
heap
page read and write
570000
heap
page read and write
7FF6CD393000
unkown
page read and write
C0000FE000
direct allocation
page read and write
C00037D000
direct allocation
page read and write
7FF6CCFD2000
unkown
page readonly
7FF6CD397000
unkown
page write copy
C00046A000
direct allocation
page read and write
C00031F000
direct allocation
page read and write
C000600000
direct allocation
page read and write
C0004B8000
direct allocation
page read and write
C00054E000
direct allocation
page read and write
C00017C000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
145BDA60000
heap
page read and write
7FF6CCFFB000
unkown
page readonly
7FF6CC9F5000
unkown
page readonly
7FF6CD003000
unkown
page readonly
5B1000
heap
page read and write
5C4000
heap
page read and write
145E2E74000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
7FF6CD00A000
unkown
page readonly
C000478000
direct allocation
page read and write
C000482000
direct allocation
page read and write
C0005BC000
direct allocation
page read and write
42BE000
stack
page read and write
7FF6CCFAD000
unkown
page readonly
7FF6CC511000
unkown
page execute read
C00009C000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C0001D5000
direct allocation
page read and write
C000428000
direct allocation
page read and write
C000038000
direct allocation
page read and write
7FF6CC510000
unkown
page readonly
C0004A4000
direct allocation
page read and write
145E2F68000
direct allocation
page read and write
C00049E000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C000287000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
C0004C6000
direct allocation
page read and write
C000612000
direct allocation
page read and write
C000028000
direct allocation
page read and write
145E3240000
direct allocation
page read and write
C0007CA000
direct allocation
page read and write
C000170000
direct allocation
page read and write
5CF000
heap
page read and write
C00008B000
direct allocation
page read and write
C00015A000
direct allocation
page read and write
83F000
stack
page read and write
C0001A6000
direct allocation
page read and write
C0002B1000
direct allocation
page read and write
7FF6CCFBC000
unkown
page readonly
7FF6CD399000
unkown
page write copy
C00046E000
direct allocation
page read and write
7FF6CC996000
unkown
page read and write
7FF6CC98F000
unkown
page write copy
7FF6CD3CB000
unkown
page readonly
42D0000
remote allocation
page read and write
C0000C2000
direct allocation
page read and write
7FF6CC98F000
unkown
page read and write
C00044E000
direct allocation
page read and write
C000094000
direct allocation
page read and write
427D000
stack
page read and write
5E0000
heap
page read and write
7FF6CCFF7000
unkown
page readonly
C0007D8000
direct allocation
page read and write
C000089000
direct allocation
page read and write
2C6ABFF000
stack
page read and write
7FF6CCFE0000
unkown
page readonly
49DF000
stack
page read and write
C0000E0000
direct allocation
page read and write
C000536000
direct allocation
page read and write
C000644000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000498000
direct allocation
page read and write
7FF6CC9EC000
unkown
page read and write
C000430000
direct allocation
page read and write
C0002F7000
direct allocation
page read and write
7FF6CCFC1000
unkown
page readonly
C00004D000
direct allocation
page read and write
7FF6CCFD2000
unkown
page readonly
7FF6CCFAD000
unkown
page readonly
7FF6CC9F5000
unkown
page readonly
145BDB6C000
direct allocation
page read and write
5E0000
heap
page read and write
7FF6CCFD7000
unkown
page readonly
C00024D000
direct allocation
page read and write
7FF6CC9F3000
unkown
page read and write
145BDB64000
direct allocation
page read and write
578000
heap
page read and write
C0007DA000
direct allocation
page read and write
145BDB60000
direct allocation
page read and write
C000490000
direct allocation
page read and write
C00027F000
direct allocation
page read and write
C000285000
direct allocation
page read and write
7FF6CCFE0000
unkown
page readonly
C000387000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
C00025D000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
C0005A6000
direct allocation
page read and write
7FF6CCFB6000
unkown
page readonly
19C000
stack
page read and write
C0001A2000
direct allocation
page read and write
59D000
heap
page read and write
C000076000
direct allocation
page read and write
There are 403 hidden memdumps, click here to show them.