IOC Report
oneDrive.exe

loading gif

Files

File Path
Type
Category
Malicious
oneDrive.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI75162\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
modified
C:\Users\user\AppData\Local\Temp\_MEI75162\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75162\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oneDrive.exe
"C:\Users\user\Desktop\oneDrive.exe"
malicious
C:\Users\user\Desktop\oneDrive.exe
"C:\Users\user\Desktop\oneDrive.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "del C:\Windows\Help\en-us\*.rar"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "hostname"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\ProgramData\Microsoft\Rar.exe a -r -v1m -n@C:\Windows\media\check.wav -ta20240929000000 -hpN@991li#S!@# C:\Windows\Help\en-us\87072c.rar C:\users\*.*"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "hostname"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\ProgramData\Microsoft\Rar.exe a -r -v1m -n@C:\Windows\media\check.wav -ta20240929000000 -hpN@991li#S!@# C:\Windows\Help\en-us\87072D.rar D:\\*.*"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\HOSTNAME.EXE
hostname
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\HOSTNAME.EXE
hostname
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://pixeldrain.com/api/file
unknown
https://mahler:8092/site-updates.py
unknown
http://www.robotstxt.org/norobots-rfc.txt
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://www.python.org/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.openssl.org/H
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
https://www.python.org/dev/peps/pep-0205/
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
http://crl3.digi
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
There are 7 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A616EFF000
unkown
page read and write
2E2B7AC0000
heap
page read and write
2365D730000
heap
page read and write
2090D183000
heap
page read and write
2365F9D9000
heap
page read and write
2365D738000
heap
page read and write
2365F911000
heap
page read and write
28DD6F18000
heap
page read and write
2A2DEC60000
heap
page read and write
7FFB23B22000
unkown
page readonly
2365D78A000
heap
page read and write
2090D17E000
heap
page read and write
2365F91A000
heap
page read and write
FF315FF000
unkown
page read and write
7FF6869C1000
unkown
page execute read
26E823B0000
heap
page read and write
2365D799000
heap
page read and write
2365D7CA000
heap
page read and write
2365F952000
heap
page read and write
1E3D4A90000
heap
page read and write
21C1A4A0000
heap
page read and write
2365FB10000
heap
page read and write
7FF6869EA000
unkown
page readonly
2365D773000
heap
page read and write
2365D7ED000
heap
page read and write
7FF686A0E000
unkown
page readonly
2365FD44000
direct allocation
page read and write
2365D7E9000
heap
page read and write
19EEBA4D000
heap
page read and write
2365D781000
heap
page read and write
2365FB67000
heap
page read and write
19444321000
heap
page read and write
B6C05EC000
stack
page read and write
2365F93D000
heap
page read and write
2365F9D3000
heap
page read and write
2365F911000
heap
page read and write
2365D730000
heap
page read and write
2365D7CC000
heap
page read and write
2365D7A3000
heap
page read and write
7FFB0C1F7000
unkown
page execute and read and write
2365D799000
heap
page read and write
B6C05EA000
stack
page read and write
1944430A000
heap
page read and write
2365D783000
heap
page read and write
2365FB5C000
heap
page read and write
2365D772000
heap
page read and write
7FF6869C1000
unkown
page execute read
1E3D4AA0000
heap
page read and write
2365FA9C000
direct allocation
page read and write
2365D7A3000
heap
page read and write
26E8239A000
heap
page read and write
2365FD18000
direct allocation
page read and write
7FFB23B00000
unkown
page readonly
2365F971000
heap
page read and write
2365D78E000
heap
page read and write
2A2DEE90000
heap
page read and write
2365D77A000
heap
page read and write
1A75C590000
heap
page read and write
F7CA88B000
stack
page read and write
21C1A450000
heap
page read and write
7FFB0C237000
unkown
page read and write
2AE704C5000
heap
page read and write
7FFB24BD1000
unkown
page execute read
2365FA02000
heap
page read and write
F7CA98F000
stack
page read and write
2AE70119000
heap
page read and write
28DD6F1C000
heap
page read and write
2365FA7C000
direct allocation
page read and write
E7C01DC000
stack
page read and write
EFF518C000
stack
page read and write
2365F9D9000
heap
page read and write
2365F91A000
heap
page read and write
2365F943000
heap
page read and write
28DD6F1E000
heap
page read and write
2365D7EE000
heap
page read and write
2365F934000
heap
page read and write
2365F9EF000
heap
page read and write
5A3AFFF000
unkown
page read and write
2365F578000
direct allocation
page read and write
28DD6ED0000
heap
page read and write
2090D185000
heap
page read and write
2365FDA0000
direct allocation
page read and write
2090D17E000
heap
page read and write
26E823BB000
heap
page read and write
234D11F0000
heap
page read and write
12F3FDC000
stack
page read and write
2090D185000
heap
page read and write
2365D781000
heap
page read and write
EFF55FF000
stack
page read and write
2090D183000
heap
page read and write
26E823B3000
heap
page read and write
2090D183000
heap
page read and write
2365F928000
heap
page read and write
2365D797000
heap
page read and write
7FFB23B01000
unkown
page execute read
28DD70A0000
heap
page read and write
A616B3D000
stack
page read and write
2E2B7D60000
heap
page read and write
2090EB40000
heap
page read and write
2365D766000
heap
page read and write
2365D7DC000
heap
page read and write
234D10B0000
heap
page read and write
7FF686A0E000
unkown
page readonly
2365D785000
heap
page read and write
26E823BB000
heap
page read and write
7FF6869C1000
unkown
page execute read
12F42FF000
unkown
page read and write
2365D7CA000
heap
page read and write
2365D773000
heap
page read and write
2365D7CA000
heap
page read and write
2090D183000
heap
page read and write
2365FB4A000
heap
page read and write
F7CAC7E000
stack
page read and write
2365F91B000
heap
page read and write
2365F9E9000
heap
page read and write
234D11F5000
heap
page read and write
A616FFF000
stack
page read and write
7FFB0C204000
unkown
page execute and read and write
2365D7CC000
heap
page read and write
2365F94A000
heap
page read and write
1E3D4D95000
heap
page read and write
26E823AE000
heap
page read and write
2365F91A000
heap
page read and write
A6A0AFF000
stack
page read and write
2365F5A4000
direct allocation
page read and write
2365FB50000
heap
page read and write
2365D797000
heap
page read and write
F05839E000
stack
page read and write
2090D350000
heap
page read and write
2365F9C9000
heap
page read and write
28DD6F29000
heap
page read and write
2365D768000
heap
page read and write
2A2DEC70000
heap
page read and write
1A75C5A0000
heap
page read and write
2365D781000
heap
page read and write
2365D791000
heap
page read and write
BBC277F000
stack
page read and write
19EEBC30000
heap
page read and write
1A75C5C0000
heap
page read and write
7FFB24BE1000
unkown
page readonly
2365FDB4000
direct allocation
page read and write
2365D773000
heap
page read and write
62DA0FF000
stack
page read and write
28DD6F0A000
heap
page read and write
2365FB66000
heap
page read and write
1A75C631000
heap
page read and write
28DD6F1C000
heap
page read and write
2090D183000
heap
page read and write
7FF686A00000
unkown
page read and write
2365FB39000
heap
page read and write
7FFB24BD0000
unkown
page readonly
2365D7A3000
heap
page read and write
2365F9C9000
heap
page read and write
2365FDA8000
direct allocation
page read and write
7FF6869EA000
unkown
page readonly
19EEBA10000
heap
page read and write
7FF6869C0000
unkown
page readonly
2365F9C1000
heap
page read and write
7FFB23B00000
unkown
page readonly
28DD6ED8000
heap
page read and write
7FF6869FD000
unkown
page read and write
7FFB0BDE0000
unkown
page readonly
2365F915000
heap
page read and write
28DD6EFB000
heap
page read and write
2365F932000
heap
page read and write
2365D75F000
heap
page read and write
2365D762000
heap
page read and write
2365D79F000
heap
page read and write
2365F558000
direct allocation
page read and write
7FFB23B16000
unkown
page readonly
28DD6F0A000
heap
page read and write
2365F935000
heap
page read and write
2365D751000
heap
page read and write
2365D7D3000
heap
page read and write
21C1A480000
heap
page read and write
2365D785000
heap
page read and write
7FFB23B25000
unkown
page readonly
E01D7DF000
stack
page read and write
2365F9D3000
heap
page read and write
2365F943000
heap
page read and write
2365D6F0000
heap
page read and write
2365D7ED000
heap
page read and write
2A2DECCB000
heap
page read and write
28DD6F21000
heap
page read and write
5A3B0FF000
stack
page read and write
194442B0000
heap
page read and write
234D0F80000
heap
page read and write
2365FD74000
direct allocation
page read and write
2365FB50000
heap
page read and write
2AE70110000
heap
page read and write
28DD6F00000
heap
page read and write
28DD6F29000
heap
page read and write
2365FB11000
heap
page read and write
28DD6EF5000
heap
page read and write
2365F941000
heap
page read and write
2090D340000
heap
page readonly
2365FB66000
heap
page read and write
7FF686A0C000
unkown
page read and write
21C1A650000
heap
page read and write
2365FB66000
heap
page read and write
2365D768000
heap
page read and write
2365F9DD000
heap
page read and write
E7C04FF000
stack
page read and write
2365D772000
heap
page read and write
28DD6F00000
heap
page read and write
2365F93E000
heap
page read and write
2365F9F8000
heap
page read and write
21C1A4A0000
heap
page read and write
2365F942000
heap
page read and write
2365FB39000
heap
page read and write
7FFB0C1FA000
unkown
page execute and read and write
2365D70D000
heap
page read and write
2365FA02000
heap
page read and write
28DD7260000
heap
page read and write
2E2B79C0000
heap
page read and write
2365D7EB000
heap
page read and write
7FFB0C10D000
unkown
page execute and read and write
F7CAD7F000
stack
page read and write
2A2DECE0000
heap
page read and write
7FF6869FD000
unkown
page write copy
2365F184000
heap
page read and write
2365F9C9000
heap
page read and write
2365F9DA000
heap
page read and write
2365F929000
heap
page read and write
B6C09CE000
stack
page read and write
2365D781000
heap
page read and write
19EEBA40000
heap
page read and write
21C1A6C5000
heap
page read and write
2365D7A3000
heap
page read and write
2365F911000
heap
page read and write
26E82399000
heap
page read and write
28DD6F1C000
heap
page read and write
26E82320000
heap
page read and write
7FFB23B16000
unkown
page readonly
2365D7DA000
heap
page read and write
2365D7E5000
heap
page read and write
2A2DEC90000
heap
page read and write
7FFB23B20000
unkown
page read and write
2365F9B9000
heap
page read and write
A6A09FF000
unkown
page read and write
2090D183000
heap
page read and write
28DD6EC0000
heap
page read and write
2365D77E000
heap
page read and write
2AE700B0000
heap
page read and write
1E3D4D90000
heap
page read and write
26E823BC000
heap
page read and write
2365D7C9000
heap
page read and write
2365FB20000
heap
page read and write
2365F9EF000
heap
page read and write
26E823AE000
heap
page read and write
2090D183000
heap
page read and write
26E8238D000
heap
page read and write
19EEBA60000
heap
page read and write
7FFB0C0A6000
unkown
page execute and read and write
7FFB0C1BA000
unkown
page execute and read and write
26E82625000
heap
page read and write
2365F9B9000
heap
page read and write
2365F9F0000
heap
page read and write
2365F180000
heap
page read and write
7FF6869C0000
unkown
page readonly
2365D739000
heap
page read and write
2365F9F0000
heap
page read and write
2365FB27000
heap
page read and write
26E82620000
heap
page read and write
7FF6869C0000
unkown
page readonly
2365D7EC000
heap
page read and write
2AE700C0000
heap
page read and write
19444290000
heap
page read and write
2365FB11000
heap
page read and write
7FFB24BE7000
unkown
page readonly
12F43FF000
stack
page read and write
B6C0BBF000
stack
page read and write
2E2B79E0000
heap
page read and write
26E82367000
heap
page read and write
28DD6F07000
heap
page read and write
2365F929000
heap
page read and write
2365F91B000
heap
page read and write
2090EB30000
heap
page read and write
F05867F000
stack
page read and write
2365F942000
heap
page read and write
7FF6869FD000
unkown
page read and write
7FFB0BDE1000
unkown
page execute and read and write
2090D169000
heap
page read and write
F7CA90F000
stack
page read and write
2365F935000
heap
page read and write
2365F9EF000
heap
page read and write
2365D7CA000
heap
page read and write
1E3D4ACA000
heap
page read and write
28DD70C0000
heap
page read and write
2365D772000
heap
page read and write
2365FDAC000
direct allocation
page read and write
2365F934000
heap
page read and write
7FF6869C0000
unkown
page readonly
BBC267C000
stack
page read and write
2365F6C4000
direct allocation
page read and write
2365FD84000
direct allocation
page read and write
2A2DF000000
heap
page read and write
2365F910000
heap
page read and write
2090D183000
heap
page read and write
B6C07DE000
stack
page read and write
2365FD8C000
direct allocation
page read and write
2365D760000
heap
page read and write
7FFB0C1B7000
unkown
page execute and read and write
2365F93D000
heap
page read and write
2365F924000
heap
page read and write
7FFB23B22000
unkown
page readonly
2365F51C000
direct allocation
page read and write
2365D786000
heap
page read and write
2365D772000
heap
page read and write
7FF686A0C000
unkown
page read and write
F0586FF000
stack
page read and write
2365F9DF000
heap
page read and write
2365F080000
heap
page read and write
21C1A4A0000
heap
page read and write
2365D77E000
heap
page read and write
E7C047F000
stack
page read and write
2365D787000
heap
page read and write
7FF6869C1000
unkown
page execute read
EFF54FE000
unkown
page read and write
2365D772000
heap
page read and write
2365FDB0000
direct allocation
page read and write
26E82387000
heap
page read and write
2365F960000
heap
page read and write
2365D7E0000
heap
page read and write
28DD6F17000
heap
page read and write
2365FB26000
heap
page read and write
1E3D4AC0000
heap
page read and write
F05877E000
stack
page read and write
2365F4D0000
direct allocation
page read and write
2365FB3A000
heap
page read and write
234D0EA0000
heap
page read and write
2365D7DA000
heap
page read and write
62D9FFE000
unkown
page read and write
A6A08FB000
stack
page read and write
2365D765000
heap
page read and write
2365D7EE000
heap
page read and write
1E3D4DA0000
heap
page read and write
2090D160000
heap
page read and write
28DD6EF5000
heap
page read and write
2365D7EE000
heap
page read and write
E01D5EC000
stack
page read and write
26E82360000
heap
page read and write
26E823AE000
heap
page read and write
2365D76B000
heap
page read and write
21C1A4A0000
heap
page read and write
28DD6F29000
heap
page read and write
2365FD10000
direct allocation
page read and write
2365D733000
heap
page read and write
2365FB74000
heap
page read and write
E01D9CF000
stack
page read and write
2365D785000
heap
page read and write
2365D750000
heap
page read and write
2090D190000
heap
page read and write
2365FB62000
heap
page read and write
2365F940000
heap
page read and write
28DD6F05000
heap
page read and write
2365D768000
heap
page read and write
7FFB23B20000
unkown
page read and write
7FF6869EA000
unkown
page readonly
26E82330000
heap
page read and write
2365F6A8000
direct allocation
page read and write
2365FAA8000
direct allocation
page read and write
2365FB25000
heap
page read and write
2365F94E000
heap
page read and write
194444D0000
heap
page read and write
2365F919000
heap
page read and write
2365F9D3000
heap
page read and write
21C1A6D0000
heap
page read and write
2365F9D9000
heap
page read and write
2090D183000
heap
page read and write
1A75C920000
heap
page read and write
19EEBA00000
heap
page read and write
2365FB20000
heap
page read and write
2365F9D3000
heap
page read and write
2365FD98000
direct allocation
page read and write
E01D5E1000
stack
page read and write
2365D79F000
heap
page read and write
2365F93E000
heap
page read and write
2365F9D9000
heap
page read and write
2365F9C9000
heap
page read and write
19EEBDD0000
heap
page read and write
2365F9CD000
heap
page read and write
2365FAC8000
direct allocation
page read and write
2365FD94000
direct allocation
page read and write
2365F574000
direct allocation
page read and write
2090D183000
heap
page read and write
2090D17E000
heap
page read and write
2090D183000
heap
page read and write
1A75C61D000
heap
page read and write
234D0FB0000
heap
page read and write
7FFB23B25000
unkown
page readonly
7FFB24BE6000
unkown
page read and write
2365F95F000
heap
page read and write
26E823BB000
heap
page read and write
28DD6F29000
heap
page read and write
2A2DECCD000
heap
page read and write
F7CACFE000
stack
page read and write
2365D799000
heap
page read and write
1A75C7E0000
heap
page read and write
26E82530000
heap
page read and write
2365D79B000
heap
page read and write
F05831E000
stack
page read and write
2365FB6A000
heap
page read and write
21C1A48A000
heap
page read and write
2365FB39000
heap
page read and write
2365F9EF000
heap
page read and write
28DD6F0A000
heap
page read and write
B6C05E3000
stack
page read and write
2090D190000
heap
page read and write
7FF686A0E000
unkown
page readonly
28DD7265000
heap
page read and write
2365D7E8000
heap
page read and write
2365F5D0000
direct allocation
page read and write
2AE704C0000
heap
page read and write
2365D7A3000
heap
page read and write
2365D8C0000
heap
page read and write
FF314FD000
stack
page read and write
2E2B7BC0000
heap
page read and write
2365FDA4000
direct allocation
page read and write
2365D717000
heap
page read and write
2365D780000
heap
page read and write
2E2B7D65000
heap
page read and write
2365D791000
heap
page read and write
2365FA10000
direct allocation
page read and write
21C1A6C0000
heap
page read and write
7FFB0C0E8000
unkown
page execute and read and write
2365FD9C000
direct allocation
page read and write
19444270000
heap
page read and write
2365D733000
heap
page read and write
21C1A460000
heap
page read and write
2365D7DA000
heap
page read and write
234D0FB9000
heap
page read and write
2090D260000
heap
page read and write
2365D6D0000
heap
page readonly
2365F9BD000
heap
page read and write
F05829B000
stack
page read and write
2365D769000
heap
page read and write
2365D781000
heap
page read and write
28DD6EF6000
heap
page read and write
2E2B78E0000
heap
page read and write
2365D7E9000
heap
page read and write
2365D783000
heap
page read and write
2090D183000
heap
page read and write
2365F94C000
heap
page read and write
2365D6C0000
heap
page read and write
2E2B7ACA000
heap
page read and write
1E3D4C90000
heap
page read and write
2365D7DC000
heap
page read and write
2A2DECC0000
heap
page read and write
2365F9B9000
heap
page read and write
7FFB0C230000
unkown
page execute and read and write
2365F538000
direct allocation
page read and write
2365F919000
heap
page read and write
7FFB0C235000
unkown
page execute and write copy
19444300000
heap
page read and write
2365D773000
heap
page read and write
7FFB23B01000
unkown
page execute read
2365F9B9000
heap
page read and write
2365F94E000
heap
page read and write
19444260000
heap
page read and write
7FF6869FD000
unkown
page write copy
62D9EFC000
stack
page read and write
1A75C610000
heap
page read and write
2365D75C000
heap
page read and write
2365D7ED000
heap
page read and write
2365F9EF000
heap
page read and write
2365D773000
heap
page read and write
1A75C61B000
heap
page read and write
5A3AEFD000
stack
page read and write
2365D78A000
heap
page read and write
7FF686A0E000
unkown
page readonly
28DD6F1C000
heap
page read and write
19EEBA4B000
heap
page read and write
7FF6869EA000
unkown
page readonly
2365FB5E000
heap
page read and write
2365FD80000
direct allocation
page read and write
FF316FF000
stack
page read and write
2AE700E0000
heap
page read and write
2090D185000
heap
page read and write
2090D183000
heap
page read and write
19EEBC10000
heap
page read and write
2365FABC000
direct allocation
page read and write
2365F947000
heap
page read and write
BBC26FF000
stack
page read and write
2365D7A3000
heap
page read and write
There are 475 hidden memdumps, click here to show them.