IOC Report
gjsdk.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\AppReadiness\mmzwi.exe
C:\Windows\AppReadiness\mmzwi.exe
malicious
C:\Users\user\Desktop\gjsdk.exe
"C:\Users\user\Desktop\gjsdk.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
http://45.151.62.65:8082/7FBE8Vhw_Ej3wyS05Pj-_OcuPl34HeR5tlGYDglketqIsLl6CwLCyB374ln1tVW7ajwzELAFfky
unknown
https://lockn1t3.xyz00:11:22:33:44:5500:11:22:33:44:5500:11:22:33:44:5500:11:22:33:44:5500:11:22:33:
unknown
https://lockn1t3.xyzsizeof(rtype)
unknown
http://%s:%d/%sHTTP/1.1
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md
unknown
http://45.151.62.65:8082/7FBE8Vhw_Ej3wyS05Pj-_OcuPl34HeR5tlGYDglketqIsLl6CwLCyB374ln1tVW7ajwzELAFfkyu3R5Q-hjDLQ==
45.151.62.65
https://lockn1t3.xyzMMZWIODFMQ2GGOJRGRTGIM3GMY4TOYRVHBQTQZRSMZRDQNLEMVSWOZLDNNXQMMZWIODFMQ2GGOJRGRTG
unknown
http://45.151.62.65:8082/
45.151.62.65
https://lockn1t3.xyz
unknown
http://%s:%d/%sbg-hi-bluebg-hi-magentabg-hi-cyanHTTP/1.1
unknown
https://lockn1t3.xyz--09AZ__azMMZWIODFMQ2GGOJRGRTGIM3GMY4TOYRVHBQTQZRSMZRDQNLEMVSWOZLDNNXQ
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.mdThe
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureNAME:
unknown
http://.css
unknown
ftp://192.168.2.47
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureeyJhbGc
unknown
http://.jpg
unknown
https://github.com/go-sql-driver/mysql/wiki/old_passwords
unknown
https://lockn1t3.xyzocelot.jython27.xyztiger.jython27.xyz00:11:22:33:44:55cecreate
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.mdMust
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
c4h10o.autos
45.151.62.65

IPs

IP
Domain
Country
Malicious
45.151.62.65
c4h10o.autos
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
EnableCounterForIoctl
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SecureAuthService
CustomSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SecureAuthService
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SecureAuthService
TypesSupported

Memdumps

Base Address
Regiontype
Protect
Malicious
C000798000
direct allocation
page read and write
1FB5000
unkown
page execute and read and write
C000806000
direct allocation
page read and write
C0005FC000
direct allocation
page read and write
16F41A02000
heap
page read and write
2B0E4950000
direct allocation
page read and write
C0002D8000
direct allocation
page read and write
3DB327E000
unkown
page readonly
C000000000
direct allocation
page read and write
3512000
unkown
page execute and read and write
1F8FE744000
direct allocation
page read and write
2B0E9A81000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
C00091A000
direct allocation
page read and write
12E9000
unkown
page execute and read and write
C000902000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C00092E000
direct allocation
page read and write
2441000
unkown
page execute and read and write
13AD000
unkown
page execute and read and write
C000218000
direct allocation
page read and write
8B359FC000
stack
page read and write
C000218000
direct allocation
page read and write
F36000
unkown
page execute and read and write
C00005B000
direct allocation
page read and write
1F8FE7F6000
direct allocation
page read and write
C0007A6000
direct allocation
page read and write
C00079C000
direct allocation
page read and write
1E75000
unkown
page execute and read and write
2B0E9C10000
direct allocation
page read and write
C00029A000
direct allocation
page read and write
C000032000
direct allocation
page read and write
AE8000
unkown
page execute and read and write
C0005AA000
direct allocation
page read and write
1F8FFA70000
direct allocation
page read and write
ADA000
unkown
page execute and read and write
1F8FFB92000
direct allocation
page read and write
C0007B2000
direct allocation
page read and write
C0008AC000
direct allocation
page read and write
1F8FE7D3000
direct allocation
page read and write
C000800000
direct allocation
page read and write
C000222000
direct allocation
page read and write
2B0E9AC6000
direct allocation
page read and write
C0001D1000
direct allocation
page read and write
22F0000
unkown
page execute and read and write
2B0E4930000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
36D2000
unkown
page execute and read and write
1D51000
unkown
page execute and read and write
3512000
unkown
page execute and read and write
36DC000
unkown
page execute and read and write
DEE000
unkown
page execute and read and write
C000122000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
C0008B0000
direct allocation
page read and write
3DB387E000
unkown
page readonly
359E000
unkown
page execute and read and write
1F8FE819000
direct allocation
page read and write
1AED000
unkown
page execute and read and write
1FCC000
unkown
page execute and read and write
640000
unkown
page readonly
B9C000
unkown
page execute and read and write
C000B40000
direct allocation
page read and write
3551000
unkown
page execute and write copy
C0003BA000
direct allocation
page read and write
C35000
unkown
page execute and read and write
1F8FE530000
heap
page read and write
3580000
unkown
page execute and read and write
1483000
unkown
page execute and read and write
BBF000
unkown
page execute and read and write
C000122000
direct allocation
page read and write
1F8FE570000
heap
page read and write
3DB357C000
stack
page read and write
11C6000
unkown
page execute and read and write
C0001EE000
direct allocation
page read and write
1F8FFA50000
direct allocation
page read and write
C00060A000
direct allocation
page read and write
C0002F6000
direct allocation
page read and write
3498000
unkown
page execute and read and write
FF0000
unkown
page execute and read and write
CAE39FE000
stack
page read and write
C0007FC000
direct allocation
page read and write
14DA000
unkown
page execute and read and write
C0007E4000
direct allocation
page read and write
2B0E46D4000
direct allocation
page read and write
C000916000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
20F8000
unkown
page execute and read and write
E0C000
unkown
page execute and read and write
C0002EF000
direct allocation
page read and write
C0002AC000
direct allocation
page read and write
1C40000
unkown
page execute and read and write
C0002DE000
direct allocation
page read and write
C0002B4000
direct allocation
page read and write
1F8FE510000
heap
page read and write
DFE000
unkown
page execute and read and write
C000090000
direct allocation
page read and write
AA6000
unkown
page execute and read and write
C0001A6000
direct allocation
page read and write
20D5000
unkown
page execute and read and write
2B0E9B80000
direct allocation
page read and write
1459000
unkown
page execute and read and write
10E5000
unkown
page execute and read and write
C000092000
direct allocation
page read and write
1FA1000
unkown
page execute and read and write
36CD000
unkown
page execute and read and write
FD6000
unkown
page execute and read and write
C0003C0000
direct allocation
page read and write
C000B50000
direct allocation
page read and write
1147000
unkown
page execute and read and write
C000278000
direct allocation
page read and write
2011000
unkown
page execute and read and write
C0008A2000
direct allocation
page read and write
C000340000
direct allocation
page read and write
2B0E9B46000
direct allocation
page read and write
C00090C000
direct allocation
page read and write
C00090A000
direct allocation
page read and write
2B0E9B20000
direct allocation
page read and write
36CD000
unkown
page execute and read and write
128E000
unkown
page execute and read and write
A82000
unkown
page execute and read and write
36DF000
unkown
page execute and write copy
C000120000
direct allocation
page read and write
C0007A2000
direct allocation
page read and write
C0008FA000
direct allocation
page read and write
C0007B2000
direct allocation
page read and write
C00002E000
direct allocation
page read and write
DD1000
unkown
page execute and read and write
B75000
unkown
page execute and read and write
1345000
unkown
page execute and read and write
C000607000
direct allocation
page read and write
DA8000
unkown
page execute and read and write
CAE3DFF000
stack
page read and write
1E98000
unkown
page execute and read and write
C000324000
direct allocation
page read and write
C7F000
unkown
page execute and read and write
C0007CA000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C000C90000
direct allocation
page read and write
1EC1000
unkown
page execute and read and write
F64000
unkown
page execute and read and write
3DB29BC000
stack
page read and write
16F41A2B000
heap
page read and write
C00002C000
direct allocation
page read and write
16F41A13000
heap
page read and write
C0005EE000
direct allocation
page read and write
C000264000
direct allocation
page read and write
C00079C000
direct allocation
page read and write
C20000
unkown
page execute and read and write
C00080C000
direct allocation
page read and write
F46000
unkown
page execute and read and write
C000041000
direct allocation
page read and write
C000008000
direct allocation
page read and write
2B0E9C92000
direct allocation
page read and write
C0007A0000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C0003CE000
direct allocation
page read and write
CEE000
unkown
page execute and read and write
3551000
unkown
page execute and write copy
C0003EC000
direct allocation
page read and write
2B51000
unkown
page execute and write copy
C0007E6000
direct allocation
page read and write
C01000
unkown
page execute and read and write
C000904000
direct allocation
page read and write
2B0E9B4B000
direct allocation
page read and write
C00059C000
direct allocation
page read and write
1171000
unkown
page execute and read and write
16F419E0000
heap
page read and write
C00006B000
direct allocation
page read and write
2B0E45A0000
heap
page read and write
1041000
unkown
page execute and read and write
C0002FE000
direct allocation
page read and write
2B0E46D8000
direct allocation
page read and write
C00022C000
direct allocation
page read and write
C000BAC000
direct allocation
page read and write
2B0E9B10000
direct allocation
page read and write
C000134000
direct allocation
page read and write
2B0E4940000
direct allocation
page read and write
C000110000
direct allocation
page read and write
1161000
unkown
page execute and read and write
C0002E3000
direct allocation
page read and write
C0000FC000
direct allocation
page read and write
1F21000
unkown
page execute and read and write
C0007C4000
direct allocation
page read and write
640000
unkown
page readonly
1F63000
unkown
page execute and read and write
C000051000
direct allocation
page read and write
C0005B0000
direct allocation
page read and write
1CB9000
unkown
page execute and read and write
CD7000
unkown
page execute and read and write
3DB2F7D000
stack
page read and write
3DB337E000
stack
page read and write
640000
unkown
page readonly
C000232000
direct allocation
page read and write
2234000
unkown
page execute and read and write
C000094000
direct allocation
page read and write
C000394000
direct allocation
page read and write
C000342000
direct allocation
page read and write
1F8FFB86000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
C0005D2000
direct allocation
page read and write
36DF000
unkown
page execute and write copy
2B0E9BF6000
direct allocation
page read and write
1F8FFC08000
direct allocation
page read and write
16F41A57000
heap
page read and write
C00076C000
direct allocation
page read and write
C000019000
direct allocation
page read and write
36D4000
unkown
page execute and read and write
C0002E0000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
1F8FE560000
direct allocation
page read and write
C00022A000
direct allocation
page read and write
BDF000
unkown
page execute and read and write
C000660000
direct allocation
page read and write
D38000
unkown
page execute and read and write
C00004D000
direct allocation
page read and write
C000106000
direct allocation
page read and write
A99000
unkown
page execute and read and write
C00059F000
direct allocation
page read and write
1F8FE7E0000
direct allocation
page read and write
11D5000
unkown
page execute and read and write
359E000
unkown
page execute and read and write
C00092A000
direct allocation
page read and write
1F46000
unkown
page execute and read and write
C000934000
direct allocation
page read and write
C000762000
direct allocation
page read and write
C0007AC000
direct allocation
page read and write
8B35FFE000
stack
page read and write
C0002F0000
direct allocation
page read and write
CAE45FF000
stack
page read and write
2441000
unkown
page execute and read and write
1F8FFB57000
direct allocation
page read and write
BF5000
unkown
page execute and read and write
C000392000
direct allocation
page read and write
C000136000
direct allocation
page read and write
FAA000
unkown
page execute and read and write
C0003DC000
direct allocation
page read and write
16F419C0000
heap
page read and write
C00008C000
direct allocation
page read and write
1F8FE57C000
heap
page read and write
C0003C6000
direct allocation
page read and write
C0002FA000
direct allocation
page read and write
C000794000
direct allocation
page read and write
358D000
unkown
page execute and read and write
C000924000
direct allocation
page read and write
C000928000
direct allocation
page read and write
CBC000
unkown
page execute and read and write
C000918000
direct allocation
page read and write
36D4000
unkown
page execute and read and write
C000804000
direct allocation
page read and write
C000742000
direct allocation
page read and write
C000384000
direct allocation
page read and write
C000817000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C0008F4000
direct allocation
page read and write
8B363FF000
stack
page read and write
C00092C000
direct allocation
page read and write
112D000
unkown
page execute and read and write
358B000
unkown
page execute and read and write
C0006FC000
direct allocation
page read and write
C00059D000
direct allocation
page read and write
C00082A000
direct allocation
page read and write
C0005BA000
direct allocation
page read and write
C0003F0000
direct allocation
page read and write
C000C94000
direct allocation
page read and write
2112000
unkown
page execute and read and write
C000922000
direct allocation
page read and write
C0008BA000
direct allocation
page read and write
641000
unkown
page execute and read and write
C000B96000
direct allocation
page read and write
C0008B4000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
1112000
unkown
page execute and read and write
2B0E4744000
heap
page read and write
1F8FE840000
heap
page read and write
1F8FE7E7000
direct allocation
page read and write
16F419F0000
heap
page read and write
C000080000
direct allocation
page read and write
D4E000
unkown
page execute and read and write
C0008F8000
direct allocation
page read and write
208C000
unkown
page execute and read and write
C00006F000
direct allocation
page read and write
C0005A3000
direct allocation
page read and write
C000358000
direct allocation
page read and write
ACC000
unkown
page execute and read and write
1F04000
unkown
page execute and read and write
C0008AE000
direct allocation
page read and write
10D1000
unkown
page execute and read and write
8B35BFE000
stack
page read and write
C000598000
direct allocation
page read and write
C000856000
direct allocation
page read and write
1F8FE500000
heap
page read and write
C000936000
direct allocation
page read and write
1040000
unkown
page execute and read and write
D09000
unkown
page execute and read and write
C000920000
direct allocation
page read and write
C000236000
direct allocation
page read and write
C000932000
direct allocation
page read and write
1B55000
unkown
page execute and read and write
C0003EE000
direct allocation
page read and write
C000828000
direct allocation
page read and write
24C7000
unkown
page execute and read and write
C00089D000
direct allocation
page read and write
641000
unkown
page execute and read and write
C000CA4000
direct allocation
page read and write
2441000
unkown
page execute and read and write
2B51000
unkown
page execute and write copy
20B1000
unkown
page execute and read and write
C00091E000
direct allocation
page read and write
D70000
unkown
page execute and read and write
1244000
unkown
page execute and read and write
CAE37FF000
stack
page read and write
1F8FE748000
direct allocation
page read and write
C0003D7000
direct allocation
page read and write
C000160000
direct allocation
page read and write
36E0000
unkown
page write copy
C000064000
direct allocation
page read and write
C0002D6000
direct allocation
page read and write
CAE3BFE000
stack
page read and write
2B0E9B40000
direct allocation
page read and write
C000071000
direct allocation
page read and write
1F8FFAA0000
direct allocation
page read and write
C0003DA000
direct allocation
page read and write
105F000
unkown
page execute and read and write
C00063A000
direct allocation
page read and write
16F42202000
trusted library allocation
page read and write
C000834000
direct allocation
page read and write
C0005A8000
direct allocation
page read and write
2B0E9AD1000
direct allocation
page read and write
36E0000
unkown
page read and write
131B000
unkown
page execute and read and write
1A41000
unkown
page execute and read and write
10C6000
unkown
page execute and read and write
C0002EA000
direct allocation
page read and write
C0002CC000
direct allocation
page read and write
F26000
unkown
page execute and read and write
C0000C6000
direct allocation
page read and write
C0007B8000
direct allocation
page read and write
1E1C000
unkown
page execute and read and write
21BF000
unkown
page execute and read and write
2B0E4975000
heap
page read and write
C000820000
direct allocation
page read and write
D63000
unkown
page execute and read and write
C000086000
direct allocation
page read and write
1DD9000
unkown
page execute and read and write
C000002000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
101D000
unkown
page execute and read and write
2053000
unkown
page execute and read and write
1FF3000
unkown
page execute and read and write
1F8FFB8C000
direct allocation
page read and write
3DB377E000
stack
page read and write
1F8FE830000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C0003EB000
direct allocation
page read and write
16F42150000
trusted library allocation
page read and write
2390000
unkown
page execute and read and write
1F8FFB84000
direct allocation
page read and write
1F8FE740000
direct allocation
page read and write
2B0E4970000
heap
page read and write
C000808000
direct allocation
page read and write
C000140000
direct allocation
page read and write
2B0E9C13000
direct allocation
page read and write
C000182000
direct allocation
page read and write
C0008B2000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
A73000
unkown
page execute and read and write
24BF000
unkown
page execute and read and write
C0000C0000
direct allocation
page read and write
C000346000
direct allocation
page read and write
2344000
unkown
page execute and read and write
1F8FE7B0000
direct allocation
page read and write
8B35DFE000
stack
page read and write
C000368000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C000B74000
direct allocation
page read and write
16F41A3F000
heap
page read and write
C000824000
direct allocation
page read and write
1E56000
unkown
page execute and read and write
C0007F4000
direct allocation
page read and write
1EE0000
unkown
page execute and read and write
1F8FFB73000
direct allocation
page read and write
8B365FF000
stack
page read and write
C00087A000
direct allocation
page read and write
1F8FFB81000
direct allocation
page read and write
1F8FFBB0000
direct allocation
page read and write
C0006EC000
direct allocation
page read and write
1CCE000
unkown
page execute and read and write
C000061000
direct allocation
page read and write
1041000
unkown
page execute and read and write
3580000
unkown
page execute and read and write
C000822000
direct allocation
page read and write
C00036A000
direct allocation
page read and write
2B0E9B30000
direct allocation
page read and write
C0002F4000
direct allocation
page read and write
C000162000
direct allocation
page read and write
1200000
unkown
page execute and read and write
C00084A000
direct allocation
page read and write
F72000
unkown
page execute and read and write
1F8FFA90000
direct allocation
page read and write
2A98000
unkown
page execute and read and write
24CF000
unkown
page execute and read and write
CA4000
unkown
page execute and read and write
8B355FC000
stack
page read and write
C0008C6000
direct allocation
page read and write
C0005E2000
direct allocation
page read and write
B4E000
unkown
page execute and read and write
F55000
unkown
page execute and read and write
C0008C0000
direct allocation
page read and write
C0003CB000
direct allocation
page read and write
1F8FFAF9000
direct allocation
page read and write
C000796000
direct allocation
page read and write
1F8FFAE0000
direct allocation
page read and write
1F8FFAA9000
direct allocation
page read and write
BCF000
unkown
page execute and read and write
C00005D000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
2B0E46A0000
heap
page read and write
C0007A6000
direct allocation
page read and write
CAE43FF000
stack
page read and write
C000C7E000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C0005B4000
direct allocation
page read and write
CAE35FB000
stack
page read and write
C000806000
direct allocation
page read and write
C0008AA000
direct allocation
page read and write
1F8FE845000
heap
page read and write
D1F000
unkown
page execute and read and write
D89000
unkown
page execute and read and write
36E0000
unkown
page read and write
C0008B6000
direct allocation
page read and write
C0002AE000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C64000
unkown
page execute and read and write
1F87000
unkown
page execute and read and write
2B0E4730000
heap
page read and write
C000046000
direct allocation
page read and write
36E0000
unkown
page write copy
C0008C2000
direct allocation
page read and write
2B0E4759000
heap
page read and write
1D00000
unkown
page execute and read and write
C0007FE000
direct allocation
page read and write
2B0E9B00000
direct allocation
page read and write
3DB347E000
unkown
page readonly
1219000
unkown
page execute and read and write
36D2000
unkown
page execute and read and write
C0001D8000
direct allocation
page read and write
C00031D000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
C000BB9000
direct allocation
page read and write
C0003D0000
direct allocation
page read and write
11AB000
unkown
page execute and read and write
C000726000
direct allocation
page read and write
C000603000
direct allocation
page read and write
C000048000
direct allocation
page read and write
C000598000
direct allocation
page read and write
10B2000
unkown
page execute and read and write
C0001A6000
direct allocation
page read and write
C000802000
direct allocation
page read and write
2035000
unkown
page execute and read and write
C54000
unkown
page execute and read and write
C000256000
direct allocation
page read and write
C000BA2000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
2B0E4680000
heap
page read and write
C000BAE000
direct allocation
page read and write
C0002CA000
direct allocation
page read and write
2B0E9C89000
direct allocation
page read and write
C0002FA000
direct allocation
page read and write
1D9F000
unkown
page execute and read and write
3DB317E000
stack
page read and write
1C73000
unkown
page execute and read and write
C000000000
direct allocation
page read and write
3DB307E000
unkown
page readonly
1F8FFA60000
direct allocation
page read and write
C00077C000
direct allocation
page read and write
FBA000
unkown
page execute and read and write
36DC000
unkown
page execute and read and write
23F6000
unkown
page execute and read and write
2A98000
unkown
page execute and read and write
AFC000
unkown
page execute and read and write
C000C6B000
direct allocation
page read and write
CAE41FE000
stack
page read and write
CAE3FFF000
stack
page read and write
36A9000
unkown
page execute and read and write
2B0E46D0000
direct allocation
page read and write
24DE000
unkown
page execute and read and write
358D000
unkown
page execute and read and write
10A3000
unkown
page execute and read and write
641000
unkown
page execute and read and write
36A9000
unkown
page execute and read and write
8B357FE000
stack
page read and write
C0003E1000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C95000
unkown
page execute and read and write
C00012C000
direct allocation
page read and write
640000
unkown
page readonly
2B0E9AF5000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
B21000
unkown
page execute and read and write
C000650000
direct allocation
page read and write
8B353FF000
stack
page read and write
C14000
unkown
page execute and read and write
C00059A000
direct allocation
page read and write
10FB000
unkown
page execute and read and write
1009000
unkown
page execute and read and write
F8D000
unkown
page execute and read and write
C00010C000
direct allocation
page read and write
C000C68000
direct allocation
page read and write
3DB367E000
unkown
page readonly
8B34FFB000
stack
page read and write
C0005D0000
direct allocation
page read and write
1D85000
unkown
page execute and read and write
C000B9E000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
C000850000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
C000672000
direct allocation
page read and write
C000106000
direct allocation
page read and write
16F41B02000
heap
page read and write
2B0E473C000
heap
page read and write
C000780000
direct allocation
page read and write
3498000
unkown
page execute and read and write
C000910000
direct allocation
page read and write
C000632000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C000138000
direct allocation
page read and write
1A41000
unkown
page execute and read and write
C0007A4000
direct allocation
page read and write
C0002A4000
direct allocation
page read and write
1F8FE7B7000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
C00080A000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
C000634000
direct allocation
page read and write
C000605000
direct allocation
page read and write
C45000
unkown
page execute and read and write
C0003EE000
direct allocation
page read and write
C0007EC000
direct allocation
page read and write
358B000
unkown
page execute and read and write
C000A7C000
direct allocation
page read and write
16F41A00000
heap
page read and write
C0005A1000
direct allocation
page read and write
C000322000
direct allocation
page read and write
C000838000
direct allocation
page read and write
C00027E000
direct allocation
page read and write
C0008A4000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C000300000
direct allocation
page read and write
C0003F9000
direct allocation
page read and write
1089000
unkown
page execute and read and write
24B1000
unkown
page execute and read and write
1E38000
unkown
page execute and read and write
C000752000
direct allocation
page read and write
12CA000
unkown
page execute and read and write
2174000
unkown
page execute and read and write
C0002DC000
direct allocation
page read and write
C0008FE000
direct allocation
page read and write
C0001B4000
direct allocation
page read and write
C000766000
direct allocation
page read and write
1D3B000
unkown
page execute and read and write
C0000F2000
direct allocation
page read and write
1C04000
unkown
page execute and read and write
C0007E8000
direct allocation
page read and write
1E04000
unkown
page execute and read and write
C000770000
direct allocation
page read and write
1F8FE7A0000
direct allocation
page read and write
C000800000
direct allocation
page read and write
C000124000
direct allocation
page read and write
206D000
unkown
page execute and read and write
213A000
unkown
page execute and read and write
There are 570 hidden memdumps, click here to show them.