IOC Report
run0796.exe

loading gif

Files

File Path
Type
Category
Malicious
run0796.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\_MEI64722\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI64722\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\run0796.exe
"C:\Users\user\Desktop\run0796.exe"
malicious
C:\Users\user\Desktop\run0796.exe
"C:\Users\user\Desktop\run0796.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crl.usertrtok
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
http://python.org/dev/peps/pep-0263/
unknown
http://www.eclipse.org/0
unknown
https://mahler:8092/site-updates.py
unknown
https://sectigo.com/CPS0
unknown
http://crl.usertrtokstrtok_sucrtbase.strtok_sstrxfrmucrtbase.strxfrmtolowerucrtbase.tolowertoupperuc
unknown
http://www.robotstxt.org/norobots-rfc.txt
unknown
http://ocsp.sectigo.com0
unknown
http://ocsp.thawte.com0
unknown
http://www.python.org/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
http://crl.mic
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://www.python.org/download/releases/2.3/mro/.
unknown
http://crl.usert
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://ocsp.digicert
unknown
http://crl.sectigo.com/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.openssl.org/H
unknown
http://www.python.org/dev/peps/pep-0205/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
There are 15 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AA09D45000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
7FFE01380000
unkown
page readonly
1AA09DCD000
heap
page read and write
1AA09DCD000
heap
page read and write
2523FAC0000
heap
page read and write
228F3CE000
stack
page read and write
1AA09C90000
direct allocation
page read and write
9670FEA000
stack
page read and write
1AA09DA6000
heap
page read and write
228EFE1000
stack
page read and write
1AA09DA6000
heap
page read and write
7FF60F181000
unkown
page execute read
1AA09D9B000
heap
page read and write
1AA09D0D000
heap
page read and write
1AA09DA8000
heap
page read and write
7FFE13300000
unkown
page readonly
1AA09DAE000
heap
page read and write
2523F8EA000
heap
page read and write
1AA0A589000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D6B000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DAC000
heap
page read and write
1AA09DC3000
heap
page read and write
1AA09D6B000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D34000
heap
page read and write
7FFDFB864000
unkown
page execute and read and write
2523F8EA000
heap
page read and write
1AA09C10000
heap
page read and write
1AA09DC0000
heap
page read and write
1AA09DA6000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DCD000
heap
page read and write
1AA09DA6000
heap
page read and write
1AA09DAE000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D2F000
heap
page read and write
7FF60F180000
unkown
page readonly
7FF60F1CE000
unkown
page readonly
1AA09D45000
heap
page read and write
1AA09D71000
heap
page read and write
7FF60F1BD000
unkown
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09B20000
heap
page read and write
1AA09DB1000
heap
page read and write
1AA09D9B000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D1C000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D6B000
heap
page read and write
1AA09D38000
heap
page read and write
1AA09D63000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D9B000
heap
page read and write
1AA09D1C000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DB3000
heap
page read and write
1AA09DAE000
heap
page read and write
1AA09D83000
heap
page read and write
7FF60F1BD000
unkown
page write copy
1AA09D63000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D8C000
heap
page read and write
1AA09D4A000
heap
page read and write
1AA09D45000
heap
page read and write
1AA0A310000
direct allocation
page read and write
1AA09DAE000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
2523FAE0000
heap
page read and write
1AA09D34000
heap
page read and write
1AA09D9D000
heap
page read and write
1AA09D47000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D34000
heap
page read and write
2523F8EA000
heap
page read and write
7FFE148E9000
unkown
page execute and read and write
1AA09D63000
heap
page read and write
1AA09DB5000
heap
page read and write
1AA09DB1000
heap
page read and write
96713CE000
stack
page read and write
2523F8F7000
heap
page read and write
1AA09DA6000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09DC0000
heap
page read and write
7FFE148E1000
unkown
page execute and read and write
1AA09D4E000
heap
page read and write
7FF60F180000
unkown
page readonly
2523F8F7000
heap
page read and write
7FFDFB89E000
unkown
page execute and write copy
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
7FF60F180000
unkown
page readonly
2523F8F7000
heap
page read and write
7FF60F1BD000
unkown
page write copy
1AA09D6B000
heap
page read and write
2523F8F7000
heap
page read and write
7FFDFB75D000
unkown
page execute and read and write
1AA09DAC000
heap
page read and write
7FFE148E0000
unkown
page readonly
228EFED000
stack
page read and write
7FFE13283000
unkown
page execute and read and write
1AA0A450000
direct allocation
page read and write
96711DE000
stack
page read and write
1AA0A490000
direct allocation
page read and write
1AA09D4C000
heap
page read and write
2523F8F7000
heap
page read and write
1AA0A190000
direct allocation
page read and write
7FF60F1CC000
unkown
page read and write
1AA0A580000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09DAE000
heap
page read and write
2523FC80000
heap
page read and write
2523F8F9000
heap
page read and write
1AA09D4E000
heap
page read and write
7FF60F1C0000
unkown
page read and write
1AA09D86000
heap
page read and write
7FFE148EA000
unkown
page execute and write copy
1AA09D45000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DC7000
heap
page read and write
1AA0A610000
direct allocation
page read and write
2523FAB0000
heap
page readonly
7FF60F181000
unkown
page execute read
1AA09DA6000
heap
page read and write
1AA0A529000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D4E000
heap
page read and write
7FFE13271000
unkown
page execute and read and write
1AA09D36000
heap
page read and write
2523F8EA000
heap
page read and write
7FFDFB899000
unkown
page execute and read and write
1AA09DAE000
heap
page read and write
7FFE13313000
unkown
page readonly
7FF60F1CE000
unkown
page readonly
1AA09D7F000
heap
page read and write
1AA09D11000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8D0000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D72000
heap
page read and write
7FFE13288000
unkown
page read and write
7FFDFB471000
unkown
page execute and read and write
1AA09DB5000
heap
page read and write
7FF60F180000
unkown
page readonly
2523F8D8000
heap
page read and write
1AA09D30000
heap
page read and write
1AA0A650000
direct allocation
page read and write
1AA09D30000
heap
page read and write
1AA0A150000
direct allocation
page read and write
7FF60F1AA000
unkown
page readonly
1AA0A595000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D6B000
heap
page read and write
2523F8F7000
heap
page read and write
7FF60F1BD000
unkown
page read and write
1AA09DA4000
heap
page read and write
1AA09D78000
heap
page read and write
1AA09DA9000
heap
page read and write
7FF60F1CC000
unkown
page read and write
1AA0A593000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
1AA0A4D0000
direct allocation
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D4E000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D40000
heap
page read and write
1AA09DCC000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D72000
heap
page read and write
1AA09D66000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D3E000
heap
page read and write
7FF60F1AA000
unkown
page readonly
2523F8F7000
heap
page read and write
1AA09DA6000
heap
page read and write
7FFE13281000
unkown
page execute and read and write
1AA09D77000
heap
page read and write
1AA09D64000
heap
page read and write
1AA09DA0000
heap
page read and write
1AA09D0F000
heap
page read and write
2523F8E4000
heap
page read and write
1AA09C80000
heap
page read and write
2523F8EA000
heap
page read and write
7FFDFB800000
unkown
page execute and read and write
1AA09CD0000
heap
page read and write
9670FE3000
stack
page read and write
2523F8EA000
heap
page read and write
1AA09D7C000
heap
page read and write
1AA09DB5000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D69000
heap
page read and write
1AA09DCD000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D4E000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09CE5000
heap
page read and write
1AA09DAC000
heap
page read and write
1AA09C30000
heap
page read and write
1AA09D76000
heap
page read and write
228F1DE000
stack
page read and write
7FF60F1AA000
unkown
page readonly
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
1AA0A690000
direct allocation
page read and write
1AA09D78000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D6F000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DAA000
heap
page read and write
1AA09D30000
heap
page read and write
7FFE13301000
unkown
page execute read
1AA09D38000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D6B000
heap
page read and write
7FF60F181000
unkown
page execute read
1AA09DC1000
heap
page read and write
1AA09D73000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D9B000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09DAE000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8F7000
heap
page read and write
1AA0A510000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09D0E000
heap
page read and write
1AA0A110000
direct allocation
page read and write
1AA09D5F000
heap
page read and write
1AA09D6B000
heap
page read and write
9670FEC000
stack
page read and write
1AA09C00000
heap
page readonly
1AA09D8F000
heap
page read and write
7FFE13312000
unkown
page read and write
1AA09D38000
heap
page read and write
1AA09DBA000
heap
page read and write
1AA09DC3000
heap
page read and write
2523F8F7000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D6B000
heap
page read and write
1AA09DA7000
heap
page read and write
1AA09DC0000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DC1000
heap
page read and write
7FFE13270000
unkown
page readonly
2523F8EA000
heap
page read and write
1AA09DB3000
heap
page read and write
1AA09D76000
heap
page read and write
1AA09DAC000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09D6F000
heap
page read and write
2523F8EA000
heap
page read and write
7FFDFB847000
unkown
page execute and read and write
1AA09D45000
heap
page read and write
1AA09D47000
heap
page read and write
2523F9D0000
heap
page read and write
7FFDFB89F000
unkown
page read and write
1AA09DB3000
heap
page read and write
2523F8F7000
heap
page read and write
7FFE148EC000
unkown
page read and write
7FFE13287000
unkown
page execute and write copy
1AA09DAC000
heap
page read and write
7FF60F181000
unkown
page execute read
7FF60F1AA000
unkown
page readonly
1AA09DCC000
heap
page read and write
2523F8F7000
heap
page read and write
1AA0A520000
heap
page read and write
7FFDFB803000
unkown
page execute and read and write
1AA09DB2000
heap
page read and write
7FFE13286000
unkown
page execute and read and write
7FFE01431000
unkown
page readonly
2523F8EA000
heap
page read and write
1AA09DA6000
heap
page read and write
2523F8EA000
heap
page read and write
1AA09DB1000
heap
page read and write
7FFE1330E000
unkown
page readonly
1AA09DCE000
heap
page read and write
7FF60F1CE000
unkown
page readonly
1AA09DAE000
heap
page read and write
2523F8F7000
heap
page read and write
7FFE0146C000
unkown
page readonly
1AA09D45000
heap
page read and write
7FFDFB86F000
unkown
page execute and read and write
1AA09D6B000
heap
page read and write
1AA09D4A000
heap
page read and write
1AA09DA6000
heap
page read and write
2523F8F7000
heap
page read and write
1AA09DA8000
heap
page read and write
1AA09D6F000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
2523F8EA000
heap
page read and write
7FF60F1CE000
unkown
page readonly
1AA09DAC000
heap
page read and write
2523F8F7000
heap
page read and write
7FFE01381000
unkown
page execute read
1AA09DCE000
heap
page read and write
7FFDFB470000
unkown
page readonly
7FFE01469000
unkown
page read and write
There are 311 hidden memdumps, click here to show them.