IOC Report
amneziawg.exe

loading gif

Files

File Path
Type
Category
Malicious
amneziawg.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Program Files\AmneziaWG\Data\log.bin
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\amneziawg.exe
"C:\Users\user\Desktop\amneziawg.exe"
malicious
C:\Users\user\Desktop\amneziawg.exe
"C:\Users\user\Desktop\amneziawg.exe" /installmanagerservice
malicious
C:\Users\user\Desktop\amneziawg.exe
C:\Users\user\Desktop\amneziawg.exe /managerservice
malicious
C:\Users\user\Desktop\amneziawg.exe
C:\Users\user\Desktop\amneziawg.exe /ui 764 760 772 780
malicious

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://sectigo.com/CPS
unknown
https://amnezia.org/D
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://amnezia.org/wireguard-log-%s.txtTaskbarButtonCreatedreflect.Value.IsZeroreflect.Value.SetInt
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://sectigo.com/CPS2.23.140.1.4.1
unknown
There are 4 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C72000
unkown
page readonly
malicious
C000126000
direct allocation
page read and write
1025000
unkown
page read and write
C00009C000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000104000
direct allocation
page read and write
278C1D81000
heap
page read and write
C00003D000
direct allocation
page read and write
C29C1FE000
stack
page read and write
108F000
unkown
page read and write
1114000
unkown
page write copy
C00001A000
direct allocation
page read and write
C000191000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
1115000
unkown
page readonly
102E000
unkown
page write copy
C000018000
direct allocation
page read and write
278EB850000
trusted library allocation
page read and write
C0001A0000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C00008B000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C000172000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
C000044000
direct allocation
page read and write
278E903A000
heap
page read and write
C0000B0000
direct allocation
page read and write
1128000
unkown
page readonly
102E000
unkown
page write copy
C000281000
direct allocation
page read and write
1025000
unkown
page write copy
5DEB7FE000
stack
page read and write
C000186000
direct allocation
page read and write
C00057F000
direct allocation
page read and write
1E3103D0000
heap
page read and write
C0000A2000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C000180000
direct allocation
page read and write
A787BFE000
stack
page read and write
22A762AA000
direct allocation
page read and write
1128000
unkown
page readonly
C000198000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C000102000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
A7887FF000
stack
page read and write
1E355620000
direct allocation
page read and write
278C1D94000
heap
page read and write
C00007A000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
278C1D75000
heap
page read and write
C0000A2000
direct allocation
page read and write
980000
unkown
page readonly
C0000FC000
direct allocation
page read and write
102E000
unkown
page write copy
C00009E000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
278E8A60000
heap
page read and write
278C1D9D000
heap
page read and write
5DEADFE000
stack
page read and write
C000204000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
1068000
unkown
page write copy
8A64BFE000
stack
page read and write
C00010E000
direct allocation
page read and write
980000
unkown
page readonly
10FC000
unkown
page readonly
1114000
unkown
page write copy
C00004D000
direct allocation
page read and write
1115000
unkown
page readonly
1DE313E5000
heap
page read and write
C000038000
direct allocation
page read and write
C000002000
direct allocation
page read and write
980000
unkown
page readonly
1068000
unkown
page write copy
C29B3FE000
stack
page read and write
1115000
unkown
page readonly
106E000
unkown
page read and write
C0006B1000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C000091000
direct allocation
page read and write
1128000
unkown
page readonly
278E8C3B000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
278E7118000
direct allocation
page read and write
C00019C000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000118000
direct allocation
page read and write
C00004E000
direct allocation
page read and write
102A000
unkown
page write copy
1E310258000
heap
page read and write
1E310410000
heap
page read and write
C000138000
direct allocation
page read and write
1058000
unkown
page read and write
106B000
unkown
page read and write
106E000
unkown
page read and write
C0000E2000
direct allocation
page read and write
10FC000
unkown
page readonly
278E904A000
heap
page read and write
C000072000
direct allocation
page read and write
981000
unkown
page execute read
C000044000
direct allocation
page read and write
105B000
unkown
page read and write
C00001A000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
278E7113000
direct allocation
page read and write
C000008000
direct allocation
page read and write
5DEB9FF000
stack
page read and write
C000000000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
1E310250000
heap
page read and write
102A000
unkown
page write copy
C0000AC000
direct allocation
page read and write
1DE76720000
direct allocation
page read and write
10F7000
unkown
page read and write
C000070000
direct allocation
page read and write
1055000
unkown
page read and write
C000010000
direct allocation
page read and write
22A76610000
direct allocation
page read and write
C000094000
direct allocation
page read and write
278EC3C6000
heap
page read and write
C000014000
direct allocation
page read and write
C000102000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
22A7B7C0000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
1DE31410000
heap
page read and write
C0000A6000
direct allocation
page read and write
C000122000
direct allocation
page read and write
1089000
unkown
page read and write
1114000
unkown
page write copy
C000080000
direct allocation
page read and write
C000166000
direct allocation
page read and write
A7885FF000
stack
page read and write
105B000
unkown
page read and write
5DEB1FD000
stack
page read and write
278E7190000
unkown
page readonly
C0000E5000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C000134000
direct allocation
page read and write
C000024000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
10FC000
unkown
page readonly
278C1F00000
heap
page read and write
A788DFF000
stack
page read and write
278E8C00000
direct allocation
page read and write
A7879F7000
stack
page read and write
1128000
unkown
page readonly
105B000
unkown
page read and write
C00004F000
direct allocation
page read and write
22A76300000
direct allocation
page read and write
1025000
unkown
page read and write
C0000C2000
direct allocation
page read and write
5DEB5FE000
stack
page read and write
C000122000
direct allocation
page read and write
C000004000
direct allocation
page read and write
1E3102A3000
heap
page read and write
278E8C50000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
1057000
unkown
page write copy
C0001C2000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
278E715D000
direct allocation
page read and write
981000
unkown
page execute read
C00007C000
direct allocation
page read and write
C000164000
direct allocation
page read and write
C000058000
direct allocation
page read and write
1114000
unkown
page write copy
C000010000
direct allocation
page read and write
1068000
unkown
page write copy
1128000
unkown
page readonly
C00013C000
direct allocation
page read and write
C000018000
direct allocation
page read and write
1089000
unkown
page read and write
278EC4F3000
heap
page read and write
C00011A000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
1DE3139A000
direct allocation
page read and write
C000056000
direct allocation
page read and write
22A76270000
heap
page read and write
981000
unkown
page execute read
C00010A000
direct allocation
page read and write
22A76675000
heap
page read and write
1128000
unkown
page readonly
C00009C000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
106B000
unkown
page read and write
278E9048000
heap
page read and write
C0000D8000
direct allocation
page read and write
C000016000
direct allocation
page read and write
278E9048000
heap
page read and write
C000042000
direct allocation
page read and write
C000150000
direct allocation
page read and write
C00019E000
direct allocation
page read and write
108F000
unkown
page read and write
C000120000
direct allocation
page read and write
C000042000
direct allocation
page read and write
C000038000
direct allocation
page read and write
278C1F05000
heap
page read and write
C000008000
direct allocation
page read and write
102D000
unkown
page read and write
C0000F4000
direct allocation
page read and write
8A64DFE000
stack
page read and write
C0000A8000
direct allocation
page read and write
22A76320000
heap
page read and write
C00005E000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
C000018000
direct allocation
page read and write
1DE31260000
heap
page read and write
C000044000
direct allocation
page read and write
A7889FE000
stack
page read and write
278E8A84000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
1128000
unkown
page readonly
C000186000
direct allocation
page read and write
C000086000
direct allocation
page read and write
980000
unkown
page readonly
C0000E7000
direct allocation
page read and write
1114000
unkown
page write copy
C0000DA000
direct allocation
page read and write
1056000
unkown
page read and write
1E31035A000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
C000098000
direct allocation
page read and write
10F7000
unkown
page read and write
22A76260000
heap
page read and write
8A639FD000
stack
page read and write
C00002D000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
106D000
unkown
page write copy
22A7BC60000
unkown
page read and write
981000
unkown
page execute read
C00002D000
direct allocation
page read and write
278C1D48000
heap
page read and write
278C1F0C000
heap
page read and write
C0000AE000
direct allocation
page read and write
1057000
unkown
page write copy
C0000D2000
direct allocation
page read and write
980000
unkown
page readonly
C00012A000
direct allocation
page read and write
C29B7FE000
stack
page read and write
C000028000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
1058000
unkown
page read and write
278E903C000
heap
page read and write
10FC000
unkown
page readonly
C0000E6000
direct allocation
page read and write
C0000F2000
direct allocation
page read and write
C000098000
direct allocation
page read and write
1115000
unkown
page readonly
C0000AA000
direct allocation
page read and write
106D000
unkown
page write copy
278E8F1B000
heap
page read and write
1115000
unkown
page readonly
C000068000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
1115000
unkown
page readonly
C000023000
direct allocation
page read and write
102A000
unkown
page write copy
C00007E000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C00047B000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C000180000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
981000
unkown
page execute read
C29C5FE000
stack
page read and write
C00004D000
direct allocation
page read and write
1025000
unkown
page write copy
C0000D4000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
5DEAFFE000
stack
page read and write
C0000DE000
direct allocation
page read and write
106B000
unkown
page read and write
C00011C000
direct allocation
page read and write
1056000
unkown
page read and write
C000004000
direct allocation
page read and write
C00016A000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
1058000
unkown
page read and write
C0000F0000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C00008D000
direct allocation
page read and write
C000193000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
278E8B00000
heap
page read and write
1E357280000
heap
page read and write
1089000
unkown
page read and write
A787FFE000
stack
page read and write
980000
unkown
page readonly
278E8A80000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000156000
direct allocation
page read and write
1E31035C000
direct allocation
page read and write
1DE31390000
direct allocation
page read and write
C000162000
direct allocation
page read and write
1DE313E0000
heap
page read and write
278C1D20000
heap
page read and write
1128000
unkown
page readonly
C0000E0000
direct allocation
page read and write
C000184000
direct allocation
page read and write
10F7000
unkown
page read and write
1DE31398000
direct allocation
page read and write
C000132000
direct allocation
page read and write
108F000
unkown
page read and write
C0007BB000
direct allocation
page read and write
1025000
unkown
page read and write
22A765F0000
heap
page read and write
8A63FFE000
stack
page read and write
C0000A0000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
981000
unkown
page execute read
C000000000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C000042000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
1114000
unkown
page write copy
5DEB3FF000
stack
page read and write
C00003D000
direct allocation
page read and write
C000118000
direct allocation
page read and write
C000197000
direct allocation
page read and write
1057000
unkown
page write copy
C000049000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
278EB7C3000
direct allocation
page read and write
C000182000
direct allocation
page read and write
C000188000
direct allocation
page read and write
102E000
unkown
page write copy
C0000D2000
direct allocation
page read and write
278C1E50000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000116000
direct allocation
page read and write
10FC000
unkown
page readonly
C0000E0000
direct allocation
page read and write
8A641FD000
stack
page read and write
C0000B2000
direct allocation
page read and write
278EC4F1000
heap
page read and write
1E310140000
heap
page read and write
C000104000
direct allocation
page read and write
C29B5FD000
stack
page read and write
A787DFF000
stack
page read and write
C000012000
direct allocation
page read and write
A7883FF000
stack
page read and write
C000180000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
22A76613000
direct allocation
page read and write
1E310415000
heap
page read and write
C29C3FE000
stack
page read and write
1114000
unkown
page write copy
C0000B0000
direct allocation
page read and write
1059000
unkown
page write copy
1115000
unkown
page readonly
C00006E000
direct allocation
page read and write
278C1EB0000
direct allocation
page read and write
C000046000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
278EC4EA000
heap
page read and write
C000108000
direct allocation
page read and write
278C1D91000
heap
page read and write
278C1D00000
heap
page read and write
8A645FA000
stack
page read and write
C00018E000
direct allocation
page read and write
278E7110000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
278E8F1D000
heap
page read and write
C00001A000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000084000
direct allocation
page read and write
278C1D4E000
heap
page read and write
A7881FF000
stack
page read and write
C00010A000
direct allocation
page read and write
1E310220000
heap
page read and write
1114000
unkown
page write copy
C00003F000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
278E9041000
heap
page read and write
8A647FE000
stack
page read and write
22A76670000
heap
page read and write
8A649FE000
stack
page read and write
1059000
unkown
page write copy
C0000DA000
direct allocation
page read and write
10FC000
unkown
page readonly
1DE31394000
direct allocation
page read and write
105B000
unkown
page read and write
22A762A8000
direct allocation
page read and write
C000008000
direct allocation
page read and write
106D000
unkown
page write copy
C00000A000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
1115000
unkown
page readonly
C29BDFE000
stack
page read and write
C0001BA000
direct allocation
page read and write
C29BFFE000
stack
page read and write
22A762A0000
direct allocation
page read and write
C0000E3000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
C000012000
direct allocation
page read and write
22A76328000
heap
page read and write
C00007E000
direct allocation
page read and write
1068000
unkown
page write copy
C000080000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
1DE31340000
heap
page read and write
C000028000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
C0000E9000
direct allocation
page read and write
278C1DA5000
heap
page read and write
C000058000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
1DE313D0000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C000158000
direct allocation
page read and write
C000080000
direct allocation
page read and write
278E8B03000
heap
page read and write
1089000
unkown
page read and write
C00005A000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
C000128000
direct allocation
page read and write
102D000
unkown
page read and write
A788FFC000
stack
page read and write
C000112000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C000112000
direct allocation
page read and write
1DE31360000
heap
page read and write
C00002C000
direct allocation
page read and write
980000
unkown
page readonly
C00005E000
direct allocation
page read and write
1E310350000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
A788BFE000
stack
page read and write
C0001B0000
direct allocation
page read and write
1059000
unkown
page write copy
C000000000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
278E7163000
direct allocation
page read and write
105A000
unkown
page write copy
C29ADCE000
stack
page read and write
C000028000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
22A762A4000
direct allocation
page read and write
278C1D40000
heap
page read and write
278C1C20000
heap
page read and write
C0001CE000
direct allocation
page read and write
981000
unkown
page execute read
C00004D000
direct allocation
page read and write
C0000F8000
direct allocation
page read and write
C000114000
direct allocation
page read and write
1E310354000
direct allocation
page read and write
981000
unkown
page execute read
1E3102B7000
heap
page read and write
1058000
unkown
page read and write
C00000A000
direct allocation
page read and write
C000018000
direct allocation
page read and write
102D000
unkown
page read and write
C000043000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
8A643FF000
stack
page read and write
C0000B6000
direct allocation
page read and write
278C1E58000
direct allocation
page read and write
278EB7C0000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C0001CC000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
102A000
unkown
page write copy
278EC4E5000
heap
page read and write
C000084000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C000004000
direct allocation
page read and write
1E3103B0000
direct allocation
page read and write
C000178000
direct allocation
page read and write
278C1DBD000
heap
page read and write
C000182000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
1025000
unkown
page read and write
1E310358000
direct allocation
page read and write
278E7150000
direct allocation
page read and write
106E000
unkown
page read and write
1DE3141E000
heap
page read and write
C29B9FF000
stack
page read and write
278C1D89000
heap
page read and write
C0000C2000
direct allocation
page read and write
C000180000
direct allocation
page read and write
278EC050000
heap
page read and write
10FC000
unkown
page readonly
102D000
unkown
page read and write
22A7B780000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
278C1D7D000
heap
page read and write
C000122000
direct allocation
page read and write
1057000
unkown
page write copy
1056000
unkown
page read and write
C00008F000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
10FC000
unkown
page readonly
C00002A000
direct allocation
page read and write
C000049000
direct allocation
page read and write
1025000
unkown
page write copy
980000
unkown
page readonly
C000050000
direct allocation
page read and write
C000138000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C000116000
direct allocation
page read and write
1025000
unkown
page write copy
5DEABFD000
stack
page read and write
C00004A000
direct allocation
page read and write
106E000
unkown
page read and write
C000128000
direct allocation
page read and write
10F7000
unkown
page read and write
C00002A000
direct allocation
page read and write
C0000EC000
direct allocation
page read and write
278C1E54000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000050000
direct allocation
page read and write
1DE31418000
heap
page read and write
C00005A000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
106B000
unkown
page read and write
C00007A000
direct allocation
page read and write
106D000
unkown
page write copy
C29B1FF000
stack
page read and write
C00008C000
direct allocation
page read and write
There are 587 hidden memdumps, click here to show them.