IOC Report
7fqr9q4hAP.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7fqr9q4hAP.exe
"C:\Users\user\Desktop\7fqr9q4hAP.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://jjjjjjjj.click/jjjj/notepad.exe
unknown
malicious
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRangesNoDash
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://gist.github.com/XVilka/8346728#gistcomment-2823421
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2876.
unknown
https://www.ecma-international.org/ecma-262/#sec-timeclip
unknown
https://bugs.chromium.org/p/v8/issues/detail?id=10704
unknown
https://console.spec.whatwg.org/#table
unknown
https://www.iana.org/assignments/tls-extensiontype-values
unknown
https://github.com/nodejs/node/issues/35475
unknown
https://console.spec.whatwg.org/#console-namespace
unknown
https://url.spec.whatwg.org/#url
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://github.com/nodejs/node/issues/13435
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtomNoDash
unknown
https://goo.gl/t5IS6M).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.2
unknown
https://github.com/nodejs/node/commit/f7620fb96d339f704932f9bb9a0dceb9952df2d4
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtom
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crlzJp
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://policy.camerfirma.com(
unknown
http://www.accv.es/legislacion_c.htm=
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
https://github.com/chalk/ansi-regex/blob/master/index.js
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassRanges
unknown
https://github.com/mysticatea/abort-controller
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlEscape
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://stackoverflow.com/a/5501711/3561
unknown
https://github.com/nodejs/node/pull/33661
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-CharacterClassEscape
unknown
http://narwhaljs.org)
unknown
http://policy.camerfirma.comzJp
unknown
https://www.ecma-international.org/ecma-262/#sec-promise.all
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
https://v8.dev/blog/v8-release-89
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://tc39.es/ecma262/#sec-IsHTMLDDA-internal-slot
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://www.accv.es00
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Pattern
unknown
https://sourcemaps.info/spec.html
unknown
https://mybackuplinks.com/PO.exe
unknown
https://invisible-island.net/xterm/ctlseqs/ctlseqs.html
unknown
https://github.com/nodejs/node/pull/12342
unknown
https://bugs.chromium.org/p/v8/issues/detail?id=6593
unknown
https://github.com/v8/v8/blob/d6ead37d265d7215cf9c5f768f279e21bd170212/src/js/prologue.js#L152-L156
unknown
http://www.firmaprofesional.com/cps0
unknown
https://github.com/nodejs/node/pull/34375
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://github.com/nodejs/node/pull/34010
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
https://github.com/da-x/rxvt-unicode/tree/v9.22-with-24bit-color
unknown
https://github.com/nodejs/node/issues
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-HexDigits
unknown
http://www.quovadisglobal.com/cps0
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
https://github.com/chalk/supports-color
unknown
https://github.com/nodejs/node/pull/30380#issuecomment-552948364
unknown
https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-setinterval
unknown
https://heycam.github.io/webidl/#dfn-class-string
unknown
https://heycam.github.io/webidl/#dfn-iterator-prototype-object
unknown
https://nodejs.org/api/cli.html#cli_unhandled_rejections_mode).
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlLetter
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Quantifier
unknown
https://github.com/nodejs/node/issues/10673
unknown
http://ocsp.accv.es0
unknown
https://github.com/acornjs/acorn/issues/575
unknown
https://github.com/mafintosh/pump
unknown
https://github.com/nodejs/node/issues/19009
unknown
https://url.spec.whatwg.org/#concept-urlencoded-parser
unknown
https://tc39.github.io/ecma262/#sec-%typedarray%.of
unknown
http://www.quovadisglobal.com/cps
unknown
https://github.com/google/caja/blob/master/src/com/google/caja/ses/repairES5.js
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jjjjjjjj.click
92.113.24.27
mybackuplinks.com
82.112.247.9

IPs

IP
Domain
Country
Malicious
92.113.24.27
jjjjjjjj.click
Ukraine
82.112.247.9
mybackuplinks.com
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
1BD230AB000
heap
page read and write
1BD217F5000
heap
page read and write
4D7F8FE000
unkown
page read and write
1BD2181E000
heap
page read and write
1BD230B8000
heap
page read and write
1734A462000
unkown
page read and write
1BD231D3000
heap
page read and write
1BD2179D000
heap
page read and write
7FF7E0B40000
unkown
page readonly
4D7FB7E000
unkown
page readonly
1734AA00000
unkown
page readonly
1BD23124000
heap
page read and write
1BD217A7000
heap
page read and write
1BD217BC000
heap
page read and write
337AFF00000
direct allocation
page read and write
1BD231E9000
heap
page read and write
1BD217F5000
heap
page read and write
1BD230A1000
heap
page read and write
7FF7E27B4000
unkown
page read and write
10C4440000
direct allocation
page read and write
1BD2321C000
heap
page read and write
1BD230BF000
heap
page read and write
1BD2174A000
heap
page read and write
1BD21831000
heap
page read and write
1BD230E0000
heap
page read and write
29744E00000
direct allocation
page read and write
1BD2321B000
heap
page read and write
7FF7E27B3000
unkown
page write copy
16DF980000
direct allocation
page read and write
1BD21726000
heap
page read and write
1BD21809000
heap
page read and write
1BD2321B000
heap
page read and write
1BD216E2000
heap
page read and write
A54EA40000
direct allocation
page read and write
9FE40FF000
stack
page read and write
1BD230E9000
heap
page read and write
1BD217F5000
heap
page read and write
2F6D5540000
direct allocation
page read and write
1BD2171A000
heap
page read and write
1BD21780000
heap
page read and write
1BD217B3000
heap
page read and write
7FF7E2A5B000
unkown
page read and write
1BD217FC000
heap
page read and write
1BD2174E000
heap
page read and write
1BD231E9000
heap
page read and write
17348547000
heap
page read and write
1BD21831000
heap
page read and write
1BD21709000
heap
page read and write
4D7F97E000
unkown
page readonly
1BD216DC000
heap
page read and write
1BD21745000
heap
page read and write
1BD217F5000
heap
page read and write
1415C6C0000
direct allocation
page read and write
7FF7E1541000
unkown
page execute read
1734CD50000
unkown
page read and write
1734A6E6000
unkown
page read and write
1BD2174E000
heap
page read and write
17349FF8000
unkown
page read and write
7FF7E2A60000
unkown
page read and write
1BD217B8000
heap
page read and write
1BD23222000
heap
page read and write
7FF7E27BE000
unkown
page write copy
1BD21702000
heap
page read and write
1BD21701000
heap
page read and write
1BD230FB000
heap
page read and write
1734A080000
unkown
page readonly
1C0E9D00000
direct allocation
page read and write
1BD230CB000
heap
page read and write
1BD2179F000
heap
page read and write
7FF7E27B7000
unkown
page write copy
1BD2313B000
heap
page read and write
1BD217B6000
heap
page read and write
4D7F4EE000
stack
page read and write
1BD2320D000
heap
page read and write
9FE3DFF000
stack
page read and write
7FF7E1B6C000
unkown
page readonly
1734A060000
unkown
page readonly
1BD2321B000
heap
page read and write
1BD231D4000
heap
page read and write
1BD217F5000
heap
page read and write
1734A400000
unkown
page read and write
1BD21806000
heap
page read and write
1169E5C0000
direct allocation
page read and write
9FE47FC000
stack
page read and write
1BD217CA000
heap
page read and write
1BD2184E000
heap
page read and write
1BD21835000
heap
page read and write
3C5540000
direct allocation
page read and write
1BD217A7000
heap
page read and write
1BD23123000
heap
page read and write
1734C550000
unkown
page read and write
1BD2177C000
heap
page read and write
1BD230AA000
heap
page read and write
1534F880000
direct allocation
page read and write
1BD230F7000
heap
page read and write
1BD217B5000
heap
page read and write
1BD23095000
heap
page read and write
24F95000000
direct allocation
page read and write
1BD21703000
heap
page read and write
1BD231C5000
heap
page read and write
2776525C000
direct allocation
page read and write
1BD23222000
heap
page read and write
1BD21784000
heap
page read and write
1BD21837000
heap
page read and write
1BD217F6000
heap
page read and write
2157B340000
direct allocation
page read and write
1BD23100000
heap
page read and write
1BD217A7000
heap
page read and write
1BD21784000
heap
page read and write
1BD216AA000
heap
page read and write
1BD230D7000
heap
page read and write
1BD231D8000
heap
page read and write
7FF7E1B6C000
unkown
page readonly
1734A574000
unkown
page read and write
1734A4C8000
unkown
page read and write
1BD217F5000
heap
page read and write
1BD21813000
heap
page read and write
1BD21756000
heap
page read and write
1BD2169C000
heap
page read and write
1BD2171A000
heap
page read and write
4D7F5EE000
unkown
page read and write
7FF7E2A7A000
unkown
page read and write
1BD217D2000
heap
page read and write
1BD230CB000
heap
page read and write
4D7F9FB000
unkown
page read and write
1BD2321B000
heap
page read and write
1734A600000
unkown
page read and write
1BD2178B000
heap
page read and write
1BD230CB000
heap
page read and write
1BD2184A000
heap
page read and write
1BD2174E000
heap
page read and write
1BD21817000
heap
page read and write
1BD21750000
heap
page read and write
3D759282000
direct allocation
page execute read
1BD217FE000
heap
page read and write
1BD2177C000
heap
page read and write
1BD21780000
heap
page read and write
1734A0B3000
heap
page read and write
4D7F72E000
unkown
page read and write
1BD216FC000
heap
page read and write
1BD2176B000
heap
page read and write
1BD215F0000
heap
page read and write
1BD217B5000
heap
page read and write
1BD2179C000
heap
page read and write
1BD217A7000
heap
page read and write
1BD23211000
heap
page read and write
1BD217F5000
heap
page read and write
1BD21784000
heap
page read and write
1BD217FB000
heap
page read and write
1BD21709000
heap
page read and write
1BD2183E000
heap
page read and write
1BD217B3000
heap
page read and write
1BD23088000
heap
page read and write
1BD23123000
heap
page read and write
1BD216EB000
heap
page read and write
1BD217D0000
heap
page read and write
7FF7E2A7D000
unkown
page readonly
1BD217A7000
heap
page read and write
1BD231D7000
heap
page read and write
1BD21709000
heap
page read and write
1BD231F2000
heap
page read and write
1BD21756000
heap
page read and write
1BD230BF000
heap
page read and write
1BD2178B000
heap
page read and write
1734A740000
unkown
page read and write
1BD217B2000
heap
page read and write
1BD217D1000
heap
page read and write
1BD230EF000
heap
page read and write
1BD21752000
heap
page read and write
1BD2175F000
heap
page read and write
1BD230E5000
heap
page read and write
1BD21709000
heap
page read and write
1BD230DE000
heap
page read and write
1BD217B7000
heap
page read and write
17348540000
heap
page read and write
1BD217F5000
heap
page read and write
1BD21843000
heap
page read and write
1BD216B9000
heap
page read and write
1BD21746000
heap
page read and write
235CACC4000
direct allocation
page read and write
1BD217C3000
heap
page read and write
1BD216FE000
heap
page read and write
1BD217F5000
heap
page read and write
1BD23204000
heap
page read and write
1BD231C8000
heap
page read and write
1BD21842000
heap
page read and write
1BD21791000
heap
page read and write
1BD21807000
heap
page read and write
1BD231F2000
heap
page read and write
1BD2170F000
heap
page read and write
1BD23090000
heap
page read and write
2421B3C0000
direct allocation
page read and write
1BD217F5000
heap
page read and write
27765240000
direct allocation
page read and write
1BD21771000
heap
page read and write
1BD21780000
heap
page read and write
9FE3CF5000
stack
page read and write
1734A5DE000
unkown
page read and write
1BD216FC000
heap
page read and write
1BD231EF000
heap
page read and write
1734A6A4000
unkown
page read and write
1BD21650000
heap
page read and write
1BD2170C000
heap
page read and write
1BD230CB000
heap
page read and write
1BD21797000
heap
page read and write
1734A662000
unkown
page read and write
1BD217F5000
heap
page read and write
1BD2168F000
heap
page read and write
1BD217BB000
heap
page read and write
1BD231D3000
heap
page read and write
1BD230BF000
heap
page read and write
1BD21831000
heap
page read and write
1BD217B9000
heap
page read and write
1BD216B8000
heap
page read and write
1BD21806000
heap
page read and write
1BD217C0000
heap
page read and write
1BD23089000
heap
page read and write
1BD230B8000
heap
page read and write
7FF7E2A64000
unkown
page read and write
1BD23088000
heap
page read and write
1BD230EB000
heap
page read and write
1BD23093000
heap
page read and write
1BD23211000
heap
page read and write
1BD2309E000
heap
page read and write
1BD23101000
heap
page read and write
1BD216EE000
heap
page read and write
9FE42FF000
stack
page read and write
1BD230B8000
heap
page read and write
3BCBBB00000
direct allocation
page read and write
1BD21771000
heap
page read and write
1734A0B0000
heap
page read and write
1BD218D5000
heap
page read and write
7FF7E2A7D000
unkown
page readonly
1734A727000
unkown
page read and write
AFE2E80000
direct allocation
page read and write
1BD217B3000
heap
page read and write
1BD216FE000
heap
page read and write
1BD23081000
heap
page read and write
1BD21746000
heap
page read and write
1BD217B9000
heap
page read and write
1BD21781000
heap
page read and write
9FE3EFF000
stack
page read and write
1BD217F5000
heap
page read and write
1BD230B8000
heap
page read and write
1BD230E4000
heap
page read and write
4D7FAFC000
unkown
page read and write
1BD230A2000
heap
page read and write
173484F0000
heap
page read and write
1BD23225000
heap
page read and write
27765254000
direct allocation
page read and write
1BD21746000
heap
page read and write
1BD21843000
heap
page read and write
1BD230B8000
heap
page read and write
1BD21713000
heap
page read and write
32BA3400000
direct allocation
page read and write
1BD2174D000
heap
page read and write
1BD23207000
heap
page read and write
1BD216E2000
heap
page read and write
1734A6FD000
unkown
page read and write
1734A6F8000
unkown
page read and write
1BD216F0000
heap
page read and write
1BD216D9000
heap
page read and write
1734A010000
unkown
page readonly
1BD230BF000
heap
page read and write
1BD21726000
heap
page read and write
1BD216A9000
heap
page read and write
179B1BC0000
direct allocation
page read and write
17348520000
unkown
page read and write
1BD216D8000
heap
page read and write
9FE48FC000
stack
page read and write
1BD230D1000
heap
page read and write
2E989C00000
direct allocation
page read and write
1BD21710000
heap
page read and write
1BD21696000
heap
page read and write
17348730000
heap
page read and write
1BD217FC000
heap
page read and write
1734A030000
unkown
page read and write
4D7F728000
unkown
page read and write
1BD21695000
heap
page read and write
1BD2170F000
heap
page read and write
1BD230BF000
heap
page read and write
1BD21692000
heap
page read and write
1BD21806000
heap
page read and write
1BD217C7000
heap
page read and write
1BD2183A000
heap
page read and write
1734A73A000
unkown
page read and write
1BD216D8000
heap
page read and write
1BD216E9000
heap
page read and write
1BD216D7000
heap
page read and write
1BD230F3000
heap
page read and write
7FF7E27D1000
unkown
page read and write
7FF7E0B41000
unkown
page execute read
7FF7E27AC000
unkown
page read and write
1BD21806000
heap
page read and write
7FF7E0B41000
unkown
page execute read
7FF7E27B8000
unkown
page read and write
1BD217C2000
heap
page read and write
7FF7E0B40000
unkown
page readonly
1BD217F5000
heap
page read and write
1BD21719000
heap
page read and write
1BD217BC000
heap
page read and write
1BD2308D000
heap
page read and write
1BD23209000
heap
page read and write
7FF7E256C000
unkown
page readonly
1BD21715000
heap
page read and write
9FE49FF000
stack
page read and write
17349FFD000
unkown
page read and write
1BD216BE000
heap
page read and write
ECCC100000
direct allocation
page read and write
1BD217D5000
heap
page read and write
1BD21819000
heap
page read and write
1BD23134000
heap
page read and write
1BD216E8000
heap
page read and write
1BD23213000
heap
page read and write
1BD21780000
heap
page read and write
17348553000
heap
page read and write
3E71CC00000
direct allocation
page read and write
1BD216FE000
heap
page read and write
1BD21709000
heap
page read and write
1BD216ED000
heap
page read and write
1BD21580000
heap
page read and write
1BD230E7000
heap
page read and write
1BAEFD00000
direct allocation
page read and write
9FE3CF7000
stack
page read and write
1BD23080000
heap
page read and write
7FF7E2A67000
unkown
page read and write
1BD216E8000
heap
page read and write
1BD230CB000
heap
page read and write
9FE4AFF000
stack
page read and write
1BD21726000
heap
page read and write
1BD21836000
heap
page read and write
1BD217BA000
heap
page read and write
1BD217C4000
heap
page read and write
1BD2178D000
heap
page read and write
1BD217FD000
heap
page read and write
17348559000
heap
page read and write
1BD231F2000
heap
page read and write
1BD230AB000
heap
page read and write
1BD2312B000
heap
page read and write
1BD2170E000
heap
page read and write
1BD216D9000
heap
page read and write
1BD21726000
heap
page read and write
1BD23104000
heap
page read and write
1BD21784000
heap
page read and write
1BD21480000
heap
page read and write
1CDB5AC0000
direct allocation
page read and write
1BD21784000
heap
page read and write
1BD217A5000
heap
page read and write
1BD21831000
heap
page read and write
1BD2178B000
heap
page read and write
1BD2169B000
heap
page read and write
235CACC0000
direct allocation
page read and write
1BD217A7000
heap
page read and write
1BD216E2000
heap
page read and write
1BD21821000
heap
page read and write
1BD230CB000
heap
page read and write
1BD21784000
heap
page read and write
1734A6C4000
unkown
page read and write
1BD23222000
heap
page read and write
1BD230A3000
heap
page read and write
1BD23084000
heap
page read and write
1BD230BF000
heap
page read and write
1BD230ED000
heap
page read and write
4D7F730000
unkown
page read and write
17348711000
unkown
page readonly
3D7592C2000
direct allocation
page execute read
1BD2309E000
heap
page read and write
1BD230B8000
heap
page read and write
1BD217C7000
heap
page read and write
1BD216EE000
heap
page read and write
1BD21802000
heap
page read and write
7FF7E256C000
unkown
page readonly
1BD2181E000
heap
page read and write
1BD21843000
heap
page read and write
1BD216E7000
heap
page read and write
1BD23211000
heap
page read and write
1BD230CB000
heap
page read and write
1BD217C7000
heap
page read and write
1BD2169E000
heap
page read and write
1BD23210000
heap
page read and write
1BD216E8000
heap
page read and write
1BD217B6000
heap
page read and write
17349F00000
unkown
page read and write
1BD23088000
heap
page read and write
29744E25000
direct allocation
page read and write
1BD21709000
heap
page read and write
1BD216FF000
heap
page read and write
1BAEFD21000
direct allocation
page read and write
1BD2312B000
heap
page read and write
17349EE0000
unkown
page read and write
1BD217C0000
heap
page read and write
1BD216EF000
heap
page read and write
1BD2170F000
heap
page read and write
1BD2174E000
heap
page read and write
1BD217B4000
heap
page read and write
4D7FA7E000
unkown
page readonly
1BD230B8000
heap
page read and write
1BD2176B000
heap
page read and write
1BD23222000
heap
page read and write
7FF7E27AC000
unkown
page write copy
1BD21726000
heap
page read and write
1BD2171A000
heap
page read and write
1BD230A3000
heap
page read and write
1BD2174E000
heap
page read and write
1BD23103000
heap
page read and write
1BD21797000
heap
page read and write
1BD21560000
heap
page read and write
7FF7E27BE000
unkown
page write copy
17348735000
heap
page read and write
1734A52A000
unkown
page read and write
1BD216E8000
heap
page read and write
1BD218D0000
heap
page read and write
5482200000
direct allocation
page read and write
1BD230BF000
heap
page read and write
1BD230AB000
heap
page read and write
7FF7E27CA000
unkown
page write copy
1BD217FC000
heap
page read and write
1BD21699000
heap
page read and write
1BD21811000
heap
page read and write
1734C450000
unkown
page read and write
1734A5EA000
unkown
page read and write
7FF7E27C7000
unkown
page read and write
1BD217A4000
heap
page read and write
1BD21726000
heap
page read and write
17348500000
unkown
page read and write
1BD2177C000
heap
page read and write
1BD21713000
heap
page read and write
1BD2178B000
heap
page read and write
9FE3FFF000
stack
page read and write
7FF7E1541000
unkown
page execute read
1BD217C7000
heap
page read and write
173484E0000
unkown
page readonly
1734873B000
heap
page read and write
There are 423 hidden memdumps, click here to show them.