IOC Report
TU1ocSt1kw.exe

loading gif

Files

File Path
Type
Category
Malicious
TU1ocSt1kw.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user~1\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT (copy)
ASCII text
dropped
C:\Users\user~1\AppData\Local\Temp\Session Storage_8.temp\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Cookies_2.temp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\History_4.temp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\History_5.temp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Local State_0.temp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.5
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.bak
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\LOG
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\LOG.old
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000005
data
dropped
C:\Users\user\AppData\Local\Temp\Login Data_1.temp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Secure Preferences_9.temp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\000004.ldb
TeX font metric data
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT.5
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT.6
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT.bak
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\LOG
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\LOG.old
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000005
data
dropped
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000006
data
dropped
C:\Users\user\AppData\Local\Temp\Web Data_6.temp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\cookies.sqlite_14.temp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\extensions.json_21.temp
JSON data
modified
C:\Users\user\AppData\Local\Temp\key4.db_12.temp
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\places.sqlite_15.temp
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\places.sqlite_16.temp
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\places.sqlite_17.temp
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\webappsstore.sqlite_19.temp
SQLite 3.x database, user version 2, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\Desktop\results\chrome_default_cookie.csv
CSV text
dropped
C:\Users\user\Desktop\results\chrome_default_sessionstorage.csv
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\Desktop\results\microsoft_edge_def_sessionstorage.csv
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\Desktop\results\microsoft_edge_default_extension.csv
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\Desktop\results\microsoft_edge_default_sessionstorage.csv
Unicode text, UTF-8 (with BOM) text
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TU1ocSt1kw.exe
"C:\Users\user\Desktop\TU1ocSt1kw.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://file://mailto:http://BINARY-x0X03.46.0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://github.com/moonD4rk/HackBrowserData
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.mdsync:
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://drive-daily-2.corp.google.com/
unknown
https://drive-autopush.corp.google.com/
unknown
https://drive-daily-4.corp.google.com/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://drive-daily-5.corp.google.com/
unknown
https://chrome.google.com/webstore/detail/ghbmnnjooekpmoecnnnilnnbdlolhkhie
unknown
https://docs.google.com/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://drive-staging.corp.google.com/
unknown
https://drive-daily-6.corp.google.com/
unknown
https://drive.google.com/
unknown
https://drive-daily-0.corp.google.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chrome.google.com/webstore/detail/ghbmnnjooekpmoecnnnilnnbdlolhkhi
unknown
https://chrome.google.com/webstore/detail/crypto/sha1:
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
unknown
https://drive-preprod.corp.google.com/
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://drive-daily-3.corp.google.com/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
time.windows.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4F1000
unkown
page execute and read and write
malicious
C00020E000
direct allocation
page read and write
24EFAFB6000
direct allocation
page read and write
D1AC3FE000
stack
page read and write
C000469000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
C00042B000
direct allocation
page read and write
C0002CA000
direct allocation
page read and write
24EFACA0000
direct allocation
page read and write
C00027E000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C001153000
direct allocation
page read and write
C00027C000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C000264000
direct allocation
page read and write
C00029E000
direct allocation
page read and write
C0003F7000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
C000C51000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
24EF5A10000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
C0001C7000
direct allocation
page read and write
C0002D4000
direct allocation
page read and write
C000178000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C000441000
direct allocation
page read and write
C000DA1000
direct allocation
page read and write
C00042D000
direct allocation
page read and write
24EFAF40000
direct allocation
page read and write
C00022C000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C00037A000
direct allocation
page read and write
C000328000
direct allocation
page read and write
C00113A000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C00034B000
direct allocation
page read and write
24EFAF26000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C0002FC000
direct allocation
page read and write
C000243000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
24EFB007000
direct allocation
page read and write
24EFAFA6000
direct allocation
page read and write
EAC000
unkown
page execute and read and write
C000108000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C000248000
direct allocation
page read and write
C0002CE000
direct allocation
page read and write
24EFAF50000
direct allocation
page read and write
C000326000
direct allocation
page read and write
24EFAEF0000
direct allocation
page read and write
24EFAFB6000
direct allocation
page read and write
24EFAFB6000
direct allocation
page read and write
C000108000
direct allocation
page read and write
C000268000
direct allocation
page read and write
D1ACFFE000
stack
page read and write
4F0000
unkown
page readonly
C000308000
direct allocation
page read and write
24EFAFA9000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
24EFAD20000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
24EFAF20000
direct allocation
page read and write
24EFAF85000
direct allocation
page read and write
C000C89000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
C000367000
direct allocation
page read and write
24EFAFA3000
direct allocation
page read and write
C0003FE000
direct allocation
page read and write
24EF5A30000
direct allocation
page read and write
C000304000
direct allocation
page read and write
C000298000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
EE4000
unkown
page execute and read and write
C00005E000
direct allocation
page read and write
C00027A000
direct allocation
page read and write
C000C32000
direct allocation
page read and write
24EFB037000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C00042B000
direct allocation
page read and write
C0012A3000
direct allocation
page read and write
C000489000
direct allocation
page read and write
B72000
unkown
page execute and write copy
C0000A8000
direct allocation
page read and write
C0002A0000
direct allocation
page read and write
C0001FC000
direct allocation
page read and write
C000028000
direct allocation
page read and write
24EFACF0000
direct allocation
page read and write
C000268000
direct allocation
page read and write
C000C69000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C0001BC000
direct allocation
page read and write
C00017E000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000370000
direct allocation
page read and write
24EFAF00000
direct allocation
page read and write
24EFAF70000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C000206000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C000298000
direct allocation
page read and write
24EFAF40000
direct allocation
page read and write
C00027E000
direct allocation
page read and write
C0001C0000
direct allocation
page read and write
24EF5A45000
heap
page read and write
C000CD9000
direct allocation
page read and write
C0002B0000
direct allocation
page read and write
C00027A000
direct allocation
page read and write
EA3000
unkown
page execute and read and write
24EFAFC0000
direct allocation
page read and write
24EFAC9E000
direct allocation
page read and write
24EFAC97000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
D1AC9FE000
stack
page read and write
C00008C000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C000431000
direct allocation
page read and write
C0002A4000
direct allocation
page read and write
C0003EC000
direct allocation
page read and write
24EFAEF0000
direct allocation
page read and write
C00032F000
direct allocation
page read and write
C000451000
direct allocation
page read and write
C00017A000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C0001FC000
direct allocation
page read and write
C000320000
direct allocation
page read and write
24EFAC7C000
direct allocation
page read and write
C000335000
direct allocation
page read and write
C000280000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
C00120B000
direct allocation
page read and write
C0001EE000
direct allocation
page read and write
C0002BA000
direct allocation
page read and write
24EF5980000
heap
page read and write
C000184000
direct allocation
page read and write
C00017A000
direct allocation
page read and write
C0003F2000
direct allocation
page read and write
C000214000
direct allocation
page read and write
C000D01000
direct allocation
page read and write
C0001BA000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C000D69000
direct allocation
page read and write
C0003B5000
direct allocation
page read and write
EDD000
unkown
page execute and read and write
C00040A000
direct allocation
page read and write
C00037A000
direct allocation
page read and write
C000422000
direct allocation
page read and write
C00126B000
direct allocation
page read and write
C00026A000
direct allocation
page read and write
C000501000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C000200000
direct allocation
page read and write
24EFAEA0000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C0002FA000
direct allocation
page read and write
24EF59B8000
direct allocation
page read and write
D1ACBFE000
stack
page read and write
24EFB048000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
24EFAF66000
direct allocation
page read and write
C0002B4000
direct allocation
page read and write
C0001F7000
direct allocation
page read and write
C000360000
direct allocation
page read and write
C000049000
direct allocation
page read and write
C000312000
direct allocation
page read and write
C000D09000
direct allocation
page read and write
C000345000
direct allocation
page read and write
24EFAFD0000
direct allocation
page read and write
C000D01000
direct allocation
page read and write
C00033F000
direct allocation
page read and write
C000042000
direct allocation
page read and write
C000233000
direct allocation
page read and write
C001143000
direct allocation
page read and write
C0001FC000
direct allocation
page read and write
24EFAFB6000
direct allocation
page read and write
C00028B000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C001203000
direct allocation
page read and write
C00034D000
direct allocation
page read and write
24EFAEF5000
direct allocation
page read and write
C000118000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C00042F000
direct allocation
page read and write
C000316000
direct allocation
page read and write
C000385000
direct allocation
page read and write
C000511000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
C00016A000
direct allocation
page read and write
C0003A4000
direct allocation
page read and write
C001213000
direct allocation
page read and write
C000C89000
direct allocation
page read and write
C0002E0000
direct allocation
page read and write
C000164000
direct allocation
page read and write
C000136000
direct allocation
page read and write
24EFACD0000
direct allocation
page read and write
C000C41000
direct allocation
page read and write
D1AC5FF000
stack
page read and write
C000014000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
24EFAFA3000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
24EFB028000
direct allocation
page read and write
C000088000
direct allocation
page read and write
24EF59B4000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C000228000
direct allocation
page read and write
C000288000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C00031A000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
C000118000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
C000353000
direct allocation
page read and write
C000438000
direct allocation
page read and write
C00042F000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
24EFAF45000
direct allocation
page read and write
C000314000
direct allocation
page read and write
C000380000
direct allocation
page read and write
C000324000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C000178000
direct allocation
page read and write
C000266000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
24EFAFB0000
direct allocation
page read and write
C00029C000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
24EFAF00000
direct allocation
page read and write
C00033C000
direct allocation
page read and write
C0001F0000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C000254000
direct allocation
page read and write
C000404000
direct allocation
page read and write
C000092000
direct allocation
page read and write
24EF5A40000
heap
page read and write
C00032F000
direct allocation
page read and write
C0001B2000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C000306000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
C00031E000
direct allocation
page read and write
C0005A1000
direct allocation
page read and write
C000021000
direct allocation
page read and write
C00022D000
direct allocation
page read and write
C000C61000
direct allocation
page read and write
C000130000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
24EFAF25000
direct allocation
page read and write
24EFAF30000
direct allocation
page read and write
C00027E000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
C000158000
direct allocation
page read and write
24EF5874000
heap
page read and write
C000218000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C000431000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C000206000
direct allocation
page read and write
C0001E2000
direct allocation
page read and write
EE6000
unkown
page execute and write copy
24EFAD00000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
C0011DB000
direct allocation
page read and write
C000348000
direct allocation
page read and write
24EFAF80000
direct allocation
page read and write
C0001F0000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C0002C6000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C000DA1000
direct allocation
page read and write
24EF5780000
heap
page read and write
C000080000
direct allocation
page read and write
EE8000
unkown
page write copy
C00008C000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
24EFAF83000
direct allocation
page read and write
EE8000
unkown
page read and write
C0001DE000
direct allocation
page read and write
24EFAFA2000
direct allocation
page read and write
24EFAFA9000
direct allocation
page read and write
24EFAF83000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000298000
direct allocation
page read and write
24EFAC50000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C000158000
direct allocation
page read and write
24EF586C000
heap
page read and write
C00116B000
direct allocation
page read and write
D1ACDFE000
stack
page read and write
24EFAFB6000
direct allocation
page read and write
C00026A000
direct allocation
page read and write
24EF5960000
heap
page read and write
C0000C6000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C00029A000
direct allocation
page read and write
C000D11000
direct allocation
page read and write
C00118B000
direct allocation
page read and write
C000282000
direct allocation
page read and write
24EFAF83000
direct allocation
page read and write
C000D11000
direct allocation
page read and write
24EFAFA3000
direct allocation
page read and write
C0002D2000
direct allocation
page read and write
24EFAD2D000
direct allocation
page read and write
C000284000
direct allocation
page read and write
C00022A000
direct allocation
page read and write
C000262000
direct allocation
page read and write
C00017E000
direct allocation
page read and write
C000176000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C000D09000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
C0001B1000
direct allocation
page read and write
24EFAFA9000
direct allocation
page read and write
24EFAD28000
direct allocation
page read and write
C00027C000
direct allocation
page read and write
C00017C000
direct allocation
page read and write
C000C38000
direct allocation
page read and write
24EFAF85000
direct allocation
page read and write
24EF5869000
heap
page read and write
C0004D9000
direct allocation
page read and write
24EFAF83000
direct allocation
page read and write
4F0000
unkown
page readonly
C000214000
direct allocation
page read and write
C00017C000
direct allocation
page read and write
D1AC7FE000
stack
page read and write
24EFAEF0000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
24EFAFA9000
direct allocation
page read and write
24EFAF16000
direct allocation
page read and write
24EFAF70000
direct allocation
page read and write
C001134000
direct allocation
page read and write
24EFAFA3000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C0002B8000
direct allocation
page read and write
C0003DF000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
24EFAFC4000
direct allocation
page read and write
C0001DE000
direct allocation
page read and write
24EFAFC0000
direct allocation
page read and write
C000509000
direct allocation
page read and write
C001163000
direct allocation
page read and write
C00042D000
direct allocation
page read and write
C00038D000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C000D69000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
C0002B0000
direct allocation
page read and write
24EFAEF3000
direct allocation
page read and write
C000088000
direct allocation
page read and write
E35000
unkown
page execute and read and write
24EFAF83000
direct allocation
page read and write
24EFAC90000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
C000241000
direct allocation
page read and write
24EFAFA5000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
24EFB010000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C000408000
direct allocation
page read and write
C000164000
direct allocation
page read and write
24EFACE0000
direct allocation
page read and write
C000126000
direct allocation
page read and write
24EF59B0000
direct allocation
page read and write
24EFAF12000
direct allocation
page read and write
C00029E000
direct allocation
page read and write
24EFAFA6000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
24EF5860000
heap
page read and write
24EFAD10000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C000212000
direct allocation
page read and write
C0002A0000
direct allocation
page read and write
24EFAFE6000
direct allocation
page read and write
C000569000
direct allocation
page read and write
C000306000
direct allocation
page read and write
C00028E000
direct allocation
page read and write
C000461000
direct allocation
page read and write
24EFAF90000
direct allocation
page read and write
C000CD9000
direct allocation
page read and write
C000286000
direct allocation
page read and write
C0002DC000
direct allocation
page read and write
D1AC1FD000
stack
page read and write
C0003CC000
direct allocation
page read and write
C000245000
direct allocation
page read and write
C0003DC000
direct allocation
page read and write
24EFAFB0000
direct allocation
page read and write
There are 403 hidden memdumps, click here to show them.