IOC Report
DellTpm1.2_Fw5.81.2.1_V2_64.exe

loading gif

Files

File Path
Type
Category
Malicious
DellTpm1.2_Fw5.81.2.1_V2_64.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x09680376, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DellTpm1.2_Fw5.8_edb15fb60ccb2c127253bc03d768e559934021_8f146201_93d6120a-5a7d-475c-85ba-23d77058f9f9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD04C.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 20 21:56:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD0AB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD0E8.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD0EA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD118.tmp.txt
data
dropped
C:\Users\user\AppData\Local\Temp\DBUtil_2_3.Sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe
"C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2852 -s 288
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
http://aia.entrust.net/ovcs1-chain256.cer01
unknown
http://ocsp.entrust.net05
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
http://ocsp.entrust.net02
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
http://ocsp.entrust.net00
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
http://upx.sf.net
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
http://crl.entrust.net/level1d.crl03
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://t0.ssl.ak.dyn
unknown
http://crl.entrust.net/ovcs1.crl0J
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
http://crl.entrust.net/g2ca.crl0;
unknown
https://dynamic.t
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
http://crl.entrust.net/2048ca.crl0;
unknown
http://www.entrust.net/rpa0
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://ocsp.entrust.net0A
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 36 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
ProgramId
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
FileId
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
LowerCaseLongPath
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
LongPathHash
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
Name
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
OriginalFileName
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
Publisher
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
Version
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
BinFileVersion
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
BinaryType
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
ProductName
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
ProductVersion
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
LinkDate
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
BinProductVersion
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
AppxPackageFullName
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
AppxPackageRelativeId
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
Size
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
Language
\REGISTRY\A\{3bcc0776-5887-7615-7618-13ca5cef227a}\Root\InventoryApplicationFile\delltpm1.2_fw5.8|8f10ba2a612fac9f
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D28BA13000
heap
page read and write
C3537FC000
stack
page read and write
886B2FE000
stack
page read and write
29FFD4A0000
trusted library allocation
page read and write
BDBBC7F000
stack
page read and write
C35537E000
stack
page read and write
29FFC902000
heap
page read and write
29FFD718000
heap
page read and write
1D2F9570000
heap
page read and write
29FFC00B000
heap
page read and write
29FFC802000
heap
page read and write
29FFD700000
heap
page read and write
1D2B0A50000
heap
page read and write
94FA37E000
stack
page read and write
94EB29B000
stack
page read and write
886B8FE000
stack
page read and write
1D2B0A65000
heap
page read and write
1F432202000
trusted library allocation
page read and write
B40000
heap
page read and write
29FFC095000
heap
page read and write
BDBB87E000
stack
page read and write
C35447E000
stack
page read and write
1D2F9717000
heap
page read and write
29F80000000
trusted library allocation
page read and write
1D2B0A3C000
heap
page read and write
BDBBB7E000
stack
page read and write
1D2F9713000
heap
page read and write
2B6D000
heap
page read and write
29FFD570000
trusted library allocation
page read and write
1D2F9702000
heap
page read and write
29FFD627000
heap
page read and write
886B3FE000
stack
page read and write
1D2B0A22000
heap
page read and write
1D2B0A3F000
heap
page read and write
29FFD600000
heap
page read and write
1D2F9470000
heap
page read and write
C3532F7000
stack
page read and write
1D2B0A24000
heap
page read and write
1D28BA8F000
heap
page read and write
10AF000
stack
page read and write
10007D000
stack
page read and write
94F97FE000
stack
page read and write
C3553FE000
unkown
page readonly
C354AFE000
stack
page read and write
886B57E000
stack
page read and write
C3542FE000
unkown
page readonly
1F431980000
trusted library allocation
page read and write
1D2B0A30000
heap
page read and write
29FFD600000
trusted library allocation
page read and write
7FF6A0D7A000
unkown
page execute read
1D2B0AA8000
heap
page read and write
C3543FC000
stack
page read and write
29FFC91A000
heap
page read and write
29FFC0A0000
heap
page read and write
1D28B9A0000
heap
page read and write
C353DFE000
unkown
page readonly
1D2F9663000
heap
page read and write
1D28BB02000
heap
page read and write
1D2B0A4C000
heap
page read and write
1004FE000
stack
page read and write
94F9AFE000
stack
page read and write
1D2B0A70000
heap
page read and write
1F431A59000
heap
page read and write
1D2B0A81000
heap
page read and write
C3540FB000
stack
page read and write
C3541FE000
unkown
page readonly
13DFF1E0000
trusted library allocation
page read and write
1D2B0A44000
heap
page read and write
29FFD5D0000
trusted library allocation
page read and write
94EC17E000
stack
page read and write
29FFD69C000
heap
page read and write
1F431B02000
heap
page read and write
29FFC08C000
heap
page read and write
13DFF100000
heap
page read and write
29FFC815000
heap
page read and write
29FFC070000
heap
page read and write
CBB000
heap
page read and write
1D2F9700000
heap
page read and write
13DFF502000
heap
page read and write
13DFF23D000
heap
page read and write
1F431850000
heap
page read and write
886BB7E000
unkown
page readonly
1D28BA3A000
heap
page read and write
1D2B0AA4000
heap
page read and write
13DFF24B000
heap
page read and write
29FFD70C000
heap
page read and write
29FFD673000
heap
page read and write
94EBE7E000
unkown
page readonly
886ACFD000
stack
page read and write
29FFC0B0000
heap
page read and write
1D2F9640000
heap
page read and write
1D28C202000
heap
page read and write
29FFD702000
heap
page read and write
AFC000
stack
page read and write
C3536FE000
unkown
page readonly
C353E7E000
stack
page read and write
1D28C200000
heap
page read and write
1D2B0A5A000
heap
page read and write
7FF6A0DB1000
unkown
page read and write
13DFF213000
unkown
page read and write
1D28B9B0000
heap
page read and write
886B17E000
stack
page read and write
29FFD4E0000
trusted library allocation
page read and write
886B07E000
unkown
page readonly
94FA17E000
stack
page read and write
C353D7E000
stack
page read and write
29FFC030000
heap
page read and write
13DFF502000
heap
page read and write
94FA07E000
unkown
page readonly
29FFD840000
remote allocation
page read and write
886A6EB000
stack
page read and write
29FFD4E0000
trusted library allocation
page read and write
C35467E000
stack
page read and write
94EBF7E000
stack
page read and write
29FFCD40000
trusted library allocation
page read and write
1D2B0960000
heap
page read and write
886BA7D000
stack
page read and write
29FFD840000
remote allocation
page read and write
1D2F95C0000
trusted library allocation
page read and write
1D2F9672000
heap
page read and write
1D28BA8B000
heap
page read and write
1F431A7E000
heap
page read and write
7FF6A0DA7000
unkown
page write copy
94FA47E000
unkown
page readonly
1D2F9600000
heap
page read and write
29FFC900000
heap
page read and write
29FFD480000
trusted library allocation
page read and write
13DFF500000
heap
page read and write
1D2B0A6C000
heap
page read and write
29FFC0A6000
heap
page read and write
29FFCA01000
trusted library allocation
page read and write
29FFCEA0000
trusted library section
page readonly
94FA27E000
unkown
page readonly
1D2B1202000
trusted library allocation
page read and write
1F431A69000
heap
page read and write
C3533FE000
unkown
page readonly
1D28BA71000
heap
page read and write
886B37E000
unkown
page readonly
29FFD410000
trusted library allocation
page read and write
C353AFE000
unkown
page readonly
7FF6A0D9B000
unkown
page readonly
C353F7E000
stack
page read and write
13DFF402000
heap
page read and write
94EC27E000
unkown
page readonly
C354CFB000
stack
page read and write
29FFD657000
heap
page read and write
29FFC129000
heap
page read and write
886B47E000
unkown
page readonly
29FFC91A000
heap
page read and write
29FFD69F000
heap
page read and write
29FFD570000
trusted library allocation
page read and write
1D28BA2B000
heap
page read and write
1D28BB13000
heap
page read and write
13DFF302000
trusted library allocation
page read and write
C354DFE000
unkown
page readonly
29FFD723000
heap
page read and write
7FF6A0DAE000
unkown
page read and write
BDBB77C000
stack
page read and write
29FFE000000
heap
page read and write
886B67E000
unkown
page readonly
1D2B0990000
trusted library allocation
page read and write
886B77D000
stack
page read and write
C3549FE000
unkown
page readonly
1D2B0880000
heap
page read and write
29FFD666000
heap
page read and write
13DFF200000
unkown
page read and write
29FFD671000
heap
page read and write
1D2F95A0000
trusted library allocation
page read and write
886BD7E000
unkown
page readonly
29FFC0BB000
heap
page read and write
886BC7C000
stack
page read and write
29FFD510000
trusted library allocation
page read and write
C3547FE000
stack
page read and write
29FFC7E1000
trusted library allocation
page read and write
29FFD4A0000
trusted library allocation
page read and write
1D2B0A41000
heap
page read and write
29FFC08A000
heap
page read and write
94EB976000
stack
page read and write
1D28B9E0000
trusted library allocation
page read and write
1D2B0A4B000
heap
page read and write
1D2F9679000
heap
page read and write
C20000
heap
page read and write
C3539F9000
stack
page read and write
1D2B0A35000
heap
page read and write
1D28B980000
heap
page read and write
1D2B0A58000
heap
page read and write
1D28BA81000
heap
page read and write
29FFD63F000
heap
page read and write
1D2B0A38000
heap
page read and write
C353FFE000
unkown
page readonly
FAE000
stack
page read and write
C353BFB000
stack
page read and write
29FFBEE0000
heap
page read and write
13DFF24C000
heap
page read and write
886B97E000
unkown
page readonly
29FFC08E000
heap
page read and write
886AF7D000
stack
page read and write
1D28BA7C000
heap
page read and write
29FFC013000
heap
page read and write
94EBA7E000
unkown
page readonly
29FFD6A9000
heap
page read and write
1D2B0A49000
heap
page read and write
94EC07E000
unkown
page readonly
C352D3B000
stack
page read and write
94EBD7E000
stack
page read and write
7FF6A0DB7000
unkown
page readonly
29FFD71D000
heap
page read and write
29FFC913000
heap
page read and write
29FFD840000
remote allocation
page read and write
7FF6A0D9B000
unkown
page readonly
1D2FB002000
trusted library allocation
page read and write
EAE000
stack
page read and write
1D2F9660000
heap
page read and write
1D2B0A59000
heap
page read and write
1007F9000
stack
page read and write
CB0000
heap
page read and write
94F9C7E000
unkown
page readonly
29FFBFF0000
trusted library allocation
page read and write
29FFD67B000
heap
page read and write
1D28BA00000
heap
page read and write
29FFD64C000
heap
page read and write
29FFD715000
heap
page read and write
1D2B0A61000
heap
page read and write
1D2B0A57000
heap
page read and write
1D28C215000
heap
page read and write
BDBB97C000
stack
page read and write
1D2B0A95000
heap
page read and write
29FFC760000
trusted library section
page read and write
1D28BB00000
heap
page read and write
29FFD513000
trusted library allocation
page read and write
BDBBA7D000
stack
page read and write
13DFF22B000
heap
page read and write
C3538FE000
unkown
page readonly
1D2B0A9D000
heap
page read and write
1D2B0AA0000
heap
page read and write
C50000
heap
page read and write
29FFD730000
heap
page read and write
94F96FB000
stack
page read and write
1D28BA4B000
heap
page read and write
1D2B0A54000
heap
page read and write
94EBC7E000
unkown
page readonly
29FFC102000
heap
page read and write
94EBB7B000
stack
page read and write
C3546FE000
unkown
page readonly
1F431A02000
heap
page read and write
29FFD5E0000
trusted library allocation
page read and write
29FFC072000
heap
page read and write
1D2B0A60000
heap
page read and write
13DFF0E0000
heap
page read and write
1D2B0A00000
heap
page read and write
C353EFE000
unkown
page readonly
1D28BA75000
heap
page read and write
C35427E000
stack
page read and write
1D2F962B000
heap
page read and write
C354BFE000
unkown
page readonly
1D2F9630000
heap
page read and write
C353CFE000
unkown
page readonly
29FFD6E7000
heap
page read and write
29FFBEC0000
heap
page read and write
94F9A7E000
unkown
page readonly
1D2B0A5B000
heap
page read and write
886B27E000
unkown
page readonly
1F431A33000
heap
page read and write
29FFD664000
heap
page read and write
1F431A37000
heap
page read and write
29FFCFE0000
trusted library allocation
page read and write
29FFD420000
trusted library allocation
page read and write
29FFC0FE000
heap
page read and write
1D2B0A4D000
heap
page read and write
29FFC800000
heap
page read and write
C35457E000
unkown
page readonly
886AD7E000
stack
page readonly
1D2B0B02000
heap
page read and write
1D2F968B000
heap
page read and write
29FFD502000
trusted library allocation
page read and write
1D2B0A5E000
heap
page read and write
29FFD4C0000
trusted library allocation
page read and write
13DFF324000
heap
page read and write
94F9F7E000
stack
page read and write
29FFD5F0000
trusted library allocation
page read and write
29FFD61A000
heap
page read and write
29FFD727000
heap
page read and write
1D2B0860000
heap
page read and write
1D2B0A13000
heap
page read and write
C70000
heap
page read and write
1F431A50000
heap
page read and write
29C0000
heap
page read and write
29FFC03F000
heap
page read and write
29FFBFC0000
heap
page read and write
13DFF300000
trusted library allocation
page read and write
29FFC91A000
heap
page read and write
29FFC000000
heap
page read and write
1D2F9490000
heap
page read and write
13DFF505000
heap
page read and write
7FF6A0D50000
unkown
page readonly
13DFF513000
heap
page read and write
BDBB2CB000
stack
page read and write
29FFD580000
trusted library allocation
page read and write
29FFC06B000
heap
page read and write
1D28BA40000
heap
page read and write
29FFC0B6000
heap
page read and write
C35487E000
stack
page read and write
29FFC050000
heap
page read and write
1F431A13000
heap
page read and write
13DFF315000
trusted library allocation
page read and write
29FFC95A000
heap
page read and write
29FFC02B000
heap
page read and write
1D2B0A68000
heap
page read and write
1D28BA64000
heap
page read and write
1F431870000
heap
page read and write
7FF6A0DB5000
unkown
page read and write
2B60000
heap
page read and write
1D28BA02000
heap
page read and write
29FFD710000
heap
page read and write
13DFF513000
heap
page read and write
94F9BFE000
stack
page read and write
29FFC113000
heap
page read and write
1D2B0A3A000
heap
page read and write
1F431950000
heap
page read and write
1F431A00000
heap
page read and write
13DFF202000
unkown
page read and write
1F431A48000
heap
page read and write
1D2F9613000
heap
page read and write
13DFF413000
heap
page read and write
886B87E000
unkown
page readonly
1F431A16000
heap
page read and write
1D2F968D000
heap
page read and write
C3535FE000
stack
page read and write
CB6000
heap
page read and write
1D2B0A48000
heap
page read and write
29FFD4A1000
trusted library allocation
page read and write
94F9B7E000
unkown
page readonly
C35497E000
unkown
page readonly
There are 323 hidden memdumps, click here to show them.