IOC Report
24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe

loading gif

Files

File Path
Type
Category
Malicious
24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\Patch64.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\RtlDirectDiagLib64.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\SalomonFwUpdaterI2C64W.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\devcon64.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-5BRVH.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-90SFQ.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-AJDB4.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-CJ3T3.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-DD05B.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-LBEQK.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-LES54.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-11DL1.tmp\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\is-T91OE.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\EF8153BvB.dat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\EF8153BvC.dat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\cfg.dat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\check0.log
ASCII text, with CRLF line terminators
modified
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\ec_01.01.00.05.bin (copy)
data
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\ec_01.01.00.07.bin (copy)
data
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\ec_89.01.03.05.bin (copy)
data
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-1U24J.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-5RNOL.tmp
data
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-85VN5.tmp
data
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-93IT0.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-ED6D2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-GB31N.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-T4OSG.tmp
data
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\patch.log (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\unins000.dat
InnoSetup Log DellDockFW_UPGRADE_UTILITY {598FF4F3-A5CE-4782-9F8E-B615F4B2880D}, version 0x418, 4542 bytes, 663680\37\user, C:\Program Files (x86)\DellDockFW_UPGRADE_
modified
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DellDockFW_UPGRADE_UTILITY\DellDockFW_UPGRADE_UTILITY.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 30 15:00:09 2024, mtime=Wed Oct 30 15:00:09 2024, atime=Thu Mar 14 06:03:42 2024, length=150528, window=hide
dropped
C:\Users\user\AppData\Local\Temp\9B10.tmp\9B11.tmp\9B12.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-T91OE.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe
"C:\Users\user\Desktop\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-11DL1.tmp\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.tmp
"C:\Users\user~1\AppData\Local\Temp\is-11DL1.tmp\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.tmp" /SL5="$103E8,2740915,793600,C:\Users\user\Desktop\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe"
malicious
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe
"C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd" /c "C:\Users\user\AppData\Local\Temp\9B10.tmp\9B11.tmp\9B12.bat "C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe""
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\SalomonFwUpdaterI2C64W.exe
SalomonFwUpdaterI2C64W.exe /dockinfo
C:\Windows\System32\find.exe
find /i check0.log "GetSalomonDockInfo Failed, check if Dock is connected to system"

URLs

Name
IP
Malicious
http://crl.entrust.net/g2ca.crl0
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://sectigo.com/CPS0
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
http://ocsp.sectigo.com0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
http://ocsp.entrust.net01
unknown
http://www.entrust.net/rpa03
unknown
http://ocsp.entrust.net00
unknown
https://www.dell.com/support/home/en-us
unknown
https://www.certum.pl/CPS0
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
http://aia.entrust.net/ts2-chain256.p7c01
unknown
http://cscasha2.ocsp-certum.com04
unknown
http://crl.entrust.net/ovcs2.crl0
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://crl.entrust.net/csbr1.crl0
unknown
https://www.remobjects.com/ps
unknown
http://aia.entrust.net/ovcs2-chain.p7c01
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://subca.ocsp-certum.com01
unknown
https://www.innosetup.com/
unknown
https://sectigo.com/CPS0D
unknown
https://www.dell.com/support/home/en-usNhttps://www.dell.com/support/home/en-usNhttps://www.dell.com
unknown
https://jrsoftware.org0
unknown
https://jrsoftware.org/
unknown
http://crl.entrust.net/ts2ca.crl0
unknown
http://www.entrust.net/rpa0
unknown
http://www.certum.pl/CPS0
unknown
https://www.entrust.net/rpa0
unknown
There are 23 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.exe\OpenWithProgids
DellDockFW_UPGRADE_UTILITYFile.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DellDockFW_UPGRADE_UTILITYFile.exe
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DellDockFW_UPGRADE_UTILITYFile.exe\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DellDockFW_UPGRADE_UTILITYFile.exe\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe\SupportedTypes
.myp
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
EstimatedSize
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9A0000
heap
page read and write
600000
heap
page read and write
38E1000
heap
page read and write
910000
heap
page read and write
2B8C5350000
heap
page read and write
391E000
heap
page read and write
8D7000
heap
page read and write
23E1000
direct allocation
page read and write
34D0000
unkown
page readonly
7FF719A22000
unkown
page readonly
2468000
direct allocation
page read and write
253A000
direct allocation
page read and write
2820000
heap
page read and write
B0E000
heap
page read and write
870000
heap
page read and write
2598000
direct allocation
page read and write
2346000
direct allocation
page read and write
14001F000
unkown
page write copy
AC8000
heap
page read and write
916000
heap
page read and write
C097AF000
stack
page read and write
500000
heap
page read and write
401000
unkown
page execute read
233F000
direct allocation
page read and write
B65000
heap
page read and write
7FF7199FF000
unkown
page read and write
6F4000
unkown
page readonly
7FF7199F8000
unkown
page write copy
1C0000
heap
page read and write
7FF7199F8000
unkown
page read and write
238A000
direct allocation
page read and write
2471000
direct allocation
page read and write
24A7000
direct allocation
page read and write
2420000
heap
page read and write
61C000
heap
page read and write
2583000
direct allocation
page read and write
22F7000
direct allocation
page read and write
2B8C53B0000
heap
page read and write
B24000
heap
page read and write
24FF000
direct allocation
page read and write
2570000
direct allocation
page read and write
34CD000
direct allocation
page read and write
93000
stack
page read and write
24D2000
direct allocation
page read and write
140022000
unkown
page readonly
24FC000
direct allocation
page read and write
2B8C5179000
heap
page read and write
885000
heap
page read and write
400000
unkown
page readonly
34D3000
unkown
page readonly
2B8C518D000
heap
page read and write
18E000
stack
page read and write
255F000
direct allocation
page read and write
265A000
direct allocation
page read and write
258A000
direct allocation
page read and write
234D000
direct allocation
page read and write
14001F000
unkown
page read and write
38E1000
heap
page read and write
2B8C518D000
heap
page read and write
22E9000
direct allocation
page read and write
236B000
direct allocation
page read and write
2280000
heap
page read and write
34B0000
direct allocation
page read and write
7FF719953000
unkown
page readonly
2532000
direct allocation
page read and write
140001000
unkown
page execute read
2B8C4FE0000
heap
page read and write
2514000
direct allocation
page read and write
2305000
direct allocation
page read and write
4F0000
heap
page read and write
2314000
direct allocation
page read and write
257C000
direct allocation
page read and write
2381000
direct allocation
page read and write
22F0000
direct allocation
page read and write
2B8C5179000
heap
page read and write
4C6000
unkown
page readonly
4B7000
unkown
page write copy
3960000
heap
page read and write
401000
unkown
page execute read
4B7000
unkown
page read and write
6CE000
unkown
page read and write
889000
heap
page read and write
17B51C20000
heap
page read and write
2B8C6D40000
heap
page read and write
2574000
direct allocation
page read and write
4C2000
unkown
page write copy
8D0000
heap
page read and write
608000
heap
page read and write
246B000
direct allocation
page read and write
400000
unkown
page readonly
248A000
direct allocation
page read and write
2322000
direct allocation
page read and write
256D000
direct allocation
page read and write
23B6000
direct allocation
page read and write
2B8C516E000
heap
page read and write
34E0000
direct allocation
page read and write
2558000
direct allocation
page read and write
140000000
unkown
page readonly
6D6000
unkown
page read and write
4D0000
heap
page read and write
9B000
stack
page read and write
37B6000
direct allocation
page read and write
6C7000
unkown
page write copy
2B8C5140000
heap
page read and write
2331000
direct allocation
page read and write
A90000
direct allocation
page read and write
2B8C5169000
heap
page read and write
C09A7F000
stack
page read and write
C0972C000
stack
page read and write
2B8C6D43000
heap
page read and write
2B8C50E0000
heap
page read and write
24F0000
direct allocation
page read and write
2B8C518D000
heap
page read and write
B22000
heap
page read and write
2B8C5146000
heap
page read and write
4B9000
unkown
page read and write
2364000
direct allocation
page read and write
B21000
heap
page read and write
3860000
heap
page read and write
24B5000
direct allocation
page read and write
2CB0000
trusted library allocation
page read and write
B37000
heap
page read and write
252B000
direct allocation
page read and write
23DA000
direct allocation
page read and write
140001000
unkown
page execute read
24E5000
direct allocation
page read and write
37AB000
direct allocation
page read and write
550000
heap
page read and write
140000000
unkown
page readonly
34D1000
unkown
page execute read
880000
heap
page read and write
24AE000
direct allocation
page read and write
2356000
direct allocation
page read and write
38E1000
heap
page read and write
CA467FF000
stack
page read and write
2591000
direct allocation
page read and write
1A0000
heap
page read and write
24CB000
direct allocation
page read and write
6D1000
unkown
page read and write
2150000
heap
page read and write
A00000
direct allocation
page execute and read and write
230D000
direct allocation
page read and write
17B51CB0000
heap
page read and write
2524000
direct allocation
page read and write
37E7000
direct allocation
page read and write
710000
heap
page read and write
970000
heap
page read and write
140022000
unkown
page readonly
556000
heap
page read and write
7FF719A08000
unkown
page readonly
2B8C518D000
heap
page read and write
4C0000
unkown
page read and write
7FB50000
direct allocation
page read and write
34BB000
direct allocation
page read and write
B1A000
heap
page read and write
2B8C53B4000
heap
page read and write
2391000
direct allocation
page read and write
38E1000
heap
page read and write
B08000
heap
page read and write
23C4000
direct allocation
page read and write
C09AFF000
stack
page read and write
7FF719A08000
unkown
page readonly
2460000
direct allocation
page read and write
2B8C516B000
heap
page read and write
AC0000
heap
page read and write
235D000
direct allocation
page read and write
17B51CBB000
heap
page read and write
23AF000
direct allocation
page read and write
22D0000
direct allocation
page read and write
17B51CB8000
heap
page read and write
6C7000
unkown
page read and write
23CC000
direct allocation
page read and write
231B000
direct allocation
page read and write
2B8C50C0000
heap
page read and write
82E000
stack
page read and write
7FF719953000
unkown
page readonly
2B8C514C000
heap
page read and write
CA466FF000
stack
page read and write
17B51C50000
heap
page read and write
7FF719A22000
unkown
page readonly
3961000
heap
page read and write
2B8C5179000
heap
page read and write
250D000
direct allocation
page read and write
AFF000
heap
page read and write
7FF719781000
unkown
page execute read
B13000
heap
page read and write
2483000
direct allocation
page read and write
4C4000
unkown
page readonly
24BD000
direct allocation
page read and write
9DF000
stack
page read and write
B2F000
heap
page read and write
7FF719781000
unkown
page execute read
17B51B20000
heap
page read and write
2B8C517A000
heap
page read and write
530000
heap
page read and write
8D6000
heap
page read and write
7FF7199FB000
unkown
page write copy
19D000
stack
page read and write
34C4000
direct allocation
page read and write
23D3000
direct allocation
page read and write
2B8C5179000
heap
page read and write
38E1000
heap
page read and write
A80000
heap
page read and write
23E8000
direct allocation
page read and write
2499000
direct allocation
page read and write
2640000
heap
page read and write
B26000
heap
page read and write
190000
heap
page read and write
34B0000
direct allocation
page read and write
34B0000
heap
page read and write
B1A000
heap
page read and write
CA463CB000
stack
page read and write
520000
heap
page read and write
140018000
unkown
page readonly
7FF719780000
unkown
page readonly
2329000
direct allocation
page read and write
7FE36000
direct allocation
page read and write
22FE000
direct allocation
page read and write
2338000
direct allocation
page read and write
2B8C5171000
heap
page read and write
2B8C5146000
heap
page read and write
14C000
stack
page read and write
7FF719780000
unkown
page readonly
2823000
heap
page read and write
A90000
direct allocation
page read and write
55C000
heap
page read and write
2B8C517B000
heap
page read and write
24C4000
direct allocation
page read and write
23BD000
direct allocation
page read and write
17B51C54000
heap
page read and write
2491000
direct allocation
page read and write
2566000
direct allocation
page read and write
2570000
direct allocation
page read and write
24A0000
direct allocation
page read and write
2541000
direct allocation
page read and write
2548000
direct allocation
page read and write
140018000
unkown
page readonly
2B8C514C000
heap
page read and write
6DE000
unkown
page readonly
7FF719A03000
unkown
page read and write
2398000
direct allocation
page read and write
9F0000
heap
page read and write
24E8000
direct allocation
page read and write
2506000
direct allocation
page read and write
B00000
heap
page read and write
17B51C00000
heap
page read and write
23A8000
direct allocation
page read and write
6E0000
unkown
page readonly
6DD000
unkown
page read and write
6D9000
unkown
page write copy
There are 240 hidden memdumps, click here to show them.