IOC Report
tatuJHXSR4.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tatuJHXSR4.exe
"C:\Users\user\Desktop\tatuJHXSR4.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
communicationgenerwo.shop
malicious
pillowbrocccolipe.shop
malicious
enthusiasimtitleow.shop
malicious
worryfillvolcawoi.shop
malicious
dismissalcylinderhostw.shop
malicious
diskretainvigorousiw.shop
malicious
cleartotalfisherwo.shop
malicious
affordcharmcropwo.shop
malicious
https://communicationgenerwo.shop/apix
unknown
http://html4/loose.dtd
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://communicationgenerwo.shop/apilJ
unknown
https://communicationgenerwo.shop/api
172.67.166.251
https://login.chinacloudapi.cn/no_standard_descript
unknown
https://communicationgenerwo.shop/Ri
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictcorruption
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://communicationgenerwo.shop/Xi
unknown
http://.css
unknown
https://communicationgenerwo.shop/y
unknown
https://communicationgenerwo.shop/api/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://login.microsoftonline.us/application/x-www-for
unknown
https://communicationgenerwo.shop/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://communicationgenerwo.shop/api9J
unknown
https://login.microsoftonline.com/%s
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://communicationgenerwo.shop/apidZ
unknown
https://communicationgenerwo.shop/e
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://.jpg
unknown
https://www.mozilla.or
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
communicationgenerwo.shop
172.67.166.251
malicious

IPs

IP
Domain
Country
Malicious
172.67.166.251
communicationgenerwo.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C0002D6000
direct allocation
page read and write
malicious
D22000
heap
page read and write
CAC000
heap
page read and write
D47000
heap
page read and write
7FF67ED05000
unkown
page read and write
4F4C000
trusted library allocation
page read and write
D11000
heap
page read and write
C000142000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C0004B9000
direct allocation
page read and write
4F82000
trusted library allocation
page read and write
4FE3000
trusted library allocation
page read and write
D20000
heap
page read and write
5D87000
trusted library allocation
page read and write
2243F6A3000
direct allocation
page read and write
4F7C000
trusted library allocation
page read and write
4F5F000
trusted library allocation
page read and write
4FCB000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
D20000
heap
page read and write
D26000
heap
page read and write
C000022000
direct allocation
page read and write
4F50000
trusted library allocation
page read and write
C0004B5000
direct allocation
page read and write
4F57000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
D20000
heap
page read and write
C000174000
direct allocation
page read and write
4F77000
trusted library allocation
page read and write
2243F4A4000
heap
page read and write
4F95000
trusted library allocation
page read and write
7FF67ED0F000
unkown
page write copy
4F75000
trusted library allocation
page read and write
2243F400000
heap
page read and write
CC929FE000
stack
page read and write
2243F6A0000
direct allocation
page read and write
D47000
heap
page read and write
BBD000
stack
page read and write
4F57000
trusted library allocation
page read and write
D16000
heap
page read and write
4F72000
trusted library allocation
page read and write
D16000
heap
page read and write
D18000
heap
page read and write
D18000
heap
page read and write
C0001BA000
direct allocation
page read and write
4F44000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
CAC000
heap
page read and write
CF1000
heap
page read and write
D35000
heap
page read and write
4F5D000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
CF4000
heap
page read and write
C00013C000
direct allocation
page read and write
D47000
heap
page read and write
4F7F000
trusted library allocation
page read and write
D35000
heap
page read and write
BFE000
stack
page read and write
D11000
heap
page read and write
C000154000
direct allocation
page read and write
D13000
heap
page read and write
D13000
heap
page read and write
C000178000
direct allocation
page read and write
517E000
stack
page read and write
D29000
heap
page read and write
4F75000
trusted library allocation
page read and write
4F8A000
trusted library allocation
page read and write
CF3000
heap
page read and write
4F57000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
4F96000
trusted library allocation
page read and write
C97000
heap
page read and write
D2A000
heap
page read and write
4FD8000
trusted library allocation
page read and write
D13000
heap
page read and write
4F8D000
trusted library allocation
page read and write
D37000
heap
page read and write
4F41000
trusted library allocation
page read and write
7FF67E6E6000
unkown
page write copy
D20000
heap
page read and write
4F77000
trusted library allocation
page read and write
7FF67E2A1000
unkown
page execute read
4F41000
trusted library allocation
page read and write
D29000
heap
page read and write
C00011A000
direct allocation
page read and write
CAC000
heap
page read and write
C7F000
heap
page read and write
4F61000
trusted library allocation
page read and write
22464AA0000
direct allocation
page read and write
D17000
heap
page read and write
D13000
heap
page read and write
C00038A000
direct allocation
page read and write
4F5E000
trusted library allocation
page read and write
C000150000
direct allocation
page read and write
D35000
heap
page read and write
D10000
heap
page read and write
D2A000
heap
page read and write
4F50000
trusted library allocation
page read and write
504F000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
C96000
heap
page read and write
D47000
heap
page read and write
4F7F000
trusted library allocation
page read and write
CF4000
heap
page read and write
C00041E000
direct allocation
page read and write
C000110000
direct allocation
page read and write
4F64000
trusted library allocation
page read and write
C000080000
direct allocation
page read and write
48F0000
heap
page read and write
4F9E000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
4FE9000
trusted library allocation
page read and write
2243F3F0000
heap
page read and write
D2C000
heap
page read and write
4F59000
trusted library allocation
page read and write
C00012C000
direct allocation
page read and write
C000107000
direct allocation
page read and write
CAC000
heap
page read and write
D2C000
heap
page read and write
C7F000
heap
page read and write
4F64000
trusted library allocation
page read and write
D14000
heap
page read and write
D2A000
heap
page read and write
C0000B2000
direct allocation
page read and write
C00016A000
direct allocation
page read and write
D0F000
heap
page read and write
4F49000
trusted library allocation
page read and write
D17000
heap
page read and write
D36000
heap
page read and write
2243F775000
heap
page read and write
C00004B000
direct allocation
page read and write
4F63000
trusted library allocation
page read and write
C000118000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
4FDF000
trusted library allocation
page read and write
C0004B0000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C000070000
direct allocation
page read and write
4FA5000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
D13000
heap
page read and write
4F7C000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
D20000
heap
page read and write
4F86000
trusted library allocation
page read and write
A80000
heap
page read and write
D36000
heap
page read and write
4F40000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
D18000
heap
page read and write
CF4000
heap
page read and write
4F64000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
4F5D000
trusted library allocation
page read and write
4F89000
trusted library allocation
page read and write
D19000
heap
page read and write
7FF67E6E9000
unkown
page read and write
C0000B0000
direct allocation
page read and write
D29000
heap
page read and write
4F5E000
trusted library allocation
page read and write
CFB000
heap
page read and write
4FE9000
trusted library allocation
page read and write
7FF67E6E3000
unkown
page read and write
CAC000
heap
page read and write
C96000
heap
page read and write
7FF67EC77000
unkown
page read and write
C000126000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
4FA0000
trusted library allocation
page read and write
D20000
heap
page read and write
C0000BA000
direct allocation
page read and write
CAC000
heap
page read and write
4FD0000
trusted library allocation
page read and write
C00005B000
direct allocation
page read and write
D03000
heap
page read and write
C20000
remote allocation
page read and write
C000090000
direct allocation
page read and write
C000024000
direct allocation
page read and write
D20000
heap
page read and write
4F94000
trusted library allocation
page read and write
B60000
heap
page read and write
D37000
heap
page read and write
7FF67E2A0000
unkown
page readonly
C000262000
direct allocation
page read and write
C000068000
direct allocation
page read and write
7FF67ED12000
unkown
page write copy
D11000
heap
page read and write
D01000
heap
page read and write
D20000
heap
page read and write
7E0000
heap
page read and write
22464AE6000
direct allocation
page read and write
D20000
heap
page read and write
CC925FD000
stack
page read and write
CF4000
heap
page read and write
C94000
heap
page read and write
D2A000
heap
page read and write
4FA8000
trusted library allocation
page read and write
CAC000
heap
page read and write
D16000
heap
page read and write
4F70000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
CF8000
heap
page read and write
718000
stack
page read and write
4F5E000
trusted library allocation
page read and write
2243F680000
direct allocation
page read and write
D2C000
heap
page read and write
5055000
trusted library allocation
page read and write
C00011C000
direct allocation
page read and write
C7F000
heap
page read and write
C0000C0000
direct allocation
page read and write
4F8E000
trusted library allocation
page read and write
D2A000
heap
page read and write
4FA7000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
C0000C4000
direct allocation
page read and write
CC927FF000
stack
page read and write
4F73000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
7FF67E2A1000
unkown
page execute read
C000008000
direct allocation
page read and write
4F95000
trusted library allocation
page read and write
7FF67E6DF000
unkown
page write copy
D47000
heap
page read and write
4F57000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000116000
direct allocation
page read and write
7D0000
heap
page read and write
CAC000
heap
page read and write
7FF67E756000
unkown
page readonly
D16000
heap
page read and write
4F90000
trusted library allocation
page read and write
4FE9000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
D25000
heap
page read and write
D19000
heap
page read and write
CF4000
heap
page read and write
D47000
heap
page read and write
CF4000
heap
page read and write
4FEB000
trusted library allocation
page read and write
CC92FFC000
stack
page read and write
4F98000
trusted library allocation
page read and write
6DB000
stack
page read and write
7FF67ED0E000
unkown
page write copy
4F69000
trusted library allocation
page read and write
4F5C000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
C00015C000
direct allocation
page read and write
4F69000
trusted library allocation
page read and write
C000057000
direct allocation
page read and write
4F95000
trusted library allocation
page read and write
C000176000
direct allocation
page read and write
483E000
stack
page read and write
7FF67E750000
unkown
page read and write
7FF67E737000
unkown
page read and write
D2A000
heap
page read and write
C0004A0000
direct allocation
page read and write
D0B000
heap
page read and write
C7A000
heap
page read and write
51EB000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
C000031000
direct allocation
page read and write
D46000
heap
page read and write
D2A000
heap
page read and write
C0000AA000
direct allocation
page read and write
D18000
heap
page read and write
4F7C000
trusted library allocation
page read and write
4F44000
trusted library allocation
page read and write
512E000
trusted library allocation
page read and write
5040000
heap
page read and write
A87000
heap
page read and write
CC92BFF000
stack
page read and write
7FF67E752000
unkown
page write copy
4F77000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
48BE000
stack
page read and write
7FF67E6E5000
unkown
page read and write
7FF67EC92000
unkown
page read and write
D1F000
heap
page read and write
C000046000
direct allocation
page read and write
D47000
heap
page read and write
D2C000
heap
page read and write
4F50000
trusted library allocation
page read and write
C000000000
direct allocation
page read and write
D16000
heap
page read and write
D35000
heap
page read and write
D18000
heap
page read and write
7FF67ED21000
unkown
page readonly
D2C000
heap
page read and write
C000050000
direct allocation
page read and write
D16000
heap
page read and write
CF4000
heap
page read and write
C73000
heap
page read and write
D20000
heap
page read and write
487E000
stack
page read and write
C000102000
direct allocation
page read and write
4F80000
trusted library allocation
page read and write
2243F760000
direct allocation
page read and write
4FB2000
trusted library allocation
page read and write
2243F454000
direct allocation
page read and write
5086000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
D2A000
heap
page read and write
D20000
heap
page read and write
D25000
heap
page read and write
D47000
heap
page read and write
2243F458000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C0004B0000
direct allocation
page read and write
506E000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
D46000
heap
page read and write
D1B000
heap
page read and write
A85000
heap
page read and write
2243F49C000
heap
page read and write
C00003B000
direct allocation
page read and write
D37000
heap
page read and write
4F96000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
5041000
heap
page read and write
C0005FC000
direct allocation
page read and write
D35000
heap
page read and write
D13000
heap
page read and write
4F5F000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
D35000
heap
page read and write
D2A000
heap
page read and write
C000060000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
7FF67E6EA000
unkown
page write copy
C00005D000
direct allocation
page read and write
D20000
heap
page read and write
4F82000
trusted library allocation
page read and write
C00010C000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C0004B7000
direct allocation
page read and write
4F90000
trusted library allocation
page read and write
C58000
heap
page read and write
C0000D3000
direct allocation
page read and write
C94000
heap
page read and write
D10000
heap
page read and write
D29000
heap
page read and write
D47000
heap
page read and write
D35000
heap
page read and write
4F89000
trusted library allocation
page read and write
5360000
heap
page read and write
4FC0000
trusted library allocation
page read and write
D29000
heap
page read and write
4F73000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
7FF67E73C000
unkown
page write copy
4FA8000
trusted library allocation
page read and write
D20000
heap
page read and write
C0000BC000
direct allocation
page read and write
4F44000
trusted library allocation
page read and write
7FF67ED00000
unkown
page read and write
C000164000
direct allocation
page read and write
D47000
heap
page read and write
4F57000
trusted library allocation
page read and write
D1F000
heap
page read and write
D13000
heap
page read and write
537A000
trusted library allocation
page read and write
D47000
heap
page read and write
CC92DFD000
stack
page read and write
4F87000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
C000088000
direct allocation
page read and write
D20000
heap
page read and write
D25000
heap
page read and write
7FF67E756000
unkown
page readonly
D10000
heap
page read and write
C000400000
direct allocation
page read and write
2243F499000
heap
page read and write
CAC000
heap
page read and write
4F53000
trusted library allocation
page read and write
D20000
heap
page read and write
C000180000
direct allocation
page read and write
D29000
heap
page read and write
4F90000
trusted library allocation
page read and write
D2C000
heap
page read and write
C00008E000
direct allocation
page read and write
D29000
heap
page read and write
C000112000
direct allocation
page read and write
D20000
heap
page read and write
D13000
heap
page read and write
4F81000
trusted library allocation
page read and write
C000028000
direct allocation
page read and write
7FF67ED21000
unkown
page readonly
D2C000
heap
page read and write
E4E000
stack
page read and write
4F7E000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
4F5B000
trusted library allocation
page read and write
D20000
heap
page read and write
4F3E000
stack
page read and write
D0F000
heap
page read and write
4F98000
trusted library allocation
page read and write
D21000
heap
page read and write
4F62000
trusted library allocation
page read and write
4FF8000
trusted library allocation
page read and write
D13000
heap
page read and write
4F70000
trusted library allocation
page read and write
C00017A000
direct allocation
page read and write
D18000
heap
page read and write
D47000
heap
page read and write
C000064000
direct allocation
page read and write
4F8B000
trusted library allocation
page read and write
CF4000
heap
page read and write
C000052000
direct allocation
page read and write
7FF67E74D000
unkown
page write copy
CF4000
heap
page read and write
D22000
heap
page read and write
CAC000
heap
page read and write
7FF67ED12000
unkown
page write copy
C000084000
direct allocation
page read and write
D2A000
heap
page read and write
C96000
heap
page read and write
4F57000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
4E3F000
stack
page read and write
2243F720000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
C000066000
direct allocation
page read and write
D46000
heap
page read and write
4F49000
trusted library allocation
page read and write
D2A000
heap
page read and write
D20000
heap
page read and write
D14000
heap
page read and write
C00003D000
direct allocation
page read and write
D13000
heap
page read and write
4F93000
trusted library allocation
page read and write
7FF67E6DF000
unkown
page read and write
CF4000
heap
page read and write
4F80000
trusted library allocation
page read and write
C7A000
heap
page read and write
4F80000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
7FF67E73A000
unkown
page read and write
C000152000
direct allocation
page read and write
D47000
heap
page read and write
7FF67EC99000
unkown
page read and write
4F75000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
2F9E000
stack
page read and write
D16000
heap
page read and write
C00011E000
direct allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
51BE000
trusted library allocation
page read and write
4F87000
trusted library allocation
page read and write
7FF67E73E000
unkown
page read and write
4F93000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
4F97000
trusted library allocation
page read and write
4F81000
trusted library allocation
page read and write
7FF67E6E4000
unkown
page write copy
D20000
heap
page read and write
D35000
heap
page read and write
D29000
heap
page read and write
4FB1000
trusted library allocation
page read and write
7FF67ED0E000
unkown
page read and write
C20000
remote allocation
page read and write
D36000
heap
page read and write
51EC000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
D46000
heap
page read and write
4FF8000
trusted library allocation
page read and write
C000160000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
4F70000
trusted library allocation
page read and write
D18000
heap
page read and write
D20000
heap
page read and write
D20000
heap
page read and write
796000
remote allocation
page execute and read and write
C0000B4000
direct allocation
page read and write
D2A000
heap
page read and write
C0000CA000
direct allocation
page read and write
D22000
heap
page read and write
7FF67E754000
unkown
page read and write
D47000
heap
page read and write
D20000
heap
page read and write
D18000
heap
page read and write
2243F6E1000
direct allocation
page read and write
4FA8000
trusted library allocation
page read and write
CF4000
heap
page read and write
CAC000
heap
page read and write
D13000
heap
page read and write
C000162000
direct allocation
page read and write
D47000
heap
page read and write
C000036000
direct allocation
page read and write
51BF000
stack
page read and write
A3E000
stack
page read and write
5877000
trusted library allocation
page read and write
7FF67E2A0000
unkown
page readonly
C00004D000
direct allocation
page read and write
D2A000
heap
page read and write
4F8D000
trusted library allocation
page read and write
7FF67E739000
unkown
page write copy
C00016C000
direct allocation
page read and write
C000026000
direct allocation
page read and write
C96000
heap
page read and write
4FD1000
trusted library allocation
page read and write
CF4000
heap
page read and write
D17000
heap
page read and write
CC931FF000
stack
page read and write
4F63000
trusted library allocation
page read and write
750000
remote allocation
page execute and read and write
D19000
heap
page read and write
C96000
heap
page read and write
D13000
heap
page read and write
C000038000
direct allocation
page read and write
A7E000
stack
page read and write
4F76000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
4FF8000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
49FC000
stack
page read and write
C00006E000
direct allocation
page read and write
C0004B7000
direct allocation
page read and write
D16000
heap
page read and write
CBA000
heap
page read and write
D47000
heap
page read and write
C00053F000
direct allocation
page read and write
D2A000
heap
page read and write
2243F450000
direct allocation
page read and write
C0004B9000
direct allocation
page read and write
2243F490000
heap
page read and write
C96000
heap
page read and write
C000100000
direct allocation
page read and write
22464AF0000
direct allocation
page read and write
D20000
heap
page read and write
D11000
heap
page read and write
D35000
heap
page read and write
C000166000
direct allocation
page read and write
C50000
heap
page read and write
C00008A000
direct allocation
page read and write
C96000
heap
page read and write
D47000
heap
page read and write
4F75000
trusted library allocation
page read and write
22464A50000
direct allocation
page read and write
4F90000
trusted library allocation
page read and write
D2A000
heap
page read and write
4FC5000
trusted library allocation
page read and write
C000020000
direct allocation
page read and write
4FAA000
trusted library allocation
page read and write
2243F690000
direct allocation
page read and write
4F5E000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
CBA000
heap
page read and write
D47000
heap
page read and write
4F84000
trusted library allocation
page read and write
D47000
heap
page read and write
C0003D4000
direct allocation
page read and write
4F57000
trusted library allocation
page read and write
4FAA000
trusted library allocation
page read and write
4FE9000
trusted library allocation
page read and write
D47000
heap
page read and write
4F96000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
4F44000
trusted library allocation
page read and write
C94000
heap
page read and write
4FF8000
trusted library allocation
page read and write
C000092000
direct allocation
page read and write
4F4C000
trusted library allocation
page read and write
D29000
heap
page read and write
D1D000
heap
page read and write
C00001A000
direct allocation
page read and write
4F7E000
trusted library allocation
page read and write
CB9000
heap
page read and write
2243F420000
heap
page read and write
4F90000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
50F6000
trusted library allocation
page read and write
2243F770000
heap
page read and write
2243F6EA000
direct allocation
page read and write
7FF67E6E2000
unkown
page write copy
4FBA000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
D47000
heap
page read and write
C00008C000
direct allocation
page read and write
22464A50000
direct allocation
page read and write
There are 584 hidden memdumps, click here to show them.