IOC Report
3GJ6S3Kwnb

loading gif

Files

File Path
Type
Category
Malicious
3GJ6S3Kwnb.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Airplane_6.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_SL.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\DiFxAPI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\HPPrintScanDoctorDeploymentMgr.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\NativeAdapter.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\REINSPECTED.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\Velsespladser5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\igoAudSessionMonitor.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsj9DE8.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3GJ6S3Kwnb.exe
"C:\Users\user\Desktop\3GJ6S3Kwnb.exe"
malicious

URLs

Name
IP
Malicious
http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bin
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3300000
direct allocation
page execute and read and write
malicious
74E412B000
stack
page read and write
23F8A700000
heap
page read and write
1BE2FFB000
stack
page read and write
1CF6A851000
heap
page read and write
1F48A2C0000
heap
page read and write
209D947A000
heap
page read and write
14A1B849000
heap
page read and write
1B3B55E0000
remote allocation
page read and write
9BCFB7E000
stack
page read and write
209DEE00000
trusted library allocation
page read and write
210D6708000
heap
page read and write
A41507E000
stack
page read and write
203FD700000
trusted library allocation
page read and write
1B3B3C00000
heap
page read and write
16919029000
heap
page read and write
210D6660000
heap
page read and write
2694FE00000
heap
page read and write
209DEAD0000
trusted library allocation
page read and write
9BCFCFE000
stack
page read and write
435000
unkown
page read and write
23AD000
stack
page read and write
209DECFD000
heap
page read and write
408000
unkown
page readonly
203FE490000
trusted library allocation
page read and write
400000
unkown
page readonly
20701200000
heap
page read and write
209DE9D1000
trusted library allocation
page read and write
269505F0000
remote allocation
page read and write
80F000
heap
page read and write
14A1B813000
heap
page read and write
2819000
trusted library allocation
page read and write
634727A000
stack
page read and write
209DEC48000
heap
page read and write
D9477C000
stack
page read and write
1CF6A802000
heap
page read and write
235E000
stack
page read and write
1F45A332000
heap
page read and write
836000
heap
page read and write
209D9514000
heap
page read and write
401000
unkown
page execute read
203FD4C8000
heap
page read and write
6B3F4FA000
stack
page read and write
1B3B3C58000
heap
page read and write
1A0C2A8A000
heap
page read and write
1B3B3C68000
heap
page read and write
209DEB10000
remote allocation
page read and write
209DEC4A000
heap
page read and write
203FD5E0000
heap
page read and write
20701259000
heap
page read and write
DC0027D000
stack
page read and write
60E92FF000
stack
page read and write
14A1B84F000
heap
page read and write
1A0C2B00000
heap
page read and write
210D667D000
heap
page read and write
14A1B887000
heap
page read and write
2360000
trusted library allocation
page read and write
20701231000
heap
page read and write
2070126F000
heap
page read and write
203FD50C000
heap
page read and write
5E320FE000
stack
page read and write
209DE820000
trusted library allocation
page read and write
20701260000
heap
page read and write
209D9400000
heap
page read and write
23F8A681000
heap
page read and write
209D9310000
trusted library allocation
page read and write
2070127D000
heap
page read and write
850000
heap
page read and write
2694FE02000
heap
page read and write
209DED02000
heap
page read and write
1A0C2A00000
heap
page read and write
209DECE6000
heap
page read and write
7E0000
heap
page read and write
23C0000
heap
page read and write
1CF6A7E0000
heap
page read and write
1CF6B0A0000
remote allocation
page read and write
209D91B0000
heap
page read and write
1BE2DF9000
stack
page read and write
74E467B000
stack
page read and write
2070124D000
heap
page read and write
203FD745000
heap
page read and write
209D93E1000
trusted library allocation
page read and write
6347479000
stack
page read and write
209D9D02000
heap
page read and write
820000
heap
page read and write
9BCFFFC000
stack
page read and write
14A1B892000
heap
page read and write
20701286000
heap
page read and write
DC000F9000
stack
page read and write
81B000
heap
page read and write
23F8A6AF000
heap
page read and write
1839304A000
heap
page read and write
209D9C15000
heap
page read and write
209DEAC0000
trusted library allocation
page read and write
1E889420000
heap
page read and write
34EBB7E000
stack
page read and write
2300000
trusted library allocation
page read and write
836000
heap
page read and write
850000
heap
page read and write
1F48A3C0000
heap
page read and write
A41557E000
stack
page read and write
1B3B3AF0000
heap
page read and write
269505C0000
trusted library allocation
page read and write
1F4598BB000
heap
page read and write
23F8AE02000
trusted library allocation
page read and write
820000
heap
page read and write
209DE9BE000
trusted library allocation
page read and write
14A1C202000
trusted library allocation
page read and write
22DF000
stack
page read and write
60E8DFC000
stack
page read and write
63474FE000
stack
page read and write
BBE5B9E000
stack
page read and write
708647E000
stack
page read and write
1A0C2A70000
heap
page read and write
209DE9D4000
trusted library allocation
page read and write
1A0C2A29000
heap
page read and write
1F459900000
heap
page read and write
2694FCC0000
heap
page read and write
209DEC00000
heap
page read and write
16919013000
heap
page read and write
1A0C2B08000
heap
page read and write
1839305E000
heap
page read and write
60E91FF000
stack
page read and write
1B3B3C13000
heap
page read and write
209D9C00000
heap
page read and write
1F48A640000
heap
page read and write
BBE5B1B000
stack
page read and write
1BE2BF7000
stack
page read and write
80F000
heap
page read and write
1CF6A85D000
heap
page read and write
14A1B800000
heap
page read and write
851EBFF000
stack
page read and write
1BE2EFE000
stack
page read and write
1F459902000
heap
page read and write
203FD4C0000
heap
page read and write
1A0C2A5D000
heap
page read and write
269505F0000
remote allocation
page read and write
209D9D59000
heap
page read and write
14A1B7A0000
trusted library allocation
page read and write
836000
heap
page read and write
DC7FE7C000
stack
page read and write
354367E000
stack
page read and write
1E889430000
heap
page read and write
281E000
trusted library allocation
page read and write
BC0000
heap
page read and write
1B3B3D00000
heap
page read and write
5E3207C000
stack
page read and write
209DE810000
trusted library allocation
page read and write
1A0C2A7D000
heap
page read and write
209D9D18000
heap
page read and write
851E57E000
stack
page read and write
427000
unkown
page read and write
203FD750000
trusted library allocation
page read and write
209DE9E0000
trusted library allocation
page read and write
5E3217D000
stack
page read and write
BC6000
heap
page read and write
16919802000
trusted library allocation
page read and write
437000
unkown
page read and write
209D94FE000
heap
page read and write
269505F0000
remote allocation
page read and write
60E90FE000
stack
page read and write
18393064000
heap
page read and write
70863FC000
stack
page read and write
1A0C29B0000
heap
page read and write
203FD650000
trusted library allocation
page read and write
23F8A520000
trusted library allocation
page read and write
2070127C000
heap
page read and write
209DEB10000
trusted library allocation
page read and write
851E67C000
stack
page read and write
210D6510000
heap
page read and write
6A0000
heap
page read and write
6B3F4FF000
stack
page read and write
1A0C2A61000
heap
page read and write
D94C7B000
stack
page read and write
1BE377F000
stack
page read and write
1B3B3A90000
heap
page read and write
850000
heap
page read and write
209DEC19000
heap
page read and write
DC00079000
stack
page read and write
281E000
trusted library allocation
page read and write
2070123C000
heap
page read and write
4C1000
unkown
page readonly
209DEAE0000
trusted library allocation
page read and write
23F8A3C0000
heap
page read and write
40A000
unkown
page read and write
80F000
heap
page read and write
18393000000
heap
page read and write
1839303C000
heap
page read and write
209D9C02000
heap
page read and write
18393013000
heap
page read and write
A414B9B000
stack
page read and write
634737F000
stack
page read and write
1B3B3D18000
heap
page read and write
1E889668000
heap
page read and write
209D94FE000
heap
page read and write
1B3B5840000
trusted library allocation
page read and write
203FD660000
trusted library allocation
page read and write
9BCFDFF000
stack
page read and write
34EBE77000
stack
page read and write
1A0C2B02000
heap
page read and write
5E322FF000
stack
page read and write
209DA803000
trusted library allocation
page read and write
60E93FE000
stack
page read and write
81B000
heap
page read and write
209DEC0D000
heap
page read and write
820000
heap
page read and write
209DEE20000
trusted library allocation
page read and write
18392E00000
heap
page read and write
1BE327B000
stack
page read and write
209DECAC000
heap
page read and write
209D9429000
heap
page read and write
18393113000
heap
page read and write
836000
heap
page read and write
18392E70000
heap
page read and write
209D94A8000
heap
page read and write
408000
unkown
page readonly
209D9D18000
heap
page read and write
1F459780000
trusted library allocation
page read and write
16919076000
heap
page read and write
209DEB00000
trusted library allocation
page read and write
20701262000
heap
page read and write
16919041000
heap
page read and write
209DEA90000
trusted library allocation
page read and write
16918EB0000
heap
page read and write
1B3B3C68000
heap
page read and write
1BE357B000
stack
page read and write
DC001F9000
stack
page read and write
1B3B55E0000
remote allocation
page read and write
1E889702000
heap
page read and write
2070125A000
heap
page read and write
209DE9D0000
trusted library allocation
page read and write
14A1B829000
heap
page read and write
1CF6A813000
heap
page read and write
209D9507000
heap
page read and write
1F4598E1000
heap
page read and write
20701190000
heap
page read and write
1CF6A870000
heap
page read and write
70862FE000
stack
page read and write
1B3B3C57000
heap
page read and write
20701229000
heap
page read and write
203FD50E000
heap
page read and write
81B000
heap
page read and write
1B3B3C2A000
heap
page read and write
18393086000
heap
page read and write
1CF6A780000
heap
page read and write
D94CFF000
stack
page read and write
1E889490000
heap
page read and write
354347B000
stack
page read and write
203FD740000
heap
page read and write
34EBA7C000
stack
page read and write
14A1B902000
heap
page read and write
1B3B55E0000
remote allocation
page read and write
209DED00000
heap
page read and write
209DEB10000
remote allocation
page read and write
1B3B3A80000
heap
page read and write
1F459829000
heap
page read and write
820000
heap
page read and write
14A1B82C000
heap
page read and write
18393029000
heap
page read and write
30E0000
trusted library allocation
page read and write
2694FCB0000
heap
page read and write
20701225000
heap
page read and write
1F48A645000
heap
page read and write
14A1B770000
heap
page read and write
6B3F5FE000
stack
page read and write
1A0C2950000
heap
page read and write
281C000
trusted library allocation
page read and write
855000
heap
page read and write
841000
heap
page read and write
5E323FB000
stack
page read and write
23F8A6A9000
heap
page read and write
5E326FE000
stack
page read and write
14A1B869000
heap
page read and write
1A0C2A65000
heap
page read and write
1BE2CFA000
stack
page read and write
209D943F000
heap
page read and write
37E0000
trusted library allocation
page read and write
210D6600000
heap
page read and write
210D65B0000
trusted library allocation
page read and write
16919066000
heap
page read and write
20701242000
heap
page read and write
203FE240000
trusted library allocation
page read and write
209DE8A0000
trusted library allocation
page read and write
1F4598C4000
heap
page read and write
A414EFE000
stack
page read and write
1691903F000
heap
page read and write
14A1B710000
heap
page read and write
2694FE40000
heap
page read and write
1A0C2A3C000
heap
page read and write
5E327FF000
stack
page read and write
1B3B3BF0000
trusted library allocation
page read and write
23F8A702000
heap
page read and write
209DA3E0000
trusted library allocation
page read and write
9BCF75C000
stack
page read and write
14A1B913000
heap
page read and write
1BE27DB000
stack
page read and write
1F459800000
heap
page read and write
281E000
trusted library allocation
page read and write
16919102000
heap
page read and write
18393052000
heap
page read and write
1A0C29E0000
trusted library allocation
page read and write
209DECAE000
heap
page read and write
2694FF02000
heap
page read and write
850000
heap
page read and write
203FD390000
trusted library allocation
page read and write
209DE9E0000
trusted library allocation
page read and write
1B3B3C67000
heap
page read and write
1B3B3D02000
heap
page read and write
74E497B000
stack
page read and write
203FD720000
trusted library allocation
page read and write
209D9502000
heap
page read and write
A415277000
stack
page read and write
209DEC29000
heap
page read and write
BC9000
heap
page read and write
5E325FC000
stack
page read and write
209DEA80000
trusted library allocation
page read and write
9BD02FC000
stack
page read and write
851E6FE000
stack
page read and write
14A1B83C000
heap
page read and write
BBE60FE000
stack
page read and write
81B000
heap
page read and write
23F8A420000
heap
page read and write
209D9470000
heap
page read and write
209D9459000
heap
page read and write
1A0C2A70000
heap
page read and write
20701261000
heap
page read and write
1E889590000
trusted library allocation
page read and write
1F48A407000
heap
page read and write
209D948C000
heap
page read and write
BBE5E7E000
stack
page read and write
20701243000
heap
page read and write
18393063000
heap
page read and write
203FD749000
heap
page read and write
1F45983E000
heap
page read and write
209D9210000
heap
page read and write
1B3B3C72000
heap
page read and write
6B3EFBC000
stack
page read and write
1F4598CC000
heap
page read and write
74E477B000
stack
page read and write
209DE9F0000
trusted library allocation
page read and write
BAE000
stack
page read and write
20701258000
heap
page read and write
2070126D000
heap
page read and write
1E889700000
heap
page read and write
354317F000
stack
page read and write
851E4FE000
stack
page read and write
209DEC63000
heap
page read and write
35432FC000
stack
page read and write
1A0C2A56000
heap
page read and write
2812000
trusted library allocation
page read and write
1CF6A83F000
heap
page read and write
2694FE13000
heap
page read and write
18393108000
heap
page read and write
6B3F3FD000
stack
page read and write
1A0C2A53000
heap
page read and write
836000
heap
page read and write
1A0C2A7A000
heap
page read and write
1F459913000
heap
page read and write
9BD00FC000
stack
page read and write
1A0C2A13000
heap
page read and write
D94A7D000
stack
page read and write
16919065000
heap
page read and write
1691906D000
heap
page read and write
209DED02000
heap
page read and write
A41537E000
stack
page read and write
7085F1C000
stack
page read and write
DC0017E000
stack
page read and write
5F0000
trusted library allocation
page read and write
60E8CFF000
stack
page read and write
1F459813000
heap
page read and write
23F8A63C000
heap
page read and write
209DE9F0000
trusted library allocation
page read and write
1B3B55B0000
trusted library allocation
page read and write
1CF6A855000
heap
page read and write
836000
heap
page read and write
209DA800000
trusted library allocation
page read and write
81B000
heap
page read and write
60E8FFD000
stack
page read and write
D94EFC000
stack
page read and write
80F000
heap
page read and write
1CF6A83D000
heap
page read and write
73330000
unkown
page readonly
354357D000
stack
page read and write
20701213000
heap
page read and write
73331000
unkown
page execute read
2694FE58000
heap
page read and write
23F8A613000
heap
page read and write
1E88963C000
heap
page read and write
203FD51D000
heap
page read and write
2310000
heap
page read and write
2314000
heap
page read and write
6B3F2FF000
stack
page read and write
354327E000
stack
page read and write
1CF6A902000
heap
page read and write
20701246000
heap
page read and write
210D663C000
heap
page read and write
80F000
heap
page read and write
20701130000
heap
page read and write
1B3B5602000
trusted library allocation
page read and write
18393102000
heap
page read and write
18392E10000
heap
page read and write
210D665A000
heap
page read and write
1E889664000
heap
page read and write
1CF6A770000
heap
page read and write
34EC07A000
stack
page read and write
73336000
unkown
page readonly
210D6702000
heap
page read and write
6B3F6FE000
stack
page read and write
203FD50C000
heap
page read and write
1F45986E000
heap
page read and write
209DEB10000
remote allocation
page read and write
40A000
unkown
page write copy
209DEA80000
trusted library allocation
page read and write
850000
heap
page read and write
1CF6B080000
trusted library allocation
page read and write
23F8A68B000
heap
page read and write
1F459750000
heap
page read and write
209DE890000
trusted library allocation
page read and write
1F45A300000
heap
page read and write
BBE61FF000
stack
page read and write
400000
unkown
page readonly
209DEAF0000
trusted library allocation
page read and write
6B3F7FA000
stack
page read and write
18392F70000
trusted library allocation
page read and write
422000
unkown
page read and write
209D94AB000
heap
page read and write
281B000
trusted library allocation
page read and write
74E487E000
stack
page read and write
209DA810000
trusted library allocation
page read and write
2816000
trusted library allocation
page read and write
634757C000
stack
page read and write
14A1B700000
heap
page read and write
280F000
stack
page read and write
1E889656000
heap
page read and write
210D6580000
heap
page read and write
30000
heap
page read and write
210D6665000
heap
page read and write
14A1B854000
heap
page read and write
1CF6A829000
heap
page read and write
209D9D04000
heap
page read and write
6B3F27F000
stack
page read and write
80F000
heap
page read and write
1691905A000
heap
page read and write
14A1B870000
heap
page read and write
1B3B3C02000
heap
page read and write
851E7F7000
stack
page read and write
81B000
heap
page read and write
23F8A3B0000
heap
page read and write
1F48A3EE000
heap
page read and write
18393100000
heap
page read and write
203FD52E000
heap
page read and write
4C1000
unkown
page readonly
3180000
trusted library allocation
page read and write
851E9FF000
stack
page read and write
BBE62FE000
stack
page read and write
210D6713000
heap
page read and write
210D6613000
heap
page read and write
1CF6B202000
trusted library allocation
page read and write
850000
heap
page read and write
23F8A629000
heap
page read and write
63473FE000
stack
page read and write
60E87EC000
stack
page read and write
209D9D58000
heap
page read and write
203FD6C0000
trusted library allocation
page read and write
9BCFEFF000
stack
page read and write
60E94FE000
stack
page read and write
1F459887000
heap
page read and write
16919000000
heap
page read and write
D94DF7000
stack
page read and write
209DECFE000
heap
page read and write
207011C0000
trusted library allocation
page read and write
18393068000
heap
page read and write
841000
heap
page read and write
7E8000
heap
page read and write
14A1B900000
heap
page read and write
1CF6A84B000
heap
page read and write
60E8BFA000
stack
page read and write
19A000
stack
page read and write
1CF6B0A0000
remote allocation
page read and write
A41517B000
stack
page read and write
26950602000
trusted library allocation
page read and write
1E889602000
heap
page read and write
3542FFC000
stack
page read and write
A41547C000
stack
page read and write
820000
heap
page read and write
1F4596F0000
heap
page read and write
850000
heap
page read and write
1A0C3402000
trusted library allocation
page read and write
209DECA3000
heap
page read and write
851E47B000
stack
page read and write
14A1B908000
heap
page read and write
209DE9F4000
trusted library allocation
page read and write
354387F000
stack
page read and write
210D665E000
heap
page read and write
209D9477000
heap
page read and write
1839307D000
heap
page read and write
375A000
stack
page read and write
80F000
heap
page read and write
14A1B869000
heap
page read and write
210D6690000
heap
page read and write
63472FF000
stack
page read and write
203FD380000
heap
page read and write
354377D000
stack
page read and write
209D91A0000
heap
page read and write
1B3B3C58000
heap
page read and write
1E889613000
heap
page read and write
851E8F7000
stack
page read and write
2070125D000
heap
page read and write
1E889600000
heap
page read and write
281B000
trusted library allocation
page read and write
209DEC9F000
heap
page read and write
836000
heap
page read and write
2694FE29000
heap
page read and write
20701241000
heap
page read and write
23F8A600000
heap
page read and write
18393090000
heap
page read and write
209DECF7000
heap
page read and write
81B000
heap
page read and write
210D6629000
heap
page read and write
1B3B3C3D000
heap
page read and write
16918E40000
heap
page read and write
708667D000
stack
page read and write
35433FD000
stack
page read and write
20701C02000
trusted library allocation
page read and write
209D9D13000
heap
page read and write
1A0C2940000
heap
page read and write
209DE9B0000
trusted library allocation
page read and write
209DEA80000
trusted library allocation
page read and write
209D9502000
heap
page read and write
20701256000
heap
page read and write
1F4596E0000
heap
page read and write
210D7002000
trusted library allocation
page read and write
1A0C2A88000
heap
page read and write
203FD50C000
heap
page read and write
16918E50000
heap
page read and write
1B3B5800000
trusted library allocation
page read and write
34EBAFF000
stack
page read and write
209D9475000
heap
page read and write
851EAFF000
stack
page read and write
1B3B3C4E000
heap
page read and write
209D9493000
heap
page read and write
20701302000
heap
page read and write
209D94B4000
heap
page read and write
70866FF000
stack
page read and write
14A1B84D000
heap
page read and write
210D6688000
heap
page read and write
70867FD000
stack
page read and write
D94FFE000
stack
page read and write
1E889E02000
trusted library allocation
page read and write
203FD710000
heap
page readonly
A414E7E000
stack
page read and write
1E889679000
heap
page read and write
210D6520000
heap
page read and write
16919002000
heap
page read and write
2070123A000
heap
page read and write
5E324F7000
stack
page read and write
73334000
unkown
page readonly
2070126B000
heap
page read and write
203FD5C0000
heap
page read and write
210D6655000
heap
page read and write
209DECE1000
heap
page read and write
2694FD20000
heap
page read and write
6B3F8FF000
stack
page read and write
20701257000
heap
page read and write
209D94B3000
heap
page read and write
34EBF7F000
stack
page read and write
401000
unkown
page execute read
203FE450000
trusted library allocation
page read and write
2070125B000
heap
page read and write
1F48A340000
heap
page read and write
820000
heap
page read and write
D947FE000
stack
page read and write
20701120000
heap
page read and write
210D6626000
heap
page read and write
209D9D00000
heap
page read and write
1F4598E8000
heap
page read and write
209D9413000
heap
page read and write
16919113000
heap
page read and write
20701263000
heap
page read and write
1B3B3D13000
heap
page read and write
836000
heap
page read and write
1691906F000
heap
page read and write
3542B9B000
stack
page read and write
1A0C2B13000
heap
page read and write
209DE9B0000
trusted library allocation
page read and write
1F45A202000
heap
page read and write
16918FB0000
trusted library allocation
page read and write
820000
heap
page read and write
1CF6A859000
heap
page read and write
BBE5FFF000
stack
page read and write
83C000
heap
page read and write
1CF6A800000
heap
page read and write
210D6700000
heap
page read and write
20701279000
heap
page read and write
1F48A320000
heap
page read and write
23F8A713000
heap
page read and write
97000
stack
page read and write
81B000
heap
page read and write
23F8A671000
heap
page read and write
20701280000
heap
page read and write
18393802000
trusted library allocation
page read and write
1CF6B0A0000
remote allocation
page read and write
1B3B3C99000
heap
page read and write
1E889628000
heap
page read and write
85C000
heap
page read and write
850000
heap
page read and write
209DE9B8000
trusted library allocation
page read and write
20701268000
heap
page read and write
34EBD7B000
stack
page read and write
1E889713000
heap
page read and write
1A0C2A7A000
heap
page read and write
820000
heap
page read and write
There are 602 hidden memdumps, click here to show them.