Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\notepad.exe
|
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\ReleaseNote.txt
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://support.displaylink.com/
|
unknown
|
||
http://support.displaylink.com/knowledgebase/articles/630820
|
unknown
|
||
http://support.displaylink.com/knowledgebase/articles/607686
|
unknown
|
||
http://www.displaylink.com/downloads/corporate
|
unknown
|
||
http://support.displaylink.com
|
unknown
|
||
http://support.displaylink.com/knowledgebase/articles/524951
|
unknown
|
||
http://support.displaylink.com/knowledgebase
|
unknown
|
||
http://support.displaylink.com/knowledgebase/articles/615714
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22C88B4C000
|
heap
|
page read and write
|
||
20B953B0000
|
heap
|
page read and write
|
||
1CE64C02000
|
heap
|
page read and write
|
||
237F3668000
|
heap
|
page read and write
|
||
2130605B000
|
heap
|
page read and write
|
||
2547E849000
|
heap
|
page read and write
|
||
22C882A3000
|
heap
|
page read and write
|
||
20B953C3000
|
heap
|
page read and write
|
||
2547E864000
|
heap
|
page read and write
|
||
1CE64D00000
|
heap
|
page read and write
|
||
2181BE7E000
|
heap
|
page read and write
|
||
24A3CC6B000
|
heap
|
page read and write
|
||
28CB5980000
|
heap
|
page read and write
|
||
28CB6558000
|
heap
|
page read and write
|
||
2547EE02000
|
trusted library allocation
|
page read and write
|
||
28CB5A7B000
|
heap
|
page read and write
|
||
28CBB2FE000
|
heap
|
page read and write
|
||
CB2D77C000
|
stack
|
page read and write
|
||
1CE64D13000
|
heap
|
page read and write
|
||
21306071000
|
heap
|
page read and write
|
||
24A3CC4F000
|
heap
|
page read and write
|
||
50B6F7D000
|
stack
|
page read and write
|
||
28CB6502000
|
heap
|
page read and write
|
||
1CE64C13000
|
heap
|
page read and write
|
||
B806CFB000
|
stack
|
page read and write
|
||
B806A7E000
|
stack
|
page read and write
|
||
28CB63A0000
|
trusted library section
|
page read and write
|
||
22C88FC0000
|
remote allocation
|
page read and write
|
||
1672DC29000
|
heap
|
page read and write
|
||
2181BD50000
|
trusted library allocation
|
page read and write
|
||
25E58674000
|
heap
|
page read and write
|
||
FA107F000
|
stack
|
page read and write
|
||
91C60FE000
|
stack
|
page read and write
|
||
50B6E77000
|
stack
|
page read and write
|
||
FA13FF000
|
stack
|
page read and write
|
||
28CB6518000
|
heap
|
page read and write
|
||
28CBB1C0000
|
trusted library allocation
|
page read and write
|
||
9EA767E000
|
stack
|
page read and write
|
||
25E58656000
|
heap
|
page read and write
|
||
2181BE53000
|
heap
|
page read and write
|
||
21306029000
|
heap
|
page read and write
|
||
28CB5A29000
|
heap
|
page read and write
|
||
1D6A4E4A000
|
heap
|
page read and write
|
||
24A3CC66000
|
heap
|
page read and write
|
||
28CB6500000
|
heap
|
page read and write
|
||
A27307C000
|
stack
|
page read and write
|
||
24A3CC75000
|
heap
|
page read and write
|
||
24A3CC54000
|
heap
|
page read and write
|
||
FA0FFE000
|
stack
|
page read and write
|
||
98F22FF000
|
stack
|
page read and write
|
||
20B952C0000
|
heap
|
page read and write
|
||
28CBB23E000
|
heap
|
page read and write
|
||
91C5C7A000
|
stack
|
page read and write
|
||
28CB5A96000
|
heap
|
page read and write
|
||
21306802000
|
trusted library allocation
|
page read and write
|
||
28CBB306000
|
heap
|
page read and write
|
||
28CB6B80000
|
trusted library allocation
|
page read and write
|
||
20B95180000
|
heap
|
page read and write
|
||
237F33F0000
|
heap
|
page read and write
|
||
1CE64C28000
|
heap
|
page read and write
|
||
28CBB400000
|
trusted library allocation
|
page read and write
|
||
1CE64B80000
|
trusted library allocation
|
page read and write
|
||
734057D000
|
stack
|
page read and write
|
||
21306013000
|
heap
|
page read and write
|
||
98F1EFF000
|
stack
|
page read and write
|
||
1D6A4E55000
|
heap
|
page read and write
|
||
1D6A4F02000
|
heap
|
page read and write
|
||
91C617F000
|
stack
|
page read and write
|
||
28CBB304000
|
heap
|
page read and write
|
||
20B953B6000
|
heap
|
page read and write
|
||
28CBB1A0000
|
trusted library allocation
|
page read and write
|
||
24A3CC69000
|
heap
|
page read and write
|
||
1D6A4E6C000
|
heap
|
page read and write
|
||
49D1A7E000
|
stack
|
page read and write
|
||
28CBB2E4000
|
heap
|
page read and write
|
||
24A3CC48000
|
heap
|
page read and write
|
||
28CBB4F0000
|
remote allocation
|
page read and write
|
||
24A3CC45000
|
heap
|
page read and write
|
||
2181BF00000
|
heap
|
page read and write
|
||
FA14FD000
|
stack
|
page read and write
|
||
1D6A4F00000
|
heap
|
page read and write
|
||
22C88B10000
|
heap
|
page read and write
|
||
1CE64B50000
|
heap
|
page read and write
|
||
1D6A4E3C000
|
heap
|
page read and write
|
||
24A3CC74000
|
heap
|
page read and write
|
||
1CE64AE0000
|
heap
|
page read and write
|
||
24A3CC30000
|
heap
|
page read and write
|
||
22C882AA000
|
heap
|
page read and write
|
||
91C5FFF000
|
stack
|
page read and write
|
||
50B6AFE000
|
stack
|
page read and write
|
||
22C882AF000
|
heap
|
page read and write
|
||
28CB5AA9000
|
heap
|
page read and write
|
||
91C677F000
|
stack
|
page read and write
|
||
A27357E000
|
stack
|
page read and write
|
||
28CB6C70000
|
trusted library section
|
page readonly
|
||
2547E7F0000
|
remote allocation
|
page read and write
|
||
22C89200000
|
unkown
|
page read and write
|
||
22C880C0000
|
heap
|
page read and write
|
||
2547E802000
|
heap
|
page read and write
|
||
2547E84A000
|
heap
|
page read and write
|
||
20B953CD000
|
heap
|
page read and write
|
||
98F26FE000
|
stack
|
page read and write
|
||
28CB5B02000
|
heap
|
page read and write
|
||
2181BE50000
|
heap
|
page read and write
|
||
B8067FC000
|
stack
|
page read and write
|
||
28CBB2F5000
|
heap
|
page read and write
|
||
91C56EB000
|
stack
|
page read and write
|
||
28CBB190000
|
trusted library allocation
|
page read and write
|
||
22C88120000
|
heap
|
page read and write
|
||
1CE64D02000
|
heap
|
page read and write
|
||
22C88FC0000
|
remote allocation
|
page read and write
|
||
CB2D67D000
|
stack
|
page read and write
|
||
1672DD02000
|
heap
|
page read and write
|
||
2547E740000
|
trusted library allocation
|
page read and write
|
||
28CB6A83000
|
trusted library allocation
|
page read and write
|
||
28CB6A61000
|
trusted library allocation
|
page read and write
|
||
28CB5A8D000
|
heap
|
page read and write
|
||
2547E620000
|
heap
|
page read and write
|
||
98F25FE000
|
stack
|
page read and write
|
||
20B953FA000
|
heap
|
page read and write
|
||
22C88313000
|
heap
|
page read and write
|
||
2181BF08000
|
heap
|
page read and write
|
||
237F3600000
|
heap
|
page read and write
|
||
22C88213000
|
heap
|
page read and write
|
||
9C2977E000
|
stack
|
page read and write
|
||
28CBB24B000
|
heap
|
page read and write
|
||
2181BBE0000
|
heap
|
page read and write
|
||
25E58670000
|
heap
|
page read and write
|
||
28CBB2FB000
|
heap
|
page read and write
|
||
C272077000
|
stack
|
page read and write
|
||
C271C7E000
|
stack
|
page read and write
|
||
1672DB00000
|
heap
|
page read and write
|
||
28CB5A57000
|
heap
|
page read and write
|
||
49D177B000
|
stack
|
page read and write
|
||
734027E000
|
stack
|
page read and write
|
||
91C5D7A000
|
stack
|
page read and write
|
||
28CBB302000
|
heap
|
page read and write
|
||
24A3CC00000
|
heap
|
page read and write
|
||
20B952E0000
|
heap
|
page read and write
|
||
28CBB424000
|
trusted library allocation
|
page read and write
|
||
C271CFF000
|
stack
|
page read and write
|
||
91C657B000
|
stack
|
page read and write
|
||
24A3CC43000
|
heap
|
page read and write
|
||
28CBB1C0000
|
trusted library allocation
|
page read and write
|
||
FA127E000
|
stack
|
page read and write
|
||
28CBB2DD000
|
heap
|
page read and write
|
||
21305E00000
|
heap
|
page read and write
|
||
2547E5B0000
|
heap
|
page read and write
|
||
28CB6415000
|
heap
|
page read and write
|
||
237F36CA000
|
heap
|
page read and write
|
||
91C5F7B000
|
stack
|
page read and write
|
||
C271F77000
|
stack
|
page read and write
|
||
1CE64C00000
|
heap
|
page read and write
|
||
2547E877000
|
heap
|
page read and write
|
||
2547E720000
|
trusted library allocation
|
page read and write
|
||
2181BE29000
|
heap
|
page read and write
|
||
22C882B2000
|
heap
|
page read and write
|
||
28CBB302000
|
heap
|
page read and write
|
||
20B98CF0000
|
trusted library allocation
|
page read and write
|
||
1672DC00000
|
heap
|
page read and write
|
||
28CB5A8F000
|
heap
|
page read and write
|
||
CB2D57F000
|
stack
|
page read and write
|
||
20B953B5000
|
heap
|
page read and write
|
||
733FFFC000
|
stack
|
page read and write
|
||
24A3CC47000
|
heap
|
page read and write
|
||
22C882F2000
|
heap
|
page read and write
|
||
22C882C9000
|
heap
|
page read and write
|
||
28CB5A00000
|
heap
|
page read and write
|
||
28CBB4B0000
|
trusted library allocation
|
page read and write
|
||
237F3702000
|
heap
|
page read and write
|
||
1672E602000
|
trusted library allocation
|
page read and write
|
||
28CBB20F000
|
heap
|
page read and write
|
||
24A3CC4C000
|
heap
|
page read and write
|
||
237F366A000
|
heap
|
page read and write
|
||
9EA7477000
|
stack
|
page read and write
|
||
2181BBF0000
|
heap
|
page read and write
|
||
25E58688000
|
heap
|
page read and write
|
||
CB2D37E000
|
stack
|
page read and write
|
||
24A3CC55000
|
heap
|
page read and write
|
||
49D147B000
|
stack
|
page read and write
|
||
20B953D4000
|
heap
|
page read and write
|
||
91C61FF000
|
stack
|
page read and write
|
||
24A3CC68000
|
heap
|
page read and write
|
||
237F3613000
|
heap
|
page read and write
|
||
CB2CDDB000
|
stack
|
page read and write
|
||
22C882E4000
|
heap
|
page read and write
|
||
24A3CC39000
|
heap
|
page read and write
|
||
20B953BB000
|
heap
|
page read and write
|
||
1D6A4CA0000
|
heap
|
page read and write
|
||
C27217F000
|
stack
|
page read and write
|
||
22C88BA1000
|
heap
|
page read and write
|
||
2181BF13000
|
heap
|
page read and write
|
||
9C296FE000
|
stack
|
page read and write
|
||
1672DC58000
|
heap
|
page read and write
|
||
20B953BF000
|
heap
|
page read and write
|
||
2547E900000
|
heap
|
page read and write
|
||
CB2D47F000
|
stack
|
page read and write
|
||
24A3CC31000
|
heap
|
page read and write
|
||
FA10FF000
|
stack
|
page read and write
|
||
1672DB90000
|
trusted library allocation
|
page read and write
|
||
25E58651000
|
heap
|
page read and write
|
||
98F1FFB000
|
stack
|
page read and write
|
||
9EA76FE000
|
stack
|
page read and write
|
||
28CB6402000
|
heap
|
page read and write
|
||
24A3CC80000
|
heap
|
page read and write
|
||
1D6A4E29000
|
heap
|
page read and write
|
||
50B6D7B000
|
stack
|
page read and write
|
||
22C88B6F000
|
heap
|
page read and write
|
||
28CB6400000
|
heap
|
page read and write
|
||
733FBDB000
|
stack
|
page read and write
|
||
49D197B000
|
stack
|
page read and write
|
||
25E58654000
|
heap
|
page read and write
|
||
C2723FE000
|
unkown
|
page read and write
|
||
25E5864B000
|
heap
|
page read and write
|
||
237F36B9000
|
heap
|
page read and write
|
||
25E58629000
|
heap
|
page read and write
|
||
28CBB1D0000
|
trusted library allocation
|
page read and write
|
||
2547E82A000
|
heap
|
page read and write
|
||
22C88B88000
|
heap
|
page read and write
|
||
24A3CC51000
|
heap
|
page read and write
|
||
28CBB263000
|
heap
|
page read and write
|
||
A272F7E000
|
stack
|
page read and write
|
||
28CB6559000
|
heap
|
page read and write
|
||
28CBB408000
|
trusted library allocation
|
page read and write
|
||
22C88FC0000
|
remote allocation
|
page read and write
|
||
20B9567E000
|
heap
|
page read and write
|
||
25E58613000
|
heap
|
page read and write
|
||
28CBB4F0000
|
remote allocation
|
page read and write
|
||
28CBB200000
|
heap
|
page read and write
|
||
2547E7B0000
|
trusted library allocation
|
page read and write
|
||
9C299FE000
|
stack
|
page read and write
|
||
21306000000
|
heap
|
page read and write
|
||
2547E813000
|
heap
|
page read and write
|
||
2181BE4A000
|
heap
|
page read and write
|
||
734077C000
|
stack
|
page read and write
|
||
24A3CA10000
|
heap
|
page read and write
|
||
1CE64AF0000
|
heap
|
page read and write
|
||
28CB59F0000
|
heap
|
page read and write
|
||
21306102000
|
heap
|
page read and write
|
||
21306002000
|
heap
|
page read and write
|
||
28CBB28D000
|
heap
|
page read and write
|
||
237F3671000
|
heap
|
page read and write
|
||
28CBB4C0000
|
trusted library allocation
|
page read and write
|
||
28CB6CA0000
|
trusted library section
|
page readonly
|
||
22C88200000
|
heap
|
page read and write
|
||
28CBB070000
|
trusted library allocation
|
page read and write
|
||
28CB5AFF000
|
heap
|
page read and write
|
||
B806E77000
|
stack
|
page read and write
|
||
1672DBC0000
|
remote allocation
|
page read and write
|
||
237F33E0000
|
heap
|
page read and write
|
||
2181BF02000
|
heap
|
page read and write
|
||
FA137D000
|
stack
|
page read and write
|
||
237F3E02000
|
heap
|
page read and write
|
||
28CBB1A0000
|
trusted library allocation
|
page read and write
|
||
1D6A4C90000
|
heap
|
page read and write
|
||
25E58600000
|
heap
|
page read and write
|
||
28CBB300000
|
heap
|
page read and write
|
||
28CB5B13000
|
heap
|
page read and write
|
||
22C882FA000
|
heap
|
page read and write
|
||
2181BC50000
|
heap
|
page read and write
|
||
28CB5A72000
|
heap
|
page read and write
|
||
24A3CC13000
|
heap
|
page read and write
|
||
A272E7B000
|
stack
|
page read and write
|
||
98F20FF000
|
stack
|
page read and write
|
||
25E58653000
|
heap
|
page read and write
|
||
20B95670000
|
heap
|
page read and write
|
||
91C6479000
|
stack
|
page read and write
|
||
25E5867F000
|
heap
|
page read and write
|
||
24A3CC4A000
|
heap
|
page read and write
|
||
24A3CC7D000
|
heap
|
page read and write
|
||
1D6A4E70000
|
heap
|
page read and write
|
||
20B96DE0000
|
heap
|
page read and write
|
||
1CE65602000
|
trusted library allocation
|
page read and write
|
||
9C29BFF000
|
stack
|
page read and write
|
||
20B95401000
|
heap
|
page read and write
|
||
237F3F33000
|
heap
|
page read and write
|
||
22C880B0000
|
heap
|
page read and write
|
||
20B96DE3000
|
heap
|
page read and write
|
||
24A3CC49000
|
heap
|
page read and write
|
||
28CB6513000
|
heap
|
page read and write
|
||
28CB6A80000
|
trusted library allocation
|
page read and write
|
||
2547E859000
|
heap
|
page read and write
|
||
24A3CD02000
|
heap
|
page read and write
|
||
22C88270000
|
heap
|
page read and write
|
||
1CE64C64000
|
heap
|
page read and write
|
||
25E58700000
|
heap
|
page read and write
|
||
28CB5A13000
|
heap
|
page read and write
|
||
91C627F000
|
stack
|
page read and write
|
||
1D6A55A0000
|
trusted library allocation
|
page read and write
|
||
22C88281000
|
heap
|
page read and write
|
||
24A3CC50000
|
heap
|
page read and write
|
||
2547E842000
|
heap
|
page read and write
|
||
28CB5B26000
|
heap
|
page read and write
|
||
237F3550000
|
trusted library allocation
|
page read and write
|
||
98F1D7B000
|
stack
|
page read and write
|
||
237F3629000
|
heap
|
page read and write
|
||
1672DBC0000
|
remote allocation
|
page read and write
|
||
24A3CC77000
|
heap
|
page read and write
|
||
24A3CC85000
|
heap
|
page read and write
|
||
2547E85A000
|
heap
|
page read and write
|
||
1D6A4E00000
|
heap
|
page read and write
|
||
9C2967B000
|
stack
|
page read and write
|
||
21305E60000
|
heap
|
page read and write
|
||
25E58708000
|
heap
|
page read and write
|
||
98F194B000
|
stack
|
page read and write
|
||
A273277000
|
stack
|
page read and write
|
||
22C882EF000
|
heap
|
page read and write
|
||
2547E5C0000
|
heap
|
page read and write
|
||
A27337F000
|
stack
|
page read and write
|
||
1D6A4D00000
|
heap
|
page read and write
|
||
28CBB190000
|
trusted library allocation
|
page read and write
|
||
73403FD000
|
stack
|
page read and write
|
||
2547E7F0000
|
remote allocation
|
page read and write
|
||
237F36C2000
|
heap
|
page read and write
|
||
98F21FD000
|
stack
|
page read and write
|
||
734017E000
|
stack
|
page read and write
|
||
98F23FF000
|
stack
|
page read and write
|
||
28CBB2F9000
|
heap
|
page read and write
|
||
22C88229000
|
heap
|
page read and write
|
||
28CB6A90000
|
trusted library allocation
|
page read and write
|
||
2181BE70000
|
heap
|
page read and write
|
||
2547E84A000
|
heap
|
page read and write
|
||
24A3CC42000
|
heap
|
page read and write
|
||
28CBB304000
|
heap
|
page read and write
|
||
FA15FD000
|
stack
|
page read and write
|
||
1672DC26000
|
heap
|
page read and write
|
||
1CE64C77000
|
heap
|
page read and write
|
||
C272278000
|
stack
|
page read and write
|
||
1D6A4F13000
|
heap
|
page read and write
|
||
91C5AF8000
|
stack
|
page read and write
|
||
2181BE3C000
|
heap
|
page read and write
|
||
20B953BB000
|
heap
|
page read and write
|
||
91C607E000
|
stack
|
page read and write
|
||
28CBB1D4000
|
trusted library allocation
|
page read and write
|
||
1CE64C5A000
|
heap
|
page read and write
|
||
28CBB460000
|
trusted library allocation
|
page read and write
|
||
237F3F00000
|
heap
|
page read and write
|
||
24A3CA70000
|
heap
|
page read and write
|
||
28CBB2AE000
|
heap
|
page read and write
|
||
2547E800000
|
heap
|
page read and write
|
||
24A3CC29000
|
heap
|
page read and write
|
||
28CB6518000
|
heap
|
page read and write
|
||
28CBB421000
|
trusted library allocation
|
page read and write
|
||
24A3D402000
|
trusted library allocation
|
page read and write
|
||
25E58DA0000
|
trusted library allocation
|
page read and write
|
||
20B95360000
|
heap
|
page read and write
|
||
2181C602000
|
trusted library allocation
|
page read and write
|
||
50B707E000
|
stack
|
page read and write
|
||
22C882F2000
|
heap
|
page read and write
|
||
73402FC000
|
stack
|
page read and write
|
||
9C29AFE000
|
stack
|
page read and write
|
||
24A3CC52000
|
heap
|
page read and write
|
||
237F3450000
|
heap
|
page read and write
|
||
2547E85A000
|
heap
|
page read and write
|
||
25E58713000
|
heap
|
page read and write
|
||
24A3CA00000
|
heap
|
page read and write
|
||
28CB6C90000
|
trusted library section
|
page readonly
|
||
98F24FF000
|
stack
|
page read and write
|
||
C271E7F000
|
stack
|
page read and write
|
||
734047C000
|
stack
|
page read and write
|
||
A27347D000
|
stack
|
page read and write
|
||
A272EFE000
|
stack
|
page read and write
|
||
FA117E000
|
stack
|
page read and write
|
||
21305F60000
|
trusted library allocation
|
page read and write
|
||
28CBB261000
|
heap
|
page read and write
|
||
2181BE4D000
|
heap
|
page read and write
|
||
28CB6C80000
|
trusted library section
|
page readonly
|
||
21306113000
|
heap
|
page read and write
|
||
25E58500000
|
heap
|
page read and write
|
||
1D6A4E02000
|
heap
|
page read and write
|
||
1D6A4E81000
|
heap
|
page read and write
|
||
25E58E02000
|
trusted library allocation
|
page read and write
|
||
CB2D97C000
|
stack
|
page read and write
|
||
28CB5AA1000
|
heap
|
page read and write
|
||
50B6A7C000
|
stack
|
page read and write
|
||
28CBB2A9000
|
heap
|
page read and write
|
||
25E58702000
|
heap
|
page read and write
|
||
2181BE00000
|
heap
|
page read and write
|
||
50B717F000
|
stack
|
page read and write
|
||
22C882DC000
|
heap
|
page read and write
|
||
1D6A5602000
|
trusted library allocation
|
page read and write
|
||
20B98540000
|
heap
|
page read and write
|
||
28CBB4D0000
|
trusted library allocation
|
page read and write
|
||
22C88B13000
|
heap
|
page read and write
|
||
25E584A0000
|
heap
|
page read and write
|
||
1CE64C40000
|
heap
|
page read and write
|
||
1672DC13000
|
heap
|
page read and write
|
||
2547E7F0000
|
remote allocation
|
page read and write
|
||
1D6A4E13000
|
heap
|
page read and write
|
||
2181BE88000
|
heap
|
page read and write
|
||
22C882C2000
|
heap
|
page read and write
|
||
20B95389000
|
heap
|
page read and write
|
||
2547E88B000
|
heap
|
page read and write
|
||
28CB5A77000
|
heap
|
page read and write
|
||
28CB5990000
|
heap
|
page read and write
|
||
C271DFC000
|
stack
|
page read and write
|
||
2547E913000
|
heap
|
page read and write
|
||
22C88B80000
|
heap
|
page read and write
|
||
24A3CB70000
|
trusted library allocation
|
page read and write
|
||
28CBB220000
|
heap
|
page read and write
|
||
20B95675000
|
heap
|
page read and write
|
||
B806F7F000
|
stack
|
page read and write
|
||
B806D7F000
|
stack
|
page read and write
|
||
91C637C000
|
stack
|
page read and write
|
||
28CBB4A0000
|
trusted library allocation
|
page read and write
|
||
734087F000
|
stack
|
page read and write
|
||
28CB6601000
|
trusted library allocation
|
page read and write
|
||
25E58649000
|
heap
|
page read and write
|
||
25E58490000
|
heap
|
page read and write
|
||
28CBB290000
|
heap
|
page read and write
|
||
22C88302000
|
heap
|
page read and write
|
||
24A3CC7C000
|
heap
|
page read and write
|
||
22C88A02000
|
heap
|
page read and write
|
||
22C8823C000
|
heap
|
page read and write
|
||
C27237A000
|
stack
|
page read and write
|
||
22C889C0000
|
trusted library allocation
|
page read and write
|
||
CB2D87E000
|
stack
|
page read and write
|
||
28CB6290000
|
trusted library allocation
|
page read and write
|
||
28CBB080000
|
trusted library allocation
|
page read and write
|
||
49D187B000
|
stack
|
page read and write
|
||
22C88B79000
|
heap
|
page read and write
|
||
24A3CC53000
|
heap
|
page read and write
|
||
1672DAF0000
|
heap
|
page read and write
|
||
237F3713000
|
heap
|
page read and write
|
||
28CB6C60000
|
trusted library section
|
page readonly
|
||
28CBB000000
|
trusted library allocation
|
page read and write
|
||
2547E918000
|
heap
|
page read and write
|
||
28CBB40E000
|
trusted library allocation
|
page read and write
|
||
24A3CC41000
|
heap
|
page read and write
|
||
24A3CC76000
|
heap
|
page read and write
|
||
1D6A4F08000
|
heap
|
page read and write
|
||
20B95399000
|
heap
|
page read and write
|
||
1672DC3D000
|
heap
|
page read and write
|
||
21305DF0000
|
heap
|
page read and write
|
||
FA0E7C000
|
stack
|
page read and write
|
||
2181BE13000
|
heap
|
page read and write
|
||
1D6A4E4F000
|
heap
|
page read and write
|
||
25E5864E000
|
heap
|
page read and write
|
||
2181BE8F000
|
heap
|
page read and write
|
||
A27317B000
|
stack
|
page read and write
|
||
9C298FE000
|
stack
|
page read and write
|
||
24A3CC79000
|
heap
|
page read and write
|
||
50B6B7E000
|
stack
|
page read and write
|
||
2547E902000
|
heap
|
page read and write
|
||
1CE64C79000
|
heap
|
page read and write
|
||
1D6A4E87000
|
heap
|
page read and write
|
||
28CB5A3D000
|
heap
|
page read and write
|
||
91C5E7F000
|
stack
|
page read and write
|
||
28CBB22D000
|
heap
|
page read and write
|
||
237F3651000
|
heap
|
page read and write
|
||
2130603D000
|
heap
|
page read and write
|
||
22C88288000
|
heap
|
page read and write
|
||
28CBB4F0000
|
remote allocation
|
page read and write
|
||
1672DB60000
|
heap
|
page read and write
|
||
CB2D1FE000
|
stack
|
page read and write
|
||
1672DBC0000
|
remote allocation
|
page read and write
|
||
20B95380000
|
heap
|
page read and write
|
||
28CB6CB0000
|
trusted library section
|
page readonly
|
||
21306057000
|
heap
|
page read and write
|
||
2547E770000
|
trusted library allocation
|
page read and write
|
||
22C88B80000
|
heap
|
page read and write
|
||
22C88B00000
|
heap
|
page read and write
|
||
C2719FC000
|
stack
|
page read and write
|
||
24A3CC3E000
|
heap
|
page read and write
|
||
B806AFE000
|
stack
|
page read and write
|
||
1D6A4E6C000
|
heap
|
page read and write
|
||
28CB7000000
|
trusted library allocation
|
page read and write
|
||
24A3CC46000
|
heap
|
page read and write
|
||
734067F000
|
stack
|
page read and write
|
||
24A3CC7B000
|
heap
|
page read and write
|
||
1672DC02000
|
heap
|
page read and write
|
||
B80707F000
|
stack
|
page read and write
|
||
25E5863C000
|
heap
|
page read and write
|
There are 463 hidden memdumps, click here to show them.