Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
uGfpJynSWM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\uGfpJynSWM.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\uGfpJynSWM.exe
|
"C:\Users\user\Desktop\uGfpJynSWM.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.159.249.4/1474h.dll
|
unknown
|
||
http://45.159.249.4/1474stem32
|
unknown
|
||
https://climatejustice.social
|
unknown
|
||
http://45.159.249.4/1474N
|
unknown
|
||
http://45.159.249.4/=:
|
unknown
|
||
https://climatejustice.social/@ffoleg94
|
167.86.107.75
|
||
http://45.159.249.4/1474
|
unknown
|
||
http://45.159.249.4/147474R
|
unknown
|
||
http://45.159.249.4/1474b
|
unknown
|
||
http://45.159.249.4/1474l
|
unknown
|
||
http://45.159.249.4/1474u
|
unknown
|
||
https://climatejustice.social/
|
unknown
|
||
http://45.159.249.4/1474x
|
unknown
|
||
http://45.159.249.4:80
|
unknown
|
||
https://climatejustice.social;
|
unknown
|
||
https://climatejustice.social/.well-known/webfinger?resource=acct%3Affoleg94%40climatejustice.social
|
unknown
|
||
https://web.telegram.org
|
unknown
|
||
https://telegram.org/img/t_logo.png
|
unknown
|
||
https://funk.climatejustice.global
|
unknown
|
||
https://t.me/korstonsaleshttps://climatejustice.social/
|
unknown
|
||
https://climatejustice.social/users/ffoleg94/followers
|
unknown
|
||
https://github.com/mastodon/mastodon
|
unknown
|
||
https://climatejustice.social/users/ffoleg94/following
|
unknown
|
||
https://joinmastodon.org/apps
|
unknown
|
||
https://climatejustice.social/custom.css
|
unknown
|
||
https://climatejustice.social/tags/grunewald"
|
unknown
|
||
https://docs.joinmastodon.org/client/intro/
|
unknown
|
||
https://climatejustice.rocks
|
unknown
|
||
https://docs.joinmastodon.org/
|
unknown
|
||
https://climatejustice.social/avatars/original/missing.png
|
unknown
|
||
https://climatejustice.social/tags/gitlab"
|
unknown
|
||
https://climatejustice.social/users/ffoleg94
|
unknown
|
||
http://crl.microsoft.c
|
unknown
|
||
https://climatejustice.social/tags/gitea"
|
unknown
|
||
https://joinmastodon.org/
|
unknown
|
||
https://t.me/korstonsales
|
149.154.167.99
|
||
https://climatejustice.global
|
unknown
|
||
https://t.me/korstonsalesi
|
unknown
|
There are 28 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
climatejustice.social
|
167.86.107.75
|
||
t.me
|
149.154.167.99
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
167.86.107.75
|
climatejustice.social
|
Germany
|
||
45.159.249.4
|
unknown
|
Russian Federation
|
||
149.154.167.99
|
t.me
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2BEF000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3BE1000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
13B0000
|
trusted library allocation
|
page execute and read and write
|
||
A47907F000
|
stack
|
page read and write
|
||
847E779000
|
stack
|
page read and write
|
||
2AB71190000
|
heap
|
page read and write
|
||
2AB7084C000
|
heap
|
page read and write
|
||
4473000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
trusted library allocation
|
page execute and read and write
|
||
4D58000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
22370BF0000
|
heap
|
page read and write
|
||
C4EABF8000
|
stack
|
page read and write
|
||
2AB708E9000
|
heap
|
page read and write
|
||
22370D0F000
|
heap
|
page read and write
|
||
D1A59EE000
|
stack
|
page read and write
|
||
8B43BFB000
|
stack
|
page read and write
|
||
3E8B000
|
trusted library allocation
|
page read and write
|
||
1DEFA140000
|
heap
|
page read and write
|
||
1AF4564F000
|
heap
|
page read and write
|
||
459000
|
remote allocation
|
page execute and read and write
|
||
4D5E000
|
heap
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
9442B6B000
|
stack
|
page read and write
|
||
9F76D77000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
E7B000
|
trusted library allocation
|
page execute and read and write
|
||
1AF4564D000
|
heap
|
page read and write
|
||
2AB71196000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page execute and read and write
|
||
2AB71173000
|
heap
|
page read and write
|
||
1E5EF245000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
2AB71194000
|
heap
|
page read and write
|
||
2AB711D5000
|
heap
|
page read and write
|
||
1DEFA300000
|
heap
|
page read and write
|
||
2065EAAC000
|
heap
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
847E87F000
|
stack
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
29F3000
|
trusted library allocation
|
page read and write
|
||
2AB71119000
|
heap
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
1FFA9280000
|
heap
|
page read and write
|
||
1AF45700000
|
heap
|
page read and write
|
||
22370D15000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
3C06000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
1EBDF000
|
stack
|
page read and write
|
||
4D54000
|
heap
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
4D5E000
|
heap
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
A47927F000
|
stack
|
page read and write
|
||
C4EAF7F000
|
unkown
|
page read and write
|
||
2AB7084B000
|
heap
|
page read and write
|
||
2AB71194000
|
heap
|
page read and write
|
||
1AF45648000
|
heap
|
page read and write
|
||
1DEFA224000
|
heap
|
page read and write
|
||
1E5EF229000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
1EADF000
|
stack
|
page read and write
|
||
94431FB000
|
stack
|
page read and write
|
||
1AF45613000
|
heap
|
page read and write
|
||
2065F960000
|
trusted library allocation
|
page read and write
|
||
459000
|
remote allocation
|
page execute and read and write
|
||
1AF45670000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
1AF4564C000
|
heap
|
page read and write
|
||
2065F9B0000
|
trusted library allocation
|
page read and write
|
||
1E5EF28F000
|
heap
|
page read and write
|
||
4070000
|
trusted library allocation
|
page read and write
|
||
1AF45E02000
|
trusted library allocation
|
page read and write
|
||
4D5F000
|
heap
|
page read and write
|
||
E44000
|
trusted library allocation
|
page read and write
|
||
E67000
|
trusted library allocation
|
page execute and read and write
|
||
A4790FF000
|
stack
|
page read and write
|
||
9F76DFE000
|
stack
|
page read and write
|
||
2AB71196000
|
heap
|
page read and write
|
||
D1A5DFE000
|
stack
|
page read and write
|
||
2AB71196000
|
heap
|
page read and write
|
||
4CEF000
|
heap
|
page read and write
|
||
2AB70640000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
1AF45708000
|
heap
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
2AB71196000
|
heap
|
page read and write
|
||
3F85000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
2AB71191000
|
heap
|
page read and write
|
||
22370CFF000
|
heap
|
page read and write
|
||
2AB70FA0000
|
remote allocation
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
847E7FE000
|
stack
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
2AB71192000
|
heap
|
page read and write
|
||
2AB711B2000
|
heap
|
page read and write
|
||
8B43DFF000
|
stack
|
page read and write
|
||
2C18000
|
trusted library allocation
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
22370CF7000
|
heap
|
page read and write
|
||
4C6D000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1E8DA000
|
stack
|
page read and write
|
||
C4EB17C000
|
stack
|
page read and write
|
||
2AB708DA000
|
heap
|
page read and write
|
||
2AB708C1000
|
heap
|
page read and write
|
||
1DEFA213000
|
heap
|
page read and write
|
||
5217000
|
trusted library allocation
|
page read and write
|
||
4D57000
|
heap
|
page read and write
|
||
1AF45655000
|
heap
|
page read and write
|
||
2AB7111B000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
94433FE000
|
stack
|
page read and write
|
||
2AB7119C000
|
heap
|
page read and write
|
||
9F76A7E000
|
stack
|
page read and write
|
||
4D0D000
|
heap
|
page read and write
|
||
2065EA49000
|
heap
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
1E5EF9C0000
|
trusted library allocation
|
page read and write
|
||
1DEFA29B000
|
heap
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
42EA000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
1ED80000
|
remote allocation
|
page read and write
|
||
2AB71194000
|
heap
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
9F76EFE000
|
stack
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
2AB711D3000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
1AF45681000
|
heap
|
page read and write
|
||
22370CFF000
|
heap
|
page read and write
|
||
4D0A000
|
heap
|
page read and write
|
||
C4EB078000
|
stack
|
page read and write
|
||
4D0E000
|
heap
|
page read and write
|
||
1AF45654000
|
heap
|
page read and write
|
||
8B4379D000
|
stack
|
page read and write
|
||
832000
|
unkown
|
page readonly
|
||
1ED80000
|
remote allocation
|
page read and write
|
||
1AF4568F000
|
heap
|
page read and write
|
||
847E6FE000
|
stack
|
page read and write
|
||
22370AC0000
|
heap
|
page read and write
|
||
1FFA9402000
|
heap
|
page read and write
|
||
D1A61FE000
|
stack
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
1E5EF290000
|
heap
|
page read and write
|
||
847E67E000
|
stack
|
page read and write
|
||
4D65000
|
heap
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
8B4371E000
|
stack
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
4D59000
|
heap
|
page read and write
|
||
2065EAAC000
|
heap
|
page read and write
|
||
2AB71644000
|
heap
|
page read and write
|
||
C4EAAFB000
|
stack
|
page read and write
|
||
2AB7119F000
|
heap
|
page read and write
|
||
1AF45657000
|
heap
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
2AB7119C000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
A478DFA000
|
stack
|
page read and write
|
||
2AB708AC000
|
heap
|
page read and write
|
||
1EBE0000
|
trusted library section
|
page readonly
|
||
2AB70908000
|
heap
|
page read and write
|
||
1FFA9C02000
|
trusted library allocation
|
page read and write
|
||
22370CE2000
|
heap
|
page read and write
|
||
2065EAA4000
|
heap
|
page read and write
|
||
2AB71171000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
22370CF4000
|
heap
|
page read and write
|
||
D1A5EFB000
|
stack
|
page read and write
|
||
446A000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
1E5EF24D000
|
heap
|
page read and write
|
||
1E5EF266000
|
heap
|
page read and write
|
||
2065F6F0000
|
trusted library allocation
|
page read and write
|
||
2AB71192000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
22370D11000
|
heap
|
page read and write
|
||
1AF45676000
|
heap
|
page read and write
|
||
2AB71199000
|
heap
|
page read and write
|
||
4D09000
|
heap
|
page read and write
|
||
C4EACF7000
|
stack
|
page read and write
|
||
1E5EF23C000
|
heap
|
page read and write
|
||
1DEFA308000
|
heap
|
page read and write
|
||
2065F950000
|
trusted library allocation
|
page read and write
|
||
1FFA9441000
|
heap
|
page read and write
|
||
2AB711AF000
|
heap
|
page read and write
|
||
847E3AB000
|
stack
|
page read and write
|
||
22370D01000
|
heap
|
page read and write
|
||
22370C10000
|
heap
|
page read and write
|
||
2AB7119A000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
2AB7119C000
|
heap
|
page read and write
|
||
9F7679F000
|
stack
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
2065F940000
|
heap
|
page readonly
|
||
C4EA7CE000
|
stack
|
page read and write
|
||
2AB7118B000
|
heap
|
page read and write
|
||
2AB7119E000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
22370CDB000
|
heap
|
page read and write
|
||
4D6A000
|
heap
|
page read and write
|
||
94430FB000
|
stack
|
page read and write
|
||
22370CD0000
|
heap
|
page read and write
|
||
22370F35000
|
heap
|
page read and write
|
||
1AF453F0000
|
heap
|
page read and write
|
||
1AF45650000
|
heap
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
9F76FFE000
|
stack
|
page read and write
|
||
2AB705D0000
|
heap
|
page read and write
|
||
1AF45652000
|
heap
|
page read and write
|
||
2065EA60000
|
heap
|
page read and write
|
||
4660000
|
trusted library allocation
|
page readonly
|
||
46CC000
|
stack
|
page read and write
|
||
22370F30000
|
heap
|
page read and write
|
||
1AF453E0000
|
heap
|
page read and write
|
||
2AB70740000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
4D57000
|
heap
|
page read and write
|
||
1DEFAC02000
|
trusted library allocation
|
page read and write
|
||
2AB71196000
|
heap
|
page read and write
|
||
1EC4E000
|
stack
|
page read and write
|
||
4D6B000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
1ED80000
|
remote allocation
|
page read and write
|
||
1DEFA251000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
1DEFA266000
|
heap
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
1E5EF302000
|
heap
|
page read and write
|
||
1E5EF200000
|
heap
|
page read and write
|
||
2AB711C3000
|
heap
|
page read and write
|
||
2AB708EC000
|
heap
|
page read and write
|
||
E34000
|
trusted library allocation
|
page read and write
|
||
2065F680000
|
trusted library allocation
|
page read and write
|
||
A479179000
|
stack
|
page read and write
|
||
4D52000
|
heap
|
page read and write
|
||
4D53000
|
heap
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
1AF45629000
|
heap
|
page read and write
|
||
D1A60FF000
|
stack
|
page read and write
|
||
2065EB60000
|
trusted library allocation
|
page read and write
|
||
847E8F9000
|
stack
|
page read and write
|
||
2065EAAC000
|
heap
|
page read and write
|
||
1DEFA302000
|
heap
|
page read and write
|
||
2AB71192000
|
heap
|
page read and write
|
||
1DEFA200000
|
heap
|
page read and write
|
||
2AB70800000
|
heap
|
page read and write
|
||
1E5EFA02000
|
trusted library allocation
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
1E9DA000
|
stack
|
page read and write
|
||
4D59000
|
heap
|
page read and write
|
||
2AB711AD000
|
heap
|
page read and write
|
||
2065EA45000
|
heap
|
page read and write
|
||
4D54000
|
heap
|
page read and write
|
||
1DEFA260000
|
heap
|
page read and write
|
||
1FFA9453000
|
heap
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
2AB708C8000
|
heap
|
page read and write
|
||
1FFA92F0000
|
heap
|
page read and write
|
||
1AF45659000
|
heap
|
page read and write
|
||
2AB71100000
|
heap
|
page read and write
|
||
1DEFA0E0000
|
heap
|
page read and write
|
||
C4EAEFF000
|
stack
|
page read and write
|
||
1E5EF0B0000
|
heap
|
page read and write
|
||
51C0000
|
trusted library section
|
page read and write
|
||
1E5EF120000
|
heap
|
page read and write
|
||
43B2000
|
trusted library allocation
|
page read and write
|
||
4D66000
|
heap
|
page read and write
|
||
2AB7119E000
|
heap
|
page read and write
|
||
2AB70813000
|
heap
|
page read and write
|
||
D1A5C7E000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
9F76B7C000
|
stack
|
page read and write
|
||
2AB7084D000
|
heap
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
2065EA40000
|
heap
|
page read and write
|
||
1AF45450000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
trusted library allocation
|
page read and write
|
||
E6A000
|
trusted library allocation
|
page execute and read and write
|
||
22370CF6000
|
heap
|
page read and write
|
||
4D09000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page execute and read and write
|
||
1FFA9500000
|
heap
|
page read and write
|
||
4D6B000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
43E5000
|
trusted library allocation
|
page read and write
|
||
415B000
|
trusted library allocation
|
page read and write
|
||
2AB71002000
|
heap
|
page read and write
|
||
1EEBF000
|
stack
|
page read and write
|
||
2AB7119E000
|
heap
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
2AB71182000
|
heap
|
page read and write
|
||
2AB7119A000
|
heap
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
1DEFA27C000
|
heap
|
page read and write
|
||
2AB70871000
|
heap
|
page read and write
|
||
884000
|
unkown
|
page readonly
|
||
1AF45649000
|
heap
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
C4EA74E000
|
stack
|
page read and write
|
||
2AB711AD000
|
heap
|
page read and write
|
||
10DF000
|
stack
|
page read and write
|
||
2AB70829000
|
heap
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
E77000
|
trusted library allocation
|
page execute and read and write
|
||
2065F670000
|
trusted library allocation
|
page read and write
|
||
22370D17000
|
heap
|
page read and write
|
||
9F76C7B000
|
stack
|
page read and write
|
||
C4EA6CC000
|
stack
|
page read and write
|
||
1E5EF284000
|
heap
|
page read and write
|
||
1FFA9513000
|
heap
|
page read and write
|
||
8B43EFE000
|
stack
|
page read and write
|
||
1E5EF22E000
|
heap
|
page read and write
|
||
1FFA9290000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
1FFA9413000
|
heap
|
page read and write
|
||
22370D01000
|
heap
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
A4792FC000
|
stack
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
4223000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
2AB7119E000
|
heap
|
page read and write
|
||
2AB71186000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2AB7118B000
|
heap
|
page read and write
|
||
2AB71190000
|
heap
|
page read and write
|
||
1AF45600000
|
heap
|
page read and write
|
||
2AB71600000
|
heap
|
page read and write
|
||
1AF4564B000
|
heap
|
page read and write
|
||
2065E8B0000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
2AB71123000
|
heap
|
page read and write
|
||
2AB70902000
|
heap
|
page read and write
|
||
1FFA9429000
|
heap
|
page read and write
|
||
2AB71188000
|
heap
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
2065F930000
|
trusted library allocation
|
page read and write
|
||
2AB7083C000
|
heap
|
page read and write
|
||
4D57000
|
heap
|
page read and write
|
||
1E5EF213000
|
heap
|
page read and write
|
||
5216000
|
trusted library allocation
|
page read and write
|
||
1AF45550000
|
trusted library allocation
|
page read and write
|
||
1EDBE000
|
stack
|
page read and write
|
||
D1A5D7B000
|
stack
|
page read and write
|
||
1DEFA23C000
|
heap
|
page read and write
|
||
2B80000
|
trusted library section
|
page read and write
|
||
4D06000
|
heap
|
page read and write
|
||
2AB708AC000
|
heap
|
page read and write
|
||
1AF45702000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
47F0000
|
remote allocation
|
page read and write
|
||
2AB71620000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
2AB7084F000
|
heap
|
page read and write
|
||
2AB711C2000
|
heap
|
page read and write
|
||
459000
|
remote allocation
|
page execute and read and write
|
||
8B43AFB000
|
stack
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
4B45000
|
heap
|
page read and write
|
||
22370CFF000
|
heap
|
page read and write
|
||
2AB71196000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
22370D01000
|
heap
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
1DEFA0D0000
|
heap
|
page read and write
|
||
2065EA68000
|
heap
|
page read and write
|
||
4D5E000
|
heap
|
page read and write
|
||
1E5EF300000
|
heap
|
page read and write
|
||
1FFA93F0000
|
trusted library allocation
|
page read and write
|
||
2AB71602000
|
heap
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
521A000
|
trusted library allocation
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
A4791F9000
|
stack
|
page read and write
|
||
9442BEF000
|
stack
|
page read and write
|
||
2AB71175000
|
heap
|
page read and write
|
||
2AB71152000
|
heap
|
page read and write
|
||
2AB71171000
|
heap
|
page read and write
|
||
2AB711A0000
|
heap
|
page read and write
|
||
1FFA9400000
|
heap
|
page read and write
|
||
2AB708B6000
|
heap
|
page read and write
|
||
2AB70FA0000
|
remote allocation
|
page read and write
|
||
8B4369C000
|
stack
|
page read and write
|
||
1ED4E000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2065E8A0000
|
heap
|
page read and write
|
||
1AF4565A000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
E33000
|
trusted library allocation
|
page execute and read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
C4EADFB000
|
stack
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
22370CF2000
|
heap
|
page read and write
|
||
1DEFA313000
|
heap
|
page read and write
|
||
2AB70913000
|
heap
|
page read and write
|
||
2AB711A7000
|
heap
|
page read and write
|
||
8B43CF7000
|
stack
|
page read and write
|
||
D1A5FF7000
|
stack
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
2AB70916000
|
heap
|
page read and write
|
||
1E5EF202000
|
heap
|
page read and write
|
||
2AB711A2000
|
heap
|
page read and write
|
||
2AB70882000
|
heap
|
page read and write
|
||
1E5EF0C0000
|
heap
|
page read and write
|
||
5213000
|
trusted library allocation
|
page read and write
|
||
1E5EF308000
|
heap
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
1FFA9502000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
1E5EF260000
|
heap
|
page read and write
|
||
4D07000
|
heap
|
page read and write
|
||
47C6000
|
stack
|
page read and write
|
||
91C000
|
stack
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
4D66000
|
heap
|
page read and write
|
||
2AB7119D000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
4D66000
|
heap
|
page read and write
|
||
2AB7119C000
|
heap
|
page read and write
|
||
2AB70FA0000
|
remote allocation
|
page read and write
|
||
2AB71193000
|
heap
|
page read and write
|
||
3CC5000
|
trusted library allocation
|
page read and write
|
||
2AB71603000
|
heap
|
page read and write
|
||
2AB705E0000
|
heap
|
page read and write
|
||
9F7671B000
|
stack
|
page read and write
|
||
1AF45713000
|
heap
|
page read and write
|
||
2AB708EB000
|
heap
|
page read and write
|
||
1E5EF313000
|
heap
|
page read and write
|
||
2065EA00000
|
heap
|
page read and write
|
||
2AB708E7000
|
heap
|
page read and write
|
||
4C97000
|
heap
|
page read and write
|
||
4D5F000
|
heap
|
page read and write
|
||
E4D000
|
trusted library allocation
|
page execute and read and write
|
||
1FFA947B000
|
heap
|
page read and write
|
||
3E9A000
|
trusted library allocation
|
page read and write
|
||
1AF4563C000
|
heap
|
page read and write
|
||
94432FE000
|
stack
|
page read and write
|
||
2AB708FA000
|
heap
|
page read and write
|
||
3D91000
|
trusted library allocation
|
page read and write
|
||
4D0E000
|
heap
|
page read and write
|
||
22370CE7000
|
heap
|
page read and write
|
||
4D4F000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
22370CE6000
|
heap
|
page read and write
|
||
1FFA946B000
|
heap
|
page read and write
|
||
2065EACC000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
2065F6E0000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
2065E9E0000
|
heap
|
page read and write
|
||
D1A596C000
|
stack
|
page read and write
|
||
1DEFA170000
|
trusted library allocation
|
page read and write
|
There are 482 hidden memdumps, click here to show them.