Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://www.innosetup.com
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.22.236.225
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10B69000
|
unkown
|
page readonly
|
||
BFF587E000
|
stack
|
page read and write
|
||
2A31567F000
|
heap
|
page read and write
|
||
26C90300000
|
heap
|
page read and write
|
||
26C90430000
|
heap
|
page read and write
|
||
17A81645000
|
heap
|
page read and write
|
||
26C8FBE5000
|
heap
|
page read and write
|
||
E4EFEFD000
|
stack
|
page read and write
|
||
1688C040000
|
heap
|
page read and write
|
||
2A315600000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
26C8FA92000
|
heap
|
page read and write
|
||
28FDDE67000
|
heap
|
page read and write
|
||
BAF8B8B000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
26C90402000
|
heap
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
||
28FDDE65000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
24888D70000
|
heap
|
page read and write
|
||
7CF68FF000
|
stack
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
1688BF65000
|
heap
|
page read and write
|
||
1688BDD0000
|
heap
|
page read and write
|
||
28FDDE00000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
22C1DC40000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
282EEA29000
|
heap
|
page read and write
|
||
17A8163B000
|
heap
|
page read and write
|
||
26C8FA00000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
22C1DF00000
|
heap
|
page read and write
|
||
BFF4D9B000
|
stack
|
page read and write
|
||
2A315629000
|
heap
|
page read and write
|
||
2C71000
|
heap
|
page read and write
|
||
26C903BE000
|
heap
|
page read and write
|
||
21A1E7B0000
|
remote allocation
|
page read and write
|
||
F22000
|
heap
|
page read and write
|
||
D2C000
|
stack
|
page read and write
|
||
28FDDE6E000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
21A1E610000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
17A8167A000
|
heap
|
page read and write
|
||
2488A880000
|
trusted library allocation
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
17A81665000
|
heap
|
page read and write
|
||
D89D7FF000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
26C8FBB9000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
22C1DE51000
|
heap
|
page read and write
|
||
22C1DE00000
|
heap
|
page read and write
|
||
26C8F920000
|
heap
|
page read and write
|
||
92B000
|
stack
|
page read and write
|
||
24888E58000
|
heap
|
page read and write
|
||
21A1E840000
|
heap
|
page read and write
|
||
17A81646000
|
heap
|
page read and write
|
||
26C90400000
|
heap
|
page read and write
|
||
28FDDE3E000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1688CAF0000
|
trusted library allocation
|
page read and write
|
||
22C1DE40000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
26C8FA8B000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
24888E72000
|
heap
|
page read and write
|
||
26C90354000
|
heap
|
page read and write
|
||
24888F00000
|
heap
|
page read and write
|
||
1688BF6D000
|
heap
|
page read and write
|
||
1688CD40000
|
trusted library allocation
|
page read and write
|
||
282EEA54000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2A315613000
|
heap
|
page read and write
|
||
4C97F0B000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
1688C0E9000
|
heap
|
page read and write
|
||
2A315602000
|
heap
|
page read and write
|
||
D89CDAC000
|
stack
|
page read and write
|
||
BAF91FB000
|
stack
|
page read and write
|
||
26C90427000
|
heap
|
page read and write
|
||
21A1E855000
|
heap
|
page read and write
|
||
28FDDC90000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
21A1E85C000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
1688C0A0000
|
trusted library allocation
|
page read and write
|
||
26C90343000
|
heap
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
17A8165E000
|
heap
|
page read and write
|
||
BFF597E000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
D89D2FD000
|
stack
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
17A8167D000
|
heap
|
page read and write
|
||
26C8FA3C000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
282EEB02000
|
heap
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
26C8FA92000
|
heap
|
page read and write
|
||
26C8FA55000
|
heap
|
page read and write
|
||
22C1DDB0000
|
trusted library allocation
|
page read and write
|
||
26C90202000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
10006000
|
unkown
|
page execute read
|
||
26C90322000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
24888F18000
|
heap
|
page read and write
|
||
4F0447E000
|
stack
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
17A81702000
|
heap
|
page read and write
|
||
7CF65FC000
|
stack
|
page read and write
|
||
24888E02000
|
heap
|
page read and write
|
||
8EB000
|
stack
|
page read and write
|
||
1688C020000
|
heap
|
page read and write
|
||
26C8FA3C000
|
heap
|
page read and write
|
||
2C71000
|
heap
|
page read and write
|
||
26C9036F000
|
heap
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
2488AA02000
|
trusted library allocation
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
2A315675000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
17A81641000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17A81647000
|
heap
|
page read and write
|
||
F7967FE000
|
stack
|
page read and write
|
||
17A81640000
|
heap
|
page read and write
|
||
282EEA47000
|
heap
|
page read and write
|
||
F796AFF000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
56C000
|
stack
|
page read and write
|
||
24888E57000
|
heap
|
page read and write
|
||
22C1DCB0000
|
heap
|
page read and write
|
||
28FDDF02000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
77D8BFA000
|
stack
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
21A1E780000
|
trusted library allocation
|
page read and write
|
||
28FDE602000
|
heap
|
page read and write
|
||
24888E58000
|
heap
|
page read and write
|
||
26C90302000
|
heap
|
page read and write
|
||
17A8166D000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
1688CD50000
|
trusted library allocation
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
10001000
|
unkown
|
page execute read
|
||
F51000
|
heap
|
page read and write
|
||
D89D6FF000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
BAF90FB000
|
stack
|
page read and write
|
||
26C903C8000
|
heap
|
page read and write
|
||
17A8166A000
|
heap
|
page read and write
|
||
D89D3FD000
|
stack
|
page read and write
|
||
26C8FA64000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
D89DAFE000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
26C900A0000
|
trusted library allocation
|
page read and write
|
||
7CF667E000
|
stack
|
page read and write
|
||
22C1DE02000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
17A8164E000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
BFF547E000
|
stack
|
page read and write
|
||
2A3154D0000
|
heap
|
page read and write
|
||
77D897B000
|
stack
|
page read and write
|
||
24888E00000
|
heap
|
page read and write
|
||
17A81632000
|
heap
|
page read and write
|
||
28FDDECA000
|
heap
|
page read and write
|
||
BFF537E000
|
stack
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
BFF567B000
|
stack
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
28FDDD00000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
24888F13000
|
heap
|
page read and write
|
||
1688BF6A000
|
heap
|
page read and write
|
||
17A81644000
|
heap
|
page read and write
|
||
4F046FE000
|
stack
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
28FDE712000
|
heap
|
page read and write
|
||
28FDE460000
|
trusted library allocation
|
page read and write
|
||
4F045FE000
|
stack
|
page read and write
|
||
4F047FE000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
77D887F000
|
stack
|
page read and write
|
||
26C8FB8E000
|
heap
|
page read and write
|
||
77D89F9000
|
stack
|
page read and write
|
||
24888E89000
|
heap
|
page read and write
|
||
22C1DF02000
|
heap
|
page read and write
|
||
24888E67000
|
heap
|
page read and write
|
||
77D8CFE000
|
stack
|
page read and write
|
||
2A31563F000
|
heap
|
page read and write
|
||
BFF54FC000
|
stack
|
page read and write
|
||
24888E3D000
|
heap
|
page read and write
|
||
28FDDEC7000
|
heap
|
page read and write
|
||
2A315702000
|
heap
|
page read and write
|
||
1688BF8C000
|
heap
|
page read and write
|
||
26C8FA13000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
26C903B0000
|
heap
|
page read and write
|
||
2488A990000
|
remote allocation
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
24888E2A000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
282EEA2E000
|
heap
|
page read and write
|
||
2A31565B000
|
heap
|
page read and write
|
||
17A8163D000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
24888F02000
|
heap
|
page read and write
|
||
E4EFBFC000
|
stack
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
24888E48000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
26C8FA66000
|
heap
|
page read and write
|
||
17A81662000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
282EEA3D000
|
heap
|
page read and write
|
||
22C1DE13000
|
heap
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
2A3155D0000
|
trusted library allocation
|
page read and write
|
||
17A81684000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
E80000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
10B69000
|
unkown
|
page readonly
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
2488A8D0000
|
trusted library allocation
|
page read and write
|
||
1688C0E5000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
28FDE700000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
C2D000
|
stack
|
page read and write
|
||
17A81674000
|
heap
|
page read and write
|
||
4C984F9000
|
stack
|
page read and write
|
||
22C1E602000
|
trusted library allocation
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
2A315470000
|
heap
|
page read and write
|
||
1688BF28000
|
heap
|
page read and write
|
||
17A81580000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
2488A990000
|
remote allocation
|
page read and write
|
||
17A81659000
|
heap
|
page read and write
|
||
24888DE0000
|
heap
|
page read and write
|
||
282EF002000
|
trusted library allocation
|
page read and write
|
||
1688BF69000
|
heap
|
page read and write
|
||
7CF69FD000
|
stack
|
page read and write
|
||
21A1E835000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
21A1E680000
|
heap
|
page read and write
|
||
17A8167E000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
28FDDCA0000
|
heap
|
page read and write
|
||
D89D5FD000
|
stack
|
page read and write
|
||
EEC000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
24888E47000
|
heap
|
page read and write
|
||
2A315713000
|
heap
|
page read and write
|
||
17A81660000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
21A1E829000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
282EE7D0000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
17A81668000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
4530000
|
heap
|
page read and write
|
||
26C8FA78000
|
heap
|
page read and write
|
||
17A8166B000
|
heap
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
26C8FA2C000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
BAF8FFF000
|
stack
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
1688C0C0000
|
trusted library allocation
|
page read and write
|
||
4C98379000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
2488A990000
|
remote allocation
|
page read and write
|
||
21A1E7B0000
|
remote allocation
|
page read and write
|
||
E4EF77E000
|
stack
|
page read and write
|
||
17A814E0000
|
heap
|
page read and write
|
||
26C90423000
|
heap
|
page read and write
|
||
282EEA38000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
28FDDE2A000
|
heap
|
page read and write
|
||
17A81E02000
|
trusted library allocation
|
page read and write
|
||
F7969F9000
|
stack
|
page read and write
|
||
17A81642000
|
heap
|
page read and write
|
||
282EEA41000
|
heap
|
page read and write
|
||
22C1DE79000
|
heap
|
page read and write
|
||
21A1E620000
|
heap
|
page read and write
|
||
7CF687D000
|
stack
|
page read and write
|
||
1688BDE0000
|
trusted library allocation
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
24888D80000
|
heap
|
page read and write
|
||
17A814F0000
|
heap
|
page read and write
|
||
4C983FF000
|
stack
|
page read and write
|
||
21A1F002000
|
trusted library allocation
|
page read and write
|
||
22C1DE6D000
|
heap
|
page read and write
|
||
17A81657000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
2A315665000
|
heap
|
page read and write
|
||
17A8167B000
|
heap
|
page read and write
|
||
26C8FA87000
|
heap
|
page read and write
|
||
21A1E7B0000
|
remote allocation
|
page read and write
|
||
E4EFCFC000
|
stack
|
page read and write
|
||
E4EFAFE000
|
stack
|
page read and write
|
||
1688BF6D000
|
heap
|
page read and write
|
||
BFF577C000
|
stack
|
page read and write
|
||
17A8165D000
|
heap
|
page read and write
|
||
22C1DF13000
|
heap
|
page read and write
|
||
1688BF30000
|
heap
|
page read and write
|
||
4F0416C000
|
stack
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
D89D1FB000
|
stack
|
page read and write
|
||
282EEF90000
|
trusted library allocation
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
4535000
|
heap
|
page read and write
|
||
2A315E02000
|
trusted library allocation
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
E4EF36B000
|
stack
|
page read and write
|
||
282EE7E0000
|
heap
|
page read and write
|
||
28FDDE87000
|
heap
|
page read and write
|
||
D89D8FF000
|
stack
|
page read and write
|
||
21A1E800000
|
heap
|
page read and write
|
||
BFF55FD000
|
stack
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
28FDE739000
|
heap
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
26C8F8B0000
|
heap
|
page read and write
|
||
17A81613000
|
heap
|
page read and write
|
||
2C71000
|
heap
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
2A315460000
|
heap
|
page read and write
|
||
BAF92FE000
|
stack
|
page read and write
|
||
2A315677000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1688CDA0000
|
trusted library allocation
|
page read and write
|
||
26C8FA71000
|
heap
|
page read and write
|
||
2A31566F000
|
heap
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
2488A910000
|
trusted library allocation
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
1688BF6D000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
26C8F8C0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
17A81550000
|
heap
|
page read and write
|
||
17A81679000
|
heap
|
page read and write
|
||
28FDDEB9000
|
heap
|
page read and write
|
||
17A8165A000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
4F048FE000
|
stack
|
page read and write
|
||
26C8FA7A000
|
heap
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
21A1E902000
|
heap
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
1688CD30000
|
heap
|
page readonly
|
||
4F041EE000
|
stack
|
page read and write
|
||
4C982F9000
|
stack
|
page read and write
|
||
26C8FB13000
|
heap
|
page read and write
|
||
4711000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
22C1DC50000
|
heap
|
page read and write
|
||
1688C0B0000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
282EEA00000
|
heap
|
page read and write
|
||
26C8FA6F000
|
heap
|
page read and write
|
||
26C90080000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
22C1DE22000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
17A81600000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
BFF5A7F000
|
stack
|
page read and write
|
||
17A81661000
|
heap
|
page read and write
|
||
4A05000
|
heap
|
page read and write
|
||
282EEA13000
|
heap
|
page read and write
|
||
2488A8A0000
|
trusted library allocation
|
page read and write
|
||
77D82AC000
|
stack
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
1688C0E0000
|
heap
|
page read and write
|
||
282EEA02000
|
heap
|
page read and write
|
||
26C90322000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
17A81664000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
26C90394000
|
heap
|
page read and write
|
||
7CF6A7F000
|
stack
|
page read and write
|
||
17A81663000
|
heap
|
page read and write
|
||
21A1E802000
|
heap
|
page read and write
|
||
77D8D7F000
|
stack
|
page read and write
|
||
77D8AFF000
|
stack
|
page read and write
|
||
1688BF20000
|
heap
|
page read and write
|
||
282EEA4A000
|
heap
|
page read and write
|
||
26C90413000
|
heap
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
28FDDF13000
|
heap
|
page read and write
|
||
28FDDE13000
|
heap
|
page read and write
|
||
17A8166F000
|
heap
|
page read and write
|
||
282EEA23000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
28FDDE83000
|
heap
|
page read and write
|
||
24888E13000
|
heap
|
page read and write
|
||
26C8FA29000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
282EE830000
|
heap
|
page read and write
|
||
17A81629000
|
heap
|
page read and write
|
||
24888E48000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1688CD20000
|
trusted library allocation
|
page read and write
|
||
22C1DE28000
|
heap
|
page read and write
|
||
F2B000
|
stack
|
page read and write
|
||
77D86FA000
|
stack
|
page read and write
|
||
26C8FA5F000
|
heap
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
BFF51FB000
|
stack
|
page read and write
|
||
E4EF9FE000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
17A81675000
|
heap
|
page read and write
|
||
1688C0F0000
|
trusted library allocation
|
page read and write
|
||
21A1E813000
|
heap
|
page read and write
|
||
10B69000
|
unkown
|
page readonly
|
||
D89D9FE000
|
stack
|
page read and write
|
||
E4EF8FF000
|
stack
|
page read and write
|
||
F7968FF000
|
stack
|
page read and write
|
||
77D8DFF000
|
stack
|
page read and write
|
||
F7963EB000
|
stack
|
page read and write
|
||
17A81658000
|
heap
|
page read and write
|
||
7CF616B000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
There are 453 hidden memdumps, click here to show them.