Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://www.innosetup.com
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.22.236.225
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3E0000
|
heap
|
page read and write
|
||
2468E278000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
32B000
|
stack
|
page read and write
|
||
23B9CC2D000
|
heap
|
page read and write
|
||
17BB0A3C000
|
heap
|
page read and write
|
||
71A36BC000
|
stack
|
page read and write
|
||
193C1F13000
|
heap
|
page read and write
|
||
2468E263000
|
heap
|
page read and write
|
||
17BB0950000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1F12D330000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
9E034FE000
|
stack
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
16AD5258000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
85C57FC000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
26018B20000
|
trusted library allocation
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
17BB1302000
|
heap
|
page read and write
|
||
193C1D30000
|
heap
|
page read and write
|
||
2468E25B000
|
heap
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
26018C49000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
26018C02000
|
heap
|
page read and write
|
||
17BB0A58000
|
heap
|
page read and write
|
||
1ED59A00000
|
heap
|
page read and write
|
||
23B9CC2B000
|
heap
|
page read and write
|
||
9E035FF000
|
stack
|
page read and write
|
||
17BB0850000
|
heap
|
page read and write
|
||
17BB1390000
|
heap
|
page read and write
|
||
4290000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
16AD5240000
|
heap
|
page read and write
|
||
1ED59C29000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
71A3AFB000
|
stack
|
page read and write
|
||
2A21000
|
heap
|
page read and write
|
||
85C530B000
|
stack
|
page read and write
|
||
1F12D45C000
|
heap
|
page read and write
|
||
3AC3B7B000
|
stack
|
page read and write
|
||
3AC41FC000
|
stack
|
page read and write
|
||
23B9CD30000
|
trusted library allocation
|
page read and write
|
||
73E71F9000
|
stack
|
page read and write
|
||
17BB1427000
|
heap
|
page read and write
|
||
16AD5228000
|
heap
|
page read and write
|
||
2FA75890000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
5D0307E000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
9E02F4B000
|
stack
|
page read and write
|
||
2468E229000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
23B9CDB0000
|
trusted library allocation
|
page read and write
|
||
1F12D400000
|
heap
|
page read and write
|
||
1F12D440000
|
heap
|
page read and write
|
||
6E1BCFF000
|
stack
|
page read and write
|
||
2468E23B000
|
heap
|
page read and write
|
||
2468E26B000
|
heap
|
page read and write
|
||
26018C66000
|
heap
|
page read and write
|
||
16AD5270000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
17BB0A00000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
2468E268000
|
heap
|
page read and write
|
||
26018C13000
|
heap
|
page read and write
|
||
2FA75A00000
|
heap
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
193C1E13000
|
heap
|
page read and write
|
||
1F12D413000
|
heap
|
page read and write
|
||
26018B70000
|
trusted library allocation
|
page read and write
|
||
2A21000
|
heap
|
page read and write
|
||
71A437F000
|
stack
|
page read and write
|
||
1F12DB30000
|
remote allocation
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
16AD50E0000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
193C1D60000
|
trusted library allocation
|
page read and write
|
||
73E70FF000
|
stack
|
page read and write
|
||
23B9CC4B000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
17BB0A89000
|
heap
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
1ED5A402000
|
heap
|
page read and write
|
||
1ED59A70000
|
heap
|
page read and write
|
||
3AC46FF000
|
stack
|
page read and write
|
||
71A3DFC000
|
stack
|
page read and write
|
||
2468E26E000
|
heap
|
page read and write
|
||
16AD5213000
|
heap
|
page read and write
|
||
6E1B97A000
|
stack
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
193C1E41000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
26018BF0000
|
remote allocation
|
page read and write
|
||
FC11D7E000
|
stack
|
page read and write
|
||
85C5BFD000
|
stack
|
page read and write
|
||
17BB1400000
|
heap
|
page read and write
|
||
2468E232000
|
heap
|
page read and write
|
||
7BB737E000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
6E1B879000
|
stack
|
page read and write
|
||
6E1BA7F000
|
stack
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
4BB5000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
10B69000
|
unkown
|
page readonly
|
||
71A417F000
|
stack
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
2468E24A000
|
heap
|
page read and write
|
||
2B9B000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1F12DB30000
|
remote allocation
|
page read and write
|
||
117F000
|
stack
|
page read and write
|
||
26018A20000
|
heap
|
page read and write
|
||
17BB0A86000
|
heap
|
page read and write
|
||
26018D18000
|
heap
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
73E73FE000
|
stack
|
page read and write
|
||
1F12D3A0000
|
heap
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
2468E27B000
|
heap
|
page read and write
|
||
193C2602000
|
trusted library allocation
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
1ED59C13000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
23B9CA60000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
71A3C7E000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
17BB1354000
|
heap
|
page read and write
|
||
26018C40000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
2FA75A3E000
|
heap
|
page read and write
|
||
26018D02000
|
heap
|
page read and write
|
||
2468EA02000
|
trusted library allocation
|
page read and write
|
||
23B9D760000
|
trusted library allocation
|
page read and write
|
||
23B9CC47000
|
heap
|
page read and write
|
||
17BB1343000
|
heap
|
page read and write
|
||
17BB13AE000
|
heap
|
page read and write
|
||
23B9CBE0000
|
heap
|
page read and write
|
||
23B9CBA0000
|
heap
|
page read and write
|
||
17BB1313000
|
heap
|
page read and write
|
||
17BB1202000
|
heap
|
page read and write
|
||
2FA75A13000
|
heap
|
page read and write
|
||
85C597E000
|
stack
|
page read and write
|
||
2FA75A02000
|
heap
|
page read and write
|
||
2A21000
|
heap
|
page read and write
|
||
2468E24F000
|
heap
|
page read and write
|
||
17BB1423000
|
heap
|
page read and write
|
||
193C1F02000
|
heap
|
page read and write
|
||
26018BF0000
|
remote allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
2468E257000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
23B9D9B0000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
1ED59D02000
|
heap
|
page read and write
|
||
2FA75A37000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
193C1E02000
|
heap
|
page read and write
|
||
26018C58000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2468E259000
|
heap
|
page read and write
|
||
17BB0B8E000
|
heap
|
page read and write
|
||
23B9CDA5000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
5D02A7B000
|
stack
|
page read and write
|
||
1F12D340000
|
heap
|
page read and write
|
||
17BB13BC000
|
heap
|
page read and write
|
||
2468E23D000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
1ED59CB8000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
3AC48FF000
|
stack
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
193C1E00000
|
heap
|
page read and write
|
||
2FA759E0000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
16AD5202000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
26018C59000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
23B9D9D0000
|
trusted library allocation
|
page read and write
|
||
2468E180000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
17BB0BE5000
|
heap
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
4991000
|
heap
|
page read and write
|
||
1ED59A10000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
9E02FCE000
|
stack
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2468E302000
|
heap
|
page read and write
|
||
23B9CDA9000
|
heap
|
page read and write
|
||
1ED59CC9000
|
heap
|
page read and write
|
||
7BB727F000
|
stack
|
page read and write
|
||
3AC47FE000
|
stack
|
page read and write
|
||
10033000
|
unkown
|
page execute read
|
||
73E72FF000
|
stack
|
page read and write
|
||
2601A602000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
71A3EFC000
|
stack
|
page read and write
|
||
2C15000
|
heap
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
10B69000
|
unkown
|
page readonly
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1ED59C00000
|
heap
|
page read and write
|
||
23B9CC24000
|
heap
|
page read and write
|
||
36B000
|
stack
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
1F12D402000
|
heap
|
page read and write
|
||
390000
|
trusted library allocation
|
page read and write
|
||
6E1BB7F000
|
stack
|
page read and write
|
||
17BB1402000
|
heap
|
page read and write
|
||
73E7379000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
10B69000
|
unkown
|
page readonly
|
||
2468E24E000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
26018C00000
|
heap
|
page read and write
|
||
1ED59CE1000
|
heap
|
page read and write
|
||
17BB0A77000
|
heap
|
page read and write
|
||
32C000
|
stack
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
17BB0970000
|
trusted library allocation
|
page read and write
|
||
2468E226000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
23B9CDA0000
|
heap
|
page read and write
|
||
23B9CA70000
|
trusted library allocation
|
page read and write
|
||
3AC43FD000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
23B9CC2B000
|
heap
|
page read and write
|
||
2468E170000
|
heap
|
page read and write
|
||
2468E266000
|
heap
|
page read and write
|
||
2468E261000
|
heap
|
page read and write
|
||
FC11F79000
|
stack
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
3AC44FE000
|
stack
|
page read and write
|
||
17BB0A43000
|
heap
|
page read and write
|
||
73E7179000
|
stack
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2B5C000
|
stack
|
page read and write
|
||
2FA75A52000
|
heap
|
page read and write
|
||
26018C2A000
|
heap
|
page read and write
|
||
17BB1430000
|
heap
|
page read and write
|
||
26018B40000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
1ED59CC0000
|
heap
|
page read and write
|
||
1F12D3D0000
|
trusted library allocation
|
page read and write
|
||
2468E243000
|
heap
|
page read and write
|
||
FC1207E000
|
stack
|
page read and write
|
||
23B9CD40000
|
trusted library allocation
|
page read and write
|
||
7BB6BFF000
|
stack
|
page read and write
|
||
9E036FF000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
7BB6D7F000
|
stack
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
26018D1C000
|
heap
|
page read and write
|
||
17BB0A74000
|
heap
|
page read and write
|
||
23B9CBC0000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
73E6D9B000
|
stack
|
page read and write
|
||
7BB6F7E000
|
stack
|
page read and write
|
||
17BB1322000
|
heap
|
page read and write
|
||
85C5D7E000
|
stack
|
page read and write
|
||
2468E241000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
4291000
|
heap
|
page read and write
|
||
2FA76202000
|
trusted library allocation
|
page read and write
|
||
5D02D7B000
|
stack
|
page read and write
|
||
17BB0A8E000
|
heap
|
page read and write
|
||
1F12D429000
|
heap
|
page read and write
|
||
1F12D502000
|
heap
|
page read and write
|
||
3AC3F7B000
|
stack
|
page read and write
|
||
16AD5279000
|
heap
|
page read and write
|
||
193C1CD0000
|
heap
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
7BB6E7E000
|
stack
|
page read and write
|
||
16AD5302000
|
heap
|
page read and write
|
||
2FA758E0000
|
heap
|
page read and write
|
||
17BB07F0000
|
heap
|
page read and write
|
||
16AD5313000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
2468E940000
|
trusted library allocation
|
page read and write
|
||
6E1BC7A000
|
stack
|
page read and write
|
||
16AD5200000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3AC40FF000
|
stack
|
page read and write
|
||
1F12DB30000
|
remote allocation
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
9E033FE000
|
stack
|
page read and write
|
||
260189B0000
|
heap
|
page read and write
|
||
23B9CBE8000
|
heap
|
page read and write
|
||
2468E233000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
7BB717C000
|
stack
|
page read and write
|
||
17BB1413000
|
heap
|
page read and write
|
||
1ED59D13000
|
heap
|
page read and write
|
||
193C1E67000
|
heap
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
85C587E000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
17BB0BB9000
|
heap
|
page read and write
|
||
26018C7B000
|
heap
|
page read and write
|
||
26018D13000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
71A3F7B000
|
stack
|
page read and write
|
||
26018C59000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
23B9CC2B000
|
heap
|
page read and write
|
||
193C1CC0000
|
heap
|
page read and write
|
||
17BB0A84000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1ED59B70000
|
trusted library allocation
|
page read and write
|
||
7BB67CC000
|
stack
|
page read and write
|
||
17BB1300000
|
heap
|
page read and write
|
||
17BB0A43000
|
heap
|
page read and write
|
||
16AD5A02000
|
trusted library allocation
|
page read and write
|
||
17BB0A2C000
|
heap
|
page read and write
|
||
17BB07E0000
|
heap
|
page read and write
|
||
16AD5140000
|
heap
|
page read and write
|
||
26018BB0000
|
trusted library allocation
|
page read and write
|
||
23B9D9E0000
|
trusted library allocation
|
page read and write
|
||
17BB0B13000
|
heap
|
page read and write
|
||
5D02F7E000
|
stack
|
page read and write
|
||
17BB1322000
|
heap
|
page read and write
|
||
16AD5300000
|
heap
|
page read and write
|
||
2FA75A2F000
|
heap
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
6E1B7FB000
|
stack
|
page read and write
|
||
17BB0A90000
|
heap
|
page read and write
|
||
16AD5170000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
6E1B6FF000
|
stack
|
page read and write
|
||
FC11E7E000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
260189C0000
|
heap
|
page read and write
|
||
2468E27F000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
23B9DA30000
|
trusted library allocation
|
page read and write
|
||
71A3D7E000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
193C1E5B000
|
heap
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
17BB0A29000
|
heap
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
2FA75A44000
|
heap
|
page read and write
|
||
2468E213000
|
heap
|
page read and write
|
||
23B9CC50000
|
heap
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
73E707D000
|
stack
|
page read and write
|
||
17BB0A55000
|
heap
|
page read and write
|
||
23B9D770000
|
trusted library allocation
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
2FA75880000
|
heap
|
page read and write
|
||
71A407C000
|
stack
|
page read and write
|
||
10006000
|
unkown
|
page execute read
|
||
17BB1308000
|
heap
|
page read and write
|
||
26018BF0000
|
remote allocation
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
17BB0A13000
|
heap
|
page read and write
|
||
2FA75A29000
|
heap
|
page read and write
|
||
FC1196B000
|
stack
|
page read and write
|
||
7BB707C000
|
stack
|
page read and write
|
||
2468E1E0000
|
heap
|
page read and write
|
||
85C5AFE000
|
stack
|
page read and write
|
||
2468E27C000
|
heap
|
page read and write
|
||
26018C49000
|
heap
|
page read and write
|
||
2468E264000
|
heap
|
page read and write
|
||
1ED59C43000
|
heap
|
page read and write
|
||
1F12DC02000
|
trusted library allocation
|
page read and write
|
||
1ED5A500000
|
heap
|
page read and write
|
||
5D02E7B000
|
stack
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
2468E258000
|
heap
|
page read and write
|
||
2468E200000
|
heap
|
page read and write
|
||
6E1B57F000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
1ED59C6E000
|
heap
|
page read and write
|
||
2468E25D000
|
heap
|
page read and write
|
||
23B9D9C0000
|
heap
|
page readonly
|
||
4291000
|
heap
|
page read and write
|
||
9E0327E000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
16AD50D0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
73E727F000
|
stack
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
193C1E29000
|
heap
|
page read and write
|
||
3AC45FF000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
2468E26C000
|
heap
|
page read and write
|
||
2468E285000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
85C5A7E000
|
stack
|
page read and write
|
||
17BB0A69000
|
heap
|
page read and write
|
||
2468E247000
|
heap
|
page read and write
|
||
16AD5275000
|
heap
|
page read and write
|
||
193C1E75000
|
heap
|
page read and write
|
||
26018C8A000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
26018C48000
|
heap
|
page read and write
|
||
2468E260000
|
heap
|
page read and write
|
||
2FA75B02000
|
heap
|
page read and write
|
||
1002D000
|
unkown
|
page read and write
|
||
10434000
|
unkown
|
page execute read
|
||
71A427C000
|
stack
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
26018D00000
|
heap
|
page read and write
|
||
17BB136D000
|
heap
|
page read and write
|
||
6E1B1BB000
|
stack
|
page read and write
|
There are 441 hidden memdumps, click here to show them.