Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
script.ps1
|
Unicode text, UTF-8 text, with very long lines (11724)
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3lzrlpei.u5a.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xpumcbu2.euy.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6KV3ER4DHL09F2229XEM.temp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\script.ps1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2AACE193000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB65BC000
|
trusted library allocation
|
page read and write
|
||
2AAB62E3000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACE149000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F53000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
7FFBAD410000
|
trusted library allocation
|
page read and write
|
||
7FFBAD430000
|
trusted library allocation
|
page read and write
|
||
2AAB40C8000
|
heap
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACE000000
|
trusted library allocation
|
page read and write
|
||
2AAB4140000
|
trusted library allocation
|
page read and write
|
||
7FFBAD490000
|
trusted library allocation
|
page read and write
|
||
7FFBAD230000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
7FFBAD3E0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
FD74E7E000
|
stack
|
page read and write
|
||
7FFBAD256000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB63FB000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F6A000
|
trusted library allocation
|
page read and write
|
||
7FFBAD470000
|
trusted library allocation
|
page read and write
|
||
2AAB3E20000
|
heap
|
page read and write
|
||
2AAB5F54000
|
trusted library allocation
|
page read and write
|
||
2AACE0EB000
|
heap
|
page read and write
|
||
2AAB59A0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD4B0000
|
trusted library allocation
|
page read and write
|
||
2AAB5A70000
|
heap
|
page read and write
|
||
2AAB65CD000
|
trusted library allocation
|
page read and write
|
||
2AACE12A000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB3FB0000
|
heap
|
page read and write
|
||
2AAB5FE2000
|
trusted library allocation
|
page read and write
|
||
FD74EF8000
|
stack
|
page read and write
|
||
FD74DFD000
|
stack
|
page read and write
|
||
FD74BFE000
|
stack
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB65E6000
|
trusted library allocation
|
page read and write
|
||
2AAB5F66000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB640C000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB650A000
|
trusted library allocation
|
page read and write
|
||
2AAB5A80000
|
trusted library allocation
|
page read and write
|
||
2AACE15D000
|
heap
|
page read and write
|
||
FD750B8000
|
stack
|
page read and write
|
||
7FFBAD4D0000
|
trusted library allocation
|
page read and write
|
||
2AAB6610000
|
trusted library allocation
|
page read and write
|
||
2AAB6502000
|
trusted library allocation
|
page read and write
|
||
2AACE000000
|
trusted library allocation
|
page read and write
|
||
2AAB5F59000
|
trusted library allocation
|
page read and write
|
||
2AAB5F5C000
|
trusted library allocation
|
page read and write
|
||
7FFBAD312000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F54000
|
trusted library allocation
|
page read and write
|
||
2AAB4071000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB6592000
|
trusted library allocation
|
page read and write
|
||
FD74C7F000
|
stack
|
page read and write
|
||
2AACE123000
|
heap
|
page read and write
|
||
2AACDFF6000
|
trusted library allocation
|
page read and write
|
||
2AAB5A60000
|
trusted library allocation
|
page read and write
|
||
2AACE068000
|
heap
|
page read and write
|
||
2AAB5F6C000
|
trusted library allocation
|
page read and write
|
||
2AAB65FF000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAC5F90000
|
trusted library allocation
|
page read and write
|
||
2AACDFFC000
|
trusted library allocation
|
page read and write
|
||
2AAB6332000
|
trusted library allocation
|
page read and write
|
||
2AAB5F67000
|
trusted library allocation
|
page read and write
|
||
7FFBAD380000
|
trusted library allocation
|
page read and write
|
||
2AAB63B7000
|
trusted library allocation
|
page read and write
|
||
2AAB5F6B000
|
trusted library allocation
|
page read and write
|
||
2AAB5F6C000
|
trusted library allocation
|
page read and write
|
||
2AAB5F54000
|
trusted library allocation
|
page read and write
|
||
2AACE141000
|
heap
|
page read and write
|
||
7DF43A540000
|
trusted library allocation
|
page execute and read and write
|
||
2AACDFFC000
|
trusted library allocation
|
page read and write
|
||
2AAB5F5E000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB65D5000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AACE160000
|
heap
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB6512000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB4044000
|
heap
|
page read and write
|
||
7FFBAD174000
|
trusted library allocation
|
page read and write
|
||
7FFBAD440000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB5F5E000
|
trusted library allocation
|
page read and write
|
||
7FFBAD400000
|
trusted library allocation
|
page read and write
|
||
2AAB6585000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACE14C000
|
heap
|
page read and write
|
||
2AACE010000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AACE163000
|
heap
|
page read and write
|
||
7FFBAD352000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F52000
|
trusted library allocation
|
page read and write
|
||
2AACE132000
|
heap
|
page read and write
|
||
7FFBAD17D000
|
trusted library allocation
|
page execute and read and write
|
||
FD752BC000
|
stack
|
page read and write
|
||
2AAB639E000
|
trusted library allocation
|
page read and write
|
||
7FFBAD407000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AACE14A000
|
heap
|
page read and write
|
||
FD74FB7000
|
stack
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5AC5000
|
heap
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F54000
|
trusted library allocation
|
page read and write
|
||
7FFBAD3D0000
|
trusted library allocation
|
page read and write
|
||
2AAB4180000
|
heap
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
7FFBAD321000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
FD74D7E000
|
stack
|
page read and write
|
||
7FFBAD173000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB5F55000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB6569000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB5F67000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACDFF2000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB3FE2000
|
heap
|
page read and write
|
||
7FFBAD450000
|
trusted library allocation
|
page read and write
|
||
2AAB5960000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB406C000
|
heap
|
page read and write
|
||
7FFBAD3B0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACE000000
|
trusted library allocation
|
page read and write
|
||
2AAB65C4000
|
trusted library allocation
|
page read and write
|
||
2AAB65A3000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB3FEB000
|
heap
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
7FFBAD3A5000
|
trusted library allocation
|
page read and write
|
||
2AAB65DE000
|
trusted library allocation
|
page read and write
|
||
7FFBAD170000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AACE050000
|
heap
|
page execute and read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB3FD0000
|
heap
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB4185000
|
heap
|
page read and write
|
||
2AAB5F56000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB6607000
|
trusted library allocation
|
page read and write
|
||
2AAB5A90000
|
heap
|
page execute and read and write
|
||
2AAB5F59000
|
trusted library allocation
|
page read and write
|
||
2AACE060000
|
heap
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB6382000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB6618000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB647A000
|
trusted library allocation
|
page read and write
|
||
2AAB5F56000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
7FFBAD390000
|
trusted library allocation
|
page read and write
|
||
7FFBAD4C0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD180000
|
trusted library allocation
|
page read and write
|
||
2AAB6396000
|
trusted library allocation
|
page read and write
|
||
2AAB5F67000
|
trusted library allocation
|
page read and write
|
||
2AAB6354000
|
trusted library allocation
|
page read and write
|
||
2AACE000000
|
trusted library allocation
|
page read and write
|
||
2AAB5F70000
|
heap
|
page read and write
|
||
2AAB62DB000
|
trusted library allocation
|
page read and write
|
||
2AACE460000
|
heap
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
7FFBAD460000
|
trusted library allocation
|
page read and write
|
||
2AACE480000
|
heap
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F55000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACE100000
|
heap
|
page read and write
|
||
2AAB6472000
|
trusted library allocation
|
page read and write
|
||
2AAB633A000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAC5F81000
|
trusted library allocation
|
page read and write
|
||
2AACE000000
|
trusted library allocation
|
page read and write
|
||
2AACE157000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD290000
|
trusted library allocation
|
page execute and read and write
|
||
7FFBAD226000
|
trusted library allocation
|
page read and write
|
||
7FFBAD370000
|
trusted library allocation
|
page read and write
|
||
2AAB3F80000
|
heap
|
page read and write
|
||
2AAB5F63000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB62AE000
|
trusted library allocation
|
page read and write
|
||
7FFBAD3C0000
|
trusted library allocation
|
page read and write
|
||
2AACE000000
|
trusted library allocation
|
page read and write
|
||
2AACE057000
|
heap
|
page execute and read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB4160000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AACDFF3000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACDFFD000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5A00000
|
heap
|
page execute and read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
FD74CFE000
|
stack
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
FD74A75000
|
stack
|
page read and write
|
||
7FFBAD220000
|
trusted library allocation
|
page read and write
|
||
2AAB6488000
|
trusted library allocation
|
page read and write
|
||
7FFBAD3A0000
|
trusted library allocation
|
page read and write
|
||
2AACDFF2000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD360000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F81000
|
trusted library allocation
|
page read and write
|
||
2AAB65B4000
|
trusted library allocation
|
page read and write
|
||
7FFBAD32D000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F59000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
FD74F3E000
|
stack
|
page read and write
|
||
2AAB6189000
|
trusted library allocation
|
page read and write
|
||
2AAC5FDE000
|
trusted library allocation
|
page read and write
|
||
2AAB65F7000
|
trusted library allocation
|
page read and write
|
||
2AACE123000
|
heap
|
page read and write
|
||
2AAB4170000
|
heap
|
page readonly
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F52000
|
trusted library allocation
|
page read and write
|
||
2AAB5F6B000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB4098000
|
heap
|
page read and write
|
||
2AAB5F5A000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F53000
|
trusted library allocation
|
page read and write
|
||
2AAB637A000
|
trusted library allocation
|
page read and write
|
||
2AAB5F52000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD480000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
7FFBAD340000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
FD75039000
|
stack
|
page read and write
|
||
2AAB657B000
|
trusted library allocation
|
page read and write
|
||
2AAB5F55000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD190000
|
trusted library allocation
|
page read and write
|
||
FD7523E000
|
stack
|
page read and write
|
||
2AAB4008000
|
heap
|
page read and write
|
||
2AAB4019000
|
heap
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AACE13B000
|
heap
|
page read and write
|
||
FD74B7E000
|
stack
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB659B000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AACE0CB000
|
heap
|
page read and write
|
||
2AAB6225000
|
trusted library allocation
|
page read and write
|
||
2AAB4015000
|
heap
|
page read and write
|
||
FD7513F000
|
stack
|
page read and write
|
||
7FFBAD420000
|
trusted library allocation
|
page read and write
|
||
2AAB5F60000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB5F6A000
|
trusted library allocation
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB5AC0000
|
heap
|
page read and write
|
||
2AAB65AB000
|
trusted library allocation
|
page read and write
|
||
2AAB6520000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
7FFBAD4A0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD183000
|
trusted library allocation
|
page read and write
|
||
2AACE12D000
|
heap
|
page read and write
|
||
2AAB3F60000
|
heap
|
page read and write
|
||
2AAB6538000
|
trusted library allocation
|
page read and write
|
||
2AAB63A7000
|
trusted library allocation
|
page read and write
|
||
2AAB40A4000
|
heap
|
page read and write
|
||
2AACE147000
|
heap
|
page read and write
|
||
2AAB4042000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F54000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
2AAB3FD8000
|
heap
|
page read and write
|
||
2AACDFF0000
|
trusted library allocation
|
page read and write
|
||
7FFBAD22C000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB406E000
|
heap
|
page read and write
|
||
2AAB5A64000
|
trusted library allocation
|
page read and write
|
||
2AAB6329000
|
trusted library allocation
|
page read and write
|
||
2AACE020000
|
trusted library allocation
|
page read and write
|
||
2AAB402F000
|
heap
|
page read and write
|
||
2AAB5E10000
|
heap
|
page read and write
|
||
7FFBAD1CC000
|
trusted library allocation
|
page execute and read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
FD751BE000
|
stack
|
page read and write
|
||
2AACE15D000
|
heap
|
page read and write
|
||
2AAB6403000
|
trusted library allocation
|
page read and write
|
||
2AAB5F59000
|
trusted library allocation
|
page read and write
|
||
2AACE108000
|
heap
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
2AAB5F61000
|
trusted library allocation
|
page read and write
|
||
FD74AFE000
|
stack
|
page read and write
|
||
2AACE139000
|
heap
|
page read and write
|
||
2AACE168000
|
heap
|
page read and write
|
||
2AAB6469000
|
trusted library allocation
|
page read and write
|
||
2AAB64A4000
|
trusted library allocation
|
page read and write
|
||
2AAB65EE000
|
trusted library allocation
|
page read and write
|
||
2AAB5F51000
|
trusted library allocation
|
page read and write
|
||
7FFBAD4E0000
|
trusted library allocation
|
page read and write
|
||
2AAB5F50000
|
trusted library allocation
|
page read and write
|
||
7FFBAD3F0000
|
trusted library allocation
|
page read and write
|
||
2AACE157000
|
heap
|
page read and write
|
||
2AACE071000
|
heap
|
page read and write
|
||
2AAB5F59000
|
trusted library allocation
|
page read and write
|
There are 336 hidden memdumps, click here to show them.