Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
X4KSeQkYJT.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\python310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI73522\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
JSON data
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\X4KSeQkYJT.exe
|
"C:\Users\user\Desktop\X4KSeQkYJT.exe"
|
||
C:\Users\user\Desktop\X4KSeQkYJT.exe
|
"C:\Users\user\Desktop\X4KSeQkYJT.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/imp
|
unknown
|
||
http://crl3.digip
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://www.openssl.org/H
|
unknown
|
||
https://www.python.org/dev/peps/pep-0205/
|
unknown
|
||
https://python.org/dev/peps/pep-0263/
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/cor
|
unknown
|
||
http://crl3.digi
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
http://json.org
|
unknown
|
There are 6 hidden URLs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF7A6A21000
|
unkown
|
page execute read
|
||
1FB0DA22000
|
heap
|
page read and write
|
||
1FB0DA4B000
|
heap
|
page read and write
|
||
1FB0DA0F000
|
heap
|
page read and write
|
||
1931B085000
|
heap
|
page read and write
|
||
1FB0E182000
|
heap
|
page read and write
|
||
1FB0FD3E000
|
heap
|
page read and write
|
||
7FFE1A500000
|
unkown
|
page readonly
|
||
1FB0D9BB000
|
heap
|
page read and write
|
||
1931B076000
|
heap
|
page read and write
|
||
1FB0E242000
|
heap
|
page read and write
|
||
1FB0D98B000
|
heap
|
page read and write
|
||
1FB0D9D2000
|
heap
|
page read and write
|
||
1FB0E262000
|
heap
|
page read and write
|
||
1FB0DA1E000
|
heap
|
page read and write
|
||
1FB0D9F3000
|
heap
|
page read and write
|
||
1FB0D9D4000
|
heap
|
page read and write
|
||
7FFDFB885000
|
unkown
|
page readonly
|
||
1FB0E1E2000
|
heap
|
page read and write
|
||
1FB0E1D0000
|
heap
|
page read and write
|
||
1FB0DA2F000
|
heap
|
page read and write
|
||
1FB0E1BE000
|
heap
|
page read and write
|
||
1FB0D9CB000
|
heap
|
page read and write
|
||
7FF7A6A57000
|
unkown
|
page read and write
|
||
1FB0D9F3000
|
heap
|
page read and write
|
||
1FB0FD2B000
|
heap
|
page read and write
|
||
7FF7A6A45000
|
unkown
|
page readonly
|
||
7FFE1A453000
|
unkown
|
page readonly
|
||
1FB0FD62000
|
heap
|
page read and write
|
||
1FB0FD62000
|
heap
|
page read and write
|
||
1931B081000
|
heap
|
page read and write
|
||
7FF7A6A68000
|
unkown
|
page readonly
|
||
1FB0E1D2000
|
heap
|
page read and write
|
||
1931B160000
|
heap
|
page read and write
|
||
7FFE1A455000
|
unkown
|
page read and write
|
||
7FF7A6A45000
|
unkown
|
page readonly
|
||
1FB0DA4E000
|
heap
|
page read and write
|
||
7FFDFB858000
|
unkown
|
page write copy
|
||
1FB0FC98000
|
direct allocation
|
page read and write
|
||
7FFDFB8A7000
|
unkown
|
page readonly
|
||
1931B07F000
|
heap
|
page read and write
|
||
7FFE1A470000
|
unkown
|
page readonly
|
||
1FB0E1E1000
|
heap
|
page read and write
|
||
1FB0D9EA000
|
heap
|
page read and write
|
||
1FB0DA04000
|
heap
|
page read and write
|
||
1FB0DA2F000
|
heap
|
page read and write
|
||
1FB0D9AC000
|
heap
|
page read and write
|
||
1FB0E175000
|
heap
|
page read and write
|
||
7FFDFB769000
|
unkown
|
page readonly
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0E202000
|
heap
|
page read and write
|
||
1FB0E182000
|
heap
|
page read and write
|
||
1FB0E242000
|
heap
|
page read and write
|
||
1FB0DA1B000
|
heap
|
page read and write
|
||
1FB0D9E8000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
33E8BDF000
|
stack
|
page read and write
|
||
1FB0E199000
|
heap
|
page read and write
|
||
33E8DCF000
|
stack
|
page read and write
|
||
1FB0E262000
|
heap
|
page read and write
|
||
1FB0D9C0000
|
heap
|
page read and write
|
||
1FB0E1A4000
|
heap
|
page read and write
|
||
7FFE1A516000
|
unkown
|
page read and write
|
||
7FF7A6A66000
|
unkown
|
page read and write
|
||
7FF7A6A68000
|
unkown
|
page readonly
|
||
1FB0DA0C000
|
heap
|
page read and write
|
||
1FB0E1D3000
|
heap
|
page read and write
|
||
1FB0D9D4000
|
heap
|
page read and write
|
||
1FB0E1FA000
|
heap
|
page read and write
|
||
1FB0E1C0000
|
heap
|
page read and write
|
||
1FB0FBBC000
|
direct allocation
|
page read and write
|
||
1FB0E1C1000
|
heap
|
page read and write
|
||
1FB0E26A000
|
heap
|
page read and write
|
||
1FB0D9EB000
|
heap
|
page read and write
|
||
1FB0E1F7000
|
heap
|
page read and write
|
||
7FFE1A4F0000
|
unkown
|
page readonly
|
||
1FB0E24F000
|
heap
|
page read and write
|
||
1FB0E26E000
|
heap
|
page read and write
|
||
1FB0D830000
|
heap
|
page read and write
|
||
1FB0D9D2000
|
heap
|
page read and write
|
||
7FF7A6A57000
|
unkown
|
page write copy
|
||
1FB0D9C4000
|
heap
|
page read and write
|
||
1FB0E1A6000
|
heap
|
page read and write
|
||
7FFE13342000
|
unkown
|
page readonly
|
||
7FF7A6A20000
|
unkown
|
page readonly
|
||
1931B040000
|
heap
|
page read and write
|
||
1FB0DA2F000
|
heap
|
page read and write
|
||
1FB0E1D1000
|
heap
|
page read and write
|
||
1FB0D9C3000
|
heap
|
page read and write
|
||
7FF7A6A20000
|
unkown
|
page readonly
|
||
1931B180000
|
heap
|
page read and write
|
||
1FB0FCB0000
|
direct allocation
|
page read and write
|
||
1FB0D950000
|
heap
|
page read and write
|
||
1FB0FD43000
|
heap
|
page read and write
|
||
1FB0D993000
|
heap
|
page read and write
|
||
7FF7A6A21000
|
unkown
|
page execute read
|
||
1FB0D98E000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0E262000
|
heap
|
page read and write
|
||
1FB0D9E5000
|
heap
|
page read and write
|
||
7FFE1A460000
|
unkown
|
page readonly
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0DA2A000
|
heap
|
page read and write
|
||
1FB0D9BC000
|
heap
|
page read and write
|
||
7FFE1A451000
|
unkown
|
page execute read
|
||
1FB0FF1C000
|
direct allocation
|
page read and write
|
||
BF2B7ED000
|
stack
|
page read and write
|
||
1FB0DA4E000
|
heap
|
page read and write
|
||
7FF7A6A57000
|
unkown
|
page write copy
|
||
1FB0FCD0000
|
direct allocation
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0DAAC000
|
direct allocation
|
page read and write
|
||
7FF7A6A57000
|
unkown
|
page read and write
|
||
1FB0E1FA000
|
heap
|
page read and write
|
||
7FF7A6A20000
|
unkown
|
page readonly
|
||
7FF7A6A5A000
|
unkown
|
page read and write
|
||
1931B076000
|
heap
|
page read and write
|
||
1FB0D9E0000
|
heap
|
page read and write
|
||
1FB0E1DD000
|
heap
|
page read and write
|
||
7FF7A6A66000
|
unkown
|
page read and write
|
||
1FB0DB34000
|
direct allocation
|
page read and write
|
||
7FFE1A511000
|
unkown
|
page readonly
|
||
1931B087000
|
heap
|
page read and write
|
||
1FB0E1E3000
|
heap
|
page read and write
|
||
7FFDFB698000
|
unkown
|
page readonly
|
||
1FB0D9DF000
|
heap
|
page read and write
|
||
1FB0D9DF000
|
heap
|
page read and write
|
||
1FB0D9E2000
|
heap
|
page read and write
|
||
1FB0DA4C000
|
heap
|
page read and write
|
||
1FB0DA2F000
|
heap
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0D910000
|
heap
|
page read and write
|
||
1FB0D9F1000
|
heap
|
page read and write
|
||
7FFE1A4F1000
|
unkown
|
page execute read
|
||
1FB0D9CE000
|
heap
|
page read and write
|
||
1FB0D9CE000
|
heap
|
page read and write
|
||
7FFE1A461000
|
unkown
|
page execute read
|
||
1FB0E25D000
|
heap
|
page read and write
|
||
1FB0E1F7000
|
heap
|
page read and write
|
||
1FB0D994000
|
heap
|
page read and write
|
||
1FB0DA48000
|
heap
|
page read and write
|
||
1FB0E1C0000
|
heap
|
page read and write
|
||
1FB0E192000
|
heap
|
page read and write
|
||
1FB0E1DE000
|
heap
|
page read and write
|
||
1FB0D9D0000
|
heap
|
page read and write
|
||
1FB0E1F7000
|
heap
|
page read and write
|
||
1FB0E1B4000
|
heap
|
page read and write
|
||
1FB0E18B000
|
heap
|
page read and write
|
||
1FB0E25D000
|
heap
|
page read and write
|
||
7FFDFB460000
|
unkown
|
page readonly
|
||
1FB0E1A5000
|
heap
|
page read and write
|
||
7FFE13331000
|
unkown
|
page execute read
|
||
1FB0E1F6000
|
heap
|
page read and write
|
||
1FB0D98E000
|
heap
|
page read and write
|
||
7FFE1A4F9000
|
unkown
|
page readonly
|
||
1FB0DA09000
|
heap
|
page read and write
|
||
1FB0E1A1000
|
heap
|
page read and write
|
||
1FB0FD5C000
|
heap
|
page read and write
|
||
7FFDFB859000
|
unkown
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
7FFDFB85B000
|
unkown
|
page write copy
|
||
7FFE13340000
|
unkown
|
page read and write
|
||
1FB0D9D8000
|
heap
|
page read and write
|
||
1FB0FB10000
|
direct allocation
|
page read and write
|
||
1FB0D9F5000
|
heap
|
page read and write
|
||
7FF7A6A21000
|
unkown
|
page execute read
|
||
1FB0E170000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0D9E5000
|
heap
|
page read and write
|
||
1FB0D957000
|
heap
|
page read and write
|
||
7FF7A6A21000
|
unkown
|
page execute read
|
||
7FFDFB83B000
|
unkown
|
page read and write
|
||
7FF7A6A20000
|
unkown
|
page readonly
|
||
1FB0DA4B000
|
heap
|
page read and write
|
||
1FB0FC64000
|
direct allocation
|
page read and write
|
||
1FB0E1A7000
|
heap
|
page read and write
|
||
1FB0DA4C000
|
heap
|
page read and write
|
||
1FB0E262000
|
heap
|
page read and write
|
||
7FFDFB727000
|
unkown
|
page readonly
|
||
7FFE13330000
|
unkown
|
page readonly
|
||
1FB0D9E1000
|
heap
|
page read and write
|
||
1FB0E268000
|
heap
|
page read and write
|
||
1FB0E192000
|
heap
|
page read and write
|
||
1FB0E262000
|
heap
|
page read and write
|
||
1FB0D9F6000
|
heap
|
page read and write
|
||
1FB0E1BF000
|
heap
|
page read and write
|
||
1FB0FCDC000
|
direct allocation
|
page read and write
|
||
1FB0DA23000
|
heap
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0D9FE000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
7FFE1A456000
|
unkown
|
page readonly
|
||
7FFDFB874000
|
unkown
|
page read and write
|
||
1FB0D9FA000
|
heap
|
page read and write
|
||
1FB0D9F3000
|
heap
|
page read and write
|
||
1FB0DA60000
|
direct allocation
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0D9E8000
|
heap
|
page read and write
|
||
1FB0D9D1000
|
heap
|
page read and write
|
||
1FB0DA23000
|
heap
|
page read and write
|
||
1FB0DA32000
|
heap
|
page read and write
|
||
7FFE1A47B000
|
unkown
|
page readonly
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0DA1B000
|
heap
|
page read and write
|
||
1FB0FCF0000
|
direct allocation
|
page read and write
|
||
1FB0DA0B000
|
heap
|
page read and write
|
||
1FB0FF10000
|
direct allocation
|
page read and write
|
||
1FB0DA1F000
|
heap
|
page read and write
|
||
1FB0DB04000
|
direct allocation
|
page read and write
|
||
1FB0D972000
|
heap
|
page read and write
|
||
1FB0E1DC000
|
heap
|
page read and write
|
||
7FFE13338000
|
unkown
|
page readonly
|
||
1FB0DA26000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0E244000
|
heap
|
page read and write
|
||
1FB0E1A9000
|
heap
|
page read and write
|
||
1FB0D964000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
33E89E3000
|
stack
|
page read and write
|
||
7FF7A6A68000
|
unkown
|
page readonly
|
||
1FB0DA22000
|
heap
|
page read and write
|
||
1FB0E25D000
|
heap
|
page read and write
|
||
7FFDFB78E000
|
unkown
|
page readonly
|
||
1FB0D930000
|
heap
|
page read and write
|
||
1FB0E171000
|
heap
|
page read and write
|
||
1FB0E1E2000
|
heap
|
page read and write
|
||
7FFE1A450000
|
unkown
|
page readonly
|
||
1FB0E25D000
|
heap
|
page read and write
|
||
1FB0E1A4000
|
heap
|
page read and write
|
||
1FB0D9C3000
|
heap
|
page read and write
|
||
1FB0FD59000
|
heap
|
page read and write
|
||
1FB0E1E6000
|
heap
|
page read and write
|
||
1931B087000
|
heap
|
page read and write
|
||
1FB0E1AC000
|
heap
|
page read and write
|
||
1FB0E1A3000
|
heap
|
page read and write
|
||
1FB0FCE4000
|
direct allocation
|
page read and write
|
||
7FFE1A477000
|
unkown
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0FC14000
|
direct allocation
|
page read and write
|
||
1FB0E1E2000
|
heap
|
page read and write
|
||
1FB0DAC8000
|
direct allocation
|
page read and write
|
||
1FB0FD5B000
|
heap
|
page read and write
|
||
1FB0E242000
|
heap
|
page read and write
|
||
1FB0E191000
|
heap
|
page read and write
|
||
1FB0E171000
|
heap
|
page read and write
|
||
1FB0D9FE000
|
heap
|
page read and write
|
||
7FFE1A501000
|
unkown
|
page execute read
|
||
1FB0E02C000
|
direct allocation
|
page read and write
|
||
1FB0D9FE000
|
heap
|
page read and write
|
||
1FB0E1A6000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0E242000
|
heap
|
page read and write
|
||
1FB0DA4B000
|
heap
|
page read and write
|
||
1FB0E1A2000
|
heap
|
page read and write
|
||
1FB0E1A4000
|
heap
|
page read and write
|
||
1FB0D98B000
|
heap
|
page read and write
|
||
1FB0DAE8000
|
direct allocation
|
page read and write
|
||
1FB0E1F7000
|
heap
|
page read and write
|
||
1931B060000
|
heap
|
page read and write
|
||
1FB0FC70000
|
direct allocation
|
page read and write
|
||
1FB0E1BE000
|
heap
|
page read and write
|
||
1FB0E171000
|
heap
|
page read and write
|
||
1FB0D994000
|
heap
|
page read and write
|
||
1FB0FD66000
|
heap
|
page read and write
|
||
7FF7A6A45000
|
unkown
|
page readonly
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0E262000
|
heap
|
page read and write
|
||
BF2B9DE000
|
stack
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
33E89EA000
|
stack
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
7FFDFB87B000
|
unkown
|
page read and write
|
||
7FF7A6A68000
|
unkown
|
page readonly
|
||
1FB0E242000
|
heap
|
page read and write
|
||
1FB0DA27000
|
heap
|
page read and write
|
||
1FB0DA0C000
|
heap
|
page read and write
|
||
1FB0E1D3000
|
heap
|
page read and write
|
||
7FFDFB461000
|
unkown
|
page execute read
|
||
1931B087000
|
heap
|
page read and write
|
||
1931AF60000
|
heap
|
page read and write
|
||
1FB0E25D000
|
heap
|
page read and write
|
||
1FB0E1A7000
|
heap
|
page read and write
|
||
1FB0E243000
|
heap
|
page read and write
|
||
1FB0DBE0000
|
heap
|
page read and write
|
||
1FB0DA1B000
|
heap
|
page read and write
|
||
1FB0DA47000
|
heap
|
page read and write
|
||
1FB0D9CE000
|
heap
|
page read and write
|
||
1FB0D9E0000
|
heap
|
page read and write
|
||
1FB0DA2F000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0D9AB000
|
heap
|
page read and write
|
||
1FB0DA4E000
|
heap
|
page read and write
|
||
1FB0DA38000
|
heap
|
page read and write
|
||
1FB0DA4D000
|
heap
|
page read and write
|
||
1FB0DA0C000
|
heap
|
page read and write
|
||
1FB0D9C6000
|
heap
|
page read and write
|
||
1FB0E1E3000
|
heap
|
page read and write
|
||
1FB0DA23000
|
heap
|
page read and write
|
||
1FB0D9DB000
|
heap
|
page read and write
|
||
1FB0E25F000
|
heap
|
page read and write
|
||
33E89ED000
|
stack
|
page read and write
|
||
1FB0DA26000
|
heap
|
page read and write
|
||
1931B07A000
|
heap
|
page read and write
|
||
7FFE1A4F6000
|
unkown
|
page readonly
|
||
1FB0E1E2000
|
heap
|
page read and write
|
||
1FB0DA1B000
|
heap
|
page read and write
|
||
1FB0E1A4000
|
heap
|
page read and write
|
||
1FB0E182000
|
heap
|
page read and write
|
||
1FB0DB08000
|
direct allocation
|
page read and write
|
||
1FB0FC10000
|
direct allocation
|
page read and write
|
||
1FB0DF30000
|
direct allocation
|
page read and write
|
||
1FB0E1FA000
|
heap
|
page read and write
|
||
1FB0E1FA000
|
heap
|
page read and write
|
||
1FB0DFD0000
|
direct allocation
|
page read and write
|
||
1FB0E1F7000
|
heap
|
page read and write
|
||
7FF7A6A45000
|
unkown
|
page readonly
|
||
1931B07A000
|
heap
|
page read and write
|
||
1FB0E1A4000
|
heap
|
page read and write
|
||
7FFDFB878000
|
unkown
|
page read and write
|
||
1FB0E1F7000
|
heap
|
page read and write
|
||
1FB0FD10000
|
heap
|
page read and write
|
||
1FB0E189000
|
heap
|
page read and write
|
||
1FB0D9CE000
|
heap
|
page read and write
|
||
1FB0DA47000
|
heap
|
page read and write
|
||
1FB0D9DD000
|
heap
|
page read and write
|
||
1FB0DA32000
|
heap
|
page read and write
|
||
1FB0FCD4000
|
direct allocation
|
page read and write
|
||
BF2BBCE000
|
stack
|
page read and write
|
||
7FFE1A517000
|
unkown
|
page readonly
|
||
1FB0E242000
|
heap
|
page read and write
|
||
1FB0FC68000
|
direct allocation
|
page read and write
|
||
1931B068000
|
heap
|
page read and write
|
||
1FB0E1BE000
|
heap
|
page read and write
|
||
1FB0D9E4000
|
heap
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0DA34000
|
heap
|
page read and write
|
||
1FB0DA08000
|
heap
|
page read and write
|
||
1FB0E25D000
|
heap
|
page read and write
|
||
1FB0E1DE000
|
heap
|
page read and write
|
||
BF2B7DB000
|
stack
|
page read and write
|
There are 334 hidden memdumps, click here to show them.