Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
xKBLVUHoY6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nskE115.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Lagerhals\Territorially\Tygnings\systemless\Modregnings.Xen
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Lagerhals\Territorially\Tygnings\systemless\battery-caution-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Lagerhals\Territorially\Tygnings\systemless\go-first-rtl.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xKBLVUHoY6.exe
|
"C:\Users\user\Desktop\xKBLVUHoY6.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://212.193.0.40/redi_oXifXcNSpB69.bin
|
|||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
31B0000
|
direct allocation
|
page execute and read and write
|
||
1583F323000
|
trusted library allocation
|
page read and write
|
||
5B64879000
|
stack
|
page read and write
|
||
27E4000
|
trusted library allocation
|
page read and write
|
||
1583E427000
|
heap
|
page read and write
|
||
15843B90000
|
remote allocation
|
page read and write
|
||
1C98EFE000
|
stack
|
page read and write
|
||
2494BA63000
|
heap
|
page read and write
|
||
16E3C2E0000
|
trusted library allocation
|
page read and write
|
||
26919DE0000
|
remote allocation
|
page read and write
|
||
1C987CF000
|
stack
|
page read and write
|
||
2494BA5F000
|
heap
|
page read and write
|
||
26919E74000
|
heap
|
page read and write
|
||
EECC7F000
|
stack
|
page read and write
|
||
16E3D3E0000
|
trusted library allocation
|
page read and write
|
||
2023E5F0000
|
trusted library allocation
|
page read and write
|
||
2494BA29000
|
heap
|
page read and write
|
||
7382AFB000
|
stack
|
page read and write
|
||
1583ED00000
|
heap
|
page read and write
|
||
26919E89000
|
heap
|
page read and write
|
||
1E124E29000
|
heap
|
page read and write
|
||
1A7D5413000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
53036FF000
|
stack
|
page read and write
|
||
5B6448B000
|
stack
|
page read and write
|
||
2494BA61000
|
heap
|
page read and write
|
||
D6A87FE000
|
stack
|
page read and write
|
||
1A7D5429000
|
heap
|
page read and write
|
||
2494BA13000
|
heap
|
page read and write
|
||
1583E457000
|
heap
|
page read and write
|
||
2494BA4E000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
1DDF84A0000
|
heap
|
page read and write
|
||
2023EE90000
|
remote allocation
|
page read and write
|
||
386B000
|
stack
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1E124CA0000
|
heap
|
page read and write
|
||
2494BA5A000
|
heap
|
page read and write
|
||
2023E602000
|
heap
|
page read and write
|
||
F671C7E000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
8DCCF7F000
|
stack
|
page read and write
|
||
2494BA5C000
|
heap
|
page read and write
|
||
1C5EC400000
|
heap
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
2023E640000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
26919E02000
|
heap
|
page read and write
|
||
6EB84000
|
unkown
|
page readonly
|
||
1C5EC45A000
|
heap
|
page read and write
|
||
26919E3D000
|
heap
|
page read and write
|
||
2023E613000
|
heap
|
page read and write
|
||
1DDF8700000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
16E3C52D000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
EECCFF000
|
stack
|
page read and write
|
||
16E3C527000
|
heap
|
page read and write
|
||
2494BB02000
|
heap
|
page read and write
|
||
1C5EC513000
|
heap
|
page read and write
|
||
15843C65000
|
heap
|
page read and write
|
||
26919C30000
|
heap
|
page read and write
|
||
2494BA48000
|
heap
|
page read and write
|
||
15843B40000
|
trusted library allocation
|
page read and write
|
||
16E3D380000
|
trusted library allocation
|
page read and write
|
||
1A7D545D000
|
heap
|
page read and write
|
||
8DCD57D000
|
stack
|
page read and write
|
||
D6A89FF000
|
stack
|
page read and write
|
||
2494BA5E000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1DDF8500000
|
heap
|
page read and write
|
||
1A7D5350000
|
remote allocation
|
page read and write
|
||
2494BA00000
|
heap
|
page read and write
|
||
1DDF8490000
|
heap
|
page read and write
|
||
1C5EC468000
|
heap
|
page read and write
|
||
2494BA32000
|
heap
|
page read and write
|
||
26919E57000
|
heap
|
page read and write
|
||
1C5EC476000
|
heap
|
page read and write
|
||
1E124E87000
|
heap
|
page read and write
|
||
15843EA0000
|
trusted library allocation
|
page read and write
|
||
16E3C4B0000
|
trusted library allocation
|
page read and write
|
||
1DDF8668000
|
heap
|
page read and write
|
||
8DCD37D000
|
stack
|
page read and write
|
||
51C000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1C5EC402000
|
heap
|
page read and write
|
||
1E124EC3000
|
heap
|
page read and write
|
||
F671A7E000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2494B880000
|
heap
|
page read and write
|
||
1E125602000
|
heap
|
page read and write
|
||
1583E473000
|
heap
|
page read and write
|
||
1C5EC502000
|
heap
|
page read and write
|
||
738327F000
|
stack
|
page read and write
|
||
1583EC15000
|
heap
|
page read and write
|
||
1583E220000
|
heap
|
page read and write
|
||
1DDF8600000
|
heap
|
page read and write
|
||
1DDF8664000
|
heap
|
page read and write
|
||
15843D00000
|
heap
|
page read and write
|
||
2691B802000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1A7D5470000
|
heap
|
page read and write
|
||
8DCCDFC000
|
stack
|
page read and write
|
||
2294000
|
heap
|
page read and write
|
||
6EB86000
|
unkown
|
page readonly
|
||
1A7D5350000
|
remote allocation
|
page read and write
|
||
26919C90000
|
heap
|
page read and write
|
||
F671AFE000
|
stack
|
page read and write
|
||
1583E48E000
|
heap
|
page read and write
|
||
1583E500000
|
heap
|
page read and write
|
||
16E3C479000
|
heap
|
page read and write
|
||
16E3C475000
|
heap
|
page read and write
|
||
2023E636000
|
heap
|
page read and write
|
||
15843A54000
|
trusted library allocation
|
page read and write
|
||
F671E7F000
|
stack
|
page read and write
|
||
1583E390000
|
trusted library allocation
|
page read and write
|
||
1583E4A4000
|
heap
|
page read and write
|
||
1C9874C000
|
stack
|
page read and write
|
||
53033FB000
|
stack
|
page read and write
|
||
15843920000
|
trusted library allocation
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
16E3C52D000
|
heap
|
page read and write
|
||
1583F320000
|
trusted library allocation
|
page read and write
|
||
1C5EC429000
|
heap
|
page read and write
|
||
15843B70000
|
trusted library allocation
|
page read and write
|
||
15843C2C000
|
heap
|
page read and write
|
||
2023E5C0000
|
heap
|
page read and write
|
||
73831FD000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1583E502000
|
heap
|
page read and write
|
||
26919DB0000
|
trusted library allocation
|
page read and write
|
||
2494BA42000
|
heap
|
page read and write
|
||
1583ED04000
|
heap
|
page read and write
|
||
2494BA57000
|
heap
|
page read and write
|
||
2023E550000
|
heap
|
page read and write
|
||
1C994FA000
|
stack
|
page read and write
|
||
1A7D5330000
|
trusted library allocation
|
page read and write
|
||
15843C40000
|
heap
|
page read and write
|
||
26919E48000
|
heap
|
page read and write
|
||
2494BA25000
|
heap
|
page read and write
|
||
1583E46D000
|
heap
|
page read and write
|
||
26919E58000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1583E400000
|
heap
|
page read and write
|
||
2494BA02000
|
heap
|
page read and write
|
||
15843CB0000
|
heap
|
page read and write
|
||
1C5EC413000
|
heap
|
page read and write
|
||
2023E629000
|
heap
|
page read and write
|
||
6F00BFD000
|
stack
|
page read and write
|
||
5B649F9000
|
stack
|
page read and write
|
||
2494C202000
|
trusted library allocation
|
page read and write
|
||
26919C20000
|
heap
|
page read and write
|
||
1583E290000
|
heap
|
page read and write
|
||
26919E26000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
1A7D51C0000
|
heap
|
page read and write
|
||
2494BA41000
|
heap
|
page read and write
|
||
1A7D5400000
|
heap
|
page read and write
|
||
2691B7A0000
|
trusted library allocation
|
page read and write
|
||
1583E42A000
|
heap
|
page read and write
|
||
2023E560000
|
heap
|
page read and write
|
||
15843C00000
|
heap
|
page read and write
|
||
5302E8B000
|
stack
|
page read and write
|
||
1583E494000
|
heap
|
page read and write
|
||
53034FB000
|
stack
|
page read and write
|
||
1E125700000
|
heap
|
page read and write
|
||
26919F00000
|
heap
|
page read and write
|
||
2494BA58000
|
heap
|
page read and write
|
||
15843B00000
|
trusted library allocation
|
page read and write
|
||
26919E13000
|
heap
|
page read and write
|
||
1E124C40000
|
heap
|
page read and write
|
||
1583EC00000
|
heap
|
page read and write
|
||
1E124E13000
|
heap
|
page read and write
|
||
1DDF8679000
|
heap
|
page read and write
|
||
1C5EC43D000
|
heap
|
page read and write
|
||
1583F420000
|
trusted library allocation
|
page read and write
|
||
1583E507000
|
heap
|
page read and write
|
||
1583ED18000
|
heap
|
page read and write
|
||
15843C4D000
|
heap
|
page read and write
|
||
1A7D542F000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
1583E4B6000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
D6A8AFC000
|
stack
|
page read and write
|
||
26919D90000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1A7D5461000
|
heap
|
page read and write
|
||
2023E65C000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
5B6497E000
|
stack
|
page read and write
|
||
2494BA45000
|
heap
|
page read and write
|
||
1A7D5350000
|
remote allocation
|
page read and write
|
||
1E124C30000
|
heap
|
page read and write
|
||
5B648F9000
|
stack
|
page read and write
|
||
2494BA56000
|
heap
|
page read and write
|
||
15843C15000
|
heap
|
page read and write
|
||
1E124ECB000
|
heap
|
page read and write
|
||
6F008FF000
|
stack
|
page read and write
|
||
16E3C470000
|
heap
|
page read and write
|
||
EED0FE000
|
stack
|
page read and write
|
||
15843CF0000
|
heap
|
page read and write
|
||
2494BA6C000
|
heap
|
page read and write
|
||
1583E514000
|
heap
|
page read and write
|
||
2691BA00000
|
trusted library allocation
|
page read and write
|
||
2023E600000
|
heap
|
page read and write
|
||
26919DE0000
|
remote allocation
|
page read and write
|
||
1DDF8602000
|
heap
|
page read and write
|
||
1DDF8713000
|
heap
|
page read and write
|
||
7382E7E000
|
stack
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
2494BA7C000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1E124E6E000
|
heap
|
page read and write
|
||
1A7D5C02000
|
trusted library allocation
|
page read and write
|
||
1E124DA0000
|
trusted library allocation
|
page read and write
|
||
1C5EC46F000
|
heap
|
page read and write
|
||
2494BA40000
|
heap
|
page read and write
|
||
26919E58000
|
heap
|
page read and write
|
||
8DCC9DC000
|
stack
|
page read and write
|
||
1C996FF000
|
stack
|
page read and write
|
||
2494BA73000
|
heap
|
page read and write
|
||
6F009FC000
|
stack
|
page read and write
|
||
1DDF8702000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
2494BA67000
|
heap
|
page read and write
|
||
1DDF8E02000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1583E4A6000
|
heap
|
page read and write
|
||
26919F02000
|
heap
|
page read and write
|
||
1583E500000
|
heap
|
page read and write
|
||
1C5ECE02000
|
trusted library allocation
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2494BA6A000
|
heap
|
page read and write
|
||
16E3C430000
|
heap
|
page read and write
|
||
16E3C4F0000
|
heap
|
page read and write
|
||
15843B10000
|
trusted library allocation
|
page read and write
|
||
15843B00000
|
trusted library allocation
|
page read and write
|
||
2494BA3B000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
6EB80000
|
unkown
|
page readonly
|
||
1A7D544A000
|
heap
|
page read and write
|
||
15843CF3000
|
heap
|
page read and write
|
||
15843B00000
|
trusted library allocation
|
page read and write
|
||
16E3D360000
|
trusted library allocation
|
page read and write
|
||
2494BA79000
|
heap
|
page read and write
|
||
1DDF8613000
|
heap
|
page read and write
|
||
15843A51000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
trusted library allocation
|
page read and write
|
||
7382FFC000
|
stack
|
page read and write
|
||
15843D07000
|
heap
|
page read and write
|
||
7382F7C000
|
stack
|
page read and write
|
||
EECDFE000
|
stack
|
page read and write
|
||
2494B820000
|
heap
|
page read and write
|
||
1C98B77000
|
stack
|
page read and write
|
||
1C5EC310000
|
heap
|
page read and write
|
||
2494BA7A000
|
heap
|
page read and write
|
||
2023E702000
|
heap
|
page read and write
|
||
15843CFC000
|
heap
|
page read and write
|
||
EECEFA000
|
stack
|
page read and write
|
||
1DDF863C000
|
heap
|
page read and write
|
||
15843A30000
|
trusted library allocation
|
page read and write
|
||
15843910000
|
trusted library allocation
|
page read and write
|
||
6F00EFF000
|
stack
|
page read and write
|
||
15843B60000
|
trusted library allocation
|
page read and write
|
||
738337D000
|
stack
|
page read and write
|
||
1C990FB000
|
stack
|
page read and write
|
||
6F010FF000
|
stack
|
page read and write
|
||
16E3C4D0000
|
trusted library allocation
|
page read and write
|
||
F671F7E000
|
stack
|
page read and write
|
||
F6717CC000
|
stack
|
page read and write
|
||
1583EC02000
|
heap
|
page read and write
|
||
15843CF8000
|
heap
|
page read and write
|
||
16E3D370000
|
heap
|
page readonly
|
||
27ED000
|
trusted library allocation
|
page read and write
|
||
15843B90000
|
remote allocation
|
page read and write
|
||
16E3D120000
|
trusted library allocation
|
page read and write
|
||
15843A38000
|
trusted library allocation
|
page read and write
|
||
2494BA76000
|
heap
|
page read and write
|
||
6F007FA000
|
stack
|
page read and write
|
||
15844000000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A7D5402000
|
heap
|
page read and write
|
||
15843E80000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
15843B90000
|
remote allocation
|
page read and write
|
||
2023EE90000
|
remote allocation
|
page read and write
|
||
1A7D5463000
|
heap
|
page read and write
|
||
1E124E23000
|
heap
|
page read and write
|
||
15843B80000
|
trusted library allocation
|
page read and write
|
||
2494BA59000
|
heap
|
page read and write
|
||
2494BA44000
|
heap
|
page read and write
|
||
2494BA64000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
15843C11000
|
heap
|
page read and write
|
||
2023E657000
|
heap
|
page read and write
|
||
1E124E00000
|
heap
|
page read and write
|
||
15843C9D000
|
heap
|
page read and write
|
||
26919E2A000
|
heap
|
page read and write
|
||
EED2FE000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
2023F002000
|
trusted library allocation
|
page read and write
|
||
1C5EC300000
|
heap
|
page read and write
|
||
1E124EE3000
|
heap
|
page read and write
|
||
2494BA74000
|
heap
|
page read and write
|
||
16E3C410000
|
heap
|
page read and write
|
||
15843C59000
|
heap
|
page read and write
|
||
1583E499000
|
heap
|
page read and write
|
||
16E3D390000
|
trusted library allocation
|
page read and write
|
||
53035FB000
|
stack
|
page read and write
|
||
16E3C526000
|
heap
|
page read and write
|
||
26919DE0000
|
remote allocation
|
page read and write
|
||
6F00CFF000
|
stack
|
page read and write
|
||
8DCD0FC000
|
stack
|
page read and write
|
||
D6A847C000
|
stack
|
page read and write
|
||
D6A8BFC000
|
stack
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
2494BA60000
|
heap
|
page read and write
|
||
1C5EC3A0000
|
trusted library allocation
|
page read and write
|
||
15843A60000
|
trusted library allocation
|
page read and write
|
||
15843D02000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1583F8A0000
|
trusted library allocation
|
page read and write
|
||
1C98DFA000
|
stack
|
page read and write
|
||
15843A70000
|
trusted library allocation
|
page read and write
|
||
2494BA35000
|
heap
|
page read and write
|
||
16E3C52E000
|
heap
|
page read and write
|
||
8DCD47E000
|
stack
|
page read and write
|
||
1E124E3E000
|
heap
|
page read and write
|
||
26919F18000
|
heap
|
page read and write
|
||
2494BA83000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
1583ED13000
|
heap
|
page read and write
|
||
26919F13000
|
heap
|
page read and write
|
||
2240000
|
trusted library allocation
|
page read and write
|
||
EEC9DB000
|
stack
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
1E124F02000
|
heap
|
page read and write
|
||
15843C9B000
|
heap
|
page read and write
|
||
16E3C2D0000
|
heap
|
page read and write
|
||
1583E4AE000
|
heap
|
page read and write
|
||
6F00DFF000
|
stack
|
page read and write
|
||
1583E492000
|
heap
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
158438A0000
|
trusted library allocation
|
page read and write
|
||
1A7D51D0000
|
heap
|
page read and write
|
||
4B4F000
|
trusted library allocation
|
page read and write
|
||
2494B810000
|
heap
|
page read and write
|
||
1DDF8656000
|
heap
|
page read and write
|
||
2494BA69000
|
heap
|
page read and write
|
||
26919E00000
|
heap
|
page read and write
|
||
6EB81000
|
unkown
|
page execute read
|
||
1C98FFB000
|
stack
|
page read and write
|
||
8DCD67F000
|
stack
|
page read and write
|
||
EED1FD000
|
stack
|
page read and write
|
||
15843A74000
|
trusted library allocation
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
1583F330000
|
trusted library allocation
|
page read and write
|
||
16E3C4E8000
|
heap
|
page read and write
|
||
16E3C4C0000
|
trusted library allocation
|
page read and write
|
||
1583E43D000
|
heap
|
page read and write
|
||
1583E502000
|
heap
|
page read and write
|
||
26919E48000
|
heap
|
page read and write
|
||
376D000
|
stack
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
1C98CF9000
|
stack
|
page read and write
|
||
15843C19000
|
heap
|
page read and write
|
||
2494B980000
|
trusted library allocation
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
EECFFA000
|
stack
|
page read and write
|
||
1A7D543E000
|
heap
|
page read and write
|
||
1583ED02000
|
heap
|
page read and write
|
||
1C5EC462000
|
heap
|
page read and write
|
||
1DDF8DA0000
|
trusted library allocation
|
page read and write
|
||
15843A3E000
|
trusted library allocation
|
page read and write
|
||
2494BA62000
|
heap
|
page read and write
|
||
1E124F13000
|
heap
|
page read and write
|
||
15843B90000
|
trusted library allocation
|
page read and write
|
||
1583E413000
|
heap
|
page read and write
|
||
D6A8DFE000
|
stack
|
page read and write
|
||
6F00FFE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
15843A50000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
8DCD27B000
|
stack
|
page read and write
|
||
1583ED18000
|
heap
|
page read and write
|
||
D6A88FE000
|
stack
|
page read and write
|
||
1A7D5502000
|
heap
|
page read and write
|
||
1583E230000
|
heap
|
page read and write
|
||
16E3C5E0000
|
trusted library allocation
|
page read and write
|
||
1E124EBA000
|
heap
|
page read and write
|
||
2494BA3D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6F003CC000
|
stack
|
page read and write
|
||
15843C37000
|
heap
|
page read and write
|
||
8DCD1FD000
|
stack
|
page read and write
|
||
2023E633000
|
heap
|
page read and write
|
||
8DCD07E000
|
stack
|
page read and write
|
||
2023EE90000
|
remote allocation
|
page read and write
|
||
16E3C4E0000
|
heap
|
page read and write
|
||
1DDF8628000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
980000
|
heap
|
page read and write
|
||
1583E4B6000
|
heap
|
page read and write
|
||
15843B50000
|
trusted library allocation
|
page read and write
|
||
F671D7E000
|
stack
|
page read and write
|
||
1C5EC370000
|
heap
|
page read and write
|
||
5B64A7C000
|
stack
|
page read and write
|
||
15843A60000
|
trusted library allocation
|
page read and write
|
||
26919E47000
|
heap
|
page read and write
|
||
1A7D545A000
|
heap
|
page read and write
|
||
1583E475000
|
heap
|
page read and write
|
||
15843A30000
|
trusted library allocation
|
page read and write
|
||
26919E62000
|
heap
|
page read and write
|
||
1A7D5230000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
There are 409 hidden memdumps, click here to show them.