Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6xQ8CMUaES.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sys
|
Unknown
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6xQ8CMUaES.exe
|
"C:\Users\user\Desktop\6xQ8CMUaES.exe"
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
|
||
C:\Windows\System32\svchost.exe
|
svchost.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.cloudflare.com/origin_ca.crl0
|
unknown
|
||
http://ocsp.cloudflare.com/origin_ca
|
unknown
|
||
http://crl.cloudflare.com/origin_ca.crlCd
|
unknown
|
||
http://ocsp.cloudflare.com/origin_ca0
|
unknown
|
||
http://crl.cloudflare.com/origin_ca.crl
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
xmr-eu1.nanopool.org
|
51.89.23.91
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
51.89.23.91
|
xmr-eu1.nanopool.org
|
France
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
235E8A2F000
|
heap
|
page read and write
|
||
235E8A6A000
|
heap
|
page read and write
|
||
235E8A69000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute and read and write
|
||
235E8A7E000
|
heap
|
page read and write
|
||
235E8AD1000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8940000
|
heap
|
page read and write
|
||
225C3900000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
225C3720000
|
heap
|
page read and write
|
||
140834000
|
unkown
|
page read and write
|
||
23CDEB58000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
23CDEB05000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8A92000
|
heap
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
57FE32F000
|
stack
|
page read and write
|
||
235E8AE3000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
F7EF8ED000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA7F8000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
21EDDD10000
|
unkown
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AEC000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8B02000
|
heap
|
page read and write
|
||
7FF713140000
|
unkown
|
page readonly
|
||
86DA3AF000
|
stack
|
page read and write
|
||
235E8AEC000
|
heap
|
page read and write
|
||
235E8AE6000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AEC000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA7F8000
|
heap
|
page read and write
|
||
235E8A9A000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
21EDDB35000
|
heap
|
page read and write
|
||
235EA7B4000
|
heap
|
page read and write
|
||
88D2EFE000
|
stack
|
page read and write
|
||
235E8AE3000
|
heap
|
page read and write
|
||
235E8AD1000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
256664D0000
|
heap
|
page read and write
|
||
88D34FE000
|
stack
|
page read and write
|
||
235EAA00000
|
heap
|
page read and write
|
||
225C3820000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
86DA32D000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
140777000
|
unkown
|
page execute and read and write
|
||
7FF7133B7000
|
unkown
|
page readonly
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AEC000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
23F24340000
|
heap
|
page read and write
|
||
235EA94F000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
1404EC000
|
unkown
|
page execute and read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
7FF713146000
|
unkown
|
page readonly
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AD1000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AFD000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8910000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA802000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8ACD000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235E8AE7000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
7FF713148000
|
unkown
|
page write copy
|
||
88D32FF000
|
stack
|
page read and write
|
||
235E8AB5000
|
heap
|
page read and write
|
||
235E89A0000
|
trusted library allocation
|
page read and write
|
||
235EA7C5000
|
heap
|
page read and write
|
||
235E8930000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AEC000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4C0000
|
direct allocation
|
page execute and read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235F0400000
|
heap
|
page read and write
|
||
7FF7133B7000
|
unkown
|
page readonly
|
||
235E8960000
|
direct allocation
|
page execute read
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
7DEA2FF000
|
stack
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA700000
|
heap
|
page read and write
|
||
235EA7EA000
|
heap
|
page read and write
|
||
235E8B02000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EBE00000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
23CDEB00000
|
heap
|
page read and write
|
||
23F24290000
|
heap
|
page read and write
|
||
23F24348000
|
heap
|
page read and write
|
||
235EA7EB000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
225C3A00000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
14082C000
|
unkown
|
page execute and read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA94B000
|
heap
|
page read and write
|
||
235E8A97000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235ED200000
|
heap
|
page read and write
|
||
235EA470000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8A92000
|
heap
|
page read and write
|
||
235E8A5C000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E89A0000
|
heap
|
page readonly
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA7EB000
|
heap
|
page read and write
|
||
235EFA00000
|
heap
|
page read and write
|
||
235EB400000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
25666675000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8980000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA943000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
57FE2AD000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
23CDEB50000
|
heap
|
page read and write
|
||
235EA7EC000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
235EA784000
|
heap
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
7FF713141000
|
unkown
|
page execute read
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA743000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AC6000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AE3000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
235E8AE3000
|
heap
|
page read and write
|
||
235EA7BC000
|
heap
|
page read and write
|
||
235EA928000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA79C000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA7AC000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
7FF713148000
|
unkown
|
page read and write
|
||
7FF713140000
|
unkown
|
page readonly
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235E89A0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
225C3728000
|
heap
|
page read and write
|
||
235EA470000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
88D33FE000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
1404C8000
|
unkown
|
page execute and read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235E8A8E000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
57FE3AF000
|
stack
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8A92000
|
heap
|
page read and write
|
||
7DEA27F000
|
stack
|
page read and write
|
||
25666670000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
256666A0000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EDC00000
|
heap
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
235EA4B0000
|
direct allocation
|
page execute and read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EE600000
|
heap
|
page read and write
|
||
21EDDB49000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
235EA94B000
|
heap
|
page read and write
|
||
235E8AE3000
|
heap
|
page read and write
|
||
235E8AD1000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8A97000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
7DE9FBD000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
23F24530000
|
heap
|
page read and write
|
||
235E8A8E000
|
heap
|
page read and write
|
||
88D2BDB000
|
stack
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235E8AAB000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
88D36FE000
|
stack
|
page read and write
|
||
21EDDB30000
|
heap
|
page read and write
|
||
235EA470000
|
direct allocation
|
page execute and read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8B13000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
256666A8000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
23CDEA90000
|
heap
|
page read and write
|
||
23CDEAB0000
|
heap
|
page read and write
|
||
23F24270000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
88D31FB000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8A00000
|
heap
|
page read and write
|
||
235EA7EA000
|
heap
|
page read and write
|
||
235EA94B000
|
heap
|
page read and write
|
||
225C3920000
|
heap
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
225C3A05000
|
heap
|
page read and write
|
||
235EA950000
|
heap
|
page read and write
|
||
88D30FD000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA602000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EF000000
|
heap
|
page read and write
|
||
235EA902000
|
heap
|
page read and write
|
||
7FF713146000
|
unkown
|
page readonly
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EC800000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
23F24190000
|
heap
|
page read and write
|
||
235EA7A4000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8AEC000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA900000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
21EDDB40000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
F7EF9FF000
|
stack
|
page read and write
|
||
88D38FF000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
6ED3B9F000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
88D2FFE000
|
stack
|
page read and write
|
||
88D35FF000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
1407F8000
|
unkown
|
page execute and read and write
|
||
6ED3E7F000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
21EDDAE0000
|
heap
|
page read and write
|
||
21EDDB00000
|
unkown
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
23CDEA80000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
256665D0000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235E8A96000
|
heap
|
page read and write
|
||
21EDDAD0000
|
heap
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
23F24535000
|
heap
|
page read and write
|
||
7FF713141000
|
unkown
|
page execute read
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
88D37FE000
|
stack
|
page read and write
|
||
6ED3B1D000
|
stack
|
page read and write
|
||
F7EF8FD000
|
stack
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA4B0000
|
trusted library allocation
|
page read and write
|
||
235E8AFF000
|
heap
|
page read and write
|
||
256665B0000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
||
235EA7F8000
|
heap
|
page read and write
|
||
235E8A13000
|
heap
|
page read and write
|
||
235E89C0000
|
heap
|
page read and write
|
||
235EA7EA000
|
heap
|
page read and write
|
||
235EA4D0000
|
trusted library allocation
|
page read and write
|
There are 369 hidden memdumps, click here to show them.