Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
relay.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_41a576617a4d91b2fca1f808095b0ff5072ae_7522e4b5_42b45446-5eab-40ec-af17-0c0f836199b4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_43a5166fcb246f7d77dda47518c3ad7a1b5fed0_7522e4b5_947ae66e-1b85-463a-8ce6-0cbc4dae92d4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_43a5166fcb246f7d77dda47518c3ad7a1b5fed0_7522e4b5_e91ff5ac-65a9-46ed-9bba-93ef15ff2f0b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_58917a6b9efbc14a7f3eb3b1b9c8b1b9253d4_7522e4b5_1b83567d-f16f-46b8-80f9-995180bfbf98\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_7b66fce5118c38f37fd6766cbdd34cc5acf99d_7522e4b5_2e868f36-de62-4ba6-9b84-fedb1c24e82b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_7b66fce5118c38f37fd6766cbdd34cc5acf99d_7522e4b5_80a7260b-cf6e-489e-a566-6a270c8c0270\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_7b66fce5118c38f37fd6766cbdd34cc5acf99d_7522e4b5_d55df6fc-a234-4ca2-8311-086d43100733\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Apr 20 09:36:03 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5F.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 20 09:36:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 20 09:36:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEC.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 20 09:36:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE93D.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 20 09:35:57 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE94D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Apr 20 09:35:57 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE99.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA67.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA68.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREAA7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREAB6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE7.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF07.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3DC.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Apr 20 09:35:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF44A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF47A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF55.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.tmp
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.tmp.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.tmp.LOG2
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 23 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\relay.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\relay.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\relay.dll,Cancel
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\relay.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6540 -s 672
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 632
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\relay.dll,Finalize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5756 -s 620
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\relay.dll,Initialize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 624
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\relay.dll",Cancel
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\relay.dll",Finalize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\relay.dll",Initialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\relay.dll",Run
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\relay.dll",PrepareRun
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 668
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 668
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 664
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{00e3fecd-e9f5-2144-ffc2-a2712e4b4115}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00DAC9758FC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\{11517B7C-E79D-4e20-961B-75A811715ADD}
|
CreatingCommand
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\{11517B7C-E79D-4e20-961B-75A811715ADD}
|
CreatingModule
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiOverridePath
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile
|
ProviderSyncId
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00DAC9758FC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
\REGISTRY\A\{dff6f116-9496-5caf-07d1-8d2a8b4283fe}\Root\InventoryApplicationFile
|
WritePermissionsCheck
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00DAC9758FC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
There are 48 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
67F000
|
stack
|
page read and write
|
||
41F0000
|
heap
|
page read and write
|
||
6CCA0000
|
unkown
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
6CCA7000
|
unkown
|
page readonly
|
||
8E0000
|
heap
|
page read and write
|
||
4367000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
6CC99000
|
unkown
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
2AB1000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
6CCA0000
|
unkown
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
8F0000
|
remote allocation
|
page read and write
|
||
4180000
|
heap
|
page read and write
|
||
69C000
|
stack
|
page read and write
|
||
2AEC000
|
stack
|
page read and write
|
||
6CC57000
|
unkown
|
page readonly
|
||
7D0000
|
heap
|
page read and write
|
||
4170000
|
heap
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
2940000
|
remote allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
2B3A000
|
heap
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
38C000
|
stack
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
4314000
|
heap
|
page read and write
|
||
34B000
|
stack
|
page read and write
|
||
4140000
|
heap
|
page read and write
|
||
30B4000
|
heap
|
page read and write
|
||
2AAB000
|
stack
|
page read and write
|
||
891000
|
heap
|
page read and write
|
||
4BA000
|
heap
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
6CC99000
|
unkown
|
page read and write
|
||
2760000
|
remote allocation
|
page read and write
|
||
4160000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
461D000
|
stack
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
27F7000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
2A1A000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
6CB40000
|
unkown
|
page readonly
|
||
6CCA7000
|
unkown
|
page readonly
|
||
6CC57000
|
unkown
|
page readonly
|
||
2CB000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
4310000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
4184000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
2C5A000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
6CB40000
|
unkown
|
page readonly
|
||
4797000
|
heap
|
page read and write
|
||
27F4000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
4317000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
6CB41000
|
unkown
|
page execute read
|
||
4320000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
3FB0000
|
heap
|
page read and write
|
||
6CC57000
|
unkown
|
page readonly
|
||
4CA000
|
heap
|
page read and write
|
||
6CB40000
|
unkown
|
page readonly
|
||
8C0000
|
heap
|
page read and write
|
||
724000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
6CB40000
|
unkown
|
page readonly
|
||
850000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
B81000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
47F000
|
stack
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
47F000
|
stack
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
6CC99000
|
unkown
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
6CCA7000
|
unkown
|
page readonly
|
||
88F000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
FB000
|
stack
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2BD1000
|
heap
|
page read and write
|
||
73B000
|
stack
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
2CA7000
|
heap
|
page read and write
|
||
4150000
|
heap
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
43B000
|
stack
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
6CCA7000
|
unkown
|
page readonly
|
||
72E000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
6CC57000
|
unkown
|
page readonly
|
||
6CCA0000
|
unkown
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
4794000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
2CA4000
|
heap
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
6CB41000
|
unkown
|
page execute read
|
||
5E0000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
4364000
|
heap
|
page read and write
|
||
2964000
|
heap
|
page read and write
|
||
6CCA0000
|
unkown
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
6CB41000
|
unkown
|
page execute read
|
||
7FA000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
4187000
|
heap
|
page read and write
|
||
EB000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
317A000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
B67000
|
heap
|
page read and write
|
||
40D0000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
6CC99000
|
unkown
|
page read and write
|
||
65B000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
6CB41000
|
unkown
|
page execute read
|
||
830000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
41CB000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
There are 220 hidden memdumps, click here to show them.