Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3GJ6S3Kwnb.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Airplane_6.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_SL.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DiFxAPI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HPPrintScanDoctorDeploymentMgr.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\NativeAdapter.dll
|
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REINSPECTED.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600,
atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Velsespladser5.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\igoAudSessionMonitor.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsj9DE8.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\3GJ6S3Kwnb.exe
|
"C:\Users\user\Desktop\3GJ6S3Kwnb.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bin
|
|||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3300000
|
direct allocation
|
page execute and read and write
|
||
74E412B000
|
stack
|
page read and write
|
||
23F8A700000
|
heap
|
page read and write
|
||
1BE2FFB000
|
stack
|
page read and write
|
||
1CF6A851000
|
heap
|
page read and write
|
||
1F48A2C0000
|
heap
|
page read and write
|
||
209D947A000
|
heap
|
page read and write
|
||
14A1B849000
|
heap
|
page read and write
|
||
1B3B55E0000
|
remote allocation
|
page read and write
|
||
9BCFB7E000
|
stack
|
page read and write
|
||
209DEE00000
|
trusted library allocation
|
page read and write
|
||
210D6708000
|
heap
|
page read and write
|
||
A41507E000
|
stack
|
page read and write
|
||
203FD700000
|
trusted library allocation
|
page read and write
|
||
1B3B3C00000
|
heap
|
page read and write
|
||
16919029000
|
heap
|
page read and write
|
||
210D6660000
|
heap
|
page read and write
|
||
2694FE00000
|
heap
|
page read and write
|
||
209DEAD0000
|
trusted library allocation
|
page read and write
|
||
9BCFCFE000
|
stack
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
23AD000
|
stack
|
page read and write
|
||
209DECFD000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
203FE490000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
20701200000
|
heap
|
page read and write
|
||
209DE9D1000
|
trusted library allocation
|
page read and write
|
||
269505F0000
|
remote allocation
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
14A1B813000
|
heap
|
page read and write
|
||
2819000
|
trusted library allocation
|
page read and write
|
||
634727A000
|
stack
|
page read and write
|
||
209DEC48000
|
heap
|
page read and write
|
||
D9477C000
|
stack
|
page read and write
|
||
1CF6A802000
|
heap
|
page read and write
|
||
235E000
|
stack
|
page read and write
|
||
1F45A332000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
209D9514000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
203FD4C8000
|
heap
|
page read and write
|
||
6B3F4FA000
|
stack
|
page read and write
|
||
1B3B3C58000
|
heap
|
page read and write
|
||
1A0C2A8A000
|
heap
|
page read and write
|
||
1B3B3C68000
|
heap
|
page read and write
|
||
209DEB10000
|
remote allocation
|
page read and write
|
||
209DEC4A000
|
heap
|
page read and write
|
||
203FD5E0000
|
heap
|
page read and write
|
||
20701259000
|
heap
|
page read and write
|
||
DC0027D000
|
stack
|
page read and write
|
||
60E92FF000
|
stack
|
page read and write
|
||
14A1B84F000
|
heap
|
page read and write
|
||
1A0C2B00000
|
heap
|
page read and write
|
||
210D667D000
|
heap
|
page read and write
|
||
14A1B887000
|
heap
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
20701231000
|
heap
|
page read and write
|
||
2070126F000
|
heap
|
page read and write
|
||
203FD50C000
|
heap
|
page read and write
|
||
5E320FE000
|
stack
|
page read and write
|
||
209DE820000
|
trusted library allocation
|
page read and write
|
||
20701260000
|
heap
|
page read and write
|
||
209D9400000
|
heap
|
page read and write
|
||
23F8A681000
|
heap
|
page read and write
|
||
209D9310000
|
trusted library allocation
|
page read and write
|
||
2070127D000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
2694FE02000
|
heap
|
page read and write
|
||
209DED02000
|
heap
|
page read and write
|
||
1A0C2A00000
|
heap
|
page read and write
|
||
209DECE6000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
1CF6A7E0000
|
heap
|
page read and write
|
||
1CF6B0A0000
|
remote allocation
|
page read and write
|
||
209D91B0000
|
heap
|
page read and write
|
||
1BE2DF9000
|
stack
|
page read and write
|
||
74E467B000
|
stack
|
page read and write
|
||
2070124D000
|
heap
|
page read and write
|
||
203FD745000
|
heap
|
page read and write
|
||
209D93E1000
|
trusted library allocation
|
page read and write
|
||
6347479000
|
stack
|
page read and write
|
||
209D9D02000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
9BCFFFC000
|
stack
|
page read and write
|
||
14A1B892000
|
heap
|
page read and write
|
||
20701286000
|
heap
|
page read and write
|
||
DC000F9000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
23F8A6AF000
|
heap
|
page read and write
|
||
1839304A000
|
heap
|
page read and write
|
||
209D9C15000
|
heap
|
page read and write
|
||
209DEAC0000
|
trusted library allocation
|
page read and write
|
||
1E889420000
|
heap
|
page read and write
|
||
34EBB7E000
|
stack
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1F48A3C0000
|
heap
|
page read and write
|
||
A41557E000
|
stack
|
page read and write
|
||
1B3B3AF0000
|
heap
|
page read and write
|
||
269505C0000
|
trusted library allocation
|
page read and write
|
||
1F4598BB000
|
heap
|
page read and write
|
||
23F8AE02000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
209DE9BE000
|
trusted library allocation
|
page read and write
|
||
14A1C202000
|
trusted library allocation
|
page read and write
|
||
22DF000
|
stack
|
page read and write
|
||
60E8DFC000
|
stack
|
page read and write
|
||
63474FE000
|
stack
|
page read and write
|
||
BBE5B9E000
|
stack
|
page read and write
|
||
708647E000
|
stack
|
page read and write
|
||
1A0C2A70000
|
heap
|
page read and write
|
||
209DE9D4000
|
trusted library allocation
|
page read and write
|
||
1A0C2A29000
|
heap
|
page read and write
|
||
1F459900000
|
heap
|
page read and write
|
||
2694FCC0000
|
heap
|
page read and write
|
||
209DEC00000
|
heap
|
page read and write
|
||
16919013000
|
heap
|
page read and write
|
||
1A0C2B08000
|
heap
|
page read and write
|
||
1839305E000
|
heap
|
page read and write
|
||
60E91FF000
|
stack
|
page read and write
|
||
1B3B3C13000
|
heap
|
page read and write
|
||
209D9C00000
|
heap
|
page read and write
|
||
1F48A640000
|
heap
|
page read and write
|
||
BBE5B1B000
|
stack
|
page read and write
|
||
1BE2BF7000
|
stack
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
1CF6A85D000
|
heap
|
page read and write
|
||
14A1B800000
|
heap
|
page read and write
|
||
851EBFF000
|
stack
|
page read and write
|
||
1BE2EFE000
|
stack
|
page read and write
|
||
1F459902000
|
heap
|
page read and write
|
||
203FD4C0000
|
heap
|
page read and write
|
||
1A0C2A5D000
|
heap
|
page read and write
|
||
269505F0000
|
remote allocation
|
page read and write
|
||
209D9D59000
|
heap
|
page read and write
|
||
14A1B7A0000
|
trusted library allocation
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
DC7FE7C000
|
stack
|
page read and write
|
||
354367E000
|
stack
|
page read and write
|
||
1E889430000
|
heap
|
page read and write
|
||
281E000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1B3B3D00000
|
heap
|
page read and write
|
||
5E3207C000
|
stack
|
page read and write
|
||
209DE810000
|
trusted library allocation
|
page read and write
|
||
1A0C2A7D000
|
heap
|
page read and write
|
||
209D9D18000
|
heap
|
page read and write
|
||
851E57E000
|
stack
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
203FD750000
|
trusted library allocation
|
page read and write
|
||
209DE9E0000
|
trusted library allocation
|
page read and write
|
||
5E3217D000
|
stack
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
16919802000
|
trusted library allocation
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
209D94FE000
|
heap
|
page read and write
|
||
269505F0000
|
remote allocation
|
page read and write
|
||
60E90FE000
|
stack
|
page read and write
|
||
18393064000
|
heap
|
page read and write
|
||
70863FC000
|
stack
|
page read and write
|
||
1A0C29B0000
|
heap
|
page read and write
|
||
203FD650000
|
trusted library allocation
|
page read and write
|
||
23F8A520000
|
trusted library allocation
|
page read and write
|
||
2070127C000
|
heap
|
page read and write
|
||
209DEB10000
|
trusted library allocation
|
page read and write
|
||
851E67C000
|
stack
|
page read and write
|
||
210D6510000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
6B3F4FF000
|
stack
|
page read and write
|
||
1A0C2A61000
|
heap
|
page read and write
|
||
D94C7B000
|
stack
|
page read and write
|
||
1BE377F000
|
stack
|
page read and write
|
||
1B3B3A90000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
209DEC19000
|
heap
|
page read and write
|
||
DC00079000
|
stack
|
page read and write
|
||
281E000
|
trusted library allocation
|
page read and write
|
||
2070123C000
|
heap
|
page read and write
|
||
4C1000
|
unkown
|
page readonly
|
||
209DEAE0000
|
trusted library allocation
|
page read and write
|
||
23F8A3C0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
18393000000
|
heap
|
page read and write
|
||
1839303C000
|
heap
|
page read and write
|
||
209D9C02000
|
heap
|
page read and write
|
||
18393013000
|
heap
|
page read and write
|
||
A414B9B000
|
stack
|
page read and write
|
||
634737F000
|
stack
|
page read and write
|
||
1B3B3D18000
|
heap
|
page read and write
|
||
1E889668000
|
heap
|
page read and write
|
||
209D94FE000
|
heap
|
page read and write
|
||
1B3B5840000
|
trusted library allocation
|
page read and write
|
||
203FD660000
|
trusted library allocation
|
page read and write
|
||
9BCFDFF000
|
stack
|
page read and write
|
||
34EBE77000
|
stack
|
page read and write
|
||
1A0C2B02000
|
heap
|
page read and write
|
||
5E322FF000
|
stack
|
page read and write
|
||
209DA803000
|
trusted library allocation
|
page read and write
|
||
60E93FE000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
209DEC0D000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
209DEE20000
|
trusted library allocation
|
page read and write
|
||
18392E00000
|
heap
|
page read and write
|
||
1BE327B000
|
stack
|
page read and write
|
||
209DECAC000
|
heap
|
page read and write
|
||
209D9429000
|
heap
|
page read and write
|
||
18393113000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
18392E70000
|
heap
|
page read and write
|
||
209D94A8000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
209D9D18000
|
heap
|
page read and write
|
||
1F459780000
|
trusted library allocation
|
page read and write
|
||
16919076000
|
heap
|
page read and write
|
||
209DEB00000
|
trusted library allocation
|
page read and write
|
||
20701262000
|
heap
|
page read and write
|
||
16919041000
|
heap
|
page read and write
|
||
209DEA90000
|
trusted library allocation
|
page read and write
|
||
16918EB0000
|
heap
|
page read and write
|
||
1B3B3C68000
|
heap
|
page read and write
|
||
1BE357B000
|
stack
|
page read and write
|
||
DC001F9000
|
stack
|
page read and write
|
||
1B3B55E0000
|
remote allocation
|
page read and write
|
||
1E889702000
|
heap
|
page read and write
|
||
2070125A000
|
heap
|
page read and write
|
||
209DE9D0000
|
trusted library allocation
|
page read and write
|
||
14A1B829000
|
heap
|
page read and write
|
||
1CF6A813000
|
heap
|
page read and write
|
||
209D9507000
|
heap
|
page read and write
|
||
1F4598E1000
|
heap
|
page read and write
|
||
20701190000
|
heap
|
page read and write
|
||
1CF6A870000
|
heap
|
page read and write
|
||
70862FE000
|
stack
|
page read and write
|
||
1B3B3C57000
|
heap
|
page read and write
|
||
20701229000
|
heap
|
page read and write
|
||
203FD50E000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
1B3B3C2A000
|
heap
|
page read and write
|
||
18393086000
|
heap
|
page read and write
|
||
1CF6A780000
|
heap
|
page read and write
|
||
D94CFF000
|
stack
|
page read and write
|
||
1E889490000
|
heap
|
page read and write
|
||
354347B000
|
stack
|
page read and write
|
||
203FD740000
|
heap
|
page read and write
|
||
34EBA7C000
|
stack
|
page read and write
|
||
14A1B902000
|
heap
|
page read and write
|
||
1B3B55E0000
|
remote allocation
|
page read and write
|
||
209DED00000
|
heap
|
page read and write
|
||
209DEB10000
|
remote allocation
|
page read and write
|
||
1B3B3A80000
|
heap
|
page read and write
|
||
1F459829000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
14A1B82C000
|
heap
|
page read and write
|
||
18393029000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
2694FCB0000
|
heap
|
page read and write
|
||
20701225000
|
heap
|
page read and write
|
||
1F48A645000
|
heap
|
page read and write
|
||
14A1B770000
|
heap
|
page read and write
|
||
6B3F5FE000
|
stack
|
page read and write
|
||
1A0C2950000
|
heap
|
page read and write
|
||
281C000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
5E323FB000
|
stack
|
page read and write
|
||
23F8A6A9000
|
heap
|
page read and write
|
||
5E326FE000
|
stack
|
page read and write
|
||
14A1B869000
|
heap
|
page read and write
|
||
1A0C2A65000
|
heap
|
page read and write
|
||
1BE2CFA000
|
stack
|
page read and write
|
||
209D943F000
|
heap
|
page read and write
|
||
37E0000
|
trusted library allocation
|
page read and write
|
||
210D6600000
|
heap
|
page read and write
|
||
210D65B0000
|
trusted library allocation
|
page read and write
|
||
16919066000
|
heap
|
page read and write
|
||
20701242000
|
heap
|
page read and write
|
||
203FE240000
|
trusted library allocation
|
page read and write
|
||
209DE8A0000
|
trusted library allocation
|
page read and write
|
||
1F4598C4000
|
heap
|
page read and write
|
||
A414EFE000
|
stack
|
page read and write
|
||
1691903F000
|
heap
|
page read and write
|
||
14A1B710000
|
heap
|
page read and write
|
||
2694FE40000
|
heap
|
page read and write
|
||
1A0C2A3C000
|
heap
|
page read and write
|
||
5E327FF000
|
stack
|
page read and write
|
||
1B3B3BF0000
|
trusted library allocation
|
page read and write
|
||
23F8A702000
|
heap
|
page read and write
|
||
209DA3E0000
|
trusted library allocation
|
page read and write
|
||
9BCF75C000
|
stack
|
page read and write
|
||
14A1B913000
|
heap
|
page read and write
|
||
1BE27DB000
|
stack
|
page read and write
|
||
1F459800000
|
heap
|
page read and write
|
||
281E000
|
trusted library allocation
|
page read and write
|
||
16919102000
|
heap
|
page read and write
|
||
18393052000
|
heap
|
page read and write
|
||
1A0C29E0000
|
trusted library allocation
|
page read and write
|
||
209DECAE000
|
heap
|
page read and write
|
||
2694FF02000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
203FD390000
|
trusted library allocation
|
page read and write
|
||
209DE9E0000
|
trusted library allocation
|
page read and write
|
||
1B3B3C67000
|
heap
|
page read and write
|
||
1B3B3D02000
|
heap
|
page read and write
|
||
74E497B000
|
stack
|
page read and write
|
||
203FD720000
|
trusted library allocation
|
page read and write
|
||
209D9502000
|
heap
|
page read and write
|
||
A415277000
|
stack
|
page read and write
|
||
209DEC29000
|
heap
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
5E325FC000
|
stack
|
page read and write
|
||
209DEA80000
|
trusted library allocation
|
page read and write
|
||
9BD02FC000
|
stack
|
page read and write
|
||
851E6FE000
|
stack
|
page read and write
|
||
14A1B83C000
|
heap
|
page read and write
|
||
BBE60FE000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
23F8A420000
|
heap
|
page read and write
|
||
209D9470000
|
heap
|
page read and write
|
||
209D9459000
|
heap
|
page read and write
|
||
1A0C2A70000
|
heap
|
page read and write
|
||
20701261000
|
heap
|
page read and write
|
||
1E889590000
|
trusted library allocation
|
page read and write
|
||
1F48A407000
|
heap
|
page read and write
|
||
209D948C000
|
heap
|
page read and write
|
||
BBE5E7E000
|
stack
|
page read and write
|
||
20701243000
|
heap
|
page read and write
|
||
18393063000
|
heap
|
page read and write
|
||
203FD749000
|
heap
|
page read and write
|
||
1F45983E000
|
heap
|
page read and write
|
||
209D9210000
|
heap
|
page read and write
|
||
1B3B3C72000
|
heap
|
page read and write
|
||
6B3EFBC000
|
stack
|
page read and write
|
||
1F4598CC000
|
heap
|
page read and write
|
||
74E477B000
|
stack
|
page read and write
|
||
209DE9F0000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
20701258000
|
heap
|
page read and write
|
||
2070126D000
|
heap
|
page read and write
|
||
1E889700000
|
heap
|
page read and write
|
||
354317F000
|
stack
|
page read and write
|
||
851E4FE000
|
stack
|
page read and write
|
||
209DEC63000
|
heap
|
page read and write
|
||
35432FC000
|
stack
|
page read and write
|
||
1A0C2A56000
|
heap
|
page read and write
|
||
2812000
|
trusted library allocation
|
page read and write
|
||
1CF6A83F000
|
heap
|
page read and write
|
||
2694FE13000
|
heap
|
page read and write
|
||
18393108000
|
heap
|
page read and write
|
||
6B3F3FD000
|
stack
|
page read and write
|
||
1A0C2A53000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
1A0C2A7A000
|
heap
|
page read and write
|
||
1F459913000
|
heap
|
page read and write
|
||
9BD00FC000
|
stack
|
page read and write
|
||
1A0C2A13000
|
heap
|
page read and write
|
||
D94A7D000
|
stack
|
page read and write
|
||
16919065000
|
heap
|
page read and write
|
||
1691906D000
|
heap
|
page read and write
|
||
209DED02000
|
heap
|
page read and write
|
||
A41537E000
|
stack
|
page read and write
|
||
7085F1C000
|
stack
|
page read and write
|
||
DC0017E000
|
stack
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
60E8CFF000
|
stack
|
page read and write
|
||
1F459813000
|
heap
|
page read and write
|
||
23F8A63C000
|
heap
|
page read and write
|
||
209DE9F0000
|
trusted library allocation
|
page read and write
|
||
1B3B55B0000
|
trusted library allocation
|
page read and write
|
||
1CF6A855000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
209DA800000
|
trusted library allocation
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
60E8FFD000
|
stack
|
page read and write
|
||
D94EFC000
|
stack
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
1CF6A83D000
|
heap
|
page read and write
|
||
73330000
|
unkown
|
page readonly
|
||
354357D000
|
stack
|
page read and write
|
||
20701213000
|
heap
|
page read and write
|
||
73331000
|
unkown
|
page execute read
|
||
2694FE58000
|
heap
|
page read and write
|
||
23F8A613000
|
heap
|
page read and write
|
||
1E88963C000
|
heap
|
page read and write
|
||
203FD51D000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
2314000
|
heap
|
page read and write
|
||
6B3F2FF000
|
stack
|
page read and write
|
||
354327E000
|
stack
|
page read and write
|
||
1CF6A902000
|
heap
|
page read and write
|
||
20701246000
|
heap
|
page read and write
|
||
210D663C000
|
heap
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
20701130000
|
heap
|
page read and write
|
||
1B3B5602000
|
trusted library allocation
|
page read and write
|
||
18393102000
|
heap
|
page read and write
|
||
18392E10000
|
heap
|
page read and write
|
||
210D665A000
|
heap
|
page read and write
|
||
1E889664000
|
heap
|
page read and write
|
||
1CF6A770000
|
heap
|
page read and write
|
||
34EC07A000
|
stack
|
page read and write
|
||
73336000
|
unkown
|
page readonly
|
||
210D6702000
|
heap
|
page read and write
|
||
6B3F6FE000
|
stack
|
page read and write
|
||
203FD50C000
|
heap
|
page read and write
|
||
1F45986E000
|
heap
|
page read and write
|
||
209DEB10000
|
remote allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
209DEA80000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1CF6B080000
|
trusted library allocation
|
page read and write
|
||
23F8A68B000
|
heap
|
page read and write
|
||
1F459750000
|
heap
|
page read and write
|
||
209DE890000
|
trusted library allocation
|
page read and write
|
||
1F45A300000
|
heap
|
page read and write
|
||
BBE61FF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
209DEAF0000
|
trusted library allocation
|
page read and write
|
||
6B3F7FA000
|
stack
|
page read and write
|
||
18392F70000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
209D94AB000
|
heap
|
page read and write
|
||
281B000
|
trusted library allocation
|
page read and write
|
||
74E487E000
|
stack
|
page read and write
|
||
209DA810000
|
trusted library allocation
|
page read and write
|
||
2816000
|
trusted library allocation
|
page read and write
|
||
634757C000
|
stack
|
page read and write
|
||
14A1B700000
|
heap
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
1E889656000
|
heap
|
page read and write
|
||
210D6580000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
210D6665000
|
heap
|
page read and write
|
||
14A1B854000
|
heap
|
page read and write
|
||
1CF6A829000
|
heap
|
page read and write
|
||
209D9D04000
|
heap
|
page read and write
|
||
6B3F27F000
|
stack
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
1691905A000
|
heap
|
page read and write
|
||
14A1B870000
|
heap
|
page read and write
|
||
1B3B3C02000
|
heap
|
page read and write
|
||
851E7F7000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
23F8A3B0000
|
heap
|
page read and write
|
||
1F48A3EE000
|
heap
|
page read and write
|
||
18393100000
|
heap
|
page read and write
|
||
203FD52E000
|
heap
|
page read and write
|
||
4C1000
|
unkown
|
page readonly
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
851E9FF000
|
stack
|
page read and write
|
||
BBE62FE000
|
stack
|
page read and write
|
||
210D6713000
|
heap
|
page read and write
|
||
210D6613000
|
heap
|
page read and write
|
||
1CF6B202000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
23F8A629000
|
heap
|
page read and write
|
||
63473FE000
|
stack
|
page read and write
|
||
60E87EC000
|
stack
|
page read and write
|
||
209D9D58000
|
heap
|
page read and write
|
||
203FD6C0000
|
trusted library allocation
|
page read and write
|
||
9BCFEFF000
|
stack
|
page read and write
|
||
60E94FE000
|
stack
|
page read and write
|
||
1F459887000
|
heap
|
page read and write
|
||
16919000000
|
heap
|
page read and write
|
||
D94DF7000
|
stack
|
page read and write
|
||
209DECFE000
|
heap
|
page read and write
|
||
207011C0000
|
trusted library allocation
|
page read and write
|
||
18393068000
|
heap
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
14A1B900000
|
heap
|
page read and write
|
||
1CF6A84B000
|
heap
|
page read and write
|
||
60E8BFA000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1CF6B0A0000
|
remote allocation
|
page read and write
|
||
A41517B000
|
stack
|
page read and write
|
||
26950602000
|
trusted library allocation
|
page read and write
|
||
1E889602000
|
heap
|
page read and write
|
||
3542FFC000
|
stack
|
page read and write
|
||
A41547C000
|
stack
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1F4596F0000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1A0C3402000
|
trusted library allocation
|
page read and write
|
||
209DECA3000
|
heap
|
page read and write
|
||
851E47B000
|
stack
|
page read and write
|
||
14A1B908000
|
heap
|
page read and write
|
||
209DE9F4000
|
trusted library allocation
|
page read and write
|
||
354387F000
|
stack
|
page read and write
|
||
210D665E000
|
heap
|
page read and write
|
||
209D9477000
|
heap
|
page read and write
|
||
1839307D000
|
heap
|
page read and write
|
||
375A000
|
stack
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
14A1B869000
|
heap
|
page read and write
|
||
210D6690000
|
heap
|
page read and write
|
||
63472FF000
|
stack
|
page read and write
|
||
203FD380000
|
heap
|
page read and write
|
||
354377D000
|
stack
|
page read and write
|
||
209D91A0000
|
heap
|
page read and write
|
||
1B3B3C58000
|
heap
|
page read and write
|
||
1E889613000
|
heap
|
page read and write
|
||
851E8F7000
|
stack
|
page read and write
|
||
2070125D000
|
heap
|
page read and write
|
||
1E889600000
|
heap
|
page read and write
|
||
281B000
|
trusted library allocation
|
page read and write
|
||
209DEC9F000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
2694FE29000
|
heap
|
page read and write
|
||
20701241000
|
heap
|
page read and write
|
||
23F8A600000
|
heap
|
page read and write
|
||
18393090000
|
heap
|
page read and write
|
||
209DECF7000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
210D6629000
|
heap
|
page read and write
|
||
1B3B3C3D000
|
heap
|
page read and write
|
||
16918E40000
|
heap
|
page read and write
|
||
708667D000
|
stack
|
page read and write
|
||
35433FD000
|
stack
|
page read and write
|
||
20701C02000
|
trusted library allocation
|
page read and write
|
||
209D9D13000
|
heap
|
page read and write
|
||
1A0C2940000
|
heap
|
page read and write
|
||
209DE9B0000
|
trusted library allocation
|
page read and write
|
||
209DEA80000
|
trusted library allocation
|
page read and write
|
||
209D9502000
|
heap
|
page read and write
|
||
20701256000
|
heap
|
page read and write
|
||
1F4596E0000
|
heap
|
page read and write
|
||
210D7002000
|
trusted library allocation
|
page read and write
|
||
1A0C2A88000
|
heap
|
page read and write
|
||
203FD50C000
|
heap
|
page read and write
|
||
16918E50000
|
heap
|
page read and write
|
||
1B3B5800000
|
trusted library allocation
|
page read and write
|
||
34EBAFF000
|
stack
|
page read and write
|
||
209D9475000
|
heap
|
page read and write
|
||
851EAFF000
|
stack
|
page read and write
|
||
1B3B3C4E000
|
heap
|
page read and write
|
||
209D9493000
|
heap
|
page read and write
|
||
20701302000
|
heap
|
page read and write
|
||
209D94B4000
|
heap
|
page read and write
|
||
70866FF000
|
stack
|
page read and write
|
||
14A1B84D000
|
heap
|
page read and write
|
||
210D6688000
|
heap
|
page read and write
|
||
70867FD000
|
stack
|
page read and write
|
||
D94FFE000
|
stack
|
page read and write
|
||
1E889E02000
|
trusted library allocation
|
page read and write
|
||
203FD710000
|
heap
|
page readonly
|
||
A414E7E000
|
stack
|
page read and write
|
||
1E889679000
|
heap
|
page read and write
|
||
210D6520000
|
heap
|
page read and write
|
||
16919002000
|
heap
|
page read and write
|
||
2070123A000
|
heap
|
page read and write
|
||
5E324F7000
|
stack
|
page read and write
|
||
73334000
|
unkown
|
page readonly
|
||
2070126B000
|
heap
|
page read and write
|
||
203FD5C0000
|
heap
|
page read and write
|
||
210D6655000
|
heap
|
page read and write
|
||
209DECE1000
|
heap
|
page read and write
|
||
2694FD20000
|
heap
|
page read and write
|
||
6B3F8FF000
|
stack
|
page read and write
|
||
20701257000
|
heap
|
page read and write
|
||
209D94B3000
|
heap
|
page read and write
|
||
34EBF7F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
203FE450000
|
trusted library allocation
|
page read and write
|
||
2070125B000
|
heap
|
page read and write
|
||
1F48A340000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
D947FE000
|
stack
|
page read and write
|
||
20701120000
|
heap
|
page read and write
|
||
210D6626000
|
heap
|
page read and write
|
||
209D9D00000
|
heap
|
page read and write
|
||
1F4598E8000
|
heap
|
page read and write
|
||
209D9413000
|
heap
|
page read and write
|
||
16919113000
|
heap
|
page read and write
|
||
20701263000
|
heap
|
page read and write
|
||
1B3B3D13000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
1691906F000
|
heap
|
page read and write
|
||
3542B9B000
|
stack
|
page read and write
|
||
1A0C2B13000
|
heap
|
page read and write
|
||
209DE9B0000
|
trusted library allocation
|
page read and write
|
||
1F45A202000
|
heap
|
page read and write
|
||
16918FB0000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1CF6A859000
|
heap
|
page read and write
|
||
BBE5FFF000
|
stack
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
1CF6A800000
|
heap
|
page read and write
|
||
210D6700000
|
heap
|
page read and write
|
||
20701279000
|
heap
|
page read and write
|
||
1F48A320000
|
heap
|
page read and write
|
||
23F8A713000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
23F8A671000
|
heap
|
page read and write
|
||
20701280000
|
heap
|
page read and write
|
||
18393802000
|
trusted library allocation
|
page read and write
|
||
1CF6B0A0000
|
remote allocation
|
page read and write
|
||
1B3B3C99000
|
heap
|
page read and write
|
||
1E889628000
|
heap
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
209DE9B8000
|
trusted library allocation
|
page read and write
|
||
20701268000
|
heap
|
page read and write
|
||
34EBD7B000
|
stack
|
page read and write
|
||
1E889713000
|
heap
|
page read and write
|
||
1A0C2A7A000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
There are 602 hidden memdumps, click here to show them.