Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Bluepoint2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Wigwamer.Cro7
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\emblem-default-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lang-1026.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\network-cellular-hardware-disabled-symbolic.svg
|
SVG Scalable Vector Graphics image
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsg1F62.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Bluepoint2.exe
|
"C:\Users\user\Desktop\Bluepoint2.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.avast.com0/
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3330000
|
direct allocation
|
page execute and read and write
|
||
21D0083E000
|
heap
|
page read and write
|
||
1F330F62000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F90000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
20AD823B000
|
heap
|
page read and write
|
||
20AD80F0000
|
trusted library allocation
|
page read and write
|
||
20AD2AFC000
|
heap
|
page read and write
|
||
20AD3518000
|
heap
|
page read and write
|
||
1F330F6A000
|
heap
|
page read and write
|
||
1AF2685D000
|
heap
|
page read and write
|
||
1F330D40000
|
remote allocation
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1EEA0059000
|
heap
|
page read and write
|
||
58765FC000
|
stack
|
page read and write
|
||
1E266010000
|
trusted library allocation
|
page read and write
|
||
1F330480000
|
heap
|
page read and write
|
||
20AD3559000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
ADC9877000
|
stack
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
496000
|
heap
|
page read and write
|
||
5876BFE000
|
unkown
|
page read and write
|
||
B3CA2FE000
|
stack
|
page read and write
|
||
21D00800000
|
heap
|
page read and write
|
||
1F33045C000
|
heap
|
page read and write
|
||
1F330471000
|
heap
|
page read and write
|
||
1F330F7A000
|
heap
|
page read and write
|
||
1F330F92000
|
heap
|
page read and write
|
||
1AF26877000
|
heap
|
page read and write
|
||
22A5526F000
|
heap
|
page read and write
|
||
B63D2F7000
|
stack
|
page read and write
|
||
95137FE000
|
stack
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
ADC947B000
|
stack
|
page read and write
|
||
1CF87E7F000
|
heap
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
ADC9A7E000
|
stack
|
page read and write
|
||
1F3304CD000
|
heap
|
page read and write
|
||
1EE9FEA0000
|
heap
|
page read and write
|
||
20AD82F9000
|
heap
|
page read and write
|
||
951333C000
|
stack
|
page read and write
|
||
B01937B000
|
stack
|
page read and write
|
||
1F330413000
|
heap
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
1F330F8C000
|
heap
|
page read and write
|
||
1F330F66000
|
heap
|
page read and write
|
||
1CF88802000
|
trusted library allocation
|
page read and write
|
||
B83CDFE000
|
stack
|
page read and write
|
||
26780C12000
|
heap
|
page read and write
|
||
26780C3E000
|
heap
|
page read and write
|
||
1AF266E0000
|
heap
|
page read and write
|
||
B63D3FE000
|
stack
|
page read and write
|
||
1F330F92000
|
heap
|
page read and write
|
||
1F330F6A000
|
heap
|
page read and write
|
||
1F330370000
|
heap
|
page read and write
|
||
1F330FB9000
|
heap
|
page read and write
|
||
1EEA0050000
|
heap
|
page read and write
|
||
20AD80F4000
|
trusted library allocation
|
page read and write
|
||
1AF26870000
|
heap
|
page read and write
|
||
726F1000
|
unkown
|
page execute read
|
||
1EEA0100000
|
heap
|
page read and write
|
||
20AD80D0000
|
trusted library allocation
|
page read and write
|
||
1F330FA3000
|
heap
|
page read and write
|
||
22A55213000
|
heap
|
page read and write
|
||
20AD8100000
|
trusted library allocation
|
page read and write
|
||
26780C26000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
B63CE7C000
|
stack
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD3BE0000
|
trusted library section
|
page readonly
|
||
4A5000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD2A54000
|
heap
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
1F330FA3000
|
heap
|
page read and write
|
||
20AD3AE0000
|
trusted library allocation
|
page read and write
|
||
20AD2960000
|
trusted library allocation
|
page read and write
|
||
ADC957F000
|
stack
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
1F330F9C000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD8214000
|
heap
|
page read and write
|
||
1E2663E0000
|
heap
|
page read and write
|
||
1F3303E0000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
20AD28D0000
|
heap
|
page read and write
|
||
1AF26813000
|
heap
|
page read and write
|
||
B63D1FB000
|
stack
|
page read and write
|
||
1EEA0088000
|
heap
|
page read and write
|
||
20AD80F1000
|
trusted library allocation
|
page read and write
|
||
ADC997F000
|
stack
|
page read and write
|
||
1F330F70000
|
heap
|
page read and write
|
||
1CF87E13000
|
heap
|
page read and write
|
||
B01917A000
|
stack
|
page read and write
|
||
69ABD7E000
|
stack
|
page read and write
|
||
26780C2F000
|
heap
|
page read and write
|
||
1E2660C4000
|
heap
|
page read and write
|
||
1F330F8C000
|
heap
|
page read and write
|
||
20AD81A0000
|
trusted library allocation
|
page read and write
|
||
20AD2A29000
|
heap
|
page read and write
|
||
22A55254000
|
heap
|
page read and write
|
||
1AF26913000
|
heap
|
page read and write
|
||
1AF2683C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1F330F9B000
|
heap
|
page read and write
|
||
1F331421000
|
heap
|
page read and write
|
||
1EEA0029000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
26780C2F000
|
heap
|
page read and write
|
||
22A55302000
|
heap
|
page read and write
|
||
26780C2F000
|
heap
|
page read and write
|
||
1EEA008F000
|
heap
|
page read and write
|
||
1F330FD1000
|
heap
|
page read and write
|
||
1EEA003C000
|
heap
|
page read and write
|
||
1CF87E5C000
|
heap
|
page read and write
|
||
5876877000
|
stack
|
page read and write
|
||
1CF87E5E000
|
heap
|
page read and write
|
||
69AB97E000
|
stack
|
page read and write
|
||
1CF87E5A000
|
heap
|
page read and write
|
||
1AF2688E000
|
heap
|
page read and write
|
||
B019079000
|
stack
|
page read and write
|
||
69AC27E000
|
stack
|
page read and write
|
||
20AD8430000
|
remote allocation
|
page read and write
|
||
B63D4FF000
|
stack
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD81E0000
|
trusted library allocation
|
page read and write
|
||
69AC17F000
|
stack
|
page read and write
|
||
26780C47000
|
heap
|
page read and write
|
||
1F330FC4000
|
heap
|
page read and write
|
||
1F330F90000
|
heap
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
22DF000
|
stack
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
22A55229000
|
heap
|
page read and write
|
||
1F330F5F000
|
heap
|
page read and write
|
||
20AD8308000
|
heap
|
page read and write
|
||
1F330F8F000
|
heap
|
page read and write
|
||
1F330F65000
|
heap
|
page read and write
|
||
20AD825F000
|
heap
|
page read and write
|
||
1E2663A0000
|
trusted library allocation
|
page read and write
|
||
20AD821D000
|
heap
|
page read and write
|
||
21D007A0000
|
trusted library allocation
|
page read and write
|
||
1F330502000
|
heap
|
page read and write
|
||
1EEA0058000
|
heap
|
page read and write
|
||
B01947E000
|
stack
|
page read and write
|
||
951377F000
|
stack
|
page read and write
|
||
1F330F9B000
|
heap
|
page read and write
|
||
1E2660CC000
|
heap
|
page read and write
|
||
B83CCFB000
|
stack
|
page read and write
|
||
20AD82A2000
|
heap
|
page read and write
|
||
1F330F9A000
|
heap
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
726F0000
|
unkown
|
page readonly
|
||
1F330F67000
|
heap
|
page read and write
|
||
1EEA0046000
|
heap
|
page read and write
|
||
26780C0B000
|
heap
|
page read and write
|
||
1F330F70000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
B3CA3FE000
|
stack
|
page read and write
|
||
26780C17000
|
heap
|
page read and write
|
||
1F330F7B000
|
heap
|
page read and write
|
||
20AD2A9B000
|
heap
|
page read and write
|
||
20AD81F0000
|
trusted library allocation
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
5876A78000
|
stack
|
page read and write
|
||
20AD3BC0000
|
trusted library section
|
page readonly
|
||
1AF26881000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1E266080000
|
heap
|
page read and write
|
||
22A55313000
|
heap
|
page read and write
|
||
20AD2A73000
|
heap
|
page read and write
|
||
21D006A0000
|
heap
|
page read and write
|
||
B63CF7E000
|
stack
|
page read and write
|
||
20AD8410000
|
trusted library allocation
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
5876B79000
|
stack
|
page read and write
|
||
20AD8114000
|
trusted library allocation
|
page read and write
|
||
20AD82B6000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330FA3000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
1F33044E000
|
heap
|
page read and write
|
||
B01967F000
|
stack
|
page read and write
|
||
B3C9E7E000
|
stack
|
page read and write
|
||
1F330F52000
|
heap
|
page read and write
|
||
1CF87F13000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
20AD2A3F000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F7A000
|
heap
|
page read and write
|
||
B018B2B000
|
stack
|
page read and write
|
||
20AD29D1000
|
trusted library allocation
|
page read and write
|
||
1CF87E02000
|
heap
|
page read and write
|
||
B01977C000
|
stack
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1AF26908000
|
heap
|
page read and write
|
||
26780C43000
|
heap
|
page read and write
|
||
B0193FE000
|
stack
|
page read and write
|
||
1F330F7A000
|
heap
|
page read and write
|
||
1F3304FE000
|
heap
|
page read and write
|
||
1CF87E59000
|
heap
|
page read and write
|
||
B83CAFB000
|
stack
|
page read and write
|
||
20AD2930000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD82B5000
|
heap
|
page read and write
|
||
1AF27002000
|
trusted library allocation
|
page read and write
|
||
21D00802000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
1F330F90000
|
heap
|
page read and write
|
||
B3C9B8F000
|
stack
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F92000
|
heap
|
page read and write
|
||
22A55247000
|
heap
|
page read and write
|
||
1F330F23000
|
heap
|
page read and write
|
||
B3CA0FB000
|
stack
|
page read and write
|
||
B3CA1F7000
|
stack
|
page read and write
|
||
26780B20000
|
heap
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
1CF87E90000
|
heap
|
page read and write
|
||
1F330FA3000
|
heap
|
page read and write
|
||
1E2663F0000
|
trusted library allocation
|
page read and write
|
||
20AD33E0000
|
trusted library allocation
|
page read and write
|
||
7F4EFCF000
|
stack
|
page read and write
|
||
9513879000
|
stack
|
page read and write
|
||
1F330F83000
|
heap
|
page read and write
|
||
1F330C80000
|
trusted library allocation
|
page read and write
|
||
1E2663E9000
|
heap
|
page read and write
|
||
20AD29F3000
|
trusted library allocation
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
1CF87F02000
|
heap
|
page read and write
|
||
1F330F79000
|
heap
|
page read and write
|
||
1E2660CC000
|
heap
|
page read and write
|
||
1F330380000
|
heap
|
page read and write
|
||
1EEA0013000
|
heap
|
page read and write
|
||
22A55140000
|
heap
|
page read and write
|
||
95136F9000
|
stack
|
page read and write
|
||
26780C00000
|
heap
|
page read and write
|
||
20AD29F0000
|
trusted library allocation
|
page read and write
|
||
22A5524C000
|
heap
|
page read and write
|
||
20AD2A13000
|
heap
|
page read and write
|
||
B01987A000
|
stack
|
page read and write
|
||
5876777000
|
stack
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
69AB9FE000
|
stack
|
page read and write
|
||
20AD2A8A000
|
heap
|
page read and write
|
||
1EEA0000000
|
heap
|
page read and write
|
||
1F330F70000
|
heap
|
page read and write
|
||
1F330F9B000
|
heap
|
page read and write
|
||
1F330F78000
|
heap
|
page read and write
|
||
26780C27000
|
heap
|
page read and write
|
||
1F330FA3000
|
heap
|
page read and write
|
||
20AD3C10000
|
trusted library section
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F90000
|
heap
|
page read and write
|
||
1F330F66000
|
heap
|
page read and write
|
||
21D00813000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1CF87F08000
|
heap
|
page read and write
|
||
1F330F70000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
26780E20000
|
heap
|
page read and write
|
||
1F330F8C000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD2A8F000
|
heap
|
page read and write
|
||
4AE000
|
heap
|
page read and write
|
||
1AF2688A000
|
heap
|
page read and write
|
||
1AF26900000
|
heap
|
page read and write
|
||
20AD3502000
|
heap
|
page read and write
|
||
B63D0FF000
|
stack
|
page read and write
|
||
1F330F77000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
20AD2AAD000
|
heap
|
page read and write
|
||
1CF87E5B000
|
heap
|
page read and write
|
||
1EEA004B000
|
heap
|
page read and write
|
||
1F330F7B000
|
heap
|
page read and write
|
||
1F330FC7000
|
heap
|
page read and write
|
||
22A5524E000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330FD1000
|
heap
|
page read and write
|
||
1E266270000
|
heap
|
page read and write
|
||
1EEA006F000
|
heap
|
page read and write
|
||
1AF26853000
|
heap
|
page read and write
|
||
20AD7FC0000
|
trusted library allocation
|
page read and write
|
||
1F33044C000
|
heap
|
page read and write
|
||
1E267110000
|
trusted library allocation
|
page read and write
|
||
21D0086E000
|
heap
|
page read and write
|
||
1AF2684E000
|
heap
|
page read and write
|
||
1F330F6A000
|
heap
|
page read and write
|
||
1EEA0113000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1F33043C000
|
heap
|
page read and write
|
||
1F330F9B000
|
heap
|
page read and write
|
||
20AD3BF0000
|
trusted library section
|
page readonly
|
||
1F330F67000
|
heap
|
page read and write
|
||
26780C42000
|
heap
|
page read and write
|
||
1AF26848000
|
heap
|
page read and write
|
||
1E266090000
|
heap
|
page read and write
|
||
1F330F7A000
|
heap
|
page read and write
|
||
1F330F00000
|
heap
|
page read and write
|
||
1F330F64000
|
heap
|
page read and write
|
||
22A5523C000
|
heap
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
30000
|
heap
|
page read and write
|
||
20AD8200000
|
heap
|
page read and write
|
||
443000
|
unkown
|
page readonly
|
||
1F330F6A000
|
heap
|
page read and write
|
||
B018F77000
|
stack
|
page read and write
|
||
20AD8100000
|
trusted library allocation
|
page read and write
|
||
22A55200000
|
heap
|
page read and write
|
||
20AD3601000
|
trusted library allocation
|
page read and write
|
||
1F330458000
|
heap
|
page read and write
|
||
20AD82AB000
|
heap
|
page read and write
|
||
1EEA0802000
|
trusted library allocation
|
page read and write
|
||
1CF87E80000
|
heap
|
page read and write
|
||
443000
|
unkown
|
page readonly
|
||
20AD8302000
|
heap
|
page read and write
|
||
21D0087A000
|
heap
|
page read and write
|
||
20AD3500000
|
heap
|
page read and write
|
||
20AD8252000
|
heap
|
page read and write
|
||
1E266000000
|
heap
|
page read and write
|
||
7F4F47C000
|
stack
|
page read and write
|
||
1CF87E7A000
|
heap
|
page read and write
|
||
20AD8304000
|
heap
|
page read and write
|
||
1CF87E3C000
|
heap
|
page read and write
|
||
B3C9B0B000
|
stack
|
page read and write
|
||
20AD80D8000
|
trusted library allocation
|
page read and write
|
||
1F33044A000
|
heap
|
page read and write
|
||
69AC077000
|
stack
|
page read and write
|
||
1CF87E57000
|
heap
|
page read and write
|
||
1EEA0066000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1AF26680000
|
heap
|
page read and write
|
||
1CF87D70000
|
heap
|
page read and write
|
||
1F330F68000
|
heap
|
page read and write
|
||
21D00902000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
B83CBFE000
|
stack
|
page read and write
|
||
1F330513000
|
heap
|
page read and write
|
||
1E2662E0000
|
trusted library allocation
|
page read and write
|
||
1F330FAD000
|
heap
|
page read and write
|
||
21D01002000
|
trusted library allocation
|
page read and write
|
||
1F331403000
|
heap
|
page read and write
|
||
1EEA007B000
|
heap
|
page read and write
|
||
1E2663E5000
|
heap
|
page read and write
|
||
22A55130000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
20AD3415000
|
heap
|
page read and write
|
||
1AF26670000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21D00859000
|
heap
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
1F330F50000
|
heap
|
page read and write
|
||
587667F000
|
stack
|
page read and write
|
||
69ABE7B000
|
stack
|
page read and write
|
||
22A55275000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F66000
|
heap
|
page read and write
|
||
B01957F000
|
stack
|
page read and write
|
||
726F6000
|
unkown
|
page readonly
|
||
26780C16000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
1CF88680000
|
trusted library allocation
|
page read and write
|
||
1F330F6A000
|
heap
|
page read and write
|
||
20AD3400000
|
heap
|
page read and write
|
||
58764FE000
|
stack
|
page read and write
|
||
1F330F90000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
1F330E02000
|
heap
|
page read and write
|
||
1CF87E7F000
|
heap
|
page read and write
|
||
1F330F70000
|
heap
|
page read and write
|
||
1F330F7A000
|
heap
|
page read and write
|
||
20AD8430000
|
remote allocation
|
page read and write
|
||
1E266380000
|
trusted library allocation
|
page read and write
|
||
20AD2B13000
|
heap
|
page read and write
|
||
1F33044B000
|
heap
|
page read and write
|
||
1CF87F00000
|
heap
|
page read and write
|
||
20AD8220000
|
trusted library allocation
|
page read and write
|
||
20AD8110000
|
trusted library allocation
|
page read and write
|
||
20AD80D0000
|
trusted library allocation
|
page read and write
|
||
1EEA0052000
|
heap
|
page read and write
|
||
1F330F66000
|
heap
|
page read and write
|
||
1F330516000
|
heap
|
page read and write
|
||
1CF87E29000
|
heap
|
page read and write
|
||
ADC977B000
|
stack
|
page read and write
|
||
7F4F3FE000
|
stack
|
page read and write
|
||
28E6000
|
trusted library allocation
|
page read and write
|
||
20AD2B02000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
22A55300000
|
heap
|
page read and write
|
||
1F330489000
|
heap
|
page read and write
|
||
1EEA004D000
|
heap
|
page read and write
|
||
1CF87E2C000
|
heap
|
page read and write
|
||
B0195FF000
|
stack
|
page read and write
|
||
1E266088000
|
heap
|
page read and write
|
||
450000
|
trusted library allocation
|
page read and write
|
||
1F330F92000
|
heap
|
page read and write
|
||
20AD8430000
|
remote allocation
|
page read and write
|
||
1F330F76000
|
heap
|
page read and write
|
||
1F330F90000
|
heap
|
page read and write
|
||
1AF2682D000
|
heap
|
page read and write
|
||
20AD2A00000
|
heap
|
page read and write
|
||
ADC967B000
|
stack
|
page read and write
|
||
20AD3402000
|
heap
|
page read and write
|
||
1F330F9B000
|
heap
|
page read and write
|
||
1AF26800000
|
heap
|
page read and write
|
||
20AD2970000
|
trusted library section
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
1CF87E60000
|
heap
|
page read and write
|
||
267809F0000
|
heap
|
page read and write
|
||
1EEA0047000
|
heap
|
page read and write
|
||
1EEA07B0000
|
trusted library allocation
|
page read and write
|
||
1F330F79000
|
heap
|
page read and write
|
||
1E266EE0000
|
trusted library allocation
|
page read and write
|
||
20AD7FB0000
|
trusted library allocation
|
page read and write
|
||
B01927E000
|
stack
|
page read and write
|
||
1F330F92000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
20AD82FF000
|
heap
|
page read and write
|
||
1AF267E0000
|
trusted library allocation
|
page read and write
|
||
1CF87D80000
|
heap
|
page read and write
|
||
20AD822B000
|
heap
|
page read and write
|
||
58761BC000
|
stack
|
page read and write
|
||
26780C45000
|
heap
|
page read and write
|
||
1F330508000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7F4F378000
|
stack
|
page read and write
|
||
726F4000
|
unkown
|
page readonly
|
||
1F330F74000
|
heap
|
page read and write
|
||
1F330400000
|
heap
|
page read and write
|
||
1EEA0102000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1F330F19000
|
heap
|
page read and write
|
||
1F330F6C000
|
heap
|
page read and write
|
||
20AD3513000
|
heap
|
page read and write
|
||
20AD2A58000
|
heap
|
page read and write
|
||
20AD3F60000
|
trusted library allocation
|
page read and write
|
||
1E2662D0000
|
trusted library allocation
|
page read and write
|
||
1EEA0057000
|
heap
|
page read and write
|
||
1EEA0055000
|
heap
|
page read and write
|
||
20AD3518000
|
heap
|
page read and write
|
||
20AD3BD0000
|
trusted library section
|
page readonly
|
||
1EEA004C000
|
heap
|
page read and write
|
||
20AD3C00000
|
trusted library section
|
page readonly
|
||
1F331402000
|
heap
|
page read and write
|
||
21D00640000
|
heap
|
page read and write
|
||
1CF87E7A000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
587697F000
|
stack
|
page read and write
|
||
1EE9FF10000
|
heap
|
page read and write
|
||
B83C5BB000
|
stack
|
page read and write
|
||
20AD3559000
|
heap
|
page read and write
|
||
20AD8230000
|
trusted library allocation
|
page read and write
|
||
22A55282000
|
heap
|
page read and write
|
||
26780C3F000
|
heap
|
page read and write
|
||
587647F000
|
stack
|
page read and write
|
||
1F3304AB000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
69ABF7D000
|
stack
|
page read and write
|
||
20AD8400000
|
trusted library allocation
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
21D00630000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22A55C02000
|
trusted library allocation
|
page read and write
|
||
1EEA004F000
|
heap
|
page read and write
|
||
1F330F5E000
|
heap
|
page read and write
|
||
1F330F83000
|
heap
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1EE9FEB0000
|
heap
|
page read and write
|
||
1F330F7A000
|
heap
|
page read and write
|
||
22A551A0000
|
heap
|
page read and write
|
||
20AD80DE000
|
trusted library allocation
|
page read and write
|
||
1F330F67000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
20AD33D0000
|
trusted library allocation
|
page read and write
|
||
1E2663B0000
|
trusted library allocation
|
page read and write
|
||
22A551D0000
|
trusted library allocation
|
page read and write
|
||
1E266250000
|
heap
|
page read and write
|
||
1CF87DE0000
|
heap
|
page read and write
|
||
1F33042C000
|
heap
|
page read and write
|
||
B3C9FFE000
|
stack
|
page read and write
|
||
1F330F78000
|
heap
|
page read and write
|
||
1CF87E62000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1E2660CC000
|
heap
|
page read and write
|
||
1F330FB4000
|
heap
|
page read and write
|
||
7F4F2F9000
|
stack
|
page read and write
|
||
26780E25000
|
heap
|
page read and write
|
||
1F3304C6000
|
heap
|
page read and write
|
||
1F3304B6000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
1EEA0066000
|
heap
|
page read and write
|
||
1F3304FA000
|
heap
|
page read and write
|
||
1F3304AC000
|
heap
|
page read and write
|
||
1F330D40000
|
remote allocation
|
page read and write
|
||
26780B40000
|
heap
|
page read and write
|
||
B0194FE000
|
stack
|
page read and write
|
||
21D00900000
|
heap
|
page read and write
|
||
1CF87E8C000
|
heap
|
page read and write
|
||
1F33044F000
|
heap
|
page read and write
|
||
20AD8248000
|
heap
|
page read and write
|
||
7F4EF4A000
|
stack
|
page read and write
|
||
1F3304E6000
|
heap
|
page read and write
|
||
20AD82F4000
|
heap
|
page read and write
|
||
20AD2A78000
|
heap
|
page read and write
|
||
1E266390000
|
heap
|
page readonly
|
||
1AF26902000
|
heap
|
page read and write
|
||
1F330F6A000
|
heap
|
page read and write
|
||
1F33045D000
|
heap
|
page read and write
|
||
1F331402000
|
heap
|
page read and write
|
||
1AF2685D000
|
heap
|
page read and write
|
||
1AF2684D000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1F330F96000
|
heap
|
page read and write
|
||
20AD2A6E000
|
heap
|
page read and write
|
||
ADC94FF000
|
stack
|
page read and write
|
||
22A55308000
|
heap
|
page read and write
|
||
1F330F61000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
20AD8304000
|
heap
|
page read and write
|
||
1F330429000
|
heap
|
page read and write
|
||
1F331400000
|
heap
|
page read and write
|
||
69AB8FB000
|
stack
|
page read and write
|
||
1CF87E00000
|
heap
|
page read and write
|
||
1F330F63000
|
heap
|
page read and write
|
||
20AD28C0000
|
heap
|
page read and write
|
||
1F330421000
|
heap
|
page read and write
|
||
1AF26829000
|
heap
|
page read and write
|
||
B019A7F000
|
stack
|
page read and write
|
||
7F4F27F000
|
stack
|
page read and write
|
||
26780C23000
|
heap
|
page read and write
|
||
21D00913000
|
heap
|
page read and write
|
||
B63CEFF000
|
stack
|
page read and write
|
||
1EEA0108000
|
heap
|
page read and write
|
||
1F330457000
|
heap
|
page read and write
|
||
1F330F9B000
|
heap
|
page read and write
|
||
1CF87E5F000
|
heap
|
page read and write
|
||
1F330FA3000
|
heap
|
page read and write
|
||
26780C25000
|
heap
|
page read and write
|
||
1F330F75000
|
heap
|
page read and write
|
||
1E266340000
|
trusted library allocation
|
page read and write
|
||
1F330D40000
|
remote allocation
|
page read and write
|
||
21D00828000
|
heap
|
page read and write
|
||
1F330F9B000
|
heap
|
page read and write
|
There are 549 hidden memdumps, click here to show them.