Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\nvbbzu.dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C10000
|
direct allocation
|
page execute and read and write
|
||
24056D13000
|
heap
|
page read and write
|
||
2405B800000
|
trusted library allocation
|
page read and write
|
||
18B21CF0000
|
remote allocation
|
page read and write
|
||
2405BA70000
|
trusted library allocation
|
page read and write
|
||
1B4BEE5C000
|
heap
|
page read and write
|
||
F5D887B000
|
stack
|
page read and write
|
||
26C57387000
|
heap
|
page read and write
|
||
2025F658000
|
heap
|
page read and write
|
||
1B4BEC80000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
24056257000
|
heap
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
24056D02000
|
heap
|
page read and write
|
||
1B4BF5C0000
|
remote allocation
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
1725BA86000
|
heap
|
page read and write
|
||
2A239C92000
|
heap
|
page read and write
|
||
24057780000
|
trusted library allocation
|
page read and write
|
||
7B89E7B000
|
stack
|
page read and write
|
||
1B4BEDF0000
|
trusted library allocation
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
14E0EF66000
|
heap
|
page read and write
|
||
26C57394000
|
heap
|
page read and write
|
||
2025F702000
|
heap
|
page read and write
|
||
2405BAA6000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
22AAD2D0000
|
heap
|
page read and write
|
||
2405BC40000
|
trusted library allocation
|
page read and write
|
||
2010663D000
|
heap
|
page read and write
|
||
1725B7A0000
|
heap
|
page read and write
|
||
1725BA62000
|
heap
|
page read and write
|
||
E36917F000
|
stack
|
page read and write
|
||
AF97BFF000
|
stack
|
page read and write
|
||
26C56A5D000
|
heap
|
page read and write
|
||
2025F63A000
|
heap
|
page read and write
|
||
2A239C52000
|
heap
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
2405B9F0000
|
trusted library allocation
|
page read and write
|
||
2405BB02000
|
heap
|
page read and write
|
||
26C5738D000
|
heap
|
page read and write
|
||
775FEF9000
|
stack
|
page read and write
|
||
1D4C225E000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
240562AA000
|
heap
|
page read and write
|
||
5428C7E000
|
stack
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
1E8F5D00000
|
trusted library allocation
|
page read and write
|
||
5FB76FE000
|
stack
|
page read and write
|
||
26C573A1000
|
heap
|
page read and write
|
||
20106602000
|
heap
|
page read and write
|
||
1E8F5090000
|
trusted library allocation
|
page read and write
|
||
1D4C227D000
|
heap
|
page read and write
|
||
26C573A6000
|
heap
|
page read and write
|
||
4C6A000
|
direct allocation
|
page read and write
|
||
1D4C226A000
|
heap
|
page read and write
|
||
18B2024C000
|
heap
|
page read and write
|
||
7EE26FE000
|
stack
|
page read and write
|
||
26C5734A000
|
heap
|
page read and write
|
||
1D4C2200000
|
heap
|
page read and write
|
||
20854300000
|
heap
|
page read and write
|
||
259D1400000
|
heap
|
page read and write
|
||
1E8F5C90000
|
heap
|
page readonly
|
||
1D4C2229000
|
heap
|
page read and write
|
||
1D4C2A02000
|
trusted library allocation
|
page read and write
|
||
24056C00000
|
heap
|
page read and write
|
||
22AAD440000
|
heap
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
7EE23FC000
|
stack
|
page read and write
|
||
1725BA7B000
|
heap
|
page read and write
|
||
1D4C227E000
|
heap
|
page read and write
|
||
26C56AE7000
|
heap
|
page read and write
|
||
5428AFF000
|
stack
|
page read and write
|
||
3150A7B000
|
stack
|
page read and write
|
||
26C56AEA000
|
heap
|
page read and write
|
||
1D4C225A000
|
heap
|
page read and write
|
||
1725BA3C000
|
heap
|
page read and write
|
||
259D1200000
|
heap
|
page read and write
|
||
A1FEFFE000
|
stack
|
page read and write
|
||
26C567E0000
|
heap
|
page read and write
|
||
2405629D000
|
heap
|
page read and write
|
||
2A239C8B000
|
heap
|
page read and write
|
||
20854270000
|
heap
|
page read and write
|
||
20854A02000
|
trusted library allocation
|
page read and write
|
||
26C57800000
|
heap
|
page read and write
|
||
14E0EF94000
|
heap
|
page read and write
|
||
14E0EF5B000
|
heap
|
page read and write
|
||
123D000
|
stack
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
E36977C000
|
stack
|
page read and write
|
||
1A513213000
|
heap
|
page read and write
|
||
18B2028D000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
22AAD429000
|
heap
|
page read and write
|
||
5ED897B000
|
stack
|
page read and write
|
||
259D142A000
|
heap
|
page read and write
|
||
2D3B000
|
heap
|
page read and write
|
||
F5D8B7F000
|
stack
|
page read and write
|
||
24056D18000
|
heap
|
page read and write
|
||
2405BA4A000
|
heap
|
page read and write
|
||
20106520000
|
heap
|
page read and write
|
||
1725BB08000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1B4BEE00000
|
heap
|
page read and write
|
||
259D1370000
|
trusted library allocation
|
page read and write
|
||
18B2031C000
|
heap
|
page read and write
|
||
1725BB13000
|
heap
|
page read and write
|
||
35728FB000
|
stack
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
14FE8FC000
|
stack
|
page read and write
|
||
2405BAF0000
|
heap
|
page read and write
|
||
A1FF07F000
|
unkown
|
page read and write
|
||
31505BE000
|
stack
|
page read and write
|
||
2A239C78000
|
heap
|
page read and write
|
||
14E0EF77000
|
heap
|
page read and write
|
||
1D4C226D000
|
heap
|
page read and write
|
||
E36947C000
|
stack
|
page read and write
|
||
7B89FF9000
|
stack
|
page read and write
|
||
26C57202000
|
heap
|
page read and write
|
||
259D1270000
|
heap
|
page read and write
|
||
775FFFE000
|
stack
|
page read and write
|
||
26C57394000
|
heap
|
page read and write
|
||
1A513200000
|
heap
|
page read and write
|
||
2A239B30000
|
trusted library allocation
|
page read and write
|
||
2A239C3C000
|
heap
|
page read and write
|
||
1B4BEE56000
|
heap
|
page read and write
|
||
26C5738D000
|
heap
|
page read and write
|
||
1725BB02000
|
heap
|
page read and write
|
||
E368F7C000
|
stack
|
page read and write
|
||
26C57803000
|
heap
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
22AAD43C000
|
heap
|
page read and write
|
||
201064C0000
|
heap
|
page read and write
|
||
14FE9FE000
|
stack
|
page read and write
|
||
A8EE27B000
|
stack
|
page read and write
|
||
26C57384000
|
heap
|
page read and write
|
||
20106E02000
|
trusted library allocation
|
page read and write
|
||
1A51323D000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
22AAD502000
|
heap
|
page read and write
|
||
259D14CB000
|
heap
|
page read and write
|
||
2159E77000
|
stack
|
page read and write
|
||
18B200E0000
|
heap
|
page read and write
|
||
1E8F5C80000
|
trusted library allocation
|
page read and write
|
||
26C57820000
|
heap
|
page read and write
|
||
1E8F4E3F000
|
heap
|
page read and write
|
||
2A239C13000
|
heap
|
page read and write
|
||
26C57384000
|
heap
|
page read and write
|
||
1B4BF602000
|
trusted library allocation
|
page read and write
|
||
26C573A6000
|
heap
|
page read and write
|
||
E36927F000
|
stack
|
page read and write
|
||
1725BA8A000
|
heap
|
page read and write
|
||
26C56A5C000
|
heap
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
1D4C222E000
|
heap
|
page read and write
|
||
26C56A13000
|
heap
|
page read and write
|
||
26C56AE1000
|
heap
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
1D4C2240000
|
heap
|
page read and write
|
||
861000
|
direct allocation
|
page execute read
|
||
30B0000
|
heap
|
page read and write
|
||
A8EE17B000
|
stack
|
page read and write
|
||
26C56AEA000
|
heap
|
page read and write
|
||
18B21E02000
|
trusted library allocation
|
page read and write
|
||
20106613000
|
heap
|
page read and write
|
||
2A2399D0000
|
heap
|
page read and write
|
||
24056290000
|
heap
|
page read and write
|
||
1B4BF5C0000
|
remote allocation
|
page read and write
|
||
1B4BEE13000
|
heap
|
page read and write
|
||
2405BAFD000
|
heap
|
page read and write
|
||
20106713000
|
heap
|
page read and write
|
||
F5D8C7A000
|
stack
|
page read and write
|
||
1E8F4DF9000
|
heap
|
page read and write
|
||
1A513300000
|
heap
|
page read and write
|
||
24056325000
|
heap
|
page read and write
|
||
26C56A3C000
|
heap
|
page read and write
|
||
18B20313000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
AF97DFE000
|
stack
|
page read and write
|
||
26C56AB3000
|
heap
|
page read and write
|
||
5FB75FE000
|
stack
|
page read and write
|
||
1D4C1FB0000
|
heap
|
page read and write
|
||
26C567F0000
|
heap
|
page read and write
|
||
2025F530000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7EE1B5C000
|
stack
|
page read and write
|
||
7EE24FC000
|
stack
|
page read and write
|
||
A1FE97E000
|
stack
|
page read and write
|
||
2D54000
|
heap
|
page read and write
|
||
26C57300000
|
heap
|
page read and write
|
||
14FE52E000
|
stack
|
page read and write
|
||
201064B0000
|
heap
|
page read and write
|
||
2405BAFA000
|
heap
|
page read and write
|
||
5ED917A000
|
stack
|
page read and write
|
||
2025F5D0000
|
trusted library allocation
|
page read and write
|
||
26C56A69000
|
heap
|
page read and write
|
||
2A23A402000
|
trusted library allocation
|
page read and write
|
||
2405BB02000
|
heap
|
page read and write
|
||
315087D000
|
stack
|
page read and write
|
||
1E8F4E5A000
|
heap
|
page read and write
|
||
5ED8B7A000
|
stack
|
page read and write
|
||
1D4C2267000
|
heap
|
page read and write
|
||
2025F65A000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1725B7B0000
|
heap
|
page read and write
|
||
1D4C222F000
|
heap
|
page read and write
|
||
1725BA7B000
|
heap
|
page read and write
|
||
A8EE47F000
|
stack
|
page read and write
|
||
22AAD41F000
|
heap
|
page read and write
|
||
A1FEE7F000
|
stack
|
page read and write
|
||
20854190000
|
trusted library allocation
|
page read and write
|
||
1E8F4D30000
|
heap
|
page read and write
|
||
26C57384000
|
heap
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
2A239C00000
|
heap
|
page read and write
|
||
24056302000
|
heap
|
page read and write
|
||
240562B3000
|
heap
|
page read and write
|
||
3150E7F000
|
stack
|
page read and write
|
||
20854302000
|
heap
|
page read and write
|
||
1725BA13000
|
heap
|
page read and write
|
||
F5D8F7D000
|
stack
|
page read and write
|
||
22AAD2C0000
|
heap
|
page read and write
|
||
5ED937E000
|
stack
|
page read and write
|
||
2A239D00000
|
heap
|
page read and write
|
||
18B20190000
|
trusted library allocation
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
542874B000
|
stack
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
14E0EF74000
|
heap
|
page read and write
|
||
240562FC000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2405B950000
|
trusted library allocation
|
page read and write
|
||
2405BAE9000
|
heap
|
page read and write
|
||
2A239C86000
|
heap
|
page read and write
|
||
26C5737A000
|
heap
|
page read and write
|
||
1B4BEE2A000
|
heap
|
page read and write
|
||
2025F623000
|
heap
|
page read and write
|
||
2405B950000
|
trusted library allocation
|
page read and write
|
||
2405BA60000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
2A2399C0000
|
heap
|
page read and write
|
||
7B8A07E000
|
stack
|
page read and write
|
||
22AAD430000
|
heap
|
page read and write
|
||
775FDFE000
|
stack
|
page read and write
|
||
20854020000
|
heap
|
page read and write
|
||
2A239C47000
|
heap
|
page read and write
|
||
5FB77FE000
|
stack
|
page read and write
|
||
2A239A30000
|
heap
|
page read and write
|
||
1D4C2255000
|
heap
|
page read and write
|
||
7B8A179000
|
stack
|
page read and write
|
||
1D4C2302000
|
heap
|
page read and write
|
||
2085428D000
|
heap
|
page read and write
|
||
1A513313000
|
heap
|
page read and write
|
||
18B201C0000
|
trusted library allocation
|
page read and write
|
||
20854256000
|
heap
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
1D4C2257000
|
heap
|
page read and write
|
||
2405B964000
|
trusted library allocation
|
page read and write
|
||
F5D897E000
|
stack
|
page read and write
|
||
259D14BA000
|
heap
|
page read and write
|
||
259D14C1000
|
heap
|
page read and write
|
||
14E0F190000
|
heap
|
page read and write
|
||
1E8F4BF0000
|
heap
|
page read and write
|
||
1D4C2120000
|
trusted library allocation
|
page read and write
|
||
1E8F4DC0000
|
trusted library allocation
|
page read and write
|
||
20854308000
|
heap
|
page read and write
|
||
26C56A8B000
|
heap
|
page read and write
|
||
26C57371000
|
heap
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
2405BC80000
|
remote allocation
|
page read and write
|
||
1A513000000
|
heap
|
page read and write
|
||
2D1A000
|
direct allocation
|
page read and write
|
||
2405BAA4000
|
heap
|
page read and write
|
||
18B21C70000
|
trusted library allocation
|
page read and write
|
||
2405626D000
|
heap
|
page read and write
|
||
22AADBC0000
|
trusted library allocation
|
page read and write
|
||
AF977FC000
|
stack
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
18B2023D000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
24056307000
|
heap
|
page read and write
|
||
22AAD452000
|
heap
|
page read and write
|
||
1D4C2262000
|
heap
|
page read and write
|
||
26C5736D000
|
heap
|
page read and write
|
||
1D4C2259000
|
heap
|
page read and write
|
||
24056213000
|
heap
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
AF97EFE000
|
stack
|
page read and write
|
||
24056D04000
|
heap
|
page read and write
|
||
240562A8000
|
heap
|
page read and write
|
||
26C56AAF000
|
heap
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
1A51327B000
|
heap
|
page read and write
|
||
2405BA80000
|
trusted library allocation
|
page read and write
|
||
2405BD90000
|
trusted library allocation
|
page read and write
|
||
7EE20FF000
|
stack
|
page read and write
|
||
20854200000
|
heap
|
page read and write
|
||
5ED86F7000
|
stack
|
page read and write
|
||
2405BA00000
|
heap
|
page read and write
|
||
1725BA22000
|
heap
|
page read and write
|
||
1A513A02000
|
trusted library allocation
|
page read and write
|
||
1725BA8C000
|
heap
|
page read and write
|
||
2159CFB000
|
stack
|
page read and write
|
||
259D143E000
|
heap
|
page read and write
|
||
26C5737E000
|
heap
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
1725BA7D000
|
heap
|
page read and write
|
||
935000
|
direct allocation
|
page readonly
|
||
24056200000
|
heap
|
page read and write
|
||
26C57389000
|
heap
|
page read and write
|
||
1E8F4E3D000
|
heap
|
page read and write
|
||
1E8F4E3D000
|
heap
|
page read and write
|
||
18B21CF0000
|
remote allocation
|
page read and write
|
||
2025F5A0000
|
heap
|
page read and write
|
||
5ED8C7B000
|
stack
|
page read and write
|
||
357247C000
|
stack
|
page read and write
|
||
2405BA2D000
|
heap
|
page read and write
|
||
26C56A00000
|
heap
|
page read and write
|
||
22AAD439000
|
heap
|
page read and write
|
||
1A513229000
|
heap
|
page read and write
|
||
1D4C2248000
|
heap
|
page read and write
|
||
26C573B7000
|
heap
|
page read and write
|
||
18B20300000
|
heap
|
page read and write
|
||
2A239C4F000
|
heap
|
page read and write
|
||
2405B810000
|
trusted library allocation
|
page read and write
|
||
1E8F4DF0000
|
heap
|
page read and write
|
||
5428E7D000
|
stack
|
page read and write
|
||
240562A4000
|
heap
|
page read and write
|
||
259D1D14000
|
heap
|
page read and write
|
||
24056C02000
|
heap
|
page read and write
|
||
7EE21FE000
|
stack
|
page read and write
|
||
20106629000
|
heap
|
page read and write
|
||
2A239C59000
|
heap
|
page read and write
|
||
A1FE8FE000
|
stack
|
page read and write
|
||
14FE97F000
|
stack
|
page read and write
|
||
26C56AA9000
|
heap
|
page read and write
|
||
240561B0000
|
trusted library allocation
|
page read and write
|
||
1D4C2242000
|
heap
|
page read and write
|
||
1D4C2235000
|
heap
|
page read and write
|
||
26C573B1000
|
heap
|
page read and write
|
||
26C56A60000
|
heap
|
page read and write
|
||
20854213000
|
heap
|
page read and write
|
||
1A513266000
|
heap
|
page read and write
|
||
20854250000
|
heap
|
page read and write
|
||
2025F540000
|
heap
|
page read and write
|
||
1D4C2261000
|
heap
|
page read and write
|
||
2405BC30000
|
trusted library allocation
|
page read and write
|
||
2A239C4C000
|
heap
|
page read and write
|
||
2405BA62000
|
heap
|
page read and write
|
||
1D4C2241000
|
heap
|
page read and write
|
||
2405BA20000
|
heap
|
page read and write
|
||
A1FEF77000
|
stack
|
page read and write
|
||
26C573A1000
|
heap
|
page read and write
|
||
5FB71EE000
|
stack
|
page read and write
|
||
28DB000
|
stack
|
page read and write
|
||
2025F65E000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
22AAD320000
|
heap
|
page read and write
|
||
4AEA000
|
direct allocation
|
page read and write
|
||
1725BB00000
|
heap
|
page read and write
|
||
A1FED79000
|
stack
|
page read and write
|
||
931000
|
direct allocation
|
page execute read
|
||
4976000
|
direct allocation
|
page read and write
|
||
2405BAFA000
|
heap
|
page read and write
|
||
1D4C226F000
|
heap
|
page read and write
|
||
26C5736D000
|
heap
|
page read and write
|
||
2025F63F000
|
heap
|
page read and write
|
||
1725BA2A000
|
heap
|
page read and write
|
||
259D1D39000
|
heap
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
20260002000
|
trusted library allocation
|
page read and write
|
||
2A239C27000
|
heap
|
page read and write
|
||
2010665A000
|
heap
|
page read and write
|
||
20106702000
|
heap
|
page read and write
|
||
240562FC000
|
heap
|
page read and write
|
||
1D4C2256000
|
heap
|
page read and write
|
||
35727FB000
|
stack
|
page read and write
|
||
20854313000
|
heap
|
page read and write
|
||
26C56A52000
|
heap
|
page read and write
|
||
2405BC80000
|
remote allocation
|
page read and write
|
||
E3692FC000
|
stack
|
page read and write
|
||
259D1424000
|
heap
|
page read and write
|
||
2A239C55000
|
heap
|
page read and write
|
||
14E0EF82000
|
heap
|
page read and write
|
||
1D4C2232000
|
heap
|
page read and write
|
||
1725BA64000
|
heap
|
page read and write
|
||
1725B810000
|
heap
|
page read and write
|
||
26C5738D000
|
heap
|
page read and write
|
||
1A513258000
|
heap
|
page read and write
|
||
24056277000
|
heap
|
page read and write
|
||
2025F5F0000
|
remote allocation
|
page read and write
|
||
26C56950000
|
trusted library allocation
|
page read and write
|
||
2025F672000
|
heap
|
page read and write
|
||
5ED887C000
|
stack
|
page read and write
|
||
2025F5F0000
|
remote allocation
|
page read and write
|
||
1725C202000
|
trusted library allocation
|
page read and write
|
||
AF97FFE000
|
stack
|
page read and write
|
||
1E8F4C00000
|
trusted library allocation
|
page read and write
|
||
2405BA86000
|
heap
|
page read and write
|
||
18B2022A000
|
heap
|
page read and write
|
||
18B20200000
|
heap
|
page read and write
|
||
14E0EF66000
|
heap
|
page read and write
|
||
2025F629000
|
heap
|
page read and write
|
||
2A239C58000
|
heap
|
page read and write
|
||
30BA000
|
heap
|
page read and write
|
||
26C57317000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2A239C29000
|
heap
|
page read and write
|
||
26C57380000
|
heap
|
page read and write
|
||
2A239C46000
|
heap
|
page read and write
|
||
2A239C4B000
|
heap
|
page read and write
|
||
14E0EF93000
|
heap
|
page read and write
|
||
24056314000
|
heap
|
page read and write
|
||
26C57394000
|
heap
|
page read and write
|
||
26C571B0000
|
remote allocation
|
page read and write
|
||
AF9767B000
|
stack
|
page read and write
|
||
1D4C2263000
|
heap
|
page read and write
|
||
1D4C224D000
|
heap
|
page read and write
|
||
2D1A000
|
heap
|
page read and write
|
||
2405BC80000
|
remote allocation
|
page read and write
|
||
20106600000
|
heap
|
page read and write
|
||
2025F655000
|
heap
|
page read and write
|
||
1A513202000
|
heap
|
page read and write
|
||
14E0F195000
|
heap
|
page read and write
|
||
18B20140000
|
heap
|
page read and write
|
||
24056120000
|
heap
|
page read and write
|
||
2D5B000
|
heap
|
page read and write
|
||
1E8F5CB0000
|
trusted library allocation
|
page read and write
|
||
259D1D00000
|
heap
|
page read and write
|
||
2159F7F000
|
stack
|
page read and write
|
||
2159AFE000
|
stack
|
page read and write
|
||
26C571B0000
|
remote allocation
|
page read and write
|
||
1B4BEE02000
|
heap
|
page read and write
|
||
1D4C223B000
|
heap
|
page read and write
|
||
2405BC60000
|
trusted library allocation
|
page read and write
|
||
1D4C2235000
|
heap
|
page read and write
|
||
20106DC0000
|
trusted library allocation
|
page read and write
|
||
1D4C2268000
|
heap
|
page read and write
|
||
240562B3000
|
heap
|
page read and write
|
||
259D1210000
|
heap
|
page read and write
|
||
2405B9F0000
|
trusted library allocation
|
page read and write
|
||
2025F602000
|
heap
|
page read and write
|
||
2A239C57000
|
heap
|
page read and write
|
||
26C57392000
|
heap
|
page read and write
|
||
26C56A59000
|
heap
|
page read and write
|
||
14FE879000
|
stack
|
page read and write
|
||
26C56AF8000
|
heap
|
page read and write
|
||
1D4C2275000
|
heap
|
page read and write
|
||
14E0EF8E000
|
heap
|
page read and write
|
||
18B20202000
|
heap
|
page read and write
|
||
22AAD402000
|
heap
|
page read and write
|
||
26C57394000
|
heap
|
page read and write
|
||
1E8F5A40000
|
trusted library allocation
|
page read and write
|
||
259D1413000
|
heap
|
page read and write
|
||
14E0EF10000
|
heap
|
page read and write
|
||
14FE4AA000
|
stack
|
page read and write
|
||
1E8F5089000
|
heap
|
page read and write
|
||
2D49000
|
heap
|
page read and write
|
||
24056BF0000
|
trusted library allocation
|
page read and write
|
||
3150C7E000
|
stack
|
page read and write
|
||
26C5738E000
|
heap
|
page read and write
|
||
AF978FD000
|
stack
|
page read and write
|
||
2D5B000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
18B20302000
|
heap
|
page read and write
|
||
1725BA52000
|
heap
|
page read and write
|
||
240572E0000
|
trusted library allocation
|
page read and write
|
||
26C57315000
|
heap
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
1E8F4E35000
|
heap
|
page read and write
|
||
315097B000
|
stack
|
page read and write
|
||
2405623F000
|
heap
|
page read and write
|
||
A1FEC77000
|
stack
|
page read and write
|
||
26C56A5A000
|
heap
|
page read and write
|
||
24056302000
|
heap
|
page read and write
|
||
AF9747C000
|
stack
|
page read and write
|
||
1A513100000
|
trusted library allocation
|
page read and write
|
||
26C57396000
|
heap
|
page read and write
|
||
26C56ABE000
|
heap
|
page read and write
|
||
2A239C50000
|
heap
|
page read and write
|
||
115C000
|
stack
|
page read and write
|
||
24056229000
|
heap
|
page read and write
|
||
1725BA5E000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
2159D7E000
|
stack
|
page read and write
|
||
2405B928000
|
trusted library allocation
|
page read and write
|
||
775FC7E000
|
stack
|
page read and write
|
||
18B2025C000
|
heap
|
page read and write
|
||
1D4C2213000
|
heap
|
page read and write
|
||
1725B910000
|
trusted library allocation
|
page read and write
|
||
1E8F5085000
|
heap
|
page read and write
|
||
24056272000
|
heap
|
page read and write
|
||
4971000
|
direct allocation
|
page execute read
|
||
5FB78FF000
|
stack
|
page read and write
|
||
1D4C1FC0000
|
heap
|
page read and write
|
||
866000
|
direct allocation
|
page read and write
|
||
2025F5F0000
|
remote allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
1D4C227B000
|
heap
|
page read and write
|
||
5FB716C000
|
stack
|
page read and write
|
||
2405B941000
|
trusted library allocation
|
page read and write
|
||
1D4C2284000
|
heap
|
page read and write
|
||
1E8F5CA0000
|
trusted library allocation
|
page read and write
|
||
2405BC50000
|
trusted library allocation
|
page read and write
|
||
24057761000
|
trusted library allocation
|
page read and write
|
||
18B200D0000
|
heap
|
page read and write
|
||
20000
|
direct allocation
|
page read and write
|
||
A8EE377000
|
stack
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
24056D58000
|
heap
|
page read and write
|
||
18B20259000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
1B4BEC90000
|
heap
|
page read and write
|
||
775FA7C000
|
stack
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
1B4BEF02000
|
heap
|
page read and write
|
||
A8EDD5C000
|
stack
|
page read and write
|
||
1E8F4E3D000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
20854279000
|
heap
|
page read and write
|
||
F5D88FE000
|
stack
|
page read and write
|
||
24056110000
|
heap
|
page read and write
|
||
E368B6C000
|
stack
|
page read and write
|
||
22AAD445000
|
heap
|
page read and write
|
||
5ED8A7E000
|
stack
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
26C57380000
|
heap
|
page read and write
|
||
2405B960000
|
trusted library allocation
|
page read and write
|
||
1D4C222D000
|
heap
|
page read and write
|
||
22AAD413000
|
heap
|
page read and write
|
||
F5D8A7A000
|
stack
|
page read and write
|
||
163000
|
direct allocation
|
page read and write
|
||
E36957C000
|
stack
|
page read and write
|
||
1B4BECF0000
|
heap
|
page read and write
|
||
24056C15000
|
heap
|
page read and write
|
||
14E0EF82000
|
heap
|
page read and write
|
||
259D1C02000
|
heap
|
page read and write
|
||
1E8F5080000
|
heap
|
page read and write
|
||
2A239C92000
|
heap
|
page read and write
|
||
1A513302000
|
heap
|
page read and write
|
||
2405BAF8000
|
heap
|
page read and write
|
||
18B20213000
|
heap
|
page read and write
|
||
26C56B02000
|
heap
|
page read and write
|
||
14E0EF76000
|
heap
|
page read and write
|
||
1E8F4E01000
|
heap
|
page read and write
|
||
3150D7C000
|
stack
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
1725BA00000
|
heap
|
page read and write
|
||
26C57844000
|
heap
|
page read and write
|
||
20854030000
|
heap
|
page read and write
|
||
2A239D02000
|
heap
|
page read and write
|
||
259D14C8000
|
heap
|
page read and write
|
||
2405B92E000
|
trusted library allocation
|
page read and write
|
||
5FB747E000
|
stack
|
page read and write
|
||
18B2025C000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
26C56B16000
|
heap
|
page read and write
|
||
26C57390000
|
heap
|
page read and write
|
||
20854281000
|
heap
|
page read and write
|
||
2A239D08000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
3572AFE000
|
stack
|
page read and write
|
||
26C5738F000
|
heap
|
page read and write
|
||
1E8F4DE0000
|
trusted library allocation
|
page read and write
|
||
14E0EEF0000
|
heap
|
page read and write
|
||
7B8A0FE000
|
stack
|
page read and write
|
||
1A51326A000
|
heap
|
page read and write
|
||
2405BA64000
|
heap
|
page read and write
|
||
20854229000
|
heap
|
page read and write
|
||
14E0EF8F000
|
heap
|
page read and write
|
||
26C57802000
|
heap
|
page read and write
|
||
14E0EF82000
|
heap
|
page read and write
|
||
F5D8E7E000
|
stack
|
page read and write
|
||
14E0EF72000
|
heap
|
page read and write
|
||
E36987F000
|
stack
|
page read and write
|
||
18B20249000
|
heap
|
page read and write
|
||
1D4C226B000
|
heap
|
page read and write
|
||
2405BA89000
|
heap
|
page read and write
|
||
9DA000
|
direct allocation
|
page read and write
|
||
26C5738D000
|
heap
|
page read and write
|
||
11D0000
|
direct allocation
|
page execute and read and write
|
||
2405BB00000
|
heap
|
page read and write
|
||
26C57384000
|
heap
|
page read and write
|
||
259D1502000
|
heap
|
page read and write
|
||
24056BF3000
|
trusted library allocation
|
page read and write
|
||
1D4C2260000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
1E8F4DD0000
|
trusted library allocation
|
page read and write
|
||
14E0EDC0000
|
heap
|
page read and write
|
||
1725BA5A000
|
heap
|
page read and write
|
||
1725BA5C000
|
heap
|
page read and write
|
||
14E0EF61000
|
heap
|
page read and write
|
||
4A45000
|
direct allocation
|
page readonly
|
||
5428EFF000
|
stack
|
page read and write
|
||
2025F613000
|
heap
|
page read and write
|
||
1D4C2226000
|
heap
|
page read and write
|
||
24056180000
|
heap
|
page read and write
|
||
26C57386000
|
heap
|
page read and write
|
||
E3693FE000
|
stack
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
26C56B08000
|
heap
|
page read and write
|
||
1725BA60000
|
heap
|
page read and write
|
||
259D146C000
|
heap
|
page read and write
|
||
5428FFD000
|
stack
|
page read and write
|
||
7EE22FE000
|
stack
|
page read and write
|
||
3150B77000
|
stack
|
page read and write
|
||
2405B9F0000
|
trusted library allocation
|
page read and write
|
||
259D1513000
|
heap
|
page read and write
|
||
289A000
|
stack
|
page read and write
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
215979B000
|
stack
|
page read and write
|
||
18B20262000
|
heap
|
page read and write
|
||
18B20318000
|
heap
|
page read and write
|
||
2405BC10000
|
trusted library allocation
|
page read and write
|
||
1D4C225D000
|
heap
|
page read and write
|
||
18B21CF0000
|
remote allocation
|
page read and write
|
||
26C56B13000
|
heap
|
page read and write
|
||
E36967E000
|
stack
|
page read and write
|
||
AF97AFD000
|
stack
|
page read and write
|
||
2A239C4D000
|
heap
|
page read and write
|
||
22AADC02000
|
trusted library allocation
|
page read and write
|
||
1A512FA0000
|
heap
|
page read and write
|
||
1B4BF5C0000
|
remote allocation
|
page read and write
|
||
A1FEB78000
|
stack
|
page read and write
|
||
2405BD70000
|
trusted library allocation
|
page read and write
|
||
26C57392000
|
heap
|
page read and write
|
||
26C571B0000
|
remote allocation
|
page read and write
|
||
1D4C2274000
|
heap
|
page read and write
|
||
2025F64A000
|
heap
|
page read and write
|
||
215A07F000
|
stack
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
14E0EF50000
|
heap
|
page read and write
|
||
26C56850000
|
heap
|
page read and write
|
||
2405B780000
|
trusted library allocation
|
page read and write
|
||
18B20269000
|
heap
|
page read and write
|
||
18B20170000
|
trusted library allocation
|
page read and write
|
||
A8EE07F000
|
stack
|
page read and write
|
||
20854090000
|
heap
|
page read and write
|
||
2405C000000
|
heap
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
A8EDDDF000
|
stack
|
page read and write
|
||
1D4C2258000
|
heap
|
page read and write
|
||
2085423C000
|
heap
|
page read and write
|
||
AF97CFF000
|
stack
|
page read and write
|
||
26C57384000
|
heap
|
page read and write
|
||
1E8F4D50000
|
heap
|
page read and write
|
||
24056D00000
|
heap
|
page read and write
|
||
1D4C2264000
|
heap
|
page read and write
|
||
4A41000
|
direct allocation
|
page execute read
|
||
26C56A66000
|
heap
|
page read and write
|
||
26C57386000
|
heap
|
page read and write
|
||
5428BFC000
|
stack
|
page read and write
|
||
26C573D5000
|
heap
|
page read and write
|
||
105D000
|
stack
|
page read and write
|
||
259D1489000
|
heap
|
page read and write
|
||
24056D18000
|
heap
|
page read and write
|
||
2405BA3D000
|
heap
|
page read and write
|
||
1D4C2020000
|
heap
|
page read and write
|
||
14FE5AE000
|
stack
|
page read and write
|
||
18B2024C000
|
heap
|
page read and write
|
||
26C56AC5000
|
heap
|
page read and write
|
||
1725BA67000
|
heap
|
page read and write
|
||
2A239C70000
|
heap
|
page read and write
|
||
F5D8D7E000
|
stack
|
page read and write
|
||
26C56A5B000
|
heap
|
page read and write
|
||
2159A7E000
|
stack
|
page read and write
|
||
26C5731D000
|
heap
|
page read and write
|
||
2405B940000
|
trusted library allocation
|
page read and write
|
||
2405B944000
|
trusted library allocation
|
page read and write
|
||
240562BA000
|
heap
|
page read and write
|
||
26C56A29000
|
heap
|
page read and write
|
||
2405B920000
|
trusted library allocation
|
page read and write
|
||
A8EE57F000
|
stack
|
page read and write
|
||
1D4C2265000
|
heap
|
page read and write
|
||
26C5737E000
|
heap
|
page read and write
|
||
1B4BEE40000
|
heap
|
page read and write
|
||
5ED82DB000
|
stack
|
page read and write
|
||
2A239D13000
|
heap
|
page read and write
|
||
A1FE87C000
|
stack
|
page read and write
|
||
26C56A5F000
|
heap
|
page read and write
|
||
1A512F90000
|
heap
|
page read and write
|
||
315053B000
|
stack
|
page read and write
|
||
2405BA15000
|
heap
|
page read and write
|
||
22AAD400000
|
heap
|
page read and write
|
||
2405B790000
|
trusted library allocation
|
page read and write
|
||
20106676000
|
heap
|
page read and write
|
||
35729FB000
|
stack
|
page read and write
|
||
1D4C223D000
|
heap
|
page read and write
|
||
2025F600000
|
heap
|
page read and write
|
||
2405628B000
|
heap
|
page read and write
|
||
5ED8F7F000
|
stack
|
page read and write
|
||
26C57350000
|
heap
|
page read and write
|
||
2405B920000
|
trusted library allocation
|
page read and write
|
||
26C573D1000
|
heap
|
page read and write
|
There are 686 hidden memdumps, click here to show them.