IOC Report
pebbles.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
pebbles.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\pebbles.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\pebbles.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\pebbles.dat.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,bewailable
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
ee40c231
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
ec01e24d
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
54bd8528
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
29b5caa2
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
9109adc7
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
56fca554
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
a4967d89
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f

Memdumps

Base Address
Regiontype
Protect
Malicious
4A40000
trusted library allocation
page read and write
malicious
3160000
trusted library allocation
page execute and read and write
malicious
32E0000
trusted library allocation
page read and write
malicious
29B0000
system
page execute and read and write
malicious
2C60000
system
page execute and read and write
malicious
3140000
trusted library allocation
page read and write
malicious
2D40000
system
page execute and read and write
malicious
4A60000
trusted library allocation
page execute and read and write
malicious
2D40000
system
page execute and read and write
malicious
2C60000
system
page execute and read and write
malicious
3460000
trusted library allocation
page execute and read and write
malicious
2FA8000
trusted library allocation
page read and write
1E5A5000000
heap
page read and write
2C130602000
heap
page read and write
2FC8000
trusted library allocation
page read and write
2D10000
unkown
page readonly
11E0000
heap
page read and write
2C130689000
heap
page read and write
940000
heap
page read and write
31E0000
heap
page read and write
2E091429000
heap
page read and write
518C000
trusted library allocation
page read and write
1E5A4F00000
heap
page read and write
2C1304B0000
heap
page read and write
3051000
trusted library allocation
page read and write
2701405C000
heap
page read and write
4E20000
trusted library allocation
page read and write
6D930000
unkown
page readonly
2FC8000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
310F000
unkown
page read and write
D14000
heap
page read and write
72B6000
trusted library allocation
page read and write
2D20000
unkown
page readonly
F9641FF000
stack
page read and write
4AD3000
heap
page read and write
1E91A857000
heap
page read and write
1E91A900000
heap
page read and write
730000
heap
page read and write
1E5A5043000
heap
page read and write
2701402A000
heap
page read and write
3490000
trusted library allocation
page read and write
2C50000
unkown
page read and write
6AB2000
trusted library allocation
page read and write
32DE000
stack
page read and write
2C40000
unkown
page readonly
2FA8000
trusted library allocation
page read and write
2D10000
unkown
page readonly
1E91A889000
heap
page read and write
4ED0000
heap
page read and write
364217C000
stack
page read and write
19078A6E000
heap
page read and write
A63A07D000
stack
page read and write
2FAA000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
A20000
heap
page read and write
F9644FF000
stack
page read and write
29ED000
stack
page read and write
D14000
heap
page read and write
940000
unkown
page readonly
2C50000
unkown
page read and write
2E091432000
heap
page read and write
29541A64000
heap
page read and write
27014040000
heap
page read and write
2E091467000
heap
page read and write
4AD3000
heap
page read and write
2C130629000
heap
page read and write
2E091502000
heap
page read and write
64D1BFB000
stack
page read and write
29541A13000
heap
page read and write
1E5A4F70000
heap
page read and write
2E09145C000
heap
page read and write
3300000
heap
page read and write
2FA8000
trusted library allocation
page read and write
F38927F000
stack
page read and write
2FCA000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
3398000
heap
page read and write
2FC8000
trusted library allocation
page read and write
85C000
stack
page read and write
2E091446000
heap
page read and write
6D954000
unkown
page execute and write copy
960000
heap
page read and write
A639EFD000
stack
page read and write
1E91A813000
heap
page read and write
1064000
heap
page read and write
4DDF000
heap
page read and write
F9640FD000
stack
page read and write
2E09145F000
heap
page read and write
2FAA000
trusted library allocation
page read and write
2E091310000
trusted library allocation
page read and write
27013EC0000
heap
page read and write
BCA000
heap
page read and write
940000
heap
page read and write
2FA8000
trusted library allocation
page read and write
1E91A760000
trusted library allocation
page read and write
10FD000
stack
page read and write
4AC0000
heap
page read and write
2F34000
heap
page read and write
30EF000
stack
page read and write
F963FFA000
stack
page read and write
2F34000
heap
page read and write
2E09143B000
heap
page read and write
4AD3000
heap
page read and write
2D30000
unkown
page read and write
2F43000
trusted library allocation
page read and write
950000
heap
page read and write
A6397CB000
stack
page read and write
4F4F000
heap
page read and write
2E091479000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
F7F000
stack
page read and write
5327000
trusted library allocation
page read and write
B0CA17B000
stack
page read and write
2E091473000
heap
page read and write
4BE0000
heap
page read and write
2E091458000
heap
page read and write
4BB1000
heap
page read and write
27013EB0000
heap
page read and write
6D988000
unkown
page execute read
4F60000
heap
page read and write
D10000
heap
page read and write
960000
unkown
page read and write
2E0911A0000
heap
page read and write
29541A79000
heap
page read and write
2FA8000
trusted library allocation
page read and write
1E91A902000
heap
page read and write
29F0000
unkown
page readonly
29F0000
unkown
page readonly
1E91A858000
heap
page read and write
2E091444000
heap
page read and write
29541B13000
heap
page read and write
2C130440000
heap
page read and write
F963BBC000
stack
page read and write
2FA8000
trusted library allocation
page read and write
1E5A4FA0000
trusted library allocation
page read and write
4FD1000
heap
page read and write
29541990000
heap
page read and write
F38947E000
stack
page read and write
2FBA000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2D20000
unkown
page readonly
F9643FD000
stack
page read and write
2C90000
remote allocation
page read and write
2FA8000
trusted library allocation
page read and write
F9645FE000
stack
page read and write
1E5A5A02000
trusted library allocation
page read and write
B0CA47E000
stack
page read and write
2F2E000
unkown
page read and write
4AC0000
heap
page read and write
49D1000
heap
page read and write
50FF000
heap
page read and write
2FA8000
trusted library allocation
page read and write
614F000
trusted library allocation
page read and write
1360000
heap
page read and write
2C130675000
heap
page read and write
BE4397E000
stack
page read and write
5080000
heap
page read and write
2FA8000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
2C40000
unkown
page readonly
4AD3000
heap
page read and write
2D10000
unkown
page readonly
D14000
heap
page read and write
2FBA000
trusted library allocation
page read and write
6D9A4000
unkown
page readonly
2D70000
remote allocation
page read and write
4ABF000
heap
page read and write
960000
unkown
page read and write
1E91A88A000
heap
page read and write
19079402000
heap
page read and write
1064000
heap
page read and write
3CB000
stack
page read and write
960000
unkown
page read and write
32C0000
heap
page read and write
2FCA000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
1E91A848000
heap
page read and write
6D988000
unkown
page execute read
6D9A3000
unkown
page read and write
4AD3000
heap
page read and write
950000
unkown
page readonly
29542402000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
29541B00000
heap
page read and write
2CCD000
stack
page read and write
4FF1000
heap
page read and write
2E09145E000
heap
page read and write
4AC0000
heap
page read and write
4F61000
heap
page read and write
BE4367E000
stack
page read and write
2E091400000
heap
page read and write
2FAA000
trusted library allocation
page read and write
36418AB000
stack
page read and write
6D9AA000
unkown
page readonly
19078A80000
heap
page read and write
A639F7E000
stack
page read and write
4AD3000
heap
page read and write
11BF000
stack
page read and write
2FD8000
trusted library allocation
page read and write
2C130668000
heap
page read and write
5120000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
F3890FE000
stack
page read and write
1E91A5F0000
heap
page read and write
4F30000
heap
page read and write
32E0000
trusted library allocation
page read and write
D14000
heap
page read and write
78E000
stack
page read and write
2C3C000
stack
page read and write
4AD3000
heap
page read and write
2FA8000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1E91A847000
heap
page read and write
19078A00000
heap
page read and write
2F34000
heap
page read and write
2C90000
remote allocation
page read and write
303F000
stack
page read and write
BE0000
heap
page read and write
29541A58000
heap
page read and write
2F31000
trusted library allocation
page read and write
940000
unkown
page readonly
6ABA000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
3508000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
2DF0000
heap
page read and write
2F30000
heap
page read and write
1E5A5102000
heap
page read and write
4FD1000
heap
page read and write
950000
unkown
page readonly
2FA8000
trusted library allocation
page read and write
D14000
heap
page read and write
2FD8000
trusted library allocation
page read and write
8EF000
stack
page read and write
3490000
heap
page read and write
2E09142D000
heap
page read and write
103E000
stack
page read and write
19078A2A000
heap
page read and write
2FFE000
stack
page read and write
2FD8000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
29541A28000
heap
page read and write
27014000000
heap
page read and write
6D9A3000
unkown
page read and write
1E5A4FC0000
trusted library allocation
page read and write
99E000
stack
page read and write
2FA8000
trusted library allocation
page read and write
A639B7E000
stack
page read and write
F388DFB000
stack
page read and write
2E091460000
heap
page read and write
2F4F000
trusted library allocation
page read and write
50FF000
heap
page read and write
1E91A89A000
heap
page read and write
B90000
heap
page read and write
1E5A5050000
heap
page read and write
950000
unkown
page readonly
52D0000
trusted library allocation
page read and write
D14000
heap
page read and write
6D931000
unkown
page execute and read and write
29541A02000
heap
page read and write
2DF0000
trusted library allocation
page read and write
19078930000
heap
page read and write
340F000
stack
page read and write
2FA8000
trusted library allocation
page read and write
6AB8000
trusted library allocation
page read and write
1E5A5013000
heap
page read and write
2C130668000
heap
page read and write
1E91A7F0000
remote allocation
page read and write
2D30000
unkown
page read and write
2E09144E000
heap
page read and write
E9B000
stack
page read and write
2E09145A000
heap
page read and write
295419C0000
trusted library allocation
page read and write
32E0000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2C130664000
heap
page read and write
1E91A7F0000
remote allocation
page read and write
8F0000
trusted library allocation
page read and write
1E5A5051000
heap
page read and write
2E091210000
heap
page read and write
6D954000
unkown
page execute and write copy
BE43E7B000
stack
page read and write
137A000
heap
page read and write
2FAA000
trusted library allocation
page read and write
136B000
heap
page read and write
6D9AA000
unkown
page readonly
2FC8000
trusted library allocation
page read and write
1064000
heap
page read and write
950000
unkown
page readonly
364227D000
stack
page read and write
2FA8000
trusted library allocation
page read and write
DAD000
stack
page read and write
2F31000
trusted library allocation
page read and write
6D954000
unkown
page execute and write copy
2D30000
unkown
page read and write
2FA8000
trusted library allocation
page read and write
B0CA27F000
stack
page read and write
19078990000
heap
page read and write
270147C0000
trusted library allocation
page read and write
29541A3C000
heap
page read and write
29541B02000
heap
page read and write
B0C9E7C000
stack
page read and write
64D1EFD000
stack
page read and write
2FA8000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
9EA000
heap
page read and write
2E09147A000
heap
page read and write
2F34000
heap
page read and write
2E091462000
heap
page read and write
5838000
trusted library allocation
page read and write
2E09146B000
heap
page read and write
19078920000
heap
page read and write
1E91A865000
heap
page read and write
3491000
trusted library allocation
page read and write
6D931000
unkown
page execute and read and write
2D10000
unkown
page readonly
DF0000
trusted library allocation
page read and write
2D20000
unkown
page readonly
1E5A5113000
heap
page read and write
960000
unkown
page read and write
364207F000
stack
page read and write
2FA8000
trusted library allocation
page read and write
2C130E02000
trusted library allocation
page read and write
19078ACF000
heap
page read and write
6140000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
2C13063D000
heap
page read and write
940000
unkown
page readonly
4AD3000
heap
page read and write
FC0000
trusted library allocation
page read and write
64D135C000
stack
page read and write
F38957E000
stack
page read and write
2E091463000
heap
page read and write
4F4F000
heap
page read and write
2E09142F000
heap
page read and write
38C000
stack
page read and write
2FA8000
trusted library allocation
page read and write
4C5F000
heap
page read and write
940000
unkown
page readonly
2D0C000
stack
page read and write
1064000
heap
page read and write
1E5A5100000
heap
page read and write
6D930000
unkown
page readonly
6D930000
unkown
page readonly
4FAF000
heap
page read and write
6149000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2E091445000
heap
page read and write
64D1FFF000
stack
page read and write
9E0000
heap
page read and write
1E5A502F000
heap
page read and write
2FB0000
heap
page read and write
4AC0000
heap
page read and write
27014102000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2C50000
unkown
page read and write
29E0000
remote allocation
page read and write
2E091478000
heap
page read and write
F9648FE000
stack
page read and write
5500000
trusted library allocation
page read and write
89B000
stack
page read and write
2FD8000
trusted library allocation
page read and write
1E5A5002000
heap
page read and write
2C50000
unkown
page read and write
2C130713000
heap
page read and write
64D18FE000
stack
page read and write
364247C000
stack
page read and write
D40000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2F34000
heap
page read and write
2F60000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2E09147C000
heap
page read and write
29541920000
heap
page read and write
29F0000
unkown
page readonly
2E09144A000
heap
page read and write
31A0000
heap
page read and write
1E91A871000
heap
page read and write
4ACF000
heap
page read and write
6147000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
1E91A780000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
2C130613000
heap
page read and write
49F0000
direct allocation
page execute and read and write
2FAA000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
BE437FE000
stack
page read and write
A8C000
stack
page read and write
2E091413000
heap
page read and write
3508000
trusted library allocation
page read and write
1E91A7B0000
trusted library allocation
page read and write
2C130625000
heap
page read and write
F9647FE000
stack
page read and write
1064000
heap
page read and write
B0CA37E000
stack
page read and write
2C130600000
heap
page read and write
3641E7E000
stack
page read and write
3410000
direct allocation
page execute and read and write
960000
unkown
page read and write
2FA8000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
1E5A503D000
heap
page read and write
349A000
heap
page read and write
2D70000
remote allocation
page read and write
30C8000
trusted library allocation
page read and write
E5C000
stack
page read and write
320000
heap
page read and write
2FA8000
trusted library allocation
page read and write
1064000
heap
page read and write
270147F0000
remote allocation
page read and write
2D20000
unkown
page readonly
27013F20000
heap
page read and write
270147F0000
remote allocation
page read and write
6AB1000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
64D1B7C000
stack
page read and write
2E091457000
heap
page read and write
52D0000
trusted library allocation
page read and write
3641F7F000
stack
page read and write
64D177C000
stack
page read and write
29541A00000
heap
page read and write
4ABF000
heap
page read and write
5502000
trusted library allocation
page read and write
2D20000
unkown
page readonly
1E5A505A000
heap
page read and write
2FBA000
trusted library allocation
page read and write
4C5F000
heap
page read and write
4DDF000
heap
page read and write
2FA8000
trusted library allocation
page read and write
4ACF000
heap
page read and write
19078AE2000
heap
page read and write
19079500000
heap
page read and write
35E0000
heap
page read and write
2DEE000
unkown
page read and write
4F61000
heap
page read and write
3390000
heap
page read and write
2CD0000
heap
page read and write
64D19FF000
stack
page read and write
940000
unkown
page readonly
2F6E000
stack
page read and write
4C5F000
heap
page read and write
29F0000
unkown
page readonly
27014002000
heap
page read and write
49D0000
heap
page read and write
19078A3E000
heap
page read and write
2B20000
heap
page read and write
1378000
heap
page read and write
2C130673000
heap
page read and write
2FAA000
trusted library allocation
page read and write
4FAF000
heap
page read and write
2E091461000
heap
page read and write
125F000
stack
page read and write
2E0911B0000
heap
page read and write
190789C0000
trusted library allocation
page read and write
BE43A7A000
stack
page read and write
318F000
stack
page read and write
4ACF000
heap
page read and write
6D988000
unkown
page execute read
1E91A83D000
heap
page read and write
1E91A913000
heap
page read and write
2E091440000
heap
page read and write
2F34000
heap
page read and write
1E5A5029000
heap
page read and write
2FC8000
trusted library allocation
page read and write
4AC0000
heap
page read and write
5500000
trusted library allocation
page read and write
2E091482000
heap
page read and write
2E091476000
heap
page read and write
1E5A4F10000
heap
page read and write
950000
unkown
page readonly
2FA8000
trusted library allocation
page read and write
2C90000
remote allocation
page read and write
6D9A4000
unkown
page readonly
6D9AA000
unkown
page readonly
4BA0000
heap
page read and write
29F0000
unkown
page readonly
2D70000
remote allocation
page read and write
5E0000
heap
page read and write
2B8C000
stack
page read and write
29541930000
heap
page read and write
2FD8000
trusted library allocation
page read and write
1E91C202000
trusted library allocation
page read and write
2C60000
heap
page read and write
3170000
heap
page read and write
5730000
trusted library allocation
page read and write
FD0000
heap
page read and write
2E091464000
heap
page read and write
5D68000
trusted library allocation
page read and write
2D30000
unkown
page read and write
314E000
stack
page read and write
27014802000
trusted library allocation
page read and write
614A000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
6AB9000
trusted library allocation
page read and write
27014013000
heap
page read and write
2C1305B0000
trusted library allocation
page read and write
2F9E000
stack
page read and write
4FD1000
heap
page read and write
2D20000
unkown
page readonly
2C40000
unkown
page readonly
2C13065A000
heap
page read and write
4AD0000
heap
page read and write
2FA8000
trusted library allocation
page read and write
64D1DFE000
stack
page read and write
2FB0000
trusted library allocation
page read and write
6D9A4000
unkown
page readonly
4F4F000
heap
page read and write
64D1A7C000
stack
page read and write
1E91A800000
heap
page read and write
D14000
heap
page read and write
2F34000
heap
page read and write
2FA8000
trusted library allocation
page read and write
1E91A82A000
heap
page read and write
7BA000
heap
page read and write
1064000
heap
page read and write
1E91A660000
heap
page read and write
2DEE000
unkown
page read and write
2C130450000
heap
page read and write
2C40000
unkown
page readonly
4AC0000
heap
page read and write
2DF8000
heap
page read and write
2E09147D000
heap
page read and write
2FA8000
trusted library allocation
page read and write
D14000
heap
page read and write
CFE000
stack
page read and write
19078B02000
heap
page read and write
1E91C1A0000
trusted library allocation
page read and write
270147F0000
remote allocation
page read and write
BE4329B000
stack
page read and write
2D30000
unkown
page read and write
7B0000
heap
page read and write
30C8000
trusted library allocation
page read and write
1E91A929000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2C40000
unkown
page readonly
29E0000
remote allocation
page read and write
2FA8000
trusted library allocation
page read and write
6D931000
unkown
page execute and read and write
2E091474000
heap
page read and write
19078A86000
heap
page read and write
2FC8000
trusted library allocation
page read and write
2D10000
unkown
page readonly
2BCB000
stack
page read and write
29F0000
unkown
page readonly
1E91A7F0000
remote allocation
page read and write
6D9A3000
unkown
page read and write
1060000
heap
page read and write
960000
unkown
page read and write
2FA8000
trusted library allocation
page read and write
64D1CFF000
stack
page read and write
2D10000
unkown
page readonly
2FAF000
stack
page read and write
1E5A5072000
heap
page read and write
2FA8000
trusted library allocation
page read and write
19079532000
heap
page read and write
4ABB000
heap
page read and write
2FAA000
trusted library allocation
page read and write
F9646FF000
stack
page read and write
1E91A600000
heap
page read and write
2F34000
heap
page read and write
BE43B7E000
stack
page read and write
2FA8000
trusted library allocation
page read and write
6AB7000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
950000
unkown
page readonly
2FA8000
trusted library allocation
page read and write
A639C7C000
stack
page read and write
19078ABE000
heap
page read and write
30F0000
direct allocation
page execute and read and write
1210000
heap
page read and write
2E09143D000
heap
page read and write
BE43D7E000
stack
page read and write
57D2000
trusted library allocation
page read and write
2C50000
unkown
page read and write
2E091C02000
trusted library allocation
page read and write
2D30000
unkown
page read and write
940000
unkown
page readonly
29541A77000
heap
page read and write
2C40000
unkown
page readonly
2F80000
trusted library allocation
page read and write
51BC000
trusted library allocation
page read and write
9B0000
heap
page read and write
19078B13000
heap
page read and write
2E091442000
heap
page read and write
F38907E000
stack
page read and write
4BB1000
heap
page read and write
A639CFE000
stack
page read and write
BC0000
heap
page read and write
6ABA000
trusted library allocation
page read and write
4BB0000
heap
page read and write
1064000
heap
page read and write
F38937E000
stack
page read and write
3050000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
19078A8A000
heap
page read and write
4B10000
trusted library allocation
page read and write
4AD3000
heap
page read and write
4D60000
heap
page read and write
ACB000
stack
page read and write
2C50000
unkown
page read and write
2FA8000
trusted library allocation
page read and write
19078A13000
heap
page read and write
BE438FB000
stack
page read and write
2F60000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2C130702000
heap
page read and write
49D1000
heap
page read and write
There are 606 hidden memdumps, click here to show them.