Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
pebbles.dat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\pebbles.dat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\pebbles.dat.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\pebbles.dat.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllUnregisterServer
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,bewailable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
dbdf127f
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
ee40c231
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
ec01e24d
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
54bd8528
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
29b5caa2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
9109adc7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
56fca554
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
a4967d89
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
dbdf127f
|
||
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
|
dbdf127f
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A40000
|
trusted library allocation
|
page read and write
|
||
3160000
|
trusted library allocation
|
page execute and read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
system
|
page execute and read and write
|
||
2C60000
|
system
|
page execute and read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
system
|
page execute and read and write
|
||
4A60000
|
trusted library allocation
|
page execute and read and write
|
||
2D40000
|
system
|
page execute and read and write
|
||
2C60000
|
system
|
page execute and read and write
|
||
3460000
|
trusted library allocation
|
page execute and read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E5A5000000
|
heap
|
page read and write
|
||
2C130602000
|
heap
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
11E0000
|
heap
|
page read and write
|
||
2C130689000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
2E091429000
|
heap
|
page read and write
|
||
518C000
|
trusted library allocation
|
page read and write
|
||
1E5A4F00000
|
heap
|
page read and write
|
||
2C1304B0000
|
heap
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
2701405C000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
6D930000
|
unkown
|
page readonly
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
310F000
|
unkown
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
72B6000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
F9641FF000
|
stack
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
1E91A857000
|
heap
|
page read and write
|
||
1E91A900000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1E5A5043000
|
heap
|
page read and write
|
||
2701402A000
|
heap
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
6AB2000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
1E91A889000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
364217C000
|
stack
|
page read and write
|
||
19078A6E000
|
heap
|
page read and write
|
||
A63A07D000
|
stack
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
F9644FF000
|
stack
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
2C50000
|
unkown
|
page read and write
|
||
2E091432000
|
heap
|
page read and write
|
||
29541A64000
|
heap
|
page read and write
|
||
27014040000
|
heap
|
page read and write
|
||
2E091467000
|
heap
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
2C130629000
|
heap
|
page read and write
|
||
2E091502000
|
heap
|
page read and write
|
||
64D1BFB000
|
stack
|
page read and write
|
||
29541A13000
|
heap
|
page read and write
|
||
1E5A4F70000
|
heap
|
page read and write
|
||
2E09145C000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
F38927F000
|
stack
|
page read and write
|
||
2FCA000
|
trusted library allocation
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
85C000
|
stack
|
page read and write
|
||
2E091446000
|
heap
|
page read and write
|
||
6D954000
|
unkown
|
page execute and write copy
|
||
960000
|
heap
|
page read and write
|
||
A639EFD000
|
stack
|
page read and write
|
||
1E91A813000
|
heap
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
4DDF000
|
heap
|
page read and write
|
||
F9640FD000
|
stack
|
page read and write
|
||
2E09145F000
|
heap
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
2E091310000
|
trusted library allocation
|
page read and write
|
||
27013EC0000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E91A760000
|
trusted library allocation
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
F963FFA000
|
stack
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2E09143B000
|
heap
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
2F43000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
A6397CB000
|
stack
|
page read and write
|
||
4F4F000
|
heap
|
page read and write
|
||
2E091479000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
5327000
|
trusted library allocation
|
page read and write
|
||
B0CA17B000
|
stack
|
page read and write
|
||
2E091473000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
2E091458000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
27013EB0000
|
heap
|
page read and write
|
||
6D988000
|
unkown
|
page execute read
|
||
4F60000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
2E0911A0000
|
heap
|
page read and write
|
||
29541A79000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E91A902000
|
heap
|
page read and write
|
||
29F0000
|
unkown
|
page readonly
|
||
29F0000
|
unkown
|
page readonly
|
||
1E91A858000
|
heap
|
page read and write
|
||
2E091444000
|
heap
|
page read and write
|
||
29541B13000
|
heap
|
page read and write
|
||
2C130440000
|
heap
|
page read and write
|
||
F963BBC000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E5A4FA0000
|
trusted library allocation
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
29541990000
|
heap
|
page read and write
|
||
F38947E000
|
stack
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
F9643FD000
|
stack
|
page read and write
|
||
2C90000
|
remote allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
F9645FE000
|
stack
|
page read and write
|
||
1E5A5A02000
|
trusted library allocation
|
page read and write
|
||
B0CA47E000
|
stack
|
page read and write
|
||
2F2E000
|
unkown
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
50FF000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2C130675000
|
heap
|
page read and write
|
||
BE4397E000
|
stack
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
4AD3000
|
heap
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
D14000
|
heap
|
page read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
6D9A4000
|
unkown
|
page readonly
|
||
2D70000
|
remote allocation
|
page read and write
|
||
4ABF000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
1E91A88A000
|
heap
|
page read and write
|
||
19079402000
|
heap
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
3CB000
|
stack
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
2FCA000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
1E91A848000
|
heap
|
page read and write
|
||
6D988000
|
unkown
|
page execute read
|
||
6D9A3000
|
unkown
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
29542402000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
29541B00000
|
heap
|
page read and write
|
||
2CCD000
|
stack
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
2E09145E000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
4F61000
|
heap
|
page read and write
|
||
BE4367E000
|
stack
|
page read and write
|
||
2E091400000
|
heap
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
36418AB000
|
stack
|
page read and write
|
||
6D9AA000
|
unkown
|
page readonly
|
||
19078A80000
|
heap
|
page read and write
|
||
A639F7E000
|
stack
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
2C130668000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
F3890FE000
|
stack
|
page read and write
|
||
1E91A5F0000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
1E91A847000
|
heap
|
page read and write
|
||
19078A00000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2C90000
|
remote allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
29541A58000
|
heap
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
6ABA000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
1E5A5102000
|
heap
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
2E09142D000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
19078A2A000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
29541A28000
|
heap
|
page read and write
|
||
27014000000
|
heap
|
page read and write
|
||
6D9A3000
|
unkown
|
page read and write
|
||
1E5A4FC0000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
A639B7E000
|
stack
|
page read and write
|
||
F388DFB000
|
stack
|
page read and write
|
||
2E091460000
|
heap
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
50FF000
|
heap
|
page read and write
|
||
1E91A89A000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1E5A5050000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
6D931000
|
unkown
|
page execute and read and write
|
||
29541A02000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
19078930000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
6AB8000
|
trusted library allocation
|
page read and write
|
||
1E5A5013000
|
heap
|
page read and write
|
||
2C130668000
|
heap
|
page read and write
|
||
1E91A7F0000
|
remote allocation
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
2E09144E000
|
heap
|
page read and write
|
||
E9B000
|
stack
|
page read and write
|
||
2E09145A000
|
heap
|
page read and write
|
||
295419C0000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2C130664000
|
heap
|
page read and write
|
||
1E91A7F0000
|
remote allocation
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
1E5A5051000
|
heap
|
page read and write
|
||
2E091210000
|
heap
|
page read and write
|
||
6D954000
|
unkown
|
page execute and write copy
|
||
BE43E7B000
|
stack
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
6D9AA000
|
unkown
|
page readonly
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
364227D000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
DAD000
|
stack
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
6D954000
|
unkown
|
page execute and write copy
|
||
2D30000
|
unkown
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
B0CA27F000
|
stack
|
page read and write
|
||
19078990000
|
heap
|
page read and write
|
||
270147C0000
|
trusted library allocation
|
page read and write
|
||
29541A3C000
|
heap
|
page read and write
|
||
29541B02000
|
heap
|
page read and write
|
||
B0C9E7C000
|
stack
|
page read and write
|
||
64D1EFD000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
2E09147A000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2E091462000
|
heap
|
page read and write
|
||
5838000
|
trusted library allocation
|
page read and write
|
||
2E09146B000
|
heap
|
page read and write
|
||
19078920000
|
heap
|
page read and write
|
||
1E91A865000
|
heap
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
6D931000
|
unkown
|
page execute and read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
1E5A5113000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
364207F000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2C130E02000
|
trusted library allocation
|
page read and write
|
||
19078ACF000
|
heap
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
2C13063D000
|
heap
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
4AD3000
|
heap
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
64D135C000
|
stack
|
page read and write
|
||
F38957E000
|
stack
|
page read and write
|
||
2E091463000
|
heap
|
page read and write
|
||
4F4F000
|
heap
|
page read and write
|
||
2E09142F000
|
heap
|
page read and write
|
||
38C000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
4C5F000
|
heap
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
2D0C000
|
stack
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
1E5A5100000
|
heap
|
page read and write
|
||
6D930000
|
unkown
|
page readonly
|
||
6D930000
|
unkown
|
page readonly
|
||
4FAF000
|
heap
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2E091445000
|
heap
|
page read and write
|
||
64D1FFF000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1E5A502F000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
27014102000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
29E0000
|
remote allocation
|
page read and write
|
||
2E091478000
|
heap
|
page read and write
|
||
F9648FE000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
89B000
|
stack
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
1E5A5002000
|
heap
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
2C130713000
|
heap
|
page read and write
|
||
64D18FE000
|
stack
|
page read and write
|
||
364247C000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2E09147C000
|
heap
|
page read and write
|
||
29541920000
|
heap
|
page read and write
|
||
29F0000
|
unkown
|
page readonly
|
||
2E09144A000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
1E91A871000
|
heap
|
page read and write
|
||
4ACF000
|
heap
|
page read and write
|
||
6147000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E91A780000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
2C130613000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
BE437FE000
|
stack
|
page read and write
|
||
A8C000
|
stack
|
page read and write
|
||
2E091413000
|
heap
|
page read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
1E91A7B0000
|
trusted library allocation
|
page read and write
|
||
2C130625000
|
heap
|
page read and write
|
||
F9647FE000
|
stack
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
B0CA37E000
|
stack
|
page read and write
|
||
2C130600000
|
heap
|
page read and write
|
||
3641E7E000
|
stack
|
page read and write
|
||
3410000
|
direct allocation
|
page execute and read and write
|
||
960000
|
unkown
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E5A503D000
|
heap
|
page read and write
|
||
349A000
|
heap
|
page read and write
|
||
2D70000
|
remote allocation
|
page read and write
|
||
30C8000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
270147F0000
|
remote allocation
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
27013F20000
|
heap
|
page read and write
|
||
270147F0000
|
remote allocation
|
page read and write
|
||
6AB1000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
64D1B7C000
|
stack
|
page read and write
|
||
2E091457000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
3641F7F000
|
stack
|
page read and write
|
||
64D177C000
|
stack
|
page read and write
|
||
29541A00000
|
heap
|
page read and write
|
||
4ABF000
|
heap
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
1E5A505A000
|
heap
|
page read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
4C5F000
|
heap
|
page read and write
|
||
4DDF000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
4ACF000
|
heap
|
page read and write
|
||
19078AE2000
|
heap
|
page read and write
|
||
19079500000
|
heap
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
2DEE000
|
unkown
|
page read and write
|
||
4F61000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
64D19FF000
|
stack
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
2F6E000
|
stack
|
page read and write
|
||
4C5F000
|
heap
|
page read and write
|
||
29F0000
|
unkown
|
page readonly
|
||
27014002000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
19078A3E000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
2C130673000
|
heap
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
heap
|
page read and write
|
||
2E091461000
|
heap
|
page read and write
|
||
125F000
|
stack
|
page read and write
|
||
2E0911B0000
|
heap
|
page read and write
|
||
190789C0000
|
trusted library allocation
|
page read and write
|
||
BE43A7A000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
4ACF000
|
heap
|
page read and write
|
||
6D988000
|
unkown
|
page execute read
|
||
1E91A83D000
|
heap
|
page read and write
|
||
1E91A913000
|
heap
|
page read and write
|
||
2E091440000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
1E5A5029000
|
heap
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
2E091482000
|
heap
|
page read and write
|
||
2E091476000
|
heap
|
page read and write
|
||
1E5A4F10000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
remote allocation
|
page read and write
|
||
6D9A4000
|
unkown
|
page readonly
|
||
6D9AA000
|
unkown
|
page readonly
|
||
4BA0000
|
heap
|
page read and write
|
||
29F0000
|
unkown
|
page readonly
|
||
2D70000
|
remote allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
29541930000
|
heap
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
1E91C202000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2E091464000
|
heap
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
27014802000
|
trusted library allocation
|
page read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
6AB9000
|
trusted library allocation
|
page read and write
|
||
27014013000
|
heap
|
page read and write
|
||
2C1305B0000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
2C40000
|
unkown
|
page readonly
|
||
2C13065A000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
64D1DFE000
|
stack
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
6D9A4000
|
unkown
|
page readonly
|
||
4F4F000
|
heap
|
page read and write
|
||
64D1A7C000
|
stack
|
page read and write
|
||
1E91A800000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
1E91A82A000
|
heap
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
1E91A660000
|
heap
|
page read and write
|
||
2DEE000
|
unkown
|
page read and write
|
||
2C130450000
|
heap
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
4AC0000
|
heap
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
2E09147D000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
19078B02000
|
heap
|
page read and write
|
||
1E91C1A0000
|
trusted library allocation
|
page read and write
|
||
270147F0000
|
remote allocation
|
page read and write
|
||
BE4329B000
|
stack
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
30C8000
|
trusted library allocation
|
page read and write
|
||
1E91A929000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
29E0000
|
remote allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
6D931000
|
unkown
|
page execute and read and write
|
||
2E091474000
|
heap
|
page read and write
|
||
19078A86000
|
heap
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
2BCB000
|
stack
|
page read and write
|
||
29F0000
|
unkown
|
page readonly
|
||
1E91A7F0000
|
remote allocation
|
page read and write
|
||
6D9A3000
|
unkown
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
64D1CFF000
|
stack
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
2FAF000
|
stack
|
page read and write
|
||
1E5A5072000
|
heap
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
19079532000
|
heap
|
page read and write
|
||
4ABB000
|
heap
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
F9646FF000
|
stack
|
page read and write
|
||
1E91A600000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
BE43B7E000
|
stack
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
6AB7000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
A639C7C000
|
stack
|
page read and write
|
||
19078ABE000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page execute and read and write
|
||
1210000
|
heap
|
page read and write
|
||
2E09143D000
|
heap
|
page read and write
|
||
BE43D7E000
|
stack
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
2E091C02000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
29541A77000
|
heap
|
page read and write
|
||
2C40000
|
unkown
|
page readonly
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
51BC000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
19078B13000
|
heap
|
page read and write
|
||
2E091442000
|
heap
|
page read and write
|
||
F38907E000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
A639CFE000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
6ABA000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
F38937E000
|
stack
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
19078A8A000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
4AD3000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
ACB000
|
stack
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
19078A13000
|
heap
|
page read and write
|
||
BE438FB000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2C130702000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
There are 606 hidden memdumps, click here to show them.