IOC Report
pebbles.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
pebbles.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\pebbles.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\pebbles.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\pebbles.dat.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\pebbles.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pebbles.dat.dll,bewailable
malicious
C:\Windows\System32\audiodg.exe
C:\Windows\system32\AUDIODG.EXE 0x2ac
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
5d054d9
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
304f8497
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
320ea4eb
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
8ab2c38e
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
f7ba8c04
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
4f06eb61
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
88f3e3f2
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
7a993b2f
HKEY_CURRENT_USER\Software\Microsoft\Ymxempiiozk
5d054d9
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
ee40c231
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
ec01e24d
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
54bd8528
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
29b5caa2
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
9109adc7
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
56fca554
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
a4967d89
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
HKEY_CURRENT_USER\Software\Microsoft\Rqqahuvpx
dbdf127f
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
990000
trusted library allocation
page execute and read and write
malicious
E40000
system
page execute and read and write
malicious
4450000
trusted library allocation
page execute and read and write
malicious
E40000
system
page execute and read and write
malicious
4430000
trusted library allocation
page read and write
malicious
12A0000
system
page execute and read and write
malicious
970000
system
page execute and read and write
malicious
590000
trusted library allocation
page read and write
malicious
2D60000
trusted library allocation
page read and write
malicious
2EE0000
trusted library allocation
page execute and read and write
malicious
970000
system
page execute and read and write
malicious
11B0B3E5000
heap
page read and write
206EA900000
heap
page read and write
34A0000
trusted library allocation
page read and write
22C0FC4F000
heap
page read and write
BF0000
unkown
page read and write
4CF0000
heap
page read and write
521F000
heap
page read and write
19D1D402000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
206EA760000
heap
page read and write
34A0000
trusted library allocation
page read and write
D8E000
stack
page read and write
FC0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1DA8839E000
heap
page read and write
21E51A4F000
heap
page read and write
1DA8838C000
heap
page read and write
22C0FC43000
heap
page read and write
5220000
heap
page read and write
176F23A0000
trusted library allocation
page read and write
21E51A57000
heap
page read and write
11B0BB22000
heap
page read and write
205CC240000
heap
page read and write
5650000
trusted library allocation
page read and write
534000
heap
page read and write
16B64E76000
heap
page read and write
96DCFE000
stack
page read and write
206EA7D0000
heap
page read and write
940000
unkown
page readonly
BD0000
unkown
page readonly
24ED47F0000
trusted library allocation
page read and write
93C000
stack
page read and write
1C5194D7000
heap
page read and write
22C0FC69000
heap
page read and write
2D84000
heap
page read and write
D4837E000
stack
page read and write
21E51B08000
heap
page read and write
1DA8837C000
heap
page read and write
176F0A70000
heap
page read and write
176F0A89000
heap
page read and write
2B9F000
stack
page read and write
21E51980000
trusted library allocation
page read and write
19D1CB80000
trusted library allocation
page read and write
A67D6EA000
stack
page read and write
34A0000
trusted library allocation
page read and write
F86BF6E000
stack
page read and write
F86C57E000
stack
page read and write
10AC7B000
stack
page read and write
1DA8835A000
heap
page read and write
1AA43F70000
trusted library allocation
page read and write
640000
direct allocation
page execute and read and write
22C0FC4A000
heap
page read and write
11B0B26B000
heap
page read and write
B40DFB000
stack
page read and write
16B64CD0000
heap
page read and write
46B0000
trusted library allocation
page read and write
2BDA000
heap
page read and write
2D84000
heap
page read and write
5220000
heap
page read and write
34A0000
trusted library allocation
page read and write
1280000
unkown
page readonly
22C0FC54000
heap
page read and write
11B0BBCB000
heap
page read and write
206EB002000
trusted library allocation
page read and write
1FB000
stack
page read and write
22C0FBE0000
trusted library allocation
page read and write
16B64E13000
heap
page read and write
1AA43D88000
heap
page read and write
BAF4B7B000
stack
page read and write
37D8000
trusted library allocation
page read and write
1DA883A5000
heap
page read and write
1DA88372000
heap
page read and write
1DA88363000
heap
page read and write
19D1CD00000
heap
page read and write
6D50A000
unkown
page readonly
19D1CC52000
heap
page read and write
B60000
heap
page read and write
1AA43DBE000
heap
page read and write
63F000
stack
page read and write
1DA88386000
heap
page read and write
22C0FC00000
heap
page read and write
2D84000
heap
page read and write
11B0BBBF000
heap
page read and write
11B0BC13000
heap
page read and write
11B0BC23000
heap
page read and write
6D503000
unkown
page read and write
21E51A66000
heap
page read and write
37D8000
trusted library allocation
page read and write
2D84000
heap
page read and write
B4117E000
stack
page read and write
666E000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
1C519D00000
heap
page read and write
11B0BA02000
heap
page read and write
37D8000
trusted library allocation
page read and write
176F0A58000
heap
page read and write
22C0FC45000
heap
page read and write
1C51942A000
heap
page read and write
5650000
trusted library allocation
page read and write
A872B78000
stack
page read and write
1DA87A50000
heap
page read and write
16B64F02000
heap
page read and write
21E65110000
heap
page read and write
1DA87A4E000
heap
page read and write
205CC0E0000
heap
page read and write
D0E000
unkown
page read and write
44B0000
heap
page read and write
5232000
heap
page read and write
4C81000
heap
page read and write
27C0000
heap
page read and write
11B0BBB1000
heap
page read and write
1DA87B13000
heap
page read and write
5650000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
10F8000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1280000
unkown
page readonly
358FEBB000
stack
page read and write
34A0000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
FF0000
unkown
page readonly
3590A7F000
stack
page read and write
BAF447B000
stack
page read and write
11B0BC27000
heap
page read and write
1DA87AA0000
heap
page read and write
1280000
unkown
page readonly
1DA87AF8000
heap
page read and write
16B64E00000
heap
page read and write
1C519443000
heap
page read and write
1DA88313000
heap
page read and write
205CC170000
trusted library allocation
page read and write
1470DC68000
heap
page read and write
22C0FC5C000
heap
page read and write
96D47B000
stack
page read and write
11B0B060000
heap
page read and write
34A0000
trusted library allocation
page read and write
FFF000
unkown
page read and write
34A0000
trusted library allocation
page read and write
1C5193C0000
trusted library allocation
page read and write
22C0FA80000
heap
page read and write
1DA88398000
heap
page read and write
16B64C70000
heap
page read and write
A8723FE000
stack
page read and write
BAF487F000
stack
page read and write
22C0FC3E000
heap
page read and write
37D8000
trusted library allocation
page read and write
43E0000
direct allocation
page execute and read and write
950000
unkown
page readonly
1DA8838E000
heap
page read and write
34A0000
trusted library allocation
page read and write
2694000
heap
page read and write
34A0000
trusted library allocation
page read and write
21E65460000
heap
page read and write
831415B000
stack
page read and write
16B64C60000
heap
page read and write
BAF49FC000
stack
page read and write
1DA8839A000
heap
page read and write
1AA43FE0000
trusted library allocation
page read and write
F88000
heap
page read and write
24ED46F0000
heap
page read and write
206EA770000
heap
page read and write
2694000
heap
page read and write
21E51A82000
heap
page read and write
1DA883B1000
heap
page read and write
22C0FC41000
heap
page read and write
1DA8839A000
heap
page read and write
2694000
heap
page read and write
1DA88803000
heap
page read and write
37F8000
trusted library allocation
page read and write
A872C7C000
stack
page read and write
22C0FC7F000
heap
page read and write
4551000
heap
page read and write
2AD0000
trusted library allocation
page read and write
64A1000
heap
page read and write
2694000
heap
page read and write
2D9F000
stack
page read and write
176F0810000
heap
page read and write
1DA88394000
heap
page read and write
5650000
trusted library allocation
page read and write
1DA8838F000
heap
page read and write
206EA913000
heap
page read and write
312F000
heap
page read and write
34A0000
trusted library allocation
page read and write
6D491000
unkown
page execute and read and write
4D6F000
heap
page read and write
5650000
trusted library allocation
page read and write
24ED4837000
heap
page read and write
27F0000
heap
page read and write
1C519502000
heap
page read and write
1AA43DF6000
heap
page read and write
37DA000
trusted library allocation
page read and write
1AA449A0000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
6D504000
unkown
page readonly
5232000
heap
page read and write
69A000
heap
page read and write
37F8000
trusted library allocation
page read and write
B4127B000
stack
page read and write
8314779000
stack
page read and write
6D50A000
unkown
page readonly
1C519390000
heap
page read and write
106E000
stack
page read and write
2980000
trusted library allocation
page read and write
205CC1A0000
remote allocation
page read and write
4551000
heap
page read and write
176F0A48000
heap
page read and write
10AF000
stack
page read and write
1DA88386000
heap
page read and write
950000
unkown
page readonly
1AA44BE0000
trusted library allocation
page read and write
1DA8839F000
heap
page read and write
206EA829000
heap
page read and write
2B50000
heap
page read and write
1081000
trusted library allocation
page read and write
1DA87A53000
heap
page read and write
278B000
stack
page read and write
5220000
heap
page read and write
940000
unkown
page readonly
34A0000
trusted library allocation
page read and write
35902FB000
stack
page read and write
960000
unkown
page read and write
5650000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
11B0BB00000
heap
page read and write
A8726FB000
stack
page read and write
37DA000
trusted library allocation
page read and write
76C8000
trusted library allocation
page read and write
205CC213000
heap
page read and write
11E8000
heap
page read and write
3781000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
5232000
heap
page read and write
16B64E3F000
heap
page read and write
D4847D000
stack
page read and write
21E651A1000
heap
page read and write
FD90B3B000
stack
page read and write
4D6F000
heap
page read and write
176F09A0000
trusted library allocation
page read and write
450F000
heap
page read and write
6D491000
unkown
page execute and read and write
B40BFB000
stack
page read and write
11B0B313000
heap
page read and write
176F0B18000
heap
page read and write
1290000
unkown
page read and write
34A0000
trusted library allocation
page read and write
B40CFF000
stack
page read and write
34A0000
trusted library allocation
page read and write
11C0000
heap
page read and write
19D1CC49000
heap
page read and write
452F000
heap
page read and write
950000
unkown
page readonly
1C519320000
heap
page read and write
1AA44C00000
trusted library allocation
page read and write
21E51880000
heap
page read and write
BAF497F000
stack
page read and write
4D6F000
heap
page read and write
1AA43FD9000
heap
page read and write
1290000
unkown
page read and write
206EA883000
heap
page read and write
205CCA02000
trusted library allocation
page read and write
1470DA60000
heap
page read and write
205CC1A0000
remote allocation
page read and write
176F0A26000
heap
page read and write
1DA8838E000
heap
page read and write
1DA87A13000
heap
page read and write
FF0000
unkown
page readonly
96DAFC000
stack
page read and write
49D312B000
stack
page read and write
22C0FC48000
heap
page read and write
5220000
heap
page read and write
5220000
heap
page read and write
37D8000
trusted library allocation
page read and write
1DA87A71000
heap
page read and write
34A0000
trusted library allocation
page read and write
1470DC54000
heap
page read and write
5220000
heap
page read and write
206EA861000
heap
page read and write
22C0FC32000
heap
page read and write
22C0FC42000
heap
page read and write
14C0000
heap
page read and write
1DA87A00000
heap
page read and write
1290000
unkown
page read and write
11B0B270000
heap
page read and write
19D1CC4A000
heap
page read and write
16B64E58000
heap
page read and write
5232000
heap
page read and write
534000
heap
page read and write
D47B8B000
stack
page read and write
2910000
heap
page read and write
205CC0D0000
heap
page read and write
1AA44C60000
trusted library allocation
page read and write
1AA43D90000
heap
page read and write
4B98000
trusted library allocation
page read and write
11B0B244000
heap
page read and write
19D1CD13000
heap
page read and write
34A0000
trusted library allocation
page read and write
45B1000
heap
page read and write
1DA8838B000
heap
page read and write
11B0BBC2000
heap
page read and write
206EA866000
heap
page read and write
960000
unkown
page read and write
4F03D7F000
stack
page read and write
1BC000
stack
page read and write
1DA88802000
heap
page read and write
2694000
heap
page read and write
4CF0000
heap
page read and write
11B0BB43000
heap
page read and write
F86BFEE000
stack
page read and write
11B0B3B9000
heap
page read and write
F86C67F000
stack
page read and write
34A0000
trusted library allocation
page read and write
21E51B02000
heap
page read and write
FBE000
unkown
page read and write
21E651C0000
heap
page read and write
37D8000
trusted library allocation
page read and write
71AF000
trusted library allocation
page read and write
205CC256000
heap
page read and write
E70000
remote allocation
page read and write
BE0000
unkown
page readonly
5650000
trusted library allocation
page read and write
534000
heap
page read and write
16B65602000
trusted library allocation
page read and write
1AA43D20000
heap
page read and write
26E0000
heap
page read and write
BE0000
unkown
page readonly
A67DBFF000
stack
page read and write
BD0000
unkown
page readonly
666B000
trusted library allocation
page read and write
312F000
heap
page read and write
24ED4852000
heap
page read and write
37DA000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
205CC302000
heap
page read and write
37DA000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
2D80000
heap
page read and write
206EA902000
heap
page read and write
6D503000
unkown
page read and write
176F2600000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
22C0FC37000
heap
page read and write
1DA883B7000
heap
page read and write
176F0B02000
heap
page read and write
2690000
heap
page read and write
2D84000
heap
page read and write
BD0000
unkown
page readonly
1470DC28000
heap
page read and write
22C0FC37000
heap
page read and write
206EA85B000
heap
page read and write
666E000
trusted library allocation
page read and write
291B000
stack
page read and write
6D490000
unkown
page readonly
37D8000
trusted library allocation
page read and write
950000
unkown
page readonly
1DA87970000
heap
page read and write
B40E79000
stack
page read and write
1AA44C10000
trusted library allocation
page read and write
96D67C000
stack
page read and write
4D6F000
heap
page read and write
1DA8839C000
heap
page read and write
11B0BB96000
heap
page read and write
42BE000
stack
page read and write
BAF467C000
stack
page read and write
10A70C000
stack
page read and write
1280000
unkown
page readonly
34A0000
trusted library allocation
page read and write
1470DC02000
heap
page read and write
96DBFC000
stack
page read and write
1DA8839C000
heap
page read and write
37D8000
trusted library allocation
page read and write
FD90E7E000
stack
page read and write
22C0FC24000
heap
page read and write
2B0A000
heap
page read and write
BE0000
unkown
page readonly
1280000
unkown
page readonly
1DA8839F000
heap
page read and write
A67D76F000
stack
page read and write
359047F000
stack
page read and write
11B0B229000
heap
page read and write
1DA88202000
heap
page read and write
176F0A3D000
heap
page read and write
176F09D0000
remote allocation
page read and write
11B0B272000
heap
page read and write
1080000
trusted library allocation
page read and write
176F0A00000
heap
page read and write
71AD000
trusted library allocation
page read and write
37DA000
trusted library allocation
page read and write
BD0000
unkown
page readonly
1DA87A4D000
heap
page read and write
2EDF000
stack
page read and write
57BC000
trusted library allocation
page read and write
2190000
heap
page read and write
34A0000
trusted library allocation
page read and write
1DA88140000
trusted library allocation
page read and write
11B0BC00000
heap
page read and write
21E65190000
heap
page read and write
2694000
heap
page read and write
2BD0000
heap
page read and write
21E51810000
heap
page read and write
E70000
remote allocation
page read and write
49D3579000
stack
page read and write
22C0FC85000
heap
page read and write
4B20000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
14D8000
heap
page read and write
1DA879E0000
heap
page read and write
1AA43FD5000
heap
page read and write
534000
heap
page read and write
5232000
heap
page read and write
940000
unkown
page readonly
1DA8839F000
heap
page read and write
37D8000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
22C0FC52000
heap
page read and write
21E51A4C000
heap
page read and write
3190000
heap
page read and write
22C0FA70000
heap
page read and write
5650000
trusted library allocation
page read and write
2DD0000
heap
page read and write
FD91177000
stack
page read and write
176F0A63000
heap
page read and write
34A0000
trusted library allocation
page read and write
22C0FC2E000
heap
page read and write
BF0000
unkown
page read and write
1AA43F60000
trusted library allocation
page read and write
49D34F9000
stack
page read and write
1470DC00000
heap
page read and write
37F8000
trusted library allocation
page read and write
666E000
trusted library allocation
page read and write
BE0000
unkown
page readonly
37D8000
trusted library allocation
page read and write
1DA88387000
heap
page read and write
21E51A00000
heap
page read and write
34A0000
trusted library allocation
page read and write
21E51A71000
heap
page read and write
FD9107B000
stack
page read and write
9A0000
remote allocation
page read and write
940000
unkown
page readonly
4F03A7E000
stack
page read and write
37D8000
trusted library allocation
page read and write
206EA851000
heap
page read and write
FF0000
unkown
page readonly
37F8000
trusted library allocation
page read and write
10AE7B000
stack
page read and write
E90000
heap
page read and write
DA0000
heap
page read and write
1DA88800000
heap
page read and write
37D8000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
1AA43DCC000
heap
page read and write
28DC000
stack
page read and write
FD9127F000
stack
page read and write
16B64DD0000
trusted library allocation
page read and write
49D367F000
stack
page read and write
4B21000
trusted library allocation
page read and write
1DA87AA7000
heap
page read and write
1DA88740000
remote allocation
page read and write
1DA8839A000
heap
page read and write
5650000
trusted library allocation
page read and write
4F034BB000
stack
page read and write
578C000
trusted library allocation
page read and write
11B0BC30000
heap
page read and write
1DA88394000
heap
page read and write
DEF000
stack
page read and write
1DA87A55000
heap
page read and write
5650000
trusted library allocation
page read and write
359057C000
stack
page read and write
1290000
unkown
page read and write
5650000
trusted library allocation
page read and write
11B0B255000
heap
page read and write
1DA87A4C000
heap
page read and write
22C0FC55000
heap
page read and write
1DA87A57000
heap
page read and write
D47E7E000
stack
page read and write
176F0980000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
2F10000
heap
page read and write
21E6519B000
heap
page read and write
1C5194C4000
heap
page read and write
176F0A47000
heap
page read and write
1DA87AED000
heap
page read and write
37D8000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
960000
unkown
page read and write
A67DAFA000
stack
page read and write
507E2FE000
stack
page read and write
34A0000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
19D1CA20000
heap
page read and write
A872CFF000
stack
page read and write
B40F7F000
stack
page read and write
206EA875000
heap
page read and write
1AA43CA0000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
1470DD00000
heap
page read and write
96D7FF000
stack
page read and write
4F03B77000
stack
page read and write
5650000
trusted library allocation
page read and write
1020000
heap
page read and write
1C519470000
heap
page read and write
37DA000
trusted library allocation
page read and write
16B64E29000
heap
page read and write
4D80000
trusted library allocation
page read and write
1470DA70000
heap
page read and write
5650000
trusted library allocation
page read and write
890000
heap
page read and write
FD9137F000
stack
page read and write
2694000
heap
page read and write
1470DC3C000
heap
page read and write
11B0B262000
heap
page read and write
176F0A48000
heap
page read and write
11B0BC02000
heap
page read and write
1280000
unkown
page readonly
6D50A000
unkown
page readonly
1DA87AC2000
heap
page read and write
205CC229000
heap
page read and write
34A0000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
16B64E02000
heap
page read and write
3590B7E000
stack
page read and write
1DA8838A000
heap
page read and write
540000
trusted library allocation
page read and write
64A1000
heap
page read and write
12D0000
remote allocation
page read and write
6D490000
unkown
page readonly
22C0FC47000
heap
page read and write
2870000
heap
page read and write
5650000
trusted library allocation
page read and write
1DA88311000
heap
page read and write
24ED4829000
heap
page read and write
5650000
trusted library allocation
page read and write
21E65465000
heap
page read and write
A872EFC000
stack
page read and write
37FA000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
D480FE000
stack
page read and write
4F038FB000
stack
page read and write
45B1000
heap
page read and write
450F000
heap
page read and write
D4807C000
stack
page read and write
22C0FC78000
heap
page read and write
19D1CC4E000
heap
page read and write
37F8000
trusted library allocation
page read and write
205CC25C000
heap
page read and write
1AA43DD5000
heap
page read and write
6D4E8000
unkown
page execute read
4920000
heap
page read and write
BAF4AFD000
stack
page read and write
1C519400000
heap
page read and write
21E651A6000
heap
page read and write
3010000
direct allocation
page execute and read and write
2DCE000
stack
page read and write
2DA0000
heap
page read and write
205CC1A0000
remote allocation
page read and write
22C0FC30000
heap
page read and write
206EA800000
heap
page read and write
6D504000
unkown
page readonly
3590C7F000
stack
page read and write
1470DC6A000
heap
page read and write
176F09D0000
remote allocation
page read and write
D4F000
unkown
page read and write
21E51A29000
heap
page read and write
507E1FF000
stack
page read and write
BF0000
unkown
page read and write
21FC000
stack
page read and write
A872DFD000
stack
page read and write
5232000
heap
page read and write
6D4B4000
unkown
page execute and write copy
3761000
trusted library allocation
page read and write
1DA88382000
heap
page read and write
5232000
heap
page read and write
176F0A13000
heap
page read and write
960000
unkown
page read and write
4300000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
24ED4802000
heap
page read and write
19D1CC29000
heap
page read and write
950000
unkown
page readonly
22C0FC7C000
heap
page read and write
1C5194E1000
heap
page read and write
E70000
remote allocation
page read and write
206EA83C000
heap
page read and write
1290000
unkown
page read and write
11B0B213000
heap
page read and write
34A0000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
1AA43DF6000
heap
page read and write
4C80000
heap
page read and write
5232000
heap
page read and write
34A0000
trusted library allocation
page read and write
176F0A2A000
heap
page read and write
1200000
heap
page read and write
19D1CC3C000
heap
page read and write
11FD000
heap
page read and write
5650000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
831487F000
stack
page read and write
BF0000
unkown
page read and write
37D8000
trusted library allocation
page read and write
19D1CD02000
heap
page read and write
21E51A77000
heap
page read and write
37F8000
trusted library allocation
page read and write
22C0FC66000
heap
page read and write
34A0000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
16B64E70000
heap
page read and write
1DA88398000
heap
page read and write
11B0B860000
trusted library allocation
page read and write
6D4E8000
unkown
page execute read
4550000
heap
page read and write
34A0000
trusted library allocation
page read and write
24ED4813000
heap
page read and write
F5D000
stack
page read and write
22C0FC4C000
heap
page read and write
176F0A02000
heap
page read and write
37D8000
trusted library allocation
page read and write
1DA87A29000
heap
page read and write
1470E402000
trusted library allocation
page read and write
E3C000
stack
page read and write
251E000
stack
page read and write
49D35FF000
stack
page read and write
205CC200000
heap
page read and write
1DA88371000
heap
page read and write
1470DBD0000
trusted library allocation
page read and write
1DA87AC9000
heap
page read and write
1470DD13000
heap
page read and write
2D5E000
stack
page read and write
1470DC13000
heap
page read and write
21E51B13000
heap
page read and write
2A3C000
stack
page read and write
690000
heap
page read and write
24ED4902000
heap
page read and write
1470DAD0000
heap
page read and write
19D1CC70000
heap
page read and write
5650000
trusted library allocation
page read and write
22C0FC53000
heap
page read and write
24ED483E000
heap
page read and write
11B0B38C000
heap
page read and write
34A0000
trusted library allocation
page read and write
11B0BB22000
heap
page read and write
34A0000
trusted library allocation
page read and write
71AC000
trusted library allocation
page read and write
6D4E8000
unkown
page execute read
22C0FC51000
heap
page read and write
1470DD02000
heap
page read and write
4F0353E000
stack
page read and write
D481FE000
stack
page read and write
19D1CC13000
heap
page read and write
1DA87A51000
heap
page read and write
45B0000
heap
page read and write
1DA88350000
heap
page read and write
3773000
trusted library allocation
page read and write
1DA883A6000
heap
page read and write
5F96000
trusted library allocation
page read and write
19D1CC75000
heap
page read and write
5650000
trusted library allocation
page read and write
11B0BB71000
heap
page read and write
16B64E67000
heap
page read and write
34A0000
trusted library allocation
page read and write
11B0B295000
heap
page read and write
F86BEEC000
stack
page read and write
34A0000
trusted library allocation
page read and write
BCC000
stack
page read and write
1DA883A0000
heap
page read and write
6D4B4000
unkown
page execute and write copy
11B0B293000
heap
page read and write
22C0FC13000
heap
page read and write
24ED4690000
heap
page read and write
11B0BB54000
heap
page read and write
11B0B200000
heap
page read and write
940000
unkown
page readonly
13E0000
heap
page read and write
1AA43DCC000
heap
page read and write
21E651B6000
heap
page read and write
22C0FC7B000
heap
page read and write
11E0000
heap
page read and write
4D6F000
heap
page read and write
1C5194CD000
heap
page read and write
34A0000
trusted library allocation
page read and write
1290000
unkown
page read and write
21E651C0000
heap
page read and write
B4078C000
stack
page read and write
BAF4C7C000
stack
page read and write
37F8000
trusted library allocation
page read and write
1DA88382000
heap
page read and write
22C0FC5C000
heap
page read and write
34A0000
trusted library allocation
page read and write
1DA883A9000
heap
page read and write
19D1CC00000
heap
page read and write
1AA43DC4000
heap
page read and write
1DA88378000
heap
page read and write
206EA85E000
heap
page read and write
A67D7EE000
stack
page read and write
4F035BE000
stack
page read and write
6D491000
unkown
page execute and read and write
49D377B000
stack
page read and write
1AA44990000
trusted library allocation
page read and write
1AA44BF0000
heap
page readonly
5B0000
heap
page read and write
2C40000
heap
page read and write
49D31AF000
stack
page read and write
1AA43C90000
heap
page read and write
FD90BBE000
stack
page read and write
5650000
trusted library allocation
page read and write
359077D000
stack
page read and write
5650000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
9A0000
remote allocation
page read and write
1AA43D80000
heap
page read and write
2D84000
heap
page read and write
11B0B23D000
heap
page read and write
274C000
stack
page read and write
12FD000
stack
page read and write
19D1CA10000
heap
page read and write
19D1CD08000
heap
page read and write
D482FD000
stack
page read and write
6D504000
unkown
page readonly
A67DB7E000
stack
page read and write
34A0000
trusted library allocation
page read and write
452F000
heap
page read and write
21E51A66000
heap
page read and write
5650000
trusted library allocation
page read and write
206EA908000
heap
page read and write
831467E000
stack
page read and write
34A0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
2D84000
heap
page read and write
64A1000
heap
page read and write
5650000
trusted library allocation
page read and write
14CB000
heap
page read and write
5650000
trusted library allocation
page read and write
24ED5002000
trusted library allocation
page read and write
71AA000
trusted library allocation
page read and write
1470DC7B000
heap
page read and write
8FD000
stack
page read and write
6D4B4000
unkown
page execute and write copy
5220000
heap
page read and write
42FF000
stack
page read and write
A87277E000
stack
page read and write
22C0FC2A000
heap
page read and write
1C519C02000
heap
page read and write
96DDFD000
stack
page read and write
34A0000
trusted library allocation
page read and write
FF0000
unkown
page readonly
4310000
heap
page read and write
5FE000
stack
page read and write
534000
heap
page read and write
21E51A52000
heap
page read and write
34A0000
trusted library allocation
page read and write
F80000
heap
page read and write
11B0B290000
heap
page read and write
1DA88740000
remote allocation
page read and write
A60000
heap
page read and write
960000
unkown
page read and write
940000
unkown
page readonly
5220000
heap
page read and write
5A86000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
F86C37E000
stack
page read and write
206EA813000
heap
page read and write
2D60000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
A872877000
stack
page read and write
1DA883A0000
heap
page read and write
4490000
heap
page read and write
1DA87AAA000
heap
page read and write
16B64E5B000
heap
page read and write
5650000
trusted library allocation
page read and write
256A000
heap
page read and write
5E9D000
trusted library allocation
page read and write
2694000
heap
page read and write
1C519330000
heap
page read and write
5650000
trusted library allocation
page read and write
534000
heap
page read and write
BF0000
unkown
page read and write
21E651B7000
heap
page read and write
22C0FC46000
heap
page read and write
5650000
trusted library allocation
page read and write
205CC202000
heap
page read and write
11B0B0D0000
heap
page read and write
1DA88802000
heap
page read and write
5990000
trusted library allocation
page read and write
176F0A57000
heap
page read and write
49D36F9000
stack
page read and write
4980000
heap
page read and write
12D0000
remote allocation
page read and write
BD0000
unkown
page readonly
1DA8838A000
heap
page read and write
B413FE000
stack
page read and write
530000
heap
page read and write
176F2402000
trusted library allocation
page read and write
1DA87980000
heap
page read and write
21E51B00000
heap
page read and write
96D8FE000
stack
page read and write
34A0000
trusted library allocation
page read and write
1DA88802000
heap
page read and write
11B0B22F000
heap
page read and write
EF0000
heap
page read and write
19D1CC56000
heap
page read and write
1AA43DBD000
heap
page read and write
24ED4800000
heap
page read and write
1DA87AE6000
heap
page read and write
206EA827000
heap
page read and write
1C519487000
heap
page read and write
377F000
trusted library allocation
page read and write
1DA88300000
heap
page read and write
6667000
trusted library allocation
page read and write
1DA87B16000
heap
page read and write
5232000
heap
page read and write
34A0000
trusted library allocation
page read and write
205CC140000
heap
page read and write
11B0B070000
heap
page read and write
30B0000
heap
page read and write
BAF4D7F000
stack
page read and write
2C03000
heap
page read and write
1DA883A0000
heap
page read and write
359087D000
stack
page read and write
5650000
trusted library allocation
page read and write
37BC000
trusted library allocation
page read and write
1120000
heap
page read and write
2B4E000
stack
page read and write
BE0000
unkown
page readonly
5650000
trusted library allocation
page read and write
1C5194BC000
heap
page read and write
37DA000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
BAF4E7E000
stack
page read and write
A67DA79000
stack
page read and write
10AF7E000
stack
page read and write
1DA883A8000
heap
page read and write
A87237E000
stack
page read and write
534000
heap
page read and write
34A0000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
11B0BC30000
heap
page read and write
1DA88802000
heap
page read and write
22C0FAE0000
heap
page read and write
64A1000
heap
page read and write
37D8000
trusted library allocation
page read and write
19D1CC81000
heap
page read and write
21E65170000
heap
page read and write
507DCFE000
stack
page read and write
176F0880000
heap
page read and write
10F8000
trusted library allocation
page read and write
BF0000
unkown
page read and write
590000
trusted library allocation
page read and write
1DA883A0000
heap
page read and write
1DA87B02000
heap
page read and write
1DA87A8B000
heap
page read and write
71AC000
trusted library allocation
page read and write
11B0B25C000
heap
page read and write
1DA87A54000
heap
page read and write
176F0A58000
heap
page read and write
1AA43D00000
heap
page read and write
FF0000
unkown
page readonly
6D503000
unkown
page read and write
16B64E78000
heap
page read and write
FF0000
unkown
page readonly
21E651CE000
heap
page read and write
950000
unkown
page readonly
1DA88386000
heap
page read and write
29FE000
stack
page read and write
A872977000
stack
page read and write
19D1CC76000
heap
page read and write
21E651C0000
heap
page read and write
21E51A3C000
heap
page read and write
96D9FF000
stack
page read and write
34A0000
trusted library allocation
page read and write
22C0FC68000
heap
page read and write
507DD7E000
stack
page read and write
1DA87A4B000
heap
page read and write
2B00000
heap
page read and write
71AE000
trusted library allocation
page read and write
507DC7B000
stack
page read and write
5220000
heap
page read and write
534000
heap
page read and write
34A0000
trusted library allocation
page read and write
255F000
stack
page read and write
22C0FC50000
heap
page read and write
1C519413000
heap
page read and write
1DA87ADD000
heap
page read and write
22C10402000
trusted library allocation
page read and write
6661000
trusted library allocation
page read and write
507DF7B000
stack
page read and write
1DA88394000
heap
page read and write
5650000
trusted library allocation
page read and write
176F09D0000
remote allocation
page read and write
1DA87AB1000
heap
page read and write
37D8000
trusted library allocation
page read and write
21E51A13000
heap
page read and write
1DA8838F000
heap
page read and write
2A7B000
stack
page read and write
2F1A000
heap
page read and write
176F0820000
heap
page read and write
1AA43FD0000
heap
page read and write
19D1CA80000
heap
page read and write
16B64F13000
heap
page read and write
F86C47E000
stack
page read and write
1DA8839E000
heap
page read and write
521F000
heap
page read and write
BD0000
unkown
page readonly
5650000
trusted library allocation
page read and write
11B0B1D0000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
11B0BB02000
heap
page read and write
11B0B288000
heap
page read and write
1DA88820000
heap
page read and write
1C519513000
heap
page read and write
1DA8836F000
heap
page read and write
34A0000
trusted library allocation
page read and write
22C0FC49000
heap
page read and write
176F0B00000
heap
page read and write
37D8000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
176F0B13000
heap
page read and write
49D347E000
stack
page read and write
10AD7F000
stack
page read and write
4F03C7F000
stack
page read and write
507E0F7000
stack
page read and write
21E65360000
heap
page read and write
21E51820000
heap
page read and write
960000
unkown
page read and write
206EAF30000
trusted library allocation
page read and write
507DFFF000
stack
page read and write
A8722FC000
stack
page read and write
6C2000
heap
page read and write
2D0F000
stack
page read and write
243B000
stack
page read and write
5650000
trusted library allocation
page read and write
4F039FB000
stack
page read and write
B412FE000
stack
page read and write
5650000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
1DA88802000
heap
page read and write
1DA88740000
remote allocation
page read and write
9A0000
remote allocation
page read and write
1AA43DCC000
heap
page read and write
A872A7E000
stack
page read and write
21E651CF000
heap
page read and write
24ED4844000
heap
page read and write
4D6F000
heap
page read and write
37DA000
trusted library allocation
page read and write
359097F000
stack
page read and write
71AA000
trusted library allocation
page read and write
22C0FC6B000
heap
page read and write
1DA87B08000
heap
page read and write
24ED46A0000
heap
page read and write
22C0FD02000
heap
page read and write
22C0FC97000
heap
page read and write
150000
heap
page read and write
21E52202000
trusted library allocation
page read and write
3590D7F000
stack
page read and write
4C81000
heap
page read and write
4B98000
trusted library allocation
page read and write
2D84000
heap
page read and write
2560000
heap
page read and write
A70000
trusted library allocation
page read and write
BE0000
unkown
page readonly
1DA87A3C000
heap
page read and write
1DA8830F000
heap
page read and write
6D490000
unkown
page readonly
24ED482F000
heap
page read and write
B4107A000
stack
page read and write
There are 975 hidden memdumps, click here to show them.