Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\LLD5HDX0PS.dll,mydllmain
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\LLD5HDX0PS.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\LLD5HDX0PS.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LLD5HDX0PS.dll",#1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://rammenale.com/for2/aclogID
|
unknown
|
||
https://rammenale.com/for2/regit.tmpsoft
|
unknown
|
||
https://rammenale.com/fo
|
unknown
|
||
https://rammenale.com/for2/regit.tmp%S
|
unknown
|
||
https://rammenale.com/for2/aclog
|
unknown
|
||
https://rammenale.com/for2/regit.tmp
|
131.153.206.231
|
||
https://rammenale.com/_T
|
unknown
|
||
https://rammenale.com/for2/regit.tmpgQ
|
unknown
|
||
http://www.Dc.
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4z
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4w
|
unknown
|
||
https://rammenale.com/-H
|
unknown
|
||
https://rammenale.com/for2/regit.tmpmbt
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4m
|
unknown
|
||
https://rammenale.com/for2/regit.tmpnf
|
unknown
|
||
https://rammenale.com/for2/regit.tmp44uz
|
unknown
|
||
https://rammenale.com/for2/regit.tmp?J
|
unknown
|
||
https://rammenale.com/for2/regit.tmp%f
|
unknown
|
||
https://rammenale.com/for2/regit.tmpOJ
|
unknown
|
||
https://rammenale.com/for2/aclog.txt6634-1003
|
unknown
|
||
https://rammenale.com/for2/aclog.txt6634-1003.mun
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4F
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4D
|
unknown
|
||
https://rammenale.com/for2/regit.tmph
|
unknown
|
||
https://rammenale.com/for2/regit.tmpP
|
unknown
|
||
https://rammenale.com/for2/regit.tmpK
|
unknown
|
||
https://rammenale.com/for2/aclog.txtC:
|
unknown
|
||
https://rammenale.com/for2/regit.tmpuS
|
unknown
|
||
https://rammenale.com/for2/regit.tmpS
|
unknown
|
||
https://rammenale.com/for2/aclog.txtl
|
unknown
|
||
https://rammenale.com/for2/aclog.txtsoft
|
unknown
|
||
https://rammenale.com/for2/aclog.txtg
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4d
|
unknown
|
||
https://rammenale.com/for2/regit.tmpG
|
unknown
|
||
https://rammenale.com/7
|
unknown
|
||
https://rammenale.com/for2/aclog.txtu
|
unknown
|
||
https://rammenale.com/for2/aclog.txts
|
unknown
|
||
https://rammenale.com/for2/aclog.txtr
|
unknown
|
||
https://rammenale.com/for2/aclog.txtq
|
unknown
|
||
https://rammenale.com/for2/regit.tmpE
|
unknown
|
||
https://rammenale.com/for2/regit.tmp0
|
unknown
|
||
https://rammenale.com/for2/regit.tmp1
|
unknown
|
||
https://rammenale.com/for2/regit.tmp3w
|
unknown
|
||
https://rammenale.com/for2/aclog.txtz
|
unknown
|
||
https://rammenale.com/for2/regit.tmp8
|
unknown
|
||
https://rammenale.com/for2/regit.tmp:
|
unknown
|
||
https://rammenale.com/for2/regit.tmp3
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4I
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4#
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4
|
unknown
|
||
https://rammenale.com/for2/regit.tmpent
|
unknown
|
||
https://rammenale.com/for2/aclog.txtx4C
|
unknown
|
||
https://rammenale.com/for2/aclog.txtJ
|
unknown
|
||
https://rammenale.com/for2/aclog.txtI
|
unknown
|
||
https://rammenale.com/for2/aclog.txtfs:
|
unknown
|
||
https://rammenale.com/for2/aclog.txtM3
|
unknown
|
||
https://rammenale.com/for2/regit.tmprI3-
|
unknown
|
||
https://rammenale.com/for2/aclog.txtT
|
unknown
|
||
https://rammenale.com/for2/aclog.txt44
|
unknown
|
||
https://rammenale.com/for2/regit.tmp&bt
|
unknown
|
||
https://rammenale.com/for2/aclog.txtP
|
unknown
|
||
https://rammenale.com/for2/regit.tmpentfc
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4G
|
unknown
|
||
https://rammenale.com/for2/regit.tmp0s
|
unknown
|
||
https://rammenale.com/for2/regit.tmpkbu
|
unknown
|
||
https://rammenale.com/for2/regM
|
unknown
|
||
https://rammenale.com/for2/regit.tmp(f
|
unknown
|
||
https://rammenale.com/for2/regit.tmpkJ
|
unknown
|
||
https://rammenale.com/for2/aclog.txtf
|
unknown
|
||
https://rammenale.com/for2/aclog.txtd
|
unknown
|
||
https://rammenale.com/for2/regit.tmpWJz
|
unknown
|
||
https://rammenale.com/for2/regit.tmpsC:
|
unknown
|
||
https://rammenale.com/for2/aclog.txt_
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4X
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4W
|
unknown
|
||
https://rammenale.com/for2/regit.tmp6634-1003Vbt
|
unknown
|
||
https://rammenale.com/for2/aclog.txt)
|
unknown
|
||
https://rammenale.com/for2/aclog.txtent
|
unknown
|
||
https://rammenale.com/for2/regit.tmp4$
|
unknown
|
||
https://rammenale.com/for2/regit.tmp~
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4P
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4
|
unknown
|
||
https://rammenale.com/for2/aclog.txt2
|
unknown
|
||
https://rammenale.com/for2/regit.tmplS
|
unknown
|
||
https://rammenale.com/for2/aclog.txt4h
|
unknown
|
||
https://rammenale.com/for2/regit.tmpp
|
unknown
|
||
https://rammenale.com/for2/regit.tmpq
|
unknown
|
||
https://rammenale.com/for2/aclog.txt:
|
unknown
|
||
https://rammenale.com/for2/regit.tmpk
|
unknown
|
||
https://rammenale.com/for2/aclog.txt9
|
unknown
|
||
https://rammenale.com/for2/regit.tmpl
|
unknown
|
||
https://rammenale.com/for2/regit.tmpm
|
unknown
|
||
https://rammenale.com/for2/regit.tmpBJj
|
unknown
|
||
https://rammenale.com/for2/aclog.txtF2
|
unknown
|
||
https://rammenale.com/for2/aclogDevice
|
unknown
|
||
https://rammenale.com/for2/aclog.txtC
|
unknown
|
||
https://rammenale.com/for2/regit.tmpz
|
unknown
|
||
https://rammenale.com/for2/aclog.txtA
|
unknown
|
||
https://rammenale.com/for2/regit.tmpC:
|
unknown
|
||
https://rammenale.com/for2/regit.tmpu
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rammenale.com
|
131.153.206.231
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
131.153.206.231
|
rammenale.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C42000
|
heap
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
4D19000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
D5B000
|
heap
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
7B4C000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
8F7B000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
6FE60000
|
unkown
|
page readonly
|
||
ADA000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
8BF0000
|
remote allocation
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
8FFD000
|
heap
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
8164000
|
heap
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
483B000
|
stack
|
page read and write
|
||
E07000
|
stack
|
page read and write
|
||
8105000
|
heap
|
page read and write
|
||
8F5C000
|
heap
|
page read and write
|
||
6FE86000
|
unkown
|
page execute and read and write
|
||
DDE000
|
stack
|
page read and write
|
||
5439000
|
heap
|
page read and write
|
||
CFF000
|
heap
|
page read and write
|
||
563A000
|
heap
|
page read and write
|
||
8F65000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
6BF0B000
|
unkown
|
page execute and read and write
|
||
529C000
|
stack
|
page read and write
|
||
9350000
|
remote allocation
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
35C4000
|
heap
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
729000
|
heap
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
7B02000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
8EBE000
|
stack
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
DC3000
|
stack
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
34C7000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
535B000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
4A9B000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
3305000
|
heap
|
page read and write
|
||
7E5E000
|
stack
|
page read and write
|
||
91F1000
|
heap
|
page read and write
|
||
712000
|
heap
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
6FE8E000
|
unkown
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
884C000
|
heap
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
8C2E000
|
stack
|
page read and write
|
||
35AF000
|
heap
|
page read and write
|
||
82AE000
|
stack
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
472C000
|
stack
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
8833000
|
heap
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
8FB1000
|
heap
|
page read and write
|
||
34A9000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
7B31000
|
heap
|
page read and write
|
||
7B7000
|
stack
|
page read and write
|
||
359D000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
6FE8E000
|
unkown
|
page read and write
|
||
6BEE1000
|
unkown
|
page execute and read and write
|
||
D26000
|
heap
|
page read and write
|
||
921C000
|
heap
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
738000
|
heap
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
8AF2000
|
heap
|
page read and write
|
||
8F7E000
|
heap
|
page read and write
|
||
116F000
|
heap
|
page read and write
|
||
8AA9000
|
heap
|
page read and write
|
||
938E000
|
stack
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
895F000
|
stack
|
page read and write
|
||
54FC000
|
stack
|
page read and write
|
||
95B0000
|
remote allocation
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
32A7000
|
heap
|
page read and write
|
||
8E3F000
|
stack
|
page read and write
|
||
348B000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
4ECD000
|
stack
|
page read and write
|
||
8500000
|
remote allocation
|
page read and write
|
||
8BEF000
|
stack
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
8AAE000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
863000
|
stack
|
page read and write
|
||
3496000
|
heap
|
page read and write
|
||
4D4C000
|
stack
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
C71000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
939F000
|
stack
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
8B6E000
|
stack
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
881B000
|
heap
|
page read and write
|
||
4B5D000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
4DCD000
|
stack
|
page read and write
|
||
8802000
|
heap
|
page read and write
|
||
8F96000
|
heap
|
page read and write
|
||
4D0C000
|
stack
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
930C000
|
stack
|
page read and write
|
||
7EE0000
|
remote allocation
|
page read and write
|
||
6FE8D000
|
unkown
|
page execute and write copy
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
8F62000
|
heap
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
91C2000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
484A000
|
heap
|
page read and write
|
||
8E80000
|
remote allocation
|
page read and write
|
||
913F000
|
stack
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
9350000
|
remote allocation
|
page read and write
|
||
4D5B000
|
stack
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
8500000
|
remote allocation
|
page read and write
|
||
35C7000
|
heap
|
page read and write
|
||
72D000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
C37000
|
heap
|
page read and write
|
||
34A6000
|
heap
|
page read and write
|
||
4D19000
|
heap
|
page read and write
|
||
8EFF000
|
stack
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
5652000
|
heap
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
95B0000
|
remote allocation
|
page read and write
|
||
92CB000
|
stack
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
93CF000
|
stack
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
6FE86000
|
unkown
|
page execute and read and write
|
||
C58000
|
heap
|
page read and write
|
||
8BAE000
|
stack
|
page read and write
|
||
560D000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
7AD5000
|
heap
|
page read and write
|
||
8AC4000
|
heap
|
page read and write
|
||
962F000
|
stack
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
3483000
|
heap
|
page read and write
|
||
848C000
|
stack
|
page read and write
|
||
8FC4000
|
heap
|
page read and write
|
||
6FE8D000
|
unkown
|
page execute and write copy
|
||
8863000
|
heap
|
page read and write
|
||
34DC000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
35B9000
|
heap
|
page read and write
|
||
8A7000
|
stack
|
page read and write
|
||
7EE0000
|
remote allocation
|
page read and write
|
||
6FE61000
|
unkown
|
page execute and read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
34C4000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
35A8000
|
heap
|
page read and write
|
||
7F5F000
|
stack
|
page read and write
|
||
7B3D000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
34AF000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
8128000
|
heap
|
page read and write
|
||
CFB000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
349E000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
5471000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
826F000
|
stack
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
4E8C000
|
stack
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
753000
|
heap
|
page read and write
|
||
90FE000
|
stack
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
4D3A000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
810D000
|
heap
|
page read and write
|
||
8E80000
|
remote allocation
|
page read and write
|
||
91A0000
|
heap
|
page read and write
|
||
34D5000
|
heap
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
3492000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7CCF000
|
stack
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
91DA000
|
heap
|
page read and write
|
||
B7C000
|
stack
|
page read and write
|
||
3578000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
7C8E000
|
stack
|
page read and write
|
||
935E000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
822E000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
3706000
|
heap
|
page read and write
|
||
352C000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
6FE60000
|
unkown
|
page readonly
|
||
7C0E000
|
stack
|
page read and write
|
||
6BF06000
|
unkown
|
page execute and read and write
|
||
C8B000
|
heap
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
89DF000
|
stack
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
857F000
|
stack
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
907E000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
3566000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
153000
|
stack
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
35CE000
|
heap
|
page read and write
|
||
7F1E000
|
stack
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
349A000
|
heap
|
page read and write
|
||
816B000
|
heap
|
page read and write
|
||
343A000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
4A5F000
|
stack
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
7B53000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
8FCB000
|
heap
|
page read and write
|
||
9221000
|
heap
|
page read and write
|
||
4614000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
91FC000
|
heap
|
page read and write
|
||
4B1D000
|
stack
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
6FE61000
|
unkown
|
page execute and read and write
|
||
3562000
|
heap
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
3087000
|
heap
|
page read and write
|
||
116B000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
4ADD000
|
stack
|
page read and write
|
||
6FE8B000
|
unkown
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7AE5000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
A8B000
|
heap
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
8ADF000
|
heap
|
page read and write
|
||
466C000
|
stack
|
page read and write
|
||
8A70000
|
heap
|
page read and write
|
||
885D000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
34A2000
|
heap
|
page read and write
|
||
4C1D000
|
stack
|
page read and write
|
||
8C6F000
|
stack
|
page read and write
|
||
7AEC000
|
heap
|
page read and write
|
||
C5F000
|
heap
|
page read and write
|
||
359A000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
34CB000
|
heap
|
page read and write
|
||
3253000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
8E80000
|
remote allocation
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
8C2E000
|
stack
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
545A000
|
heap
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
35CA000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
952D000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
8123000
|
heap
|
page read and write
|
||
8AF7000
|
heap
|
page read and write
|
||
8817000
|
heap
|
page read and write
|
||
AB7000
|
stack
|
page read and write
|
||
8151000
|
heap
|
page read and write
|
||
6FE8B000
|
unkown
|
page execute and read and write
|
||
4D20000
|
heap
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
54BC000
|
stack
|
page read and write
|
||
8F40000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
8DFE000
|
stack
|
page read and write
|
||
7B1D000
|
heap
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
3575000
|
heap
|
page read and write
|
||
3597000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
82EF000
|
stack
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
C9C000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
B9C000
|
stack
|
page read and write
|
||
91C0000
|
heap
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
6BF0E000
|
unkown
|
page read and write
|
||
92DE000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
CA3000
|
heap
|
page read and write
|
||
91D7000
|
heap
|
page read and write
|
||
8500000
|
remote allocation
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
4F99000
|
heap
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
3557000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
55C9000
|
heap
|
page read and write
|
||
C52000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
355B000
|
heap
|
page read and write
|
||
34FE000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
8C6F000
|
stack
|
page read and write
|
||
6BF0D000
|
unkown
|
page execute and write copy
|
||
55C0000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
4600000
|
trusted library allocation
|
page read and write
|
||
84CC000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
4D52000
|
heap
|
page read and write
|
||
7E9F000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
E1C000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
8BF0000
|
remote allocation
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
9209000
|
heap
|
page read and write
|
||
813B000
|
heap
|
page read and write
|
||
931F000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
9350000
|
remote allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
899E000
|
stack
|
page read and write
|
||
7EE0000
|
remote allocation
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
90BF000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
3297000
|
stack
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
47E4000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
8A93000
|
heap
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
4C1B000
|
stack
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
6BEE0000
|
unkown
|
page readonly
|
||
956E000
|
stack
|
page read and write
|
||
95EE000
|
stack
|
page read and write
|
||
4E34000
|
heap
|
page read and write
|
||
4FBA000
|
heap
|
page read and write
|
||
8BF0000
|
remote allocation
|
page read and write
|
||
925A000
|
heap
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
34F5000
|
heap
|
page read and write
|
||
95B0000
|
remote allocation
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
7C4F000
|
stack
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
34F2000
|
heap
|
page read and write
|
||
7B07000
|
heap
|
page read and write
|
||
55BC000
|
stack
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
35B5000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
773000
|
stack
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
A73000
|
stack
|
page read and write
|
||
8BAE000
|
stack
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
4829000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
There are 484 hidden memdumps, click here to show them.