Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fil_41295953bbcbb6c049bf78baaa48b958e26b4df_d75f6fa5_70893c81-26e0-49bf-b072-f56d5596ff66\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fil_41295953bbcbb6c049bf78baaa48b958e26b4df_d75f6fa5_aa9297c9-4bb3-4dd6-90b8-f5b8ad05b9a0\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fil_65e4b14aae1adf98ac97cac7affb5dbf3d4bee80_d75f6fa5_24b3bb7f-f7de-4dd9-aa14-369834d33aef\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER474C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:19 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER476B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:19 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER47CA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER47FA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4848.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4888.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER52D5.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:22 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5382.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53A2.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\file.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6768 -s 356
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6728 -s 356
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetName
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6036 -s 528
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetName
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nOpen
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortType
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortName
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortCount
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetControls
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetIntValue
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetFloatValue
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetIntValue
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetFloatValue
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nClose
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nNewPortMixerInfo
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nGetNumDevices
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsSigned8
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsBigEndian
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetLibraryForFeature
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetExtraLibraries
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendShortMessage
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendLongMessage
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nOpen
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nGetTimeStamp
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nClose
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVersion
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVendor
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
171.39.242.20.in-addr.arpa
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
OriginalFileName
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
AppxPackageFullName
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
\REGISTRY\A\{6749afcd-d028-7303-9689-2cdb3ba20321}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Usn
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6AF3C7F000
|
stack
|
page read and write
|
||
245B70C0000
|
heap
|
page read and write
|
||
258E5400000
|
heap
|
page read and write
|
||
312DB6F000
|
stack
|
page read and write
|
||
202DD30F000
|
heap
|
page read and write
|
||
2B641F00000
|
heap
|
page read and write
|
||
180C9B55000
|
heap
|
page read and write
|
||
1C31CF08000
|
heap
|
page read and write
|
||
245B6FE5000
|
heap
|
page read and write
|
||
17E5E458000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2385D650000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
258E5320000
|
heap
|
page read and write
|
||
18BDEF50000
|
heap
|
page read and write
|
||
97152FF000
|
stack
|
page read and write
|
||
180C9D10000
|
trusted library allocation
|
page read and write
|
||
1976C430000
|
heap
|
page read and write
|
||
231F4C90000
|
heap
|
page read and write
|
||
2B641E70000
|
remote allocation
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
1DFA5690000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
1B660FF000
|
stack
|
page read and write
|
||
1E3A42F5000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
180C9DA0000
|
heap
|
page read and write
|
||
DD828FF000
|
stack
|
page read and write
|
||
F584E7F000
|
stack
|
page read and write
|
||
231F4F30000
|
heap
|
page read and write
|
||
1DFA58A0000
|
heap
|
page read and write
|
||
245B70C0000
|
heap
|
page read and write
|
||
29D5C7A0000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
2051AC10000
|
heap
|
page read and write
|
||
29D5C810000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
231F4CF4000
|
heap
|
page read and write
|
||
245B8E20000
|
trusted library allocation
|
page read and write
|
||
2B640490000
|
trusted library allocation
|
page read and write
|
||
1E3A43A0000
|
trusted library allocation
|
page read and write
|
||
24D26900000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
1F40E350000
|
heap
|
page read and write
|
||
186B15C000
|
stack
|
page read and write
|
||
2009DA20000
|
heap
|
page read and write
|
||
29D5C730000
|
heap
|
page read and write
|
||
155C6FB0000
|
heap
|
page read and write
|
||
2051C650000
|
remote allocation
|
page read and write
|
||
1FD11BF0000
|
heap
|
page read and write
|
||
4A9007F000
|
stack
|
page read and write
|
||
231F4CFF000
|
heap
|
page read and write
|
||
171CCFF000
|
stack
|
page read and write
|
||
24D24ED1000
|
heap
|
page read and write
|
||
1F40E40E000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
10CD4C10000
|
heap
|
page read and write
|
||
205D9615000
|
heap
|
page read and write
|
||
15005430000
|
heap
|
page read and write
|
||
1FA19800000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
AF9B4FF000
|
stack
|
page read and write
|
||
1FD11A80000
|
heap
|
page read and write
|
||
24B2E020000
|
heap
|
page read and write
|
||
1C31D0D5000
|
heap
|
page read and write
|
||
18BDED70000
|
heap
|
page read and write
|
||
E4A01CC000
|
stack
|
page read and write
|
||
7BCBECC000
|
stack
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
1976C700000
|
remote allocation
|
page read and write
|
||
12C67830000
|
heap
|
page read and write
|
||
2B640513000
|
heap
|
page read and write
|
||
180C9A90000
|
heap
|
page read and write
|
||
1FA19AE0000
|
heap
|
page read and write
|
||
4A900FF000
|
stack
|
page read and write
|
||
12C677F0000
|
heap
|
page read and write
|
||
187FE7F000
|
stack
|
page read and write
|
||
1AF991C0000
|
heap
|
page read and write
|
||
1FD11C10000
|
heap
|
page read and write
|
||
1DFA5780000
|
heap
|
page read and write
|
||
1976E160000
|
heap
|
page read and write
|
||
231F4C98000
|
heap
|
page read and write
|
||
312DAEC000
|
stack
|
page read and write
|
||
24B2C480000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
1AF99570000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
1C31CEB0000
|
heap
|
page read and write
|
||
23E0A890000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
38A87F000
|
stack
|
page read and write
|
||
180C9A80000
|
heap
|
page read and write
|
||
4DDDFCF000
|
stack
|
page read and write
|
||
312DE7F000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1476BAC000
|
stack
|
page read and write
|
||
231F6590000
|
remote allocation
|
page read and write
|
||
8B6DE7F000
|
stack
|
page read and write
|
||
1AFC7F000
|
stack
|
page read and write
|
||
220355C000
|
stack
|
page read and write
|
||
E07F16C000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
2385D670000
|
heap
|
page read and write
|
||
E07F47F000
|
stack
|
page read and write
|
||
155C5655000
|
heap
|
page read and write
|
||
4DDE2FE000
|
stack
|
page read and write
|
||
971527C000
|
stack
|
page read and write
|
||
258E5420000
|
heap
|
page read and write
|
||
1976C530000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
24B2C4B0000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2B640514000
|
heap
|
page read and write
|
||
245B70C0000
|
heap
|
page read and write
|
||
10CD48E0000
|
heap
|
page read and write
|
||
180C9B60000
|
heap
|
page read and write
|
||
1FA198F0000
|
heap
|
page read and write
|
||
401E87E000
|
stack
|
page read and write
|
||
1DFA5880000
|
heap
|
page read and write
|
||
202DD305000
|
heap
|
page read and write
|
||
18BDEBE0000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
7BCBFCF000
|
stack
|
page read and write
|
||
2009DA10000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
4C69D8F000
|
stack
|
page read and write
|
||
1476E7F000
|
stack
|
page read and write
|
||
4C69D0F000
|
stack
|
page read and write
|
||
24B2C550000
|
heap
|
page read and write
|
||
245B6FA0000
|
heap
|
page read and write
|
||
24B2C490000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2385D6E0000
|
heap
|
page read and write
|
||
2A255FF000
|
stack
|
page read and write
|
||
24B2C558000
|
heap
|
page read and write
|
||
180C9DA5000
|
heap
|
page read and write
|
||
1F97DCC0000
|
heap
|
page read and write
|
||
2A254FE000
|
stack
|
page read and write
|
||
DD8287F000
|
stack
|
page read and write
|
||
18BDEE80000
|
remote allocation
|
page read and write
|
||
38A51E000
|
stack
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
205D9390000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
155C53D0000
|
heap
|
page read and write
|
||
1A6CB4E000
|
stack
|
page read and write
|
||
1AFCFF000
|
stack
|
page read and write
|
||
2051AC80000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
1DFA5A90000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2009DCB0000
|
remote allocation
|
page read and write
|
||
12C67710000
|
heap
|
page read and write
|
||
AD69A7F000
|
stack
|
page read and write
|
||
2B6403F0000
|
heap
|
page read and write
|
||
245B6FE0000
|
heap
|
page read and write
|
||
186B4FF000
|
stack
|
page read and write
|
||
23E08E20000
|
heap
|
page read and write
|
||
29D5C7AF000
|
heap
|
page read and write
|
||
29D5CAC5000
|
heap
|
page read and write
|
||
24D25035000
|
heap
|
page read and write
|
||
205D9398000
|
heap
|
page read and write
|
||
1B6607F000
|
stack
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
1E3A42F5000
|
heap
|
page read and write
|
||
12C678D8000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
231F4BF0000
|
heap
|
page read and write
|
||
29D5CAB0000
|
trusted library allocation
|
page read and write
|
||
DD824CC000
|
stack
|
page read and write
|
||
1E3A41F0000
|
heap
|
page read and write
|
||
4DDE27F000
|
stack
|
page read and write
|
||
1C31D070000
|
remote allocation
|
page read and write
|
||
205D9370000
|
heap
|
page read and write
|
||
155C5650000
|
heap
|
page read and write
|
||
AD6979F000
|
stack
|
page read and write
|
||
7BCBF4E000
|
stack
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
E4A057F000
|
stack
|
page read and write
|
||
10CD48F0000
|
heap
|
page read and write
|
||
F584A8C000
|
stack
|
page read and write
|
||
17E5E450000
|
heap
|
page read and write
|
||
171CDFF000
|
stack
|
page read and write
|
||
231F4C10000
|
heap
|
page read and write
|
||
245B70B8000
|
heap
|
page read and write
|
||
C40FFFC000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
C4102FE000
|
stack
|
page read and write
|
||
6AF3CFE000
|
stack
|
page read and write
|
||
2B6404A8000
|
heap
|
page read and write
|
||
12C67835000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
23E08DF0000
|
heap
|
page read and write
|
||
DD8254F000
|
stack
|
page read and write
|
||
5DD2D9C000
|
stack
|
page read and write
|
||
1C31CDD0000
|
heap
|
page read and write
|
||
2B640450000
|
heap
|
page read and write
|
||
12C678D0000
|
heap
|
page read and write
|
||
1DFA7180000
|
heap
|
page read and write
|
||
2051AF25000
|
heap
|
page read and write
|
||
2051AB10000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
8B6DEFF000
|
stack
|
page read and write
|
||
180C9B55000
|
heap
|
page read and write
|
||
1FD11880000
|
heap
|
page read and write
|
||
180C9B61000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
24D24ED2000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
FF79D6F000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1F40E3F0000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
1F97F810000
|
heap
|
page read and write
|
||
24D24E68000
|
heap
|
page read and write
|
||
202DD2A0000
|
heap
|
page read and write
|
||
1976C5F0000
|
heap
|
page read and write
|
||
187FAAC000
|
stack
|
page read and write
|
||
2B64050A000
|
heap
|
page read and write
|
||
245B7040000
|
heap
|
page read and write
|
||
202DD205000
|
heap
|
page read and write
|
||
1AF99140000
|
heap
|
page read and write
|
||
18BDECC0000
|
heap
|
page read and write
|
||
10CD4B90000
|
remote allocation
|
page read and write
|
||
1F97DDF8000
|
heap
|
page read and write
|
||
29D5C804000
|
heap
|
page read and write
|
||
4A8FD3C000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1E3A4110000
|
heap
|
page read and write
|
||
1DFA5788000
|
heap
|
page read and write
|
||
245B7058000
|
heap
|
page read and write
|
||
10CD4AE0000
|
heap
|
page read and write
|
||
29D5C7A8000
|
heap
|
page read and write
|
||
1FD11C15000
|
heap
|
page read and write
|
||
1E3A42FF000
|
heap
|
page read and write
|
||
312DBEE000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
186B47F000
|
stack
|
page read and write
|
||
258E5218000
|
heap
|
page read and write
|
||
1F97DFC0000
|
heap
|
page read and write
|
||
2B640455000
|
heap
|
page read and write
|
||
171CC7C000
|
stack
|
page read and write
|
||
8B6DBAC000
|
stack
|
page read and write
|
||
1FD11960000
|
heap
|
page read and write
|
||
2051ABF0000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
82B708C000
|
stack
|
page read and write
|
||
1E3A43D0000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
245B70C1000
|
heap
|
page read and write
|
||
245B70C0000
|
heap
|
page read and write
|
||
2B6402F0000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
5DD317F000
|
stack
|
page read and write
|
||
15003AA5000
|
heap
|
page read and write
|
||
4DDDF4C000
|
stack
|
page read and write
|
||
18BDECE0000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
145E54E8000
|
heap
|
page read and write
|
||
205D9520000
|
heap
|
page read and write
|
||
1FD11A60000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
23E08DE0000
|
heap
|
page read and write
|
||
145E54E0000
|
heap
|
page read and write
|
||
202DD30F000
|
heap
|
page read and write
|
||
1E3A44A5000
|
heap
|
page read and write
|
||
401E8FF000
|
stack
|
page read and write
|
||
4C69C8C000
|
stack
|
page read and write
|
||
82B718E000
|
stack
|
page read and write
|
||
18BDEF55000
|
heap
|
page read and write
|
||
17E5E400000
|
heap
|
page read and write
|
||
202DD1E0000
|
heap
|
page read and write
|
||
155C5458000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
23E08FF0000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
231F6630000
|
heap
|
page read and write
|
||
1AF9FF000
|
stack
|
page read and write
|
||
180C9B60000
|
heap
|
page read and write
|
||
29D5C809000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
1FA19720000
|
heap
|
page read and write
|
||
1F40E370000
|
heap
|
page read and write
|
||
AF9B1CC000
|
stack
|
page read and write
|
||
1F97DDC0000
|
heap
|
page read and write
|
||
1476EFE000
|
stack
|
page read and write
|
||
1FA198F8000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
2B6403D0000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
2385D758000
|
heap
|
page read and write
|
||
231F4CFF000
|
heap
|
page read and write
|
||
971537E000
|
stack
|
page read and write
|
||
1E3A42FF000
|
heap
|
page read and write
|
||
17E5E320000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
82B747F000
|
stack
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
18BE08B0000
|
heap
|
page read and write
|
||
1FD11968000
|
heap
|
page read and write
|
||
202DD210000
|
heap
|
page read and write
|
||
23E09060000
|
heap
|
page read and write
|
||
1FA198D0000
|
remote allocation
|
page read and write
|
||
1AF99150000
|
heap
|
page read and write
|
||
4A8FDBF000
|
stack
|
page read and write
|
||
2009DA40000
|
heap
|
page read and write
|
||
2385D955000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
FF79DEF000
|
stack
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
2009DAE8000
|
heap
|
page read and write
|
||
AD6971C000
|
stack
|
page read and write
|
||
1FA19AE5000
|
heap
|
page read and write
|
||
38A59F000
|
stack
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
82B710F000
|
stack
|
page read and write
|
||
180C9AF8000
|
heap
|
page read and write
|
||
231F6550000
|
trusted library allocation
|
page read and write
|
||
1FD133D0000
|
remote allocation
|
page read and write
|
||
1F97DDF0000
|
heap
|
page read and write
|
||
180C9B60000
|
heap
|
page read and write
|
||
17E5E420000
|
heap
|
page read and write
|
||
1976C5C0000
|
trusted library allocation
|
page read and write
|
||
1E3A4298000
|
heap
|
page read and write
|
||
1AF99575000
|
heap
|
page read and write
|
||
1F40FE20000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
1C31D080000
|
heap
|
page read and write
|
||
2B640513000
|
heap
|
page read and write
|
||
155C5450000
|
heap
|
page read and write
|
||
5DD30FE000
|
stack
|
page read and write
|
||
205D9610000
|
heap
|
page read and write
|
||
24D24E60000
|
heap
|
page read and write
|
||
205D9510000
|
remote allocation
|
page read and write
|
||
1E3A4210000
|
heap
|
page read and write
|
||
23D437E000
|
stack
|
page read and write
|
||
17E5E615000
|
heap
|
page read and write
|
||
1976C5F8000
|
heap
|
page read and write
|
||
24D24CC0000
|
heap
|
page read and write
|
||
245B7050000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
FF7A07F000
|
stack
|
page read and write
|
||
245B6F80000
|
heap
|
page read and write
|
||
2009DD30000
|
heap
|
page read and write
|
||
23E09065000
|
heap
|
page read and write
|
||
150036E0000
|
heap
|
page read and write
|
||
2009DAE0000
|
heap
|
page read and write
|
||
245B70B5000
|
heap
|
page read and write
|
||
202DD200000
|
heap
|
page read and write
|
||
15003AA0000
|
heap
|
page read and write
|
||
E07F1EF000
|
stack
|
page read and write
|
||
24D24DA0000
|
heap
|
page read and write
|
||
29D5C810000
|
heap
|
page read and write
|
||
1976C7D0000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
202DD2A8000
|
heap
|
page read and write
|
||
23D3FEC000
|
stack
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
231F4B10000
|
heap
|
page read and write
|
||
97153FF000
|
stack
|
page read and write
|
||
1476F7F000
|
stack
|
page read and write
|
||
12C67810000
|
heap
|
page read and write
|
||
15003820000
|
heap
|
page read and write
|
||
258E5500000
|
heap
|
page read and write
|
||
258E5210000
|
heap
|
page read and write
|
||
145E55E0000
|
heap
|
page read and write
|
||
22038FF000
|
stack
|
page read and write
|
||
1A6CE7E000
|
stack
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
145E57A5000
|
heap
|
page read and write
|
||
245B6EA0000
|
heap
|
page read and write
|
||
24D24DC0000
|
heap
|
page read and write
|
||
155C6E10000
|
remote allocation
|
page read and write
|
||
205D9270000
|
heap
|
page read and write
|
||
24D24EC6000
|
heap
|
page read and write
|
||
220387F000
|
stack
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
5DD307F000
|
stack
|
page read and write
|
||
1AF9AD80000
|
heap
|
page read and write
|
||
8B6DF7F000
|
stack
|
page read and write
|
||
150037E0000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
1976C65E000
|
heap
|
page read and write
|
||
202DD305000
|
heap
|
page read and write
|
||
145E56B0000
|
heap
|
page read and write
|
||
145E57A0000
|
heap
|
page read and write
|
||
17E5FF70000
|
heap
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
DD825CE000
|
stack
|
page read and write
|
||
2A2547C000
|
stack
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
29D5C760000
|
heap
|
page read and write
|
||
180CB680000
|
heap
|
page read and write
|
||
401E5FF000
|
stack
|
page read and write
|
||
F584B8E000
|
stack
|
page read and write
|
||
1976C65E000
|
heap
|
page read and write
|
||
38A49C000
|
stack
|
page read and write
|
||
186B1DF000
|
stack
|
page read and write
|
||
E07F4FE000
|
stack
|
page read and write
|
||
1FA198A0000
|
heap
|
page read and write
|
||
24D24EC6000
|
heap
|
page read and write
|
||
7FFE148E9000
|
unkown
|
page read and write
|
||
C41037F000
|
stack
|
page read and write
|
||
245B70B5000
|
heap
|
page read and write
|
||
1C31CED0000
|
heap
|
page read and write
|
||
24D24EC9000
|
heap
|
page read and write
|
||
E4A047F000
|
stack
|
page read and write
|
||
2051AC88000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
2B640506000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
12C69250000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
17E5E610000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1E3A44A0000
|
heap
|
page read and write
|
||
2009DDC5000
|
heap
|
page read and write
|
||
29D5C810000
|
heap
|
page read and write
|
||
1C31CF00000
|
heap
|
page read and write
|
||
187FBAF000
|
stack
|
page read and write
|
||
2009DDC0000
|
heap
|
page read and write
|
||
29D5CAC0000
|
heap
|
page read and write
|
||
1F40E340000
|
heap
|
page read and write
|
||
10CD4918000
|
heap
|
page read and write
|
||
1AF99170000
|
heap
|
page read and write
|
||
10CD4910000
|
heap
|
page read and write
|
||
202DD100000
|
heap
|
page read and write
|
||
1C31D0D0000
|
heap
|
page read and write
|
||
187FB2F000
|
stack
|
page read and write
|
||
1F97DFC5000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
1F97DDA0000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2A2557F000
|
stack
|
page read and write
|
||
202DED30000
|
heap
|
page read and write
|
||
12C678C0000
|
remote allocation
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
18BDED78000
|
heap
|
page read and write
|
||
150037C0000
|
heap
|
page read and write
|
||
24B2C515000
|
heap
|
page read and write
|
||
2051AF20000
|
heap
|
page read and write
|
||
180C9B60000
|
heap
|
page read and write
|
||
10CD4C15000
|
heap
|
page read and write
|
||
22035DF000
|
stack
|
page read and write
|
||
7FFE148EA000
|
unkown
|
page readonly
|
||
10CD4B70000
|
heap
|
page read and write
|
||
1F40E400000
|
heap
|
page read and write
|
||
2385D570000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
245B705F000
|
heap
|
page read and write
|
||
1B65DDC000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1976C510000
|
heap
|
page read and write
|
||
1F40E408000
|
heap
|
page read and write
|
||
145E5600000
|
heap
|
page read and write
|
||
155C53B0000
|
heap
|
page read and write
|
||
145E53F0000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2385D750000
|
heap
|
page read and write
|
||
24D25030000
|
heap
|
page read and write
|
||
155C52D0000
|
heap
|
page read and write
|
||
24D24E50000
|
trusted library allocation
|
page read and write
|
||
15003828000
|
heap
|
page read and write
|
||
258E5560000
|
heap
|
page read and write
|
||
180C9AB0000
|
heap
|
page read and write
|
||
AF9B57F000
|
stack
|
page read and write
|
||
24D24ED1000
|
heap
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1FA19820000
|
heap
|
page read and write
|
||
FF79CEC000
|
stack
|
page read and write
|
||
202DF080000
|
trusted library allocation
|
page read and write
|
||
1F97DDFE000
|
heap
|
page read and write
|
||
258E5565000
|
heap
|
page read and write
|
||
1F40E3F5000
|
heap
|
page read and write
|
||
23E08E28000
|
heap
|
page read and write
|
||
1E3A4290000
|
heap
|
page read and write
|
||
401E57C000
|
stack
|
page read and write
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
24B2C510000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
24D24ED1000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
1DFA5A95000
|
heap
|
page read and write
|
||
1AF991C8000
|
heap
|
page read and write
|
||
1AF97C000
|
stack
|
page read and write
|
||
1A6CACC000
|
stack
|
page read and write
|
||
29D5E410000
|
heap
|
page read and write
|
||
2B64050A000
|
heap
|
page read and write
|
||
C41027E000
|
stack
|
page read and write
|
||
205D9350000
|
heap
|
page read and write
|
||
29D5C740000
|
heap
|
page read and write
|
||
7FFE148E6000
|
unkown
|
page readonly
|
||
180C9AF0000
|
heap
|
page read and write
|
||
2B6404A0000
|
heap
|
page read and write
|
||
1976C653000
|
heap
|
page read and write
|
||
231F4F35000
|
heap
|
page read and write
|
||
E4A04FE000
|
stack
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
1A6CBCF000
|
stack
|
page read and write
|
||
1976C7D5000
|
heap
|
page read and write
|
||
2051C6C0000
|
heap
|
page read and write
|
||
2385D950000
|
heap
|
page read and write
|
||
F584B0E000
|
stack
|
page read and write
|
||
4C6A07F000
|
stack
|
page read and write
|
||
AF9B47F000
|
stack
|
page read and write
|
||
2B640513000
|
heap
|
page read and write
|
||
24D24ED1000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
6AF39DC000
|
stack
|
page read and write
|
There are 508 hidden memdumps, click here to show them.