IOC Report
Scan.api

loading gif

Files

File Path
Type
Category
Malicious
Scan.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_857268874fb81feb3bb95a5bbe71d6fa48e6822_82810a17_190f7671\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6B2.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 20 12:54:53 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA2D.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB96.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Scan.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Scan.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Scan.dll,PlugInMain
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\Scan.dll"
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\Scan.dll
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6384 -s 680

URLs

Name
IP
Malicious
http://www.aiim.org/pdfa/ns/property#
unknown
http://www.aiim.org/pdfa/ns/extension/
unknown
http://www.aiim.org/pdfa/ns/id/partconformanceAIDS_LearnMoreScan_EventGTS_PDFA1sRGBIEC
unknown
http://www.color.orgOutputIntentsSOutputConditionOutputConditionIdentifierRegistryNameFilterNDestOut
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
http://www.color.org
unknown
http://www.aiim.org/pdfa/ns/schema#
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B9A3059000
heap
page read and write
1F4EF002000
heap
page read and write
2D16000
heap
page read and write
1F4EEB9C000
heap
page read and write
1F4EEB98000
heap
page read and write
1F4EEB7E000
heap
page read and write
200F5A3F000
heap
page read and write
1B9A309D000
heap
page read and write
35F587B000
stack
page read and write
2F8BAFF000
stack
page read and write
3190000
heap
page read and write
1F598688000
heap
page read and write
1EAB3000000
heap
page read and write
60C0000
heap
page read and write
1F4EEB9C000
heap
page read and write
1F4EEB8D000
heap
page read and write
1F4EEBBE000
heap
page read and write
235A4AC0000
heap
page read and write
1F59DDA0000
trusted library allocation
page read and write
7490CCB000
stack
page read and write
235A4C82000
heap
page read and write
114E000
stack
page read and write
1F598714000
heap
page read and write
200F5A42000
heap
page read and write
2D14000
heap
page read and write
2FED4FE000
stack
page read and write
1F59E103000
heap
page read and write
1F4EEB97000
heap
page read and write
1F598726000
heap
page read and write
1F4EEB91000
heap
page read and write
20A28E10000
heap
page read and write
1F598707000
heap
page read and write
1F4EE2AF000
heap
page read and write
1ECF4E13000
heap
page read and write
1F598530000
heap
page read and write
1F59DD14000
trusted library allocation
page read and write
2DAEAFF000
stack
page read and write
1F59DE30000
remote allocation
page read and write
1F5985F0000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
B409A7E000
stack
page read and write
1F4EEB7F000
heap
page read and write
1B9A3310000
trusted library allocation
page read and write
FFA477B000
stack
page read and write
200F5A44000
heap
page read and write
1ECF4E29000
heap
page read and write
1F598560000
trusted library allocation
page read and write
2FED3FE000
stack
page read and write
36932FE000
unkown
page read and write
2A0761E0000
heap
page read and write
1F4EEB7B000
heap
page read and write
1F4EE020000
heap
page read and write
1B9A2F80000
heap
page read and write
1F59DD10000
trusted library allocation
page read and write
2F8B9FF000
stack
page read and write
2940000
heap
page read and write
1ECF4E61000
heap
page read and write
1F59DCD0000
trusted library allocation
page read and write
2FA0000
heap
page read and write
303C000
stack
page read and write
3480000
heap
page read and write
1F4EEB20000
heap
page read and write
60C3000
heap
page read and write
1B9A3F50000
trusted library allocation
page read and write
1F598613000
heap
page read and write
21990708000
heap
page read and write
200F5A62000
heap
page read and write
1F4EEB8A000
heap
page read and write
DF30BFF000
stack
page read and write
235A4C79000
heap
page read and write
33EF000
stack
page read and write
202A4B00000
heap
page read and write
1B9A3ED0000
trusted library allocation
page read and write
1EEE0690000
heap
page read and write
1F59E0F5000
heap
page read and write
1F59DE00000
trusted library allocation
page read and write
1F4EEB8A000
heap
page read and write
1F598600000
heap
page read and write
2CEA000
heap
page read and write
1F4EEB8C000
heap
page read and write
34D4C77000
stack
page read and write
4F5337F000
stack
page read and write
200F5A74000
heap
page read and write
1F4EE213000
heap
page read and write
2A0761C6000
heap
page read and write
3692E77000
stack
page read and write
1F599113000
heap
page read and write
1F59DCDE000
trusted library allocation
page read and write
1F59DE30000
trusted library allocation
page read and write
1EAB3802000
trusted library allocation
page read and write
74913FF000
stack
page read and write
3040000
trusted library allocation
page read and write
1ECF4F08000
heap
page read and write
1EEE1132000
heap
page read and write
1F59E0B5000
heap
page read and write
200F5A45000
heap
page read and write
1F4EE316000
heap
page read and write
2A0761BB000
heap
page read and write
1F4EF062000
heap
page read and write
FFA487E000
stack
page read and write
3180000
heap
page read and write
B40951B000
stack
page read and write
323E000
stack
page read and write
1F4EEB79000
heap
page read and write
1F4EEB85000
heap
page read and write
1F4EEBA0000
heap
page read and write
2718A413000
heap
page read and write
323E000
stack
page read and write
DF308FF000
stack
page read and write
2E5A000
heap
page read and write
1F4EEB91000
heap
page read and write
20A28F80000
trusted library allocation
page read and write
101B000
heap
page read and write
1F59E0FB000
heap
page read and write
200F5A57000
heap
page read and write
6DEF3000
unkown
page write copy
DF303FF000
stack
page read and write
2718A460000
heap
page read and write
202A4D1C000
heap
page read and write
1F59E0AC000
heap
page read and write
1EAB3075000
heap
page read and write
1B9A2E50000
trusted library allocation
page read and write
1F59DDA0000
trusted library allocation
page read and write
36929AE000
stack
page read and write
1F4EE1F0000
remote allocation
page read and write
200F5A49000
heap
page read and write
35F60FF000
stack
page read and write
1F4EE254000
heap
page read and write
200F5A38000
heap
page read and write
200F5A4A000
heap
page read and write
1F4EEBB5000
heap
page read and write
1F5986A8000
heap
page read and write
DF3007B000
stack
page read and write
2199065C000
heap
page read and write
21990652000
heap
page read and write
1F4EEB7A000
heap
page read and write
1BC26FD000
stack
page read and write
1B9A3030000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
90C000
stack
page read and write
2A0760D0000
heap
page read and write
200F5A2F000
heap
page read and write
35F5E7D000
stack
page read and write
1F4EEB20000
heap
page read and write
5EE7DFF000
stack
page read and write
1F4EF002000
heap
page read and write
1F59DDE0000
trusted library allocation
page read and write
30BE000
stack
page read and write
2DAE33E000
stack
page read and write
1F4EEB4B000
heap
page read and write
1F4EEB73000
heap
page read and write
2D10000
heap
page read and write
1ECF4E7F000
heap
page read and write
1F4EEBB3000
heap
page read and write
9FE000
stack
page read and write
2718A3D0000
remote allocation
page read and write
4F5327E000
stack
page read and write
202A4C58000
heap
page read and write
304F000
stack
page read and write
30B0000
heap
page read and write
2A0761D6000
heap
page read and write
1EAB2E50000
heap
page read and write
2DBE000
stack
page read and write
2F8E000
stack
page read and write
1F4EEB75000
heap
page read and write
1F59DDA0000
trusted library allocation
page read and write
200F5A13000
heap
page read and write
1ECF4E3C000
heap
page read and write
35F5EFB000
stack
page read and write
2A0761E0000
heap
page read and write
235A4C82000
heap
page read and write
202A4C3D000
heap
page read and write
34D4B7F000
stack
page read and write
1F598702000
heap
page read and write
21990702000
heap
page read and write
1F4EEB8F000
heap
page read and write
1F4EEB8A000
heap
page read and write
1F4EEB8A000
heap
page read and write
200F5B02000
heap
page read and write
21990713000
heap
page read and write
200F5A51000
heap
page read and write
1F4EEB4A000
heap
page read and write
2A0761F5000
heap
page read and write
1F4EEBA2000
heap
page read and write
1B9A3F00000
trusted library allocation
page read and write
DF3027B000
stack
page read and write
1F4EF002000
heap
page read and write
1F59868F000
heap
page read and write
1F4EEBAD000
heap
page read and write
200F5A7D000
heap
page read and write
B1B000
stack
page read and write
DF307FD000
stack
page read and write
300E000
stack
page read and write
6DF22000
unkown
page read and write
970000
trusted library allocation
page read and write
1B9A309B000
heap
page read and write
2DBA000
heap
page read and write
6DE11000
unkown
page execute read
2FECD5E000
stack
page read and write
478F000
stack
page read and write
1F4EEB85000
heap
page read and write
1F4EEB8A000
heap
page read and write
3050000
trusted library allocation
page read and write
2A0761F2000
heap
page read and write
1B9A3050000
heap
page read and write
1ECF4E5A000
heap
page read and write
369307A000
stack
page read and write
1F59DD10000
trusted library allocation
page read and write
200F5A53000
heap
page read and write
1F59DD00000
trusted library allocation
page read and write
1F59E0E8000
heap
page read and write
6DE11000
unkown
page execute read
202A4D18000
heap
page read and write
1E6F5E02000
heap
page read and write
1F598702000
heap
page read and write
1B9A3300000
heap
page read and write
1F4EEB8C000
heap
page read and write
1E6F5E51000
heap
page read and write
1B9A3309000
heap
page read and write
235A4C40000
heap
page read and write
200F5A4E000
heap
page read and write
1F4EF022000
heap
page read and write
313E000
stack
page read and write
1F4EEB71000
heap
page read and write
1E6F5E70000
heap
page read and write
1F4EEB83000
heap
page read and write
2199065F000
heap
page read and write
1F4EEB95000
heap
page read and write
7491A7A000
stack
page read and write
2C80000
heap
page read and write
1F4EEB71000
heap
page read and write
74914FB000
stack
page read and write
33AE000
stack
page read and write
2A076150000
heap
page read and write
1F4EF01A000
heap
page read and write
1F598FE0000
trusted library allocation
page read and write
1F4EEA02000
heap
page read and write
1F4EEB9D000
heap
page read and write
1B9A3CC0000
trusted library allocation
page read and write
235A4C56000
heap
page read and write
2718A400000
heap
page read and write
219904E0000
heap
page read and write
3610000
heap
page read and write
2F2E000
stack
page read and write
1F4EEB7A000
heap
page read and write
1F59E055000
heap
page read and write
1F4EEB91000
heap
page read and write
1E6F5E4A000
heap
page read and write
1EEE0844000
heap
page read and write
9D0000
heap
page read and write
1F59DCF4000
trusted library allocation
page read and write
5EE7FFF000
stack
page read and write
1F4EEB8F000
heap
page read and write
1F59869B000
heap
page read and write
1F4EEB85000
heap
page read and write
1F4EE2A9000
heap
page read and write
1F4EF018000
heap
page read and write
200F5A69000
heap
page read and write
2D04000
heap
page read and write
1F4EEB83000
heap
page read and write
1ECF4E02000
heap
page read and write
1ECF4E7E000
heap
page read and write
1E6F5E3F000
heap
page read and write
2A0761F5000
heap
page read and write
1F4EEB7F000
heap
page read and write
FFA447C000
stack
page read and write
3440000
remote allocation
page read and write
200F6202000
trusted library allocation
page read and write
1BC2779000
stack
page read and write
B9A47FE000
stack
page read and write
1F4EEB71000
heap
page read and write
202A65C0000
trusted library allocation
page read and write
1F4EEB91000
heap
page read and write
1F59E0F7000
heap
page read and write
1E6F5D70000
trusted library allocation
page read and write
317F000
stack
page read and write
1F59E0FC000
heap
page read and write
1F4EE285000
heap
page read and write
3280000
heap
page read and write
21991002000
trusted library allocation
page read and write
1F59E0FB000
heap
page read and write
1E6F5E57000
heap
page read and write
20A29000000
heap
page read and write
1F4EE23C000
heap
page read and write
1F4EE200000
heap
page read and write
2D1A000
heap
page read and write
2DB0000
unkown
page read and write
1F4EEB9C000
heap
page read and write
1EAB3028000
heap
page read and write
2DAE2BC000
stack
page read and write
2D23000
heap
page read and write
202A6602000
trusted library allocation
page read and write
1F4EEBB3000
heap
page read and write
235A4B60000
trusted library allocation
page read and write
200F5A50000
heap
page read and write
2FCE000
stack
page read and write
1F4EEBB6000
heap
page read and write
1F4EEB79000
heap
page read and write
1E6F5F02000
heap
page read and write
202A4D02000
heap
page read and write
6DEF3000
unkown
page write copy
1EAB3013000
heap
page read and write
2718A429000
heap
page read and write
1F5986FA000
heap
page read and write
1F4EEB8A000
heap
page read and write
1F59E08D000
heap
page read and write
1F59E09A000
heap
page read and write
C10000
heap
page read and write
749197A000
stack
page read and write
1F59DDB0000
trusted library allocation
page read and write
33EF000
stack
page read and write
333A000
heap
page read and write
303C000
stack
page read and write
1EAB3002000
heap
page read and write
1010000
heap
page read and write
1F4EEBA5000
heap
page read and write
200F5A7A000
heap
page read and write
ADA000
stack
page read and write
3480000
heap
page read and write
1F5986AC000
heap
page read and write
20A2902A000
heap
page read and write
1ECF4E5B000
heap
page read and write
303E000
stack
page read and write
1F4EEB86000
heap
page read and write
1F4EE308000
heap
page read and write
369317E000
stack
page read and write
2A076530000
heap
page read and write
30E0000
heap
page read and write
1F4EEB71000
heap
page read and write
1F4EEB86000
heap
page read and write
323E000
stack
page read and write
1F598678000
heap
page read and write
2D14000
heap
page read and write
235A4C82000
heap
page read and write
20A28E20000
heap
page read and write
1F599159000
heap
page read and write
1F4EEB8A000
heap
page read and write
C3C000
stack
page read and write
35F5FFD000
stack
page read and write
1F4EEB93000
heap
page read and write
1F4EF002000
heap
page read and write
1B9A3305000
heap
page read and write
1BC234C000
stack
page read and write
1F4EE24F000
heap
page read and write
202A4C02000
heap
page read and write
200F5A40000
heap
page read and write
74912FB000
stack
page read and write
1BC27FE000
stack
page read and write
1E6F5E13000
heap
page read and write
20A2903C000
heap
page read and write
1F4EEBB5000
heap
page read and write
1F599B60000
trusted library allocation
page read and write
29EB000
stack
page read and write
1F59DBC0000
trusted library allocation
page read and write
1F5984D0000
heap
page read and write
1F5985F3000
trusted library allocation
page read and write
30E0000
heap
page read and write
B409DFD000
stack
page read and write
1F4EEBB5000
heap
page read and write
2CE0000
heap
page read and write
6DE10000
unkown
page readonly
1F59E01D000
heap
page read and write
3060000
heap
page read and write
DF309FF000
stack
page read and write
1F599002000
heap
page read and write
200F5A77000
heap
page read and write
31E0000
heap
page read and write
20A29070000
heap
page read and write
1F4EEB92000
heap
page read and write
1F4EEB79000
heap
page read and write
30EA000
heap
page read and write
1EEE1002000
heap
page read and write
1EAB2DE0000
heap
page read and write
307B000
stack
page read and write
1E6F6802000
trusted library allocation
page read and write
200F5A67000
heap
page read and write
1F598676000
heap
page read and write
2A076535000
heap
page read and write
1F59866E000
heap
page read and write
1F59DCD0000
trusted library allocation
page read and write
1F4EEB79000
heap
page read and write
6DEC8000
unkown
page readonly
202A65A0000
trusted library allocation
page read and write
21990664000
heap
page read and write
5EE83FC000
stack
page read and write
1EAB2DF0000
heap
page read and write
1F4EEB8B000
heap
page read and write
2718A402000
heap
page read and write
1F4EE2E8000
heap
page read and write
2A0761B0000
heap
page read and write
1F4EEB21000
heap
page read and write
1F4EE2C8000
heap
page read and write
219904F0000
heap
page read and write
34D4E7E000
stack
page read and write
2F8B6FB000
stack
page read and write
3330000
heap
page read and write
1EAB2F50000
trusted library allocation
page read and write
1F59DD00000
trusted library allocation
page read and write
1F4EEB9D000
heap
page read and write
29AC000
stack
page read and write
1ECF5602000
trusted library allocation
page read and write
74911FA000
stack
page read and write
1F4EE249000
heap
page read and write
1B9A309B000
heap
page read and write
1F4EEB86000
heap
page read and write
3077000
heap
page read and write
202A65F0000
remote allocation
page read and write
1F4EEBA4000
heap
page read and write
200F5A00000
heap
page read and write
DF30AFF000
stack
page read and write
2D07000
heap
page read and write
B9A4A7F000
stack
page read and write
1B9A3010000
trusted library allocation
page read and write
20A29102000
heap
page read and write
200F5A41000
heap
page read and write
1F599159000
heap
page read and write
1F4EEB00000
heap
page read and write
1F599104000
heap
page read and write
2C50000
trusted library allocation
page read and write
34D48FE000
stack
page read and write
1EAB305A000
heap
page read and write
200F5A3D000
heap
page read and write
35F62FE000
stack
page read and write
235A4B30000
heap
page read and write
1B9A3EF0000
trusted library allocation
page read and write
5EE7A7C000
stack
page read and write
21990580000
trusted library allocation
page read and write
5EE80FC000
stack
page read and write
1ECF4E00000
heap
page read and write
327F000
stack
page read and write
6DF3B000
unkown
page readonly
307B000
stack
page read and write
1B9A3EE0000
heap
page readonly
202A4C00000
heap
page read and write
1F4EEBC0000
heap
page read and write
1F4EF000000
heap
page read and write
1260000
heap
page read and write
2FED5FF000
stack
page read and write
1F4EEB91000
heap
page read and write
313F000
stack
page read and write
1E6F5E53000
heap
page read and write
1F59E000000
heap
page read and write
1F4EF022000
heap
page read and write
2DAE8F7000
stack
page read and write
1E6F5E54000
heap
page read and write
1F4EEB8C000
heap
page read and write
200F5A39000
heap
page read and write
1F59DDF0000
trusted library allocation
page read and write
200F5A83000
heap
page read and write
1F4EEB79000
heap
page read and write
200F5870000
heap
page read and write
1F4EEB9C000
heap
page read and write
3692F77000
stack
page read and write
1F4EEBB1000
heap
page read and write
2FED2FF000
stack
page read and write
1F4EEB91000
heap
page read and write
1ECF4E52000
heap
page read and write
3280000
heap
page read and write
1F4EEBAD000
heap
page read and write
2A0761F5000
heap
page read and write
327F000
stack
page read and write
1F59DE10000
trusted library allocation
page read and write
4F5307F000
stack
page read and write
235A4C29000
heap
page read and write
33AE000
stack
page read and write
1F4EEB8D000
heap
page read and write
6DEF2000
unkown
page read and write
1F4EEB66000
heap
page read and write
2D20000
heap
page read and write
20A29802000
trusted library allocation
page read and write
21990700000
heap
page read and write
1F4EEBAD000
heap
page read and write
1EEE0864000
heap
page read and write
2B90000
trusted library allocation
page read and write
1F59E049000
heap
page read and write
2CFB000
stack
page read and write
235A5602000
trusted library allocation
page read and write
B4099FE000
stack
page read and write
2EEE000
stack
page read and write
1F5996E0000
trusted library allocation
page read and write
1F4EE2F8000
heap
page read and write
1F4EE24E000
heap
page read and write
6DE11000
unkown
page execute read
1F4EEB8A000
heap
page read and write
235A4C13000
heap
page read and write
30C0000
trusted library allocation
page read and write
33AE000
stack
page read and write
1ECF4E8A000
heap
page read and write
2199063C000
heap
page read and write
307A000
heap
page read and write
1F59E09C000
heap
page read and write
6DEF2000
unkown
page read and write
6DF22000
unkown
page read and write
20A2904D000
heap
page read and write
1F4EE271000
heap
page read and write
1F4EE010000
heap
page read and write
1F4EEB9E000
heap
page read and write
2FECDDF000
stack
page read and write
6DEF3000
unkown
page write copy
21990550000
heap
page read and write
2A0761D5000
heap
page read and write
2CBC000
stack
page read and write
1F5986A6000
heap
page read and write
235A4D13000
heap
page read and write
1EEE0700000
heap
page read and write
235A4D00000
heap
page read and write
8A0000
heap
page read and write
1F59DCF1000
trusted library allocation
page read and write
2199066E000
heap
page read and write
1ECF4C30000
heap
page read and write
202A4C89000
heap
page read and write
35F5D7C000
stack
page read and write
1EEE08B9000
heap
page read and write
2718A502000
heap
page read and write
2F8B3CE000
stack
page read and write
2F60000
heap
page read and write
6DEC8000
unkown
page readonly
1F4EE229000
heap
page read and write
B409C7D000
stack
page read and write
FFE000
stack
page read and write
1F598657000
heap
page read and write
35F5A7B000
stack
page read and write
20A29113000
heap
page read and write
200F5A75000
heap
page read and write
200F5A30000
heap
page read and write
2A0761F3000
heap
page read and write
1F598629000
heap
page read and write
1F4EE302000
heap
page read and write
B9A4BFE000
stack
page read and write
1F4EE2EB000
heap
page read and write
1ECF4F00000
heap
page read and write
1F4EEB94000
heap
page read and write
1F598655000
heap
page read and write
1F4EF018000
heap
page read and write
1F4EEB7E000
heap
page read and write
1F4EEB79000
heap
page read and write
200F5A4F000
heap
page read and write
7491C7F000
stack
page read and write
1EAB3113000
heap
page read and write
200F5A02000
heap
page read and write
1F59869B000
heap
page read and write
202A4C58000
heap
page read and write
1F4EE2C2000
heap
page read and write
2718A45C000
heap
page read and write
EF0000
heap
page read and write
1E6F5D90000
remote allocation
page read and write
202A4C73000
heap
page read and write
1B9A2E40000
heap
page read and write
1F4EEB7F000
heap
page read and write
1EEE06A0000
heap
page read and write
FFA497F000
stack
page read and write
3440000
remote allocation
page read and write
1F4EEB8C000
heap
page read and write
B9A4B78000
stack
page read and write
3280000
heap
page read and write
1F4EEB96000
heap
page read and write
2DAE000
stack
page read and write
1F4EEB71000
heap
page read and write
235A4C00000
heap
page read and write
B409CFF000
stack
page read and write
2718AC02000
trusted library allocation
page read and write
235A4C77000
heap
page read and write
3480000
heap
page read and write
202A4C13000
heap
page read and write
202A4C48000
heap
page read and write
200F5A32000
heap
page read and write
200F5A64000
heap
page read and write
1F4EF002000
heap
page read and write
2DB0000
heap
page read and write
1F4EF002000
heap
page read and write
327F000
stack
page read and write
1F4EE24A000
heap
page read and write
1EEE0FA0000
trusted library allocation
page read and write
2A0761F1000
heap
page read and write
35F61FC000
stack
page read and write
202A4D00000
heap
page read and write
34D45BB000
stack
page read and write
202A4C47000
heap
page read and write
1F5986FA000
heap
page read and write
20A28E80000
heap
page read and write
9BE000
stack
page read and write
1F59E062000
heap
page read and write
6DEC8000
unkown
page readonly
1EAB3068000
heap
page read and write
235A4D02000
heap
page read and write
2D00000
trusted library allocation
page read and write
1F4EE2E5000
heap
page read and write
1F4EEB1A000
heap
page read and write
202A4C48000
heap
page read and write
2A0761EF000
heap
page read and write
369327C000
stack
page read and write
5EE81FC000
stack
page read and write
6DF22000
unkown
page read and write
202A4A90000
heap
page read and write
1F59E02B000
heap
page read and write
235A4AD0000
heap
page read and write
1F4EEB79000
heap
page read and write
DF30CFF000
stack
page read and write
33EF000
stack
page read and write
2199067A000
heap
page read and write
1F4EEB53000
heap
page read and write
200F59D0000
trusted library allocation
page read and write
30E0000
heap
page read and write
1F4EEB96000
heap
page read and write
1F4EEB20000
heap
page read and write
1F4EEB8C000
heap
page read and write
1F4EEB71000
heap
page read and write
DF304FD000
stack
page read and write
1ECF4F02000
heap
page read and write
2DAE9FF000
stack
page read and write
3070000
heap
page read and write
3692D7E000
stack
page read and write
2D07000
heap
page read and write
1F4EEB79000
heap
page read and write
1ECF4C90000
heap
page read and write
1F4EE255000
heap
page read and write
1F598FD0000
trusted library allocation
page read and write
1F599100000
heap
page read and write
21990629000
heap
page read and write
1F4EE1F0000
remote allocation
page read and write
1F4EEB9C000
heap
page read and write
ECF000
stack
page read and write
1F59E0ED000
heap
page read and write
1F599118000
heap
page read and write
1F599000000
heap
page read and write
4D00000
trusted library allocation
page read and write
2D2B000
heap
page read and write
235A4C63000
heap
page read and write
202A6840000
trusted library allocation
page read and write
2A0761BD000
heap
page read and write
1F4EEB7D000
heap
page read and write
4F52E7E000
stack
page read and write
34D4D7E000
stack
page read and write
1F4EEB8A000
heap
page read and write
1ECF4C20000
heap
page read and write
124E000
stack
page read and write
1F59E0A9000
heap
page read and write
200F5A4D000
heap
page read and write
1F4EEB8A000
heap
page read and write
20A29108000
heap
page read and write
1E6F5D90000
remote allocation
page read and write
1F4EE1F0000
remote allocation
page read and write
2718A2A0000
heap
page read and write
235A4C02000
heap
page read and write
1B9A3061000
heap
page read and write
1F59DE30000
remote allocation
page read and write
1F4EEB8A000
heap
page read and write
2199065A000
heap
page read and write
1F59DCF0000
trusted library allocation
page read and write
1F4EE180000
trusted library allocation
page read and write
1F4EEB79000
heap
page read and write
34D487E000
stack
page read and write
202A4AA0000
heap
page read and write
1EEE0913000
heap
page read and write
2F8B34E000
stack
page read and write
1F4EEB79000
heap
page read and write
1F59DF20000
trusted library allocation
page read and write
1EEE0813000
heap
page read and write
6190000
trusted library allocation
page read and write
1B9A3094000
heap
page read and write
1EAB303D000
heap
page read and write
1E6F5CD0000
heap
page read and write
30C0000
trusted library allocation
page read and write
2D11000
heap
page read and write
1F4EF002000
heap
page read and write
1F59E0FE000
heap
page read and write
1F4EE24C000
heap
page read and write
1B9A309B000
heap
page read and write
36928AB000
stack
page read and write
B4098FC000
stack
page read and write
34D49FB000
stack
page read and write
1F59DCD8000
trusted library allocation
page read and write
A70000
heap
page read and write
303C000
stack
page read and write
1F59E100000
heap
page read and write
1F4EEB93000
heap
page read and write
1E6F5E5A000
heap
page read and write
1F598673000
heap
page read and write
1F59863F000
heap
page read and write
1F4EEBD9000
heap
page read and write
1F4EEB8B000
heap
page read and write
200F5A63000
heap
page read and write
1EEE0886000
heap
page read and write
5EE7EFF000
stack
page read and write
1E6F5E29000
heap
page read and write
4F52BFB000
stack
page read and write
1F4EEB75000
heap
page read and write
1EEE086E000
heap
page read and write
1F599118000
heap
page read and write
1EEE1100000
heap
page read and write
21990613000
heap
page read and write
6DEF2000
unkown
page read and write
1F4EEB93000
heap
page read and write
200F5A46000
heap
page read and write
4F52EFE000
stack
page read and write
2718A3D0000
remote allocation
page read and write
200F5A29000
heap
page read and write
2A0761C1000
heap
page read and write
1ECF4E67000
heap
page read and write
369292E000
stack
page read and write
21990684000
heap
page read and write
1F4EEB20000
heap
page read and write
30EA000
heap
page read and write
B9A4C7C000
stack
page read and write
2FECCDB000
stack
page read and write
34D4AFB000
stack
page read and write
1F59E0E6000
heap
page read and write
1F4EE257000
heap
page read and write
1E6F5D40000
heap
page read and write
1F4EEB71000
heap
page read and write
2718A3D0000
remote allocation
page read and write
1F4EEB9E000
heap
page read and write
2A0761D2000
heap
page read and write
1BC28FF000
stack
page read and write
20A29082000
heap
page read and write
2A076130000
heap
page read and write
200F5A4B000
heap
page read and write
20A29100000
heap
page read and write
2FED0FD000
stack
page read and write
1B9A2FA0000
heap
page read and write
6DF3B000
unkown
page readonly
1F4EEB97000
heap
page read and write
1F4EE2B3000
heap
page read and write
1F4EF002000
heap
page read and write
2DAE3BD000
stack
page read and write
1F4EEB8B000
heap
page read and write
200F5A66000
heap
page read and write
200F5A7B000
heap
page read and write
202A6800000
trusted library allocation
page read and write
20A29053000
heap
page read and write
1E6F5CE0000
heap
page read and write
30FE000
stack
page read and write
2718A3A0000
trusted library allocation
page read and write
1F4EEBC3000
heap
page read and write
1F4EE2D8000
heap
page read and write
4F5317E000
stack
page read and write
B9A477A000
stack
page read and write
2A0761D4000
heap
page read and write
30EA000
heap
page read and write
2D10000
heap
page read and write
FFA4A7F000
stack
page read and write
1F4EE080000
heap
page read and write
202A65F0000
remote allocation
page read and write
2D0C000
heap
page read and write
1F5986AC000
heap
page read and write
1F59DE20000
trusted library allocation
page read and write
6DE10000
unkown
page readonly
4930000
trusted library allocation
page read and write
2F8B7FB000
stack
page read and write
2DFF000
stack
page read and write
B9A4AFE000
stack
page read and write
1F4EEB71000
heap
page read and write
307B000
stack
page read and write
20A29013000
heap
page read and write
1F59DF40000
trusted library allocation
page read and write
2718A43E000
heap
page read and write
200F5A47000
heap
page read and write
1B9A3020000
trusted library allocation
page read and write
1EEE0800000
heap
page read and write
1F598698000
heap
page read and write
1F4EEB8F000
heap
page read and write
1F59DBB0000
trusted library allocation
page read and write
200F58D0000
heap
page read and write
1EAB3102000
heap
page read and write
20A29078000
heap
page read and write
1F4EEB74000
heap
page read and write
1E6F5E00000
heap
page read and write
202A4C61000
heap
page read and write
2F8B8F7000
stack
page read and write
1E6F5D90000
remote allocation
page read and write
1F4EE2EA000
heap
page read and write
2FED1FA000
stack
page read and write
2F8B2CC000
stack
page read and write
1F4EEB8A000
heap
page read and write
1ECF4D90000
trusted library allocation
page read and write
1F4EEB95000
heap
page read and write
1F59868A000
heap
page read and write
1F4EEB18000
heap
page read and write
2DB0000
heap
page read and write
1F4EE313000
heap
page read and write
2D0B000
heap
page read and write
35F5CFE000
stack
page read and write
CFC000
stack
page read and write
1EEE0902000
heap
page read and write
1F4EEB46000
heap
page read and write
DF306FF000
stack
page read and write
1ECF4E7E000
heap
page read and write
2DB0000
unkown
page read and write
2D40000
trusted library allocation
page read and write
2DAE7FB000
stack
page read and write
1F4EEB7B000
heap
page read and write
1F599015000
heap
page read and write
2718A230000
heap
page read and write
2A0761C6000
heap
page read and write
1BC2879000
stack
page read and write
1F4EEB85000
heap
page read and write
74910F7000
stack
page read and write
2CBB000
stack
page read and write
35F5BFE000
stack
page read and write
6DE10000
unkown
page readonly
21990600000
heap
page read and write
1F4EE252000
heap
page read and write
2E50000
heap
page read and write
1F59E0F9000
heap
page read and write
2A0761F5000
heap
page read and write
1EEE0829000
heap
page read and write
1ECF4E2C000
heap
page read and write
1F4EEB20000
heap
page read and write
200F5860000
heap
page read and write
2718A240000
heap
page read and write
1F4EEB79000
heap
page read and write
1F5984C0000
heap
page read and write
202A4D13000
heap
page read and write
202A4C24000
heap
page read and write
1F4EF003000
heap
page read and write
1F4EE2A2000
heap
page read and write
1F59E03C000
heap
page read and write
4D00000
heap
page read and write
1EEE08CA000
heap
page read and write
1ECF4F13000
heap
page read and write
202A4C57000
heap
page read and write
6DF3B000
unkown
page readonly
202A65F0000
remote allocation
page read and write
21990677000
heap
page read and write
1F4EEBA2000
heap
page read and write
1F59DE30000
remote allocation
page read and write
1F4EEB8A000
heap
page read and write
2D14000
heap
page read and write
4D00000
trusted library allocation
page read and write
1EEE08C1000
heap
page read and write
1F599102000
heap
page read and write
2A0761E0000
heap
page read and write
1F4EEB71000
heap
page read and write
There are 823 hidden memdumps, click here to show them.