Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Scan.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_857268874fb81feb3bb95a5bbe71d6fa48e6822_82810a17_190f7671\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6B2.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Apr 20 12:54:53 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA2D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB96.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Scan.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Scan.dll,DllUnregisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Scan.dll,PlugInMain
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\Scan.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\Scan.dll
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6384 -s 680
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.aiim.org/pdfa/ns/property#
|
unknown
|
||
http://www.aiim.org/pdfa/ns/extension/
|
unknown
|
||
http://www.aiim.org/pdfa/ns/id/partconformanceAIDS_LearnMoreScan_EventGTS_PDFA1sRGBIEC
|
unknown
|
||
http://www.color.orgOutputIntentsSOutputConditionOutputConditionIdentifierRegistryNameFilterNDestOut
|
unknown
|
||
http://www.aiim.org/pdfa/ns/id/
|
unknown
|
||
http://www.color.org
|
unknown
|
||
http://www.aiim.org/pdfa/ns/schema#
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\FLAGS
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\0\win32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\HELPDIR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\FLAGS
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\0\win32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{353C4F99-870A-4DEB-81E9-FEB091883DF1}\1.0\HELPDIR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E8E1F43-522A-48B6-BB19-E8F9273095E6}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProgramId
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
FileId
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LongPathHash
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Name
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Publisher
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Version
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinFileVersion
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinaryType
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductName
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductVersion
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LinkDate
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinProductVersion
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Size
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Language
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsPeFile
|
||
\REGISTRY\A\{6c65f033-40ac-0755-3893-ea792a252b7a}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
There are 34 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B9A3059000
|
heap
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
2D16000
|
heap
|
page read and write
|
||
1F4EEB9C000
|
heap
|
page read and write
|
||
1F4EEB98000
|
heap
|
page read and write
|
||
1F4EEB7E000
|
heap
|
page read and write
|
||
200F5A3F000
|
heap
|
page read and write
|
||
1B9A309D000
|
heap
|
page read and write
|
||
35F587B000
|
stack
|
page read and write
|
||
2F8BAFF000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
1F598688000
|
heap
|
page read and write
|
||
1EAB3000000
|
heap
|
page read and write
|
||
60C0000
|
heap
|
page read and write
|
||
1F4EEB9C000
|
heap
|
page read and write
|
||
1F4EEB8D000
|
heap
|
page read and write
|
||
1F4EEBBE000
|
heap
|
page read and write
|
||
235A4AC0000
|
heap
|
page read and write
|
||
1F59DDA0000
|
trusted library allocation
|
page read and write
|
||
7490CCB000
|
stack
|
page read and write
|
||
235A4C82000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
1F598714000
|
heap
|
page read and write
|
||
200F5A42000
|
heap
|
page read and write
|
||
2D14000
|
heap
|
page read and write
|
||
2FED4FE000
|
stack
|
page read and write
|
||
1F59E103000
|
heap
|
page read and write
|
||
1F4EEB97000
|
heap
|
page read and write
|
||
1F598726000
|
heap
|
page read and write
|
||
1F4EEB91000
|
heap
|
page read and write
|
||
20A28E10000
|
heap
|
page read and write
|
||
1F598707000
|
heap
|
page read and write
|
||
1F4EE2AF000
|
heap
|
page read and write
|
||
1ECF4E13000
|
heap
|
page read and write
|
||
1F598530000
|
heap
|
page read and write
|
||
1F59DD14000
|
trusted library allocation
|
page read and write
|
||
2DAEAFF000
|
stack
|
page read and write
|
||
1F59DE30000
|
remote allocation
|
page read and write
|
||
1F5985F0000
|
trusted library allocation
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
B409A7E000
|
stack
|
page read and write
|
||
1F4EEB7F000
|
heap
|
page read and write
|
||
1B9A3310000
|
trusted library allocation
|
page read and write
|
||
FFA477B000
|
stack
|
page read and write
|
||
200F5A44000
|
heap
|
page read and write
|
||
1ECF4E29000
|
heap
|
page read and write
|
||
1F598560000
|
trusted library allocation
|
page read and write
|
||
2FED3FE000
|
stack
|
page read and write
|
||
36932FE000
|
unkown
|
page read and write
|
||
2A0761E0000
|
heap
|
page read and write
|
||
1F4EEB7B000
|
heap
|
page read and write
|
||
1F4EE020000
|
heap
|
page read and write
|
||
1B9A2F80000
|
heap
|
page read and write
|
||
1F59DD10000
|
trusted library allocation
|
page read and write
|
||
2F8B9FF000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
1ECF4E61000
|
heap
|
page read and write
|
||
1F59DCD0000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
1F4EEB20000
|
heap
|
page read and write
|
||
60C3000
|
heap
|
page read and write
|
||
1B9A3F50000
|
trusted library allocation
|
page read and write
|
||
1F598613000
|
heap
|
page read and write
|
||
21990708000
|
heap
|
page read and write
|
||
200F5A62000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
DF30BFF000
|
stack
|
page read and write
|
||
235A4C79000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
202A4B00000
|
heap
|
page read and write
|
||
1B9A3ED0000
|
trusted library allocation
|
page read and write
|
||
1EEE0690000
|
heap
|
page read and write
|
||
1F59E0F5000
|
heap
|
page read and write
|
||
1F59DE00000
|
trusted library allocation
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
1F598600000
|
heap
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
1F4EEB8C000
|
heap
|
page read and write
|
||
34D4C77000
|
stack
|
page read and write
|
||
4F5337F000
|
stack
|
page read and write
|
||
200F5A74000
|
heap
|
page read and write
|
||
1F4EE213000
|
heap
|
page read and write
|
||
2A0761C6000
|
heap
|
page read and write
|
||
3692E77000
|
stack
|
page read and write
|
||
1F599113000
|
heap
|
page read and write
|
||
1F59DCDE000
|
trusted library allocation
|
page read and write
|
||
1F59DE30000
|
trusted library allocation
|
page read and write
|
||
1EAB3802000
|
trusted library allocation
|
page read and write
|
||
74913FF000
|
stack
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
1ECF4F08000
|
heap
|
page read and write
|
||
1EEE1132000
|
heap
|
page read and write
|
||
1F59E0B5000
|
heap
|
page read and write
|
||
200F5A45000
|
heap
|
page read and write
|
||
1F4EE316000
|
heap
|
page read and write
|
||
2A0761BB000
|
heap
|
page read and write
|
||
1F4EF062000
|
heap
|
page read and write
|
||
FFA487E000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
B40951B000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
1F4EEB85000
|
heap
|
page read and write
|
||
1F4EEBA0000
|
heap
|
page read and write
|
||
2718A413000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
DF308FF000
|
stack
|
page read and write
|
||
2E5A000
|
heap
|
page read and write
|
||
1F4EEB91000
|
heap
|
page read and write
|
||
20A28F80000
|
trusted library allocation
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
1F59E0FB000
|
heap
|
page read and write
|
||
200F5A57000
|
heap
|
page read and write
|
||
6DEF3000
|
unkown
|
page write copy
|
||
DF303FF000
|
stack
|
page read and write
|
||
2718A460000
|
heap
|
page read and write
|
||
202A4D1C000
|
heap
|
page read and write
|
||
1F59E0AC000
|
heap
|
page read and write
|
||
1EAB3075000
|
heap
|
page read and write
|
||
1B9A2E50000
|
trusted library allocation
|
page read and write
|
||
1F59DDA0000
|
trusted library allocation
|
page read and write
|
||
36929AE000
|
stack
|
page read and write
|
||
1F4EE1F0000
|
remote allocation
|
page read and write
|
||
200F5A49000
|
heap
|
page read and write
|
||
35F60FF000
|
stack
|
page read and write
|
||
1F4EE254000
|
heap
|
page read and write
|
||
200F5A38000
|
heap
|
page read and write
|
||
200F5A4A000
|
heap
|
page read and write
|
||
1F4EEBB5000
|
heap
|
page read and write
|
||
1F5986A8000
|
heap
|
page read and write
|
||
DF3007B000
|
stack
|
page read and write
|
||
2199065C000
|
heap
|
page read and write
|
||
21990652000
|
heap
|
page read and write
|
||
1F4EEB7A000
|
heap
|
page read and write
|
||
1BC26FD000
|
stack
|
page read and write
|
||
1B9A3030000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
90C000
|
stack
|
page read and write
|
||
2A0760D0000
|
heap
|
page read and write
|
||
200F5A2F000
|
heap
|
page read and write
|
||
35F5E7D000
|
stack
|
page read and write
|
||
1F4EEB20000
|
heap
|
page read and write
|
||
5EE7DFF000
|
stack
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
1F59DDE0000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
2DAE33E000
|
stack
|
page read and write
|
||
1F4EEB4B000
|
heap
|
page read and write
|
||
1F4EEB73000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
1ECF4E7F000
|
heap
|
page read and write
|
||
1F4EEBB3000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
2718A3D0000
|
remote allocation
|
page read and write
|
||
4F5327E000
|
stack
|
page read and write
|
||
202A4C58000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
2A0761D6000
|
heap
|
page read and write
|
||
1EAB2E50000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
1F4EEB75000
|
heap
|
page read and write
|
||
1F59DDA0000
|
trusted library allocation
|
page read and write
|
||
200F5A13000
|
heap
|
page read and write
|
||
1ECF4E3C000
|
heap
|
page read and write
|
||
35F5EFB000
|
stack
|
page read and write
|
||
2A0761E0000
|
heap
|
page read and write
|
||
235A4C82000
|
heap
|
page read and write
|
||
202A4C3D000
|
heap
|
page read and write
|
||
34D4B7F000
|
stack
|
page read and write
|
||
1F598702000
|
heap
|
page read and write
|
||
21990702000
|
heap
|
page read and write
|
||
1F4EEB8F000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
200F5B02000
|
heap
|
page read and write
|
||
21990713000
|
heap
|
page read and write
|
||
200F5A51000
|
heap
|
page read and write
|
||
1F4EEB4A000
|
heap
|
page read and write
|
||
2A0761F5000
|
heap
|
page read and write
|
||
1F4EEBA2000
|
heap
|
page read and write
|
||
1B9A3F00000
|
trusted library allocation
|
page read and write
|
||
DF3027B000
|
stack
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
1F59868F000
|
heap
|
page read and write
|
||
1F4EEBAD000
|
heap
|
page read and write
|
||
200F5A7D000
|
heap
|
page read and write
|
||
B1B000
|
stack
|
page read and write
|
||
DF307FD000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
6DF22000
|
unkown
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
1B9A309B000
|
heap
|
page read and write
|
||
2DBA000
|
heap
|
page read and write
|
||
6DE11000
|
unkown
|
page execute read
|
||
2FECD5E000
|
stack
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
1F4EEB85000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
2A0761F2000
|
heap
|
page read and write
|
||
1B9A3050000
|
heap
|
page read and write
|
||
1ECF4E5A000
|
heap
|
page read and write
|
||
369307A000
|
stack
|
page read and write
|
||
1F59DD10000
|
trusted library allocation
|
page read and write
|
||
200F5A53000
|
heap
|
page read and write
|
||
1F59DD00000
|
trusted library allocation
|
page read and write
|
||
1F59E0E8000
|
heap
|
page read and write
|
||
6DE11000
|
unkown
|
page execute read
|
||
202A4D18000
|
heap
|
page read and write
|
||
1E6F5E02000
|
heap
|
page read and write
|
||
1F598702000
|
heap
|
page read and write
|
||
1B9A3300000
|
heap
|
page read and write
|
||
1F4EEB8C000
|
heap
|
page read and write
|
||
1E6F5E51000
|
heap
|
page read and write
|
||
1B9A3309000
|
heap
|
page read and write
|
||
235A4C40000
|
heap
|
page read and write
|
||
200F5A4E000
|
heap
|
page read and write
|
||
1F4EF022000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
1E6F5E70000
|
heap
|
page read and write
|
||
1F4EEB83000
|
heap
|
page read and write
|
||
2199065F000
|
heap
|
page read and write
|
||
1F4EEB95000
|
heap
|
page read and write
|
||
7491A7A000
|
stack
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
74914FB000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
2A076150000
|
heap
|
page read and write
|
||
1F4EF01A000
|
heap
|
page read and write
|
||
1F598FE0000
|
trusted library allocation
|
page read and write
|
||
1F4EEA02000
|
heap
|
page read and write
|
||
1F4EEB9D000
|
heap
|
page read and write
|
||
1B9A3CC0000
|
trusted library allocation
|
page read and write
|
||
235A4C56000
|
heap
|
page read and write
|
||
2718A400000
|
heap
|
page read and write
|
||
219904E0000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1F4EEB7A000
|
heap
|
page read and write
|
||
1F59E055000
|
heap
|
page read and write
|
||
1F4EEB91000
|
heap
|
page read and write
|
||
1E6F5E4A000
|
heap
|
page read and write
|
||
1EEE0844000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1F59DCF4000
|
trusted library allocation
|
page read and write
|
||
5EE7FFF000
|
stack
|
page read and write
|
||
1F4EEB8F000
|
heap
|
page read and write
|
||
1F59869B000
|
heap
|
page read and write
|
||
1F4EEB85000
|
heap
|
page read and write
|
||
1F4EE2A9000
|
heap
|
page read and write
|
||
1F4EF018000
|
heap
|
page read and write
|
||
200F5A69000
|
heap
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
1F4EEB83000
|
heap
|
page read and write
|
||
1ECF4E02000
|
heap
|
page read and write
|
||
1ECF4E7E000
|
heap
|
page read and write
|
||
1E6F5E3F000
|
heap
|
page read and write
|
||
2A0761F5000
|
heap
|
page read and write
|
||
1F4EEB7F000
|
heap
|
page read and write
|
||
FFA447C000
|
stack
|
page read and write
|
||
3440000
|
remote allocation
|
page read and write
|
||
200F6202000
|
trusted library allocation
|
page read and write
|
||
1BC2779000
|
stack
|
page read and write
|
||
B9A47FE000
|
stack
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
202A65C0000
|
trusted library allocation
|
page read and write
|
||
1F4EEB91000
|
heap
|
page read and write
|
||
1F59E0F7000
|
heap
|
page read and write
|
||
1E6F5D70000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
1F59E0FC000
|
heap
|
page read and write
|
||
1F4EE285000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
21991002000
|
trusted library allocation
|
page read and write
|
||
1F59E0FB000
|
heap
|
page read and write
|
||
1E6F5E57000
|
heap
|
page read and write
|
||
20A29000000
|
heap
|
page read and write
|
||
1F4EE23C000
|
heap
|
page read and write
|
||
1F4EE200000
|
heap
|
page read and write
|
||
2D1A000
|
heap
|
page read and write
|
||
2DB0000
|
unkown
|
page read and write
|
||
1F4EEB9C000
|
heap
|
page read and write
|
||
1EAB3028000
|
heap
|
page read and write
|
||
2DAE2BC000
|
stack
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
202A6602000
|
trusted library allocation
|
page read and write
|
||
1F4EEBB3000
|
heap
|
page read and write
|
||
235A4B60000
|
trusted library allocation
|
page read and write
|
||
200F5A50000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
1F4EEBB6000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
1E6F5F02000
|
heap
|
page read and write
|
||
202A4D02000
|
heap
|
page read and write
|
||
6DEF3000
|
unkown
|
page write copy
|
||
1EAB3013000
|
heap
|
page read and write
|
||
2718A429000
|
heap
|
page read and write
|
||
1F5986FA000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
1F59E08D000
|
heap
|
page read and write
|
||
1F59E09A000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
749197A000
|
stack
|
page read and write
|
||
1F59DDB0000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
1EAB3002000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1F4EEBA5000
|
heap
|
page read and write
|
||
200F5A7A000
|
heap
|
page read and write
|
||
ADA000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
1F5986AC000
|
heap
|
page read and write
|
||
20A2902A000
|
heap
|
page read and write
|
||
1ECF4E5B000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
1F4EEB86000
|
heap
|
page read and write
|
||
1F4EE308000
|
heap
|
page read and write
|
||
369317E000
|
stack
|
page read and write
|
||
2A076530000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
1F4EEB86000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
1F598678000
|
heap
|
page read and write
|
||
2D14000
|
heap
|
page read and write
|
||
235A4C82000
|
heap
|
page read and write
|
||
20A28E20000
|
heap
|
page read and write
|
||
1F599159000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
35F5FFD000
|
stack
|
page read and write
|
||
1F4EEB93000
|
heap
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
1B9A3305000
|
heap
|
page read and write
|
||
1BC234C000
|
stack
|
page read and write
|
||
1F4EE24F000
|
heap
|
page read and write
|
||
202A4C02000
|
heap
|
page read and write
|
||
200F5A40000
|
heap
|
page read and write
|
||
74912FB000
|
stack
|
page read and write
|
||
1BC27FE000
|
stack
|
page read and write
|
||
1E6F5E13000
|
heap
|
page read and write
|
||
20A2903C000
|
heap
|
page read and write
|
||
1F4EEBB5000
|
heap
|
page read and write
|
||
1F599B60000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
stack
|
page read and write
|
||
1F59DBC0000
|
trusted library allocation
|
page read and write
|
||
1F5984D0000
|
heap
|
page read and write
|
||
1F5985F3000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
B409DFD000
|
stack
|
page read and write
|
||
1F4EEBB5000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
6DE10000
|
unkown
|
page readonly
|
||
1F59E01D000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
DF309FF000
|
stack
|
page read and write
|
||
1F599002000
|
heap
|
page read and write
|
||
200F5A77000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
20A29070000
|
heap
|
page read and write
|
||
1F4EEB92000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
1EEE1002000
|
heap
|
page read and write
|
||
1EAB2DE0000
|
heap
|
page read and write
|
||
307B000
|
stack
|
page read and write
|
||
1E6F6802000
|
trusted library allocation
|
page read and write
|
||
200F5A67000
|
heap
|
page read and write
|
||
1F598676000
|
heap
|
page read and write
|
||
2A076535000
|
heap
|
page read and write
|
||
1F59866E000
|
heap
|
page read and write
|
||
1F59DCD0000
|
trusted library allocation
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
6DEC8000
|
unkown
|
page readonly
|
||
202A65A0000
|
trusted library allocation
|
page read and write
|
||
21990664000
|
heap
|
page read and write
|
||
5EE83FC000
|
stack
|
page read and write
|
||
1EAB2DF0000
|
heap
|
page read and write
|
||
1F4EEB8B000
|
heap
|
page read and write
|
||
2718A402000
|
heap
|
page read and write
|
||
1F4EE2E8000
|
heap
|
page read and write
|
||
2A0761B0000
|
heap
|
page read and write
|
||
1F4EEB21000
|
heap
|
page read and write
|
||
1F4EE2C8000
|
heap
|
page read and write
|
||
219904F0000
|
heap
|
page read and write
|
||
34D4E7E000
|
stack
|
page read and write
|
||
2F8B6FB000
|
stack
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
1EAB2F50000
|
trusted library allocation
|
page read and write
|
||
1F59DD00000
|
trusted library allocation
|
page read and write
|
||
1F4EEB9D000
|
heap
|
page read and write
|
||
29AC000
|
stack
|
page read and write
|
||
1ECF5602000
|
trusted library allocation
|
page read and write
|
||
74911FA000
|
stack
|
page read and write
|
||
1F4EE249000
|
heap
|
page read and write
|
||
1B9A309B000
|
heap
|
page read and write
|
||
1F4EEB86000
|
heap
|
page read and write
|
||
3077000
|
heap
|
page read and write
|
||
202A65F0000
|
remote allocation
|
page read and write
|
||
1F4EEBA4000
|
heap
|
page read and write
|
||
200F5A00000
|
heap
|
page read and write
|
||
DF30AFF000
|
stack
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
B9A4A7F000
|
stack
|
page read and write
|
||
1B9A3010000
|
trusted library allocation
|
page read and write
|
||
20A29102000
|
heap
|
page read and write
|
||
200F5A41000
|
heap
|
page read and write
|
||
1F599159000
|
heap
|
page read and write
|
||
1F4EEB00000
|
heap
|
page read and write
|
||
1F599104000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
34D48FE000
|
stack
|
page read and write
|
||
1EAB305A000
|
heap
|
page read and write
|
||
200F5A3D000
|
heap
|
page read and write
|
||
35F62FE000
|
stack
|
page read and write
|
||
235A4B30000
|
heap
|
page read and write
|
||
1B9A3EF0000
|
trusted library allocation
|
page read and write
|
||
5EE7A7C000
|
stack
|
page read and write
|
||
21990580000
|
trusted library allocation
|
page read and write
|
||
5EE80FC000
|
stack
|
page read and write
|
||
1ECF4E00000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
6DF3B000
|
unkown
|
page readonly
|
||
307B000
|
stack
|
page read and write
|
||
1B9A3EE0000
|
heap
|
page readonly
|
||
202A4C00000
|
heap
|
page read and write
|
||
1F4EEBC0000
|
heap
|
page read and write
|
||
1F4EF000000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
2FED5FF000
|
stack
|
page read and write
|
||
1F4EEB91000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
1E6F5E53000
|
heap
|
page read and write
|
||
1F59E000000
|
heap
|
page read and write
|
||
1F4EF022000
|
heap
|
page read and write
|
||
2DAE8F7000
|
stack
|
page read and write
|
||
1E6F5E54000
|
heap
|
page read and write
|
||
1F4EEB8C000
|
heap
|
page read and write
|
||
200F5A39000
|
heap
|
page read and write
|
||
1F59DDF0000
|
trusted library allocation
|
page read and write
|
||
200F5A83000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
200F5870000
|
heap
|
page read and write
|
||
1F4EEB9C000
|
heap
|
page read and write
|
||
3692F77000
|
stack
|
page read and write
|
||
1F4EEBB1000
|
heap
|
page read and write
|
||
2FED2FF000
|
stack
|
page read and write
|
||
1F4EEB91000
|
heap
|
page read and write
|
||
1ECF4E52000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
1F4EEBAD000
|
heap
|
page read and write
|
||
2A0761F5000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
1F59DE10000
|
trusted library allocation
|
page read and write
|
||
4F5307F000
|
stack
|
page read and write
|
||
235A4C29000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
1F4EEB8D000
|
heap
|
page read and write
|
||
6DEF2000
|
unkown
|
page read and write
|
||
1F4EEB66000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
20A29802000
|
trusted library allocation
|
page read and write
|
||
21990700000
|
heap
|
page read and write
|
||
1F4EEBAD000
|
heap
|
page read and write
|
||
1EEE0864000
|
heap
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
1F59E049000
|
heap
|
page read and write
|
||
2CFB000
|
stack
|
page read and write
|
||
235A5602000
|
trusted library allocation
|
page read and write
|
||
B4099FE000
|
stack
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
1F5996E0000
|
trusted library allocation
|
page read and write
|
||
1F4EE2F8000
|
heap
|
page read and write
|
||
1F4EE24E000
|
heap
|
page read and write
|
||
6DE11000
|
unkown
|
page execute read
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
235A4C13000
|
heap
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
1ECF4E8A000
|
heap
|
page read and write
|
||
2199063C000
|
heap
|
page read and write
|
||
307A000
|
heap
|
page read and write
|
||
1F59E09C000
|
heap
|
page read and write
|
||
6DEF2000
|
unkown
|
page read and write
|
||
6DF22000
|
unkown
|
page read and write
|
||
20A2904D000
|
heap
|
page read and write
|
||
1F4EE271000
|
heap
|
page read and write
|
||
1F4EE010000
|
heap
|
page read and write
|
||
1F4EEB9E000
|
heap
|
page read and write
|
||
2FECDDF000
|
stack
|
page read and write
|
||
6DEF3000
|
unkown
|
page write copy
|
||
21990550000
|
heap
|
page read and write
|
||
2A0761D5000
|
heap
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
1F5986A6000
|
heap
|
page read and write
|
||
235A4D13000
|
heap
|
page read and write
|
||
1EEE0700000
|
heap
|
page read and write
|
||
235A4D00000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1F59DCF1000
|
trusted library allocation
|
page read and write
|
||
2199066E000
|
heap
|
page read and write
|
||
1ECF4C30000
|
heap
|
page read and write
|
||
202A4C89000
|
heap
|
page read and write
|
||
35F5D7C000
|
stack
|
page read and write
|
||
1EEE08B9000
|
heap
|
page read and write
|
||
2718A502000
|
heap
|
page read and write
|
||
2F8B3CE000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
6DEC8000
|
unkown
|
page readonly
|
||
1F4EE229000
|
heap
|
page read and write
|
||
B409C7D000
|
stack
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
1F598657000
|
heap
|
page read and write
|
||
35F5A7B000
|
stack
|
page read and write
|
||
20A29113000
|
heap
|
page read and write
|
||
200F5A75000
|
heap
|
page read and write
|
||
200F5A30000
|
heap
|
page read and write
|
||
2A0761F3000
|
heap
|
page read and write
|
||
1F598629000
|
heap
|
page read and write
|
||
1F4EE302000
|
heap
|
page read and write
|
||
B9A4BFE000
|
stack
|
page read and write
|
||
1F4EE2EB000
|
heap
|
page read and write
|
||
1ECF4F00000
|
heap
|
page read and write
|
||
1F4EEB94000
|
heap
|
page read and write
|
||
1F598655000
|
heap
|
page read and write
|
||
1F4EF018000
|
heap
|
page read and write
|
||
1F4EEB7E000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
200F5A4F000
|
heap
|
page read and write
|
||
7491C7F000
|
stack
|
page read and write
|
||
1EAB3113000
|
heap
|
page read and write
|
||
200F5A02000
|
heap
|
page read and write
|
||
1F59869B000
|
heap
|
page read and write
|
||
202A4C58000
|
heap
|
page read and write
|
||
1F4EE2C2000
|
heap
|
page read and write
|
||
2718A45C000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1E6F5D90000
|
remote allocation
|
page read and write
|
||
202A4C73000
|
heap
|
page read and write
|
||
1B9A2E40000
|
heap
|
page read and write
|
||
1F4EEB7F000
|
heap
|
page read and write
|
||
1EEE06A0000
|
heap
|
page read and write
|
||
FFA497F000
|
stack
|
page read and write
|
||
3440000
|
remote allocation
|
page read and write
|
||
1F4EEB8C000
|
heap
|
page read and write
|
||
B9A4B78000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
1F4EEB96000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
235A4C00000
|
heap
|
page read and write
|
||
B409CFF000
|
stack
|
page read and write
|
||
2718AC02000
|
trusted library allocation
|
page read and write
|
||
235A4C77000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
202A4C13000
|
heap
|
page read and write
|
||
202A4C48000
|
heap
|
page read and write
|
||
200F5A32000
|
heap
|
page read and write
|
||
200F5A64000
|
heap
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
1F4EE24A000
|
heap
|
page read and write
|
||
1EEE0FA0000
|
trusted library allocation
|
page read and write
|
||
2A0761F1000
|
heap
|
page read and write
|
||
35F61FC000
|
stack
|
page read and write
|
||
202A4D00000
|
heap
|
page read and write
|
||
34D45BB000
|
stack
|
page read and write
|
||
202A4C47000
|
heap
|
page read and write
|
||
1F5986FA000
|
heap
|
page read and write
|
||
20A28E80000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
1F59E062000
|
heap
|
page read and write
|
||
6DEC8000
|
unkown
|
page readonly
|
||
1EAB3068000
|
heap
|
page read and write
|
||
235A4D02000
|
heap
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
1F4EE2E5000
|
heap
|
page read and write
|
||
1F4EEB1A000
|
heap
|
page read and write
|
||
202A4C48000
|
heap
|
page read and write
|
||
2A0761EF000
|
heap
|
page read and write
|
||
369327C000
|
stack
|
page read and write
|
||
5EE81FC000
|
stack
|
page read and write
|
||
6DF22000
|
unkown
|
page read and write
|
||
202A4A90000
|
heap
|
page read and write
|
||
1F59E02B000
|
heap
|
page read and write
|
||
235A4AD0000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
DF30CFF000
|
stack
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
2199067A000
|
heap
|
page read and write
|
||
1F4EEB53000
|
heap
|
page read and write
|
||
200F59D0000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
1F4EEB96000
|
heap
|
page read and write
|
||
1F4EEB20000
|
heap
|
page read and write
|
||
1F4EEB8C000
|
heap
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
DF304FD000
|
stack
|
page read and write
|
||
1ECF4F02000
|
heap
|
page read and write
|
||
2DAE9FF000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
3692D7E000
|
stack
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
1ECF4C90000
|
heap
|
page read and write
|
||
1F4EE255000
|
heap
|
page read and write
|
||
1F598FD0000
|
trusted library allocation
|
page read and write
|
||
1F599100000
|
heap
|
page read and write
|
||
21990629000
|
heap
|
page read and write
|
||
1F4EE1F0000
|
remote allocation
|
page read and write
|
||
1F4EEB9C000
|
heap
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
1F59E0ED000
|
heap
|
page read and write
|
||
1F599118000
|
heap
|
page read and write
|
||
1F599000000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
2D2B000
|
heap
|
page read and write
|
||
235A4C63000
|
heap
|
page read and write
|
||
202A6840000
|
trusted library allocation
|
page read and write
|
||
2A0761BD000
|
heap
|
page read and write
|
||
1F4EEB7D000
|
heap
|
page read and write
|
||
4F52E7E000
|
stack
|
page read and write
|
||
34D4D7E000
|
stack
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
1ECF4C20000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
1F59E0A9000
|
heap
|
page read and write
|
||
200F5A4D000
|
heap
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
20A29108000
|
heap
|
page read and write
|
||
1E6F5D90000
|
remote allocation
|
page read and write
|
||
1F4EE1F0000
|
remote allocation
|
page read and write
|
||
2718A2A0000
|
heap
|
page read and write
|
||
235A4C02000
|
heap
|
page read and write
|
||
1B9A3061000
|
heap
|
page read and write
|
||
1F59DE30000
|
remote allocation
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
2199065A000
|
heap
|
page read and write
|
||
1F59DCF0000
|
trusted library allocation
|
page read and write
|
||
1F4EE180000
|
trusted library allocation
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
34D487E000
|
stack
|
page read and write
|
||
202A4AA0000
|
heap
|
page read and write
|
||
1EEE0913000
|
heap
|
page read and write
|
||
2F8B34E000
|
stack
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
1F59DF20000
|
trusted library allocation
|
page read and write
|
||
1EEE0813000
|
heap
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
1B9A3094000
|
heap
|
page read and write
|
||
1EAB303D000
|
heap
|
page read and write
|
||
1E6F5CD0000
|
heap
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
2D11000
|
heap
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
1F59E0FE000
|
heap
|
page read and write
|
||
1F4EE24C000
|
heap
|
page read and write
|
||
1B9A309B000
|
heap
|
page read and write
|
||
36928AB000
|
stack
|
page read and write
|
||
B4098FC000
|
stack
|
page read and write
|
||
34D49FB000
|
stack
|
page read and write
|
||
1F59DCD8000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
1F59E100000
|
heap
|
page read and write
|
||
1F4EEB93000
|
heap
|
page read and write
|
||
1E6F5E5A000
|
heap
|
page read and write
|
||
1F598673000
|
heap
|
page read and write
|
||
1F59863F000
|
heap
|
page read and write
|
||
1F4EEBD9000
|
heap
|
page read and write
|
||
1F4EEB8B000
|
heap
|
page read and write
|
||
200F5A63000
|
heap
|
page read and write
|
||
1EEE0886000
|
heap
|
page read and write
|
||
5EE7EFF000
|
stack
|
page read and write
|
||
1E6F5E29000
|
heap
|
page read and write
|
||
4F52BFB000
|
stack
|
page read and write
|
||
1F4EEB75000
|
heap
|
page read and write
|
||
1EEE086E000
|
heap
|
page read and write
|
||
1F599118000
|
heap
|
page read and write
|
||
1EEE1100000
|
heap
|
page read and write
|
||
21990613000
|
heap
|
page read and write
|
||
6DEF2000
|
unkown
|
page read and write
|
||
1F4EEB93000
|
heap
|
page read and write
|
||
200F5A46000
|
heap
|
page read and write
|
||
4F52EFE000
|
stack
|
page read and write
|
||
2718A3D0000
|
remote allocation
|
page read and write
|
||
200F5A29000
|
heap
|
page read and write
|
||
2A0761C1000
|
heap
|
page read and write
|
||
1ECF4E67000
|
heap
|
page read and write
|
||
369292E000
|
stack
|
page read and write
|
||
21990684000
|
heap
|
page read and write
|
||
1F4EEB20000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
B9A4C7C000
|
stack
|
page read and write
|
||
2FECCDB000
|
stack
|
page read and write
|
||
34D4AFB000
|
stack
|
page read and write
|
||
1F59E0E6000
|
heap
|
page read and write
|
||
1F4EE257000
|
heap
|
page read and write
|
||
1E6F5D40000
|
heap
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
2718A3D0000
|
remote allocation
|
page read and write
|
||
1F4EEB9E000
|
heap
|
page read and write
|
||
2A0761D2000
|
heap
|
page read and write
|
||
1BC28FF000
|
stack
|
page read and write
|
||
20A29082000
|
heap
|
page read and write
|
||
2A076130000
|
heap
|
page read and write
|
||
200F5A4B000
|
heap
|
page read and write
|
||
20A29100000
|
heap
|
page read and write
|
||
2FED0FD000
|
stack
|
page read and write
|
||
1B9A2FA0000
|
heap
|
page read and write
|
||
6DF3B000
|
unkown
|
page readonly
|
||
1F4EEB97000
|
heap
|
page read and write
|
||
1F4EE2B3000
|
heap
|
page read and write
|
||
1F4EF002000
|
heap
|
page read and write
|
||
2DAE3BD000
|
stack
|
page read and write
|
||
1F4EEB8B000
|
heap
|
page read and write
|
||
200F5A66000
|
heap
|
page read and write
|
||
200F5A7B000
|
heap
|
page read and write
|
||
202A6800000
|
trusted library allocation
|
page read and write
|
||
20A29053000
|
heap
|
page read and write
|
||
1E6F5CE0000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
2718A3A0000
|
trusted library allocation
|
page read and write
|
||
1F4EEBC3000
|
heap
|
page read and write
|
||
1F4EE2D8000
|
heap
|
page read and write
|
||
4F5317E000
|
stack
|
page read and write
|
||
B9A477A000
|
stack
|
page read and write
|
||
2A0761D4000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
FFA4A7F000
|
stack
|
page read and write
|
||
1F4EE080000
|
heap
|
page read and write
|
||
202A65F0000
|
remote allocation
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
1F5986AC000
|
heap
|
page read and write
|
||
1F59DE20000
|
trusted library allocation
|
page read and write
|
||
6DE10000
|
unkown
|
page readonly
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
2F8B7FB000
|
stack
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
B9A4AFE000
|
stack
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
||
307B000
|
stack
|
page read and write
|
||
20A29013000
|
heap
|
page read and write
|
||
1F59DF40000
|
trusted library allocation
|
page read and write
|
||
2718A43E000
|
heap
|
page read and write
|
||
200F5A47000
|
heap
|
page read and write
|
||
1B9A3020000
|
trusted library allocation
|
page read and write
|
||
1EEE0800000
|
heap
|
page read and write
|
||
1F598698000
|
heap
|
page read and write
|
||
1F4EEB8F000
|
heap
|
page read and write
|
||
1F59DBB0000
|
trusted library allocation
|
page read and write
|
||
200F58D0000
|
heap
|
page read and write
|
||
1EAB3102000
|
heap
|
page read and write
|
||
20A29078000
|
heap
|
page read and write
|
||
1F4EEB74000
|
heap
|
page read and write
|
||
1E6F5E00000
|
heap
|
page read and write
|
||
202A4C61000
|
heap
|
page read and write
|
||
2F8B8F7000
|
stack
|
page read and write
|
||
1E6F5D90000
|
remote allocation
|
page read and write
|
||
1F4EE2EA000
|
heap
|
page read and write
|
||
2FED1FA000
|
stack
|
page read and write
|
||
2F8B2CC000
|
stack
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
1ECF4D90000
|
trusted library allocation
|
page read and write
|
||
1F4EEB95000
|
heap
|
page read and write
|
||
1F59868A000
|
heap
|
page read and write
|
||
1F4EEB18000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
1F4EE313000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
35F5CFE000
|
stack
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
1EEE0902000
|
heap
|
page read and write
|
||
1F4EEB46000
|
heap
|
page read and write
|
||
DF306FF000
|
stack
|
page read and write
|
||
1ECF4E7E000
|
heap
|
page read and write
|
||
2DB0000
|
unkown
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
2DAE7FB000
|
stack
|
page read and write
|
||
1F4EEB7B000
|
heap
|
page read and write
|
||
1F599015000
|
heap
|
page read and write
|
||
2718A230000
|
heap
|
page read and write
|
||
2A0761C6000
|
heap
|
page read and write
|
||
1BC2879000
|
stack
|
page read and write
|
||
1F4EEB85000
|
heap
|
page read and write
|
||
74910F7000
|
stack
|
page read and write
|
||
2CBB000
|
stack
|
page read and write
|
||
35F5BFE000
|
stack
|
page read and write
|
||
6DE10000
|
unkown
|
page readonly
|
||
21990600000
|
heap
|
page read and write
|
||
1F4EE252000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
1F59E0F9000
|
heap
|
page read and write
|
||
2A0761F5000
|
heap
|
page read and write
|
||
1EEE0829000
|
heap
|
page read and write
|
||
1ECF4E2C000
|
heap
|
page read and write
|
||
1F4EEB20000
|
heap
|
page read and write
|
||
200F5860000
|
heap
|
page read and write
|
||
2718A240000
|
heap
|
page read and write
|
||
1F4EEB79000
|
heap
|
page read and write
|
||
1F5984C0000
|
heap
|
page read and write
|
||
202A4D13000
|
heap
|
page read and write
|
||
202A4C24000
|
heap
|
page read and write
|
||
1F4EF003000
|
heap
|
page read and write
|
||
1F4EE2A2000
|
heap
|
page read and write
|
||
1F59E03C000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
1EEE08CA000
|
heap
|
page read and write
|
||
1ECF4F13000
|
heap
|
page read and write
|
||
202A4C57000
|
heap
|
page read and write
|
||
6DF3B000
|
unkown
|
page readonly
|
||
202A65F0000
|
remote allocation
|
page read and write
|
||
21990677000
|
heap
|
page read and write
|
||
1F4EEBA2000
|
heap
|
page read and write
|
||
1F59DE30000
|
remote allocation
|
page read and write
|
||
1F4EEB8A000
|
heap
|
page read and write
|
||
2D14000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
1EEE08C1000
|
heap
|
page read and write
|
||
1F599102000
|
heap
|
page read and write
|
||
2A0761E0000
|
heap
|
page read and write
|
||
1F4EEB71000
|
heap
|
page read and write
|
There are 823 hidden memdumps, click here to show them.