Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DB82FFF000
|
stack
|
page read and write
|
||
23BBB254000
|
heap
|
page read and write
|
||
3A3D3FE000
|
stack
|
page read and write
|
||
1BB0FE30000
|
heap
|
page read and write
|
||
2A710675000
|
heap
|
page read and write
|
||
D46ABBF000
|
stack
|
page read and write
|
||
1FA58213000
|
heap
|
page read and write
|
||
23BBB276000
|
heap
|
page read and write
|
||
2A710645000
|
heap
|
page read and write
|
||
22090E29000
|
heap
|
page read and write
|
||
97BCC7F000
|
stack
|
page read and write
|
||
B291E7C000
|
stack
|
page read and write
|
||
1B764AA9000
|
heap
|
page read and write
|
||
C21A7FF000
|
stack
|
page read and write
|
||
1DD10513000
|
heap
|
page read and write
|
||
2D4F1902000
|
heap
|
page read and write
|
||
2A71067E000
|
heap
|
page read and write
|
||
17DAD613000
|
heap
|
page read and write
|
||
22090E3E000
|
heap
|
page read and write
|
||
26808664000
|
heap
|
page read and write
|
||
23BBB190000
|
trusted library allocation
|
page read and write
|
||
28802831000
|
heap
|
page read and write
|
||
2680864A000
|
heap
|
page read and write
|
||
2D4F701D000
|
heap
|
page read and write
|
||
23BBB290000
|
heap
|
page read and write
|
||
23BBB213000
|
heap
|
page read and write
|
||
2D4F6DF0000
|
trusted library allocation
|
page read and write
|
||
DB828FB000
|
stack
|
page read and write
|
||
1DD10390000
|
trusted library allocation
|
page read and write
|
||
1FA58D5F000
|
heap
|
page read and write
|
||
22090DF0000
|
trusted library allocation
|
page read and write
|
||
2ED337E000
|
stack
|
page read and write
|
||
1FA58AD0000
|
remote allocation
|
page read and write
|
||
1AE4D77000
|
stack
|
page read and write
|
||
26809FF0000
|
remote allocation
|
page read and write
|
||
2A710600000
|
heap
|
page read and write
|
||
28802851000
|
heap
|
page read and write
|
||
E2411FF000
|
stack
|
page read and write
|
||
22090C80000
|
heap
|
page read and write
|
||
AB6A5FC000
|
stack
|
page read and write
|
||
2A71062A000
|
heap
|
page read and write
|
||
288029C0000
|
trusted library allocation
|
page read and write
|
||
3A3D6FE000
|
stack
|
page read and write
|
||
1F5BF459000
|
heap
|
page read and write
|
||
26808600000
|
heap
|
page read and write
|
||
B08587B000
|
stack
|
page read and write
|
||
E9F59FD000
|
stack
|
page read and write
|
||
81DECFE000
|
stack
|
page read and write
|
||
23BBB27F000
|
heap
|
page read and write
|
||
1F5BF2E0000
|
heap
|
page read and write
|
||
26808718000
|
heap
|
page read and write
|
||
1BB10013000
|
heap
|
page read and write
|
||
2D4F6E80000
|
trusted library allocation
|
page read and write
|
||
2D4F2158000
|
heap
|
page read and write
|
||
2ED317E000
|
stack
|
page read and write
|
||
E2405F8000
|
stack
|
page read and write
|
||
1F5BF43E000
|
heap
|
page read and write
|
||
22090EC8000
|
heap
|
page read and write
|
||
22090ECA000
|
heap
|
page read and write
|
||
2D4F6EA0000
|
trusted library allocation
|
page read and write
|
||
1DD10413000
|
heap
|
page read and write
|
||
1AE4F7F000
|
stack
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
E9F58FE000
|
stack
|
page read and write
|
||
23BBB25D000
|
heap
|
page read and write
|
||
1DD10457000
|
heap
|
page read and write
|
||
3A3D5FA000
|
stack
|
page read and write
|
||
1F5BF3A0000
|
remote allocation
|
page read and write
|
||
C21A4FB000
|
stack
|
page read and write
|
||
3A3D27E000
|
stack
|
page read and write
|
||
1FA58DD2000
|
heap
|
page read and write
|
||
3A939FC000
|
stack
|
page read and write
|
||
E240FFA000
|
stack
|
page read and write
|
||
2D4F70F4000
|
heap
|
page read and write
|
||
1FA58313000
|
heap
|
page read and write
|
||
B0856FE000
|
stack
|
page read and write
|
||
2C49CD50000
|
heap
|
page read and write
|
||
2D4F183D000
|
heap
|
page read and write
|
||
97BC6CC000
|
stack
|
page read and write
|
||
1FA58170000
|
heap
|
page read and write
|
||
1FA582FD000
|
heap
|
page read and write
|
||
C21A6FF000
|
stack
|
page read and write
|
||
1FA58248000
|
heap
|
page read and write
|
||
97BC7CE000
|
stack
|
page read and write
|
||
7FFFF00E1000
|
unkown
|
page execute read
|
||
17DAD4A0000
|
heap
|
page read and write
|
||
2D4F7100000
|
heap
|
page read and write
|
||
26809FF0000
|
remote allocation
|
page read and write
|
||
2D4F6DD0000
|
trusted library allocation
|
page read and write
|
||
1BB0FF60000
|
remote allocation
|
page read and write
|
||
2D4F1610000
|
heap
|
page read and write
|
||
1FA58D91000
|
heap
|
page read and write
|
||
26808460000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
2C49CE3D000
|
heap
|
page read and write
|
||
28803700000
|
trusted library allocation
|
page read and write
|
||
2449F829000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
97BCE7F000
|
stack
|
page read and write
|
||
2A710669000
|
heap
|
page read and write
|
||
8D66FAB000
|
stack
|
page read and write
|
||
2449F896000
|
heap
|
page read and write
|
||
1FA59203000
|
heap
|
page read and write
|
||
23BBB313000
|
heap
|
page read and write
|
||
E9F56FC000
|
stack
|
page read and write
|
||
1AE4B7C000
|
stack
|
page read and write
|
||
23BBB276000
|
heap
|
page read and write
|
||
1FA582B0000
|
heap
|
page read and write
|
||
2449F908000
|
heap
|
page read and write
|
||
2D4F7019000
|
heap
|
page read and write
|
||
22090EDD000
|
heap
|
page read and write
|
||
220E02F0000
|
heap
|
page read and write
|
||
2D4F6C90000
|
trusted library allocation
|
page read and write
|
||
1B764A81000
|
heap
|
page read and write
|
||
220E03AB000
|
heap
|
page read and write
|
||
2A710658000
|
heap
|
page read and write
|
||
1B764C60000
|
heap
|
page read and write
|
||
2449F913000
|
heap
|
page read and write
|
||
2D4F6DF4000
|
trusted library allocation
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
2D4F6F10000
|
remote allocation
|
page read and write
|
||
B291C7D000
|
stack
|
page read and write
|
||
17DADE02000
|
trusted library allocation
|
page read and write
|
||
1FA582EA000
|
heap
|
page read and write
|
||
17DAD661000
|
heap
|
page read and write
|
||
2D4F15B0000
|
heap
|
page read and write
|
||
2D4F6DB0000
|
trusted library allocation
|
page read and write
|
||
1DD10475000
|
heap
|
page read and write
|
||
2D4F2C00000
|
trusted library allocation
|
page read and write
|
||
2D4F188D000
|
heap
|
page read and write
|
||
2D4F70C2000
|
heap
|
page read and write
|
||
2A710664000
|
heap
|
page read and write
|
||
7FFFF019D000
|
unkown
|
page readonly
|
||
B08567C000
|
stack
|
page read and write
|
||
1B764AB3000
|
heap
|
page read and write
|
||
1AE4C7B000
|
stack
|
page read and write
|
||
2449F862000
|
heap
|
page read and write
|
||
2A71065C000
|
heap
|
page read and write
|
||
1FA58D9B000
|
heap
|
page read and write
|
||
2680863D000
|
heap
|
page read and write
|
||
1FA582AE000
|
heap
|
page read and write
|
||
2D4F6EE0000
|
trusted library allocation
|
page read and write
|
||
2A710641000
|
heap
|
page read and write
|
||
288036F0000
|
trusted library allocation
|
page read and write
|
||
7FFFF019B000
|
unkown
|
page read and write
|
||
2A710560000
|
heap
|
page read and write
|
||
B2916FC000
|
stack
|
page read and write
|
||
AB6A19C000
|
stack
|
page read and write
|
||
1FA58302000
|
heap
|
page read and write
|
||
E240CFE000
|
stack
|
page read and write
|
||
1DD10400000
|
heap
|
page read and write
|
||
1BB10058000
|
heap
|
page read and write
|
||
2D4F18F9000
|
heap
|
page read and write
|
||
2A710500000
|
heap
|
page read and write
|
||
C21A5F7000
|
stack
|
page read and write
|
||
1FA58D8F000
|
heap
|
page read and write
|
||
2A710662000
|
heap
|
page read and write
|
||
1F5BF413000
|
heap
|
page read and write
|
||
1BB0FF60000
|
remote allocation
|
page read and write
|
||
1FA58D9F000
|
heap
|
page read and write
|
||
288029B5000
|
heap
|
page read and write
|
||
244A0002000
|
trusted library allocation
|
page read and write
|
||
1B764C40000
|
heap
|
page read and write
|
||
23BBB259000
|
heap
|
page read and write
|
||
2449F900000
|
heap
|
page read and write
|
||
1B764AA0000
|
heap
|
page read and write
|
||
2D4F17E1000
|
trusted library allocation
|
page read and write
|
||
17DAD680000
|
heap
|
page read and write
|
||
1FA58D9D000
|
heap
|
page read and write
|
||
2D4F18F9000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
AB6AA7C000
|
stack
|
page read and write
|
||
23BBB302000
|
heap
|
page read and write
|
||
26808700000
|
heap
|
page read and write
|
||
17DAD668000
|
heap
|
page read and write
|
||
288029B0000
|
heap
|
page read and write
|
||
1FA582CB000
|
heap
|
page read and write
|
||
2A71067A000
|
heap
|
page read and write
|
||
23BBB030000
|
heap
|
page read and write
|
||
2449F902000
|
heap
|
page read and write
|
||
1FA58D9F000
|
heap
|
page read and write
|
||
2D4F6F10000
|
remote allocation
|
page read and write
|
||
2A710666000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
B291D7E000
|
stack
|
page read and write
|
||
8D6757A000
|
stack
|
page read and write
|
||
1FA58DB5000
|
heap
|
page read and write
|
||
1BB0FDD0000
|
heap
|
page read and write
|
||
220E0370000
|
heap
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
28802808000
|
heap
|
page read and write
|
||
1FA58D9F000
|
heap
|
page read and write
|
||
81DEF7F000
|
stack
|
page read and write
|
||
2D4F1886000
|
heap
|
page read and write
|
||
17DAD63C000
|
heap
|
page read and write
|
||
2D4F1855000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
B291F7F000
|
stack
|
page read and write
|
||
2D4F2102000
|
heap
|
page read and write
|
||
220E03C2000
|
heap
|
page read and write
|
||
E240E7A000
|
stack
|
page read and write
|
||
28802851000
|
heap
|
page read and write
|
||
DB830FE000
|
stack
|
page read and write
|
||
2D4F703B000
|
heap
|
page read and write
|
||
2D4F2100000
|
heap
|
page read and write
|
||
1DD10300000
|
heap
|
page read and write
|
||
2D4F1902000
|
heap
|
page read and write
|
||
7FFFF00E7000
|
unkown
|
page execute read
|
||
2A71067B000
|
heap
|
page read and write
|
||
1FA582ED000
|
heap
|
page read and write
|
||
17DADDB0000
|
trusted library allocation
|
page read and write
|
||
B0858FE000
|
stack
|
page read and write
|
||
2A710661000
|
heap
|
page read and write
|
||
2D4F6DD1000
|
trusted library allocation
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
2D4F6E80000
|
trusted library allocation
|
page read and write
|
||
2D4F1898000
|
heap
|
page read and write
|
||
1FA5824D000
|
heap
|
page read and write
|
||
268085E0000
|
trusted library allocation
|
page read and write
|
||
2A710631000
|
heap
|
page read and write
|
||
B051EFF000
|
stack
|
page read and write
|
||
1FA58238000
|
heap
|
page read and write
|
||
26808658000
|
heap
|
page read and write
|
||
2A71065B000
|
heap
|
page read and write
|
||
2D4F1871000
|
heap
|
page read and write
|
||
E2407FB000
|
stack
|
page read and write
|
||
1B764A96000
|
heap
|
page read and write
|
||
2C49CD80000
|
trusted library allocation
|
page read and write
|
||
2D4F8000000
|
heap
|
page read and write
|
||
2A71065A000
|
heap
|
page read and write
|
||
1FA5923E000
|
heap
|
page read and write
|
||
7FFFF00EA000
|
unkown
|
page readonly
|
||
2A710667000
|
heap
|
page read and write
|
||
17DAD4B0000
|
heap
|
page read and write
|
||
2A710674000
|
heap
|
page read and write
|
||
1FA58229000
|
heap
|
page read and write
|
||
1FA58251000
|
heap
|
page read and write
|
||
1FA58200000
|
heap
|
page read and write
|
||
23BBB23C000
|
heap
|
page read and write
|
||
220E03CF000
|
heap
|
page read and write
|
||
2449F861000
|
heap
|
page read and write
|
||
B0520FE000
|
stack
|
page read and write
|
||
26808659000
|
heap
|
page read and write
|
||
2D4F1853000
|
heap
|
page read and write
|
||
97BCAFC000
|
stack
|
page read and write
|
||
26808602000
|
heap
|
page read and write
|
||
23BBB202000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
1FA58247000
|
heap
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
220E03E6000
|
heap
|
page read and write
|
||
28802800000
|
heap
|
page read and write
|
||
22090E00000
|
heap
|
page read and write
|
||
2A710660000
|
heap
|
page read and write
|
||
E2401EB000
|
stack
|
page read and write
|
||
2D4F702B000
|
heap
|
page read and write
|
||
1FA58D92000
|
heap
|
page read and write
|
||
3A3D4FA000
|
stack
|
page read and write
|
||
2DCB080D000
|
heap
|
page read and write
|
||
28802920000
|
trusted library allocation
|
page read and write
|
||
1FA58110000
|
heap
|
page read and write
|
||
3A938FE000
|
stack
|
page read and write
|
||
2D4F7061000
|
heap
|
page read and write
|
||
1FA58D8F000
|
heap
|
page read and write
|
||
2449F851000
|
heap
|
page read and write
|
||
1FA58288000
|
heap
|
page read and write
|
||
28802980000
|
trusted library allocation
|
page read and write
|
||
22090CF0000
|
heap
|
page read and write
|
||
2D4F1813000
|
heap
|
page read and write
|
||
E9F57FF000
|
stack
|
page read and write
|
||
17DAD510000
|
heap
|
page read and write
|
||
23BBB090000
|
heap
|
page read and write
|
||
1F5BF470000
|
heap
|
page read and write
|
||
2C49CE6A000
|
heap
|
page read and write
|
||
2C49D802000
|
trusted library allocation
|
page read and write
|
||
3A93878000
|
stack
|
page read and write
|
||
2A71065F000
|
heap
|
page read and write
|
||
220E1E8B000
|
unkown
|
page execute read
|
||
2DCB240B000
|
unkown
|
page execute read
|
||
2DCB0821000
|
heap
|
page read and write
|
||
2D4F7054000
|
heap
|
page read and write
|
||
E2409FB000
|
stack
|
page read and write
|
||
7FFFF019D000
|
unkown
|
page readonly
|
||
23BBB264000
|
heap
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
7FFFF016C000
|
unkown
|
page write copy
|
||
B0521FF000
|
stack
|
page read and write
|
||
23BBB286000
|
heap
|
page read and write
|
||
2D4F7220000
|
trusted library allocation
|
page read and write
|
||
2D4F70CE000
|
heap
|
page read and write
|
||
1F5BF449000
|
heap
|
page read and write
|
||
1FA58AD0000
|
remote allocation
|
page read and write
|
||
1F5BF3A0000
|
remote allocation
|
page read and write
|
||
2D4F6C10000
|
trusted library allocation
|
page read and write
|
||
23BBB25F000
|
heap
|
page read and write
|
||
2449F800000
|
heap
|
page read and write
|
||
17DAD672000
|
heap
|
page read and write
|
||
B291AFD000
|
stack
|
page read and write
|
||
B051FFF000
|
stack
|
page read and write
|
||
2DCB24C0000
|
heap
|
page read and write
|
||
2A710635000
|
heap
|
page read and write
|
||
2D4F6DE0000
|
trusted library allocation
|
page read and write
|
||
2449F760000
|
trusted library allocation
|
page read and write
|
||
23BBB300000
|
heap
|
page read and write
|
||
220E03A0000
|
heap
|
page read and write
|
||
2DCB0800000
|
heap
|
page read and write
|
||
2D4F6DBE000
|
trusted library allocation
|
page read and write
|
||
1DD1046D000
|
heap
|
page read and write
|
||
DB8249B000
|
stack
|
page read and write
|
||
C21A27D000
|
stack
|
page read and write
|
||
1FA582B8000
|
heap
|
page read and write
|
||
1FA58D19000
|
heap
|
page read and write
|
||
1FA582C5000
|
heap
|
page read and write
|
||
B051D7E000
|
stack
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
1F5BF42F000
|
heap
|
page read and write
|
||
81DF07D000
|
stack
|
page read and write
|
||
17DAD713000
|
heap
|
page read and write
|
||
97BC74E000
|
stack
|
page read and write
|
||
B051CFE000
|
stack
|
page read and write
|
||
DB82AFF000
|
stack
|
page read and write
|
||
2A710663000
|
heap
|
page read and write
|
||
1FA5823C000
|
heap
|
page read and write
|
||
B08577E000
|
stack
|
page read and write
|
||
2D4F70F6000
|
heap
|
page read and write
|
||
2ED307B000
|
stack
|
page read and write
|
||
B29197F000
|
stack
|
page read and write
|
||
AB6A97E000
|
stack
|
page read and write
|
||
1BB0FF60000
|
remote allocation
|
page read and write
|
||
2449F866000
|
heap
|
page read and write
|
||
7FFFF00EC000
|
unkown
|
page write copy
|
||
1DD10500000
|
heap
|
page read and write
|
||
2DCB242B000
|
unkown
|
page execute read
|
||
220E03C9000
|
heap
|
page read and write
|
||
1BB10002000
|
heap
|
page read and write
|
||
2449F870000
|
heap
|
page read and write
|
||
7FFFF00E7000
|
unkown
|
page execute read
|
||
1AE472B000
|
stack
|
page read and write
|
||
1B764A86000
|
heap
|
page read and write
|
||
1DD10502000
|
heap
|
page read and write
|
||
7FFFF019B000
|
unkown
|
page read and write
|
||
97BCD77000
|
stack
|
page read and write
|
||
1FA58DB0000
|
heap
|
page read and write
|
||
2449F600000
|
heap
|
page read and write
|
||
28802849000
|
heap
|
page read and write
|
||
97BD07F000
|
stack
|
page read and write
|
||
2A71065E000
|
heap
|
page read and write
|
||
268084C0000
|
heap
|
page read and write
|
||
1FA58D83000
|
heap
|
page read and write
|
||
2680A200000
|
trusted library allocation
|
page read and write
|
||
1DD10402000
|
heap
|
page read and write
|
||
2A7104F0000
|
heap
|
page read and write
|
||
1FA58D9B000
|
heap
|
page read and write
|
||
1FA58253000
|
heap
|
page read and write
|
||
1FA582EE000
|
heap
|
page read and write
|
||
1FA59220000
|
heap
|
page read and write
|
||
3A3D7FF000
|
stack
|
page read and write
|
||
2A710644000
|
heap
|
page read and write
|
||
1FA58D9F000
|
heap
|
page read and write
|
||
1FA58DAE000
|
heap
|
page read and write
|
||
1AE4A7F000
|
stack
|
page read and write
|
||
2449F660000
|
heap
|
page read and write
|
||
97BCF7C000
|
stack
|
page read and write
|
||
26808649000
|
heap
|
page read and write
|
||
2D4F1829000
|
heap
|
page read and write
|
||
1B764AB5000
|
heap
|
page read and write
|
||
2680865A000
|
heap
|
page read and write
|
||
8D674FE000
|
stack
|
page read and write
|
||
1FA58316000
|
heap
|
page read and write
|
||
2D4F7048000
|
heap
|
page read and write
|
||
2D4F6F10000
|
trusted library allocation
|
page read and write
|
||
1FA58D25000
|
heap
|
page read and write
|
||
1FA58DC3000
|
heap
|
page read and write
|
||
22090EB9000
|
heap
|
page read and write
|
||
DB82EFE000
|
stack
|
page read and write
|
||
1FA58DAE000
|
heap
|
page read and write
|
||
2D4F2118000
|
heap
|
page read and write
|
||
3A934CA000
|
stack
|
page read and write
|
||
1B764A00000
|
heap
|
page read and write
|
||
17DAD700000
|
heap
|
page read and write
|
||
2D4F2C03000
|
trusted library allocation
|
page read and write
|
||
B2912CC000
|
stack
|
page read and write
|
||
22090E6B000
|
heap
|
page read and write
|
||
2D4F70D1000
|
heap
|
page read and write
|
||
17DAD708000
|
heap
|
page read and write
|
||
17DAD600000
|
heap
|
page read and write
|
||
E2406FA000
|
stack
|
page read and write
|
||
2880284A000
|
heap
|
page read and write
|
||
2D4F27E0000
|
trusted library allocation
|
page read and write
|
||
3A3D2FE000
|
stack
|
page read and write
|
||
2D4F1876000
|
heap
|
page read and write
|
||
2ED2B2C000
|
stack
|
page read and write
|
||
2449F88C000
|
heap
|
page read and write
|
||
3A9354E000
|
stack
|
page read and write
|
||
81DEC7C000
|
stack
|
page read and write
|
||
2D4F6EF0000
|
trusted library allocation
|
page read and write
|
||
26808677000
|
heap
|
page read and write
|
||
28803750000
|
trusted library allocation
|
page read and write
|
||
2A710648000
|
heap
|
page read and write
|
||
2A71063F000
|
heap
|
page read and write
|
||
2D4F6DD4000
|
trusted library allocation
|
page read and write
|
||
22090EC1000
|
heap
|
page read and write
|
||
1FA58100000
|
heap
|
page read and write
|
||
2D4F2002000
|
heap
|
page read and write
|
||
3A935CF000
|
stack
|
page read and write
|
||
C21A37C000
|
stack
|
page read and write
|
||
1FA5824C000
|
heap
|
page read and write
|
||
1FA58254000
|
heap
|
page read and write
|
||
2D4F6DB0000
|
trusted library allocation
|
page read and write
|
||
1FA58D91000
|
heap
|
page read and write
|
||
2D4F7000000
|
heap
|
page read and write
|
||
2DCB2450000
|
unkown
|
page read and write
|
||
1BB10000000
|
heap
|
page read and write
|
||
B0859FA000
|
stack
|
page read and write
|
||
1FA58D8F000
|
heap
|
page read and write
|
||
2D4F7102000
|
heap
|
page read and write
|
||
26808713000
|
heap
|
page read and write
|
||
288029A0000
|
trusted library allocation
|
page read and write
|
||
B085DFA000
|
stack
|
page read and write
|
||
B085CF9000
|
stack
|
page read and write
|
||
1F5BF45E000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
22090EE2000
|
heap
|
page read and write
|
||
2D4F18B7000
|
heap
|
page read and write
|
||
2D4F6CA0000
|
trusted library allocation
|
page read and write
|
||
220E1EAB000
|
unkown
|
page execute read
|
||
2C49CF13000
|
heap
|
page read and write
|
||
1BB0FF30000
|
trusted library allocation
|
page read and write
|
||
1FA58D50000
|
heap
|
page read and write
|
||
1FA58D92000
|
heap
|
page read and write
|
||
1FA58D65000
|
heap
|
page read and write
|
||
1B764E05000
|
heap
|
page read and write
|
||
2A710640000
|
heap
|
page read and write
|
||
1FA58DA1000
|
heap
|
page read and write
|
||
2D4F18AB000
|
heap
|
page read and write
|
||
2D4F1800000
|
heap
|
page read and write
|
||
2A710642000
|
heap
|
page read and write
|
||
1FA58239000
|
heap
|
page read and write
|
||
B2919FC000
|
stack
|
page read and write
|
||
1FA58308000
|
heap
|
page read and write
|
||
C219F6B000
|
stack
|
page read and write
|
||
220E01B0000
|
heap
|
page read and write
|
||
1BB10036000
|
heap
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
C219FEE000
|
stack
|
page read and write
|
||
2449F85D000
|
heap
|
page read and write
|
||
AB6A77E000
|
stack
|
page read and write
|
||
2D4F1907000
|
heap
|
page read and write
|
||
1F5BF429000
|
heap
|
page read and write
|
||
8D6747D000
|
stack
|
page read and write
|
||
2449F859000
|
heap
|
page read and write
|
||
28802851000
|
heap
|
page read and write
|
||
2D4F2000000
|
heap
|
page read and write
|
||
2D4F2C10000
|
trusted library allocation
|
page read and write
|
||
2DCB0780000
|
heap
|
page read and write
|
||
1FA58D7C000
|
heap
|
page read and write
|
||
26808702000
|
heap
|
page read and write
|
||
1FA58281000
|
heap
|
page read and write
|
||
23BBB020000
|
heap
|
page read and write
|
||
7FFFF01A1000
|
unkown
|
page readonly
|
||
1FA58D52000
|
heap
|
page read and write
|
||
2449F881000
|
heap
|
page read and write
|
||
2D4F6ED0000
|
trusted library allocation
|
page read and write
|
||
2A710590000
|
trusted library allocation
|
page read and write
|
||
8D675F9000
|
stack
|
page read and write
|
||
1F5BF402000
|
heap
|
page read and write
|
||
DB829FC000
|
stack
|
page read and write
|
||
2A710657000
|
heap
|
page read and write
|
||
2C49CE02000
|
heap
|
page read and write
|
||
2DCB0813000
|
heap
|
page read and write
|
||
2D4F7200000
|
trusted library allocation
|
page read and write
|
||
2A710677000
|
heap
|
page read and write
|
||
1FA58AD0000
|
remote allocation
|
page read and write
|
||
1B764ABA000
|
heap
|
page read and write
|
||
2449F5F0000
|
heap
|
page read and write
|
||
2D4F1925000
|
heap
|
page read and write
|
||
2D4F70E2000
|
heap
|
page read and write
|
||
1FA58249000
|
heap
|
page read and write
|
||
1AE47AE000
|
stack
|
page read and write
|
||
1B764A86000
|
heap
|
page read and write
|
||
B085E7E000
|
unkown
|
page read and write
|
||
1FA58D61000
|
heap
|
page read and write
|
||
1FA58D9B000
|
heap
|
page read and write
|
||
2A710626000
|
heap
|
page read and write
|
||
1B764A95000
|
heap
|
page read and write
|
||
1F5BFE02000
|
trusted library allocation
|
page read and write
|
||
7FFFF00E1000
|
unkown
|
page execute read
|
||
1FA58D55000
|
heap
|
page read and write
|
||
1B764A70000
|
heap
|
page read and write
|
||
1FA59200000
|
heap
|
page read and write
|
||
2D4F70F8000
|
heap
|
page read and write
|
||
26808666000
|
heap
|
page read and write
|
||
1FA58250000
|
heap
|
page read and write
|
||
1FA58D9B000
|
heap
|
page read and write
|
||
22090C90000
|
heap
|
page read and write
|
||
1DD10428000
|
heap
|
page read and write
|
||
22091700000
|
heap
|
page read and write
|
||
22090E87000
|
heap
|
page read and write
|
||
2A71063A000
|
heap
|
page read and write
|
||
2C49CE29000
|
heap
|
page read and write
|
||
81DEEFE000
|
stack
|
page read and write
|
||
2C49CE13000
|
heap
|
page read and write
|
||
2D4F70A0000
|
heap
|
page read and write
|
||
17DAD62A000
|
heap
|
page read and write
|
||
22091602000
|
heap
|
page read and write
|
||
1FA58D9F000
|
heap
|
page read and write
|
||
1F5BF380000
|
trusted library allocation
|
page read and write
|
||
1DD10360000
|
heap
|
page read and write
|
||
3A3D8FF000
|
stack
|
page read and write
|
||
1F5BF3A0000
|
remote allocation
|
page read and write
|
||
7FFFF016C000
|
unkown
|
page write copy
|
||
288029B9000
|
heap
|
page read and write
|
||
1BB10802000
|
trusted library allocation
|
page read and write
|
||
1FA58D72000
|
heap
|
page read and write
|
||
1B764AA0000
|
heap
|
page read and write
|
||
7FFFF00E0000
|
unkown
|
page readonly
|
||
1B764E00000
|
heap
|
page read and write
|
||
2C49CE50000
|
heap
|
page read and write
|
||
AB6A87E000
|
stack
|
page read and write
|
||
3A3CFDB000
|
stack
|
page read and write
|
||
1B764A94000
|
heap
|
page read and write
|
||
28802640000
|
heap
|
page read and write
|
||
1FA58D00000
|
heap
|
page read and write
|
||
DB82CFD000
|
stack
|
page read and write
|
||
2D4F6F10000
|
remote allocation
|
page read and write
|
||
23BBB24E000
|
heap
|
page read and write
|
||
1FA58D8F000
|
heap
|
page read and write
|
||
1FA58D8D000
|
heap
|
page read and write
|
||
23BBB229000
|
heap
|
page read and write
|
||
17DAD664000
|
heap
|
page read and write
|
||
1F5BF400000
|
heap
|
page read and write
|
||
2D4F6EC0000
|
trusted library allocation
|
page read and write
|
||
2ED327F000
|
stack
|
page read and write
|
||
1B764AA0000
|
heap
|
page read and write
|
||
3A9397E000
|
stack
|
page read and write
|
||
2D4F2104000
|
heap
|
page read and write
|
||
1FA58D9B000
|
heap
|
page read and write
|
||
1FA59202000
|
heap
|
page read and write
|
||
1F5BF350000
|
heap
|
page read and write
|
||
B291B7B000
|
stack
|
page read and write
|
||
DB831FF000
|
stack
|
page read and write
|
||
268085C0000
|
trusted library allocation
|
page read and write
|
||
28802780000
|
heap
|
page read and write
|
||
1B764AB9000
|
heap
|
page read and write
|
||
28802910000
|
trusted library allocation
|
page read and write
|
||
1FA58D91000
|
heap
|
page read and write
|
||
1BB10102000
|
heap
|
page read and write
|
||
2A710613000
|
heap
|
page read and write
|
||
26808648000
|
heap
|
page read and write
|
||
D46AE7E000
|
stack
|
page read and write
|
||
DB82DFF000
|
stack
|
page read and write
|
||
2D4F2113000
|
heap
|
page read and write
|
||
7FFFF00EA000
|
unkown
|
page readonly
|
||
2C49CF02000
|
heap
|
page read and write
|
||
1AE4E7C000
|
stack
|
page read and write
|
||
2D4F15A0000
|
heap
|
page read and write
|
||
288034B0000
|
trusted library allocation
|
page read and write
|
||
1F5BF456000
|
heap
|
page read and write
|
||
2A710646000
|
heap
|
page read and write
|
||
2449F870000
|
heap
|
page read and write
|
||
22090E13000
|
heap
|
page read and write
|
||
1BB0FDC0000
|
heap
|
page read and write
|
||
17DAD702000
|
heap
|
page read and write
|
||
1FA58DC2000
|
heap
|
page read and write
|
||
2A710702000
|
heap
|
page read and write
|
||
1BB10040000
|
heap
|
page read and write
|
||
1DD1045E000
|
heap
|
page read and write
|
||
2C49CCE0000
|
heap
|
page read and write
|
||
23BBB308000
|
heap
|
page read and write
|
||
1B764A9E000
|
heap
|
page read and write
|
||
7FFFF01A1000
|
unkown
|
page readonly
|
||
2449F858000
|
heap
|
page read and write
|
||
26808613000
|
heap
|
page read and write
|
||
81DEB7C000
|
stack
|
page read and write
|
||
D46AEFE000
|
stack
|
page read and write
|
||
1FA58C02000
|
heap
|
page read and write
|
||
1DD10E02000
|
trusted library allocation
|
page read and write
|
||
1FA58D97000
|
heap
|
page read and write
|
||
2D4F1710000
|
trusted library allocation
|
page read and write
|
||
1F5BF2F0000
|
heap
|
page read and write
|
||
B051C7B000
|
stack
|
page read and write
|
||
2D4F6E80000
|
trusted library allocation
|
page read and write
|
||
2D4F2118000
|
heap
|
page read and write
|
||
22091714000
|
heap
|
page read and write
|
||
C21A3FE000
|
stack
|
page read and write
|
||
1FA5824B000
|
heap
|
page read and write
|
||
22090F13000
|
heap
|
page read and write
|
||
D46AB3C000
|
stack
|
page read and write
|
||
220E0375000
|
heap
|
page read and write
|
||
B085AF7000
|
stack
|
page read and write
|
||
7FFFF00E0000
|
unkown
|
page readonly
|
||
2A711002000
|
trusted library allocation
|
page read and write
|
||
2C49CCF0000
|
heap
|
page read and write
|
||
2D4F7084000
|
heap
|
page read and write
|
||
23BBB24C000
|
heap
|
page read and write
|
||
2449F83C000
|
heap
|
page read and write
|
||
1FA58D9D000
|
heap
|
page read and write
|
||
1FA58256000
|
heap
|
page read and write
|
||
2D4F186C000
|
heap
|
page read and write
|
||
28802650000
|
trusted library allocation
|
page read and write
|
||
E2408FE000
|
stack
|
page read and write
|
||
2D4F6F00000
|
trusted library allocation
|
page read and write
|
||
1FA58D69000
|
heap
|
page read and write
|
||
23BBB200000
|
heap
|
page read and write
|
||
2A71064E000
|
heap
|
page read and write
|
||
2C49CE00000
|
heap
|
page read and write
|
||
B085BFF000
|
stack
|
page read and write
|
||
2680862A000
|
heap
|
page read and write
|
||
1B764A92000
|
heap
|
page read and write
|
||
2449F813000
|
heap
|
page read and write
|
||
2D4F2015000
|
heap
|
page read and write
|
||
1FA5824E000
|
heap
|
page read and write
|
||
B29187F000
|
stack
|
page read and write
|
||
22090F02000
|
heap
|
page read and write
|
||
1FA58270000
|
heap
|
page read and write
|
||
D46AF7E000
|
stack
|
page read and write
|
||
26809FB0000
|
trusted library allocation
|
page read and write
|
||
1B764AAA000
|
heap
|
page read and write
|
||
2D4F6C20000
|
trusted library allocation
|
page read and write
|
||
2A710683000
|
heap
|
page read and write
|
||
1F5BF502000
|
heap
|
page read and write
|
||
17DAD65B000
|
heap
|
page read and write
|
||
97BCBFB000
|
stack
|
page read and write
|
||
AB6AB7C000
|
stack
|
page read and write
|
||
26808450000
|
heap
|
page read and write
|
||
1FA582E4000
|
heap
|
page read and write
|
||
1DD10425000
|
heap
|
page read and write
|
||
2D4F1873000
|
heap
|
page read and write
|
||
1FA58DA1000
|
heap
|
page read and write
|
||
1DD1043C000
|
heap
|
page read and write
|
||
2DCB09D0000
|
heap
|
page read and write
|
||
288036E0000
|
heap
|
page readonly
|
||
288027A0000
|
heap
|
page read and write
|
||
2680A002000
|
trusted library allocation
|
page read and write
|
||
1FA581A0000
|
trusted library allocation
|
page read and write
|
||
8D673F9000
|
stack
|
page read and write
|
||
1FA58D99000
|
heap
|
page read and write
|
||
81DE78C000
|
stack
|
page read and write
|
||
220E0310000
|
heap
|
page read and write
|
||
2D4F70E8000
|
heap
|
page read and write
|
||
7FFFF00EC000
|
unkown
|
page write copy
|
||
2A71063D000
|
heap
|
page read and write
|
||
220E03CF000
|
heap
|
page read and write
|
||
2D4F18A0000
|
heap
|
page read and write
|
||
1DD102F0000
|
heap
|
page read and write
|
||
2C49CE89000
|
heap
|
page read and write
|
||
1BB10029000
|
heap
|
page read and write
|
||
26809FF0000
|
remote allocation
|
page read and write
|
||
2D4F6DB8000
|
trusted library allocation
|
page read and write
|
||
23BBBA02000
|
trusted library allocation
|
page read and write
|
||
2D4F6DE0000
|
trusted library allocation
|
page read and write
|
There are 641 hidden memdumps, click here to show them.