Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
bscHLGMyjW.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x2c04a331, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61712 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\bscHLGMyjW.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\bscHLGMyjW.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\bscHLGMyjW.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Mjzwixkz\jiugg.vcz"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\bscHLGMyjW.dll,DllUnregisterServerr
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\bscHLGMyjW.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\bscHLGMyjW.dll",#1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdb
|
unknown
|
||
https://51.91.7.5/
|
unknown
|
||
https://120.50.40.183/
|
unknown
|
||
https://159.8.59.82/
|
unknown
|
||
https://131.100.24.231:80/H
|
unknown
|
||
https://103.221.221.247:8080/gYHJIs
|
unknown
|
||
https://173.254.208.91:8080/FHNmSQhMPmUgfiGTpfRKglWV
|
unknown
|
||
https://192.99.251.50/0
|
unknown
|
||
https://159.8.59.82:8080/
|
unknown
|
||
https://79.172.212.216/9
|
unknown
|
||
https://149.56.128.192/fSTm
|
149.56.128.192
|
||
https://131.100.24.231:80/
|
unknown
|
||
https://51.91.7.5:8080/rxYzgkPqLyQVovawmSL
|
unknown
|
||
https://51.91.76.89:8080/lNTCDnLEFARnzCSTbPqiarmtqBjaTTxMdOLjVhFUj
|
unknown
|
||
https://160.16.218.63:8080/rlxtXuQTWcz
|
unknown
|
||
https://192.99.251.50/4
|
unknown
|
||
https://192.99.251.50/99.251.50/hdaVPxkDfoKJQyOXvwYhhkAy
|
unknown
|
||
https://46.55.222.11/BiEgOdFqxzyfFPqwAOweHeXemJBZKjqwNwwVobqyTYy
|
unknown
|
||
https://103.221.221.247:8080/
|
unknown
|
||
https://206.188.212.92/
|
unknown
|
||
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdbsI
|
unknown
|
||
https://103.221.221.247:8080/gYHJIsD
|
unknown
|
||
https://173.254.208.91/
|
unknown
|
||
https://160.16.218.63/
|
unknown
|
||
https://206.188.212.92:8080/XGoDqOmEznVckdttzjTudmbZ
|
unknown
|
||
https://192.99.251.50/0/wVZyzHXwzFIbSsMDkdb
|
unknown
|
||
https://46.55.222.11/B
|
unknown
|
||
https://149.56.128.192/
|
unknown
|
||
https://103.221.221.247:8080/tas
|
unknown
|
||
https://46.55.222.11/F
|
unknown
|
||
https://131.100.24.231:80/HjsJJresDkOtazdwjPkgeyoMeBIGInWLCajLkkcuvkifWRvynwfbRFAZdPO
|
unknown
|
||
https://192.99.251.50/
|
unknown
|
||
https://192.99.251.50/hdaVPxkDfoKJQyOXvwYhhkAQ
|
unknown
|
||
https://46.55.222.11/
|
unknown
|
||
https://120.50.40.183:80/wVZyzHX
|
unknown
|
||
https://131.100.24.231/
|
unknown
|
||
https://51.91.7.5:8080/
|
unknown
|
||
https://131.100.24.231/I
|
unknown
|
||
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdbX
|
unknown
|
||
https://46.55.222.11/.50.40.183/
|
unknown
|
||
https://103.221.221.247/
|
unknown
|
||
https://160.16.218.63/Y
|
unknown
|
||
https://159.8.59.82:8080/taEjAKKH
|
unknown
|
||
https://79.172.212.216:8080/
|
unknown
|
||
https://185.157.82.211:8080/
|
unknown
|
||
https://192.99.251.50/hdaVPxkDfoKJQyOXvwYhhkA
|
unknown
|
||
https://160.16.218.63:8080/rlxtXuQTWczj
|
unknown
|
||
https://160.16.218.63/K
|
unknown
|
||
https://185.157.82.211:8080/)
|
unknown
|
||
https://192.99.251.50/hdaVPxkDfoKJQyOXvwYhhkAAppData
|
unknown
|
||
https://46.55.222.11/-
|
unknown
|
||
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdbP
|
unknown
|
||
https://46.55.222.11/.50.40.183:80/wVZyzHXwzFIbSsMDkdb
|
unknown
|
||
https://185.157.82.211/
|
unknown
|
||
https://185.157.82.211/V
|
unknown
|
||
https://46.55.222.11/BiEgOdFqxzyfFPqwAOweHeXemJBZKjqwNwwVobqyTY=
|
unknown
|
||
https://51.91.76.89/
|
unknown
|
||
https://46.55.222.11/BiEgOdFqxzyfFPqwAOweHeXemJBZKjqwNwwVobqyTY
|
46.55.222.11
|
||
https://79.172.212.216/
|
unknown
|
||
https://159.8.59.82:8080/taEjAKKHJ
|
unknown
|
||
https://79.172.212.216:8080/QLBvrKXyQhlLtOrpKVuDaNHJ
|
unknown
|
||
https://159.8.59.82/5
|
unknown
|
||
https://185.157.82.211:8080/riNpYqdQCgxyFX
|
unknown
|
||
https://120.50.40.183:80/
|
unknown
|
||
https://79.172.212.216:8080/QLBvrKXyQhlLtOrpKVuDaNHJ%
|
unknown
|
||
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdb1
|
unknown
|
||
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJ771D
|
unknown
|
||
https://58.227.42.236/72.212.216/
|
unknown
|
||
https://58.227.42.236/
|
unknown
|
||
https://sls.upP
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://58.227.42.236/n
|
unknown
|
||
https://58.227.42.236:80/2.212.216:8080/QLBvrKXyQhlLtOrpKVuDaNHJ
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://58.227.42.236:80/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJh
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJ
|
unknown
|
||
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJn
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://58.227.42.236/3
|
unknown
|
There are 76 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
248.38.74.3
|
unknown
|
Reserved
|
||
208.185.68.3
|
unknown
|
United States
|
||
185.157.82.211
|
unknown
|
Poland
|
||
216.131.66.3
|
unknown
|
United States
|
||
180.4.0.0
|
unknown
|
Japan
|
||
79.172.212.216
|
unknown
|
Hungary
|
||
114.240.2.0
|
unknown
|
China
|
||
220.194.66.52
|
unknown
|
China
|
||
91.240.2.0
|
unknown
|
United Kingdom
|
||
173.254.208.91
|
unknown
|
United States
|
||
206.188.212.92
|
unknown
|
United States
|
||
40.38.70.3
|
unknown
|
United States
|
||
135.52.4.0
|
unknown
|
United States
|
||
51.91.7.5
|
unknown
|
France
|
||
32.137.69.3
|
unknown
|
United States
|
||
108.240.2.0
|
unknown
|
United States
|
||
148.4.0.0
|
unknown
|
United States
|
||
108.4.0.0
|
unknown
|
United States
|
||
192.16.0.0
|
unknown
|
United States
|
||
149.56.128.192
|
unknown
|
Canada
|
||
128.4.0.0
|
unknown
|
United States
|
||
120.240.2.0
|
unknown
|
China
|
||
131.100.24.231
|
unknown
|
Brazil
|
||
156.4.0.0
|
unknown
|
United States
|
||
184.4.0.0
|
unknown
|
United States
|
||
46.55.222.11
|
unknown
|
Bulgaria
|
||
51.91.76.89
|
unknown
|
France
|
||
103.240.2.0
|
unknown
|
unknown
|
||
160.16.218.63
|
unknown
|
Japan
|
||
224.120.66.3
|
unknown
|
Reserved
|
||
192.99.251.50
|
unknown
|
Canada
|
||
216.64.72.3
|
unknown
|
United States
|
||
124.4.0.0
|
unknown
|
India
|
||
112.135.10.118
|
unknown
|
Sri Lanka
|
||
152.4.0.0
|
unknown
|
United States
|
||
159.8.59.82
|
unknown
|
United States
|
||
120.50.40.183
|
unknown
|
Singapore
|
||
58.227.42.236
|
unknown
|
Korea Republic of
|
||
103.221.221.247
|
unknown
|
Viet Nam
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 31 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
There are 2 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4DB1000
|
direct allocation
|
page execute read
|
||
3590000
|
direct allocation
|
page execute and read and write
|
||
3550000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
direct allocation
|
page execute read
|
||
4C21000
|
direct allocation
|
page execute read
|
||
4B81000
|
direct allocation
|
page execute read
|
||
3150000
|
direct allocation
|
page execute and read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
1C922EAF000
|
heap
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
170237BB000
|
heap
|
page read and write
|
||
1CA1558E000
|
heap
|
page read and write
|
||
1CA155AC000
|
heap
|
page read and write
|
||
1E9A4229000
|
heap
|
page read and write
|
||
1008C000
|
unkown
|
page readonly
|
||
19576655000
|
heap
|
page read and write
|
||
3447000
|
heap
|
page read and write
|
||
B51F1FA000
|
stack
|
page read and write
|
||
1CA15568000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
170237B5000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
172597F000
|
stack
|
page read and write
|
||
1BCA24FC000
|
heap
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page read and write
|
||
249B37D0000
|
trusted library allocation
|
page read and write
|
||
3474000
|
heap
|
page read and write
|
||
1CA155DC000
|
heap
|
page read and write
|
||
30F0000
|
remote allocation
|
page read and write
|
||
217F8AE0000
|
trusted library allocation
|
page read and write
|
||
1BCA2457000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
759D179000
|
stack
|
page read and write
|
||
1CA14A3C000
|
heap
|
page read and write
|
||
3474000
|
heap
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
2A5C158B000
|
heap
|
page read and write
|
||
759CB4F000
|
stack
|
page read and write
|
||
19576400000
|
heap
|
page read and write
|
||
1F2D2013000
|
heap
|
page read and write
|
||
B51F77C000
|
stack
|
page read and write
|
||
1BCA7E50000
|
trusted library allocation
|
page read and write
|
||
1E3F3F46000
|
heap
|
page read and write
|
||
217F8C5E000
|
heap
|
page read and write
|
||
1008C000
|
unkown
|
page readonly
|
||
10B0000
|
heap
|
page read and write
|
||
249B382E000
|
heap
|
page read and write
|
||
1BCA8000000
|
heap
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
96A6EBA000
|
stack
|
page read and write
|
||
19576682000
|
heap
|
page read and write
|
||
B51FB7F000
|
stack
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
1CA14A00000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
30E3000
|
heap
|
page read and write
|
||
1E9A4281000
|
heap
|
page read and write
|
||
1BCA7C49000
|
heap
|
page read and write
|
||
1BCA7C80000
|
trusted library allocation
|
page read and write
|
||
1BCA7B60000
|
trusted library allocation
|
page read and write
|
||
1BCA2E02000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
759D07A000
|
stack
|
page read and write
|
||
1CA14AAB000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1C922EA6000
|
heap
|
page read and write
|
||
1BCA7E90000
|
remote allocation
|
page read and write
|
||
1E3F3DF0000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B38A7000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4E12000
|
direct allocation
|
page read and write
|
||
1B139A29000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
1E9A428D000
|
heap
|
page read and write
|
||
3439000
|
heap
|
page read and write
|
||
5A27B7D000
|
stack
|
page read and write
|
||
1BCA7C90000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
B05F000
|
stack
|
page read and write
|
||
1BCA7B74000
|
trusted library allocation
|
page read and write
|
||
249B4800000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1F2D2065000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1E9A4308000
|
heap
|
page read and write
|
||
1BCA7B54000
|
trusted library allocation
|
page read and write
|
||
1BCA2400000
|
heap
|
page read and write
|
||
2E9A2FE000
|
stack
|
page read and write
|
||
73B291B000
|
stack
|
page read and write
|
||
1C922E8B000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
3212000
|
heap
|
page read and write
|
||
3474000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA2513000
|
heap
|
page read and write
|
||
EB9000
|
heap
|
page read and write
|
||
1F2D2A02000
|
trusted library allocation
|
page read and write
|
||
1CA1556E000
|
heap
|
page read and write
|
||
249B39AA000
|
heap
|
page read and write
|
||
1C922EAF000
|
heap
|
page read and write
|
||
38BE4F7000
|
stack
|
page read and write
|
||
249B490A000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
1C922EAF000
|
heap
|
page read and write
|
||
1F2D2102000
|
heap
|
page read and write
|
||
34DC000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1B139870000
|
heap
|
page read and write
|
||
249B38C7000
|
heap
|
page read and write
|
||
1BCA2455000
|
heap
|
page read and write
|
||
249B4902000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7CEA000
|
heap
|
page read and write
|
||
249B3913000
|
heap
|
page read and write
|
||
B0DE000
|
stack
|
page read and write
|
||
1BCA2478000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
249B3881000
|
heap
|
page read and write
|
||
1BCA79A0000
|
trusted library allocation
|
page read and write
|
||
170238C0000
|
remote allocation
|
page read and write
|
||
1F2D205C000
|
heap
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
170237D8000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1BCA35F0000
|
trusted library section
|
page readonly
|
||
1430000
|
heap
|
page read and write
|
||
3435000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
EEC000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
724FA7E000
|
stack
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
1F2D1F70000
|
heap
|
page read and write
|
||
1E9A4050000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1B139A59000
|
heap
|
page read and write
|
||
1B139A13000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
249B4125000
|
heap
|
page read and write
|
||
1CA155B0000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
AF1E000
|
stack
|
page read and write
|
||
1CA1556F000
|
heap
|
page read and write
|
||
1BCA2491000
|
heap
|
page read and write
|
||
172557C000
|
stack
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page read and write
|
||
170242D2000
|
heap
|
page read and write
|
||
1CA1558F000
|
heap
|
page read and write
|
||
1BCA2390000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4E22000
|
heap
|
page read and write
|
||
1BCA7B38000
|
trusted library allocation
|
page read and write
|
||
B19E000
|
stack
|
page read and write
|
||
1BCA2F18000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
1BCA3001000
|
trusted library allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
1CA149B0000
|
trusted library allocation
|
page read and write
|
||
3474000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1E3F4280000
|
heap
|
page read and write
|
||
1BCA7C1D000
|
heap
|
page read and write
|
||
34B3000
|
heap
|
page read and write
|
||
1B139A00000
|
heap
|
page read and write
|
||
1E9A4213000
|
heap
|
page read and write
|
||
249B38FD000
|
heap
|
page read and write
|
||
B51F47F000
|
stack
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1BCA7C63000
|
heap
|
page read and write
|
||
1CA15564000
|
heap
|
page read and write
|
||
96A737F000
|
stack
|
page read and write
|
||
4C34000
|
heap
|
page read and write
|
||
1CA15A20000
|
heap
|
page read and write
|
||
1B139860000
|
heap
|
page read and write
|
||
217F9B70000
|
heap
|
page readonly
|
||
1C922EA5000
|
heap
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA15568000
|
heap
|
page read and write
|
||
170237BB000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1CA14ADE000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1B139B02000
|
heap
|
page read and write
|
||
1CA15568000
|
heap
|
page read and write
|
||
249B41ED000
|
heap
|
page read and write
|
||
19576E02000
|
trusted library allocation
|
page read and write
|
||
1BCA7A20000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
249B3829000
|
heap
|
page read and write
|
||
249B3800000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA1556E000
|
heap
|
page read and write
|
||
52C1000
|
trusted library allocation
|
page read and write
|
||
249B38CD000
|
heap
|
page read and write
|
||
1BCA7E70000
|
trusted library allocation
|
page read and write
|
||
1CA1558E000
|
heap
|
page read and write
|
||
249B38AD000
|
heap
|
page read and write
|
||
249B3853000
|
heap
|
page read and write
|
||
1BCA2475000
|
heap
|
page read and write
|
||
1B139B28000
|
heap
|
page read and write
|
||
170237CD000
|
heap
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
170238C0000
|
remote allocation
|
page read and write
|
||
1CA1558C000
|
heap
|
page read and write
|
||
170237B5000
|
heap
|
page read and write
|
||
1CA1558C000
|
heap
|
page read and write
|
||
17023793000
|
heap
|
page read and write
|
||
1BCA35E0000
|
trusted library section
|
page readonly
|
||
249B4133000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1CA1558A000
|
heap
|
page read and write
|
||
1CA15568000
|
heap
|
page read and write
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
10085000
|
unkown
|
page read and write
|
||
B85A1DC000
|
stack
|
page read and write
|
||
1957664F000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10072000
|
unkown
|
page readonly
|
||
19576700000
|
heap
|
page read and write
|
||
AF65000
|
trusted library allocation
|
page read and write
|
||
127F000
|
stack
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
38BE0FE000
|
stack
|
page read and write
|
||
170237CD000
|
heap
|
page read and write
|
||
1CA1556F000
|
heap
|
page read and write
|
||
1CA15584000
|
heap
|
page read and write
|
||
1BCA7B30000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
32D4000
|
heap
|
page read and write
|
||
1CA14AC8000
|
heap
|
page read and write
|
||
5A2767E000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1702382D000
|
heap
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
1BCA7C5C000
|
heap
|
page read and write
|
||
249B3813000
|
heap
|
page read and write
|
||
1702375D000
|
heap
|
page read and write
|
||
1E9A4300000
|
heap
|
page read and write
|
||
217F8C5E000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
17023738000
|
heap
|
page read and write
|
||
1F2D205F000
|
heap
|
page read and write
|
||
B01E000
|
stack
|
page read and write
|
||
1CA15A19000
|
heap
|
page read and write
|
||
1BCA7CA1000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA14A77000
|
heap
|
page read and write
|
||
724F73B000
|
stack
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
1CA155B5000
|
heap
|
page read and write
|
||
2A5C1568000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
4C4C000
|
trusted library allocation
|
page read and write
|
||
1CA15500000
|
heap
|
page read and write
|
||
73B2CFA000
|
stack
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
AF5A000
|
stack
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
1BCA248C000
|
heap
|
page read and write
|
||
1F2D1F00000
|
heap
|
page read and write
|
||
1BCA3961000
|
trusted library allocation
|
page read and write
|
||
AD9E000
|
stack
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
1B1398D0000
|
heap
|
page read and write
|
||
1CA14A61000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
172515B000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
540F000
|
trusted library allocation
|
page read and write
|
||
1F2D2108000
|
heap
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
217F9B90000
|
trusted library allocation
|
page read and write
|
||
51DF000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
1F2D2061000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4C43000
|
direct allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
17023775000
|
heap
|
page read and write
|
||
1CA14A86000
|
heap
|
page read and write
|
||
249B4135000
|
heap
|
page read and write
|
||
2A5C1510000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
1E3F3E80000
|
heap
|
page read and write
|
||
1BCA7C00000
|
heap
|
page read and write
|
||
217F9BE0000
|
trusted library allocation
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
3439000
|
heap
|
page read and write
|
||
1C922EA7000
|
heap
|
page read and write
|
||
17023812000
|
heap
|
page read and write
|
||
1F2D2054000
|
heap
|
page read and write
|
||
1BCA7CFA000
|
heap
|
page read and write
|
||
1CA15595000
|
heap
|
page read and write
|
||
38BDF7B000
|
stack
|
page read and write
|
||
172567B000
|
stack
|
page read and write
|
||
AEDE000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B41D8000
|
heap
|
page read and write
|
||
170242D4000
|
heap
|
page read and write
|
||
1E9A4276000
|
heap
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
B1DF000
|
stack
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
724FF7F000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1CA14AA4000
|
heap
|
page read and write
|
||
38BE67F000
|
stack
|
page read and write
|
||
1BCA2E00000
|
heap
|
page read and write
|
||
249B4802000
|
heap
|
page read and write
|
||
B51F2FE000
|
stack
|
page read and write
|
||
217F9B60000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B38B8000
|
heap
|
page read and write
|
||
512C000
|
stack
|
page read and write
|
||
1E9A423C000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
4E23000
|
heap
|
page read and write
|
||
724FC7B000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
19576702000
|
heap
|
page read and write
|
||
1CA1558A000
|
heap
|
page read and write
|
||
1BCA7CF2000
|
heap
|
page read and write
|
||
4E13000
|
direct allocation
|
page read and write
|
||
249B3670000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
1CA14A67000
|
heap
|
page read and write
|
||
5314000
|
trusted library allocation
|
page read and write
|
||
170242D0000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
217F8E40000
|
trusted library allocation
|
page read and write
|
||
3439000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
1F2D202A000
|
heap
|
page read and write
|
||
759D47E000
|
stack
|
page read and write
|
||
1E9A40C0000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5338000
|
trusted library allocation
|
page read and write
|
||
1725777000
|
stack
|
page read and write
|
||
1CA1556B000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
1BCA7E40000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7A10000
|
trusted library allocation
|
page read and write
|
||
1CA14AEF000
|
heap
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
34B2000
|
heap
|
page read and write
|
||
B51EFF8000
|
stack
|
page read and write
|
||
10089000
|
unkown
|
page read and write
|
||
1008C000
|
unkown
|
page readonly
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
B51F57F000
|
stack
|
page read and write
|
||
4DD3000
|
direct allocation
|
page read and write
|
||
249B4843000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
217F8D30000
|
heap
|
page read and write
|
||
1BCA7C13000
|
heap
|
page read and write
|
||
10072000
|
unkown
|
page readonly
|
||
5337000
|
trusted library allocation
|
page read and write
|
||
1E3F4285000
|
heap
|
page read and write
|
||
1B139B13000
|
heap
|
page read and write
|
||
1BCA7C3C000
|
heap
|
page read and write
|
||
1CA14AC3000
|
heap
|
page read and write
|
||
1E3F3F10000
|
heap
|
page read and write
|
||
1F2D2097000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10F3000
|
heap
|
page read and write
|
||
10085000
|
unkown
|
page read and write
|
||
1CA14A77000
|
heap
|
page read and write
|
||
1CA14AB5000
|
heap
|
page read and write
|
||
10089000
|
unkown
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA14B13000
|
heap
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
1CA155B0000
|
heap
|
page read and write
|
||
1CA14920000
|
heap
|
page read and write
|
||
217F8C7A000
|
heap
|
page read and write
|
||
1F2D1F10000
|
heap
|
page read and write
|
||
249B387C000
|
heap
|
page read and write
|
||
1BCA35D0000
|
trusted library section
|
page readonly
|
||
96A6FBE000
|
stack
|
page read and write
|
||
52E3000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA14B02000
|
heap
|
page read and write
|
||
249B38BC000
|
heap
|
page read and write
|
||
249B3680000
|
heap
|
page read and write
|
||
1CA14A5A000
|
heap
|
page read and write
|
||
B51F4FF000
|
stack
|
page read and write
|
||
5337000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
remote allocation
|
page read and write
|
||
1BCA2E15000
|
heap
|
page read and write
|
||
1CA1558E000
|
heap
|
page read and write
|
||
52A0000
|
remote allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
31E7000
|
heap
|
page read and write
|
||
17023850000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
19576671000
|
heap
|
page read and write
|
||
1CA1556E000
|
heap
|
page read and write
|
||
C49097F000
|
stack
|
page read and write
|
||
1CA1558E000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
217F9B80000
|
trusted library allocation
|
page read and write
|
||
F2A000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
B51F7FE000
|
stack
|
page read and write
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
1CA14A29000
|
heap
|
page read and write
|
||
2A5C13E0000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1BCA7CAC000
|
heap
|
page read and write
|
||
1CA1558A000
|
heap
|
page read and write
|
||
1CA14A66000
|
heap
|
page read and write
|
||
96A7278000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
19576500000
|
trusted library allocation
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA1559F000
|
heap
|
page read and write
|
||
1BCA7E60000
|
trusted library allocation
|
page read and write
|
||
30CB000
|
stack
|
page read and write
|
||
249B4854000
|
heap
|
page read and write
|
||
1CA14B16000
|
heap
|
page read and write
|
||
1CA15513000
|
heap
|
page read and write
|
||
249B4100000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
1BCA7B50000
|
trusted library allocation
|
page read and write
|
||
217F8C60000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1C922EBF000
|
heap
|
page read and write
|
||
4D7D000
|
stack
|
page read and write
|
||
B85A6FE000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
195763A0000
|
heap
|
page read and write
|
||
1F2D203C000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
1CA14B08000
|
heap
|
page read and write
|
||
B85A7FF000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA15590000
|
heap
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
1E9A4266000
|
heap
|
page read and write
|
||
1CA14AB2000
|
heap
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
1BCA7B3E000
|
trusted library allocation
|
page read and write
|
||
C49051B000
|
stack
|
page read and write
|
||
38BE57F000
|
unkown
|
page read and write
|
||
1CA152E0000
|
remote allocation
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
2A5C1530000
|
heap
|
page read and write
|
||
2E38000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
217F8C10000
|
heap
|
page read and write
|
||
AD1E000
|
trusted library allocation
|
page read and write
|
||
1CA15A00000
|
heap
|
page read and write
|
||
172547E000
|
stack
|
page read and write
|
||
1CA15402000
|
heap
|
page read and write
|
||
B25E000
|
stack
|
page read and write
|
||
DCA000
|
stack
|
page read and write
|
||
217F8E30000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
759D5FF000
|
stack
|
page read and write
|
||
B51F3FB000
|
stack
|
page read and write
|
||
52A0000
|
remote allocation
|
page read and write
|
||
AE9E000
|
stack
|
page read and write
|
||
3435000
|
heap
|
page read and write
|
||
1BCA7D02000
|
heap
|
page read and write
|
||
1BCA2413000
|
heap
|
page read and write
|
||
1F2D208C000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
1C922E97000
|
heap
|
page read and write
|
||
1BCA7B51000
|
trusted library allocation
|
page read and write
|
||
ED3000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B39BF000
|
heap
|
page read and write
|
||
724FD77000
|
stack
|
page read and write
|
||
1CA1550F000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
345A000
|
heap
|
page read and write
|
||
1BCA23D0000
|
trusted library section
|
page read and write
|
||
1CA155AD000
|
heap
|
page read and write
|
||
5A2787B000
|
stack
|
page read and write
|
||
1CA15A44000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA2F00000
|
heap
|
page read and write
|
||
1BCA7C9F000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B3FC0000
|
trusted library allocation
|
page read and write
|
||
EB9000
|
heap
|
page read and write
|
||
537F000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
17251DE000
|
stack
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
1C922EC1000
|
heap
|
page read and write
|
||
1CA1559C000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7E90000
|
remote allocation
|
page read and write
|
||
1E9A4060000
|
heap
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1E3F3F1B000
|
heap
|
page read and write
|
||
94B000
|
stack
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
249B38E1000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA15582000
|
heap
|
page read and write
|
||
1CA155D4000
|
heap
|
page read and write
|
||
347A000
|
heap
|
page read and write
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
EC4000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
217F8C18000
|
heap
|
page read and write
|
||
170239E5000
|
heap
|
page read and write
|
||
ABAA000
|
trusted library allocation
|
page read and write
|
||
135D000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
249B3846000
|
heap
|
page read and write
|
||
249B3861000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
322A000
|
heap
|
page read and write
|
||
38BDB8E000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA1558C000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10FD000
|
heap
|
page read and write
|
||
17023814000
|
heap
|
page read and write
|
||
17023793000
|
heap
|
page read and write
|
||
4BA2000
|
direct allocation
|
page read and write
|
||
B21E000
|
stack
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
759D37B000
|
stack
|
page read and write
|
||
17023761000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
249B3835000
|
heap
|
page read and write
|
||
1CA15562000
|
heap
|
page read and write
|
||
1B139A40000
|
heap
|
page read and write
|
||
1CA152E0000
|
remote allocation
|
page read and write
|
||
17023775000
|
heap
|
page read and write
|
||
AC3E000
|
trusted library allocation
|
page read and write
|
||
1CA1556A000
|
heap
|
page read and write
|
||
217F8C57000
|
heap
|
page read and write
|
||
249B415A000
|
heap
|
page read and write
|
||
38BDB0C000
|
stack
|
page read and write
|
||
38BDE7E000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
17023796000
|
heap
|
page read and write
|
||
2E9A57F000
|
stack
|
page read and write
|
||
19576390000
|
heap
|
page read and write
|
||
170242D7000
|
heap
|
page read and write
|
||
1E9A41C0000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
34B3000
|
heap
|
page read and write
|
||
B51F97B000
|
stack
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
1CA14AF6000
|
heap
|
page read and write
|
||
B85A77E000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA1556F000
|
heap
|
page read and write
|
||
1CA15594000
|
heap
|
page read and write
|
||
5A2734B000
|
stack
|
page read and write
|
||
2E9A47D000
|
stack
|
page read and write
|
||
85FF87E000
|
stack
|
page read and write
|
||
1CA14A69000
|
heap
|
page read and write
|
||
1CA15A03000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
5A27A7F000
|
stack
|
page read and write
|
||
759D57B000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
759CEFC000
|
stack
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
3435000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1C922E40000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
1CA15593000
|
heap
|
page read and write
|
||
10072000
|
unkown
|
page readonly
|
||
2A5C1560000
|
heap
|
page read and write
|
||
73B2E79000
|
stack
|
page read and write
|
||
170237B5000
|
heap
|
page read and write
|
||
1BCA2429000
|
heap
|
page read and write
|
||
1CA155A0000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1BCA7B70000
|
trusted library allocation
|
page read and write
|
||
73B2DFE000
|
stack
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
1C922E97000
|
heap
|
page read and write
|
||
1CA15582000
|
heap
|
page read and write
|
||
1CA14980000
|
heap
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
1E3F3E60000
|
heap
|
page read and write
|
||
1CA1558C000
|
heap
|
page read and write
|
||
17023730000
|
heap
|
page read and write
|
||
1CA15590000
|
heap
|
page read and write
|
||
1CA14A5B000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B4139000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7B30000
|
trusted library allocation
|
page read and write
|
||
1B139A80000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1BCA2441000
|
heap
|
page read and write
|
||
1E9A4302000
|
heap
|
page read and write
|
||
1CA152E0000
|
remote allocation
|
page read and write
|
||
EB1000
|
heap
|
page read and write
|
||
1CA1558A000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1B139B00000
|
heap
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
249B38D9000
|
heap
|
page read and write
|
||
1CA14A5C000
|
heap
|
page read and write
|
||
724FE7F000
|
stack
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
1BCA2F02000
|
heap
|
page read and write
|
||
2BFC000
|
stack
|
page read and write
|
||
1BCA34E0000
|
trusted library allocation
|
page read and write
|
||
1F2D2085000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
125D000
|
stack
|
page read and write
|
||
1F2D1FA0000
|
trusted library allocation
|
page read and write
|
||
1CA15A02000
|
heap
|
page read and write
|
||
32B3000
|
heap
|
page read and write
|
||
5A27C7F000
|
stack
|
page read and write
|
||
38BE3FF000
|
stack
|
page read and write
|
||
1BCA23C0000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
1BCA3990000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
1CA1556E000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
19576613000
|
heap
|
page read and write
|
||
1CA15A03000
|
heap
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
4C42000
|
direct allocation
|
page read and write
|
||
85FF97B000
|
stack
|
page read and write
|
||
249B4135000
|
heap
|
page read and write
|
||
3447000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7990000
|
trusted library allocation
|
page read and write
|
||
347A000
|
heap
|
page read and write
|
||
1CA1558A000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
217F9930000
|
trusted library allocation
|
page read and write
|
||
249B4137000
|
heap
|
page read and write
|
||
1CA155C6000
|
heap
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
3278000
|
heap
|
page read and write
|
||
5A27977000
|
stack
|
page read and write
|
||
217F8E39000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
1CA15584000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
217F8AD0000
|
heap
|
page read and write
|
||
249B39F5000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
ADDF000
|
stack
|
page read and write
|
||
96A72FF000
|
stack
|
page read and write
|
||
34CE000
|
heap
|
page read and write
|
||
1CA15568000
|
heap
|
page read and write
|
||
B51EBDB000
|
stack
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1E9A4A02000
|
trusted library allocation
|
page read and write
|
||
B09E000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
249B4900000
|
heap
|
page read and write
|
||
153B000
|
heap
|
page read and write
|
||
249B38FA000
|
heap
|
page read and write
|
||
249B480C000
|
heap
|
page read and write
|
||
1BCA3610000
|
trusted library section
|
page readonly
|
||
1F2D2000000
|
heap
|
page read and write
|
||
1CA15582000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA1556E000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
308C000
|
stack
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
C4909FF000
|
stack
|
page read and write
|
||
217F8C5E000
|
heap
|
page read and write
|
||
2A5C17D5000
|
heap
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7D00000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
1BCA7E90000
|
remote allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
5007000
|
trusted library allocation
|
page read and write
|
||
1CA15582000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
1CA155B5000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
170237CD000
|
heap
|
page read and write
|
||
249B4125000
|
heap
|
page read and write
|
||
1BCA3983000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1E9A4252000
|
heap
|
page read and write
|
||
1702382D000
|
heap
|
page read and write
|
||
249B39FD000
|
heap
|
page read and write
|
||
10085000
|
unkown
|
page read and write
|
||
2E9A5FF000
|
stack
|
page read and write
|
||
73B2D79000
|
stack
|
page read and write
|
||
249B3884000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1BCA35C0000
|
trusted library section
|
page readonly
|
||
85FF67B000
|
stack
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1CA155A5000
|
heap
|
page read and write
|
||
2E9A4FC000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA7CFD000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
17023830000
|
heap
|
page read and write
|
||
249B385F000
|
heap
|
page read and write
|
||
17023812000
|
heap
|
page read and write
|
||
1F2D2062000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10072000
|
unkown
|
page readonly
|
||
B51F0FA000
|
stack
|
page read and write
|
||
5A273CE000
|
stack
|
page read and write
|
||
1BCA2F18000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
1CA15550000
|
heap
|
page read and write
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1BCA7B60000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1957663C000
|
heap
|
page read and write
|
||
170237D9000
|
heap
|
page read and write
|
||
1303000
|
heap
|
page read and write
|
||
38BE2F7000
|
stack
|
page read and write
|
||
249B4819000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
1BCA248A000
|
heap
|
page read and write
|
||
759CACB000
|
stack
|
page read and write
|
||
1C922EA3000
|
heap
|
page read and write
|
||
AE5B000
|
stack
|
page read and write
|
||
17023814000
|
heap
|
page read and write
|
||
3439000
|
heap
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
17023814000
|
heap
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
B85A67B000
|
stack
|
page read and write
|
||
1CA155B2000
|
heap
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
1B1399D0000
|
trusted library allocation
|
page read and write
|
||
1702382D000
|
heap
|
page read and write
|
||
1BCA7E00000
|
trusted library allocation
|
page read and write
|
||
1CA155AC000
|
heap
|
page read and write
|
||
38BE1F9000
|
stack
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1C9230F5000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
1CA1558E000
|
heap
|
page read and write
|
||
1B139A02000
|
heap
|
page read and write
|
||
19576600000
|
heap
|
page read and write
|
||
249B383D000
|
heap
|
page read and write
|
||
85FF77E000
|
stack
|
page read and write
|
||
4DD2000
|
direct allocation
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
EB9000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
2E9A27E000
|
stack
|
page read and write
|
||
1CA1558D000
|
heap
|
page read and write
|
||
17023814000
|
heap
|
page read and write
|
||
1CA155B5000
|
heap
|
page read and write
|
||
1BCA2F13000
|
heap
|
page read and write
|
||
1CA15582000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1BCA2473000
|
heap
|
page read and write
|
||
3439000
|
heap
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
608F000
|
stack
|
page read and write
|
||
1C922E80000
|
heap
|
page read and write
|
||
1C922E92000
|
heap
|
page read and write
|
||
17023812000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
170235F0000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
96A73FC000
|
stack
|
page read and write
|
||
249B3863000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
724F7BE000
|
stack
|
page read and write
|
||
249B384C000
|
heap
|
page read and write
|
||
EBA000
|
heap
|
page read and write
|
||
4BA3000
|
direct allocation
|
page read and write
|
||
C4908FE000
|
stack
|
page read and write
|
||
1CA14A65000
|
heap
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
B51F87F000
|
stack
|
page read and write
|
||
1CA15589000
|
heap
|
page read and write
|
||
1CA15568000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
249B36D0000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1BCA2502000
|
heap
|
page read and write
|
||
D8C000
|
stack
|
page read and write
|
||
3426000
|
heap
|
page read and write
|
||
1CA1558E000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
B51F67E000
|
stack
|
page read and write
|
||
38BE07B000
|
stack
|
page read and write
|
||
10BA000
|
heap
|
page read and write
|
||
217F8E35000
|
heap
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
1C922E60000
|
heap
|
page read and write
|
||
10089000
|
unkown
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
1702379B000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
1CA14A60000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
249B3889000
|
heap
|
page read and write
|
||
1CA14A55000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4FFD000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
1CA1559B000
|
heap
|
page read and write
|
||
1CA1559F000
|
heap
|
page read and write
|
||
249B39ED000
|
heap
|
page read and write
|
||
34BC000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA1556B000
|
heap
|
page read and write
|
||
1BCA7CB8000
|
heap
|
page read and write
|
||
249B38E3000
|
heap
|
page read and write
|
||
3435000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1CA14910000
|
heap
|
page read and write
|
||
85FF11B000
|
stack
|
page read and write
|
||
249B4802000
|
heap
|
page read and write
|
||
1F2D2113000
|
heap
|
page read and write
|
||
1F2D205E000
|
heap
|
page read and write
|
||
170238C0000
|
remote allocation
|
page read and write
|
||
2A5C17D0000
|
heap
|
page read and write
|
||
2E9A37E000
|
stack
|
page read and write
|
||
1CA15593000
|
heap
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
1CA1558A000
|
heap
|
page read and write
|
||
249B3869000
|
heap
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
1C922D10000
|
heap
|
page read and write
|
||
EC4000
|
heap
|
page read and write
|
||
53C1000
|
trusted library allocation
|
page read and write
|
||
1BCA2330000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
249B4123000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
19576629000
|
heap
|
page read and write
|
||
17023812000
|
heap
|
page read and write
|
||
34BC000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
1BCA3980000
|
trusted library allocation
|
page read and write
|
||
217F8E10000
|
trusted library allocation
|
page read and write
|
||
1CA14A13000
|
heap
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
724FB7C000
|
stack
|
page read and write
|
||
1CA155B5000
|
heap
|
page read and write
|
||
1B13A202000
|
trusted library allocation
|
page read and write
|
||
345A000
|
heap
|
page read and write
|
||
3458000
|
heap
|
page read and write
|
||
1CA1559F000
|
heap
|
page read and write
|
||
19576676000
|
heap
|
page read and write
|
||
1CA15584000
|
heap
|
page read and write
|
||
96A6F3E000
|
stack
|
page read and write
|
||
2E9A3FB000
|
stack
|
page read and write
|
||
1BCA246E000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
10085000
|
unkown
|
page read and write
|
||
10089000
|
unkown
|
page read and write
|
||
5337000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
172587F000
|
stack
|
page read and write
|
||
1F2D2082000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
217F8DB0000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
759D27F000
|
stack
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
1CA15583000
|
heap
|
page read and write
|
||
1BCA24A0000
|
heap
|
page read and write
|
||
217F8DA0000
|
trusted library allocation
|
page read and write
|
||
1E9A4200000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
98B000
|
stack
|
page read and write
|
||
1F2D2069000
|
heap
|
page read and write
|
||
217F8D10000
|
heap
|
page read and write
|
||
32D5000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1F2D2100000
|
heap
|
page read and write
|
||
1BCA7C2B000
|
heap
|
page read and write
|
||
1CA14A63000
|
heap
|
page read and write
|
||
1BCA2320000
|
heap
|
page read and write
|
||
1CA1556C000
|
heap
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
1BCA3600000
|
trusted library section
|
page readonly
|
||
2E99FBA000
|
stack
|
page read and write
|
||
170239E0000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
1C9230F0000
|
heap
|
page read and write
|
||
19576708000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
1008C000
|
unkown
|
page readonly
|
||
30F0000
|
remote allocation
|
page read and write
|
||
1CA14A5E000
|
heap
|
page read and write
|
||
1E9A4260000
|
heap
|
page read and write
|
||
30F0000
|
remote allocation
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
249B4002000
|
heap
|
page read and write
|
||
1CA14AE4000
|
heap
|
page read and write
|
||
1CA1559B000
|
heap
|
page read and write
|
||
19576713000
|
heap
|
page read and write
|
||
170237BB000
|
heap
|
page read and write
|
||
217F8C20000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
1E9A4313000
|
heap
|
page read and write
|
There are 1002 hidden memdumps, click here to show them.