Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
lc4KFeS296.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xc128353e, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\lc4KFeS296.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\lc4KFeS296.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\lc4KFeS296.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LJYuxyMqHk\HxAOzCvVHW.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\lc4KFeS296.dll,DllUnregisterServer
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\lc4KFeS296.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\lc4KFeS296.dll",#1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/;
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://activity.windows.comt
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 38 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 2 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
2BB141A0000
|
direct allocation
|
page execute and read and write
|
||
2473DCB0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
13E0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
F2D000
|
heap
|
page read and write
|
||
1FF5C0AB000
|
heap
|
page read and write
|
||
174A5000000
|
heap
|
page read and write
|
||
174A5113000
|
heap
|
page read and write
|
||
2491C847000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
2491C855000
|
heap
|
page read and write
|
||
1FF5BDD1000
|
trusted library allocation
|
page read and write
|
||
174A5013000
|
heap
|
page read and write
|
||
1FF5BEE0000
|
trusted library allocation
|
page read and write
|
||
1FF5BE80000
|
trusted library allocation
|
page read and write
|
||
14D93C3C000
|
heap
|
page read and write
|
||
2491D1A8000
|
heap
|
page read and write
|
||
2491C8ED000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
8CBA0F9000
|
stack
|
page read and write
|
||
261CDBB000
|
stack
|
page read and write
|
||
B55177E000
|
stack
|
page read and write
|
||
65707C000
|
stack
|
page read and write
|
||
B55167F000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page readonly
|
||
268E7C3D000
|
heap
|
page read and write
|
||
450ED7C000
|
stack
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
24F85000000
|
heap
|
page read and write
|
||
1FF5BDB0000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
19267C2D000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
1FF5C0EF000
|
heap
|
page read and write
|
||
1FF5C220000
|
trusted library allocation
|
page read and write
|
||
2491D19E000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2491D603000
|
heap
|
page read and write
|
||
1FF56902000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
1322C800000
|
heap
|
page read and write
|
||
9DDED3E000
|
stack
|
page read and write
|
||
1B785A9C000
|
heap
|
page read and write
|
||
2491C913000
|
heap
|
page read and write
|
||
2491D1AC000
|
heap
|
page read and write
|
||
242E6402000
|
trusted library allocation
|
page read and write
|
||
14D93C76000
|
heap
|
page read and write
|
||
268E7C4E000
|
heap
|
page read and write
|
||
2F30000
|
remote allocation
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
656F7B000
|
stack
|
page read and write
|
||
268E7C40000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
2BB14330000
|
heap
|
page read and write
|
||
D9083B5000
|
stack
|
page read and write
|
||
8CBA17F000
|
stack
|
page read and write
|
||
1CB266A6000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
261D2FA000
|
stack
|
page read and write
|
||
1CB26690000
|
heap
|
page read and write
|
||
2491D175000
|
heap
|
page read and write
|
||
F80A479000
|
stack
|
page read and write
|
||
30254FE000
|
stack
|
page read and write
|
||
242E5F02000
|
heap
|
page read and write
|
||
2491D178000
|
heap
|
page read and write
|
||
A46418E000
|
stack
|
page read and write
|
||
1F9E4BFB000
|
heap
|
page read and write
|
||
1FF57102000
|
heap
|
page read and write
|
||
2473DBA6000
|
heap
|
page read and write
|
||
14D93C60000
|
heap
|
page read and write
|
||
1F9E4C16000
|
heap
|
page read and write
|
||
F8099CF000
|
stack
|
page read and write
|
||
2491D181000
|
heap
|
page read and write
|
||
2473DB7F000
|
heap
|
page read and write
|
||
1B785870000
|
trusted library allocation
|
page read and write
|
||
24F8505A000
|
heap
|
page read and write
|
||
1B7859A0000
|
heap
|
page read and write
|
||
BC257FF000
|
stack
|
page read and write
|
||
AF0000
|
remote allocation
|
page read and write
|
||
1B785C29000
|
heap
|
page read and write
|
||
8CB9DAE000
|
stack
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
2491C8FC000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1B785A58000
|
heap
|
page read and write
|
||
1B785C30000
|
trusted library allocation
|
page read and write
|
||
2491D1A9000
|
heap
|
page read and write
|
||
2491C8E7000
|
heap
|
page read and write
|
||
9DDF57F000
|
stack
|
page read and write
|
||
2473DB6E000
|
heap
|
page read and write
|
||
2491C916000
|
heap
|
page read and write
|
||
24F85029000
|
heap
|
page read and write
|
||
2491D175000
|
heap
|
page read and write
|
||
1555CB60000
|
heap
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
1FF57113000
|
heap
|
page read and write
|
||
2491D17C000
|
heap
|
page read and write
|
||
148F000
|
heap
|
page read and write
|
||
B5517FC000
|
stack
|
page read and write
|
||
268E7C2F000
|
heap
|
page read and write
|
||
2522F202000
|
trusted library allocation
|
page read and write
|
||
9DDF377000
|
stack
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
6F479FB000
|
stack
|
page read and write
|
||
2491C84D000
|
heap
|
page read and write
|
||
174A503C000
|
heap
|
page read and write
|
||
242E5F08000
|
heap
|
page read and write
|
||
1322C7D0000
|
remote allocation
|
page read and write
|
||
1322C902000
|
heap
|
page read and write
|
||
6567F9000
|
stack
|
page read and write
|
||
450E8FC000
|
stack
|
page read and write
|
||
9DDEDBE000
|
stack
|
page read and write
|
||
1FF5C0E8000
|
heap
|
page read and write
|
||
2491C848000
|
heap
|
page read and write
|
||
1FF56888000
|
heap
|
page read and write
|
||
2BB141D0000
|
heap
|
page readonly
|
||
2491D171000
|
heap
|
page read and write
|
||
2491D197000
|
heap
|
page read and write
|
||
1FF5BEF0000
|
trusted library allocation
|
page read and write
|
||
1FF56813000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
1555D532000
|
heap
|
page read and write
|
||
1FF5BF10000
|
remote allocation
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
6569FE000
|
stack
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
1FF5C0A1000
|
heap
|
page read and write
|
||
268E7C5A000
|
heap
|
page read and write
|
||
302507E000
|
stack
|
page read and write
|
||
242E5B90000
|
heap
|
page read and write
|
||
816E1FB000
|
stack
|
page read and write
|
||
6562FC000
|
stack
|
page read and write
|
||
1322C83D000
|
heap
|
page read and write
|
||
1CB269F0000
|
heap
|
page read and write
|
||
450EA7B000
|
stack
|
page read and write
|
||
2491D180000
|
heap
|
page read and write
|
||
1B785A9C000
|
heap
|
page read and write
|
||
1CB266D6000
|
heap
|
page read and write
|
||
BC2537E000
|
stack
|
page read and write
|
||
2491D1B9000
|
heap
|
page read and write
|
||
F809C7E000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2491D181000
|
heap
|
page read and write
|
||
1FF5C03E000
|
heap
|
page read and write
|
||
2491D17D000
|
heap
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
174A5028000
|
heap
|
page read and write
|
||
1322D002000
|
trusted library allocation
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
242E5F13000
|
heap
|
page read and write
|
||
2491C902000
|
heap
|
page read and write
|
||
268E7C13000
|
heap
|
page read and write
|
||
14D93D08000
|
heap
|
page read and write
|
||
1FF56873000
|
heap
|
page read and write
|
||
2BB12850000
|
heap
|
page read and write
|
||
A4647F7000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1555D330000
|
trusted library allocation
|
page read and write
|
||
1474000
|
heap
|
page read and write
|
||
450E5FC000
|
stack
|
page read and write
|
||
2491C8C8000
|
heap
|
page read and write
|
||
174A5075000
|
heap
|
page read and write
|
||
2491D1A8000
|
heap
|
page read and write
|
||
B5516FF000
|
stack
|
page read and write
|
||
1CB266D6000
|
heap
|
page read and write
|
||
2491D171000
|
heap
|
page read and write
|
||
1FF5BED0000
|
trusted library allocation
|
page read and write
|
||
816E9FE000
|
stack
|
page read and write
|
||
1FF5C0ED000
|
heap
|
page read and write
|
||
268E7C2D000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
6568FA000
|
stack
|
page read and write
|
||
2491D1AC000
|
heap
|
page read and write
|
||
2491D19F000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1F9E7E90000
|
trusted library allocation
|
page read and write
|
||
6F476FB000
|
stack
|
page read and write
|
||
A68F6B000
|
stack
|
page read and write
|
||
D90877E000
|
stack
|
page read and write
|
||
2491C851000
|
heap
|
page read and write
|
||
242E5E4D000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2491D178000
|
heap
|
page read and write
|
||
1FF57159000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2814000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
2491C829000
|
heap
|
page read and write
|
||
2BB12889000
|
heap
|
page read and write
|
||
2491D17C000
|
heap
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
1FF56907000
|
heap
|
page read and write
|
||
2522EB13000
|
heap
|
page read and write
|
||
2522EB00000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2491C908000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
2491D1B1000
|
heap
|
page read and write
|
||
1CB266D6000
|
heap
|
page read and write
|
||
E509FCE000
|
stack
|
page read and write
|
||
1555CBD0000
|
heap
|
page read and write
|
||
1F9E4C00000
|
heap
|
page read and write
|
||
2491D175000
|
heap
|
page read and write
|
||
1B785A94000
|
heap
|
page read and write
|
||
2D5B000
|
stack
|
page read and write
|
||
1FF568AB000
|
heap
|
page read and write
|
||
2522EA5E000
|
heap
|
page read and write
|
||
2491D195000
|
heap
|
page read and write
|
||
450E77E000
|
stack
|
page read and write
|
||
1F9E8690000
|
heap
|
page read and write
|
||
1F9E4C16000
|
heap
|
page read and write
|
||
2F30000
|
remote allocation
|
page read and write
|
||
1F9E4D75000
|
heap
|
page read and write
|
||
2522E8D0000
|
heap
|
page read and write
|
||
1CB266B7000
|
heap
|
page read and write
|
||
2491C8B6000
|
heap
|
page read and write
|
||
268E7C3B000
|
heap
|
page read and write
|
||
24F84DB0000
|
heap
|
page read and write
|
||
1F9E4B90000
|
heap
|
page read and write
|
||
2491C86F000
|
heap
|
page read and write
|
||
2BB12880000
|
heap
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
2491D600000
|
heap
|
page read and write
|
||
1555CC13000
|
heap
|
page read and write
|
||
2473DBC1000
|
heap
|
page read and write
|
||
2BB128BD000
|
heap
|
page read and write
|
||
1F9E4B70000
|
heap
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
2BB128B1000
|
heap
|
page read and write
|
||
2491D178000
|
heap
|
page read and write
|
||
1CB269F5000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2491D1A9000
|
heap
|
page read and write
|
||
2491C6F0000
|
heap
|
page read and write
|
||
1B785860000
|
heap
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
242E5E00000
|
heap
|
page read and write
|
||
2522EA13000
|
heap
|
page read and write
|
||
D9086FE000
|
stack
|
page read and write
|
||
1FF5C0AE000
|
heap
|
page read and write
|
||
1FF5BDB0000
|
trusted library allocation
|
page read and write
|
||
1CB266A1000
|
heap
|
page read and write
|
||
24F85076000
|
heap
|
page read and write
|
||
268E7C7F000
|
heap
|
page read and write
|
||
2491D178000
|
heap
|
page read and write
|
||
2F30000
|
remote allocation
|
page read and write
|
||
268E7C62000
|
heap
|
page read and write
|
||
1B786570000
|
trusted library allocation
|
page read and write
|
||
450E1EC000
|
stack
|
page read and write
|
||
9DDECBB000
|
stack
|
page read and write
|
||
268E7C61000
|
heap
|
page read and write
|
||
1F9E4D70000
|
heap
|
page read and write
|
||
A693FC000
|
stack
|
page read and write
|
||
1FF5BF10000
|
trusted library allocation
|
page read and write
|
||
2491D195000
|
heap
|
page read and write
|
||
2473DB30000
|
heap
|
page read and write
|
||
174A4EA0000
|
heap
|
page read and write
|
||
1F9E4BD8000
|
heap
|
page read and write
|
||
1FF56886000
|
heap
|
page read and write
|
||
268E7C58000
|
heap
|
page read and write
|
||
1FF5683D000
|
heap
|
page read and write
|
||
2491C7F0000
|
remote allocation
|
page read and write
|
||
1FF5BC20000
|
trusted library allocation
|
page read and write
|
||
2522EB02000
|
heap
|
page read and write
|
||
14D93D00000
|
heap
|
page read and write
|
||
1FF5BDD4000
|
trusted library allocation
|
page read and write
|
||
268E7C64000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
24F85040000
|
heap
|
page read and write
|
||
F80A1FB000
|
stack
|
page read and write
|
||
1FF567F3000
|
trusted library allocation
|
page read and write
|
||
1FF5C0F7000
|
heap
|
page read and write
|
||
268E7B10000
|
heap
|
page read and write
|
||
2491D19B000
|
heap
|
page read and write
|
||
2491D11C000
|
heap
|
page read and write
|
||
1CB266CE000
|
heap
|
page read and write
|
||
2CDC000
|
stack
|
page read and write
|
||
1F9E4BEA000
|
heap
|
page read and write
|
||
A6947E000
|
stack
|
page read and write
|
||
1B7867C0000
|
heap
|
page readonly
|
||
1FF5BCA0000
|
trusted library allocation
|
page read and write
|
||
2BB14190000
|
direct allocation
|
page execute and read and write
|
||
1CB266C0000
|
heap
|
page read and write
|
||
14D93C00000
|
heap
|
page read and write
|
||
2491C8B2000
|
heap
|
page read and write
|
||
174A5002000
|
heap
|
page read and write
|
||
1FF5C0FE000
|
heap
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
1FF5C02B000
|
heap
|
page read and write
|
||
A696FE000
|
stack
|
page read and write
|
||
2491C813000
|
heap
|
page read and write
|
||
2473DB92000
|
heap
|
page read and write
|
||
1F9E4A30000
|
heap
|
page read and write
|
||
2491D17C000
|
heap
|
page read and write
|
||
1FF5BDD0000
|
trusted library allocation
|
page read and write
|
||
2491D1CC000
|
heap
|
page read and write
|
||
1FF56FF0000
|
trusted library allocation
|
page read and write
|
||
F80A37F000
|
unkown
|
page read and write
|
||
14D93C29000
|
heap
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
242E5DD0000
|
trusted library allocation
|
page read and write
|
||
268E7C63000
|
heap
|
page read and write
|
||
268E7C29000
|
heap
|
page read and write
|
||
2522EA29000
|
heap
|
page read and write
|
||
1FF5BF10000
|
remote allocation
|
page read and write
|
||
14D93C74000
|
heap
|
page read and write
|
||
816E7FE000
|
stack
|
page read and write
|
||
268E7AA0000
|
heap
|
page read and write
|
||
242E5C00000
|
heap
|
page read and write
|
||
1555CC88000
|
heap
|
page read and write
|
||
2522EA3C000
|
heap
|
page read and write
|
||
450E9FD000
|
stack
|
page read and write
|
||
24F8507C000
|
heap
|
page read and write
|
||
242E5E55000
|
heap
|
page read and write
|
||
1CB26620000
|
heap
|
page read and write
|
||
1555CC6A000
|
heap
|
page read and write
|
||
1CB2669B000
|
heap
|
page read and write
|
||
1CB266C0000
|
heap
|
page read and write
|
||
1CB266B4000
|
heap
|
page read and write
|
||
268E7C68000
|
heap
|
page read and write
|
||
1F9E7E80000
|
heap
|
page read and write
|
||
261D1FE000
|
stack
|
page read and write
|
||
2491D199000
|
heap
|
page read and write
|
||
1FF5C09C000
|
heap
|
page read and write
|
||
14D93D02000
|
heap
|
page read and write
|
||
268E7C7C000
|
heap
|
page read and write
|
||
1FF5C0FA000
|
heap
|
page read and write
|
||
1322C640000
|
heap
|
page read and write
|
||
2491D19B000
|
heap
|
page read and write
|
||
2491D175000
|
heap
|
page read and write
|
||
2491C8A5000
|
heap
|
page read and write
|
||
24F85113000
|
heap
|
page read and write
|
||
9DDF1FB000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
6F478FE000
|
stack
|
page read and write
|
||
816E5FF000
|
stack
|
page read and write
|
||
450EE7F000
|
stack
|
page read and write
|
||
2491C7F0000
|
remote allocation
|
page read and write
|
||
268E7C65000
|
heap
|
page read and write
|
||
A46447E000
|
stack
|
page read and write
|
||
A6967D000
|
stack
|
page read and write
|
||
2522EA8A000
|
heap
|
page read and write
|
||
1CB26600000
|
heap
|
page read and write
|
||
1FF5C000000
|
heap
|
page read and write
|
||
F809EF7000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
268E8270000
|
trusted library allocation
|
page read and write
|
||
2491D16F000
|
heap
|
page read and write
|
||
268E7C46000
|
heap
|
page read and write
|
||
24F85069000
|
heap
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
242E5F00000
|
heap
|
page read and write
|
||
2473DC90000
|
direct allocation
|
page execute and read and write
|
||
1B785C25000
|
heap
|
page read and write
|
||
A4649FF000
|
stack
|
page read and write
|
||
AC5000
|
stack
|
page read and write
|
||
1555D500000
|
heap
|
page read and write
|
||
268E7C32000
|
heap
|
page read and write
|
||
1FF568F8000
|
heap
|
page read and write
|
||
1FF566F0000
|
heap
|
page read and write
|
||
D9087FE000
|
stack
|
page read and write
|
||
14D93B80000
|
heap
|
page read and write
|
||
268E7C5C000
|
heap
|
page read and write
|
||
1FF5BDF4000
|
trusted library allocation
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
1275000
|
stack
|
page read and write
|
||
1FF5C200000
|
trusted library allocation
|
page read and write
|
||
2BB14334000
|
heap
|
page read and write
|
||
1322C854000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1FF5BDE0000
|
trusted library allocation
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
2522EA27000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F9E4BF2000
|
heap
|
page read and write
|
||
2491D17C000
|
heap
|
page read and write
|
||
2522EA00000
|
heap
|
page read and write
|
||
2491D17D000
|
heap
|
page read and write
|
||
268E7D02000
|
heap
|
page read and write
|
||
242E5E8B000
|
heap
|
page read and write
|
||
268E7C49000
|
heap
|
page read and write
|
||
14D94402000
|
trusted library allocation
|
page read and write
|
||
2522EA64000
|
heap
|
page read and write
|
||
242E5E3C000
|
heap
|
page read and write
|
||
2491D175000
|
heap
|
page read and write
|
||
1FF5688D000
|
heap
|
page read and write
|
||
1FF57000000
|
heap
|
page read and write
|
||
268E7C44000
|
heap
|
page read and write
|
||
1B785A40000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
1FF5BF00000
|
trusted library allocation
|
page read and write
|
||
F80A2FA000
|
stack
|
page read and write
|
||
174A507F000
|
heap
|
page read and write
|
||
2491D182000
|
heap
|
page read and write
|
||
B55187E000
|
stack
|
page read and write
|
||
2491D1BF000
|
heap
|
page read and write
|
||
6566F7000
|
stack
|
page read and write
|
||
2473DD25000
|
heap
|
page read and write
|
||
1F9E4BEA000
|
heap
|
page read and write
|
||
1F9E4BED000
|
heap
|
page read and write
|
||
1B7867E0000
|
trusted library allocation
|
page read and write
|
||
1555CD13000
|
heap
|
page read and write
|
||
2473DB8D000
|
heap
|
page read and write
|
||
261D179000
|
stack
|
page read and write
|
||
2491D123000
|
heap
|
page read and write
|
||
2522EA02000
|
heap
|
page read and write
|
||
F2D000
|
heap
|
page read and write
|
||
65727F000
|
stack
|
page read and write
|
||
2473DCA4000
|
heap
|
page read and write
|
||
602F3AD000
|
stack
|
page read and write
|
||
2491D176000
|
heap
|
page read and write
|
||
1CB266B2000
|
heap
|
page read and write
|
||
3024D6B000
|
stack
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
1FF56914000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
2491D197000
|
heap
|
page read and write
|
||
1FF5BDBE000
|
trusted library allocation
|
page read and write
|
||
2491D1C9000
|
heap
|
page read and write
|
||
2491D621000
|
heap
|
page read and write
|
||
2491D17C000
|
heap
|
page read and write
|
||
1F9E4BE6000
|
heap
|
page read and write
|
||
1FF566E0000
|
heap
|
page read and write
|
||
2473D9C0000
|
heap
|
page read and write
|
||
14D93C13000
|
heap
|
page read and write
|
||
816EAFF000
|
stack
|
page read and write
|
||
24F84DC0000
|
heap
|
page read and write
|
||
1CB266A6000
|
heap
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
2491D1A8000
|
heap
|
page read and write
|
||
268E7C78000
|
heap
|
page read and write
|
||
1555CB70000
|
heap
|
page read and write
|
||
1FF567F0000
|
trusted library allocation
|
page read and write
|
||
1B785A9C000
|
heap
|
page read and write
|
||
1FF57118000
|
heap
|
page read and write
|
||
1FF56750000
|
heap
|
page read and write
|
||
268E7C6E000
|
heap
|
page read and write
|
||
24F85087000
|
heap
|
page read and write
|
||
14D93B90000
|
heap
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
174A5660000
|
trusted library allocation
|
page read and write
|
||
14D93C53000
|
heap
|
page read and write
|
||
1FF5C04B000
|
heap
|
page read and write
|
||
2491C750000
|
heap
|
page read and write
|
||
1555CCC5000
|
heap
|
page read and write
|
||
1FF56829000
|
heap
|
page read and write
|
||
1F9E4BF3000
|
heap
|
page read and write
|
||
24F85102000
|
heap
|
page read and write
|
||
1FF5BEC0000
|
trusted library allocation
|
page read and write
|
||
2491D154000
|
heap
|
page read and write
|
||
2473DB8D000
|
heap
|
page read and write
|
||
268E7C41000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1F9E4BFA000
|
heap
|
page read and write
|
||
19267C20000
|
heap
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
1322C7D0000
|
remote allocation
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
A692FE000
|
stack
|
page read and write
|
||
2BB142F0000
|
heap
|
page read and write
|
||
1322C630000
|
heap
|
page read and write
|
||
2522EA49000
|
heap
|
page read and write
|
||
242E5E29000
|
heap
|
page read and write
|
||
1FF56876000
|
heap
|
page read and write
|
||
1FF5C0F5000
|
heap
|
page read and write
|
||
1FF56856000
|
heap
|
page read and write
|
||
14D93C81000
|
heap
|
page read and write
|
||
2BB128AB000
|
heap
|
page read and write
|
||
2491D179000
|
heap
|
page read and write
|
||
A46457B000
|
stack
|
page read and write
|
||
242E5E13000
|
heap
|
page read and write
|
||
2473DC30000
|
heap
|
page read and write
|
||
F809FF7000
|
stack
|
page read and write
|
||
1555D402000
|
heap
|
page read and write
|
||
2491C800000
|
heap
|
page read and write
|
||
F80994B000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1B785A30000
|
trusted library allocation
|
page read and write
|
||
174A4E90000
|
heap
|
page read and write
|
||
1FF5C0D7000
|
heap
|
page read and write
|
||
268E8402000
|
trusted library allocation
|
page read and write
|
||
268E7C60000
|
heap
|
page read and write
|
||
1555CCBB000
|
heap
|
page read and write
|
||
1B7867B0000
|
trusted library allocation
|
page read and write
|
||
A4646FE000
|
stack
|
page read and write
|
||
174A5100000
|
heap
|
page read and write
|
||
F80A0FE000
|
stack
|
page read and write
|
||
268E7C6C000
|
heap
|
page read and write
|
||
E509F4E000
|
stack
|
page read and write
|
||
174A507F000
|
heap
|
page read and write
|
||
2491C850000
|
heap
|
page read and write
|
||
1555CCEA000
|
heap
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
1FF5686C000
|
heap
|
page read and write
|
||
2BB128CA000
|
heap
|
page read and write
|
||
1FF57015000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
2491D1A8000
|
heap
|
page read and write
|
||
2491D181000
|
heap
|
page read and write
|
||
AF0000
|
remote allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
1FF5C102000
|
heap
|
page read and write
|
||
1B785A60000
|
heap
|
page read and write
|
||
24F85013000
|
heap
|
page read and write
|
||
2BB12710000
|
heap
|
page read and write
|
||
2473DCA0000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
E50000
|
direct allocation
|
page execute and read and write
|
||
268E7C45000
|
heap
|
page read and write
|
||
2491D002000
|
heap
|
page read and write
|
||
816EBFF000
|
stack
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
2522EA80000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
30253F7000
|
stack
|
page read and write
|
||
242E5E4A000
|
heap
|
page read and write
|
||
1322C7A0000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
1FF57002000
|
heap
|
page read and write
|
||
1FF5C061000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
14D94350000
|
trusted library allocation
|
page read and write
|
||
242E5E50000
|
heap
|
page read and write
|
||
2491D175000
|
heap
|
page read and write
|
||
2473DD20000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
1F9E4BF2000
|
heap
|
page read and write
|
||
2491C853000
|
heap
|
page read and write
|
||
174A5102000
|
heap
|
page read and write
|
||
2522EA53000
|
heap
|
page read and write
|
||
BC254FE000
|
stack
|
page read and write
|
||
1B7867D0000
|
trusted library allocation
|
page read and write
|
||
174A5056000
|
heap
|
page read and write
|
||
2491D18D000
|
heap
|
page read and write
|
||
EDC000
|
heap
|
page read and write
|
||
BC255FE000
|
stack
|
page read and write
|
||
1F9E4BF2000
|
heap
|
page read and write
|
||
1555CC3D000
|
heap
|
page read and write
|
||
1FF5C01D000
|
heap
|
page read and write
|
||
1FF577E0000
|
trusted library allocation
|
page read and write
|
||
B5513D5000
|
stack
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
1FF57100000
|
heap
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
1FF5BF10000
|
remote allocation
|
page read and write
|
||
E509ECB000
|
stack
|
page read and write
|
||
1FF5BDE0000
|
trusted library allocation
|
page read and write
|
||
2491C849000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
14D93C74000
|
heap
|
page read and write
|
||
1FF56899000
|
heap
|
page read and write
|
||
8CBA27C000
|
stack
|
page read and write
|
||
816DD8B000
|
stack
|
page read and write
|
||
2491D197000
|
heap
|
page read and write
|
||
19267B60000
|
heap
|
page read and write
|
||
14D93C66000
|
heap
|
page read and write
|
||
1555CD02000
|
heap
|
page read and write
|
||
BC256FF000
|
stack
|
page read and write
|
||
174A5079000
|
heap
|
page read and write
|
||
1FF5BC90000
|
trusted library allocation
|
page read and write
|
||
2473DC70000
|
heap
|
page read and write
|
||
F2D000
|
heap
|
page read and write
|
||
174A5802000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
1F9E4D10000
|
heap
|
page read and write
|
||
339B000
|
stack
|
page read and write
|
||
2BB129C5000
|
heap
|
page read and write
|
||
1FF56871000
|
heap
|
page read and write
|
||
1CB266C0000
|
heap
|
page read and write
|
||
2491C889000
|
heap
|
page read and write
|
||
24F84E20000
|
heap
|
page read and write
|
||
1FF5C00F000
|
heap
|
page read and write
|
||
2F44000
|
heap
|
page read and write
|
||
1322C6A0000
|
heap
|
page read and write
|
||
1FF5C0F4000
|
heap
|
page read and write
|
||
1F9E4BD0000
|
heap
|
page read and write
|
||
1555CC00000
|
heap
|
page read and write
|
||
1B785C20000
|
heap
|
page read and write
|
||
D90867E000
|
stack
|
page read and write
|
||
1FF56780000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
656AFB000
|
stack
|
page read and write
|
||
13D0000
|
direct allocation
|
page execute and read and write
|
||
30255FF000
|
stack
|
page read and write
|
||
2BB14170000
|
heap
|
page read and write
|
||
1FF5C0FB000
|
heap
|
page read and write
|
||
2491C6E0000
|
heap
|
page read and write
|
||
174A4F00000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
816E3FC000
|
stack
|
page read and write
|
||
2491D18D000
|
heap
|
page read and write
|
||
2522E930000
|
heap
|
page read and write
|
||
1CB266B6000
|
heap
|
page read and write
|
||
1FF5BE80000
|
trusted library allocation
|
page read and write
|
||
2491C8C1000
|
heap
|
page read and write
|
||
268E7C76000
|
heap
|
page read and write
|
||
1555CCCC000
|
heap
|
page read and write
|
||
1FF5C102000
|
heap
|
page read and write
|
||
6F477FE000
|
stack
|
page read and write
|
||
1FF5C0FE000
|
heap
|
page read and write
|
||
24F84FF0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page readonly
|
||
9DDF47C000
|
stack
|
page read and write
|
||
242E5BA0000
|
heap
|
page read and write
|
||
19267A20000
|
heap
|
page read and write
|
||
2491C84C000
|
heap
|
page read and write
|
||
242E5E70000
|
heap
|
page read and write
|
||
2491D11A000
|
heap
|
page read and write
|
||
2491D197000
|
heap
|
page read and write
|
||
1FF568F8000
|
heap
|
page read and write
|
||
14D93BF0000
|
heap
|
page read and write
|
||
1CB266CD000
|
heap
|
page read and write
|
||
242E5E7E000
|
heap
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2491D1A8000
|
heap
|
page read and write
|
||
1FF56854000
|
heap
|
page read and write
|
||
268E7C5F000
|
heap
|
page read and write
|
||
242E5E2C000
|
heap
|
page read and write
|
||
3024DEE000
|
stack
|
page read and write
|
||
A697FD000
|
stack
|
page read and write
|
||
1322C802000
|
heap
|
page read and write
|
||
2491D178000
|
heap
|
page read and write
|
||
24F85002000
|
heap
|
page read and write
|
||
1322C813000
|
heap
|
page read and write
|
||
1FF5C0DE000
|
heap
|
page read and write
|
||
2491D19B000
|
heap
|
page read and write
|
||
1FF57C20000
|
trusted library allocation
|
page read and write
|
||
1322C829000
|
heap
|
page read and write
|
||
1FF57118000
|
heap
|
page read and write
|
||
6F471FB000
|
stack
|
page read and write
|
||
2473DB00000
|
heap
|
page read and write
|
||
1CB266D6000
|
heap
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
2491C8DA000
|
heap
|
page read and write
|
||
2491D100000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
B5518FC000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
A46410B000
|
stack
|
page read and write
|
||
2522E960000
|
trusted library allocation
|
page read and write
|
||
1FF56800000
|
heap
|
page read and write
|
||
30252FE000
|
stack
|
page read and write
|
||
2491C7F0000
|
remote allocation
|
page read and write
|
||
F809DFE000
|
stack
|
page read and write
|
||
1FF57159000
|
heap
|
page read and write
|
||
268E7C57000
|
heap
|
page read and write
|
||
450EC7E000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
2491D166000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2473F690000
|
heap
|
page read and write
|
||
1FF56902000
|
heap
|
page read and write
|
||
2491D14D000
|
heap
|
page read and write
|
||
2BB128CA000
|
heap
|
page read and write
|
||
8CB9D2A000
|
stack
|
page read and write
|
||
2491C854000
|
heap
|
page read and write
|
||
2473DB7F000
|
heap
|
page read and write
|
||
24F85074000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
268E7C00000
|
heap
|
page read and write
|
||
1FF5BDB8000
|
trusted library allocation
|
page read and write
|
||
1FF568A4000
|
heap
|
page read and write
|
||
268E7C42000
|
heap
|
page read and write
|
||
2491D1D3000
|
heap
|
page read and write
|
||
1FF5BEA0000
|
trusted library allocation
|
page read and write
|
||
2BB12980000
|
heap
|
page read and write
|
||
2522E8C0000
|
heap
|
page read and write
|
||
268E7C6A000
|
heap
|
page read and write
|
||
261D27E000
|
stack
|
page read and write
|
||
2491C83C000
|
heap
|
page read and write
|
||
2522EB08000
|
heap
|
page read and write
|
||
816E8FF000
|
stack
|
page read and write
|
||
14D93D13000
|
heap
|
page read and write
|
||
8CBA1FE000
|
stack
|
page read and write
|
||
1B785ABC000
|
heap
|
page read and write
|
||
2491D1DA000
|
heap
|
page read and write
|
||
1B786830000
|
trusted library allocation
|
page read and write
|
||
F46000
|
heap
|
page read and write
|
||
2491D197000
|
heap
|
page read and write
|
||
2491D199000
|
heap
|
page read and write
|
||
BC2527B000
|
stack
|
page read and write
|
||
2491D199000
|
heap
|
page read and write
|
||
268E7AB0000
|
heap
|
page read and write
|
||
1B785A50000
|
heap
|
page read and write
|
||
A4648FE000
|
stack
|
page read and write
|
||
1FF5BDF0000
|
trusted library allocation
|
page read and write
|
||
2491D193000
|
heap
|
page read and write
|
||
2491D1A8000
|
heap
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
BC252FE000
|
stack
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
1F9E4D7B000
|
heap
|
page read and write
|
||
1B786560000
|
trusted library allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2BB128BA000
|
heap
|
page read and write
|
||
2473DCE0000
|
heap
|
page readonly
|
||
2BB129C0000
|
heap
|
page read and write
|
||
24F85602000
|
trusted library allocation
|
page read and write
|
||
1FF5BE80000
|
trusted library allocation
|
page read and write
|
||
9DDF27E000
|
stack
|
page read and write
|
||
2BB128CA000
|
heap
|
page read and write
|
||
268E7C85000
|
heap
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
816E6FD000
|
stack
|
page read and write
|
||
1FF5BDF0000
|
trusted library allocation
|
page read and write
|
||
2491C856000
|
heap
|
page read and write
|
||
1CB265A0000
|
heap
|
page read and write
|
||
2491C84A000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
450E87E000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
8CBA07E000
|
stack
|
page read and write
|
||
816E2FE000
|
stack
|
page read and write
|
||
1B7859C0000
|
heap
|
page read and write
|
||
2491C780000
|
trusted library allocation
|
page read and write
|
||
2491C8AC000
|
heap
|
page read and write
|
||
174A5067000
|
heap
|
page read and write
|
||
450EB7C000
|
stack
|
page read and write
|
||
A46467B000
|
stack
|
page read and write
|
||
1F9E7E83000
|
heap
|
page read and write
|
||
302527B000
|
stack
|
page read and write
|
||
1555CC29000
|
heap
|
page read and write
|
||
2473DB37000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1FF57104000
|
heap
|
page read and write
|
||
1322C7D0000
|
remote allocation
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
9DDF67E000
|
stack
|
page read and write
|
||
268E7C59000
|
heap
|
page read and write
|
||
2491D602000
|
heap
|
page read and write
|
||
242E5E02000
|
heap
|
page read and write
|
There are 734 hidden memdumps, click here to show them.