Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Xp7X1Yf3CM.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xd3505601, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\Xp7X1Yf3CM.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\Xp7X1Yf3CM.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Xp7X1Yf3CM.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KWKbQi\AfskRqPguzooU.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Xp7X1Yf3CM.dll,DllUnregisterServer
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\Xp7X1Yf3CM.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Xp7X1Yf3CM.dll",#1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/efault3
|
unknown
|
||
https://23.239.0.12/g
|
unknown
|
||
https://23.239.0.12/Q
|
unknown
|
||
https://23.239.0.12//
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 39 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
1EAA8F30000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
20D0000
|
direct allocation
|
page execute and read and write
|
||
24D00000000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
4E0000
|
direct allocation
|
page execute and read and write
|
||
1CF4FE60000
|
trusted library allocation
|
page read and write
|
||
1E713862000
|
heap
|
page read and write
|
||
1F549100000
|
heap
|
page read and write
|
||
1F0576BB000
|
heap
|
page read and write
|
||
1C289960000
|
heap
|
page read and write
|
||
22C232BD000
|
heap
|
page read and write
|
||
2A478D20000
|
heap
|
page read and write
|
||
2BAA0E80000
|
heap
|
page read and write
|
||
2A479030000
|
trusted library allocation
|
page read and write
|
||
1CF4A68A000
|
heap
|
page read and write
|
||
2A01EF7B000
|
heap
|
page read and write
|
||
1803DC41000
|
heap
|
page read and write
|
||
2323A602000
|
heap
|
page read and write
|
||
2594BA70000
|
heap
|
page read and write
|
||
3506E7D000
|
stack
|
page read and write
|
||
2594BA3C000
|
heap
|
page read and write
|
||
1F057600000
|
heap
|
page read and write
|
||
17583271000
|
heap
|
page read and write
|
||
2153F9C0000
|
heap
|
page read and write
|
||
1E71385F000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
17583BA2000
|
heap
|
page read and write
|
||
2A479020000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
17583B1D000
|
heap
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
DC0C8FD000
|
stack
|
page read and write
|
||
1803DC66000
|
heap
|
page read and write
|
||
2A01EFFC000
|
heap
|
page read and write
|
||
1803DC49000
|
heap
|
page read and write
|
||
2594BA24000
|
heap
|
page read and write
|
||
2323A65C000
|
heap
|
page read and write
|
||
2A01F7F2000
|
heap
|
page read and write
|
||
2153FC7B000
|
heap
|
page read and write
|
||
17583B7D000
|
heap
|
page read and write
|
||
17EA3350000
|
heap
|
page read and write
|
||
22C232C2000
|
heap
|
page read and write
|
||
17583B83000
|
heap
|
page read and write
|
||
1C289950000
|
heap
|
page read and write
|
||
1CF4FC1F000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
1C289B02000
|
heap
|
page read and write
|
||
1F548A3C000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
4FFC7B000
|
stack
|
page read and write
|
||
B3F52FB000
|
stack
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
1803DC6D000
|
heap
|
page read and write
|
||
1803DC7E000
|
heap
|
page read and write
|
||
2A01EF41000
|
heap
|
page read and write
|
||
1CF4A63C000
|
heap
|
page read and write
|
||
B3F4EFE000
|
stack
|
page read and write
|
||
1033BFE000
|
stack
|
page read and write
|
||
5D1000
|
heap
|
page read and write
|
||
22C232BD000
|
heap
|
page read and write
|
||
1803DC7A000
|
heap
|
page read and write
|
||
175832EB000
|
heap
|
page read and write
|
||
2A01EF90000
|
heap
|
page read and write
|
||
1CF4FC11000
|
heap
|
page read and write
|
||
4800FA000
|
stack
|
page read and write
|
||
17583B9C000
|
heap
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
17583BCC000
|
heap
|
page read and write
|
||
1803DAD0000
|
heap
|
page read and write
|
||
2594BA00000
|
heap
|
page read and write
|
||
2323A600000
|
heap
|
page read and write
|
||
183A3C5B000
|
heap
|
page read and write
|
||
1803DD02000
|
heap
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
1682A648000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
17584002000
|
heap
|
page read and write
|
||
17583BBB000
|
heap
|
page read and write
|
||
1F057510000
|
heap
|
page read and write
|
||
183A3D02000
|
heap
|
page read and write
|
||
1803DC54000
|
heap
|
page read and write
|
||
183A3C00000
|
heap
|
page read and write
|
||
17583B8D000
|
heap
|
page read and write
|
||
FA409DC000
|
stack
|
page read and write
|
||
1F548A37000
|
heap
|
page read and write
|
||
4FF7F7000
|
stack
|
page read and write
|
||
17583B15000
|
heap
|
page read and write
|
||
2A01EF43000
|
heap
|
page read and write
|
||
1F549802000
|
heap
|
page read and write
|
||
175830E0000
|
heap
|
page read and write
|
||
1EAA8FF0000
|
heap
|
page read and write
|
||
2A01EFD0000
|
heap
|
page read and write
|
||
17583B7A000
|
heap
|
page read and write
|
||
4FFB7E000
|
stack
|
page read and write
|
||
1F548AAF000
|
heap
|
page read and write
|
||
17EA346D000
|
heap
|
page read and write
|
||
1CF4A6AB000
|
heap
|
page read and write
|
||
22C232C0000
|
heap
|
page read and write
|
||
1CF4FB90000
|
trusted library allocation
|
page read and write
|
||
1CF4FCAD000
|
heap
|
page read and write
|
||
1CF4A613000
|
heap
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
17583BB6000
|
heap
|
page read and write
|
||
1E713829000
|
heap
|
page read and write
|
||
1CF4A69E000
|
heap
|
page read and write
|
||
1C289A50000
|
heap
|
page read and write
|
||
17584002000
|
heap
|
page read and write
|
||
1758323C000
|
heap
|
page read and write
|
||
1F548A52000
|
heap
|
page read and write
|
||
1803DC5E000
|
heap
|
page read and write
|
||
1CF4FFC0000
|
trusted library allocation
|
page read and write
|
||
1EAA8D8D000
|
heap
|
page read and write
|
||
2A479BC0000
|
trusted library allocation
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
4A98B5C000
|
stack
|
page read and write
|
||
1CF4FE20000
|
trusted library allocation
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
1F548AE4000
|
heap
|
page read and write
|
||
1E71383C000
|
heap
|
page read and write
|
||
FA40E7F000
|
stack
|
page read and write
|
||
1033EFF000
|
stack
|
page read and write
|
||
1CF4FEB0000
|
remote allocation
|
page read and write
|
||
1F549902000
|
heap
|
page read and write
|
||
1E713860000
|
heap
|
page read and write
|
||
1CF4FE20000
|
trusted library allocation
|
page read and write
|
||
183A3C75000
|
heap
|
page read and write
|
||
17EA3472000
|
heap
|
page read and write
|
||
1CF4FB50000
|
trusted library allocation
|
page read and write
|
||
1CF4FA40000
|
trusted library allocation
|
page read and write
|
||
2153FC00000
|
heap
|
page read and write
|
||
1F057623000
|
heap
|
page read and write
|
||
1F548A89000
|
heap
|
page read and write
|
||
2A479B50000
|
heap
|
page readonly
|
||
2323A640000
|
heap
|
page read and write
|
||
A1F997F000
|
stack
|
page read and write
|
||
1F548A29000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
1CF4FC2B000
|
heap
|
page read and write
|
||
1682A4F0000
|
heap
|
page read and write
|
||
9EB8EFF000
|
stack
|
page read and write
|
||
9EB8C7A000
|
stack
|
page read and write
|
||
2594BB00000
|
heap
|
page read and write
|
||
649C77000
|
stack
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
17583B70000
|
heap
|
page read and write
|
||
1E713902000
|
heap
|
page read and write
|
||
17583B8D000
|
heap
|
page read and write
|
||
175831E0000
|
remote allocation
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
175832C5000
|
heap
|
page read and write
|
||
1F0574B0000
|
heap
|
page read and write
|
||
175832A2000
|
heap
|
page read and write
|
||
C5B9E7E000
|
stack
|
page read and write
|
||
2594BA56000
|
heap
|
page read and write
|
||
350707F000
|
stack
|
page read and write
|
||
4E09EE000
|
stack
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
2A01EF43000
|
heap
|
page read and write
|
||
183A3C13000
|
heap
|
page read and write
|
||
350687C000
|
stack
|
page read and write
|
||
175830D0000
|
heap
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
17583B98000
|
heap
|
page read and write
|
||
DCEF9FC000
|
stack
|
page read and write
|
||
1758324B000
|
heap
|
page read and write
|
||
2A01F803000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
17583B75000
|
heap
|
page read and write
|
||
1CF4FA30000
|
trusted library allocation
|
page read and write
|
||
17583B17000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
17EA3210000
|
heap
|
page read and write
|
||
1803DC00000
|
heap
|
page read and write
|
||
1682A550000
|
heap
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
1F548840000
|
heap
|
page read and write
|
||
1682A64F000
|
heap
|
page read and write
|
||
1F549113000
|
heap
|
page read and write
|
||
1CF4A5F0000
|
trusted library allocation
|
page read and write
|
||
22C232A6000
|
heap
|
page read and write
|
||
350717E000
|
stack
|
page read and write
|
||
175832D7000
|
heap
|
page read and write
|
||
1803DC2C000
|
heap
|
page read and write
|
||
17583200000
|
heap
|
page read and write
|
||
4FFA7A000
|
stack
|
page read and write
|
||
1682A713000
|
heap
|
page read and write
|
||
17583258000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
2A01F470000
|
remote allocation
|
page read and write
|
||
1F057643000
|
heap
|
page read and write
|
||
2323A702000
|
heap
|
page read and write
|
||
233C000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
4A993FC000
|
stack
|
page read and write
|
||
22C232B2000
|
heap
|
page read and write
|
||
649977000
|
stack
|
page read and write
|
||
2A478D82000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1F0574A0000
|
heap
|
page read and write
|
||
17583B00000
|
heap
|
page read and write
|
||
5A2000
|
heap
|
page read and write
|
||
2594BA48000
|
heap
|
page read and write
|
||
1682A708000
|
heap
|
page read and write
|
||
17583229000
|
heap
|
page read and write
|
||
1C28A202000
|
trusted library allocation
|
page read and write
|
||
2153F9D0000
|
heap
|
page read and write
|
||
1EAA8D48000
|
heap
|
page read and write
|
||
2A01F470000
|
remote allocation
|
page read and write
|
||
649D7F000
|
unkown
|
page read and write
|
||
175831E0000
|
remote allocation
|
page read and write
|
||
2A01F7E0000
|
heap
|
page read and write
|
||
2A478D69000
|
heap
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
1C289A8F000
|
heap
|
page read and write
|
||
1803DB30000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
17583B75000
|
heap
|
page read and write
|
||
2594BA55000
|
heap
|
page read and write
|
||
175832B3000
|
heap
|
page read and write
|
||
22C23280000
|
heap
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
53349CF000
|
stack
|
page read and write
|
||
22BE000
|
stack
|
page read and write
|
||
17583BBD000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
2594B930000
|
heap
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
64967E000
|
stack
|
page read and write
|
||
2323A4D0000
|
heap
|
page read and write
|
||
1803DC6B000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
1CF4FC9F000
|
heap
|
page read and write
|
||
1CF4A6A6000
|
heap
|
page read and write
|
||
1F548A7C000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
1803DC2D000
|
heap
|
page read and write
|
||
DCEFAFE000
|
stack
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
1F548AB4000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
24D7F820000
|
heap
|
page read and write
|
||
22C23291000
|
heap
|
page read and write
|
||
17583B72000
|
heap
|
page read and write
|
||
183A3B80000
|
heap
|
page read and write
|
||
649E7B000
|
stack
|
page read and write
|
||
1F057688000
|
heap
|
page read and write
|
||
C8C96FD000
|
stack
|
page read and write
|
||
1758324E000
|
heap
|
page read and write
|
||
1EAA8D8D000
|
heap
|
page read and write
|
||
1E713881000
|
heap
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
17EA3440000
|
heap
|
page read and write
|
||
1CF4FE90000
|
trusted library allocation
|
page read and write
|
||
2A479025000
|
heap
|
page read and write
|
||
2153FC68000
|
heap
|
page read and write
|
||
1803E402000
|
trusted library allocation
|
page read and write
|
||
17EA3423000
|
heap
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
2A01EFD2000
|
heap
|
page read and write
|
||
5334CFC000
|
stack
|
page read and write
|
||
A1F987F000
|
stack
|
page read and write
|
||
1F548ABD000
|
heap
|
page read and write
|
||
1682A702000
|
heap
|
page read and write
|
||
981A9FF000
|
stack
|
page read and write
|
||
1E713800000
|
heap
|
page read and write
|
||
22C230A0000
|
heap
|
page read and write
|
||
22C23296000
|
heap
|
page read and write
|
||
17EA66B0000
|
trusted library allocation
|
page read and write
|
||
1C2899C0000
|
heap
|
page read and write
|
||
1CF4A68C000
|
heap
|
page read and write
|
||
1C289B00000
|
heap
|
page read and write
|
||
1803DC97000
|
heap
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
1CF4A702000
|
heap
|
page read and write
|
||
10337DE000
|
stack
|
page read and write
|
||
140000
|
remote allocation
|
page read and write
|
||
1EAA8D30000
|
direct allocation
|
page execute and read and write
|
||
4E096B000
|
stack
|
page read and write
|
||
2594BB13000
|
heap
|
page read and write
|
||
24D00030000
|
heap
|
page readonly
|
||
4FF39B000
|
stack
|
page read and write
|
||
3506F7F000
|
stack
|
page read and write
|
||
1C289B13000
|
heap
|
page read and write
|
||
1F549141000
|
heap
|
page read and write
|
||
48037E000
|
stack
|
page read and write
|
||
2A01EFFC000
|
heap
|
page read and write
|
||
C5B9FFD000
|
stack
|
page read and write
|
||
2BAA10AD000
|
heap
|
page read and write
|
||
2594BA7C000
|
heap
|
page read and write
|
||
1C289A4D000
|
heap
|
page read and write
|
||
981A7FB000
|
stack
|
page read and write
|
||
1E713913000
|
heap
|
page read and write
|
||
96C20C5000
|
stack
|
page read and write
|
||
17583BA4000
|
heap
|
page read and write
|
||
C8C93FB000
|
stack
|
page read and write
|
||
175832AF000
|
heap
|
page read and write
|
||
1F548A6A000
|
heap
|
page read and write
|
||
9EB8DFE000
|
stack
|
page read and write
|
||
183A3C41000
|
heap
|
page read and write
|
||
2A479910000
|
trusted library allocation
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
1C4680EB000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
243B000
|
stack
|
page read and write
|
||
22C232C2000
|
heap
|
page read and write
|
||
183A3C37000
|
heap
|
page read and write
|
||
1C289A53000
|
heap
|
page read and write
|
||
96C247E000
|
stack
|
page read and write
|
||
1F548AC2000
|
heap
|
page read and write
|
||
1F057F14000
|
heap
|
page read and write
|
||
1EAA8D8D000
|
heap
|
page read and write
|
||
2A479B70000
|
trusted library allocation
|
page read and write
|
||
1758324A000
|
heap
|
page read and write
|
||
2A478D00000
|
trusted library allocation
|
page read and write
|
||
17583313000
|
heap
|
page read and write
|
||
17583B78000
|
heap
|
page read and write
|
||
2A01EF2E000
|
heap
|
page read and write
|
||
24D7DFC3000
|
heap
|
page read and write
|
||
17583B7A000
|
heap
|
page read and write
|
||
64932C000
|
stack
|
page read and write
|
||
510000
|
heap
|
page readonly
|
||
24D7DF37000
|
heap
|
page read and write
|
||
9EB8F7C000
|
stack
|
page read and write
|
||
60000
|
heap
|
page read and write
|
||
1C289A8B000
|
heap
|
page read and write
|
||
17583302000
|
heap
|
page read and write
|
||
1CF4A674000
|
heap
|
page read and write
|
||
17EA3449000
|
heap
|
page read and write
|
||
1F549843000
|
heap
|
page read and write
|
||
A1F9777000
|
stack
|
page read and write
|
||
542A87E000
|
stack
|
page read and write
|
||
17EA345E000
|
heap
|
page read and write
|
||
1682A600000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
17EA3485000
|
heap
|
page read and write
|
||
21E4000
|
heap
|
page read and write
|
||
17583249000
|
heap
|
page read and write
|
||
1CF4AF00000
|
heap
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
24D7E030000
|
heap
|
page read and write
|
||
2594BA66000
|
heap
|
page read and write
|
||
9EB8E78000
|
stack
|
page read and write
|
||
1F548AC3000
|
heap
|
page read and write
|
||
1CF4AE00000
|
heap
|
page read and write
|
||
17583B8D000
|
heap
|
page read and write
|
||
FA40EFE000
|
stack
|
page read and write
|
||
17583BD3000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1C289A69000
|
heap
|
page read and write
|
||
2A01EF1C000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
1CF4FE20000
|
trusted library allocation
|
page read and write
|
||
1E713813000
|
heap
|
page read and write
|
||
183A4402000
|
trusted library allocation
|
page read and write
|
||
DCEF87E000
|
stack
|
page read and write
|
||
175832FA000
|
heap
|
page read and write
|
||
2A01EF9C000
|
heap
|
page read and write
|
||
1F057666000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page execute and read and write
|
||
2A01EE90000
|
heap
|
page read and write
|
||
350737F000
|
stack
|
page read and write
|
||
981AAFD000
|
stack
|
page read and write
|
||
24D7DF8D000
|
heap
|
page read and write
|
||
1F548A4D000
|
heap
|
page read and write
|
||
1C289A3C000
|
heap
|
page read and write
|
||
226F000
|
stack
|
page read and write
|
||
1C289A69000
|
heap
|
page read and write
|
||
1F548A78000
|
heap
|
page read and write
|
||
1803DC45000
|
heap
|
page read and write
|
||
17583B9C000
|
heap
|
page read and write
|
||
1F548A63000
|
heap
|
page read and write
|
||
1F548B95000
|
heap
|
page read and write
|
||
1EAA8C50000
|
heap
|
page read and write
|
||
17EA3463000
|
heap
|
page read and write
|
||
2153FC28000
|
heap
|
page read and write
|
||
1C289A4A000
|
heap
|
page read and write
|
||
17583BDD000
|
heap
|
page read and write
|
||
A1F967B000
|
stack
|
page read and write
|
||
2A479B40000
|
trusted library allocation
|
page read and write
|
||
22F99F40000
|
heap
|
page read and write
|
||
1803DC7B000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
24D7FA04000
|
heap
|
page read and write
|
||
B3F4ACC000
|
stack
|
page read and write
|
||
17583B80000
|
heap
|
page read and write
|
||
2594BA53000
|
heap
|
page read and write
|
||
1CF4A678000
|
heap
|
page read and write
|
||
175832AA000
|
heap
|
page read and write
|
||
1C4680E0000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1C289B08000
|
heap
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
1CF4A6FC000
|
heap
|
page read and write
|
||
2A479B60000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1CF4A66F000
|
heap
|
page read and write
|
||
175832E4000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
5334C7E000
|
stack
|
page read and write
|
||
9D83DFB000
|
stack
|
page read and write
|
||
1682A4E0000
|
heap
|
page read and write
|
||
1CF4FCFB000
|
heap
|
page read and write
|
||
1CF4FCF7000
|
heap
|
page read and write
|
||
1CF4FB80000
|
trusted library allocation
|
page read and write
|
||
4067DFE000
|
stack
|
page read and write
|
||
2594C202000
|
trusted library allocation
|
page read and write
|
||
1F0576E2000
|
heap
|
page read and write
|
||
2580000
|
remote allocation
|
page read and write
|
||
21540202000
|
trusted library allocation
|
page read and write
|
||
1CF4FCF1000
|
heap
|
page read and write
|
||
17583BDD000
|
heap
|
page read and write
|
||
1CF4A707000
|
heap
|
page read and write
|
||
1758325A000
|
heap
|
page read and write
|
||
22C232C2000
|
heap
|
page read and write
|
||
1F549800000
|
heap
|
page read and write
|
||
2A01EF90000
|
heap
|
page read and write
|
||
B3F51FF000
|
stack
|
page read and write
|
||
17583B8B000
|
heap
|
page read and write
|
||
2A01F803000
|
heap
|
page read and write
|
||
C8C94FD000
|
stack
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
1C468350000
|
heap
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
17583B8E000
|
heap
|
page read and write
|
||
17EA346D000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
C8C937D000
|
stack
|
page read and write
|
||
24D7DF00000
|
heap
|
page read and write
|
||
1C2899F0000
|
trusted library allocation
|
page read and write
|
||
1F549802000
|
heap
|
page read and write
|
||
17583B52000
|
heap
|
page read and write
|
||
17583BC6000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
24D7DDD5000
|
heap
|
page read and write
|
||
17584002000
|
heap
|
page read and write
|
||
1803DC4B000
|
heap
|
page read and write
|
||
2A01EFD2000
|
heap
|
page read and write
|
||
1F548AA6000
|
heap
|
page read and write
|
||
1C289A88000
|
heap
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
17583B7A000
|
heap
|
page read and write
|
||
1033A7E000
|
stack
|
page read and write
|
||
C5B975C000
|
stack
|
page read and write
|
||
22F99E40000
|
heap
|
page read and write
|
||
2594BB08000
|
heap
|
page read and write
|
||
22C232BD000
|
heap
|
page read and write
|
||
2A01ED30000
|
heap
|
page read and write
|
||
1E713908000
|
heap
|
page read and write
|
||
1E71385C000
|
heap
|
page read and write
|
||
2580000
|
remote allocation
|
page read and write
|
||
17EA3457000
|
heap
|
page read and write
|
||
2153FD00000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
2594BA13000
|
heap
|
page read and write
|
||
5D2000
|
heap
|
page read and write
|
||
649A78000
|
stack
|
page read and write
|
||
1CF4FC0B000
|
heap
|
page read and write
|
||
185000
|
heap
|
page read and write
|
||
1E71385A000
|
heap
|
page read and write
|
||
1CF4FCA0000
|
trusted library allocation
|
page read and write
|
||
1EAA8F80000
|
heap
|
page read and write
|
||
1C289A00000
|
heap
|
page read and write
|
||
2A478C80000
|
heap
|
page read and write
|
||
183A3B10000
|
heap
|
page read and write
|
||
1CF4FB80000
|
trusted library allocation
|
page read and write
|
||
1CF4A6FC000
|
heap
|
page read and write
|
||
1F548ACB000
|
heap
|
page read and write
|
||
1F5487F0000
|
heap
|
page read and write
|
||
1803DC69000
|
heap
|
page read and write
|
||
17583B9C000
|
heap
|
page read and write
|
||
2153FC40000
|
heap
|
page read and write
|
||
1803DC29000
|
heap
|
page read and write
|
||
17EA33F0000
|
heap
|
page read and write
|
||
2240000
|
trusted library allocation
|
page read and write
|
||
1F548BE1000
|
heap
|
page read and write
|
||
17583253000
|
heap
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
1CF4ADE3000
|
trusted library allocation
|
page read and write
|
||
17583BD3000
|
heap
|
page read and write
|
||
17583B8D000
|
heap
|
page read and write
|
||
7A509FE000
|
stack
|
page read and write
|
||
5A2000
|
heap
|
page read and write
|
||
24D7DF7D000
|
heap
|
page read and write
|
||
1F548ACE000
|
heap
|
page read and write
|
||
22C232A7000
|
heap
|
page read and write
|
||
649CFE000
|
stack
|
page read and write
|
||
1EAA8D40000
|
heap
|
page read and write
|
||
4A98BDE000
|
stack
|
page read and write
|
||
1803DC47000
|
heap
|
page read and write
|
||
17583B92000
|
heap
|
page read and write
|
||
1803DC46000
|
heap
|
page read and write
|
||
17EA6EB0000
|
heap
|
page read and write
|
||
183A3C29000
|
heap
|
page read and write
|
||
1E713852000
|
heap
|
page read and write
|
||
4E0EFF000
|
stack
|
page read and write
|
||
17583BD5000
|
heap
|
page read and write
|
||
2323AE02000
|
trusted library allocation
|
page read and write
|
||
649B7E000
|
stack
|
page read and write
|
||
2A01EFFC000
|
heap
|
page read and write
|
||
17583B7F000
|
heap
|
page read and write
|
||
1E713826000
|
heap
|
page read and write
|
||
A1F957C000
|
stack
|
page read and write
|
||
5BB000
|
heap
|
page read and write
|
||
21540190000
|
trusted library allocation
|
page read and write
|
||
22C232CA000
|
heap
|
page read and write
|
||
22C232CA000
|
heap
|
page read and write
|
||
5334DFF000
|
stack
|
page read and write
|
||
B3F4FF9000
|
stack
|
page read and write
|
||
24D7DF30000
|
heap
|
page read and write
|
||
2A01EF32000
|
heap
|
page read and write
|
||
183A3C77000
|
heap
|
page read and write
|
||
22C232B2000
|
heap
|
page read and write
|
||
2323A4C0000
|
heap
|
page read and write
|
||
1F5491F0000
|
heap
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
1C289A2A000
|
heap
|
page read and write
|
||
1803DC2E000
|
heap
|
page read and write
|
||
17EA345F000
|
heap
|
page read and write
|
||
17EA3463000
|
heap
|
page read and write
|
||
2594BB02000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
542A7FB000
|
stack
|
page read and write
|
||
1F5491D3000
|
heap
|
page read and write
|
||
1CF4FCE9000
|
heap
|
page read and write
|
||
1F057C70000
|
trusted library allocation
|
page read and write
|
||
1803DC44000
|
heap
|
page read and write
|
||
1682A647000
|
heap
|
page read and write
|
||
1F548A3A000
|
heap
|
page read and write
|
||
2A01EF7B000
|
heap
|
page read and write
|
||
4067C7B000
|
stack
|
page read and write
|
||
1EAA8D6A000
|
heap
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
17583A02000
|
heap
|
page read and write
|
||
649878000
|
stack
|
page read and write
|
||
1C4680EE000
|
heap
|
page read and write
|
||
1F549002000
|
heap
|
page read and write
|
||
1758324C000
|
heap
|
page read and write
|
||
1CF4AF59000
|
heap
|
page read and write
|
||
17583B91000
|
heap
|
page read and write
|
||
C8C95FE000
|
stack
|
page read and write
|
||
DCEFB7F000
|
stack
|
page read and write
|
||
175831E0000
|
remote allocation
|
page read and write
|
||
2BAA10A0000
|
heap
|
page read and write
|
||
1CF4FB50000
|
trusted library allocation
|
page read and write
|
||
1CF4FE80000
|
trusted library allocation
|
page read and write
|
||
17583BCF000
|
heap
|
page read and write
|
||
1CF4FC15000
|
heap
|
page read and write
|
||
22C232CC000
|
heap
|
page read and write
|
||
1CF4FB74000
|
trusted library allocation
|
page read and write
|
||
7A5097E000
|
stack
|
page read and write
|
||
1F548FA0000
|
trusted library allocation
|
page read and write
|
||
1EAA8CE0000
|
heap
|
page read and write
|
||
17583B94000
|
heap
|
page read and write
|
||
17583B8E000
|
heap
|
page read and write
|
||
1CF4FCB0000
|
trusted library allocation
|
page read and write
|
||
1C4681E0000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
2A478C60000
|
heap
|
page read and write
|
||
A1F918E000
|
stack
|
page read and write
|
||
17584002000
|
heap
|
page read and write
|
||
1803DB60000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1EAA8F10000
|
heap
|
page read and write
|
||
1CF4A6A9000
|
heap
|
page read and write
|
||
C8C927C000
|
stack
|
page read and write
|
||
2594B940000
|
heap
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
5334945000
|
stack
|
page read and write
|
||
1033CFE000
|
stack
|
page read and write
|
||
1EAA8F84000
|
heap
|
page read and write
|
||
17583B8D000
|
heap
|
page read and write
|
||
4067D7E000
|
stack
|
page read and write
|
||
22C2329F000
|
heap
|
page read and write
|
||
1F548A25000
|
heap
|
page read and write
|
||
1CF4FE70000
|
trusted library allocation
|
page read and write
|
||
183A3C02000
|
heap
|
page read and write
|
||
2323A590000
|
remote allocation
|
page read and write
|
||
2A01EF70000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
17584002000
|
heap
|
page read and write
|
||
4A98F7C000
|
stack
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
5334E7B000
|
stack
|
page read and write
|
||
1F5487E0000
|
heap
|
page read and write
|
||
DCEFA7B000
|
stack
|
page read and write
|
||
1803DC13000
|
heap
|
page read and write
|
||
1CF4ADE0000
|
trusted library allocation
|
page read and write
|
||
2A478D71000
|
heap
|
page read and write
|
||
17583140000
|
heap
|
page read and write
|
||
1F549913000
|
heap
|
page read and write
|
||
2BAA0FC0000
|
heap
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
4D0000
|
direct allocation
|
page execute and read and write
|
||
2A01EE70000
|
heap
|
page read and write
|
||
1CF4A6AF000
|
heap
|
page read and write
|
||
2594BA66000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
2594BA58000
|
heap
|
page read and write
|
||
1803DC61000
|
heap
|
page read and write
|
||
1F549900000
|
heap
|
page read and write
|
||
1F548A2E000
|
heap
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
1CF4AF02000
|
heap
|
page read and write
|
||
981A35E000
|
stack
|
page read and write
|
||
C5B9EFF000
|
stack
|
page read and write
|
||
FA40F79000
|
stack
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
17583B8E000
|
heap
|
page read and write
|
||
B3F50FA000
|
stack
|
page read and write
|
||
2594BA57000
|
heap
|
page read and write
|
||
17583B72000
|
heap
|
page read and write
|
||
1CF4FB71000
|
trusted library allocation
|
page read and write
|
||
7A50A7E000
|
stack
|
page read and write
|
||
175832B1000
|
heap
|
page read and write
|
||
175832EE000
|
heap
|
page read and write
|
||
17584000000
|
heap
|
page read and write
|
||
DCEF5EE000
|
stack
|
page read and write
|
||
1CF4FC5B000
|
heap
|
page read and write
|
||
1E71385B000
|
heap
|
page read and write
|
||
22C23296000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
C5B9C7E000
|
stack
|
page read and write
|
||
A1F910B000
|
stack
|
page read and write
|
||
2A479029000
|
heap
|
page read and write
|
||
22F99E10000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
22C23245000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
1F548BFD000
|
heap
|
page read and write
|
||
17583B72000
|
heap
|
page read and write
|
||
4A98E7E000
|
stack
|
page read and write
|
||
981A2DB000
|
stack
|
page read and write
|
||
17583213000
|
heap
|
page read and write
|
||
3506C7B000
|
stack
|
page read and write
|
||
17583BD5000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
||
1F548BB8000
|
heap
|
page read and write
|
||
17583B9C000
|
heap
|
page read and write
|
||
1CF4FE40000
|
trusted library allocation
|
page read and write
|
||
C8C90FE000
|
stack
|
page read and write
|
||
22C23240000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
115000
|
stack
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
2594BA49000
|
heap
|
page read and write
|
||
6493AE000
|
stack
|
page read and write
|
||
981A3DF000
|
stack
|
page read and write
|
||
4E11FC000
|
stack
|
page read and write
|
||
1F057E02000
|
heap
|
page read and write
|
||
1803DC3A000
|
heap
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
C5B9BFC000
|
stack
|
page read and write
|
||
B3F547F000
|
stack
|
page read and write
|
||
1CF4AF13000
|
heap
|
page read and write
|
||
2A478D72000
|
heap
|
page read and write
|
||
2A01F7F5000
|
heap
|
page read and write
|
||
2594BA50000
|
heap
|
page read and write
|
||
17EA347E000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
17583B74000
|
heap
|
page read and write
|
||
1F549871000
|
heap
|
page read and write
|
||
2A01EFD2000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
17EA3370000
|
heap
|
page read and write
|
||
22C232A4000
|
heap
|
page read and write
|
||
1CF4A656000
|
heap
|
page read and write
|
||
2A01F7EE000
|
heap
|
page read and write
|
||
1F0576CC000
|
heap
|
page read and write
|
||
17EA3675000
|
heap
|
page read and write
|
||
17583BA5000
|
heap
|
page read and write
|
||
17583248000
|
heap
|
page read and write
|
||
2A01EF9B000
|
heap
|
page read and write
|
||
1CF4A600000
|
heap
|
page read and write
|
||
5A2000
|
heap
|
page read and write
|
||
1F549854000
|
heap
|
page read and write
|
||
17583BBD000
|
heap
|
page read and write
|
||
2A478D10000
|
trusted library allocation
|
page read and write
|
||
2A01EFD0000
|
heap
|
page read and write
|
||
17EA345A000
|
heap
|
page read and write
|
||
1682A67E000
|
heap
|
page read and write
|
||
1EAA9010000
|
heap
|
page read and write
|
||
1682AE02000
|
trusted library allocation
|
page read and write
|
||
1F057F00000
|
heap
|
page read and write
|
||
1CF4FD02000
|
heap
|
page read and write
|
||
2323A629000
|
heap
|
page read and write
|
||
1EAA9015000
|
heap
|
page read and write
|
||
1F057702000
|
heap
|
page read and write
|
||
1803DC3E000
|
heap
|
page read and write
|
||
2A01F7F8000
|
heap
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
22C232CA000
|
heap
|
page read and write
|
||
17583BC6000
|
heap
|
page read and write
|
||
27EB000
|
stack
|
page read and write
|
||
140000
|
remote allocation
|
page read and write
|
||
1CF4FFA0000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
1CF4FC1F000
|
heap
|
page read and write
|
||
1E713E80000
|
trusted library allocation
|
page read and write
|
||
1803DC2F000
|
heap
|
page read and write
|
||
1CF4AF18000
|
heap
|
page read and write
|
||
1803DC42000
|
heap
|
page read and write
|
||
22C232CD000
|
heap
|
page read and write
|
||
1C289A71000
|
heap
|
page read and write
|
||
22F99CE0000
|
heap
|
page read and write
|
||
175832EE000
|
heap
|
page read and write
|
||
22C232CA000
|
heap
|
page read and write
|
||
25FF000
|
stack
|
page read and write
|
||
2A478D69000
|
heap
|
page read and write
|
||
1803DC84000
|
heap
|
page read and write
|
||
B3F53FB000
|
stack
|
page read and write
|
||
1EAA8CC0000
|
heap
|
page read and write
|
||
5334D7E000
|
stack
|
page read and write
|
||
1CF4FC00000
|
heap
|
page read and write
|
||
2A01EF68000
|
heap
|
page read and write
|
||
22F99F95000
|
heap
|
page read and write
|
||
1F548AC0000
|
heap
|
page read and write
|
||
1803DC31000
|
heap
|
page read and write
|
||
1F057629000
|
heap
|
page read and write
|
||
17EA3469000
|
heap
|
page read and write
|
||
22C232A2000
|
heap
|
page read and write
|
||
2A01EFFC000
|
heap
|
page read and write
|
||
7FFC671C0000
|
unkown
|
page readonly
|
||
1F548A44000
|
heap
|
page read and write
|
||
2594B9A0000
|
heap
|
page read and write
|
||
2A01EEE0000
|
heap
|
page read and write
|
||
17583BBF000
|
heap
|
page read and write
|
||
2A01EFD0000
|
heap
|
page read and write
|
||
17583316000
|
heap
|
page read and write
|
||
17EA345A000
|
heap
|
page read and write
|
||
4FF97A000
|
stack
|
page read and write
|
||
DCEF97B000
|
stack
|
page read and write
|
||
1F548A82000
|
heap
|
page read and write
|
||
2594BA92000
|
heap
|
page read and write
|
||
22C231F0000
|
heap
|
page read and write
|
||
2A01EF7B000
|
heap
|
page read and write
|
||
1CF4FEB0000
|
remote allocation
|
page read and write
|
||
1CF4B9F0000
|
trusted library allocation
|
page read and write
|
||
2A478D71000
|
heap
|
page read and write
|
||
2A01EF90000
|
heap
|
page read and write
|
||
1CF4FC86000
|
heap
|
page read and write
|
||
1803DC5F000
|
heap
|
page read and write
|
||
1F057613000
|
heap
|
page read and write
|
||
1C467F90000
|
heap
|
page read and write
|
||
2A478D33000
|
heap
|
page read and write
|
||
2A01EFD2000
|
heap
|
page read and write
|
||
24D7FA00000
|
heap
|
page read and write
|
||
1CF4FC16000
|
heap
|
page read and write
|
||
24D7DF84000
|
heap
|
page read and write
|
||
C8C8AFC000
|
stack
|
page read and write
|
||
1CF4FB70000
|
trusted library allocation
|
page read and write
|
||
24D001E0000
|
heap
|
page read and write
|
||
1CF4AF18000
|
heap
|
page read and write
|
||
1CF4FB90000
|
trusted library allocation
|
page read and write
|
||
1E7136B0000
|
heap
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
1803DC4D000
|
heap
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
4A992FE000
|
stack
|
page read and write
|
||
1033DFF000
|
stack
|
page read and write
|
||
2A478BF0000
|
heap
|
page read and write
|
||
1F549169000
|
heap
|
page read and write
|
||
1CF4FC48000
|
heap
|
page read and write
|
||
1E71385E000
|
heap
|
page read and write
|
||
17583254000
|
heap
|
page read and write
|
||
7A505BA000
|
stack
|
page read and write
|
||
1C468355000
|
heap
|
page read and write
|
||
9EB8D7E000
|
stack
|
page read and write
|
||
2580000
|
remote allocation
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page readonly
|
||
183A3C67000
|
heap
|
page read and write
|
||
675000
|
stack
|
page read and write
|
||
DCEF56A000
|
stack
|
page read and write
|
||
1F548A13000
|
heap
|
page read and write
|
||
23BE000
|
stack
|
page read and write
|
||
3506A7B000
|
stack
|
page read and write
|
||
24D7DDD0000
|
heap
|
page read and write
|
||
17EA367B000
|
heap
|
page read and write
|
||
1D4000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
C8C91FF000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
96C21CF000
|
stack
|
page read and write
|
||
22C232C0000
|
heap
|
page read and write
|
||
17EA3670000
|
heap
|
page read and write
|
||
17583BBD000
|
heap
|
page read and write
|
||
1682A580000
|
trusted library allocation
|
page read and write
|
||
9EB8CFE000
|
stack
|
page read and write
|
||
22C232BD000
|
heap
|
page read and write
|
||
9D837AB000
|
stack
|
page read and write
|
||
96C24FE000
|
stack
|
page read and write
|
||
22C2328B000
|
heap
|
page read and write
|
||
1CF4A726000
|
heap
|
page read and write
|
||
17583BAB000
|
heap
|
page read and write
|
||
1682A613000
|
heap
|
page read and write
|
||
540000
|
trusted library allocation
|
page read and write
|
||
2A478D71000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
1E713900000
|
heap
|
page read and write
|
||
175832CA000
|
heap
|
page read and write
|
||
1CF4AE15000
|
heap
|
page read and write
|
||
2A01EEE5000
|
heap
|
page read and write
|
||
1CF4FD00000
|
heap
|
page read and write
|
||
4E0E7B000
|
stack
|
page read and write
|
||
96C214E000
|
stack
|
page read and write
|
||
22F99E49000
|
heap
|
page read and write
|
||
1CF4AF04000
|
heap
|
page read and write
|
||
2153FC64000
|
heap
|
page read and write
|
||
22C232A1000
|
heap
|
page read and write
|
||
2323A613000
|
heap
|
page read and write
|
||
17583BA1000
|
heap
|
page read and write
|
||
17583BBD000
|
heap
|
page read and write
|
||
2A01EFFC000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E7136C0000
|
heap
|
page read and write
|
||
24D7DDC0000
|
heap
|
page read and write
|
||
1CF4ADF0000
|
trusted library allocation
|
page read and write
|
||
64977C000
|
stack
|
page read and write
|
||
1F548AD9000
|
heap
|
page read and write
|
||
7FFC67219000
|
unkown
|
page readonly
|
||
2323A590000
|
remote allocation
|
page read and write
|
||
1EAA8F60000
|
heap
|
page readonly
|
||
3506B7D000
|
stack
|
page read and write
|
||
1803DC77000
|
heap
|
page read and write
|
||
1C289A7B000
|
heap
|
page read and write
|
||
1CF4A629000
|
heap
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2A478CF0000
|
trusted library allocation
|
page read and write
|
||
1C289A13000
|
heap
|
page read and write
|
||
2594B9D0000
|
trusted library allocation
|
page read and write
|
||
1F05766D000
|
heap
|
page read and write
|
||
7FFC67212000
|
unkown
|
page readonly
|
||
2153FA30000
|
heap
|
page read and write
|
||
1C468200000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
1682A602000
|
heap
|
page read and write
|
||
1682A655000
|
heap
|
page read and write
|
||
542A77F000
|
stack
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
22C232C0000
|
heap
|
page read and write
|
||
24D7DFA9000
|
heap
|
page read and write
|
||
7FFC671C1000
|
unkown
|
page execute read
|
||
981A8F7000
|
stack
|
page read and write
|
||
1CF4A714000
|
heap
|
page read and write
|
||
17583B89000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
17583B63000
|
heap
|
page read and write
|
||
4A990FE000
|
stack
|
page read and write
|
||
2153FC02000
|
heap
|
page read and write
|
||
17583B8D000
|
heap
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
1682A670000
|
heap
|
page read and write
|
||
1803DC60000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
2323A530000
|
heap
|
page read and write
|
||
9D83FFE000
|
stack
|
page read and write
|
||
22C232D1000
|
heap
|
page read and write
|
||
C8C8EFB000
|
stack
|
page read and write
|
||
1682A688000
|
heap
|
page read and write
|
||
1CF4A4F0000
|
heap
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
1CF4AE02000
|
heap
|
page read and write
|
||
183A3BB0000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
22C232C2000
|
heap
|
page read and write
|
||
1CF4A490000
|
heap
|
page read and write
|
||
4E10FE000
|
stack
|
page read and write
|
||
2A01EF00000
|
heap
|
page read and write
|
||
2A01EFD0000
|
heap
|
page read and write
|
||
1CF4FEB0000
|
remote allocation
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
1803DAC0000
|
heap
|
page read and write
|
||
2A01EF68000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
4A9907B000
|
stack
|
page read and write
|
||
17583B5A000
|
heap
|
page read and write
|
||
1F54981D000
|
heap
|
page read and write
|
||
2594BA4D000
|
heap
|
page read and write
|
||
1682A700000
|
heap
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
1803DC4A000
|
heap
|
page read and write
|
||
17583B76000
|
heap
|
page read and write
|
||
175832A9000
|
heap
|
page read and write
|
||
2A01F470000
|
remote allocation
|
page read and write
|
||
17583B71000
|
heap
|
page read and write
|
||
17583BA2000
|
heap
|
page read and write
|
||
17583256000
|
heap
|
page read and write
|
||
2323A560000
|
trusted library allocation
|
page read and write
|
||
1E714002000
|
trusted library allocation
|
page read and write
|
||
2A01EF47000
|
heap
|
page read and write
|
||
1F057713000
|
heap
|
page read and write
|
||
1682A63C000
|
heap
|
page read and write
|
||
1CF4FC3D000
|
heap
|
page read and write
|
||
2153FD02000
|
heap
|
page read and write
|
||
22C232B2000
|
heap
|
page read and write
|
||
17583308000
|
heap
|
page read and write
|
||
1F0576CA000
|
heap
|
page read and write
|
||
103375B000
|
stack
|
page read and write
|
||
4E0FF7000
|
stack
|
page read and write
|
||
2153FC55000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
1CF4A702000
|
heap
|
page read and write
|
||
17583283000
|
heap
|
page read and write
|
||
1CF4FC11000
|
heap
|
page read and write
|
||
1803DC4F000
|
heap
|
page read and write
|
||
22C232C0000
|
heap
|
page read and write
|
||
1EAA8D6F000
|
heap
|
page read and write
|
||
1F548FF0000
|
trusted library allocation
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
4A994FF000
|
stack
|
page read and write
|
||
1CF4A6AF000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
4E0C7E000
|
stack
|
page read and write
|
||
2153FD24000
|
heap
|
page read and write
|
||
2A01F7F3000
|
heap
|
page read and write
|
||
2A01F7EF000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
22C232D2000
|
heap
|
page read and write
|
||
1682A62A000
|
heap
|
page read and write
|
||
2A478C00000
|
trusted library allocation
|
page read and write
|
||
DCEF8FE000
|
stack
|
page read and write
|
||
17583BA1000
|
heap
|
page read and write
|
||
C5B9AFE000
|
stack
|
page read and write
|
||
1F548B13000
|
heap
|
page read and write
|
||
4A991F7000
|
stack
|
page read and write
|
||
542A32C000
|
stack
|
page read and write
|
||
2A01EF47000
|
heap
|
page read and write
|
||
183A3D13000
|
heap
|
page read and write
|
||
2153FC13000
|
heap
|
page read and write
|
||
7FFC67216000
|
unkown
|
page read and write
|
||
1F549108000
|
heap
|
page read and write
|
||
17583B8A000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1CF4FC0C000
|
heap
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
17583170000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
4801FB000
|
stack
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
17583B79000
|
heap
|
page read and write
|
||
17583B9C000
|
heap
|
page read and write
|
||
1CF4A480000
|
heap
|
page read and write
|
||
1F54991B000
|
heap
|
page read and write
|
||
24D7F840000
|
direct allocation
|
page execute and read and write
|
||
2A01EF9B000
|
heap
|
page read and write
|
||
350727E000
|
stack
|
page read and write
|
||
1CF4FB94000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
17583B9B000
|
heap
|
page read and write
|
||
22C231D0000
|
heap
|
page read and write
|
||
1E713720000
|
heap
|
page read and write
|
||
2A01EF6B000
|
heap
|
page read and write
|
||
1CF4FB58000
|
trusted library allocation
|
page read and write
|
||
17583B9A000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F548A61000
|
heap
|
page read and write
|
||
1CF4AF59000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2A478D27000
|
heap
|
page read and write
|
||
17584002000
|
heap
|
page read and write
|
||
1CF4B570000
|
trusted library allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
2323A590000
|
remote allocation
|
page read and write
|
||
17583BA4000
|
heap
|
page read and write
|
||
17EA3420000
|
heap
|
page read and write
|
||
1CF4FB5E000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2A01EF08000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1682A67D000
|
heap
|
page read and write
|
||
1F548A00000
|
heap
|
page read and write
|
||
1CF4B460000
|
trusted library allocation
|
page read and write
|
||
17583B9C000
|
heap
|
page read and write
|
||
1CF4FC4A000
|
heap
|
page read and write
|
||
C8C97FF000
|
stack
|
page read and write
|
||
9D83CFB000
|
stack
|
page read and write
|
||
2594BA77000
|
heap
|
page read and write
|
||
2A01EFD2000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
9D83EFB000
|
stack
|
page read and write
|
||
22C232B2000
|
heap
|
page read and write
|
||
1F0576C3000
|
heap
|
page read and write
|
||
4067CFE000
|
stack
|
page read and write
|
||
183A3B20000
|
heap
|
page read and write
|
||
1CF4A693000
|
heap
|
page read and write
|
||
22F99F90000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
FA40DF9000
|
stack
|
page read and write
|
||
A1F947E000
|
stack
|
page read and write
|
||
2A01EFD0000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
17583B8C000
|
heap
|
page read and write
|
There are 998 hidden memdumps, click here to show them.