Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1Klocu2k7B.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x7970229a, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1Kl_a1541ba52dc63323fed23d3e53a9a9cb75f9b_81420264_12a83c82\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER188F.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat May 14 12:09:41 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28CC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33E9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllRegisterServer
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll"
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\1Klocu2k7B.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 992 -s 316
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/&
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 39 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
There are 27 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F1CBE10000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
2490000
|
direct allocation
|
page execute and read and write
|
||
1FDEC700000
|
direct allocation
|
page execute and read and write
|
||
1E219BE0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1F1CBE10000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
1F1CBE10000
|
direct allocation
|
page execute and read and write
|
||
6E0000
|
direct allocation
|
page execute and read and write
|
||
23D98862000
|
heap
|
page read and write
|
||
25BB5D70000
|
heap
|
page read and write
|
||
1F77CA02000
|
heap
|
page read and write
|
||
1CDC9880000
|
remote allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
23B577F000
|
unkown
|
page read and write
|
||
C14EE7A000
|
stack
|
page read and write
|
||
1A4EA75000
|
stack
|
page read and write
|
||
206B1570000
|
heap
|
page read and write
|
||
141E0055000
|
heap
|
page read and write
|
||
50297B000
|
stack
|
page read and write
|
||
1C02E99C000
|
heap
|
page read and write
|
||
1C02E05A000
|
heap
|
page read and write
|
||
1AD97402000
|
trusted library allocation
|
page read and write
|
||
1AD96E5E000
|
heap
|
page read and write
|
||
206B1D21000
|
heap
|
page read and write
|
||
1C02E0E5000
|
heap
|
page read and write
|
||
24D29F60000
|
heap
|
page read and write
|
||
25BB6A20000
|
trusted library allocation
|
page read and write
|
||
1CDC9840000
|
trusted library allocation
|
page read and write
|
||
23D98750000
|
heap
|
page read and write
|
||
1C02E986000
|
heap
|
page read and write
|
||
23B52FE000
|
stack
|
page read and write
|
||
23D988B2000
|
heap
|
page read and write
|
||
206B1482000
|
heap
|
page read and write
|
||
1C02E9A3000
|
heap
|
page read and write
|
||
1E219D94000
|
heap
|
page read and write
|
||
206B1433000
|
heap
|
page read and write
|
||
802AC7B000
|
stack
|
page read and write
|
||
1FD5EFF000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
23D988CE000
|
heap
|
page read and write
|
||
1CDC4913000
|
heap
|
page read and write
|
||
206B1437000
|
heap
|
page read and write
|
||
187E6702000
|
heap
|
page read and write
|
||
1C02E9AB000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F1CA7C0000
|
heap
|
page readonly
|
||
213F2416000
|
heap
|
page read and write
|
||
213F2406000
|
heap
|
page read and write
|
||
1E218410000
|
heap
|
page read and write
|
||
1C02E9B2000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
C78B7FE000
|
stack
|
page read and write
|
||
206B1454000
|
heap
|
page read and write
|
||
206B1437000
|
heap
|
page read and write
|
||
1C02E99A000
|
heap
|
page read and write
|
||
1C02E900000
|
heap
|
page read and write
|
||
C78B8FC000
|
stack
|
page read and write
|
||
1FDEC490000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
1430AC63000
|
heap
|
page read and write
|
||
23D9882E000
|
heap
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
EC304FB000
|
stack
|
page read and write
|
||
1F77CA29000
|
heap
|
page read and write
|
||
1F1CA490000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1C02E9AD000
|
heap
|
page read and write
|
||
206B1D22000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
1F1CBE80000
|
remote allocation
|
page read and write
|
||
338347F000
|
stack
|
page read and write
|
||
66A5BFC000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
26249813000
|
heap
|
page read and write
|
||
26249842000
|
heap
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
266C2068000
|
heap
|
page read and write
|
||
206B1422000
|
heap
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
213F2413000
|
heap
|
page read and write
|
||
1430AC39000
|
heap
|
page read and write
|
||
266C1F50000
|
heap
|
page read and write
|
||
23B517E000
|
stack
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
23D986F0000
|
heap
|
page read and write
|
||
22130BD0000
|
heap
|
page read and write
|
||
1C02E0DF000
|
heap
|
page read and write
|
||
266C2064000
|
heap
|
page read and write
|
||
A9AAF7B000
|
stack
|
page read and write
|
||
206B1433000
|
heap
|
page read and write
|
||
BB757F000
|
stack
|
page read and write
|
||
1C02E056000
|
heap
|
page read and write
|
||
1F1CA350000
|
unkown
|
page read and write
|
||
213F2413000
|
heap
|
page read and write
|
||
1430AC13000
|
heap
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
1A6FFD60000
|
heap
|
page read and write
|
||
1CDC4E20000
|
trusted library allocation
|
page read and write
|
||
23D9884F000
|
heap
|
page read and write
|
||
EC3057F000
|
stack
|
page read and write
|
||
24D2A060000
|
heap
|
page read and write
|
||
1A4EC7E000
|
stack
|
page read and write
|
||
3382FAA000
|
stack
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
66A51FC000
|
stack
|
page read and write
|
||
1430AC29000
|
heap
|
page read and write
|
||
1CDC409D000
|
heap
|
page read and write
|
||
23B507B000
|
stack
|
page read and write
|
||
C78B5FC000
|
stack
|
page read and write
|
||
A9AB7FE000
|
stack
|
page read and write
|
||
3AA478D000
|
stack
|
page read and write
|
||
206B1482000
|
heap
|
page read and write
|
||
1C02E9AB000
|
heap
|
page read and write
|
||
213F23F6000
|
heap
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
25BB6CB0000
|
trusted library allocation
|
page read and write
|
||
1C02DE90000
|
heap
|
page read and write
|
||
5027FE000
|
stack
|
page read and write
|
||
1F1CA7B0000
|
direct allocation
|
page execute and read and write
|
||
1CDC9880000
|
remote allocation
|
page read and write
|
||
1CDC9850000
|
trusted library allocation
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1FD5F7E000
|
stack
|
page read and write
|
||
23D98995000
|
heap
|
page read and write
|
||
BB75FE000
|
stack
|
page read and write
|
||
141E0063000
|
heap
|
page read and write
|
||
141E0000000
|
heap
|
page read and write
|
||
1C02E97B000
|
heap
|
page read and write
|
||
23D9883C000
|
heap
|
page read and write
|
||
25BB6C50000
|
trusted library allocation
|
page read and write
|
||
1C02E992000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
EDD1BFD000
|
stack
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
1E218415000
|
heap
|
page read and write
|
||
BB7475000
|
stack
|
page read and write
|
||
1C02E99C000
|
heap
|
page read and write
|
||
213F2404000
|
heap
|
page read and write
|
||
EDD1DFF000
|
stack
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
B68000
|
heap
|
page read and write
|
||
1CDC4815000
|
heap
|
page read and write
|
||
1C02E9B1000
|
heap
|
page read and write
|
||
1F1CBF00000
|
heap
|
page read and write
|
||
1AD96F00000
|
heap
|
page read and write
|
||
1AD96E3C000
|
heap
|
page read and write
|
||
1C02E921000
|
heap
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
1C02E97E000
|
heap
|
page read and write
|
||
1AD96E53000
|
heap
|
page read and write
|
||
BCE000
|
heap
|
page read and write
|
||
1CDC5465000
|
heap
|
page read and write
|
||
1E219BC0000
|
heap
|
page read and write
|
||
23D9981D000
|
heap
|
page read and write
|
||
C14F07B000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
25BB5DB7000
|
heap
|
page read and write
|
||
91FACFB000
|
stack
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
1C02E04B000
|
heap
|
page read and write
|
||
1C02E0AA000
|
heap
|
page read and write
|
||
A9AAB7D000
|
stack
|
page read and write
|
||
1C02E989000
|
heap
|
page read and write
|
||
1CDC5502000
|
heap
|
page read and write
|
||
1430AAC0000
|
heap
|
page read and write
|
||
23D99913000
|
heap
|
page read and write
|
||
1AD96E79000
|
heap
|
page read and write
|
||
502675000
|
stack
|
page read and write
|
||
1F77CA5C000
|
heap
|
page read and write
|
||
206B1510000
|
remote allocation
|
page read and write
|
||
1F77CA74000
|
heap
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
1CDC9741000
|
trusted library allocation
|
page read and write
|
||
23D988C8000
|
heap
|
page read and write
|
||
1CDC4102000
|
heap
|
page read and write
|
||
23D988A7000
|
heap
|
page read and write
|
||
C14F27D000
|
stack
|
page read and write
|
||
91FB1FE000
|
stack
|
page read and write
|
||
1E2181EC000
|
heap
|
page read and write
|
||
23D98837000
|
heap
|
page read and write
|
||
206B1454000
|
heap
|
page read and write
|
||
1F77D002000
|
trusted library allocation
|
page read and write
|
||
15F3D7F000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1CC26A80000
|
remote allocation
|
page read and write
|
||
2624A002000
|
heap
|
page read and write
|
||
3AA4DF7000
|
stack
|
page read and write
|
||
23D98848000
|
heap
|
page read and write
|
||
23D99800000
|
heap
|
page read and write
|
||
1CDC5400000
|
heap
|
page read and write
|
||
23D9885E000
|
heap
|
page read and write
|
||
1C02E97B000
|
heap
|
page read and write
|
||
25BB5CE0000
|
heap
|
page read and write
|
||
1C02E0C0000
|
heap
|
page read and write
|
||
206B14E9000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
1C02E0CF000
|
heap
|
page read and write
|
||
23D99900000
|
heap
|
page read and write
|
||
20DF000
|
stack
|
page read and write
|
||
141E0050000
|
heap
|
page read and write
|
||
1FDEC500000
|
heap
|
page read and write
|
||
23D98886000
|
heap
|
page read and write
|
||
1CC262F0000
|
heap
|
page read and write
|
||
1FDEC420000
|
heap
|
page read and write
|
||
23D99854000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1C02E919000
|
heap
|
page read and write
|
||
26249913000
|
heap
|
page read and write
|
||
1C02E0C7000
|
heap
|
page read and write
|
||
A9AAD7E000
|
stack
|
page read and write
|
||
1C02E9AE000
|
heap
|
page read and write
|
||
1C02EE21000
|
heap
|
page read and write
|
||
206B1380000
|
heap
|
page read and write
|
||
1E2181C0000
|
heap
|
page read and write
|
||
1A6FFE68000
|
heap
|
page read and write
|
||
1430AC44000
|
heap
|
page read and write
|
||
1F77CA69000
|
heap
|
page read and write
|
||
206B14EE000
|
heap
|
page read and write
|
||
26249902000
|
heap
|
page read and write
|
||
1C02E97C000
|
heap
|
page read and write
|
||
1F1CA7B0000
|
direct allocation
|
page execute and read and write
|
||
1F1CA520000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
23D98853000
|
heap
|
page read and write
|
||
22130BDD000
|
heap
|
page read and write
|
||
1E2183B0000
|
heap
|
page read and write
|
||
1430AC7A000
|
heap
|
page read and write
|
||
266C2113000
|
heap
|
page read and write
|
||
1C02E9AC000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
23D98700000
|
heap
|
page read and write
|
||
1AD96E78000
|
heap
|
page read and write
|
||
23B55F7000
|
stack
|
page read and write
|
||
1CDC5447000
|
heap
|
page read and write
|
||
187E667B000
|
heap
|
page read and write
|
||
32FD3FF000
|
stack
|
page read and write
|
||
3AA4A7E000
|
stack
|
page read and write
|
||
266C203C000
|
heap
|
page read and write
|
||
1CDC4904000
|
heap
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
1AD96E00000
|
heap
|
page read and write
|
||
25BB5DDD000
|
heap
|
page read and write
|
||
1C02E9C7000
|
heap
|
page read and write
|
||
66A57FB000
|
stack
|
page read and write
|
||
1F1CA4B0000
|
heap
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
2EB4DFE000
|
stack
|
page read and write
|
||
1430AC47000
|
heap
|
page read and write
|
||
1CDC9610000
|
trusted library allocation
|
page read and write
|
||
685467C000
|
stack
|
page read and write
|
||
802A73C000
|
stack
|
page read and write
|
||
1CDC40A4000
|
heap
|
page read and write
|
||
A9AAE7B000
|
stack
|
page read and write
|
||
338337E000
|
stack
|
page read and write
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
141E0071000
|
heap
|
page read and write
|
||
C78B0FF000
|
stack
|
page read and write
|
||
1CDC4F20000
|
trusted library allocation
|
page read and write
|
||
1CDC9720000
|
trusted library allocation
|
page read and write
|
||
C14F1FF000
|
stack
|
page read and write
|
||
1C02E6B0000
|
remote allocation
|
page read and write
|
||
2D10000
|
remote allocation
|
page read and write
|
||
141DFFA0000
|
trusted library allocation
|
page read and write
|
||
1FD607E000
|
stack
|
page read and write
|
||
1C02E9A6000
|
heap
|
page read and write
|
||
1CC26440000
|
heap
|
page read and write
|
||
23D99802000
|
heap
|
page read and write
|
||
1C02E96F000
|
heap
|
page read and write
|
||
EDD18FF000
|
stack
|
page read and write
|
||
1A4EB7F000
|
stack
|
page read and write
|
||
1C02E975000
|
heap
|
page read and write
|
||
1C02EE03000
|
heap
|
page read and write
|
||
187E6613000
|
heap
|
page read and write
|
||
187E6713000
|
heap
|
page read and write
|
||
1C02E057000
|
heap
|
page read and write
|
||
1F77C790000
|
heap
|
page read and write
|
||
1AD96BD0000
|
heap
|
page read and write
|
||
266C2100000
|
heap
|
page read and write
|
||
3AA4CFF000
|
stack
|
page read and write
|
||
32FD2FF000
|
stack
|
page read and write
|
||
1CDC5454000
|
heap
|
page read and write
|
||
EDD1EFF000
|
stack
|
page read and write
|
||
1C02E052000
|
heap
|
page read and write
|
||
1F1CA7D0000
|
heap
|
page read and write
|
||
1C02E976000
|
heap
|
page read and write
|
||
1CDC9728000
|
trusted library allocation
|
page read and write
|
||
213F2423000
|
heap
|
page read and write
|
||
1C02E973000
|
heap
|
page read and write
|
||
205F000
|
stack
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
26249829000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
6D0000
|
direct allocation
|
page execute and read and write
|
||
1F1CA490000
|
heap
|
page read and write
|
||
1CDC4E30000
|
trusted library allocation
|
page read and write
|
||
1C02E102000
|
heap
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
1C02E981000
|
heap
|
page read and write
|
||
1F1CA500000
|
heap
|
page read and write
|
||
32FD1F7000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
23D988E3000
|
heap
|
page read and write
|
||
3AA4C7B000
|
stack
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
23D988D8000
|
heap
|
page read and write
|
||
1FDEC58C000
|
heap
|
page read and write
|
||
1C02E9CF000
|
heap
|
page read and write
|
||
1CDC9880000
|
trusted library allocation
|
page read and write
|
||
1CDC4902000
|
heap
|
page read and write
|
||
1F77CA6F000
|
heap
|
page read and write
|
||
1C02E116000
|
heap
|
page read and write
|
||
23D988FD000
|
heap
|
page read and write
|
||
1CDC9750000
|
trusted library allocation
|
page read and write
|
||
266C1EF0000
|
heap
|
page read and write
|
||
23D991F0000
|
heap
|
page read and write
|
||
24D2A080000
|
heap
|
page read and write
|
||
1CDC40B9000
|
heap
|
page read and write
|
||
1C02E04F000
|
heap
|
page read and write
|
||
1CC26290000
|
heap
|
page read and write
|
||
1C02E992000
|
heap
|
page read and write
|
||
1430AC68000
|
heap
|
page read and write
|
||
206B1510000
|
remote allocation
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
2C6E000
|
stack
|
page read and write
|
||
1C02E99C000
|
heap
|
page read and write
|
||
25BB60A0000
|
trusted library allocation
|
page read and write
|
||
91FB0F9000
|
stack
|
page read and write
|
||
25BB5D78000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1FDEC805000
|
heap
|
page read and write
|
||
1CDC4000000
|
heap
|
page read and write
|
||
1CDC9880000
|
remote allocation
|
page read and write
|
||
23D9887E000
|
heap
|
page read and write
|
||
C78B47F000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
1C02E971000
|
heap
|
page read and write
|
||
6854A7E000
|
stack
|
page read and write
|
||
1C02E9A0000
|
heap
|
page read and write
|
||
206B1433000
|
heap
|
page read and write
|
||
1C02E980000
|
heap
|
page read and write
|
||
1F1CA7D0000
|
heap
|
page read and write
|
||
6854B7E000
|
stack
|
page read and write
|
||
26249800000
|
heap
|
page read and write
|
||
206B14E7000
|
heap
|
page read and write
|
||
2EB4AFC000
|
stack
|
page read and write
|
||
BB757F000
|
stack
|
page read and write
|
||
1C02E04C000
|
heap
|
page read and write
|
||
1CDC9990000
|
trusted library allocation
|
page read and write
|
||
1C02E9A0000
|
heap
|
page read and write
|
||
1430AC75000
|
heap
|
page read and write
|
||
1AD96E70000
|
heap
|
page read and write
|
||
1CDC4126000
|
heap
|
page read and write
|
||
1430B280000
|
trusted library allocation
|
page read and write
|
||
1C02E054000
|
heap
|
page read and write
|
||
1C02E03C000
|
heap
|
page read and write
|
||
23D991D3000
|
heap
|
page read and write
|
||
206B146D000
|
heap
|
page read and write
|
||
802A7BE000
|
stack
|
page read and write
|
||
1AD96C30000
|
heap
|
page read and write
|
||
EDD17FB000
|
stack
|
page read and write
|
||
213F23F6000
|
heap
|
page read and write
|
||
1F1CA7F5000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
EC3047F000
|
stack
|
page read and write
|
||
C14F17D000
|
stack
|
page read and write
|
||
213F2402000
|
heap
|
page read and write
|
||
A9AA8FF000
|
stack
|
page read and write
|
||
262498C3000
|
heap
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
23D98780000
|
trusted library allocation
|
page read and write
|
||
685497B000
|
stack
|
page read and write
|
||
1E218201000
|
heap
|
page read and write
|
||
22130AF0000
|
heap
|
page read and write
|
||
1C02E99E000
|
heap
|
page read and write
|
||
141E0090000
|
heap
|
page read and write
|
||
206B146D000
|
heap
|
page read and write
|
||
1CDC9870000
|
trusted library allocation
|
page read and write
|
||
BB74FF000
|
stack
|
page read and write
|
||
1C02E97E000
|
heap
|
page read and write
|
||
1430AC6A000
|
heap
|
page read and write
|
||
25BB5DBF000
|
heap
|
page read and write
|
||
206B1240000
|
heap
|
page read and write
|
||
1CDC47F0000
|
trusted library allocation
|
page read and write
|
||
1430AC64000
|
heap
|
page read and write
|
||
187E6600000
|
heap
|
page read and write
|
||
206B1437000
|
heap
|
page read and write
|
||
BB74FF000
|
stack
|
page read and write
|
||
23D98893000
|
heap
|
page read and write
|
||
1AD96E5E000
|
heap
|
page read and write
|
||
216C000
|
stack
|
page read and write
|
||
213F23E0000
|
heap
|
page read and write
|
||
1CDC9600000
|
trusted library allocation
|
page read and write
|
||
1CDC9760000
|
trusted library allocation
|
page read and write
|
||
1C02E0B5000
|
heap
|
page read and write
|
||
3AA4EFE000
|
stack
|
page read and write
|
||
26249660000
|
heap
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
1C02E9AF000
|
heap
|
page read and write
|
||
1430AC4C000
|
heap
|
page read and write
|
||
206B14EE000
|
heap
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
2EB4EFD000
|
stack
|
page read and write
|
||
EC305FF000
|
stack
|
page read and write
|
||
141E004E000
|
heap
|
page read and write
|
||
1CDC5600000
|
trusted library allocation
|
page read and write
|
||
213F2424000
|
heap
|
page read and write
|
||
141E008C000
|
heap
|
page read and write
|
||
1430AC40000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
5028FF000
|
stack
|
page read and write
|
||
1E219F40000
|
heap
|
page read and write
|
||
1CDC40CA000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
187E665B000
|
heap
|
page read and write
|
||
2480000
|
direct allocation
|
page execute and read and write
|
||
1430AC48000
|
heap
|
page read and write
|
||
25BB5DBF000
|
heap
|
page read and write
|
||
1C02E97B000
|
heap
|
page read and write
|
||
213F25B0000
|
heap
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
1C02E97B000
|
heap
|
page read and write
|
||
1CC26C02000
|
trusted library allocation
|
page read and write
|
||
1F1CBF00000
|
heap
|
page read and write
|
||
213F2405000
|
heap
|
page read and write
|
||
1C02E113000
|
heap
|
page read and write
|
||
26249670000
|
heap
|
page read and write
|
||
1430AC3D000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
1CC26280000
|
heap
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
1F77C9D0000
|
trusted library allocation
|
page read and write
|
||
3AA4B7B000
|
stack
|
page read and write
|
||
262498CC000
|
heap
|
page read and write
|
||
1C02E917000
|
heap
|
page read and write
|
||
141E0067000
|
heap
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
66A5AFB000
|
stack
|
page read and write
|
||
24D29F40000
|
heap
|
page read and write
|
||
23D989B8000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1E219C10000
|
heap
|
page readonly
|
||
1FDEC730000
|
heap
|
page readonly
|
||
802AD77000
|
stack
|
page read and write
|
||
2454000
|
heap
|
page read and write
|
||
1430AC49000
|
heap
|
page read and write
|
||
1F1CA7D4000
|
heap
|
page read and write
|
||
1AD96E13000
|
heap
|
page read and write
|
||
1CDC9830000
|
trusted library allocation
|
page read and write
|
||
1C02E04A000
|
heap
|
page read and write
|
||
A9AB4F9000
|
stack
|
page read and write
|
||
C78B6FF000
|
stack
|
page read and write
|
||
206B147D000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1CC26A80000
|
remote allocation
|
page read and write
|
||
3AA470B000
|
stack
|
page read and write
|
||
1CDC3E60000
|
heap
|
page read and write
|
||
1CDC4918000
|
heap
|
page read and write
|
||
C14EFFE000
|
stack
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
1430AC4D000
|
heap
|
page read and write
|
||
141E0063000
|
heap
|
page read and write
|
||
1C02E6B0000
|
remote allocation
|
page read and write
|
||
1FD5FF9000
|
stack
|
page read and write
|
||
32FD0FB000
|
stack
|
page read and write
|
||
1430AAB0000
|
heap
|
page read and write
|
||
1C02E9B2000
|
heap
|
page read and write
|
||
66A56F9000
|
stack
|
page read and write
|
||
1430AC4B000
|
heap
|
page read and write
|
||
1C02E9A0000
|
heap
|
page read and write
|
||
2EB507C000
|
stack
|
page read and write
|
||
1AD96E83000
|
heap
|
page read and write
|
||
1430AC62000
|
heap
|
page read and write
|
||
1F77CA00000
|
heap
|
page read and write
|
||
1430AC30000
|
heap
|
page read and write
|
||
1430AC45000
|
heap
|
page read and write
|
||
15F3B7E000
|
stack
|
page read and write
|
||
206B1510000
|
remote allocation
|
page read and write
|
||
1F77C7A0000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1FDEC520000
|
direct allocation
|
page execute and read and write
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
66A5C7F000
|
stack
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
15F3A7E000
|
stack
|
page read and write
|
||
1F1CA7B0000
|
direct allocation
|
page execute and read and write
|
||
1C02E973000
|
heap
|
page read and write
|
||
1CC26458000
|
heap
|
page read and write
|
||
1C02E9B6000
|
heap
|
page read and write
|
||
187E6700000
|
heap
|
page read and write
|
||
1CDC54FE000
|
heap
|
page read and write
|
||
5EFD75D000
|
stack
|
page read and write
|
||
1CDC54E7000
|
heap
|
page read and write
|
||
23D99802000
|
heap
|
page read and write
|
||
1CDC4058000
|
heap
|
page read and write
|
||
206B148A000
|
heap
|
page read and write
|
||
1430AC65000
|
heap
|
page read and write
|
||
1C02E802000
|
heap
|
page read and write
|
||
2624A100000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
1CDC4099000
|
heap
|
page read and write
|
||
32FCE7E000
|
stack
|
page read and write
|
||
1C02E04E000
|
heap
|
page read and write
|
||
1CDC5502000
|
heap
|
page read and write
|
||
206B1D20000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
23D9915B000
|
heap
|
page read and write
|
||
A9AAA78000
|
stack
|
page read and write
|
||
1F1CA7F5000
|
heap
|
page read and write
|
||
25BB6090000
|
trusted library allocation
|
page read and write
|
||
266C207C000
|
heap
|
page read and write
|
||
710000
|
heap
|
page readonly
|
||
206B141E000
|
heap
|
page read and write
|
||
23D99100000
|
heap
|
page read and write
|
||
1F1CA7F0000
|
heap
|
page read and write
|
||
206B145C000
|
heap
|
page read and write
|
||
2A5C000
|
stack
|
page read and write
|
||
1AD96BC0000
|
heap
|
page read and write
|
||
206B1433000
|
heap
|
page read and write
|
||
23D99806000
|
heap
|
page read and write
|
||
1C02EE19000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1FDEC800000
|
heap
|
page read and write
|
||
213F23F1000
|
heap
|
page read and write
|
||
1430AC53000
|
heap
|
page read and write
|
||
266C1F80000
|
trusted library allocation
|
page read and write
|
||
23D9991B000
|
heap
|
page read and write
|
||
1C02DF90000
|
trusted library allocation
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
1F77CB13000
|
heap
|
page read and write
|
||
1C02EE03000
|
heap
|
page read and write
|
||
1430AC7F000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
C14F0FC000
|
stack
|
page read and write
|
||
1F1CA528000
|
heap
|
page read and write
|
||
1C02E9AB000
|
heap
|
page read and write
|
||
1FDEC4B0000
|
heap
|
page read and write
|
||
1430AC5E000
|
heap
|
page read and write
|
||
1430AC4E000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
1CDC97F0000
|
trusted library allocation
|
page read and write
|
||
A9AA87B000
|
stack
|
page read and write
|
||
EDD1FFF000
|
stack
|
page read and write
|
||
15F358B000
|
stack
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2624986F000
|
heap
|
page read and write
|
||
1FD60FE000
|
stack
|
page read and write
|
||
23D98913000
|
heap
|
page read and write
|
||
7D0000
|
remote allocation
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1430AC7C000
|
heap
|
page read and write
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
23D988B6000
|
heap
|
page read and write
|
||
C14EF7E000
|
stack
|
page read and write
|
||
1F1CA520000
|
heap
|
page read and write
|
||
1A6FFC30000
|
heap
|
page read and write
|
||
206B1454000
|
heap
|
page read and write
|
||
1F1CA490000
|
heap
|
page read and write
|
||
1CDC4013000
|
heap
|
page read and write
|
||
A75000
|
stack
|
page read and write
|
||
1CDC9860000
|
trusted library allocation
|
page read and write
|
||
1F1CA350000
|
unkown
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
268B000
|
stack
|
page read and write
|
||
23D988D5000
|
heap
|
page read and write
|
||
206B146D000
|
heap
|
page read and write
|
||
25BB5F40000
|
heap
|
page read and write
|
||
266C2000000
|
heap
|
page read and write
|
||
1CDC40B0000
|
heap
|
page read and write
|
||
1F77C800000
|
heap
|
page read and write
|
||
25BB60F0000
|
trusted library allocation
|
page read and write
|
||
50277F000
|
stack
|
page read and write
|
||
1C02E6B0000
|
remote allocation
|
page read and write
|
||
1C02E973000
|
heap
|
page read and write
|
||
802AE7E000
|
stack
|
page read and write
|
||
EDD13FB000
|
stack
|
page read and write
|
||
91FB2FF000
|
stack
|
page read and write
|
||
1CDC40E0000
|
heap
|
page read and write
|
||
1F1CA7F0000
|
heap
|
page read and write
|
||
1CC263F0000
|
trusted library allocation
|
page read and write
|
||
266C2051000
|
heap
|
page read and write
|
||
213F23B0000
|
heap
|
page read and write
|
||
C78B17C000
|
stack
|
page read and write
|
||
1C02E975000
|
heap
|
page read and write
|
||
141E0802000
|
trusted library allocation
|
page read and write
|
||
187E6629000
|
heap
|
page read and write
|
||
187E665E000
|
heap
|
page read and write
|
||
25BB60E0000
|
heap
|
page read and write
|
||
141E0013000
|
heap
|
page read and write
|
||
213F2426000
|
heap
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
23B56FE000
|
stack
|
page read and write
|
||
1C02E94E000
|
heap
|
page read and write
|
||
206B1454000
|
heap
|
page read and write
|
||
266C2002000
|
heap
|
page read and write
|
||
1430AC41000
|
heap
|
page read and write
|
||
1C02E049000
|
heap
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
266C2013000
|
heap
|
page read and write
|
||
2ADC000
|
stack
|
page read and write
|
||
1CDC40ED000
|
heap
|
page read and write
|
||
1430AC76000
|
heap
|
page read and write
|
||
260F000
|
stack
|
page read and write
|
||
262497D0000
|
trusted library allocation
|
page read and write
|
||
1C02DE20000
|
heap
|
page read and write
|
||
266C2102000
|
heap
|
page read and write
|
||
1430AC78000
|
heap
|
page read and write
|
||
141E0100000
|
heap
|
page read and write
|
||
1A4ECFF000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
187E6520000
|
heap
|
page read and write
|
||
1C02E9B3000
|
heap
|
page read and write
|
||
1CC26429000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
A9AB5FA000
|
stack
|
page read and write
|
||
5026FF000
|
stack
|
page read and write
|
||
141DFE40000
|
heap
|
page read and write
|
||
1CDC4107000
|
heap
|
page read and write
|
||
141E0067000
|
heap
|
page read and write
|
||
1F77CA40000
|
heap
|
page read and write
|
||
1FDEC57D000
|
heap
|
page read and write
|
||
314000
|
stack
|
page read and write
|
||
1C02E99A000
|
heap
|
page read and write
|
||
32FCB3B000
|
stack
|
page read and write
|
||
1E2181F1000
|
heap
|
page read and write
|
||
206B13A0000
|
heap
|
page read and write
|
||
213F2280000
|
heap
|
page read and write
|
||
187E6665000
|
heap
|
page read and write
|
||
1C02E9D1000
|
heap
|
page read and write
|
||
1CDC4114000
|
heap
|
page read and write
|
||
266C1EE0000
|
heap
|
page read and write
|
||
BB74FF000
|
stack
|
page read and write
|
||
25BB5DC0000
|
heap
|
page read and write
|
||
213F240F000
|
heap
|
page read and write
|
||
1A6FFE45000
|
heap
|
page read and write
|
||
7DD000
|
heap
|
page read and write
|
||
1F1CBE80000
|
remote allocation
|
page read and write
|
||
1AD96F08000
|
heap
|
page read and write
|
||
25BB6080000
|
trusted library allocation
|
page read and write
|
||
1C02E029000
|
heap
|
page read and write
|
||
23D98882000
|
heap
|
page read and write
|
||
23D99134000
|
heap
|
page read and write
|
||
66A59FB000
|
stack
|
page read and write
|
||
1F1CA7F0000
|
heap
|
page read and write
|
||
1CDC54A8000
|
heap
|
page read and write
|
||
1430AD02000
|
heap
|
page read and write
|
||
23D98876000
|
heap
|
page read and write
|
||
23D989E1000
|
heap
|
page read and write
|
||
1E218390000
|
heap
|
page read and write
|
||
23D98845000
|
heap
|
page read and write
|
||
1CDC47F3000
|
trusted library allocation
|
page read and write
|
||
1CDC54FE000
|
heap
|
page read and write
|
||
206B1480000
|
heap
|
page read and write
|
||
213F2417000
|
heap
|
page read and write
|
||
206B13F8000
|
heap
|
page read and write
|
||
1C02E9AE000
|
heap
|
page read and write
|
||
213F240F000
|
heap
|
page read and write
|
||
2D10000
|
remote allocation
|
page read and write
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
213F2423000
|
heap
|
page read and write
|
||
1FDEE130000
|
heap
|
page read and write
|
||
1CDC4080000
|
heap
|
page read and write
|
||
1F1CA4B0000
|
heap
|
page read and write
|
||
1CC26502000
|
heap
|
page read and write
|
||
23B50FE000
|
stack
|
page read and write
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
1430AC7B000
|
heap
|
page read and write
|
||
C14EEFE000
|
stack
|
page read and write
|
||
66A55FF000
|
stack
|
page read and write
|
||
1C02E053000
|
heap
|
page read and write
|
||
1C02E070000
|
heap
|
page read and write
|
||
1E218201000
|
heap
|
page read and write
|
||
262496D0000
|
heap
|
page read and write
|
||
7D0000
|
remote allocation
|
page read and write
|
||
1FDEC537000
|
heap
|
page read and write
|
||
2D10000
|
remote allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
1CDC54A5000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
23D988E0000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
206B1457000
|
heap
|
page read and write
|
||
23D989FD000
|
heap
|
page read and write
|
||
1CDC4900000
|
heap
|
page read and write
|
||
1FDEC530000
|
heap
|
page read and write
|
||
15F3C7F000
|
stack
|
page read and write
|
||
141E004B000
|
heap
|
page read and write
|
||
206B14EE000
|
heap
|
page read and write
|
||
206B1D24000
|
heap
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
1430AC70000
|
heap
|
page read and write
|
||
1C02E977000
|
heap
|
page read and write
|
||
187E663C000
|
heap
|
page read and write
|
||
187E6590000
|
heap
|
page read and write
|
||
23D9886A000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
1C02E059000
|
heap
|
page read and write
|
||
1CDC9810000
|
trusted library allocation
|
page read and write
|
||
A9AAC7B000
|
stack
|
page read and write
|
||
EDD19FB000
|
stack
|
page read and write
|
||
187E6708000
|
heap
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
23D98897000
|
heap
|
page read and write
|
||
266C2802000
|
trusted library allocation
|
page read and write
|
||
23D988CD000
|
heap
|
page read and write
|
||
1C02E99A000
|
heap
|
page read and write
|
||
1F77CB02000
|
heap
|
page read and write
|
||
1CDC40BF000
|
heap
|
page read and write
|
||
213F240F000
|
heap
|
page read and write
|
||
1AD96F13000
|
heap
|
page read and write
|
||
1430AB20000
|
heap
|
page read and write
|
||
1430AC61000
|
heap
|
page read and write
|
||
BB7475000
|
stack
|
page read and write
|
||
1430AC31000
|
heap
|
page read and write
|
||
1AD96E2A000
|
heap
|
page read and write
|
||
1C02E973000
|
heap
|
page read and write
|
||
32FCFFF000
|
stack
|
page read and write
|
||
1CDC3E50000
|
heap
|
page read and write
|
||
1C02E0E8000
|
heap
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
BD1000
|
heap
|
page read and write
|
||
91FB17C000
|
stack
|
page read and write
|
||
1430AC46000
|
heap
|
page read and write
|
||
1F1CA7D0000
|
heap
|
page read and write
|
||
141E0102000
|
heap
|
page read and write
|
||
1C02E0F9000
|
heap
|
page read and write
|
||
1430B402000
|
trusted library allocation
|
page read and write
|
||
25BB5CF0000
|
trusted library allocation
|
page read and write
|
||
1CDC5502000
|
heap
|
page read and write
|
||
213F2423000
|
heap
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
1CDC4089000
|
heap
|
page read and write
|
||
1F1CA7C0000
|
heap
|
page readonly
|
||
C14F2FE000
|
stack
|
page read and write
|
||
802AA7E000
|
stack
|
page read and write
|
||
23D9887A000
|
heap
|
page read and write
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
206B1480000
|
heap
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
141E0108000
|
heap
|
page read and write
|
||
BB75FE000
|
stack
|
page read and write
|
||
66A58FF000
|
stack
|
page read and write
|
||
1C02E0E9000
|
heap
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
23D98900000
|
heap
|
page read and write
|
||
23D99002000
|
heap
|
page read and write
|
||
1C02E000000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
23D98829000
|
heap
|
page read and write
|
||
206B13F0000
|
heap
|
page read and write
|
||
1C02E0AB000
|
heap
|
page read and write
|
||
23D987D0000
|
trusted library allocation
|
page read and write
|
||
1430AC00000
|
heap
|
page read and write
|
||
1E219D90000
|
heap
|
page read and write
|
||
141E003C000
|
heap
|
page read and write
|
||
1C02DE30000
|
heap
|
page read and write
|
||
213F2423000
|
heap
|
page read and write
|
||
1F1CA528000
|
heap
|
page read and write
|
||
25BB6C40000
|
heap
|
page readonly
|
||
B9C000
|
heap
|
page read and write
|
||
1A6FFD80000
|
heap
|
page read and write
|
||
206B147D000
|
heap
|
page read and write
|
||
262498CA000
|
heap
|
page read and write
|
||
1F1CA528000
|
heap
|
page read and write
|
||
1E218150000
|
heap
|
page read and write
|
||
1C02E97B000
|
heap
|
page read and write
|
||
1F1CA350000
|
heap
|
page read and write
|
||
206B1482000
|
heap
|
page read and write
|
||
BB757F000
|
stack
|
page read and write
|
||
BB75FE000
|
stack
|
page read and write
|
||
23D98800000
|
heap
|
page read and write
|
||
1CDC4959000
|
heap
|
page read and write
|
||
141DFE30000
|
heap
|
page read and write
|
||
206B1480000
|
heap
|
page read and write
|
||
1CDC4802000
|
heap
|
page read and write
|
||
1CDC54F8000
|
heap
|
page read and write
|
||
141E0002000
|
heap
|
page read and write
|
||
25BB60E9000
|
heap
|
page read and write
|
||
EDD20FE000
|
stack
|
page read and write
|
||
25BB5DBE000
|
heap
|
page read and write
|
||
1CDC9764000
|
trusted library allocation
|
page read and write
|
||
1AD97390000
|
trusted library allocation
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
1C02E981000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
25BB60E5000
|
heap
|
page read and write
|
||
187E6684000
|
heap
|
page read and write
|
||
2EB4B7E000
|
stack
|
page read and write
|
||
206B148A000
|
heap
|
page read and write
|
||
23D99902000
|
heap
|
page read and write
|
||
C78B57D000
|
stack
|
page read and write
|
||
187E6646000
|
heap
|
page read and write
|
||
1C02E9A1000
|
heap
|
page read and write
|
||
1CDC4959000
|
heap
|
page read and write
|
||
1C02E99A000
|
heap
|
page read and write
|
||
2EB4D7D000
|
stack
|
page read and write
|
||
1CDC9740000
|
trusted library allocation
|
page read and write
|
||
1CDC5447000
|
heap
|
page read and write
|
||
24D29DF0000
|
heap
|
page read and write
|
||
262498BB000
|
heap
|
page read and write
|
||
206B1437000
|
heap
|
page read and write
|
||
32FCBBE000
|
stack
|
page read and write
|
||
1CDC97F0000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
206B1431000
|
heap
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
7FFC66D01000
|
unkown
|
page execute read
|
||
1CDC40D2000
|
heap
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
1C02E9AC000
|
heap
|
page read and write
|
||
2EB487B000
|
stack
|
page read and write
|
||
206B14EC000
|
heap
|
page read and write
|
||
1E218400000
|
direct allocation
|
page execute and read and write
|
||
50287E000
|
stack
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
187E6660000
|
heap
|
page read and write
|
||
24D29F6B000
|
heap
|
page read and write
|
||
802AF7F000
|
stack
|
page read and write
|
||
1F77CA79000
|
heap
|
page read and write
|
||
1C02E989000
|
heap
|
page read and write
|
||
1CDC9750000
|
trusted library allocation
|
page read and write
|
||
26249889000
|
heap
|
page read and write
|
||
1CDC4918000
|
heap
|
page read and write
|
||
1CC26A80000
|
remote allocation
|
page read and write
|
||
1CDC4029000
|
heap
|
page read and write
|
||
23D99843000
|
heap
|
page read and write
|
||
25BB6C60000
|
trusted library allocation
|
page read and write
|
||
24D29F45000
|
heap
|
page read and write
|
||
1F1CA500000
|
heap
|
page read and write
|
||
1F1CA7F5000
|
heap
|
page read and write
|
||
141E0029000
|
heap
|
page read and write
|
||
187E6652000
|
heap
|
page read and write
|
||
1A6FFE60000
|
heap
|
page read and write
|
||
1F1CBF00000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1CC26413000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
141E0080000
|
heap
|
page read and write
|
||
23D98813000
|
heap
|
page read and write
|
||
23B54F7000
|
stack
|
page read and write
|
||
15F387E000
|
stack
|
page read and write
|
||
1C02EE00000
|
heap
|
page read and write
|
||
187E65C0000
|
trusted library allocation
|
page read and write
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
1E2181C8000
|
heap
|
page read and write
|
||
1F1CA500000
|
heap
|
page read and write
|
||
1CDC9720000
|
trusted library allocation
|
page read and write
|
||
1C02E98B000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
141DFEA0000
|
heap
|
page read and write
|
||
7FFC66D59000
|
unkown
|
page readonly
|
||
1C02E085000
|
heap
|
page read and write
|
||
1CC26400000
|
heap
|
page read and write
|
||
C43000
|
heap
|
page read and write
|
||
33833FF000
|
stack
|
page read and write
|
||
7FFC66D00000
|
unkown
|
page readonly
|
||
213F25B5000
|
heap
|
page read and write
|
||
1F1CA7D4000
|
heap
|
page read and write
|
||
206B148A000
|
heap
|
page read and write
|
||
1CDC4087000
|
heap
|
page read and write
|
||
A9AB2FC000
|
stack
|
page read and write
|
||
1C02E051000
|
heap
|
page read and write
|
||
1FD5E7A000
|
stack
|
page read and write
|
||
1CDC3FC0000
|
trusted library allocation
|
page read and write
|
||
7FFC66D56000
|
unkown
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
1430AC42000
|
heap
|
page read and write
|
||
91FB279000
|
stack
|
page read and write
|
||
1FDEE134000
|
heap
|
page read and write
|
||
1CDC4800000
|
heap
|
page read and write
|
||
1FDEE2F0000
|
heap
|
page read and write
|
||
1F1CA7D4000
|
heap
|
page read and write
|
||
C78B37B000
|
stack
|
page read and write
|
||
1CDC403F000
|
heap
|
page read and write
|
||
1C02E95F000
|
heap
|
page read and write
|
||
187E6530000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
22130B60000
|
heap
|
page read and write
|
||
1CDC5489000
|
heap
|
page read and write
|
||
266C2028000
|
heap
|
page read and write
|
||
1C02E986000
|
heap
|
page read and write
|
||
1C02E013000
|
heap
|
page read and write
|
||
1C02E98B000
|
heap
|
page read and write
|
||
1C02E95B000
|
heap
|
page read and write
|
||
1CDC97F0000
|
trusted library allocation
|
page read and write
|
||
187E6E02000
|
trusted library allocation
|
page read and write
|
||
BB7475000
|
stack
|
page read and write
|
||
23B53FB000
|
stack
|
page read and write
|
||
1A6FFE40000
|
heap
|
page read and write
|
||
25BB5D50000
|
heap
|
page read and write
|
||
141E0113000
|
heap
|
page read and write
|
||
1A4EAFF000
|
stack
|
page read and write
|
||
213F2413000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
1AD96E4D000
|
heap
|
page read and write
|
||
206B147D000
|
heap
|
page read and write
|
||
25BB6C30000
|
trusted library allocation
|
page read and write
|
||
1FD617C000
|
stack
|
page read and write
|
||
1C02E9A1000
|
heap
|
page read and write
|
||
3AA4FFE000
|
stack
|
page read and write
|
||
1C02E9B1000
|
heap
|
page read and write
|
||
23D99136000
|
heap
|
page read and write
|
||
C78AD4C000
|
stack
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
1C02EE02000
|
heap
|
page read and write
|
||
213F24E0000
|
heap
|
page read and write
|
||
EC3027C000
|
stack
|
page read and write
|
||
1CC26402000
|
heap
|
page read and write
|
||
1F1CA520000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page readonly
|
||
1A4EBFE000
|
stack
|
page read and write
|
||
1C02E99A000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1C02E0D2000
|
heap
|
page read and write
|
||
23B5878000
|
stack
|
page read and write
|
||
1CDC3EC0000
|
heap
|
page read and write
|
||
1F77CA13000
|
heap
|
page read and write
|
||
1CDC54FC000
|
heap
|
page read and write
|
||
1430AC84000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1CDC9970000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1C02E9A0000
|
heap
|
page read and write
|
||
1CDC54E2000
|
heap
|
page read and write
|
||
1CDC40BF000
|
heap
|
page read and write
|
||
1C02E108000
|
heap
|
page read and write
|
||
206B1575000
|
heap
|
page read and write
|
||
1C02E97B000
|
heap
|
page read and write
|
||
1C02E992000
|
heap
|
page read and write
|
||
7FFC66D52000
|
unkown
|
page readonly
|
||
1CDC972E000
|
trusted library allocation
|
page read and write
|
||
EDD1CFE000
|
stack
|
page read and write
|
||
1F1CA4B0000
|
heap
|
page read and write
|
||
1AD96F02000
|
heap
|
page read and write
|
||
15F38FE000
|
stack
|
page read and write
|
||
C78B9FE000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
1CDC9744000
|
trusted library allocation
|
page read and write
|
||
1F1CA7C0000
|
heap
|
page readonly
|
||
1430AC6E000
|
heap
|
page read and write
|
There are 950 hidden memdumps, click here to show them.