Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3vYbe1bYFd.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x1bb4a119, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3vY_f2377edc972ec1548b57729b7c19e6e09b2f3f_e0906090_051c2651\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3vY_f2377edc972ec1548b57729b7c19e6e09b2f3f_e0906090_0f5825e4\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA615.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun May 22 21:31:21 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA72E.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun May 22 21:31:21 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA933.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA8C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB17.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACDD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61480 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\3vYbe1bYFd.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\3vYbe1bYFd.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\3vYbe1bYFd.dll,AddIn_FileTime
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZhCaZiQILulll\dyxOJP.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\3vYbe1bYFd.dll,AddIn_SystemTime
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\3vYbe1bYFd.dll,DllRegisterServer
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k unistacksvcgroup
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\3vYbe1bYFd.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3vYbe1bYFd.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 404 -s 336
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 4584 -s 328
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://165.22.73.229/X)
|
unknown
|
||
https://165.22.73.229/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://www.tiktok.com/legal/report
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://165.22.73.229:8080/
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://165.22.73.229:8080/Num
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 39 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
165.22.73.229
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
17C4A5C0000
|
direct allocation
|
page execute and read and write
|
||
17C4A5C0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
A80000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
A70000
|
direct allocation
|
page execute and read and write
|
||
1B1EE280000
|
direct allocation
|
page execute and read and write
|
||
1B1EE280000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
17C4A5C0000
|
direct allocation
|
page execute and read and write
|
||
1B1EE280000
|
direct allocation
|
page execute and read and write
|
||
2D34000
|
heap
|
page read and write
|
||
1D624E1A000
|
heap
|
page read and write
|
||
D3A0E9B000
|
stack
|
page read and write
|
||
262962D6000
|
heap
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
6D5C07C000
|
stack
|
page read and write
|
||
1E4F4413000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
6D5BF7E000
|
stack
|
page read and write
|
||
147C8A7E000
|
heap
|
page read and write
|
||
221D283A000
|
heap
|
page read and write
|
||
147C9321000
|
heap
|
page read and write
|
||
1C64CE20000
|
trusted library allocation
|
page read and write
|
||
147C939F000
|
heap
|
page read and write
|
||
1B1EDFC0000
|
heap
|
page read and write
|
||
9085E7F000
|
stack
|
page read and write
|
||
29A2A05A000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
2436D700000
|
remote allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
2436D5AE000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2D8A000
|
heap
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
189CF8D000
|
stack
|
page read and write
|
||
1B1EDFC0000
|
unkown
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
2D75000
|
heap
|
page read and write
|
||
147C93AF000
|
heap
|
page read and write
|
||
29A29F20000
|
heap
|
page read and write
|
||
29A2A102000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
199B7E81000
|
heap
|
page read and write
|
||
1BA975F0000
|
heap
|
page read and write
|
||
26296297000
|
heap
|
page read and write
|
||
3366A7B000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2290343C000
|
heap
|
page read and write
|
||
262962B7000
|
heap
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
D80597B000
|
stack
|
page read and write
|
||
147C97B0000
|
remote allocation
|
page read and write
|
||
262962BE000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
221D285C000
|
heap
|
page read and write
|
||
17C4A5F0000
|
heap
|
page read and write
|
||
147C9396000
|
heap
|
page read and write
|
||
2436D5E0000
|
trusted library allocation
|
page read and write
|
||
24368802000
|
heap
|
page read and write
|
||
262961F5000
|
heap
|
page read and write
|
||
147C937F000
|
heap
|
page read and write
|
||
2436D902000
|
heap
|
page read and write
|
||
221D2800000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
17C4A5F0000
|
heap
|
page read and write
|
||
29A2A063000
|
heap
|
page read and write
|
||
1D625060000
|
heap
|
page read and write
|
||
1BA97913000
|
heap
|
page read and write
|
||
147C8AE7000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
147C9300000
|
heap
|
page read and write
|
||
23DE000
|
stack
|
page read and write
|
||
2FDAD250000
|
heap
|
page read and write
|
||
17C4A8A0000
|
heap
|
page read and write
|
||
147C8AE4000
|
heap
|
page read and write
|
||
199B7C60000
|
heap
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
1B1EE330000
|
heap
|
page read and write
|
||
147C88B0000
|
heap
|
page read and write
|
||
1E4F4513000
|
heap
|
page read and write
|
||
29A7C160000
|
heap
|
page read and write
|
||
474DDF9000
|
stack
|
page read and write
|
||
2D9BCAA0000
|
heap
|
page read and write
|
||
2D9BD402000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
2436D670000
|
trusted library allocation
|
page read and write
|
||
2436D6E0000
|
trusted library allocation
|
page read and write
|
||
25078272000
|
heap
|
page read and write
|
||
2432E413000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
18002F000
|
direct allocation
|
page read and write
|
||
C25B9FB000
|
stack
|
page read and write
|
||
1C64CF08000
|
heap
|
page read and write
|
||
DFEEAFC000
|
stack
|
page read and write
|
||
33671FE000
|
stack
|
page read and write
|
||
1C64D1C0000
|
trusted library allocation
|
page read and write
|
||
D04107A000
|
stack
|
page read and write
|
||
24368074000
|
heap
|
page read and write
|
||
17C4A880000
|
heap
|
page readonly
|
||
24367F00000
|
trusted library allocation
|
page read and write
|
||
1E4F43F0000
|
remote allocation
|
page read and write
|
||
29A78F5D000
|
heap
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
29A7C2B0000
|
heap
|
page read and write
|
||
199B7DD0000
|
trusted library allocation
|
page read and write
|
||
1B1EE120000
|
heap
|
page read and write
|
||
17C4A5F8000
|
heap
|
page read and write
|
||
A30218E000
|
stack
|
page read and write
|
||
1B1EE270000
|
direct allocation
|
page execute and read and write
|
||
2432E43D000
|
heap
|
page read and write
|
||
147C8B16000
|
heap
|
page read and write
|
||
147C91B0000
|
trusted library allocation
|
page read and write
|
||
29A2A05B000
|
heap
|
page read and write
|
||
24368023000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
24368918000
|
heap
|
page read and write
|
||
25078100000
|
trusted library allocation
|
page read and write
|
||
147C8A49000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
1B1EE129000
|
heap
|
page read and write
|
||
147C937E000
|
heap
|
page read and write
|
||
147C937D000
|
heap
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
1BA97813000
|
heap
|
page read and write
|
||
8B7F8FF000
|
stack
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
1E4F443F000
|
heap
|
page read and write
|
||
1E4F5DA0000
|
trusted library allocation
|
page read and write
|
||
147C939F000
|
heap
|
page read and write
|
||
199B7F00000
|
heap
|
page read and write
|
||
2436D81F000
|
heap
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
180000000
|
direct allocation
|
page read and write
|
||
1BA97800000
|
heap
|
page read and write
|
||
29A79125000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
221D2862000
|
heap
|
page read and write
|
||
3366D7A000
|
stack
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
262962D2000
|
heap
|
page read and write
|
||
221D285F000
|
heap
|
page read and write
|
||
147C9319000
|
heap
|
page read and write
|
||
24368918000
|
heap
|
page read and write
|
||
1E4F42A0000
|
heap
|
page read and write
|
||
29A78F6C000
|
heap
|
page read and write
|
||
250782CD000
|
heap
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
221D2760000
|
trusted library allocation
|
page read and write
|
||
1D624E20000
|
heap
|
page read and write
|
||
147C93AF000
|
heap
|
page read and write
|
||
147C9803000
|
heap
|
page read and write
|
||
D04147B000
|
stack
|
page read and write
|
||
29A2A05D000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
147C8AAC000
|
heap
|
page read and write
|
||
22903400000
|
heap
|
page read and write
|
||
2436D480000
|
trusted library allocation
|
page read and write
|
||
24368902000
|
heap
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
262962D4000
|
heap
|
page read and write
|
||
2432E2E0000
|
heap
|
page read and write
|
||
6B2547B000
|
stack
|
page read and write
|
||
29A2A000000
|
heap
|
page read and write
|
||
147C935E000
|
heap
|
page read and write
|
||
221D286A000
|
heap
|
page read and write
|
||
147C9819000
|
heap
|
page read and write
|
||
474DD7F000
|
stack
|
page read and write
|
||
199B7CD0000
|
heap
|
page read and write
|
||
147C9375000
|
heap
|
page read and write
|
||
1B1EE100000
|
heap
|
page read and write
|
||
147C8B13000
|
heap
|
page read and write
|
||
9085E7F000
|
stack
|
page read and write
|
||
1E4F4230000
|
heap
|
page read and write
|
||
147C9202000
|
heap
|
page read and write
|
||
147C8A26000
|
heap
|
page read and write
|
||
1E4F4459000
|
heap
|
page read and write
|
||
147C93B1000
|
heap
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
1BA97877000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
25078302000
|
heap
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
2436D887000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
2507828B000
|
heap
|
page read and write
|
||
262962B6000
|
heap
|
page read and write
|
||
2432E3E0000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
1C64CEA0000
|
heap
|
page read and write
|
||
1C64D225000
|
heap
|
page read and write
|
||
17C4A8A0000
|
heap
|
page read and write
|
||
1BA97600000
|
heap
|
page read and write
|
||
199B7F13000
|
heap
|
page read and write
|
||
17C4A8A5000
|
heap
|
page read and write
|
||
1C64D229000
|
heap
|
page read and write
|
||
D04127E000
|
stack
|
page read and write
|
||
2D9BCBA0000
|
trusted library allocation
|
page read and write
|
||
1B1EFC40000
|
heap
|
page read and write
|
||
2D8C000
|
heap
|
page read and write
|
||
1C64CF11000
|
heap
|
page read and write
|
||
C25B6FE000
|
stack
|
page read and write
|
||
24367E00000
|
heap
|
page read and write
|
||
9085B6C000
|
stack
|
page read and write
|
||
22903402000
|
heap
|
page read and write
|
||
2D12000
|
heap
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
2D9BCC29000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
250782CA000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
1C64DD20000
|
trusted library allocation
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
147C8A51000
|
heap
|
page read and write
|
||
147C8AC3000
|
heap
|
page read and write
|
||
FF722FD000
|
stack
|
page read and write
|
||
24368013000
|
heap
|
page read and write
|
||
1D628240000
|
trusted library allocation
|
page read and write
|
||
2290345F000
|
heap
|
page read and write
|
||
BFB000
|
heap
|
page read and write
|
||
FC2CBFF000
|
stack
|
page read and write
|
||
147C93AA000
|
heap
|
page read and write
|
||
1C64D150000
|
trusted library allocation
|
page read and write
|
||
221D286E000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
221D284D000
|
heap
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
1E4F4518000
|
heap
|
page read and write
|
||
C25BAF7000
|
stack
|
page read and write
|
||
24368102000
|
heap
|
page read and write
|
||
D040F78000
|
stack
|
page read and write
|
||
3366E77000
|
stack
|
page read and write
|
||
FC2CA7A000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page readonly
|
||
17C4A5F8000
|
heap
|
page read and write
|
||
1B1EE2B0000
|
heap
|
page readonly
|
||
29A79120000
|
heap
|
page read and write
|
||
1D624E32000
|
heap
|
page read and write
|
||
2436D6D0000
|
trusted library allocation
|
page read and write
|
||
221D2902000
|
heap
|
page read and write
|
||
1D624E23000
|
heap
|
page read and write
|
||
1D624E2D000
|
heap
|
page read and write
|
||
147C9394000
|
heap
|
page read and write
|
||
29A2A03C000
|
heap
|
page read and write
|
||
24368076000
|
heap
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
17C4BEF0000
|
heap
|
page read and write
|
||
221D2875000
|
heap
|
page read and write
|
||
147C9317000
|
heap
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
1B1EE220000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
29A78F71000
|
heap
|
page read and write
|
||
262962B4000
|
heap
|
page read and write
|
||
25078000000
|
heap
|
page read and write
|
||
1B1EE310000
|
remote allocation
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
24368092000
|
heap
|
page read and write
|
||
22903481000
|
heap
|
page read and write
|
||
221D2860000
|
heap
|
page read and write
|
||
2436D690000
|
trusted library allocation
|
page read and write
|
||
221D2841000
|
heap
|
page read and write
|
||
2436D8FF000
|
heap
|
page read and write
|
||
769FD9F000
|
stack
|
page read and write
|
||
1E4F451C000
|
heap
|
page read and write
|
||
17C4A540000
|
heap
|
page read and write
|
||
1E4F43C0000
|
trusted library allocation
|
page read and write
|
||
D0419FA000
|
stack
|
page read and write
|
||
D040B6B000
|
stack
|
page read and write
|
||
1B1EDFC0000
|
unkown
|
page read and write
|
||
2290347B000
|
heap
|
page read and write
|
||
17C4BEF0000
|
heap
|
page read and write
|
||
147C8B02000
|
heap
|
page read and write
|
||
A30287F000
|
stack
|
page read and write
|
||
9085EFF000
|
stack
|
page read and write
|
||
6B2527E000
|
stack
|
page read and write
|
||
147C9371000
|
heap
|
page read and write
|
||
243680AC000
|
heap
|
page read and write
|
||
1E4F4240000
|
heap
|
page read and write
|
||
D041BFF000
|
stack
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
147C9371000
|
heap
|
page read and write
|
||
1C64CF50000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
199B7F02000
|
heap
|
page read and write
|
||
147C8AB6000
|
heap
|
page read and write
|
||
221D2831000
|
heap
|
page read and write
|
||
FC2CC78000
|
stack
|
page read and write
|
||
22903502000
|
heap
|
page read and write
|
||
1E4F43F0000
|
remote allocation
|
page read and write
|
||
29A78F59000
|
heap
|
page read and write
|
||
199B7E29000
|
heap
|
page read and write
|
||
8B7FBFF000
|
stack
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
199B8602000
|
trusted library allocation
|
page read and write
|
||
1D6280A0000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
221D2865000
|
heap
|
page read and write
|
||
17C4A400000
|
unkown
|
page read and write
|
||
29A78F62000
|
heap
|
page read and write
|
||
147C9397000
|
heap
|
page read and write
|
||
147C8B08000
|
heap
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
6B252FC000
|
stack
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
262962D2000
|
heap
|
page read and write
|
||
250782BC000
|
heap
|
page read and write
|
||
147C8A89000
|
heap
|
page read and write
|
||
262962D2000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
221D2845000
|
heap
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
24368900000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
2436D6F0000
|
trusted library allocation
|
page read and write
|
||
221D2840000
|
heap
|
page read and write
|
||
C9D000
|
heap
|
page read and write
|
||
25078213000
|
heap
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
199B7C70000
|
heap
|
page read and write
|
||
1BA97858000
|
heap
|
page read and write
|
||
221D287F000
|
heap
|
page read and write
|
||
199B7E3C000
|
heap
|
page read and write
|
||
221D2842000
|
heap
|
page read and write
|
||
147C93D9000
|
heap
|
page read and write
|
||
9085B6C000
|
stack
|
page read and write
|
||
29A2A108000
|
heap
|
page read and write
|
||
2436806F000
|
heap
|
page read and write
|
||
29A2A02A000
|
heap
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
C25B67B000
|
stack
|
page read and write
|
||
2436D700000
|
remote allocation
|
page read and write
|
||
147C8A55000
|
heap
|
page read and write
|
||
1D624E3E000
|
heap
|
page read and write
|
||
221D2847000
|
heap
|
page read and write
|
||
147C9382000
|
heap
|
page read and write
|
||
22903413000
|
heap
|
page read and write
|
||
147C8A71000
|
heap
|
page read and write
|
||
C25B87B000
|
stack
|
page read and write
|
||
2D9BCC33000
|
heap
|
page read and write
|
||
243680FD000
|
heap
|
page read and write
|
||
262962D2000
|
heap
|
page read and write
|
||
221D2832000
|
heap
|
page read and write
|
||
C9D000
|
heap
|
page read and write
|
||
147C939E000
|
heap
|
page read and write
|
||
2D9BCA30000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
2432E402000
|
heap
|
page read and write
|
||
9085EFF000
|
stack
|
page read and write
|
||
2436D5C1000
|
trusted library allocation
|
page read and write
|
||
22903452000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
147C9377000
|
heap
|
page read and write
|
||
1B1EE335000
|
heap
|
page read and write
|
||
29A78F5E000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
24368959000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
147C9383000
|
heap
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1D628233000
|
heap
|
page read and write
|
||
17C4A5B0000
|
direct allocation
|
page execute and read and write
|
||
2436D812000
|
heap
|
page read and write
|
||
24368913000
|
heap
|
page read and write
|
||
147C9377000
|
heap
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
24368059000
|
heap
|
page read and write
|
||
2436D700000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
2629629E000
|
heap
|
page read and write
|
||
2432E467000
|
heap
|
page read and write
|
||
1E4F5E02000
|
trusted library allocation
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
1B1EE330000
|
heap
|
page read and write
|
||
1C64D230000
|
trusted library allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
2432E400000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2D9BCC25000
|
heap
|
page read and write
|
||
199B7E5F000
|
heap
|
page read and write
|
||
1BA97760000
|
trusted library allocation
|
page read and write
|
||
25078229000
|
heap
|
page read and write
|
||
336727F000
|
unkown
|
page read and write
|
||
29A7C2B3000
|
heap
|
page read and write
|
||
24369400000
|
trusted library allocation
|
page read and write
|
||
2436D6B0000
|
trusted library allocation
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
2D9BCC02000
|
heap
|
page read and write
|
||
24368102000
|
heap
|
page read and write
|
||
D0417FD000
|
stack
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
29A78F48000
|
heap
|
page read and write
|
||
147C8ACA000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
147C93AE000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
245F000
|
stack
|
page read and write
|
||
147C9377000
|
heap
|
page read and write
|
||
9451FB000
|
stack
|
page read and write
|
||
2D9BCBD0000
|
remote allocation
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
147C9350000
|
heap
|
page read and write
|
||
1D625065000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
2BCB000
|
stack
|
page read and write
|
||
1D624E46000
|
heap
|
page read and write
|
||
199B7E00000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2436D400000
|
trusted library allocation
|
page read and write
|
||
2436D8E0000
|
heap
|
page read and write
|
||
147C9385000
|
heap
|
page read and write
|
||
221D287B000
|
heap
|
page read and write
|
||
769FD1F000
|
stack
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
1E4F4449000
|
heap
|
page read and write
|
||
221D2829000
|
heap
|
page read and write
|
||
2355AFF000
|
stack
|
page read and write
|
||
24367D90000
|
heap
|
page read and write
|
||
199B7E65000
|
heap
|
page read and write
|
||
221D2813000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
147C938D000
|
heap
|
page read and write
|
||
2290345C000
|
heap
|
page read and write
|
||
2432EC02000
|
trusted library allocation
|
page read and write
|
||
24367FF0000
|
trusted library allocation
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
2436D5E4000
|
trusted library allocation
|
page read and write
|
||
3366B7E000
|
stack
|
page read and write
|
||
2436808B000
|
heap
|
page read and write
|
||
2436D6C0000
|
trusted library allocation
|
page read and write
|
||
9085BEE000
|
stack
|
page read and write
|
||
2D9BCD02000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
221D2859000
|
heap
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
147C9324000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1E4F4449000
|
heap
|
page read and write
|
||
147C9377000
|
heap
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
2436D5C0000
|
trusted library allocation
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
147C938C000
|
heap
|
page read and write
|
||
147C8A80000
|
heap
|
page read and write
|
||
D80587B000
|
stack
|
page read and write
|
||
2436D5A0000
|
trusted library allocation
|
page read and write
|
||
29A2A05F000
|
heap
|
page read and write
|
||
1B1EE2B0000
|
heap
|
page readonly
|
||
17C4A560000
|
heap
|
page read and write
|
||
1D62506B000
|
heap
|
page read and write
|
||
189CF0E000
|
stack
|
page read and write
|
||
1B1EE330000
|
heap
|
page read and write
|
||
22903513000
|
heap
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
D80577E000
|
stack
|
page read and write
|
||
D80567B000
|
stack
|
page read and write
|
||
147C9371000
|
heap
|
page read and write
|
||
17C4BF90000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
A30267E000
|
stack
|
page read and write
|
||
2432E477000
|
heap
|
page read and write
|
||
1B1EFC40000
|
heap
|
page read and write
|
||
29A7912B000
|
heap
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
6C5000
|
stack
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
29A78DC0000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
2A0B000
|
stack
|
page read and write
|
||
9085E7F000
|
stack
|
page read and write
|
||
1D624E08000
|
heap
|
page read and write
|
||
769FC9C000
|
stack
|
page read and write
|
||
1C64CF48000
|
heap
|
page read and write
|
||
1E4F4458000
|
heap
|
page read and write
|
||
22903489000
|
heap
|
page read and write
|
||
199B7E57000
|
heap
|
page read and write
|
||
29A2A07C000
|
heap
|
page read and write
|
||
147C9392000
|
heap
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
A60000
|
direct allocation
|
page execute and read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
25078313000
|
heap
|
page read and write
|
||
769FD1F000
|
stack
|
page read and write
|
||
17C4A880000
|
heap
|
page readonly
|
||
2DCE000
|
heap
|
page read and write
|
||
147C8AD7000
|
heap
|
page read and write
|
||
6B2557D000
|
stack
|
page read and write
|
||
147C9380000
|
heap
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
147C9385000
|
heap
|
page read and write
|
||
262962B3000
|
heap
|
page read and write
|
||
1B1EE270000
|
direct allocation
|
page execute and read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
2D65000
|
heap
|
page read and write
|
||
2436D5A8000
|
trusted library allocation
|
page read and write
|
||
A30277F000
|
stack
|
page read and write
|
||
22903320000
|
trusted library allocation
|
page read and write
|
||
2436D8F5000
|
heap
|
page read and write
|
||
221D287A000
|
heap
|
page read and write
|
||
1B1EE310000
|
remote allocation
|
page read and write
|
||
1B1EFC40000
|
heap
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
147C8AE9000
|
heap
|
page read and write
|
||
262962BE000
|
heap
|
page read and write
|
||
D8056FD000
|
stack
|
page read and write
|
||
221D2863000
|
heap
|
page read and write
|
||
8B7F37B000
|
stack
|
page read and write
|
||
1D626950000
|
heap
|
page read and write
|
||
2436D864000
|
heap
|
page read and write
|
||
1D624E47000
|
heap
|
page read and write
|
||
8B7F4FC000
|
stack
|
page read and write
|
||
94557E000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
221D2885000
|
heap
|
page read and write
|
||
D04117A000
|
stack
|
page read and write
|
||
6D5C4FE000
|
stack
|
page read and write
|
||
29A78F7D000
|
heap
|
page read and write
|
||
FC2CCFF000
|
stack
|
page read and write
|
||
147C8A29000
|
heap
|
page read and write
|
||
29A2A086000
|
heap
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
147C93B4000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
25078268000
|
heap
|
page read and write
|
||
147C8A4F000
|
heap
|
page read and write
|
||
243680FD000
|
heap
|
page read and write
|
||
1BA98002000
|
trusted library allocation
|
page read and write
|
||
D805BFF000
|
stack
|
page read and write
|
||
2D9BCC58000
|
heap
|
page read and write
|
||
2432E48A000
|
heap
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
474DA7C000
|
stack
|
page read and write
|
||
2FDAD390000
|
heap
|
page read and write
|
||
147C937F000
|
heap
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
1B1EE220000
|
heap
|
page read and write
|
||
29A29F30000
|
heap
|
page read and write
|
||
2436D8FB000
|
heap
|
page read and write
|
||
262962BE000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
DFEED7D000
|
stack
|
page read and write
|
||
17C4A540000
|
heap
|
page read and write
|
||
262962B1000
|
heap
|
page read and write
|
||
2432E280000
|
heap
|
page read and write
|
||
17C4BF90000
|
heap
|
page read and write
|
||
C25B77E000
|
stack
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
3366AFE000
|
stack
|
page read and write
|
||
147C9379000
|
heap
|
page read and write
|
||
1E4F43A0000
|
trusted library allocation
|
page read and write
|
||
1BA9787B000
|
heap
|
page read and write
|
||
1B1EE335000
|
heap
|
page read and write
|
||
147C9380000
|
heap
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
147C9324000
|
heap
|
page read and write
|
||
1E4F4502000
|
heap
|
page read and write
|
||
1B1EE120000
|
heap
|
page read and write
|
||
199B7E2C000
|
heap
|
page read and write
|
||
221D2867000
|
heap
|
page read and write
|
||
6D5C3FF000
|
stack
|
page read and write
|
||
2436D905000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
24368029000
|
heap
|
page read and write
|
||
1E4F4468000
|
heap
|
page read and write
|
||
1E4F4459000
|
heap
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
FC2CB7F000
|
stack
|
page read and write
|
||
221D285A000
|
heap
|
page read and write
|
||
29A2A068000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
1B1EFDF0000
|
heap
|
page read and write
|
||
147C8A3C000
|
heap
|
page read and write
|
||
2436D670000
|
trusted library allocation
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
147C8A4E000
|
heap
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
29A29FC0000
|
trusted library allocation
|
page read and write
|
||
147C8A00000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
BC0000
|
remote allocation
|
page read and write
|
||
FC2CD7C000
|
stack
|
page read and write
|
||
24368125000
|
heap
|
page read and write
|
||
1D624E29000
|
heap
|
page read and write
|
||
17C4BF90000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
221D2844000
|
heap
|
page read and write
|
||
3366F77000
|
stack
|
page read and write
|
||
262962CC000
|
heap
|
page read and write
|
||
147C8A48000
|
heap
|
page read and write
|
||
147C9397000
|
heap
|
page read and write
|
||
24368079000
|
heap
|
page read and write
|
||
22903C02000
|
trusted library allocation
|
page read and write
|
||
24368114000
|
heap
|
page read and write
|
||
D805CFF000
|
stack
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
147C937F000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
147C938F000
|
heap
|
page read and write
|
||
147C9800000
|
heap
|
page read and write
|
||
221D287C000
|
heap
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
17C4A8A0000
|
heap
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
147C8A58000
|
heap
|
page read and write
|
||
2436D900000
|
heap
|
page read and write
|
||
DFEEEFD000
|
stack
|
page read and write
|
||
29A78F6C000
|
heap
|
page read and write
|
||
1BA97802000
|
heap
|
page read and write
|
||
147C9383000
|
heap
|
page read and write
|
||
29A79090000
|
heap
|
page read and write
|
||
2D9BCC13000
|
heap
|
page read and write
|
||
221D283D000
|
heap
|
page read and write
|
||
6B2517E000
|
stack
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
94547F000
|
stack
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
1E4F6000000
|
trusted library allocation
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
29A78F56000
|
heap
|
page read and write
|
||
29A78F20000
|
heap
|
page read and write
|
||
1C64D0E0000
|
trusted library allocation
|
page read and write
|
||
1E4F4448000
|
heap
|
page read and write
|
||
6B2577F000
|
stack
|
page read and write
|
||
7FFFF6D3F000
|
unkown
|
page readonly
|
||
FC2CAFE000
|
stack
|
page read and write
|
||
1B1EE2B0000
|
heap
|
page readonly
|
||
CC6000
|
heap
|
page read and write
|
||
147C9381000
|
heap
|
page read and write
|
||
17C4A5F0000
|
heap
|
page read and write
|
||
B4D000
|
heap
|
page read and write
|
||
221D2864000
|
heap
|
page read and write
|
||
147C8AA5000
|
heap
|
page read and write
|
||
1D624E1A000
|
heap
|
page read and write
|
||
1D624E00000
|
heap
|
page read and write
|
||
235587D000
|
stack
|
page read and write
|
||
D3A127F000
|
stack
|
page read and write
|
||
1B1EE270000
|
direct allocation
|
page execute and read and write
|
||
25078B00000
|
heap
|
page read and write
|
||
147C93AF000
|
heap
|
page read and write
|
||
24368000000
|
heap
|
page read and write
|
||
147C934C000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
A50000
|
direct allocation
|
page execute and read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
25078A02000
|
heap
|
page read and write
|
||
147C9377000
|
heap
|
page read and write
|
||
1D624CC0000
|
heap
|
page read and write
|
||
221D2876000
|
heap
|
page read and write
|
||
147C8A80000
|
heap
|
page read and write
|
||
2436D5C4000
|
trusted library allocation
|
page read and write
|
||
147C939E000
|
heap
|
page read and write
|
||
6EA000
|
stack
|
page read and write
|
||
2432E429000
|
heap
|
page read and write
|
||
8B7F5FD000
|
stack
|
page read and write
|
||
147C8A7E000
|
heap
|
page read and write
|
||
DFEE9FE000
|
stack
|
page read and write
|
||
1B1EE129000
|
heap
|
page read and write
|
||
2432E45B000
|
heap
|
page read and write
|
||
22903429000
|
heap
|
page read and write
|
||
2436D8A0000
|
heap
|
page read and write
|
||
1E4F4479000
|
heap
|
page read and write
|
||
6B253FC000
|
stack
|
page read and write
|
||
2436D700000
|
remote allocation
|
page read and write
|
||
2355DFC000
|
stack
|
page read and write
|
||
6B2587E000
|
stack
|
page read and write
|
||
147C93AF000
|
heap
|
page read and write
|
||
22903508000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
262961F0000
|
heap
|
page read and write
|
||
1C64D210000
|
trusted library allocation
|
page read and write
|
||
2D9BCC00000
|
heap
|
page read and write
|
||
24368904000
|
heap
|
page read and write
|
||
1D624F20000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1B1EE100000
|
heap
|
page read and write
|
||
29A78F68000
|
heap
|
page read and write
|
||
2355CFC000
|
stack
|
page read and write
|
||
1D624E23000
|
heap
|
page read and write
|
||
147C937D000
|
heap
|
page read and write
|
||
17C4A5F8000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
710000
|
remote allocation
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
2436D857000
|
heap
|
page read and write
|
||
221D2857000
|
heap
|
page read and write
|
||
6D5BEFE000
|
stack
|
page read and write
|
||
147C937D000
|
heap
|
page read and write
|
||
221D2846000
|
heap
|
page read and write
|
||
29A7C2C0000
|
trusted library allocation
|
page read and write
|
||
2432E513000
|
heap
|
page read and write
|
||
221D2861000
|
heap
|
page read and write
|
||
944C8B000
|
stack
|
page read and write
|
||
2FDAD4BD000
|
heap
|
page read and write
|
||
769FD9F000
|
stack
|
page read and write
|
||
9452FB000
|
stack
|
page read and write
|
||
147C937F000
|
heap
|
page read and write
|
||
221D2878000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
1E4F448A000
|
heap
|
page read and write
|
||
1C64D0F0000
|
trusted library allocation
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
1C64CF33000
|
heap
|
page read and write
|
||
29A29F90000
|
heap
|
page read and write
|
||
26296050000
|
heap
|
page read and write
|
||
25078200000
|
heap
|
page read and write
|
||
25077F90000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
2436D8E4000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page read and write
|
||
A30208C000
|
stack
|
page read and write
|
||
2CD1000
|
heap
|
page read and write
|
||
17C4A400000
|
heap
|
page read and write
|
||
17C4A560000
|
heap
|
page read and write
|
||
147C9397000
|
heap
|
page read and write
|
||
1B1EE220000
|
heap
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
17C4A5B0000
|
direct allocation
|
page execute and read and write
|
||
147C9385000
|
heap
|
page read and write
|
||
1C64D1A0000
|
heap
|
page readonly
|
||
2355BFF000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page readonly
|
||
147C8A4C000
|
heap
|
page read and write
|
||
147C937A000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
7FFFF6D32000
|
unkown
|
page readonly
|
||
8B7EF0C000
|
stack
|
page read and write
|
||
2436D8FD000
|
heap
|
page read and write
|
||
769FD1F000
|
stack
|
page read and write
|
||
17C4BF10000
|
remote allocation
|
page read and write
|
||
147C9383000
|
heap
|
page read and write
|
||
262962A6000
|
heap
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
D805AF7000
|
stack
|
page read and write
|
||
24368958000
|
heap
|
page read and write
|
||
199B7E13000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
147C88A0000
|
heap
|
page read and write
|
||
2436D670000
|
trusted library allocation
|
page read and write
|
||
147C9379000
|
heap
|
page read and write
|
||
262961A0000
|
heap
|
page read and write
|
||
24368800000
|
heap
|
page read and write
|
||
6D5C2F7000
|
stack
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
29A2A052000
|
heap
|
page read and write
|
||
2D8C000
|
heap
|
page read and write
|
||
221D25F0000
|
heap
|
page read and write
|
||
260B000
|
stack
|
page read and write
|
||
24368815000
|
heap
|
page read and write
|
||
26296290000
|
heap
|
page read and write
|
||
1BA97828000
|
heap
|
page read and write
|
||
6B2567E000
|
stack
|
page read and write
|
||
8B7FAFF000
|
stack
|
page read and write
|
||
147C9393000
|
heap
|
page read and write
|
||
1E4F4500000
|
heap
|
page read and write
|
||
1D624E2D000
|
heap
|
page read and write
|
||
1C64CE80000
|
heap
|
page read and write
|
||
147C9380000
|
heap
|
page read and write
|
||
2436D410000
|
trusted library allocation
|
page read and write
|
||
29A2A061000
|
heap
|
page read and write
|
||
8B7F9FF000
|
stack
|
page read and write
|
||
262962B2000
|
heap
|
page read and write
|
||
147C9380000
|
heap
|
page read and write
|
||
29A78F00000
|
heap
|
page read and write
|
||
199B7F08000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
284C000
|
stack
|
page read and write
|
||
147C8AF8000
|
heap
|
page read and write
|
||
2D7C000
|
heap
|
page read and write
|
||
C25BBFF000
|
stack
|
page read and write
|
||
147C8A59000
|
heap
|
page read and write
|
||
29A2A065000
|
heap
|
page read and write
|
||
1BA97900000
|
heap
|
page read and write
|
||
147C9373000
|
heap
|
page read and write
|
||
147C939E000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
1E4F442A000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
235567B000
|
stack
|
page read and write
|
||
29A78F40000
|
heap
|
page read and write
|
||
2436D490000
|
trusted library allocation
|
page read and write
|
||
1C64D1B0000
|
trusted library allocation
|
page read and write
|
||
147C8A13000
|
heap
|
page read and write
|
||
6D5C1FF000
|
stack
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
147C9371000
|
heap
|
page read and write
|
||
22903220000
|
heap
|
page read and write
|
||
2629629A000
|
heap
|
page read and write
|
||
147C9390000
|
heap
|
page read and write
|
||
1C64CE10000
|
heap
|
page read and write
|
||
1BA97902000
|
heap
|
page read and write
|
||
17C4A560000
|
heap
|
page read and write
|
||
25077FA0000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
147C9372000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
29A78F59000
|
heap
|
page read and write
|
||
262962B2000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
147C97B0000
|
remote allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2436D800000
|
heap
|
page read and write
|
||
1C64CF4F000
|
heap
|
page read and write
|
||
147C937B000
|
heap
|
page read and write
|
||
1BA97864000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
24367FD1000
|
trusted library allocation
|
page read and write
|
||
9085EFF000
|
stack
|
page read and write
|
||
1B1EE120000
|
heap
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
1D624E1E000
|
heap
|
page read and write
|
||
2436D5D0000
|
trusted library allocation
|
page read and write
|
||
6B24BEB000
|
stack
|
page read and write
|
||
2A4C000
|
stack
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
250782C4000
|
heap
|
page read and write
|
||
147C9820000
|
heap
|
page read and write
|
||
147C937F000
|
heap
|
page read and write
|
||
2436803F000
|
heap
|
page read and write
|
||
147C937A000
|
heap
|
page read and write
|
||
221D2660000
|
heap
|
page read and write
|
||
710000
|
remote allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
2D9BCBD0000
|
remote allocation
|
page read and write
|
||
1BA97660000
|
heap
|
page read and write
|
||
221D3002000
|
trusted library allocation
|
page read and write
|
||
2CF5000
|
heap
|
page read and write
|
||
6D5C17B000
|
stack
|
page read and write
|
||
1B1EFDF0000
|
heap
|
page read and write
|
||
147C8A4B000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
474DCFE000
|
stack
|
page read and write
|
||
2D9BCBD0000
|
remote allocation
|
page read and write
|
||
147C938C000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
221D286C000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
147C939E000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
147C9803000
|
heap
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
2D9BCC3D000
|
heap
|
page read and write
|
||
336707F000
|
stack
|
page read and write
|
||
29A2A044000
|
heap
|
page read and write
|
||
262962A1000
|
heap
|
page read and write
|
||
1D624F00000
|
heap
|
page read and write
|
||
2436D5D0000
|
trusted library allocation
|
page read and write
|
||
24368056000
|
heap
|
page read and write
|
||
29A2A100000
|
heap
|
page read and write
|
||
17C4A5B0000
|
direct allocation
|
page execute and read and write
|
||
1D624E1F000
|
heap
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
769FC9C000
|
stack
|
page read and write
|
||
1BA9783E000
|
heap
|
page read and write
|
||
D04137C000
|
stack
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
7FFFF6D11000
|
unkown
|
page execute read
|
||
221D2868000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
769FD9F000
|
stack
|
page read and write
|
||
D3A0F9E000
|
stack
|
page read and write
|
||
2432E502000
|
heap
|
page read and write
|
||
199B7E02000
|
heap
|
page read and write
|
||
229031B0000
|
heap
|
page read and write
|
||
D3A0F1E000
|
stack
|
page read and write
|
||
C9D000
|
heap
|
page read and write
|
||
147C8A4A000
|
heap
|
page read and write
|
||
262962A6000
|
heap
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
147C9398000
|
heap
|
page read and write
|
||
147C9390000
|
heap
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
147C8AEA000
|
heap
|
page read and write
|
||
9085BEE000
|
stack
|
page read and write
|
||
17C4A400000
|
unkown
|
page read and write
|
||
22903464000
|
heap
|
page read and write
|
||
8B7F7FE000
|
stack
|
page read and write
|
||
147C9802000
|
heap
|
page read and write
|
||
1E4F4402000
|
heap
|
page read and write
|
||
1C64D190000
|
trusted library allocation
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
17C4A8A5000
|
heap
|
page read and write
|
||
2E5E000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
22903459000
|
heap
|
page read and write
|
||
D8059FE000
|
stack
|
page read and write
|
||
147C939E000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
A30257E000
|
stack
|
page read and write
|
||
147C937B000
|
heap
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
22903500000
|
heap
|
page read and write
|
||
2D9A000
|
heap
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
C25BCFF000
|
stack
|
page read and write
|
||
1B1EE100000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
C25B8FE000
|
stack
|
page read and write
|
||
147C9380000
|
heap
|
page read and write
|
||
29A2A013000
|
heap
|
page read and write
|
||
17C4BEF0000
|
heap
|
page read and write
|
||
2D9BCA40000
|
heap
|
page read and write
|
||
2FDAD4C3000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
1E4F4400000
|
heap
|
page read and write
|
||
1D628230000
|
heap
|
page read and write
|
||
24368107000
|
heap
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
2507823F000
|
heap
|
page read and write
|
||
29A2AA02000
|
trusted library allocation
|
page read and write
|
||
6D5BE7B000
|
stack
|
page read and write
|
||
2436D5E0000
|
trusted library allocation
|
page read and write
|
||
1B1EFDF0000
|
heap
|
page read and write
|
||
7FFFF6D3B000
|
unkown
|
page read and write
|
||
2432E467000
|
heap
|
page read and write
|
||
17C4A540000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
2436D84C000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
229031C0000
|
heap
|
page read and write
|
||
147C8A57000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
2DD1000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
8B7FCFE000
|
stack
|
page read and write
|
||
474DC79000
|
stack
|
page read and write
|
||
9085BEE000
|
stack
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
147C93BF000
|
heap
|
page read and write
|
||
147C93B4000
|
heap
|
page read and write
|
||
9085B6C000
|
stack
|
page read and write
|
||
17C4A8A5000
|
heap
|
page read and write
|
||
147C9386000
|
heap
|
page read and write
|
||
221D2858000
|
heap
|
page read and write
|
||
A30210E000
|
stack
|
page read and write
|
||
DFEEB7E000
|
stack
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
2436DA10000
|
trusted library allocation
|
page read and write
|
||
221D2600000
|
heap
|
page read and write
|
||
2436D82D000
|
heap
|
page read and write
|
||
17C4A880000
|
heap
|
page readonly
|
||
147C97B0000
|
remote allocation
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
2436D89B000
|
heap
|
page read and write
|
||
147C938D000
|
heap
|
page read and write
|
||
147C9387000
|
heap
|
page read and write
|
||
1C64CF00000
|
heap
|
page read and write
|
||
1B1EE335000
|
heap
|
page read and write
|
||
29A2A113000
|
heap
|
page read and write
|
||
2432E46D000
|
heap
|
page read and write
|
||
147C935F000
|
heap
|
page read and write
|
||
24368FE0000
|
trusted library allocation
|
page read and write
|
||
336717C000
|
stack
|
page read and write
|
||
2FDAD4B0000
|
heap
|
page read and write
|
||
147C93AE000
|
heap
|
page read and write
|
||
2436D5A0000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
147C9360000
|
heap
|
page read and write
|
||
DFEE87C000
|
stack
|
page read and write
|
||
189CE8B000
|
stack
|
page read and write
|
||
147C8AB2000
|
heap
|
page read and write
|
||
23559FE000
|
stack
|
page read and write
|
||
2436D7F0000
|
trusted library allocation
|
page read and write
|
||
147C935E000
|
heap
|
page read and write
|
||
147C8910000
|
heap
|
page read and write
|
||
1C64D220000
|
heap
|
page read and write
|
||
2507826B000
|
heap
|
page read and write
|
||
262962B2000
|
heap
|
page read and write
|
||
2D68000
|
heap
|
page read and write
|
||
147C8A54000
|
heap
|
page read and write
|
||
DFEEDFE000
|
stack
|
page read and write
|
||
769FC9C000
|
stack
|
page read and write
|
||
26296180000
|
heap
|
page read and write
|
||
6B24FFC000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2436D83F000
|
heap
|
page read and write
|
||
262962CE000
|
heap
|
page read and write
|
||
24367FF3000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
199B7E8D000
|
heap
|
page read and write
|
||
7FFFF6D10000
|
unkown
|
page readonly
|
||
147C8A52000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2432E270000
|
heap
|
page read and write
|
||
1C64CF4F000
|
heap
|
page read and write
|
||
2D51000
|
heap
|
page read and write
|
||
1B1EE129000
|
heap
|
page read and write
|
||
29A78F62000
|
heap
|
page read and write
|
||
1E4F43F0000
|
remote allocation
|
page read and write
|
||
17C4BF10000
|
remote allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
2436809D000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
147C938D000
|
heap
|
page read and write
|
||
147C93B6000
|
heap
|
page read and write
|
||
24367DA0000
|
heap
|
page read and write
|
||
147C9385000
|
heap
|
page read and write
|
There are 1033 hidden memdumps, click here to show them.