Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CUfsVUDkr6.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x9088c28c, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61712 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\CUfsVUDkr6.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\CUfsVUDkr6.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\CUfsVUDkr6.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Ofpagmb\vfvyklscua.sam"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\CUfsVUDkr6.dll,DllUnregisterServerr
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\CUfsVUDkr6.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CUfsVUDkr6.dll",#1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/enumeration
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/enumera
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 36 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.182.25.250
|
unknown
|
France
|
||
8.8.0.0
|
unknown
|
United States
|
||
60.7.0.0
|
unknown
|
China
|
||
70.36.102.35
|
unknown
|
United States
|
||
244.7.0.0
|
unknown
|
Reserved
|
||
144.7.0.0
|
unknown
|
China
|
||
128.7.0.0
|
unknown
|
Germany
|
||
176.130.193.2
|
unknown
|
France
|
||
44.7.0.0
|
unknown
|
United States
|
||
48.126.193.2
|
unknown
|
United States
|
||
128.130.193.2
|
unknown
|
Austria
|
||
172.7.0.0
|
unknown
|
United States
|
||
228.7.0.0
|
unknown
|
Reserved
|
||
120.8.0.0
|
unknown
|
China
|
||
160.135.187.2
|
unknown
|
United States
|
||
240.7.0.0
|
unknown
|
Reserved
|
||
136.206.195.2
|
unknown
|
Ireland
|
||
72.7.0.0
|
unknown
|
United States
|
||
76.7.0.0
|
unknown
|
United States
|
||
200.7.0.0
|
unknown
|
Brazil
|
||
96.7.0.0
|
unknown
|
United States
|
||
140.7.0.0
|
unknown
|
United States
|
||
160.7.0.0
|
unknown
|
United States
|
||
224.130.193.2
|
unknown
|
Reserved
|
||
51.91.76.89
|
unknown
|
France
|
||
4.8.0.0
|
unknown
|
United States
|
||
124.7.0.0
|
unknown
|
India
|
||
128.127.193.2
|
unknown
|
Saudi Arabia
|
||
56.8.0.0
|
unknown
|
United States
|
||
176.7.0.0
|
unknown
|
Germany
|
||
224.7.0.0
|
unknown
|
Reserved
|
||
119.193.124.41
|
unknown
|
Korea Republic of
|
||
128.154.195.2
|
unknown
|
United States
|
||
8.109.194.2
|
unknown
|
United States
|
||
156.7.0.0
|
unknown
|
United States
|
||
92.240.254.110
|
unknown
|
Slovakia (SLOVAK Republic)
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 28 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
46C1000
|
direct allocation
|
page execute read
|
||
4760000
|
direct allocation
|
page execute and read and write
|
||
3390000
|
direct allocation
|
page execute and read and write
|
||
4CE1000
|
direct allocation
|
page execute read
|
||
4690000
|
direct allocation
|
page execute and read and write
|
||
4791000
|
direct allocation
|
page execute read
|
||
940000
|
direct allocation
|
page execute and read and write
|
||
43A1000
|
direct allocation
|
page execute read
|
||
29CF000
|
stack
|
page read and write
|
||
1D1CF24D000
|
heap
|
page read and write
|
||
9E1977C000
|
stack
|
page read and write
|
||
23CC0387000
|
heap
|
page read and write
|
||
21BB0485000
|
heap
|
page read and write
|
||
23CC081A000
|
heap
|
page read and write
|
||
201C7C20000
|
heap
|
page read and write
|
||
1BF00C5B000
|
heap
|
page read and write
|
||
23CC038E000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
46C0000
|
direct allocation
|
page read and write
|
||
F5F337F000
|
stack
|
page read and write
|
||
51C000
|
stack
|
page read and write
|
||
23CBFA00000
|
heap
|
page read and write
|
||
1D1CF23B000
|
heap
|
page read and write
|
||
1AB800D0000
|
heap
|
page read and write
|
||
2799FB80000
|
trusted library allocation
|
page read and write
|
||
10051000
|
unkown
|
page readonly
|
||
175ABA6B000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
2516B45F000
|
heap
|
page read and write
|
||
262CDA02000
|
heap
|
page read and write
|
||
262CDB02000
|
heap
|
page read and write
|
||
48A0000
|
trusted library allocation
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
2EAB1190000
|
trusted library allocation
|
page read and write
|
||
52469CB000
|
stack
|
page read and write
|
||
CA2A07F000
|
stack
|
page read and write
|
||
8030F1B000
|
stack
|
page read and write
|
||
A5BC000
|
trusted library allocation
|
page read and write
|
||
2799FC20000
|
heap
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
1BF00C00000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
1BF01C02000
|
heap
|
page read and write
|
||
23CC03A0000
|
heap
|
page read and write
|
||
1F7318A8000
|
heap
|
page read and write
|
||
23CC0389000
|
heap
|
page read and write
|
||
175ABA44000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
1004B000
|
unkown
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
23CC038D000
|
heap
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
2799AD04000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2EAB122A000
|
heap
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
||
23CC037D000
|
heap
|
page read and write
|
||
D2E4A9C000
|
stack
|
page read and write
|
||
1BF0150E000
|
heap
|
page read and write
|
||
2799AD00000
|
heap
|
page read and write
|
||
1BF00A30000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
D2E527F000
|
stack
|
page read and write
|
||
5127000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
1009A000
|
unkown
|
page readonly
|
||
1F7318A0000
|
heap
|
page read and write
|
||
1BF75D08000
|
heap
|
page read and write
|
||
DA6E7B000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2799B871000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
23CC038D000
|
heap
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
21BB0402000
|
heap
|
page read and write
|
||
21FA5985000
|
heap
|
page read and write
|
||
A870C7B000
|
stack
|
page read and write
|
||
2EBC000
|
stack
|
page read and write
|
||
1BF01C00000
|
heap
|
page read and write
|
||
524757C000
|
stack
|
page read and write
|
||
23CBFA53000
|
heap
|
page read and write
|
||
2799FCDD000
|
heap
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
23CC03B2000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2C41000
|
heap
|
page read and write
|
||
1004B000
|
unkown
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
1BF00CCB000
|
heap
|
page read and write
|
||
23CC035B000
|
heap
|
page read and write
|
||
2EAB124A000
|
heap
|
page read and write
|
||
175AC300000
|
heap
|
page read and write
|
||
AD0E000
|
trusted library allocation
|
page read and write
|
||
21BB0467000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
5CC299A000
|
stack
|
page read and write
|
||
1BF00D95000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2799FE90000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
62379FE000
|
stack
|
page read and write
|
||
161FCD20000
|
heap
|
page read and write
|
||
23CC0376000
|
heap
|
page read and write
|
||
1BF00C6A000
|
heap
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
2EAB1090000
|
heap
|
page read and write
|
||
20BEC855000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
1D1CF2B7000
|
heap
|
page read and write
|
||
CA29F77000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2799A380000
|
heap
|
page read and write
|
||
2DA1000
|
heap
|
page read and write
|
||
1F731830000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
23CC0386000
|
heap
|
page read and write
|
||
465E000
|
trusted library allocation
|
page read and write
|
||
161FCDC0000
|
trusted library allocation
|
page read and write
|
||
9E1987D000
|
stack
|
page read and write
|
||
2D86000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
2799FC15000
|
heap
|
page read and write
|
||
2516B457000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
1BF00BB0000
|
trusted library allocation
|
page read and write
|
||
23CC0384000
|
heap
|
page read and write
|
||
20BEC841000
|
heap
|
page read and write
|
||
1ABFFF13000
|
heap
|
page read and write
|
||
2237EFA000
|
stack
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
2799FA40000
|
trusted library allocation
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
2799F930000
|
trusted library allocation
|
page read and write
|
||
1BF01513000
|
heap
|
page read and write
|
||
2799FA70000
|
trusted library allocation
|
page read and write
|
||
4610000
|
trusted library allocation
|
page read and write
|
||
22380FE000
|
stack
|
page read and write
|
||
1D1CF320000
|
remote allocation
|
page read and write
|
||
1BF00DE1000
|
heap
|
page read and write
|
||
2E45000
|
heap
|
page read and write
|
||
1ABFFE56000
|
heap
|
page read and write
|
||
1D1CF2AA000
|
heap
|
page read and write
|
||
2516B1C0000
|
heap
|
page read and write
|
||
2B7A000
|
heap
|
page read and write
|
||
23CC03A5000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
23CC038B000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
234CE7C000
|
stack
|
page read and write
|
||
262CD9B0000
|
heap
|
page read and write
|
||
23CBFAA3000
|
heap
|
page read and write
|
||
A87137A000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
F5F32FE000
|
stack
|
page read and write
|
||
559000
|
stack
|
page read and write
|
||
1BF00CEF000
|
heap
|
page read and write
|
||
2516B230000
|
heap
|
page read and write
|
||
234D07B000
|
stack
|
page read and write
|
||
1BF01510000
|
heap
|
page read and write
|
||
23CBF860000
|
heap
|
page read and write
|
||
23CC0322000
|
heap
|
page read and write
|
||
DA693B000
|
stack
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
||
1BF00C89000
|
heap
|
page read and write
|
||
2799AC02000
|
heap
|
page read and write
|
||
5CC2C7E000
|
stack
|
page read and write
|
||
23CBFA4A000
|
heap
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
F5F347C000
|
stack
|
page read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
2EAB1200000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
2799FB10000
|
trusted library allocation
|
page read and write
|
||
20BEC7E5000
|
heap
|
page read and write
|
||
23CC03A9000
|
heap
|
page read and write
|
||
2237FFE000
|
stack
|
page read and write
|
||
2799FBA0000
|
remote allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1BF75C54000
|
heap
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
2799FB50000
|
trusted library allocation
|
page read and write
|
||
1BF75A70000
|
heap
|
page read and write
|
||
21BB043C000
|
heap
|
page read and write
|
||
2516B442000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1D1CF1C0000
|
heap
|
page read and write
|
||
1F731700000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
2516B46A000
|
heap
|
page read and write
|
||
2516B47E000
|
heap
|
page read and write
|
||
21BB045C000
|
heap
|
page read and write
|
||
6070000
|
heap
|
page read and write
|
||
262CD950000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
1BF00C7A000
|
heap
|
page read and write
|
||
21BB0310000
|
heap
|
page read and write
|
||
A6ED000
|
trusted library allocation
|
page read and write
|
||
161FD602000
|
trusted library allocation
|
page read and write
|
||
46D3000
|
heap
|
page read and write
|
||
BBD4FE000
|
stack
|
page read and write
|
||
A7EF000
|
trusted library allocation
|
page read and write
|
||
262CDA13000
|
heap
|
page read and write
|
||
43C3000
|
direct allocation
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
9D5BBFE000
|
stack
|
page read and write
|
||
20BEC85D000
|
heap
|
page read and write
|
||
20BEC670000
|
heap
|
page read and write
|
||
2799A4B2000
|
heap
|
page read and write
|
||
1BF75D02000
|
heap
|
page read and write
|
||
1D1CF2B4000
|
heap
|
page read and write
|
||
23CC034F000
|
heap
|
page read and write
|
||
2EAB1302000
|
heap
|
page read and write
|
||
20BEC846000
|
heap
|
page read and write
|
||
1BF00C3C000
|
heap
|
page read and write
|
||
F5F35FB000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
F5F36F7000
|
stack
|
page read and write
|
||
2799B890000
|
trusted library allocation
|
page read and write
|
||
21FA55E0000
|
heap
|
page read and write
|
||
1BF00A80000
|
heap
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
2E69000
|
heap
|
page read and write
|
||
3402000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2799FCA4000
|
heap
|
page read and write
|
||
23CBFA50000
|
heap
|
page read and write
|
||
F5F34FE000
|
stack
|
page read and write
|
||
23CBF870000
|
heap
|
page read and write
|
||
2516B459000
|
heap
|
page read and write
|
||
161FCE00000
|
heap
|
page read and write
|
||
CA2989B000
|
stack
|
page read and write
|
||
340D000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
2799A48C000
|
heap
|
page read and write
|
||
201C7D13000
|
heap
|
page read and write
|
||
201C8A30000
|
trusted library allocation
|
page read and write
|
||
161FCE57000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
23CC037C000
|
heap
|
page read and write
|
||
1BF75D13000
|
heap
|
page read and write
|
||
262CDA2A000
|
heap
|
page read and write
|
||
1ABFFE3C000
|
heap
|
page read and write
|
||
2516B432000
|
heap
|
page read and write
|
||
20BEC852000
|
heap
|
page read and write
|
||
1D1CF294000
|
heap
|
page read and write
|
||
6F72DEC000
|
stack
|
page read and write
|
||
20BEC7C0000
|
heap
|
page read and write
|
||
1AB80560000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
DA6F7B000
|
stack
|
page read and write
|
||
5CC2E7F000
|
stack
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
4D02000
|
direct allocation
|
page read and write
|
||
6F73179000
|
stack
|
page read and write
|
||
2799FA61000
|
trusted library allocation
|
page read and write
|
||
1D1CF390000
|
heap
|
page read and write
|
||
161FCE02000
|
heap
|
page read and write
|
||
23CC00F0000
|
remote allocation
|
page read and write
|
||
4786000
|
heap
|
page read and write
|
||
2EAB1020000
|
heap
|
page read and write
|
||
23CC037E000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
341A000
|
heap
|
page read and write
|
||
1D1CF2B7000
|
heap
|
page read and write
|
||
23CC0387000
|
heap
|
page read and write
|
||
161FCF02000
|
heap
|
page read and write
|
||
21BB0460000
|
heap
|
page read and write
|
||
23CBFA4B000
|
heap
|
page read and write
|
||
2799FEB0000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
23CC0376000
|
heap
|
page read and write
|
||
2516B44D000
|
heap
|
page read and write
|
||
CA2999E000
|
stack
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
5077AFD000
|
stack
|
page read and write
|
||
1BF00C4A000
|
heap
|
page read and write
|
||
1ABFFDC0000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
23CC0378000
|
heap
|
page read and write
|
||
5128000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4D8C000
|
stack
|
page read and write
|
||
CA2991E000
|
stack
|
page read and write
|
||
20BEC86F000
|
heap
|
page read and write
|
||
279A0000000
|
heap
|
page read and write
|
||
21FA567B000
|
heap
|
page read and write
|
||
23CC0388000
|
heap
|
page read and write
|
||
1BF00B80000
|
trusted library allocation
|
page read and write
|
||
1ABFFE13000
|
heap
|
page read and write
|
||
2516B467000
|
heap
|
page read and write
|
||
262CDA5A000
|
heap
|
page read and write
|
||
20BEC85D000
|
heap
|
page read and write
|
||
1ABFFE68000
|
heap
|
page read and write
|
||
487D000
|
stack
|
page read and write
|
||
1D1CF050000
|
heap
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
1D1CF2B5000
|
heap
|
page read and write
|
||
23CC0202000
|
heap
|
page read and write
|
||
2516B990000
|
trusted library allocation
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
2799A473000
|
heap
|
page read and write
|
||
161FCDF0000
|
remote allocation
|
page read and write
|
||
201C8A40000
|
heap
|
page readonly
|
||
23CC03AC000
|
heap
|
page read and write
|
||
23CC0389000
|
heap
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
46E2000
|
direct allocation
|
page read and write
|
||
1BF01D02000
|
heap
|
page read and write
|
||
23CC0378000
|
heap
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
234D0FF000
|
stack
|
page read and write
|
||
2799A4A7000
|
heap
|
page read and write
|
||
2799AD02000
|
heap
|
page read and write
|
||
7AB000
|
stack
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
6F732F9000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
201C7AE0000
|
heap
|
page read and write
|
||
23CC03AF000
|
heap
|
page read and write
|
||
1D1CF292000
|
heap
|
page read and write
|
||
9D5B3FE000
|
stack
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
23CBFB13000
|
heap
|
page read and write
|
||
23CC03B4000
|
heap
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
1F731850000
|
heap
|
page read and write
|
||
2799FC89000
|
heap
|
page read and write
|
||
2799A413000
|
heap
|
page read and write
|
||
2EAB124B000
|
heap
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
80313FF000
|
stack
|
page read and write
|
||
1BF01402000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
23CBFAEB000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
D2E517E000
|
stack
|
page read and write
|
||
A77000
|
stack
|
page read and write
|
||
175ABABF000
|
heap
|
page read and write
|
||
23CC0379000
|
heap
|
page read and write
|
||
23CBFA6F000
|
heap
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
23CBFA55000
|
heap
|
page read and write
|
||
2799FBA0000
|
trusted library allocation
|
page read and write
|
||
9D5B4FC000
|
stack
|
page read and write
|
||
201C8A60000
|
trusted library allocation
|
page read and write
|
||
201C7CB0000
|
trusted library allocation
|
page read and write
|
||
1BF75BD0000
|
trusted library allocation
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
1BF75AD0000
|
heap
|
page read and write
|
||
2799A457000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
23CC0382000
|
heap
|
page read and write
|
||
2799FBA0000
|
remote allocation
|
page read and write
|
||
1BF00C7E000
|
heap
|
page read and write
|
||
1ABFFE02000
|
heap
|
page read and write
|
||
1BF75A60000
|
heap
|
page read and write
|
||
21BB0487000
|
heap
|
page read and write
|
||
9D5B7FF000
|
stack
|
page read and write
|
||
161FCD30000
|
heap
|
page read and write
|
||
1BF00C4C000
|
heap
|
page read and write
|
||
23CBFA4D000
|
heap
|
page read and write
|
||
2799FB70000
|
trusted library allocation
|
page read and write
|
||
2799FA84000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
23CBFA3C000
|
heap
|
page read and write
|
||
514F000
|
trusted library allocation
|
page read and write
|
||
BBD877000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
1BF75C62000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
23CBFAC5000
|
heap
|
page read and write
|
||
2E48000
|
heap
|
page read and write
|
||
175AB8B0000
|
heap
|
page read and write
|
||
23CC03C6000
|
heap
|
page read and write
|
||
2799A400000
|
heap
|
page read and write
|
||
9E1947A000
|
stack
|
page read and write
|
||
1BF76402000
|
trusted library allocation
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
1BF0155E000
|
heap
|
page read and write
|
||
1BF01530000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
2516B440000
|
heap
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
1D1CF230000
|
heap
|
page read and write
|
||
2799FC00000
|
heap
|
page read and write
|
||
175ABB02000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1BF01C43000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2B2F000
|
heap
|
page read and write
|
||
1ABFFF02000
|
heap
|
page read and write
|
||
47B2000
|
direct allocation
|
page read and write
|
||
D2E507E000
|
stack
|
page read and write
|
||
21BB0429000
|
heap
|
page read and write
|
||
2EAB1213000
|
heap
|
page read and write
|
||
CA2A3F8000
|
stack
|
page read and write
|
||
23CC0389000
|
heap
|
page read and write
|
||
201C7F80000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1ABFFD50000
|
heap
|
page read and write
|
||
BBD6FB000
|
stack
|
page read and write
|
||
1BF00C52000
|
heap
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2516B429000
|
heap
|
page read and write
|
||
2516B496000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
9D5B07B000
|
stack
|
page read and write
|
||
23CBFA49000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
2CE8000
|
heap
|
page read and write
|
||
175AB920000
|
heap
|
page read and write
|
||
23CC039E000
|
heap
|
page read and write
|
||
21BB0508000
|
heap
|
page read and write
|
||
201C7D25000
|
heap
|
page read and write
|
||
1BF01D1B000
|
heap
|
page read and write
|
||
201C7F85000
|
heap
|
page read and write
|
||
2799AB40000
|
trusted library allocation
|
page read and write
|
||
2516B400000
|
heap
|
page read and write
|
||
23CC0818000
|
heap
|
page read and write
|
||
472D000
|
stack
|
page read and write
|
||
23CC0376000
|
heap
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
1D1CF205000
|
heap
|
page read and write
|
||
21BB0380000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
161FCE29000
|
heap
|
page read and write
|
||
2EAB129B000
|
heap
|
page read and write
|
||
501B000
|
trusted library allocation
|
page read and write
|
||
2516B460000
|
heap
|
page read and write
|
||
1BF00C23000
|
heap
|
page read and write
|
||
23CC039E000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
remote allocation
|
page read and write
|
||
23CC03A0000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
175ABA13000
|
heap
|
page read and write
|
||
2C77000
|
heap
|
page read and write
|
||
23CBF8D0000
|
heap
|
page read and write
|
||
524707F000
|
stack
|
page read and write
|
||
1D1CF2AA000
|
heap
|
page read and write
|
||
2516B46D000
|
heap
|
page read and write
|
||
23CC0389000
|
heap
|
page read and write
|
||
524747F000
|
stack
|
page read and write
|
||
175AC312000
|
heap
|
page read and write
|
||
2799AD18000
|
heap
|
page read and write
|
||
1BF75D00000
|
heap
|
page read and write
|
||
23CC0821000
|
heap
|
page read and write
|
||
1F731870000
|
heap
|
page read and write
|
||
3305000
|
heap
|
page read and write
|
||
2799FA4E000
|
trusted library allocation
|
page read and write
|
||
1BF00C29000
|
heap
|
page read and write
|
||
23CBFA56000
|
heap
|
page read and write
|
||
20BEC85F000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page read and write
|
||
F5F327B000
|
stack
|
page read and write
|
||
21BB0462000
|
heap
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
||
21BB0413000
|
heap
|
page read and write
|
||
4A8D000
|
stack
|
page read and write
|
||
2799A441000
|
heap
|
page read and write
|
||
2516B43D000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
23CC0392000
|
heap
|
page read and write
|
||
2799FC2E000
|
heap
|
page read and write
|
||
2DAC000
|
heap
|
page read and write
|
||
2799A475000
|
heap
|
page read and write
|
||
62375FB000
|
stack
|
page read and write
|
||
262CDA00000
|
heap
|
page read and write
|
||
CA2A177000
|
stack
|
page read and write
|
||
2516B47B000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
1BF01C1D000
|
heap
|
page read and write
|
||
CA2A2FE000
|
unkown
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
20BEC7A0000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
2799A49F000
|
heap
|
page read and write
|
||
2516B46B000
|
heap
|
page read and write
|
||
23CC037E000
|
heap
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
201C7CC0000
|
trusted library allocation
|
page read and write
|
||
4790000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
2799A4FC000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2EAB123C000
|
heap
|
page read and write
|
||
9E195FE000
|
stack
|
page read and write
|
||
2799AC00000
|
heap
|
page read and write
|
||
F5F37FE000
|
stack
|
page read and write
|
||
175AB8C0000
|
heap
|
page read and write
|
||
23CC03A1000
|
heap
|
page read and write
|
||
1BF75C77000
|
heap
|
page read and write
|
||
175ABA00000
|
heap
|
page read and write
|
||
1D1CF212000
|
heap
|
page read and write
|
||
23CC038D000
|
heap
|
page read and write
|
||
2799FA70000
|
trusted library allocation
|
page read and write
|
||
1BF01D13000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
161FCE13000
|
heap
|
page read and write
|
||
2799FA64000
|
trusted library allocation
|
page read and write
|
||
23CC038B000
|
heap
|
page read and write
|
||
23CC038B000
|
heap
|
page read and write
|
||
1BF00CAA000
|
heap
|
page read and write
|
||
483C000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
47B3000
|
direct allocation
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
BBD97F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
62376F7000
|
stack
|
page read and write
|
||
1D1CF292000
|
heap
|
page read and write
|
||
5CC2EFE000
|
stack
|
page read and write
|
||
201C7CE1000
|
heap
|
page read and write
|
||
2799FCF6000
|
heap
|
page read and write
|
||
22381F9000
|
stack
|
page read and write
|
||
2799A4AC000
|
heap
|
page read and write
|
||
21BB0C02000
|
trusted library allocation
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
23CBFB02000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1D1CF2B7000
|
heap
|
page read and write
|
||
1D1CF2AB000
|
heap
|
page read and write
|
||
2B19000
|
heap
|
page read and write
|
||
23CC03A5000
|
heap
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
7D0000
|
remote allocation
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
4EC0000
|
remote allocation
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
1D1CF205000
|
heap
|
page read and write
|
||
23CC0844000
|
heap
|
page read and write
|
||
2799FB10000
|
trusted library allocation
|
page read and write
|
||
2ACA000
|
heap
|
page read and write
|
||
2516B45C000
|
heap
|
page read and write
|
||
1D1CF320000
|
remote allocation
|
page read and write
|
||
1BF01500000
|
heap
|
page read and write
|
||
9E198FF000
|
stack
|
page read and write
|
||
43C2000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
21BB0500000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
234D17E000
|
stack
|
page read and write
|
||
4EC0000
|
remote allocation
|
page read and write
|
||
262CDA87000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4CFD000
|
stack
|
page read and write
|
||
23CBFAC7000
|
heap
|
page read and write
|
||
23CC030D000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
A870B77000
|
stack
|
page read and write
|
||
23CC0392000
|
heap
|
page read and write
|
||
23CC038D000
|
heap
|
page read and write
|
||
20BEC846000
|
heap
|
page read and write
|
||
2799FA80000
|
trusted library allocation
|
page read and write
|
||
2516B47A000
|
heap
|
page read and write
|
||
23CBFAD4000
|
heap
|
page read and write
|
||
2516B413000
|
heap
|
page read and write
|
||
1BF01534000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
9E1967B000
|
stack
|
page read and write
|
||
2799FBA0000
|
remote allocation
|
page read and write
|
||
262CDA76000
|
heap
|
page read and write
|
||
DA717E000
|
stack
|
page read and write
|
||
1BF01C02000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
201C7D25000
|
heap
|
page read and write
|
||
175ABA65000
|
heap
|
page read and write
|
||
2799FCEE000
|
heap
|
page read and write
|
||
2799FCFB000
|
heap
|
page read and write
|
||
22379EB000
|
stack
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
262CD9E0000
|
trusted library allocation
|
page read and write
|
||
2799A491000
|
heap
|
page read and write
|
||
43A0000
|
direct allocation
|
page read and write
|
||
4C3B000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
23CC03B6000
|
heap
|
page read and write
|
||
23CC03C4000
|
heap
|
page read and write
|
||
2799A48A000
|
heap
|
page read and write
|
||
62377FE000
|
stack
|
page read and write
|
||
2E4A000
|
heap
|
page read and write
|
||
2799A502000
|
heap
|
page read and write
|
||
23CC00F0000
|
remote allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
201C7F60000
|
trusted library allocation
|
page read and write
|
||
2799FA48000
|
trusted library allocation
|
page read and write
|
||
2516B458000
|
heap
|
page read and write
|
||
23CC03A5000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
2516B484000
|
heap
|
page read and write
|
||
23CC0300000
|
heap
|
page read and write
|
||
23CC0376000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
5246DFB000
|
stack
|
page read and write
|
||
175ABB13000
|
heap
|
page read and write
|
||
1BF00CAF000
|
heap
|
page read and write
|
||
2799AD13000
|
heap
|
page read and write
|
||
30DA000
|
heap
|
page read and write
|
||
2799F8B0000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
1F731875000
|
heap
|
page read and write
|
||
1D1CF228000
|
heap
|
page read and write
|
||
BBDA7F000
|
stack
|
page read and write
|
||
1D1CF23B000
|
heap
|
page read and write
|
||
23CC03A2000
|
heap
|
page read and write
|
||
4891000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4F97000
|
trusted library allocation
|
page read and write
|
||
23CBFB16000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
DA707E000
|
stack
|
page read and write
|
||
21BB0320000
|
heap
|
page read and write
|
||
23CC039A000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
23CC03AF000
|
heap
|
page read and write
|
||
2799FCD7000
|
heap
|
page read and write
|
||
1D1CF1C8000
|
heap
|
page read and write
|
||
1BF00DFD000
|
heap
|
page read and write
|
||
4EC0000
|
remote allocation
|
page read and write
|
||
201C7AF0000
|
trusted library allocation
|
page read and write
|
||
1BF00C94000
|
heap
|
page read and write
|
||
1D1CF23B000
|
heap
|
page read and write
|
||
262CE202000
|
trusted library allocation
|
page read and write
|
||
2799A3E0000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
2EAB124E000
|
heap
|
page read and write
|
||
2B02000
|
heap
|
page read and write
|
||
1BF00CE2000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
1009A000
|
unkown
|
page readonly
|
||
2516BA02000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
23CC0318000
|
heap
|
page read and write
|
||
1ABFFE00000
|
heap
|
page read and write
|
||
2799FB60000
|
trusted library allocation
|
page read and write
|
||
5077C7D000
|
stack
|
page read and write
|
||
1D1CF1F1000
|
heap
|
page read and write
|
||
9E197FF000
|
stack
|
page read and write
|
||
2799A507000
|
heap
|
page read and write
|
||
441D000
|
stack
|
page read and write
|
||
23CC0821000
|
heap
|
page read and write
|
||
22383FF000
|
stack
|
page read and write
|
||
1D1CF190000
|
heap
|
page read and write
|
||
1BF75C68000
|
heap
|
page read and write
|
||
9D5BAFF000
|
stack
|
page read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
4781000
|
heap
|
page read and write
|
||
23CBFA13000
|
heap
|
page read and write
|
||
201C7F89000
|
heap
|
page read and write
|
||
23CC00F0000
|
remote allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
21BB03B0000
|
trusted library allocation
|
page read and write
|
||
1009A000
|
unkown
|
page readonly
|
||
4DA0000
|
heap
|
page read and write
|
||
1BF015D6000
|
heap
|
page read and write
|
||
1ABFFE79000
|
heap
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
2516B441000
|
heap
|
page read and write
|
||
10051000
|
unkown
|
page readonly
|
||
B34000
|
heap
|
page read and write
|
||
2799AD18000
|
heap
|
page read and write
|
||
1BF00CC5000
|
heap
|
page read and write
|
||
23CC038B000
|
heap
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
A870E7E000
|
stack
|
page read and write
|
||
2C06000
|
heap
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
201C7F90000
|
trusted library allocation
|
page read and write
|
||
23CC0320000
|
heap
|
page read and write
|
||
2799AC15000
|
heap
|
page read and write
|
||
2EAB1263000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1004B000
|
unkown
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
D2E4B1E000
|
stack
|
page read and write
|
||
507777C000
|
stack
|
page read and write
|
||
1BF00C13000
|
heap
|
page read and write
|
||
20BEC7E0000
|
heap
|
page read and write
|
||
23CC03CC000
|
heap
|
page read and write
|
||
1BF01C0A000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
4D5F000
|
stack
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
262CD940000
|
heap
|
page read and write
|
||
1BF00D13000
|
heap
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
20BEC85D000
|
heap
|
page read and write
|
||
BBD77E000
|
stack
|
page read and write
|
||
524727B000
|
stack
|
page read and write
|
||
20BEC85F000
|
heap
|
page read and write
|
||
23CBFA58000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
2E69000
|
heap
|
page read and write
|
||
23CBFAE8000
|
heap
|
page read and write
|
||
2DA1000
|
heap
|
page read and write
|
||
1D1CF228000
|
heap
|
page read and write
|
||
5CC2D7C000
|
stack
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
CA2A27C000
|
stack
|
page read and write
|
||
2D92000
|
heap
|
page read and write
|
||
23CC03C3000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
9E196FC000
|
stack
|
page read and write
|
||
23CC0370000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
1009A000
|
unkown
|
page readonly
|
||
1003C000
|
unkown
|
page readonly
|
||
23CC037C000
|
heap
|
page read and write
|
||
1BF00C39000
|
heap
|
page read and write
|
||
23CC0397000
|
heap
|
page read and write
|
||
5246F7F000
|
stack
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
50778FE000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
23CBFAF7000
|
heap
|
page read and write
|
||
1D1CF2C0000
|
heap
|
page read and write
|
||
2799FA60000
|
trusted library allocation
|
page read and write
|
||
23CC03A8000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
1D1CF294000
|
heap
|
page read and write
|
||
A87177E000
|
stack
|
page read and write
|
||
803137F000
|
stack
|
page read and write
|
||
623715E000
|
stack
|
page read and write
|
||
23CBFAB4000
|
heap
|
page read and write
|
||
52470FC000
|
stack
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
1D1CF292000
|
heap
|
page read and write
|
||
500A000
|
trusted library allocation
|
page read and write
|
||
2EAB127C000
|
heap
|
page read and write
|
||
23CC0380000
|
heap
|
page read and write
|
||
23CC0392000
|
heap
|
page read and write
|
||
23CC03AB000
|
heap
|
page read and write
|
||
2516B456000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
21BB0513000
|
heap
|
page read and write
|
||
23CC03B3000
|
heap
|
page read and write
|
||
201C7C40000
|
heap
|
page read and write
|
||
23CBFB08000
|
heap
|
page read and write
|
||
175ABA86000
|
heap
|
page read and write
|
||
23CBF9D0000
|
trusted library allocation
|
page read and write
|
||
23CC0386000
|
heap
|
page read and write
|
||
262CDA68000
|
heap
|
page read and write
|
||
2799FA40000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
heap
|
page read and write
|
||
23CC037E000
|
heap
|
page read and write
|
||
62371DE000
|
stack
|
page read and write
|
||
6F731F9000
|
stack
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
175AC080000
|
trusted library allocation
|
page read and write
|
||
23CBFA83000
|
heap
|
page read and write
|
||
5CC2DF9000
|
stack
|
page read and write
|
||
21BB0427000
|
heap
|
page read and write
|
||
23CBFA29000
|
heap
|
page read and write
|
||
CA29D7E000
|
stack
|
page read and write
|
||
20BEC85F000
|
heap
|
page read and write
|
||
2799B8A0000
|
trusted library allocation
|
page read and write
|
||
2516B43B000
|
heap
|
page read and write
|
||
2799A478000
|
heap
|
page read and write
|
||
23CC081A000
|
heap
|
page read and write
|
||
1BF00C30000
|
heap
|
page read and write
|
||
23CC0376000
|
heap
|
page read and write
|
||
1D1CF212000
|
heap
|
page read and write
|
||
23CC030C000
|
heap
|
page read and write
|
||
1D1CF24D000
|
heap
|
page read and write
|
||
2516B462000
|
heap
|
page read and write
|
||
2516B455000
|
heap
|
page read and write
|
||
23CC0318000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
175ABAB7000
|
heap
|
page read and write
|
||
23CC03B3000
|
heap
|
page read and write
|
||
23CC03B2000
|
heap
|
page read and write
|
||
1004B000
|
unkown
|
page read and write
|
||
21BB0502000
|
heap
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
23CC037C000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
23CBFAE1000
|
heap
|
page read and write
|
||
524767F000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4FB1000
|
trusted library allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
21FA5980000
|
heap
|
page read and write
|
||
1D1CF320000
|
remote allocation
|
page read and write
|
||
5C0000
|
trusted library allocation
|
page read and write
|
||
1BF75C60000
|
heap
|
page read and write
|
||
478F000
|
trusted library allocation
|
page read and write
|
||
1BF00C9B000
|
heap
|
page read and write
|
||
5077B7F000
|
stack
|
page read and write
|
||
1D1CF395000
|
heap
|
page read and write
|
||
201C7D25000
|
heap
|
page read and write
|
||
1BF00C98000
|
heap
|
page read and write
|
||
201C8800000
|
trusted library allocation
|
page read and write
|
||
A87107B000
|
stack
|
page read and write
|
||
2799FC4D000
|
heap
|
page read and write
|
||
23CC038F000
|
heap
|
page read and write
|
||
2C25000
|
heap
|
page read and write
|
||
2799FC40000
|
heap
|
page read and write
|
||
23CC0800000
|
heap
|
page read and write
|
||
23CBFAB1000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
1D1CF22B000
|
heap
|
page read and write
|
||
161FCE3D000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1D1CF1FF000
|
heap
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
23CC0384000
|
heap
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
23CBFAAA000
|
heap
|
page read and write
|
||
F5F38FF000
|
stack
|
page read and write
|
||
23CC038D000
|
heap
|
page read and write
|
||
9D5B6FD000
|
stack
|
page read and write
|
||
2D2A000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
1ABFFF00000
|
heap
|
page read and write
|
||
1D1CF294000
|
heap
|
page read and write
|
||
23CC037B000
|
heap
|
page read and write
|
||
23CC0360000
|
heap
|
page read and write
|
||
2C06000
|
heap
|
page read and write
|
||
262CDA3C000
|
heap
|
page read and write
|
||
2799B893000
|
trusted library allocation
|
page read and write
|
||
2799FC57000
|
heap
|
page read and write
|
||
2799A502000
|
heap
|
page read and write
|
||
9D5B8FF000
|
stack
|
page read and write
|
||
5CC2CFF000
|
stack
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
1BF00C46000
|
heap
|
page read and write
|
||
2799A424000
|
heap
|
page read and write
|
||
175ABA63000
|
heap
|
page read and write
|
||
21BB0400000
|
heap
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
2EAB1A02000
|
trusted library allocation
|
page read and write
|
||
2EAB1308000
|
heap
|
page read and write
|
||
1BF015F3000
|
heap
|
page read and write
|
||
2799F920000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
3411000
|
heap
|
page read and write
|
||
1BF00A20000
|
heap
|
page read and write
|
||
23CBFACA000
|
heap
|
page read and write
|
||
1BF00CEA000
|
heap
|
page read and write
|
||
161FCDF0000
|
remote allocation
|
page read and write
|
||
23CC0380000
|
heap
|
page read and write
|
||
23CC0802000
|
heap
|
page read and write
|
||
2EAB1300000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
A87070B000
|
stack
|
page read and write
|
||
BBD47E000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
524737F000
|
stack
|
page read and write
|
||
23CC0381000
|
heap
|
page read and write
|
||
1D1CFB40000
|
heap
|
page read and write
|
||
201C7CD0000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1BF00C5E000
|
heap
|
page read and write
|
||
21BB0480000
|
heap
|
page read and write
|
||
2799A46E000
|
heap
|
page read and write
|
||
20BEC86E000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2799FB20000
|
trusted library allocation
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
1ABFFE64000
|
heap
|
page read and write
|
||
2799B3F0000
|
trusted library allocation
|
page read and write
|
||
1D1CF1EC000
|
heap
|
page read and write
|
||
D2E4B9E000
|
stack
|
page read and write
|
||
1BF75C3C000
|
heap
|
page read and write
|
||
62378FF000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
21FA5670000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
62370DC000
|
stack
|
page read and write
|
||
23CC0376000
|
heap
|
page read and write
|
||
507739C000
|
stack
|
page read and write
|
||
4D03000
|
direct allocation
|
page read and write
|
||
23CBFA4E000
|
heap
|
page read and write
|
||
2516B449000
|
heap
|
page read and write
|
||
2DC6000
|
heap
|
page read and write
|
||
D2E4F7E000
|
stack
|
page read and write
|
||
2237DFE000
|
stack
|
page read and write
|
||
175ABA29000
|
heap
|
page read and write
|
||
20BEC856000
|
heap
|
page read and write
|
||
9D5B27B000
|
stack
|
page read and write
|
||
23CC0374000
|
heap
|
page read and write
|
||
201C8AB0000
|
trusted library allocation
|
page read and write
|
||
507787E000
|
stack
|
page read and write
|
||
6F7337D000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
10051000
|
unkown
|
page readonly
|
||
B34000
|
heap
|
page read and write
|
||
201C8A50000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2EAB1030000
|
heap
|
page read and write
|
||
2EAB1313000
|
heap
|
page read and write
|
||
A870D7D000
|
stack
|
page read and write
|
||
23CC03A9000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
2516B1D0000
|
heap
|
page read and write
|
||
1BF00CA6000
|
heap
|
page read and write
|
||
20BEC83B000
|
heap
|
page read and write
|
||
2516B445000
|
heap
|
page read and write
|
||
2E45000
|
heap
|
page read and write
|
||
23CC0818000
|
heap
|
page read and write
|
||
A870F7A000
|
stack
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1BF00C43000
|
heap
|
page read and write
|
||
23CC03A2000
|
heap
|
page read and write
|
||
9E194FE000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
262CDB13000
|
heap
|
page read and write
|
||
20BEC830000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
1BF01D00000
|
heap
|
page read and write
|
||
6073000
|
heap
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
23CC03A2000
|
heap
|
page read and write
|
||
1F7318AE000
|
heap
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
21FA5840000
|
heap
|
page read and write
|
||
2799AD58000
|
heap
|
page read and write
|
||
2516B461000
|
heap
|
page read and write
|
||
9E1957E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1ABFFE29000
|
heap
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
1D1CFB41000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
2516B477000
|
heap
|
page read and write
|
||
23CC0370000
|
heap
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
1BF01C54000
|
heap
|
page read and write
|
||
2799A4FC000
|
heap
|
page read and write
|
||
1BF75C29000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
10051000
|
unkown
|
page readonly
|
||
2799A454000
|
heap
|
page read and write
|
||
1D1CF24D000
|
heap
|
page read and write
|
||
6F7327E000
|
stack
|
page read and write
|
||
161FCDF0000
|
remote allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1BF00CB5000
|
heap
|
page read and write
|
||
2C93000
|
heap
|
page read and write
|
||
1BF00C84000
|
heap
|
page read and write
|
||
1BF75C81000
|
heap
|
page read and write
|
||
CA29E7A000
|
stack
|
page read and write
|
||
161FCD90000
|
heap
|
page read and write
|
||
2799FB90000
|
trusted library allocation
|
page read and write
|
||
BBD1DB000
|
stack
|
page read and write
|
||
2C06000
|
heap
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
23CC038F000
|
heap
|
page read and write
|
||
175ABAC8000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
heap
|
page read and write
|
||
A87157A000
|
stack
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
21FA5650000
|
heap
|
page read and write
|
||
2799FC64000
|
heap
|
page read and write
|
||
2516B45A000
|
heap
|
page read and write
|
||
23CC0387000
|
heap
|
page read and write
|
||
23CC03A2000
|
heap
|
page read and write
|
||
1AB80602000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1BF00DB8000
|
heap
|
page read and write
|
||
BBD5FB000
|
stack
|
page read and write
|
||
1D1CF2B9000
|
heap
|
page read and write
|
||
1D1CF2B2000
|
heap
|
page read and write
|
||
7D0000
|
remote allocation
|
page read and write
|
||
20BEC854000
|
heap
|
page read and write
|
||
2799A525000
|
heap
|
page read and write
|
||
1BF75C00000
|
heap
|
page read and write
|
||
52471FC000
|
stack
|
page read and write
|
||
2799FB10000
|
trusted library allocation
|
page read and write
|
||
9D5B9FE000
|
stack
|
page read and write
|
||
2EAB124D000
|
heap
|
page read and write
|
||
2799F8A0000
|
trusted library allocation
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
2516B502000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
23CBFA8A000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
23CC03A5000
|
heap
|
page read and write
|
||
2799FCA2000
|
heap
|
page read and write
|
||
1BF75C5C000
|
heap
|
page read and write
|
||
23CC03AB000
|
heap
|
page read and write
|
||
175AC202000
|
heap
|
page read and write
|
||
2799A370000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
29EB000
|
stack
|
page read and write
|
||
22382FA000
|
stack
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
1BF75C13000
|
heap
|
page read and write
|
||
80312FE000
|
stack
|
page read and write
|
||
2EAB1249000
|
heap
|
page read and write
|
There are 1044 hidden memdumps, click here to show them.