Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
xhOJLzQSe7.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xc5b2aade, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\xhOJLzQSe7.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\xhOJLzQSe7.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\xhOJLzQSe7.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Smcoeugpjqpltwaq\padmvjcc.wwg"
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\xhOJLzQSe7.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\xhOJLzQSe7.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://51.91.76.89:8080/wILlkzMrsIIqrWuKTJoVXizoHkadIszFHcIlGojhnBcDobePKzyquq
|
unknown
|
||
https://70.36.102.35/
|
unknown
|
||
https://70.36.102.35/lKdeDesHKlwQRuBQoJMtzzkSkkKhWjwq
|
unknown
|
||
https://70.36.102.35/lKdeDesHKlwQRuBQoJMtzzkSkkKhWjw
|
unknown
|
||
https://51.91.76.89:8080/wILlkzMrsIIqrWuKTJoVXizoHkadIszFHcIlGojhnBcDobePKzyquq9
|
unknown
|
||
https://51.91.76.89/
|
unknown
|
||
https://70.36.102.35/Default
|
unknown
|
||
https://92.240.254.110:8080/i
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://92.240.254.110:8080/OozwNWoXrNLqNNtlQCBStrfsHlZQDyVVCeVUrhuzIDQnbSNZedOwyJtV6
|
unknown
|
||
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPb
|
unknown
|
||
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPb1T
|
unknown
|
||
https://92.240.254.110/t
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPb#T
|
unknown
|
||
https://217.182.25.250:8080/wyXUykQBFXLgUDhBPADNipDGWMKugALsfbonBqKseR
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://92.240.254.110:8080/
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://217.182.25.250:8080/wyXUykQBFXLgUDhBPADNipDGWMKugALsfbonBqKseR9
|
unknown
|
||
https://92.240.254.110:8080/OozwNWoXrNLqNNtlQCBStrfsHlZQDyVVCeVUrhuzIDQnbSNZedOwyJtV
|
unknown
|
||
https://217.182.25.250/6
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://119.193.124.41/
|
unknown
|
||
https://217.182.25.250/
|
unknown
|
||
https://92.240.254.110/
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPbV
|
unknown
|
There are 21 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.182.25.250
|
unknown
|
France
|
||
70.36.102.35
|
unknown
|
United States
|
||
120.4.0.0
|
unknown
|
China
|
||
200.220.252.2
|
unknown
|
Brazil
|
||
192.168.2.5
|
unknown
|
unknown
|
||
168.18.251.2
|
unknown
|
United States
|
||
48.13.251.2
|
unknown
|
United States
|
||
120.16.251.2
|
unknown
|
Australia
|
||
23.181.2.0
|
unknown
|
Reserved
|
||
192.153.248.2
|
unknown
|
United States
|
||
252.180.2.0
|
unknown
|
Reserved
|
||
128.63.180.0
|
unknown
|
United States
|
||
1.255.0.0
|
unknown
|
Korea Republic of
|
||
136.31.0.0
|
unknown
|
United States
|
||
10.181.2.0
|
unknown
|
unknown
|
||
32.17.251.2
|
unknown
|
United States
|
||
65.83.89.67
|
unknown
|
United States
|
||
64.56.248.2
|
unknown
|
Canada
|
||
224.18.251.2
|
unknown
|
Reserved
|
||
96.15.251.2
|
unknown
|
United States
|
||
51.91.76.89
|
unknown
|
France
|
||
212.253.246.49
|
unknown
|
Turkey
|
||
171.213.29.176
|
unknown
|
China
|
||
248.153.248.2
|
unknown
|
Reserved
|
||
14.181.2.0
|
unknown
|
Viet Nam
|
||
144.42.251.111
|
unknown
|
United States
|
||
72.67.111.110
|
unknown
|
United States
|
||
26.189.253.2
|
unknown
|
United States
|
||
96.234.0.0
|
unknown
|
United States
|
||
119.193.124.41
|
unknown
|
Korea Republic of
|
||
92.240.254.110
|
unknown
|
Slovakia (SLOVAK Republic)
|
||
176.200.250.2
|
unknown
|
Italy
|
||
192.168.2.1
|
unknown
|
unknown
|
||
17.181.2.0
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 25 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2F01000
|
direct allocation
|
page execute read
|
||
43F1000
|
direct allocation
|
page execute read
|
||
C01000
|
direct allocation
|
page execute read
|
||
3250000
|
direct allocation
|
page execute and read and write
|
||
C10000
|
direct allocation
|
page execute and read and write
|
||
BB0000
|
direct allocation
|
page execute and read and write
|
||
2E00000
|
direct allocation
|
page execute and read and write
|
||
3281000
|
direct allocation
|
page execute read
|
||
4963000
|
heap
|
page read and write
|
||
2DE3000
|
heap
|
page read and write
|
||
1DEE5D08000
|
heap
|
page read and write
|
||
20F4DB02000
|
heap
|
page read and write
|
||
20F4E373000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
257CD000000
|
heap
|
page read and write
|
||
10090000
|
unkown
|
page readonly
|
||
1007F000
|
unkown
|
page readonly
|
||
7688377000
|
stack
|
page read and write
|
||
A44C000
|
trusted library allocation
|
page read and write
|
||
150BEF08000
|
heap
|
page read and write
|
||
20F4E393000
|
heap
|
page read and write
|
||
20F4DA00000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCC14000
|
heap
|
page read and write
|
||
20F4E321000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
10036000
|
unkown
|
page readonly
|
||
257C7C00000
|
heap
|
page read and write
|
||
20F4DA50000
|
heap
|
page read and write
|
||
2FAB000
|
heap
|
page read and write
|
||
1D25C7F000
|
stack
|
page read and write
|
||
20F4DAB1000
|
heap
|
page read and write
|
||
28D5C5B0000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
257C7D18000
|
heap
|
page read and write
|
||
1007F000
|
unkown
|
page readonly
|
||
2278F260000
|
heap
|
page read and write
|
||
ACA0DF7000
|
stack
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
10082000
|
unkown
|
page readonly
|
||
257CCB70000
|
remote allocation
|
page read and write
|
||
1DEE5C13000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCC51000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
21471D02000
|
heap
|
page read and write
|
||
257C74A8000
|
heap
|
page read and write
|
||
257CCC00000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
2E35000
|
heap
|
page read and write
|
||
20F4E373000
|
heap
|
page read and write
|
||
20F4D820000
|
heap
|
page read and write
|
||
20F4E38C000
|
heap
|
page read and write
|
||
768817F000
|
stack
|
page read and write
|
||
2278F2A1000
|
heap
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
257CCB30000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
51456F8000
|
stack
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
257CCCFB000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
28D5C3FB000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
1D25D7B000
|
stack
|
page read and write
|
||
2278F5F0000
|
heap
|
page read and write
|
||
21471C4B000
|
heap
|
page read and write
|
||
150BEE25000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
44EE000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
150BED60000
|
heap
|
page read and write
|
||
20F4E394000
|
heap
|
page read and write
|
||
48DC000
|
stack
|
page read and write
|
||
257CCB50000
|
trusted library allocation
|
page read and write
|
||
1DEE5C46000
|
heap
|
page read and write
|
||
ACA079C000
|
stack
|
page read and write
|
||
4B5C000
|
stack
|
page read and write
|
||
257C7200000
|
heap
|
page read and write
|
||
257C7493000
|
heap
|
page read and write
|
||
21471C82000
|
heap
|
page read and write
|
||
150BF802000
|
trusted library allocation
|
page read and write
|
||
257C7440000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
ACA0BFB000
|
stack
|
page read and write
|
||
150BEE13000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
31EE000
|
stack
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
28D5D380000
|
trusted library allocation
|
page read and write
|
||
2D8A000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
1DEE5C89000
|
heap
|
page read and write
|
||
2278F276000
|
heap
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
1A5AC678000
|
heap
|
page read and write
|
||
2278F2A5000
|
heap
|
page read and write
|
||
20F4DA51000
|
heap
|
page read and write
|
||
7687E7B000
|
stack
|
page read and write
|
||
2278F28E000
|
heap
|
page read and write
|
||
150BEE3C000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
28D5D360000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
20F4E39C000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
20F4E37B000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
1DEE5C02000
|
heap
|
page read and write
|
||
2FA8000
|
heap
|
page read and write
|
||
2278F180000
|
heap
|
page read and write
|
||
21471A30000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
D7DC6BB000
|
stack
|
page read and write
|
||
257CCD02000
|
heap
|
page read and write
|
||
940000
|
remote allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
257C7D18000
|
heap
|
page read and write
|
||
A4F6000
|
trusted library allocation
|
page read and write
|
||
257C7C15000
|
heap
|
page read and write
|
||
257C742A000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E394000
|
heap
|
page read and write
|
||
51EB4FE000
|
stack
|
page read and write
|
||
150BF670000
|
trusted library allocation
|
page read and write
|
||
257C7D13000
|
heap
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
257C7502000
|
heap
|
page read and write
|
||
257CCC75000
|
heap
|
page read and write
|
||
28D5D390000
|
trusted library allocation
|
page read and write
|
||
514577F000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
257C7507000
|
heap
|
page read and write
|
||
257C83E0000
|
trusted library allocation
|
page read and write
|
||
257CCC4A000
|
heap
|
page read and write
|
||
20F4E39C000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1DEE5D00000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCA1E000
|
trusted library allocation
|
page read and write
|
||
28D5C3FD000
|
heap
|
page read and write
|
||
20F4E378000
|
heap
|
page read and write
|
||
20F4D880000
|
heap
|
page read and write
|
||
257CCA40000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
2FA8000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2278F276000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E396000
|
heap
|
page read and write
|
||
20F4DB08000
|
heap
|
page read and write
|
||
2F00000
|
direct allocation
|
page read and write
|
||
2278F286000
|
heap
|
page read and write
|
||
20F4E373000
|
heap
|
page read and write
|
||
20F4D810000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
20F4E37B000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
28D5D130000
|
trusted library allocation
|
page read and write
|
||
257CC870000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1A5AC510000
|
heap
|
page read and write
|
||
B4F000
|
stack
|
page read and write
|
||
50C0000
|
remote allocation
|
page read and write
|
||
257C8870000
|
trusted library allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
10044000
|
unkown
|
page read and write
|
||
257CCCF3000
|
heap
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
1DEE5C66000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
4953000
|
heap
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
21471C4D000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
10036000
|
unkown
|
page readonly
|
||
509C000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
6994C7B000
|
stack
|
page read and write
|
||
257C7476000
|
heap
|
page read and write
|
||
D7DCBF9000
|
stack
|
page read and write
|
||
257CCCFA000
|
heap
|
page read and write
|
||
ACA0EFF000
|
stack
|
page read and write
|
||
7688077000
|
stack
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
257C8860000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1004B000
|
unkown
|
page readonly
|
||
2E34000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
20F4E3BE000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
150BEE88000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCD02000
|
heap
|
page read and write
|
||
20F4E378000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2278F200000
|
heap
|
page read and write
|
||
51457FF000
|
stack
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
28D5C398000
|
heap
|
page read and write
|
||
28D5C5F0000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
2278F284000
|
heap
|
page read and write
|
||
3208000
|
heap
|
page read and write
|
||
20F4E3A9000
|
heap
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
21471C3C000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
257CCCEE000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4DA4C000
|
heap
|
page read and write
|
||
150BEE62000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E3C6000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
257C7370000
|
trusted library allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
257CCC77000
|
heap
|
page read and write
|
||
20F4DA85000
|
heap
|
page read and write
|
||
257C7D00000
|
heap
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
20F4E398000
|
heap
|
page read and write
|
||
21471A20000
|
heap
|
page read and write
|
||
2FD2000
|
heap
|
page read and write
|
||
28D5C2E0000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
1DEE5C66000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
150BEE58000
|
heap
|
page read and write
|
||
257CCA40000
|
trusted library allocation
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
2278F5F5000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
257CCA50000
|
trusted library allocation
|
page read and write
|
||
20F4DA13000
|
heap
|
page read and write
|
||
20F4DB16000
|
heap
|
page read and write
|
||
257CCC44000
|
heap
|
page read and write
|
||
20F4E396000
|
heap
|
page read and write
|
||
20F4DAAB000
|
heap
|
page read and write
|
||
257C74FC000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E37D000
|
heap
|
page read and write
|
||
20F4E300000
|
heap
|
page read and write
|
||
20F4E319000
|
heap
|
page read and write
|
||
257CCAE0000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1007F000
|
unkown
|
page readonly
|
||
28D5D370000
|
heap
|
page readonly
|
||
2278F28E000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1D2607E000
|
stack
|
page read and write
|
||
20F4E396000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1A5AC640000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
10036000
|
unkown
|
page readonly
|
||
2278F29D000
|
heap
|
page read and write
|
||
F959E7B000
|
stack
|
page read and write
|
||
1D2592C000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1DEE5C4F000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
10071000
|
unkown
|
page readonly
|
||
514587C000
|
stack
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
51EB8FF000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
10048000
|
unkown
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E38C000
|
heap
|
page read and write
|
||
257C74A7000
|
heap
|
page read and write
|
||
257CCC58000
|
heap
|
page read and write
|
||
20F4DA57000
|
heap
|
page read and write
|
||
1A5AC702000
|
heap
|
page read and write
|
||
1DEE5C53000
|
heap
|
page read and write
|
||
51EB47E000
|
stack
|
page read and write
|
||
D7DCA79000
|
stack
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
7687CFE000
|
stack
|
page read and write
|
||
1D259AF000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
1DEE5C58000
|
heap
|
page read and write
|
||
1004B000
|
unkown
|
page readonly
|
||
2E34000
|
heap
|
page read and write
|
||
28D5C5E0000
|
heap
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
257C8863000
|
trusted library allocation
|
page read and write
|
||
28D5C3A0000
|
heap
|
page read and write
|
||
20F4E371000
|
heap
|
page read and write
|
||
2F23000
|
direct allocation
|
page read and write
|
||
28D5C340000
|
heap
|
page read and write
|
||
20F4E3AE000
|
heap
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
10071000
|
unkown
|
page readonly
|
||
20F4E394000
|
heap
|
page read and write
|
||
1A5AC628000
|
heap
|
page read and write
|
||
257C7413000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4DA4E000
|
heap
|
page read and write
|
||
1DEE5D13000
|
heap
|
page read and write
|
||
10044000
|
unkown
|
page read and write
|
||
20F4E37B000
|
heap
|
page read and write
|
||
28D5C3DE000
|
heap
|
page read and write
|
||
2278F1E0000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
1A5AC600000
|
heap
|
page read and write
|
||
2278F28E000
|
heap
|
page read and write
|
||
21471D00000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
91B000
|
stack
|
page read and write
|
||
1DEE5B90000
|
trusted library allocation
|
page read and write
|
||
257CCB40000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
10082000
|
unkown
|
page readonly
|
||
20F4E37D000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
ACA0FFF000
|
stack
|
page read and write
|
||
20F4DA53000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E373000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E382000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
32A2000
|
direct allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
3302000
|
heap
|
page read and write
|
||
2278F2A1000
|
heap
|
page read and write
|
||
2278F2A1000
|
heap
|
page read and write
|
||
257CCD02000
|
heap
|
page read and write
|
||
257C7210000
|
heap
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
514534A000
|
stack
|
page read and write
|
||
D7DCAF9000
|
stack
|
page read and write
|
||
20F4DACA000
|
heap
|
page read and write
|
||
32A3000
|
direct allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257C74FC000
|
heap
|
page read and write
|
||
257C7400000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
257C74AB000
|
heap
|
page read and write
|
||
20F4E378000
|
heap
|
page read and write
|
||
51453CE000
|
stack
|
page read and write
|
||
ABFF000
|
trusted library allocation
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
4412000
|
direct allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
10044000
|
unkown
|
page read and write
|
||
21471D13000
|
heap
|
page read and write
|
||
257CCB70000
|
remote allocation
|
page read and write
|
||
F95997A000
|
stack
|
page read and write
|
||
10071000
|
unkown
|
page readonly
|
||
257CCCEB000
|
heap
|
page read and write
|
||
7688279000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
C23000
|
direct allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCCAA000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
20F4E3C0000
|
heap
|
page read and write
|
||
4413000
|
direct allocation
|
page read and write
|
||
150BEE00000
|
heap
|
page read and write
|
||
20F4E39C000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
28D5C5E9000
|
heap
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
2278F2A3000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
51EB7F7000
|
stack
|
page read and write
|
||
20F4E38D000
|
heap
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
257CCB20000
|
trusted library allocation
|
page read and write
|
||
20F4E3A5000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
1DEE5C29000
|
heap
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
1D2617F000
|
stack
|
page read and write
|
||
257CCA10000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
1CD000
|
stack
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
1A5AC700000
|
heap
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
20F4E3D7000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
10048000
|
unkown
|
page read and write
|
||
2F92000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
7687F78000
|
stack
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
6994D7F000
|
stack
|
page read and write
|
||
1DEE5A20000
|
heap
|
page read and write
|
||
20F4E351000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
257C74A6000
|
heap
|
page read and write
|
||
20F4E803000
|
heap
|
page read and write
|
||
1A5AC602000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
257CCA54000
|
trusted library allocation
|
page read and write
|
||
257CCA18000
|
trusted library allocation
|
page read and write
|
||
10044000
|
unkown
|
page read and write
|
||
20F4E3A2000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCC4C000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2278F29E000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CC880000
|
trusted library allocation
|
page read and write
|
||
1D25F77000
|
stack
|
page read and write
|
||
F959A7B000
|
stack
|
page read and write
|
||
150BEDD0000
|
heap
|
page read and write
|
||
20F4DAC5000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
F95967A000
|
stack
|
page read and write
|
||
257C747A000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
10048000
|
unkown
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4DAE3000
|
heap
|
page read and write
|
||
150BEE02000
|
heap
|
page read and write
|
||
257C7471000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
21471C76000
|
heap
|
page read and write
|
||
257C7270000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
20F4E394000
|
heap
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4DA55000
|
heap
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E202000
|
heap
|
page read and write
|
||
4430000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CCCFF000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
8DC000
|
stack
|
page read and write
|
||
ACA0CFB000
|
stack
|
page read and write
|
||
257CCE60000
|
trusted library allocation
|
page read and write
|
||
28D5C360000
|
heap
|
page read and write
|
||
28D5C3F3000
|
heap
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
20F4DA59000
|
heap
|
page read and write
|
||
21471D08000
|
heap
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
257CCA31000
|
trusted library allocation
|
page read and write
|
||
4E5D000
|
stack
|
page read and write
|
||
28D5D3E0000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
28D5C5C0000
|
trusted library allocation
|
page read and write
|
||
257CCC64000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
257CCAE0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
51EB9FD000
|
stack
|
page read and write
|
||
20F4E38C000
|
heap
|
page read and write
|
||
C22000
|
direct allocation
|
page read and write
|
||
257CCEA0000
|
trusted library allocation
|
page read and write
|
||
F95A07F000
|
stack
|
page read and write
|
||
230000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
257C7502000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E370000
|
heap
|
page read and write
|
||
20F4E3A2000
|
heap
|
page read and write
|
||
1DEE5C6E000
|
heap
|
page read and write
|
||
2FD2000
|
heap
|
page read and write
|
||
28D5C3DE000
|
heap
|
page read and write
|
||
20F4DAF6000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4D980000
|
trusted library allocation
|
page read and write
|
||
20F4E36B000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
257C7458000
|
heap
|
page read and write
|
||
28D5C3D6000
|
heap
|
page read and write
|
||
1A5AC4A0000
|
heap
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
6994F7E000
|
stack
|
page read and write
|
||
43F0000
|
direct allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E397000
|
heap
|
page read and write
|
||
28D5C3DE000
|
heap
|
page read and write
|
||
150BEE7C000
|
heap
|
page read and write
|
||
1D25E7B000
|
stack
|
page read and write
|
||
10082000
|
unkown
|
page readonly
|
||
10001000
|
unkown
|
page execute read
|
||
2FD2000
|
heap
|
page read and write
|
||
257CCC30000
|
heap
|
page read and write
|
||
257CCAE0000
|
trusted library allocation
|
page read and write
|
||
257CCA10000
|
trusted library allocation
|
page read and write
|
||
3318000
|
heap
|
page read and write
|
||
514567E000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
D7DCB7E000
|
stack
|
page read and write
|
||
28D5C5A0000
|
trusted library allocation
|
page read and write
|
||
2278F282000
|
heap
|
page read and write
|
||
ACA0AFE000
|
stack
|
page read and write
|
||
F95914C000
|
stack
|
page read and write
|
||
CD000
|
stack
|
page read and write
|
||
150BEE5E000
|
heap
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
10090000
|
unkown
|
page readonly
|
||
20F4E37B000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
21471C71000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E398000
|
heap
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
257CCA34000
|
trusted library allocation
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
76883FE000
|
unkown
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1DEE5C54000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
51EB1CC000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
2278F271000
|
heap
|
page read and write
|
||
20F4E37B000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
257CCB60000
|
trusted library allocation
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
20F4DA71000
|
heap
|
page read and write
|
||
20F4DA5A000
|
heap
|
page read and write
|
||
257C7514000
|
heap
|
page read and write
|
||
20F4E820000
|
heap
|
page read and write
|
||
1A5AC622000
|
heap
|
page read and write
|
||
7687D7E000
|
stack
|
page read and write
|
||
20F4D9F0000
|
remote allocation
|
page read and write
|
||
2278F2A1000
|
heap
|
page read and write
|
||
20F4E396000
|
heap
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
32CA000
|
heap
|
page read and write
|
||
21471C00000
|
heap
|
page read and write
|
||
20F4E802000
|
heap
|
page read and write
|
||
21471C52000
|
heap
|
page read and write
|
||
20F4E37B000
|
heap
|
page read and write
|
||
940000
|
remote allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
F95987F000
|
stack
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
ACA0A7E000
|
stack
|
page read and write
|
||
257C7D02000
|
heap
|
page read and write
|
||
4E1B000
|
stack
|
page read and write
|
||
1DEE5D02000
|
heap
|
page read and write
|
||
ACA10FE000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
10082000
|
unkown
|
page readonly
|
||
2FCD000
|
heap
|
page read and write
|
||
20F4E371000
|
heap
|
page read and write
|
||
257CC8F0000
|
trusted library allocation
|
page read and write
|
||
20F4DA54000
|
heap
|
page read and write
|
||
1DEE5C3C000
|
heap
|
page read and write
|
||
257C748C000
|
heap
|
page read and write
|
||
150BEE5C000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
257CCB00000
|
trusted library allocation
|
page read and write
|
||
21471C50000
|
heap
|
page read and write
|
||
20F4E39D000
|
heap
|
page read and write
|
||
20F4E844000
|
heap
|
page read and write
|
||
20F4DAD6000
|
heap
|
page read and write
|
||
257C7C02000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
20F4E371000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
51EB6FB000
|
stack
|
page read and write
|
||
257CCA50000
|
trusted library allocation
|
page read and write
|
||
20F4DA4D000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
10090000
|
unkown
|
page readonly
|
||
6994E7B000
|
stack
|
page read and write
|
||
10048000
|
unkown
|
page read and write
|
||
1004B000
|
unkown
|
page readonly
|
||
59C000
|
stack
|
page read and write
|
||
150BED70000
|
heap
|
page read and write
|
||
A8CD000
|
trusted library allocation
|
page read and write
|
||
257CCCFD000
|
heap
|
page read and write
|
||
20F4E394000
|
heap
|
page read and write
|
||
F959577000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1DEE5A90000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E800000
|
heap
|
page read and write
|
||
150BEF02000
|
heap
|
page read and write
|
||
257CCC23000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
4453000
|
heap
|
page read and write
|
||
1004B000
|
unkown
|
page readonly
|
||
2D4C000
|
stack
|
page read and write
|
||
10090000
|
unkown
|
page readonly
|
||
1DEE5C4B000
|
heap
|
page read and write
|
||
940000
|
remote allocation
|
page read and write
|
||
2278F26B000
|
heap
|
page read and write
|
||
1DEE5C00000
|
heap
|
page read and write
|
||
257C73E1000
|
trusted library allocation
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
4DDD000
|
stack
|
page read and write
|
||
1A5AC613000
|
heap
|
page read and write
|
||
150BEE66000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
28D5C390000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
1A5ACE02000
|
trusted library allocation
|
page read and write
|
||
257CCA30000
|
trusted library allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
257CC900000
|
trusted library allocation
|
page read and write
|
||
20F4D9F0000
|
remote allocation
|
page read and write
|
||
1DEE5C80000
|
heap
|
page read and write
|
||
20F4DAE9000
|
heap
|
page read and write
|
||
20F4DAE6000
|
heap
|
page read and write
|
||
20F4DA29000
|
heap
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
1A5AC657000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2F22000
|
direct allocation
|
page read and write
|
||
20F4DAB5000
|
heap
|
page read and write
|
||
60000
|
heap
|
page read and write
|
||
20F4E38C000
|
heap
|
page read and write
|
||
491D000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E398000
|
heap
|
page read and write
|
||
257CCB70000
|
remote allocation
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
699472C000
|
stack
|
page read and write
|
||
257CCCAD000
|
heap
|
page read and write
|
||
257C7D04000
|
heap
|
page read and write
|
||
20F4DAE9000
|
heap
|
page read and write
|
||
21471C13000
|
heap
|
page read and write
|
||
257CCB70000
|
trusted library allocation
|
page read and write
|
||
20F4E373000
|
heap
|
page read and write
|
||
1A5AC4B0000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
496F000
|
trusted library allocation
|
page read and write
|
||
5DA000
|
stack
|
page read and write
|
||
150BEF13000
|
heap
|
page read and write
|
||
20F4DB13000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1007F000
|
unkown
|
page readonly
|
||
20F4E394000
|
heap
|
page read and write
|
||
150BEF00000
|
heap
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1A5AC713000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
21471A90000
|
heap
|
page read and write
|
||
257C7D58000
|
heap
|
page read and write
|
||
150BEE29000
|
heap
|
page read and write
|
||
1A5ACDB0000
|
trusted library allocation
|
page read and write
|
||
21471C29000
|
heap
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
21472402000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
20F4E398000
|
heap
|
page read and write
|
||
257C74A9000
|
heap
|
page read and write
|
||
538000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
F95977A000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
28D5C5E5000
|
heap
|
page read and write
|
||
3155000
|
heap
|
page read and write
|
||
1DEE6402000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
remote allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
20F4E378000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
20F4E3A9000
|
heap
|
page read and write
|
||
2278F287000
|
heap
|
page read and write
|
||
20F4D9F0000
|
remote allocation
|
page read and write
|
||
7687C7B000
|
stack
|
page read and write
|
||
2FAB000
|
heap
|
page read and write
|
||
1DEE5A30000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
10071000
|
unkown
|
page readonly
|
||
10036000
|
unkown
|
page readonly
|
||
257CCD04000
|
heap
|
page read and write
|
||
257C74A0000
|
heap
|
page read and write
|
||
28D5C2D0000
|
heap
|
page read and write
|
||
50C0000
|
remote allocation
|
page read and write
|
||
21471B90000
|
trusted library allocation
|
page read and write
|
||
257C748A000
|
heap
|
page read and write
|
||
51EBAFE000
|
stack
|
page read and write
|
||
20F4DA3C000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
20F4E317000
|
heap
|
page read and write
|
||
4CA1000
|
trusted library allocation
|
page read and write
|
There are 752 hidden memdumps, click here to show them.