Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
cVZ5IwmAMe.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_cca756cf3ca542105b493949e775f8b1db5ee_fe4ae974_158939b6\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_dc7d771a9db219da0c9c31413fa668d5ca41a6_fe4ae974_05552e4d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER264E.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Oct 20 21:20:17 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27E5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28A1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33DA.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Oct 20 21:20:21 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3572.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER363E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\cVZ5IwmAMe.dll,DllRegisterServer
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 276
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://onlinetwork.top/
|
unknown
|
||
http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs
|
unknown
|
||
http://onlinetwork.top/drew/5f_2BEDtM2CrlBj8hi85/PfpslRV80x6hEReBBsC/BgCJ3i1tejkKUVj0skPC_2/FG_2BjUb
|
unknown
|
||
http://onlinetwork.top/drew/K_2FqA2xbKL/njlOSx6YZxCsC1/NFhl_2FKNwee1I_2FsyQo/3lkzkmpLRl6mAh0d/8NioTP
|
unknown
|
||
http://linetwork.top/drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlk
|
62.173.145.183
|
||
http://linetwork.top/
|
unknown
|
||
http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlk
|
62.173.145.183
|
||
http://linetwork.top/drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlk
|
62.173.145.183
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
l-0007.l-dc-msedge.net
|
13.107.43.16
|
||
linetwork.top
|
62.173.145.183
|
||
onlinetwork.top
|
31.41.44.194
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.173.145.183
|
linetwork.top
|
Russian Federation
|
||
31.41.44.194
|
onlinetwork.top
|
Russian Federation
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C0073296E1F7
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4BC8000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
338A000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
315A000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
263A000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
52A9000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
58F8000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
46B9000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
4E19000
|
heap
|
page read and write
|
||
52D8000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
2B9D33C7000
|
heap
|
page read and write
|
||
1BC586A7000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
210FBB80000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
33F7000
|
heap
|
page read and write
|
||
210FBC00000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
210FD802000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
254CEE59000
|
heap
|
page read and write
|
||
1BC586BD000
|
heap
|
page read and write
|
||
59AD57C000
|
stack
|
page read and write
|
||
D94757E000
|
stack
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
210FBC58000
|
heap
|
page read and write
|
||
1A27AA00000
|
heap
|
page read and write
|
||
1BC57A9F000
|
heap
|
page read and write
|
||
2B9D29A0000
|
heap
|
page read and write
|
||
1A27AAE1000
|
heap
|
page read and write
|
||
59AD9FD000
|
stack
|
page read and write
|
||
8773FF000
|
stack
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
1BC586AC000
|
heap
|
page read and write
|
||
1A27AA29000
|
heap
|
page read and write
|
||
1EED5AC0000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
2B9D3354000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
1BC57AEB000
|
heap
|
page read and write
|
||
59AD8FE000
|
stack
|
page read and write
|
||
58FB000
|
heap
|
page read and write
|
||
1ED0FA02000
|
heap
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
223657AF000
|
heap
|
page read and write
|
||
2B9D2A91000
|
heap
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
41D0000
|
heap
|
page read and write
|
||
1BC5869C000
|
heap
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
5FAB0FE000
|
stack
|
page read and write
|
||
1ED0FB02000
|
heap
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
6D547000
|
unkown
|
page readonly
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
59AD27C000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
210FBC02000
|
heap
|
page read and write
|
||
7CFE7F9000
|
stack
|
page read and write
|
||
1A27A8C0000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
1BC586AA000
|
heap
|
page read and write
|
||
95E2377000
|
stack
|
page read and write
|
||
1EED5D02000
|
heap
|
page read and write
|
||
1AAE8E75000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
11B2EB40000
|
trusted library allocation
|
page read and write
|
||
53BC000
|
stack
|
page read and write
|
||
1BC57A53000
|
heap
|
page read and write
|
||
52DB000
|
heap
|
page read and write
|
||
1EED6402000
|
trusted library allocation
|
page read and write
|
||
E31000
|
unclassified section
|
page execute read
|
||
1520000
|
heap
|
page read and write
|
||
1BC58118000
|
heap
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
1BC57A58000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
206E6C13000
|
heap
|
page read and write
|
||
1050000
|
remote allocation
|
page read and write
|
||
1AAE8DF0000
|
trusted library allocation
|
page read and write
|
||
2B9D29D0000
|
trusted library allocation
|
page read and write
|
||
1AAE8E28000
|
heap
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
1CC5105D000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
206E6C3C000
|
heap
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
206E6C29000
|
heap
|
page read and write
|
||
1BC586A6000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
1ED0FFD0000
|
remote allocation
|
page read and write
|
||
5E9247B000
|
stack
|
page read and write
|
||
1BC57800000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
210FBBF0000
|
remote allocation
|
page read and write
|
||
254CEDD0000
|
trusted library allocation
|
page read and write
|
||
8771F9000
|
stack
|
page read and write
|
||
1BC57A3C000
|
heap
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
1BC586B8000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
1BC5866B000
|
heap
|
page read and write
|
||
9B261FF000
|
stack
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
95E1DDE000
|
stack
|
page read and write
|
||
1BC586B6000
|
heap
|
page read and write
|
||
254CEE60000
|
heap
|
page read and write
|
||
1EED5C73000
|
heap
|
page read and write
|
||
E1D000
|
stack
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
1CC51029000
|
heap
|
page read and write
|
||
FEF16FF000
|
stack
|
page read and write
|
||
1BC586B4000
|
heap
|
page read and write
|
||
1BC586A6000
|
heap
|
page read and write
|
||
1ED0FA23000
|
heap
|
page read and write
|
||
11B2EE40000
|
trusted library allocation
|
page read and write
|
||
22365530000
|
heap
|
page read and write
|
||
26C7000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
1BC57AD4000
|
heap
|
page read and write
|
||
2B9D3302000
|
heap
|
page read and write
|
||
1AAE8E73000
|
heap
|
page read and write
|
||
505D000
|
stack
|
page read and write
|
||
210FBD13000
|
heap
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
1BC58560000
|
remote allocation
|
page read and write
|
||
59AD67E000
|
stack
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
5C8D000
|
stack
|
page read and write
|
||
210FBC2A000
|
heap
|
page read and write
|
||
4020000
|
heap
|
page read and write
|
||
1BC57A5C000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1A27A860000
|
heap
|
page read and write
|
||
1BC58652000
|
heap
|
page read and write
|
||
1CC51067000
|
heap
|
page read and write
|
||
1AAE8E13000
|
heap
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
DD0000
|
direct allocation
|
page execute and read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
877279000
|
stack
|
page read and write
|
||
6D547000
|
unkown
|
page readonly
|
||
33C000
|
stack
|
page read and write
|
||
1BC58102000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
254CEE63000
|
heap
|
page read and write
|
||
1ED0FFD0000
|
remote allocation
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
210FBC47000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
210FBAD0000
|
heap
|
page read and write
|
||
12014FE000
|
stack
|
page read and write
|
||
41BA000
|
unclassified section
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
1BC58102000
|
heap
|
page read and write
|
||
1BC57A70000
|
heap
|
page read and write
|
||
11B2EE00000
|
trusted library allocation
|
page read and write
|
||
223657AF000
|
heap
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
52DB000
|
heap
|
page read and write
|
||
2B9D3130000
|
trusted library allocation
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
1ED0FFD0000
|
remote allocation
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
1CC51081000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
2B9D3430000
|
heap
|
page read and write
|
||
210FBC48000
|
heap
|
page read and write
|
||
1BC57A4E000
|
heap
|
page read and write
|
||
1BC5868C000
|
heap
|
page read and write
|
||
308C000
|
stack
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
1CC51108000
|
heap
|
page read and write
|
||
11B2F840000
|
trusted library allocation
|
page read and write
|
||
206E6C52000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
2B9D2A3C000
|
heap
|
page read and write
|
||
1BC586C1000
|
heap
|
page read and write
|
||
2B9D3413000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
11B2EB30000
|
heap
|
page read and write
|
||
223657A7000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
1BC586A2000
|
heap
|
page read and write
|
||
1BC58694000
|
heap
|
page read and write
|
||
D9474FE000
|
stack
|
page read and write
|
||
95E1CDB000
|
stack
|
page read and write
|
||
1BC5869C000
|
heap
|
page read and write
|
||
254CEF02000
|
heap
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
4738000
|
heap
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
210FBC82000
|
heap
|
page read and write
|
||
5FAAEFE000
|
stack
|
page read and write
|
||
1050000
|
remote allocation
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
1BC57790000
|
heap
|
page read and write
|
||
2F7B000
|
stack
|
page read and write
|
||
1CC50F50000
|
trusted library allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
D9476FE000
|
stack
|
page read and write
|
||
5A0C77E000
|
stack
|
page read and write
|
||
210FBC13000
|
heap
|
page read and write
|
||
419D000
|
stack
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
6D547000
|
unkown
|
page readonly
|
||
2F3C000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
1200DFE000
|
stack
|
page read and write
|
||
1CC50E50000
|
heap
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
6D547000
|
unkown
|
page readonly
|
||
2B9D336D000
|
heap
|
page read and write
|
||
1BC586DC000
|
heap
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
1CC5103C000
|
heap
|
page read and write
|
||
2236578B000
|
heap
|
page read and write
|
||
59AD7FD000
|
stack
|
page read and write
|
||
2B9D2A8C000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
1ED0FA29000
|
heap
|
page read and write
|
||
1BC586A9000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1BC586B9000
|
heap
|
page read and write
|
||
2B9D3395000
|
heap
|
page read and write
|
||
1EED5C67000
|
heap
|
page read and write
|
||
2B9D3430000
|
heap
|
page read and write
|
||
670E67C000
|
stack
|
page read and write
|
||
2B9D2A68000
|
heap
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
5D8E000
|
stack
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
1BC58694000
|
heap
|
page read and write
|
||
1A27AA6D000
|
heap
|
page read and write
|
||
1BC5869D000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
1BC58684000
|
heap
|
page read and write
|
||
1ED0F7D0000
|
heap
|
page read and write
|
||
1A7F000
|
stack
|
page read and write
|
||
529A000
|
stack
|
page read and write
|
||
254CEE7B000
|
heap
|
page read and write
|
||
11B2EE10000
|
trusted library allocation
|
page read and write
|
||
1BC586B0000
|
heap
|
page read and write
|
||
12010FD000
|
stack
|
page read and write
|
||
41B1000
|
unclassified section
|
page execute read
|
||
210FBC48000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7CFE6FF000
|
stack
|
page read and write
|
||
5D0F000
|
stack
|
page read and write
|
||
1BC57AA6000
|
heap
|
page read and write
|
||
1BC586AE000
|
heap
|
page read and write
|
||
670E97C000
|
stack
|
page read and write
|
||
1BC57B16000
|
heap
|
page read and write
|
||
1BC5869F000
|
heap
|
page read and write
|
||
254CEE44000
|
heap
|
page read and write
|
||
1A27AAC5000
|
heap
|
page read and write
|
||
1BC586A7000
|
heap
|
page read and write
|
||
95E20FB000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
1BC586A2000
|
heap
|
page read and write
|
||
2B9D3400000
|
heap
|
page read and write
|
||
4DEA000
|
trusted library allocation
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
1A27AACB000
|
heap
|
page read and write
|
||
1BC586B6000
|
heap
|
page read and write
|
||
E30000
|
unclassified section
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
1BC586A6000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
1BC58118000
|
heap
|
page read and write
|
||
1BC586AE000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
1EED5C29000
|
heap
|
page read and write
|
||
11B2EBA0000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
2B9D2A00000
|
heap
|
page read and write
|
||
254CEE41000
|
heap
|
page read and write
|
||
1ED0FA40000
|
heap
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
1A27AA65000
|
heap
|
page read and write
|
||
1BC586A6000
|
heap
|
page read and write
|
||
22365680000
|
heap
|
page read and write
|
||
1AAE9602000
|
trusted library allocation
|
page read and write
|
||
3275000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
95E26F9000
|
stack
|
page read and write
|
||
1A27AB13000
|
heap
|
page read and write
|
||
1CC50DE0000
|
heap
|
page read and write
|
||
1BC586A6000
|
heap
|
page read and write
|
||
1BC586A8000
|
heap
|
page read and write
|
||
8772FE000
|
stack
|
page read and write
|
||
FEF15FB000
|
stack
|
page read and write
|
||
223659A0000
|
heap
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
D946DFC000
|
stack
|
page read and write
|
||
5A0C47B000
|
stack
|
page read and write
|
||
1BC57A78000
|
heap
|
page read and write
|
||
1BC586B2000
|
heap
|
page read and write
|
||
12012FF000
|
stack
|
page read and write
|
||
670E47E000
|
stack
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
304C000
|
stack
|
page read and write
|
||
95E247E000
|
stack
|
page read and write
|
||
1AAE8F02000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
1AAE8E00000
|
heap
|
page read and write
|
||
1A27B300000
|
heap
|
page read and write
|
||
6D547000
|
unkown
|
page readonly
|
||
1BC5811B000
|
heap
|
page read and write
|
||
1BC57A4D000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
1BC57AF6000
|
heap
|
page read and write
|
||
95E27FC000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1BC586B5000
|
heap
|
page read and write
|
||
11B2EC00000
|
heap
|
page read and write
|
||
254CEE68000
|
heap
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
FEF197E000
|
stack
|
page read and write
|
||
206E6AC0000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
1BC57A81000
|
heap
|
page read and write
|
||
135F000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
1BC57B02000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
26C9000
|
heap
|
page read and write
|
||
670E1FD000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
1BC586A2000
|
heap
|
page read and write
|
||
254CEE29000
|
heap
|
page read and write
|
||
FEF1A7A000
|
stack
|
page read and write
|
||
58FB000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
1BC57ACC000
|
heap
|
page read and write
|
||
37B000
|
stack
|
page read and write
|
||
1BC586DC000
|
heap
|
page read and write
|
||
1BC586A6000
|
heap
|
page read and write
|
||
95E227E000
|
stack
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
11B2FB00000
|
trusted library allocation
|
page read and write
|
||
11B2EBC0000
|
heap
|
page read and write
|
||
1BC57AE5000
|
heap
|
page read and write
|
||
2B9D2BB9000
|
heap
|
page read and write
|
||
206E6C00000
|
heap
|
page read and write
|
||
2B9D2A2A000
|
heap
|
page read and write
|
||
6D547000
|
unkown
|
page readonly
|
||
1ED0FA13000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1CC51061000
|
heap
|
page read and write
|
||
210FD670000
|
trusted library allocation
|
page read and write
|
||
210FBC3D000
|
heap
|
page read and write
|
||
210FBC57000
|
heap
|
page read and write
|
||
2B9D3300000
|
heap
|
page read and write
|
||
1BC57A56000
|
heap
|
page read and write
|
||
58FB000
|
heap
|
page read and write
|
||
1BC586BA000
|
heap
|
page read and write
|
||
1CC51102000
|
heap
|
page read and write
|
||
5FAACFE000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
1CC51113000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
BE0000
|
remote allocation
|
page read and write
|
||
1BC58682000
|
heap
|
page read and write
|
||
5FAAFFE000
|
stack
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
1BC586D3000
|
heap
|
page read and write
|
||
1BC57ACF000
|
heap
|
page read and write
|
||
11B2FA80000
|
trusted library allocation
|
page read and write
|
||
135F000
|
trusted library allocation
|
page read and write
|
||
210FBC58000
|
heap
|
page read and write
|
||
670E37F000
|
stack
|
page read and write
|
||
1BC57A52000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
5409000
|
unclassified section
|
page readonly
|
||
254CEC60000
|
heap
|
page read and write
|
||
210FBC63000
|
heap
|
page read and write
|
||
566D000
|
stack
|
page read and write
|
||
1BC58102000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
12013FF000
|
stack
|
page read and write
|
||
1BC586BB000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
11B2EE30000
|
heap
|
page read and write
|
||
FEF1879000
|
stack
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
254CEE3B000
|
heap
|
page read and write
|
||
11B2FA90000
|
heap
|
page readonly
|
||
3150000
|
heap
|
page read and write
|
||
1CC51049000
|
heap
|
page read and write
|
||
254CEE75000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
5400000
|
unclassified section
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
223659A5000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
254CEE6A000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
254CEE42000
|
heap
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
31B2000
|
heap
|
page read and write
|
||
1BC58695000
|
heap
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
1BC58698000
|
heap
|
page read and write
|
||
1A7F000
|
stack
|
page read and write
|
||
D94727E000
|
stack
|
page read and write
|
||
254CECD0000
|
heap
|
page read and write
|
||
1CC51802000
|
trusted library allocation
|
page read and write
|
||
1BC5868A000
|
heap
|
page read and write
|
||
1BC58671000
|
heap
|
page read and write
|
||
1200EFD000
|
stack
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
1BC586C1000
|
heap
|
page read and write
|
||
2B9D2940000
|
heap
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
1EED5D13000
|
heap
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
26A4000
|
heap
|
page read and write
|
||
1BC57A55000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
2B9D2A43000
|
heap
|
page read and write
|
||
1EED5C13000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
59AD07B000
|
stack
|
page read and write
|
||
2B9D2A22000
|
heap
|
page read and write
|
||
210FBC7F000
|
heap
|
page read and write
|
||
1AAE8E02000
|
heap
|
page read and write
|
||
1BC586B2000
|
heap
|
page read and write
|
||
254CEE58000
|
heap
|
page read and write
|
||
1ED0F840000
|
heap
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
1EED5C79000
|
heap
|
page read and write
|
||
1A27AACD000
|
heap
|
page read and write
|
||
2B9D2A75000
|
heap
|
page read and write
|
||
7CFE77F000
|
stack
|
page read and write
|
||
210FBC89000
|
heap
|
page read and write
|
||
1BC58100000
|
heap
|
page read and write
|
||
254CEE32000
|
heap
|
page read and write
|
||
1ED0FA00000
|
heap
|
page read and write
|
||
223657A6000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
1BC586AE000
|
heap
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
2B9D3202000
|
heap
|
page read and write
|
||
1EED5C57000
|
heap
|
page read and write
|
||
1BC586AB000
|
heap
|
page read and write
|
||
11B2FAB0000
|
trusted library allocation
|
page read and write
|
||
95E25FE000
|
stack
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
11B2EC3C000
|
heap
|
page read and write
|
||
52DB000
|
heap
|
page read and write
|
||
1BC586A8000
|
heap
|
page read and write
|
||
FEF1BFF000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
210FBB30000
|
heap
|
page read and write
|
||
2B9D2A65000
|
heap
|
page read and write
|
||
1BC586A0000
|
heap
|
page read and write
|
||
1A27AA3D000
|
heap
|
page read and write
|
||
1BC586DA000
|
heap
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
2B9D3402000
|
heap
|
page read and write
|
||
1BC586A9000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
11B2EC3E000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
2B9D2A13000
|
heap
|
page read and write
|
||
5A0BF2C000
|
stack
|
page read and write
|
||
1BC5860D000
|
heap
|
page read and write
|
||
1A27AA13000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
1BC5860F000
|
heap
|
page read and write
|
||
E8A000
|
trusted library allocation
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
254CEE6F000
|
heap
|
page read and write
|
||
5E928F7000
|
stack
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
E39000
|
unclassified section
|
page readonly
|
||
254CEE62000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
FEF1CFF000
|
stack
|
page read and write
|
||
54BA000
|
stack
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
670DD9B000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
1BC586B5000
|
heap
|
page read and write
|
||
11B2EE20000
|
trusted library allocation
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
254CEE45000
|
heap
|
page read and write
|
||
1BC57A4F000
|
heap
|
page read and write
|
||
2B9D33B1000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
9B262FF000
|
stack
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
1BC586E8000
|
heap
|
page read and write
|
||
1A27AB02000
|
heap
|
page read and write
|
||
540C000
|
unclassified section
|
page readonly
|
||
1BC57A13000
|
heap
|
page read and write
|
||
135F000
|
trusted library allocation
|
page read and write
|
||
254CEE67000
|
heap
|
page read and write
|
||
1BC5861D000
|
heap
|
page read and write
|
||
254CEE65000
|
heap
|
page read and write
|
||
206E6BC0000
|
trusted library allocation
|
page read and write
|
||
2B9D2B8E000
|
heap
|
page read and write
|
||
9B25FFE000
|
stack
|
page read and write
|
||
1EED5C02000
|
heap
|
page read and write
|
||
210FBD18000
|
heap
|
page read and write
|
||
511D000
|
stack
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
1BC57A49000
|
heap
|
page read and write
|
||
1200C7B000
|
stack
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
1A27AA88000
|
heap
|
page read and write
|
||
1BC5868A000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
1BC586B8000
|
heap
|
page read and write
|
||
56EA000
|
stack
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
11B2EC3C000
|
heap
|
page read and write
|
||
1ED10002000
|
trusted library allocation
|
page read and write
|
||
95E1D5E000
|
stack
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1BC586C3000
|
heap
|
page read and write
|
||
1BC5868A000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
59ADAFF000
|
stack
|
page read and write
|
||
576F000
|
stack
|
page read and write
|
||
3257000
|
heap
|
page read and write
|
||
254CEE47000
|
heap
|
page read and write
|
||
59AD6FB000
|
stack
|
page read and write
|
||
E3C000
|
unclassified section
|
page readonly
|
||
4738000
|
heap
|
page read and write
|
||
2B9D2930000
|
heap
|
page read and write
|
||
254CEE74000
|
heap
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
1BC58560000
|
remote allocation
|
page read and write
|
||
254CEE5C000
|
heap
|
page read and write
|
||
59AD3FE000
|
stack
|
page read and write
|
||
2B9D2B13000
|
heap
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
206E6C45000
|
heap
|
page read and write
|
||
1BC577A0000
|
heap
|
page read and write
|
||
1BC586BB000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
11B2EBF0000
|
heap
|
page read and write
|
||
254CEC70000
|
heap
|
page read and write
|
||
206E6A70000
|
heap
|
page read and write
|
||
41E9000
|
trusted library allocation
|
page read and write
|
||
1BC586AA000
|
heap
|
page read and write
|
||
254CEE46000
|
heap
|
page read and write
|
||
3411000
|
heap
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
135F000
|
trusted library allocation
|
page read and write
|
||
6D547000
|
unkown
|
page readonly
|
||
1CC51060000
|
heap
|
page read and write
|
||
210FBAC0000
|
heap
|
page read and write
|
||
1BC57B08000
|
heap
|
page read and write
|
||
1BC586A7000
|
heap
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
540A000
|
unclassified section
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
1A27B202000
|
heap
|
page read and write
|
||
1EED5C5B000
|
heap
|
page read and write
|
||
5E9267B000
|
stack
|
page read and write
|
||
D9472FC000
|
stack
|
page read and write
|
||
1BC57A50000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
95E21F7000
|
stack
|
page read and write
|
||
254CEE3D000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
1BC58600000
|
heap
|
page read and write
|
||
1BC586AA000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
670E57F000
|
stack
|
page read and write
|
||
2B9D33BD000
|
heap
|
page read and write
|
||
1BC5861C000
|
heap
|
page read and write
|
||
670E77C000
|
stack
|
page read and write
|
||
1BC57A00000
|
heap
|
page read and write
|
||
22365796000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
1A27A9C0000
|
trusted library allocation
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
1BC5868C000
|
heap
|
page read and write
|
||
1BC5866C000
|
heap
|
page read and write
|
||
1BC58002000
|
heap
|
page read and write
|
||
478C000
|
stack
|
page read and write
|
||
2B9D3322000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
12011FE000
|
stack
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
206E6C3E000
|
heap
|
page read and write
|
||
210FBBF0000
|
remote allocation
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
1BC57A4B000
|
heap
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
1BC5866C000
|
heap
|
page read and write
|
||
210FBD02000
|
heap
|
page read and write
|
||
135F000
|
trusted library allocation
|
page read and write
|
||
3350000
|
direct allocation
|
page execute and read and write
|
||
7CFE8FE000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
1AAE8E3C000
|
heap
|
page read and write
|
||
1BC586B0000
|
heap
|
page read and write
|
||
254CEE57000
|
heap
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
1BC586BB000
|
heap
|
page read and write
|
||
254CEE40000
|
heap
|
page read and write
|
||
254CEE7D000
|
heap
|
page read and write
|
||
1A7F000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
6D548000
|
unkown
|
page write copy
|
||
1BC586D9000
|
heap
|
page read and write
|
||
5EEF000
|
stack
|
page read and write
|
||
1AAE8C90000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
5E9277B000
|
stack
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
58EF000
|
stack
|
page read and write
|
||
56AD000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
1BC57A5B000
|
heap
|
page read and write
|
||
2B9D2A84000
|
heap
|
page read and write
|
||
210FBBB0000
|
trusted library allocation
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
5E924FE000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
5DCF000
|
stack
|
page read and write
|
||
1AAE8F00000
|
heap
|
page read and write
|
||
1EED5B60000
|
trusted library allocation
|
page read and write
|
||
2B9D3427000
|
heap
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
1BC57ADC000
|
heap
|
page read and write
|
||
E3A000
|
unclassified section
|
page read and write
|
||
2B9D2A59000
|
heap
|
page read and write
|
||
95E28FA000
|
stack
|
page read and write
|
||
1AAE8E57000
|
heap
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
4150000
|
direct allocation
|
page execute and read and write
|
||
254CEE6D000
|
heap
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
5A0C67E000
|
stack
|
page read and write
|
||
1CC51000000
|
heap
|
page read and write
|
||
59AD4FF000
|
stack
|
page read and write
|
||
52DB000
|
heap
|
page read and write
|
||
1BC586B2000
|
heap
|
page read and write
|
||
254CEE00000
|
heap
|
page read and write
|
||
223657AF000
|
heap
|
page read and write
|
||
1CC51013000
|
heap
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
1BC586C3000
|
heap
|
page read and write
|
||
1BC586A9000
|
heap
|
page read and write
|
||
1BC586B2000
|
heap
|
page read and write
|
||
1BC586B8000
|
heap
|
page read and write
|
||
210FBB60000
|
trusted library allocation
|
page read and write
|
||
1ED0F7E0000
|
heap
|
page read and write
|
||
210FBD00000
|
heap
|
page read and write
|
||
BE0000
|
remote allocation
|
page read and write
|
||
FEF118B000
|
stack
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
5328000
|
heap
|
page read and write
|
||
1BC57B13000
|
heap
|
page read and write
|
||
1BC58699000
|
heap
|
page read and write
|
||
1A7F000
|
stack
|
page read and write
|
||
206E6C48000
|
heap
|
page read and write
|
||
1BC57A29000
|
heap
|
page read and write
|
||
1ED0FFA0000
|
trusted library allocation
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
1A27AA67000
|
heap
|
page read and write
|
||
254CEE64000
|
heap
|
page read and write
|
||
26B1000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
254CF602000
|
trusted library allocation
|
page read and write
|
||
254CEE84000
|
heap
|
page read and write
|
||
254CEE6B000
|
heap
|
page read and write
|
||
1AAE8F13000
|
heap
|
page read and write
|
||
1BC586AC000
|
heap
|
page read and write
|
||
1BC5868F000
|
heap
|
page read and write
|
||
5FAAD7E000
|
stack
|
page read and write
|
||
1A27AABC000
|
heap
|
page read and write
|
||
1BC58690000
|
heap
|
page read and write
|
||
1ED0FA5C000
|
heap
|
page read and write
|
||
254CEE61000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
6D547000
|
unkown
|
page readonly
|
||
6D540000
|
unkown
|
page readonly
|
||
6D541000
|
unkown
|
page execute read
|
||
EFC000
|
stack
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
254CEE5F000
|
heap
|
page read and write
|
||
206E7402000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
unclassified section
|
page read and write
|
||
1EED5AD0000
|
heap
|
page read and write
|
||
7CFE3DA000
|
stack
|
page read and write
|
||
5E6A000
|
stack
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
22365660000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
87707C000
|
stack
|
page read and write
|
||
2B9D3322000
|
heap
|
page read and write
|
||
1BC586A7000
|
heap
|
page read and write
|
||
4A6D000
|
stack
|
page read and write
|
||
341D000
|
heap
|
page read and write
|
||
FEF17FB000
|
stack
|
page read and write
|
||
5E9257E000
|
stack
|
page read and write
|
||
1BC57ABB000
|
heap
|
page read and write
|
||
1BC58560000
|
remote allocation
|
page read and write
|
||
1CC50DF0000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
2B9D3343000
|
heap
|
page read and write
|
||
6D55F000
|
unkown
|
page readonly
|
||
1BC58613000
|
heap
|
page read and write
|
||
1A7F000
|
stack
|
page read and write
|
||
1EED5C76000
|
heap
|
page read and write
|
||
BE0000
|
unclassified section
|
page read and write
|
||
11B2EE39000
|
heap
|
page read and write
|
||
877479000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1CC51100000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
5A0C57B000
|
stack
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
206E6C02000
|
heap
|
page read and write
|
||
9B25BFB000
|
stack
|
page read and write
|
||
10003000
|
direct allocation
|
page readonly
|
||
206E6A60000
|
heap
|
page read and write
|
||
1BC57ACF000
|
heap
|
page read and write
|
||
1BC57A4A000
|
heap
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
5328000
|
heap
|
page read and write
|
||
5E927FF000
|
stack
|
page read and write
|
||
5E92AFE000
|
stack
|
page read and write
|
||
11B2FAA0000
|
trusted library allocation
|
page read and write
|
||
11B2EBF8000
|
heap
|
page read and write
|
||
1BC57AC3000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
41B9000
|
unclassified section
|
page readonly
|
||
95E2578000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
58FB000
|
heap
|
page read and write
|
||
2B9D2BE5000
|
heap
|
page read and write
|
||
7CFE87F000
|
stack
|
page read and write
|
||
5E2D000
|
stack
|
page read and write
|
||
1BC586B7000
|
heap
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
1BC58694000
|
heap
|
page read and write
|
||
1BC5811B000
|
heap
|
page read and write
|
||
1BC58102000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
254CEE5A000
|
heap
|
page read and write
|
||
5E929FE000
|
stack
|
page read and write
|
||
2B9D3423000
|
heap
|
page read and write
|
||
1AAE8C80000
|
heap
|
page read and write
|
||
22365791000
|
heap
|
page read and write
|
||
5401000
|
unclassified section
|
page execute read
|
||
1BC586B8000
|
heap
|
page read and write
|
||
1BC579D0000
|
trusted library allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
FEF1B7E000
|
stack
|
page read and write
|
||
41BC000
|
unclassified section
|
page readonly
|
||
10000000
|
direct allocation
|
page read and write
|
||
1BC5869F000
|
heap
|
page read and write
|
||
1BC586AD000
|
heap
|
page read and write
|
||
1EED5C40000
|
heap
|
page read and write
|
||
2B9D2A92000
|
heap
|
page read and write
|
||
11B2EE35000
|
heap
|
page read and write
|
||
C7B000
|
stack
|
page read and write
|
||
1CC51064000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
1BC586D9000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
7CFE67E000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
206E6D02000
|
heap
|
page read and write
|
||
1AAE8CF0000
|
heap
|
page read and write
|
||
1BC586A6000
|
heap
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
12015FF000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
5FAAC7C000
|
stack
|
page read and write
|
||
254CEE4E000
|
heap
|
page read and write
|
||
1BC58663000
|
heap
|
page read and write
|
||
254CEE7E000
|
heap
|
page read and write
|
||
210FBBF0000
|
remote allocation
|
page read and write
|
||
1BC586BB000
|
heap
|
page read and write
|
||
1CC51027000
|
heap
|
page read and write
|
||
41B0000
|
unclassified section
|
page read and write
|
||
1EED5C00000
|
heap
|
page read and write
|
||
1A27A850000
|
heap
|
page read and write
|
||
D94767D000
|
stack
|
page read and write
|
||
5FAB1FE000
|
stack
|
page read and write
|
||
9B260FA000
|
stack
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
100E000
|
stack
|
page read and write
|
||
1BC5869C000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
22365780000
|
heap
|
page read and write
|
||
4E98000
|
heap
|
page read and write
|
||
254CEE13000
|
heap
|
page read and write
|
||
1CC51052000
|
heap
|
page read and write
|
||
2B9D2A77000
|
heap
|
page read and write
|
||
1AAE8E79000
|
heap
|
page read and write
|
||
6D548000
|
unkown
|
page write copy
|
||
1EED5B30000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
11B2EC3C000
|
heap
|
page read and write
|
||
1BC586BB000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
47CC000
|
stack
|
page read and write
|
||
206E6C2F000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
31DD000
|
heap
|
page read and write
|
||
1200A7B000
|
stack
|
page read and write
|
There are 866 hidden memdumps, click here to show them.