Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
zzkCIdCoDt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\zzkCIdCoDt.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\zzkCIdCoDt.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QxWCKZstQphkP\egknjpoziqlzVL.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CXPSzCIcOMY\wxJWjHQhm.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BlngRITsHraAEaQWw\tRWuLwwWwn.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\UOEgTmwbpKANXEqN\KElhycJrzKCpLgeP.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/xucipr/ysjolf/ncmjlqi/
|
unknown
|
||
https://172.105.115.71:8080/z
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
siQPBMdwCPAb.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
B00000
|
direct allocation
|
page execute and read and write
|
||
2AB001A0000
|
direct allocation
|
page execute and read and write
|
||
CF0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
13B3E6B0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
2D00000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
195A6500000
|
direct allocation
|
page execute and read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
1F539856000
|
heap
|
page read and write
|
||
1C44CE28000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
177D8EE0000
|
heap
|
page read and write
|
||
2042AA50000
|
heap
|
page read and write
|
||
1F53982F000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
2501D640000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
C06267C000
|
stack
|
page read and write
|
||
2042B402000
|
heap
|
page read and write
|
||
2708B25A000
|
heap
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
C0628F9000
|
stack
|
page read and write
|
||
1E2F2340000
|
heap
|
page read and write
|
||
60A0000
|
heap
|
page read and write
|
||
1E2F242A000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
177D9113000
|
heap
|
page read and write
|
||
1F539894000
|
heap
|
page read and write
|
||
2A1D000
|
stack
|
page read and write
|
||
24DA000
|
heap
|
page read and write
|
||
262B87F000
|
stack
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
2708B24E000
|
heap
|
page read and write
|
||
13B4004C000
|
heap
|
page read and write
|
||
2042AD02000
|
heap
|
page read and write
|
||
BDDEEFE000
|
stack
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
2B2E7990000
|
heap
|
page read and write
|
||
A80000
|
direct allocation
|
page execute and read and write
|
||
1F53A213000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
1E2F2459000
|
heap
|
page read and write
|
||
16C93640000
|
trusted library allocation
|
page read and write
|
||
24DA000
|
heap
|
page read and write
|
||
13B3E9D0000
|
trusted library allocation
|
page read and write
|
||
195A7EBC000
|
heap
|
page read and write
|
||
1E2F245A000
|
heap
|
page read and write
|
||
2E39000
|
stack
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
1F53A231000
|
heap
|
page read and write
|
||
195A6560000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2708B22A000
|
heap
|
page read and write
|
||
2708B263000
|
heap
|
page read and write
|
||
177D9013000
|
heap
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
24DA000
|
heap
|
page read and write
|
||
2042B532000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
A90000
|
remote allocation
|
page read and write
|
||
1C44CE64000
|
heap
|
page read and write
|
||
195A6623000
|
heap
|
page read and write
|
||
2498000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2B2E7B02000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
B21057D000
|
stack
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
1F539680000
|
heap
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
2EF50DC000
|
stack
|
page read and write
|
||
177D9041000
|
heap
|
page read and write
|
||
1F5399BA000
|
heap
|
page read and write
|
||
C52000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2501D613000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
195A8480000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
16C935E0000
|
trusted library allocation
|
page read and write
|
||
2501D5D0000
|
remote allocation
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
93B000
|
heap
|
page read and write
|
||
1E2F2434000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
905000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
2501D651000
|
heap
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
2708B200000
|
heap
|
page read and write
|
||
34612FE000
|
stack
|
page read and write
|
||
1F53A122000
|
heap
|
page read and write
|
||
16C927D9000
|
heap
|
page read and write
|
||
982000
|
heap
|
page read and write
|
||
2B2E7A40000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
CA3F6FA000
|
stack
|
page read and write
|
||
982000
|
heap
|
page read and write
|
||
262B9FE000
|
stack
|
page read and write
|
||
24DA000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
2EF515E000
|
stack
|
page read and write
|
||
111A9BB000
|
stack
|
page read and write
|
||
177D9002000
|
heap
|
page read and write
|
||
24B34FC000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7294BFE000
|
stack
|
page read and write
|
||
1E2F2443000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
177D906C000
|
heap
|
page read and write
|
||
2042A9E0000
|
heap
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
2488000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
13B40270000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
13B3E740000
|
heap
|
page read and write
|
||
2501D440000
|
heap
|
page read and write
|
||
1F53A154000
|
heap
|
page read and write
|
||
1C44CC20000
|
heap
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
1E2F244E000
|
heap
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
A90000
|
remote allocation
|
page read and write
|
||
16C92680000
|
trusted library allocation
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
2AB002B7000
|
heap
|
page read and write
|
||
1F53A002000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
CC0000
|
remote allocation
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1E2F2C02000
|
trusted library allocation
|
page read and write
|
||
1E2F247F000
|
heap
|
page read and write
|
||
24B35F9000
|
stack
|
page read and write
|
||
2EF56FB000
|
stack
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
2501D4A0000
|
heap
|
page read and write
|
||
2441000
|
heap
|
page read and write
|
||
2501D430000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
262BE7F000
|
stack
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
13B3E75F000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
177D9065000
|
heap
|
page read and write
|
||
195A6390000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
72949FA000
|
stack
|
page read and write
|
||
1E2F2464000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
16C935C0000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
820000
|
remote allocation
|
page read and write
|
||
579A1FF000
|
stack
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
2663000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
2042AB50000
|
trusted library allocation
|
page read and write
|
||
195A6663000
|
heap
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
195A6617000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
16C929B0000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2B2E7A52000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
1F53985B000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
2042AC13000
|
heap
|
page read and write
|
||
2708B313000
|
heap
|
page read and write
|
||
2708CCB0000
|
trusted library allocation
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
195A6617000
|
heap
|
page read and write
|
||
195A6603000
|
heap
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
3460DFD000
|
stack
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
3460AFC000
|
stack
|
page read and write
|
||
2AB001E0000
|
heap
|
page readonly
|
||
2AB00299000
|
heap
|
page read and write
|
||
1E2F2449000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
C0627FE000
|
stack
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
119E000
|
heap
|
page read and write
|
||
1C44CF02000
|
heap
|
page read and write
|
||
2708B213000
|
heap
|
page read and write
|
||
2B2E7980000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
579A37E000
|
stack
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
13B40020000
|
heap
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
CA3F1AC000
|
stack
|
page read and write
|
||
1E2F2468000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
1F539893000
|
heap
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
1E2F2434000
|
heap
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
5799F7C000
|
stack
|
page read and write
|
||
177D8FE0000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
F46000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
CA3F9F9000
|
stack
|
page read and write
|
||
13B3E640000
|
heap
|
page read and write
|
||
16C927DE000
|
heap
|
page read and write
|
||
2501D5D0000
|
remote allocation
|
page read and write
|
||
A80000
|
remote allocation
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
16C929C5000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
24B7000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
2AB0036C000
|
heap
|
page read and write
|
||
24B7000
|
heap
|
page read and write
|
||
2B2E7A13000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1C44CE79000
|
heap
|
page read and write
|
||
1F5397E0000
|
trusted library allocation
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
13B3E748000
|
heap
|
page read and write
|
||
2708B170000
|
heap
|
page read and write
|
||
16C92940000
|
trusted library allocation
|
page read and write
|
||
13B3E799000
|
heap
|
page read and write
|
||
2042AD13000
|
heap
|
page read and write
|
||
2AB002B8000
|
heap
|
page read and write
|
||
2AB00150000
|
heap
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
1E2F22E0000
|
heap
|
page read and write
|
||
2B2E8202000
|
trusted library allocation
|
page read and write
|
||
2AB0025F000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
C9A000
|
stack
|
page read and write
|
||
BDDEA7E000
|
stack
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
1E2F246E000
|
heap
|
page read and write
|
||
177D8E70000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
C06277F000
|
stack
|
page read and write
|
||
B21027C000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
11AF000
|
heap
|
page read and write
|
||
C678FE000
|
stack
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
BA0000
|
heap
|
page read and write
|
||
72944FA000
|
stack
|
page read and write
|
||
195A65FD000
|
heap
|
page read and write
|
||
1E2F2400000
|
heap
|
page read and write
|
||
1F539813000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
13B3E7AB000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1E2F242F000
|
heap
|
page read and write
|
||
1F53A100000
|
heap
|
page read and write
|
||
2708B241000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
1E2F2432000
|
heap
|
page read and write
|
||
16C92700000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
262BD7C000
|
stack
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
BDDEDFF000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2AB004B0000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2708B318000
|
heap
|
page read and write
|
||
1E2F246B000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
F45000
|
heap
|
page read and write
|
||
5E90000
|
heap
|
page read and write
|
||
1E2F2457000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
1C44CE68000
|
heap
|
page read and write
|
||
2492000
|
heap
|
page read and write
|
||
195A7E90000
|
heap
|
page read and write
|
||
2461000
|
heap
|
page read and write
|
||
2708B24A000
|
heap
|
page read and write
|
||
1E2F2485000
|
heap
|
page read and write
|
||
24B30AB000
|
stack
|
page read and write
|
||
1330000
|
direct allocation
|
page execute and read and write
|
||
1E2F2478000
|
heap
|
page read and write
|
||
111AFFE000
|
stack
|
page read and write
|
||
13B3E730000
|
trusted library allocation
|
page read and write
|
||
24B367E000
|
stack
|
page read and write
|
||
1E2F2413000
|
heap
|
page read and write
|
||
1F53A1B0000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
1E2F2431000
|
heap
|
page read and write
|
||
BDDE73C000
|
stack
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
8A0000
|
direct allocation
|
page execute and read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
13B3E799000
|
heap
|
page read and write
|
||
24A6000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2B2E7A00000
|
heap
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
195A65F0000
|
heap
|
page read and write
|
||
8FF000
|
heap
|
page read and write
|
||
1F53A1BE000
|
heap
|
page read and write
|
||
177D9802000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2492000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
B80000
|
remote allocation
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
1F539800000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
177D905B000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
2AB004A0000
|
heap
|
page read and write
|
||
2042ACBB000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
C06297C000
|
stack
|
page read and write
|
||
729467E000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
195A65C0000
|
heap
|
page read and write
|
||
195A6560000
|
trusted library allocation
|
page read and write
|
||
1C44CBC0000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page readonly
|
||
98B000
|
heap
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
2042AC29000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
2AB00220000
|
trusted library allocation
|
page read and write
|
||
2AB00266000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1E2F245D000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
1E2F2461000
|
heap
|
page read and write
|
||
2AB00130000
|
heap
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
1C44CE02000
|
heap
|
page read and write
|
||
2501D602000
|
heap
|
page read and write
|
||
2B2E8140000
|
trusted library allocation
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
2488000
|
heap
|
page read and write
|
||
1E2F247B000
|
heap
|
page read and write
|
||
BDDE7BE000
|
stack
|
page read and write
|
||
2501D600000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
257C000
|
heap
|
page read and write
|
||
1E2F2458000
|
heap
|
page read and write
|
||
16C92670000
|
heap
|
page read and write
|
||
195A64D0000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2042ACCC000
|
heap
|
page read and write
|
||
262B18C000
|
stack
|
page read and write
|
||
2042AC88000
|
heap
|
page read and write
|
||
AF3000
|
heap
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
2787000
|
stack
|
page read and write
|
||
2AB002B0000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
5FB000
|
stack
|
page read and write
|
||
2B2E7A37000
|
heap
|
page read and write
|
||
7294B7F000
|
stack
|
page read and write
|
||
2488000
|
heap
|
page read and write
|
||
2B2E7A3E000
|
heap
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
2AB00278000
|
heap
|
page read and write
|
||
1F539913000
|
heap
|
page read and write
|
||
1C44CE13000
|
heap
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
1C44CE40000
|
heap
|
page read and write
|
||
2AB00240000
|
heap
|
page read and write
|
||
2AB002C1000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
1F539829000
|
heap
|
page read and write
|
||
B21037C000
|
stack
|
page read and write
|
||
1F539670000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
5799EFE000
|
stack
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
111AEFB000
|
stack
|
page read and write
|
||
2708B1F0000
|
remote allocation
|
page read and write
|
||
1F539843000
|
heap
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
13B3E660000
|
heap
|
page read and write
|
||
255C000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
2B2E7A45000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
1C44CF00000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
AFF000
|
heap
|
page read and write
|
||
2AB002DC000
|
heap
|
page read and write
|
||
2AB002AA000
|
heap
|
page read and write
|
||
1F53988D000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
918000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
16C927BD000
|
heap
|
page read and write
|
||
C6752C000
|
stack
|
page read and write
|
||
2501D5D0000
|
remote allocation
|
page read and write
|
||
CA3F8FE000
|
stack
|
page read and write
|
||
16C927BD000
|
heap
|
page read and write
|
||
820000
|
remote allocation
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
2EF547F000
|
stack
|
page read and write
|
||
2EF54FC000
|
stack
|
page read and write
|
||
1E2F2446000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
1F539888000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
2708B1F0000
|
remote allocation
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
D20000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
195A661E000
|
heap
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
1F53998F000
|
heap
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
2708B25E000
|
heap
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
2AB0026C000
|
heap
|
page read and write
|
||
2803000
|
heap
|
page read and write
|
||
262B77F000
|
stack
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
1F5399E6000
|
heap
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
B20F9DC000
|
stack
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
2042AC6C000
|
heap
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
2501D702000
|
heap
|
page read and write
|
||
CC0000
|
remote allocation
|
page read and write
|
||
16C93380000
|
trusted library allocation
|
page read and write
|
||
729477B000
|
stack
|
page read and write
|
||
5799C7C000
|
stack
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
13B3E6F0000
|
heap
|
page readonly
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
177D9102000
|
heap
|
page read and write
|
||
2AB00440000
|
trusted library allocation
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
2501D62A000
|
heap
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1C44CBB0000
|
heap
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
2042B500000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
A79000
|
stack
|
page read and write
|
||
2708B100000
|
heap
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
2708B25D000
|
heap
|
page read and write
|
||
1F53A1C9000
|
heap
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
2EF567E000
|
stack
|
page read and write
|
||
BDDECFE000
|
stack
|
page read and write
|
||
2042A9F0000
|
heap
|
page read and write
|
||
262B8FC000
|
stack
|
page read and write
|
||
2708B1C0000
|
trusted library allocation
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
918000
|
heap
|
page read and write
|
||
2492000
|
heap
|
page read and write
|
||
B21017E000
|
stack
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
1E2F243C000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
2DBE000
|
stack
|
page read and write
|
||
13B3E75F000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
2492000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
1F53A200000
|
heap
|
page read and write
|
||
1E2F2502000
|
heap
|
page read and write
|
||
1C44CDF0000
|
trusted library allocation
|
page read and write
|
||
2B9C000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
111B1FB000
|
stack
|
page read and write
|
||
B21007E000
|
stack
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
C67AFE000
|
stack
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
2B2E7A24000
|
heap
|
page read and write
|
||
2501DE02000
|
trusted library allocation
|
page read and write
|
||
F2F000
|
heap
|
page read and write
|
||
2EF5577000
|
stack
|
page read and write
|
||
1E2F245B000
|
heap
|
page read and write
|
||
16C929D0000
|
trusted library allocation
|
page read and write
|
||
195A6651000
|
heap
|
page read and write
|
||
579A17E000
|
stack
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
2AB00273000
|
heap
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
579A2FD000
|
stack
|
page read and write
|
||
1E2F2460000
|
heap
|
page read and write
|
||
1F53A202000
|
heap
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
16C935D0000
|
heap
|
page readonly
|
||
2AB001D0000
|
direct allocation
|
page execute and read and write
|
||
C36000
|
heap
|
page read and write
|
||
C06287E000
|
stack
|
page read and write
|
||
2AB00340000
|
heap
|
page read and write
|
||
2D39000
|
heap
|
page read and write
|
||
25DB000
|
stack
|
page read and write
|
||
1F53A190000
|
heap
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
13B3E770000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
1E2F2463000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
2AB00299000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
24A7000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
16C929C0000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
195A662E000
|
heap
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
111B0FE000
|
stack
|
page read and write
|
||
C67DFD000
|
stack
|
page read and write
|
||
72947F9000
|
stack
|
page read and write
|
||
2AB00299000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
BDDEBFE000
|
stack
|
page read and write
|
||
B20FDFC000
|
stack
|
page read and write
|
||
2B2E7A02000
|
heap
|
page read and write
|
||
195A6540000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
1E2F2445000
|
heap
|
page read and write
|
||
1F539875000
|
heap
|
page read and write
|
||
177D9076000
|
heap
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
16C92950000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
1C44CE56000
|
heap
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
13B3E6E0000
|
direct allocation
|
page execute and read and write
|
||
2708B202000
|
heap
|
page read and write
|
||
C67CFE000
|
stack
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
2AB00000000
|
heap
|
page read and write
|
||
10BB000
|
stack
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
C56000
|
heap
|
page read and write
|
||
2042ACE6000
|
heap
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
34605DC000
|
stack
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
937000
|
heap
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
2EF55FE000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
13B3EA05000
|
heap
|
page read and write
|
||
2AB002B8000
|
heap
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
16C926E0000
|
heap
|
page read and write
|
||
16C927BD000
|
heap
|
page read and write
|
||
2708CE02000
|
trusted library allocation
|
page read and write
|
||
2B2E7A3C000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
16C927D8000
|
heap
|
page read and write
|
||
1F53A228000
|
heap
|
page read and write
|
||
299C000
|
stack
|
page read and write
|
||
2042AC3E000
|
heap
|
page read and write
|
||
1F53983D000
|
heap
|
page read and write
|
||
2708CC70000
|
trusted library allocation
|
page read and write
|
||
13B3E500000
|
heap
|
page read and write
|
||
2AB002A7000
|
heap
|
page read and write
|
||
2492000
|
heap
|
page read and write
|
||
16C927BF000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
3460EFE000
|
stack
|
page read and write
|
||
1F539878000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page readonly
|
||
2AB00276000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
2B2E79E0000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
2B2E7A2F000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
195A6625000
|
heap
|
page read and write
|
||
AED000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2708B300000
|
heap
|
page read and write
|
||
262BA7B000
|
stack
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
2708B1F0000
|
remote allocation
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1F53988A000
|
heap
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
2AB00299000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
195A6651000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
1C44CF13000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
C4D000
|
heap
|
page read and write
|
||
1E2F22D0000
|
heap
|
page read and write
|
||
A80000
|
remote allocation
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
16C935F0000
|
trusted library allocation
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
1E2F247C000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
195A6637000
|
heap
|
page read and write
|
||
24DA000
|
heap
|
page read and write
|
||
16C92779000
|
heap
|
page read and write
|
||
3460FFF000
|
stack
|
page read and write
|
||
13B3E75F000
|
heap
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
2AB002CA000
|
heap
|
page read and write
|
||
72940EC000
|
stack
|
page read and write
|
||
2419000
|
heap
|
page read and write
|
||
1E2F243E000
|
heap
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page readonly
|
||
720000
|
heap
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
177D8E80000
|
heap
|
page read and write
|
||
2EF51DF000
|
stack
|
page read and write
|
||
3460BFF000
|
stack
|
page read and write
|
||
1F53A122000
|
heap
|
page read and write
|
||
34610FF000
|
stack
|
page read and write
|
||
7294AFE000
|
stack
|
page read and write
|
||
24B3479000
|
stack
|
page read and write
|
||
2501D663000
|
heap
|
page read and write
|
||
2708B1A0000
|
trusted library allocation
|
page read and write
|
||
2708B269000
|
heap
|
page read and write
|
||
C679FE000
|
stack
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
2AB004B5000
|
heap
|
page read and write
|
||
1F53A143000
|
heap
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
1E2F2442000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
1E2F2466000
|
heap
|
page read and write
|
||
C67BF9000
|
stack
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
1F5396E0000
|
heap
|
page read and write
|
||
34611FF000
|
stack
|
page read and write
|
||
2501D636000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
2D18000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
1F53A223000
|
heap
|
page read and write
|
||
1E2F2370000
|
trusted library allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
B99000
|
stack
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
2042ACC4000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
A79000
|
stack
|
page read and write
|
||
2C8B000
|
stack
|
page read and write
|
||
2708B110000
|
heap
|
page read and write
|
||
177D9000000
|
heap
|
page read and write
|
||
B1A000
|
heap
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
34609FB000
|
stack
|
page read and write
|
||
13B3EA00000
|
heap
|
page read and write
|
||
1E2F246C000
|
heap
|
page read and write
|
||
177D9066000
|
heap
|
page read and write
|
||
262BB7D000
|
stack
|
page read and write
|
||
1E2F2441000
|
heap
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
2501D5A0000
|
trusted library allocation
|
page read and write
|
||
13B3E795000
|
heap
|
page read and write
|
||
2042AC00000
|
heap
|
page read and write
|
||
C0626FF000
|
stack
|
page read and write
|
||
6160000
|
heap
|
page read and write
|
||
1C44CE00000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
195A6530000
|
direct allocation
|
page execute and read and write
|
||
195A65C5000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
16C92770000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
1C44D402000
|
trusted library allocation
|
page read and write
|
||
2AB00248000
|
heap
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
937000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
262BC7E000
|
stack
|
page read and write
|
||
B20FF7F000
|
stack
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
24B357F000
|
stack
|
page read and write
|
||
2AB00299000
|
heap
|
page read and write
|
||
262B5FC000
|
stack
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
177D902A000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
24D9000
|
heap
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
24A8000
|
heap
|
page read and write
|
||
195A7EBC000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
1F539E60000
|
trusted library allocation
|
page read and write
|
||
2D39000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
1F53A16F000
|
heap
|
page read and write
|
||
72948FF000
|
stack
|
page read and write
|
||
CA3F7FF000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
DB5000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
16C929C9000
|
heap
|
page read and write
|
||
195A6617000
|
heap
|
page read and write
|
||
1F53A231000
|
heap
|
page read and write
|
||
2708B302000
|
heap
|
page read and write
|
||
2708B24D000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
1F53A102000
|
heap
|
page read and write
|
||
1F53987F000
|
heap
|
page read and write
|
There are 811 hidden memdumps, click here to show them.