Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
zzkCIdCoDt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\zzkCIdCoDt.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\zzkCIdCoDt.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SIDHQg\JknwdLLw.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KsqXsqXc\tABZPLVN.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GOsbahzpfkXJSC\qSNMtEyvyGXhYcu.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZamacVzx\UaCx.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\SIDHQg\JknwdLLw.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\PgYwyLA\tIEsDgbPHpoV.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QxWCKZstQphkP\egknjpoziqlzVL.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CXPSzCIcOMY\wxJWjHQhm.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BlngRITsHraAEaQWw\tRWuLwwWwn.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\UOEgTmwbpKANXEqN\KElhycJrzKCpLgeP.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/
|
unknown
|
||
https://172.105.115.71:8080/xdvebqrzopqg/odedrB8kXKV9
|
unknown
|
||
https://172.105.115.71:8080/xdvebqrzopqg/
|
unknown
|
||
https://172.105.115.71:8080/xucipr/ysjolf/ncmjlqi/
|
unknown
|
||
https://172.105.115.71:8080/z
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
JknwdLLw.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
siQPBMdwCPAb.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
245A15F0000
|
direct allocation
|
page execute and read and write
|
||
1220000
|
direct allocation
|
page execute and read and write
|
||
24F464A0000
|
direct allocation
|
page execute and read and write
|
||
2580000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1C3CB390000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
460000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
42E4E7B000
|
stack
|
page read and write
|
||
1C854E74000
|
heap
|
page read and write
|
||
24F44A53000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
2A74D47E000
|
heap
|
page read and write
|
||
25B0000
|
direct allocation
|
page execute and read and write
|
||
253FBB02000
|
heap
|
page read and write
|
||
1710363E000
|
heap
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
17103600000
|
heap
|
page read and write
|
||
31FC000
|
stack
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
17103570000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
CF3EE7C000
|
stack
|
page read and write
|
||
17103580000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
233ED22F000
|
heap
|
page read and write
|
||
1C3C98D7000
|
heap
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
EF109FC000
|
stack
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
16FC8B80000
|
trusted library allocation
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
961000
|
heap
|
page read and write
|
||
24F44930000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
42E4A7B000
|
stack
|
page read and write
|
||
2A74EE70000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1C3CB4D0000
|
trusted library allocation
|
page read and write
|
||
332C000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
233EDBBD000
|
heap
|
page read and write
|
||
1C854E5A000
|
heap
|
page read and write
|
||
3C0000
|
remote allocation
|
page read and write
|
||
1F1F000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
247FA913000
|
heap
|
page read and write
|
||
24F44A50000
|
heap
|
page read and write
|
||
1100BFE000
|
stack
|
page read and write
|
||
233EDC02000
|
heap
|
page read and write
|
||
253FBA78000
|
heap
|
page read and write
|
||
1C854E13000
|
heap
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
247FA887000
|
heap
|
page read and write
|
||
679000
|
stack
|
page read and write
|
||
16FC8BB0000
|
remote allocation
|
page read and write
|
||
16FC8C29000
|
heap
|
page read and write
|
||
20B471DF000
|
heap
|
page read and write
|
||
225F000
|
stack
|
page read and write
|
||
430000
|
direct allocation
|
page execute and read and write
|
||
128E000
|
heap
|
page read and write
|
||
7D534F9000
|
stack
|
page read and write
|
||
24F463A0000
|
heap
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
1C3CB540000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
A90000
|
heap
|
page read and write
|
||
2CA1000
|
heap
|
page read and write
|
||
20B47395000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
24F463CC000
|
heap
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
1C3C98E7000
|
heap
|
page read and write
|
||
20B47EA0000
|
trusted library allocation
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
253FB840000
|
heap
|
page read and write
|
||
233EDB00000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
6ADE5DC000
|
stack
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
20B47E90000
|
heap
|
page readonly
|
||
233ED3E5000
|
heap
|
page read and write
|
||
24FF000
|
stack
|
page read and write
|
||
245A1620000
|
heap
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
49F000
|
heap
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
2CF2000
|
heap
|
page read and write
|
||
DB2DC7B000
|
stack
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
EF10AFD000
|
stack
|
page read and write
|
||
253FBA69000
|
heap
|
page read and write
|
||
1C854E77000
|
heap
|
page read and write
|
||
1F50000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
3B7D000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
42E4FFA000
|
stack
|
page read and write
|
||
1C854E44000
|
heap
|
page read and write
|
||
1D2A8B13000
|
heap
|
page read and write
|
||
1C3C98D7000
|
heap
|
page read and write
|
||
253FC002000
|
trusted library allocation
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
245A3690000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
1C854E5E000
|
heap
|
page read and write
|
||
1C854E40000
|
heap
|
page read and write
|
||
B2E000
|
heap
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
CF3E7FF000
|
stack
|
page read and write
|
||
CF3E8FF000
|
stack
|
page read and write
|
||
233EDB71000
|
heap
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
CF3EB7C000
|
stack
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
2A74D502000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
233ED23D000
|
heap
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
1C3CB3C0000
|
direct allocation
|
page execute and read and write
|
||
6ADEB79000
|
stack
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
12C2000
|
heap
|
page read and write
|
||
1D2A8B02000
|
heap
|
page read and write
|
||
570000
|
remote allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
233EDBD5000
|
heap
|
page read and write
|
||
1C3C9939000
|
heap
|
page read and write
|
||
DB2E37E000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
128A000
|
heap
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
1C3C9928000
|
heap
|
page read and write
|
||
247FA680000
|
heap
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
2A74D468000
|
heap
|
page read and write
|
||
2A74D3E0000
|
remote allocation
|
page read and write
|
||
233ED229000
|
heap
|
page read and write
|
||
673000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
1D2A8A13000
|
heap
|
page read and write
|
||
1C854D80000
|
heap
|
page read and write
|
||
1C854E59000
|
heap
|
page read and write
|
||
2150000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
1C854E84000
|
heap
|
page read and write
|
||
24F44A28000
|
heap
|
page read and write
|
||
EF1097F000
|
stack
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
7D531FE000
|
stack
|
page read and write
|
||
6ADED7F000
|
stack
|
page read and write
|
||
253FB7E0000
|
heap
|
page read and write
|
||
CBDD1FB000
|
stack
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
1710364B000
|
heap
|
page read and write
|
||
42B5F7E000
|
stack
|
page read and write
|
||
32A0000
|
remote allocation
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
42E4EF9000
|
stack
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
1D2A8920000
|
heap
|
page read and write
|
||
42E52FA000
|
stack
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
245A15C0000
|
heap
|
page read and write
|
||
17103D30000
|
trusted library allocation
|
page read and write
|
||
245A3150000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
20B47340000
|
trusted library allocation
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
245A1653000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
8762A7E000
|
stack
|
page read and write
|
||
245A165B000
|
heap
|
page read and write
|
||
2CC2000
|
heap
|
page read and write
|
||
24F44A10000
|
direct allocation
|
page execute and read and write
|
||
600000
|
heap
|
page read and write
|
||
1D2A88B0000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
16FC9402000
|
trusted library allocation
|
page read and write
|
||
1C854E67000
|
heap
|
page read and write
|
||
4AD000
|
heap
|
page read and write
|
||
16FC8C02000
|
heap
|
page read and write
|
||
1100AFC000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
20B47F00000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
1C854D90000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
233ED255000
|
heap
|
page read and write
|
||
CBDD2FB000
|
stack
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
1C854E75000
|
heap
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
42B617E000
|
stack
|
page read and write
|
||
17103602000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
253FBA13000
|
heap
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
1C854E3B000
|
heap
|
page read and write
|
||
2D19000
|
heap
|
page read and write
|
||
1C3C98DC000
|
heap
|
page read and write
|
||
5A10000
|
heap
|
page read and write
|
||
A7B000
|
stack
|
page read and write
|
||
245A30C0000
|
trusted library allocation
|
page read and write
|
||
1C3C98E0000
|
heap
|
page read and write
|
||
1C3C9BE5000
|
heap
|
page read and write
|
||
16FC8C58000
|
heap
|
page read and write
|
||
EF10F7F000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page readonly
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
42B5BDE000
|
stack
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
1C854E60000
|
heap
|
page read and write
|
||
253FBA02000
|
heap
|
page read and write
|
||
171035D0000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
DB2E67F000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
233ED244000
|
heap
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
12BC000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
2CF8000
|
heap
|
page read and write
|
||
D004577000
|
stack
|
page read and write
|
||
3744000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
CBDD4FE000
|
stack
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
4E1000
|
heap
|
page read and write
|
||
42B5B5E000
|
stack
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
1100CFE000
|
stack
|
page read and write
|
||
233ED040000
|
heap
|
page read and write
|
||
D00414C000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
20B47090000
|
heap
|
page read and write
|
||
358F000
|
heap
|
page read and write
|
||
2A74D360000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
2A74D447000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
1C854E42000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
2A74D488000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
935000
|
heap
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
DB2E27D000
|
stack
|
page read and write
|
||
253FBFA0000
|
trusted library allocation
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
CF3ED7E000
|
stack
|
page read and write
|
||
233ED313000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
247FA829000
|
heap
|
page read and write
|
||
8762C79000
|
stack
|
page read and write
|
||
1100E7D000
|
stack
|
page read and write
|
||
245A1647000
|
heap
|
page read and write
|
||
24F449A0000
|
heap
|
page read and write
|
||
8762B79000
|
stack
|
page read and write
|
||
20B473A0000
|
trusted library allocation
|
page read and write
|
||
16FC8AF0000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
1D2A8A02000
|
heap
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
1D2A8B00000
|
heap
|
page read and write
|
||
8762BFE000
|
stack
|
page read and write
|
||
34BB000
|
stack
|
page read and write
|
||
17103E02000
|
trusted library allocation
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
233EDB96000
|
heap
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
4E6000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
1C854E00000
|
heap
|
page read and write
|
||
42B627F000
|
stack
|
page read and write
|
||
247FA83E000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
7BD000
|
heap
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
20B472D0000
|
trusted library allocation
|
page read and write
|
||
7D530FC000
|
stack
|
page read and write
|
||
247FA8BC000
|
heap
|
page read and write
|
||
1C3C98B8000
|
heap
|
page read and write
|
||
233ED284000
|
heap
|
page read and write
|
||
48B000
|
heap
|
page read and write
|
||
253FBA00000
|
heap
|
page read and write
|
||
1F1E000
|
stack
|
page read and write
|
||
1C3C9908000
|
heap
|
page read and write
|
||
245A1666000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
247FA7F0000
|
trusted library allocation
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
1100D7E000
|
stack
|
page read and write
|
||
1B9000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
1C3C9AA0000
|
heap
|
page read and write
|
||
247FA825000
|
heap
|
page read and write
|
||
EF10E7C000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
20B471DF000
|
heap
|
page read and write
|
||
1D2A8A00000
|
heap
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
128C000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
18002D000
|
direct allocation
|
page readonly
|
||
131F000
|
heap
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
1C3CB4D0000
|
trusted library allocation
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
353E000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
245A162D000
|
heap
|
page read and write
|
||
1C854E29000
|
heap
|
page read and write
|
||
490000
|
trusted library allocation
|
page read and write
|
||
1C3C9AE0000
|
heap
|
page read and write
|
||
2A74D413000
|
heap
|
page read and write
|
||
EF10C7E000
|
stack
|
page read and write
|
||
16FC8B50000
|
heap
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
17103647000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
2CF8000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
F0000
|
remote allocation
|
page read and write
|
||
1E9E000
|
stack
|
page read and write
|
||
8C007E000
|
stack
|
page read and write
|
||
247FA902000
|
heap
|
page read and write
|
||
DB2DE7B000
|
stack
|
page read and write
|
||
245A30C0000
|
trusted library allocation
|
page read and write
|
||
233ED1D0000
|
trusted library allocation
|
page read and write
|
||
1C3C9908000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
EF10B7B000
|
stack
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
42E4BFE000
|
stack
|
page read and write
|
||
54A000
|
stack
|
page read and write
|
||
CF3E2DC000
|
stack
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
245A2FBC000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
8C0179000
|
stack
|
page read and write
|
||
245A3155000
|
heap
|
page read and write
|
||
245A1647000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
245A164E000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
3D0000
|
heap
|
page read and write
|
||
247FA813000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
1C854E5D000
|
heap
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
247FB100000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
24F44A79000
|
heap
|
page read and write
|
||
253FB7D0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2263000
|
heap
|
page read and write
|
||
2147000
|
stack
|
page read and write
|
||
253FBA76000
|
heap
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
20B47390000
|
heap
|
page read and write
|
||
263B000
|
stack
|
page read and write
|
||
1283000
|
heap
|
page read and write
|
||
1C3CB3D0000
|
heap
|
page readonly
|
||
480000
|
heap
|
page read and write
|
||
1C3C9908000
|
heap
|
page read and write
|
||
233EDB54000
|
heap
|
page read and write
|
||
245A30A0000
|
heap
|
page read and write
|
||
247FA8C7000
|
heap
|
page read and write
|
||
1C3C9908000
|
heap
|
page read and write
|
||
1C854E32000
|
heap
|
page read and write
|
||
1C854E46000
|
heap
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
1C3C9926000
|
heap
|
page read and write
|
||
10D0000
|
remote allocation
|
page read and write
|
||
1D2A8A28000
|
heap
|
page read and write
|
||
1710363B000
|
heap
|
page read and write
|
||
16FC8AE0000
|
heap
|
page read and write
|
||
16FC8BB0000
|
remote allocation
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
2A74D447000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
20B46F40000
|
trusted library allocation
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
20B46F30000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
2C6C000
|
heap
|
page read and write
|
||
32A0000
|
remote allocation
|
page read and write
|
||
1C854E4E000
|
heap
|
page read and write
|
||
253FBA57000
|
heap
|
page read and write
|
||
1C854E7E000
|
heap
|
page read and write
|
||
20B47190000
|
heap
|
page read and write
|
||
24F449C0000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
24F44D85000
|
heap
|
page read and write
|
||
1100FFE000
|
stack
|
page read and write
|
||
16FC8C40000
|
heap
|
page read and write
|
||
2A74D2F0000
|
heap
|
page read and write
|
||
233EDC30000
|
heap
|
page read and write
|
||
201E000
|
stack
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
570000
|
remote allocation
|
page read and write
|
||
7D533FE000
|
stack
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
4DD000
|
heap
|
page read and write
|
||
1C854E45000
|
heap
|
page read and write
|
||
253FBA7A000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
DB2E77E000
|
stack
|
page read and write
|
||
1C854F02000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
24F44A3F000
|
heap
|
page read and write
|
||
17103629000
|
heap
|
page read and write
|
||
16FC8D02000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2D3D000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
24F464D0000
|
heap
|
page readonly
|
||
AE0000
|
heap
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
2A74D518000
|
heap
|
page read and write
|
||
4AD000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
2A74D43D000
|
heap
|
page read and write
|
||
1C3C9A80000
|
heap
|
page read and write
|
||
1C854E6A000
|
heap
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
233EDC23000
|
heap
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
1C3C98DF000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
4AD000
|
heap
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
1C855602000
|
trusted library allocation
|
page read and write
|
||
10BB000
|
stack
|
page read and write
|
||
1C854E61000
|
heap
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
24F44A20000
|
heap
|
page read and write
|
||
233EDA02000
|
heap
|
page read and write
|
||
245A1693000
|
heap
|
page read and write
|
||
24F44A3F000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
23A3000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
EF1087E000
|
stack
|
page read and write
|
||
257F000
|
stack
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1C3C994B000
|
heap
|
page read and write
|
||
3C0000
|
remote allocation
|
page read and write
|
||
1C3C9908000
|
heap
|
page read and write
|
||
233EDB22000
|
heap
|
page read and write
|
||
D0044FC000
|
stack
|
page read and write
|
||
233EDC00000
|
heap
|
page read and write
|
||
1C855550000
|
trusted library allocation
|
page read and write
|
||
233ED251000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
CF3EC7D000
|
stack
|
page read and write
|
||
440000
|
heap
|
page readonly
|
||
7D535FD000
|
stack
|
page read and write
|
||
2A74D402000
|
heap
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
245A2F90000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
2DBC000
|
stack
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
245A2FBC000
|
heap
|
page read and write
|
||
DB2DF7E000
|
stack
|
page read and write
|
||
8BFD2C000
|
stack
|
page read and write
|
||
1E0000
|
remote allocation
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
233EDB43000
|
heap
|
page read and write
|
||
20B47399000
|
heap
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
233ED0B0000
|
heap
|
page read and write
|
||
24F44A64000
|
heap
|
page read and write
|
||
20B47070000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
253FBA29000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
CBDD3FE000
|
stack
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
12E5000
|
heap
|
page read and write
|
||
7D532FE000
|
stack
|
page read and write
|
||
EF102EC000
|
stack
|
page read and write
|
||
245A1550000
|
heap
|
page read and write
|
||
245A1681000
|
heap
|
page read and write
|
||
10D0000
|
remote allocation
|
page read and write
|
||
128E000
|
heap
|
page read and write
|
||
1D2A9080000
|
trusted library allocation
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
B6B000
|
heap
|
page read and write
|
||
2A74D400000
|
heap
|
page read and write
|
||
2A74D446000
|
heap
|
page read and write
|
||
2A74D457000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
F0000
|
remote allocation
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
253FBA3D000
|
heap
|
page read and write
|
||
1D2A8A59000
|
heap
|
page read and write
|
||
245A165D000
|
heap
|
page read and write
|
||
D0046FB000
|
stack
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
247FA800000
|
heap
|
page read and write
|
||
24F44A6D000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
253FBA5A000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
5B9000
|
heap
|
page read and write
|
||
C9000
|
stack
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
1C3C9BE0000
|
heap
|
page read and write
|
||
233EDBB1000
|
heap
|
page read and write
|
||
1F53000
|
heap
|
page read and write
|
||
1C854E6B000
|
heap
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
233ED27B000
|
heap
|
page read and write
|
||
245A3090000
|
direct allocation
|
page execute and read and write
|
||
87627DF000
|
stack
|
page read and write
|
||
2A74D390000
|
trusted library allocation
|
page read and write
|
||
233ED292000
|
heap
|
page read and write
|
||
16FC8C00000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
24F44A8B000
|
heap
|
page read and write
|
||
1C3C991F000
|
heap
|
page read and write
|
||
1D2A8A7B000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1C854DF0000
|
heap
|
page read and write
|
||
247FB112000
|
heap
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
247FB132000
|
heap
|
page read and write
|
||
233ED1B0000
|
trusted library allocation
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
2A74D3B0000
|
trusted library allocation
|
page read and write
|
||
1C3C9916000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
24F465E0000
|
trusted library allocation
|
page read and write
|
||
1D2A88C0000
|
heap
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
233ED25B000
|
heap
|
page read and write
|
||
1FFC000
|
heap
|
page read and write
|
||
253FBA72000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
247FA690000
|
heap
|
page read and write
|
||
DB2E57F000
|
stack
|
page read and write
|
||
24F44A79000
|
heap
|
page read and write
|
||
20B471DF000
|
heap
|
page read and write
|
||
1C854E41000
|
heap
|
page read and write
|
||
20B471A0000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
2A74D457000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
4FC000
|
heap
|
page read and write
|
||
1332000
|
heap
|
page read and write
|
||
42E4C7F000
|
stack
|
page read and write
|
||
1D2A8A3C000
|
heap
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
DB2E07D000
|
stack
|
page read and write
|
||
20B47198000
|
heap
|
page read and write
|
||
233EDBD3000
|
heap
|
page read and write
|
||
247FA8CD000
|
heap
|
page read and write
|
||
1FC0000
|
heap
|
page read and write
|
||
1C854E3D000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
1D2A9202000
|
trusted library allocation
|
page read and write
|
||
2A74F002000
|
trusted library allocation
|
page read and write
|
||
17103613000
|
heap
|
page read and write
|
||
8BFDAE000
|
stack
|
page read and write
|
||
1C3C9919000
|
heap
|
page read and write
|
||
2A74D500000
|
heap
|
page read and write
|
||
233EDC27000
|
heap
|
page read and write
|
||
1C854E62000
|
heap
|
page read and write
|
||
1C3C9830000
|
heap
|
page read and write
|
||
1C854E58000
|
heap
|
page read and write
|
||
CBDCCDC000
|
stack
|
page read and write
|
||
247FA86C000
|
heap
|
page read and write
|
||
B3F000
|
heap
|
page read and write
|
||
876275C000
|
stack
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
D00447E000
|
stack
|
page read and write
|
||
245A1681000
|
heap
|
page read and write
|
||
529000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
2A74D462000
|
heap
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
24F44A3F000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page readonly
|
||
EF106FB000
|
stack
|
page read and write
|
||
2A74D456000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
20B47380000
|
trusted library allocation
|
page read and write
|
||
1C3C9930000
|
heap
|
page read and write
|
||
1F9E000
|
stack
|
page read and write
|
||
209E000
|
stack
|
page read and write
|
||
2A74D300000
|
heap
|
page read and write
|
||
1C3C98DC000
|
heap
|
page read and write
|
||
233ED050000
|
heap
|
page read and write
|
||
42E51FE000
|
stack
|
page read and write
|
||
42E50FF000
|
stack
|
page read and write
|
||
1C854E7A000
|
heap
|
page read and write
|
||
233EDB22000
|
heap
|
page read and write
|
||
1C854E47000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
DB2E47F000
|
stack
|
page read and write
|
||
1C3C9928000
|
heap
|
page read and write
|
||
1C854E7B000
|
heap
|
page read and write
|
||
233ED288000
|
heap
|
page read and write
|
||
2A74D42A000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
6ADEC7E000
|
stack
|
page read and write
|
||
233ED38E000
|
heap
|
page read and write
|
||
2A74EEB0000
|
trusted library allocation
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
24F465D0000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
8C01FE000
|
stack
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
24F44A79000
|
heap
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
233ED200000
|
heap
|
page read and write
|
||
253FBB13000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
1100A7E000
|
stack
|
page read and write
|
||
1C3C98B0000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
35D9000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
17103702000
|
heap
|
page read and write
|
||
D0041CE000
|
stack
|
page read and write
|
||
20B471D7000
|
heap
|
page read and write
|
||
2CF8000
|
heap
|
page read and write
|
||
1E0000
|
remote allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
233EDC13000
|
heap
|
page read and write
|
||
32A0000
|
remote allocation
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
16FC8C13000
|
heap
|
page read and write
|
||
42B607E000
|
stack
|
page read and write
|
||
1C854E6D000
|
heap
|
page read and write
|
||
247FA6F0000
|
heap
|
page read and write
|
||
42E4D7E000
|
stack
|
page read and write
|
||
20B47EB0000
|
trusted library allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
2CED000
|
heap
|
page read and write
|
||
CF3E9FE000
|
stack
|
page read and write
|
||
27D9000
|
stack
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
247FA8E0000
|
heap
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
20B47C80000
|
trusted library allocation
|
page read and write
|
||
CF3E6FE000
|
stack
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
D0045FC000
|
stack
|
page read and write
|
||
247FB002000
|
heap
|
page read and write
|
||
2A74D3E0000
|
remote allocation
|
page read and write
|
||
8762AF9000
|
stack
|
page read and write
|
||
245A1633000
|
heap
|
page read and write
|
||
24F44D80000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
233ED278000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
5B50000
|
heap
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
16FC8BB0000
|
remote allocation
|
page read and write
|
||
233ED3B9000
|
heap
|
page read and write
|
||
245A1647000
|
heap
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
14E0000
|
direct allocation
|
page execute and read and write
|
||
11005BC000
|
stack
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
20B472E0000
|
trusted library allocation
|
page read and write
|
||
42B5ADC000
|
stack
|
page read and write
|
||
2E3B000
|
stack
|
page read and write
|
||
233EDB02000
|
heap
|
page read and write
|
||
8C00FF000
|
stack
|
page read and write
|
||
2A74D513000
|
heap
|
page read and write
|
||
1C854E57000
|
heap
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
D00467F000
|
stack
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
1710362F000
|
heap
|
page read and write
|
||
2A74D3E0000
|
remote allocation
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
17103655000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
24F465E0000
|
trusted library allocation
|
page read and write
|
||
EF10D7E000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
233EDBC9000
|
heap
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
233ED213000
|
heap
|
page read and write
|
||
245A1655000
|
heap
|
page read and write
|
There are 771 hidden memdumps, click here to show them.