Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
gdazhx1EIP.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\gdazhx1EIP.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\gdazhx1EIP.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\gdazhx1EIP.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VGdnyYmEzk\YPrp.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XeFlcoVt\wPzeOKW.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MtAvdtxCDyblyei\mPrhkfVupthqSBxp.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\EHrtIMNuOOnxGF\cDTWQXzuCIj.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/
|
unknown
|
||
https://112.105.115.71:8080/
|
unknown
|
||
https://172.105.115.71:8080/lsug/nhhwenwy/qahixm/
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
IhDzTlHldHNg.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
490000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
18104890000
|
direct allocation
|
page execute and read and write
|
||
28E0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
B60000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
222D2E50000
|
direct allocation
|
page execute and read and write
|
||
1FD03F10000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1A093AB0000
|
remote allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
265EFE000
|
stack
|
page read and write
|
||
14388322000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
83A077E000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
1A093502000
|
heap
|
page read and write
|
||
14388343000
|
heap
|
page read and write
|
||
1A2C552B000
|
heap
|
page read and write
|
||
610BEFC000
|
stack
|
page read and write
|
||
222D1570000
|
heap
|
page read and write
|
||
40E5B7C000
|
stack
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2669000
|
stack
|
page read and write
|
||
1A2C5502000
|
heap
|
page read and write
|
||
268B000
|
stack
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
222D141A000
|
heap
|
page read and write
|
||
189DE713000
|
heap
|
page read and write
|
||
181048D0000
|
heap
|
page readonly
|
||
18002C000
|
direct allocation
|
page read and write
|
||
14387A8C000
|
heap
|
page read and write
|
||
40B6EB000
|
stack
|
page read and write
|
||
14387BE5000
|
heap
|
page read and write
|
||
1FB7E62A000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
265FB160000
|
trusted library allocation
|
page read and write
|
||
1A74EE47000
|
heap
|
page read and write
|
||
E00000
|
remote allocation
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
1FF8000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
2A9E000
|
stack
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
40B7EE000
|
stack
|
page read and write
|
||
1A093AB0000
|
remote allocation
|
page read and write
|
||
1FAD4202000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
1FD03E10000
|
heap
|
page read and write
|
||
1A2C5400000
|
heap
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1FB7E652000
|
heap
|
page read and write
|
||
31D8179000
|
stack
|
page read and write
|
||
14387880000
|
heap
|
page read and write
|
||
12C8E100000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
6C0000
|
remote allocation
|
page read and write
|
||
2893000
|
heap
|
page read and write
|
||
31D807E000
|
stack
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1000000
|
heap
|
page read and write
|
||
1A2C545A000
|
heap
|
page read and write
|
||
839FBAB000
|
stack
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
181061E0000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
1A74EE62000
|
heap
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
1FF8000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
265FA5D1000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
1FD025A1000
|
heap
|
page read and write
|
||
E6C000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
1A2C5500000
|
heap
|
page read and write
|
||
265FA4D0000
|
trusted library allocation
|
page read and write
|
||
A1E917C000
|
stack
|
page read and write
|
||
23DF000
|
stack
|
page read and write
|
||
189DE602000
|
heap
|
page read and write
|
||
1A74EE39000
|
heap
|
page read and write
|
||
200B000
|
heap
|
page read and write
|
||
200B000
|
heap
|
page read and write
|
||
34D4E7D000
|
stack
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
1A2C5370000
|
trusted library allocation
|
page read and write
|
||
1FD0257D000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
1EB000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
31D7D6C000
|
stack
|
page read and write
|
||
12C8E258000
|
heap
|
page read and write
|
||
A1E8F7F000
|
stack
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
28A9000
|
heap
|
page read and write
|
||
1FB7E602000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page execute and read and write
|
||
265FA5D4000
|
heap
|
page read and write
|
||
8D0000
|
remote allocation
|
page read and write
|
||
222D12F0000
|
heap
|
page read and write
|
||
12C8E268000
|
heap
|
page read and write
|
||
12C8E279000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
1FD0257B000
|
heap
|
page read and write
|
||
3AAD000
|
stack
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
1A74EE13000
|
heap
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
14388300000
|
heap
|
page read and write
|
||
610BFFC000
|
stack
|
page read and write
|
||
222D13EE000
|
heap
|
page read and write
|
||
1A74EE43000
|
heap
|
page read and write
|
||
1A093413000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
1A74EE66000
|
heap
|
page read and write
|
||
1438836D000
|
heap
|
page read and write
|
||
200B000
|
heap
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
181063C0000
|
heap
|
page read and write
|
||
1A2C545A000
|
heap
|
page read and write
|
||
1A2C5440000
|
heap
|
page read and write
|
||
40E5CFF000
|
stack
|
page read and write
|
||
513000
|
heap
|
page read and write
|
||
222D13D8000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1FB7E580000
|
trusted library allocation
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
222D2D50000
|
heap
|
page read and write
|
||
12C8E110000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
20DC000
|
stack
|
page read and write
|
||
189DE702000
|
heap
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
222D1560000
|
heap
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
1A74ED20000
|
heap
|
page read and write
|
||
189DE65B000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
28A8000
|
heap
|
page read and write
|
||
1A74EF02000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
20F0000
|
trusted library allocation
|
page read and write
|
||
1A2C6E02000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
remote allocation
|
page read and write
|
||
189DE66B000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
ADC000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
265FA5D3000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
4FF000
|
heap
|
page read and write
|
||
1A74EE58000
|
heap
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
265FA588000
|
heap
|
page read and write
|
||
1A74EE60000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
80C000
|
heap
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
265FA5D1000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
222D13AC000
|
heap
|
page read and write
|
||
14388430000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
1FAD3A84000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
40B76E000
|
stack
|
page read and write
|
||
83A097F000
|
stack
|
page read and write
|
||
14387A65000
|
heap
|
page read and write
|
||
2140000
|
heap
|
page read and write
|
||
1FB7E613000
|
heap
|
page read and write
|
||
245E000
|
stack
|
page read and write
|
||
8BA000
|
stack
|
page read and write
|
||
610C07B000
|
stack
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
FDD000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1A74EE85000
|
heap
|
page read and write
|
||
189DE63D000
|
heap
|
page read and write
|
||
2001000
|
heap
|
page read and write
|
||
1A74EE30000
|
heap
|
page read and write
|
||
1FD02400000
|
heap
|
page read and write
|
||
1FAD3A24000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
E47007B000
|
stack
|
page read and write
|
||
1A2C5471000
|
heap
|
page read and write
|
||
1FD03F40000
|
direct allocation
|
page execute and read and write
|
||
40E57DC000
|
stack
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
265FA5D1000
|
heap
|
page read and write
|
||
1A2C6DE0000
|
remote allocation
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
14387A6E000
|
heap
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
1FD0254D000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
12C8E200000
|
heap
|
page read and write
|
||
1A74EE7C000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
6C0000
|
remote allocation
|
page read and write
|
||
143883C6000
|
heap
|
page read and write
|
||
189DE460000
|
heap
|
page read and write
|
||
A1E88BB000
|
stack
|
page read and write
|
||
1A74EE69000
|
heap
|
page read and write
|
||
265FB430000
|
trusted library allocation
|
page read and write
|
||
222D2F90000
|
trusted library allocation
|
page read and write
|
||
14387810000
|
heap
|
page read and write
|
||
18104820000
|
heap
|
page read and write
|
||
83A047D000
|
stack
|
page read and write
|
||
1FAD3B13000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
69E000
|
stack
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
1A2C5465000
|
heap
|
page read and write
|
||
14388413000
|
heap
|
page read and write
|
||
18104949000
|
heap
|
page read and write
|
||
14387B13000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
1FAD3A6D000
|
heap
|
page read and write
|
||
265FA580000
|
heap
|
page read and write
|
||
52B000
|
heap
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
1FB7E600000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
181048F0000
|
heap
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
1FD02567000
|
heap
|
page read and write
|
||
1FB7E624000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
1A74EE5A000
|
heap
|
page read and write
|
||
1A74EE64000
|
heap
|
page read and write
|
||
2110000
|
remote allocation
|
page read and write
|
||
265FA900000
|
trusted library allocation
|
page read and write
|
||
1810490F000
|
heap
|
page read and write
|
||
1FB7EE02000
|
trusted library allocation
|
page read and write
|
||
40BB7E000
|
stack
|
page read and write
|
||
2110000
|
remote allocation
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
9BA79FE000
|
stack
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
69A000
|
stack
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1A74EE75000
|
heap
|
page read and write
|
||
222D13D8000
|
heap
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
222D13F7000
|
heap
|
page read and write
|
||
1A093400000
|
heap
|
page read and write
|
||
1001000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
1FAD3920000
|
heap
|
page read and write
|
||
1810495B000
|
heap
|
page read and write
|
||
2007000
|
heap
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
20F0000
|
trusted library allocation
|
page read and write
|
||
A1E8CFE000
|
stack
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
12C8E1A0000
|
trusted library allocation
|
page read and write
|
||
258D000
|
stack
|
page read and write
|
||
1A74EE46000
|
heap
|
page read and write
|
||
1A093AB0000
|
remote allocation
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
50D000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
1FB7E480000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
15E0AFF000
|
stack
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
1FD02575000
|
heap
|
page read and write
|
||
9BA716C000
|
stack
|
page read and write
|
||
83A057F000
|
stack
|
page read and write
|
||
28C9000
|
heap
|
page read and write
|
||
265FA5DB000
|
heap
|
page read and write
|
||
40D547F000
|
stack
|
page read and write
|
||
1A74EE33000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
15E03DC000
|
stack
|
page read and write
|
||
A1E947E000
|
stack
|
page read and write
|
||
2920000
|
heap
|
page readonly
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
1FB7E430000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
14387A92000
|
heap
|
page read and write
|
||
2009000
|
heap
|
page read and write
|
||
1A74EE4E000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
222D1400000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
1F7C000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
40BE7E000
|
stack
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
34D517F000
|
stack
|
page read and write
|
||
1A2C5518000
|
heap
|
page read and write
|
||
189DE4D0000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
14387A3C000
|
heap
|
page read and write
|
||
1FD03E3C000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
51A000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
ABF000
|
heap
|
page read and write
|
||
14388423000
|
heap
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
1FAD39B0000
|
trusted library allocation
|
page read and write
|
||
143883CA000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
2001000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1A74EDB0000
|
trusted library allocation
|
page read and write
|
||
610BD7E000
|
stack
|
page read and write
|
||
12C8E313000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
AD5000
|
heap
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
2110000
|
remote allocation
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
12C8E264000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
222D2D7D000
|
heap
|
page read and write
|
||
222D2E80000
|
direct allocation
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
14387A58000
|
heap
|
page read and write
|
||
1A74EE63000
|
heap
|
page read and write
|
||
1A74EE5B000
|
heap
|
page read and write
|
||
222D13F5000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
26588B000
|
stack
|
page read and write
|
||
1A74EE2C000
|
heap
|
page read and write
|
||
1A74EE5D000
|
heap
|
page read and write
|
||
265DFB000
|
stack
|
page read and write
|
||
14387A2D000
|
heap
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
1A74EE33000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1FB7E644000
|
heap
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
1A2C5210000
|
heap
|
page read and write
|
||
1FAD4313000
|
heap
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
12C8E27D000
|
heap
|
page read and write
|
||
222D2E90000
|
heap
|
page readonly
|
||
E4701F9000
|
stack
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
28C9000
|
heap
|
page read and write
|
||
1FD025B3000
|
heap
|
page read and write
|
||
265FA550000
|
heap
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
DE2000
|
heap
|
page read and write
|
||
14388392000
|
heap
|
page read and write
|
||
15E07FF000
|
stack
|
page read and write
|
||
1FB7E62F000
|
heap
|
page read and write
|
||
12C8E228000
|
heap
|
page read and write
|
||
40E5AFE000
|
stack
|
page read and write
|
||
1FD0256E000
|
heap
|
page read and write
|
||
28A9000
|
heap
|
page read and write
|
||
40BD7F000
|
stack
|
page read and write
|
||
1A74EE6C000
|
heap
|
page read and write
|
||
14387A00000
|
heap
|
page read and write
|
||
189DEE02000
|
trusted library allocation
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
20E0000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
265FA4C0000
|
heap
|
page read and write
|
||
A0000
|
heap
|
page read and write
|
||
1A74EE31000
|
heap
|
page read and write
|
||
547000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
1A093402000
|
heap
|
page read and write
|
||
34D4FFD000
|
stack
|
page read and write
|
||
1A74EE6E000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
265FA5DA000
|
heap
|
page read and write
|
||
34D476B000
|
stack
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
143883B0000
|
heap
|
page read and write
|
||
1F50000
|
heap
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
34D4C7C000
|
stack
|
page read and write
|
||
1A093429000
|
heap
|
page read and write
|
||
1A74EE42000
|
heap
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
1A2C544A000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
58BF000
|
stack
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
14387A13000
|
heap
|
page read and write
|
||
E00000
|
remote allocation
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
1A74EE6B000
|
heap
|
page read and write
|
||
180000
|
remote allocation
|
page read and write
|
||
222D13E5000
|
heap
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
1A2C5513000
|
heap
|
page read and write
|
||
189DE629000
|
heap
|
page read and write
|
||
A1E927C000
|
stack
|
page read and write
|
||
513000
|
heap
|
page read and write
|
||
610C37C000
|
stack
|
page read and write
|
||
159000
|
stack
|
page read and write
|
||
40D4EFA000
|
stack
|
page read and write
|
||
222D1380000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
1A2C5402000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
14388202000
|
heap
|
page read and write
|
||
1A2C548B000
|
heap
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
40D4A9B000
|
stack
|
page read and write
|
||
BD9000
|
stack
|
page read and write
|
||
2A16000
|
heap
|
page read and write
|
||
E4703FB000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
1FD03FE0000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
410000
|
remote allocation
|
page read and write
|
||
265FB1D0000
|
trusted library allocation
|
page read and write
|
||
18104948000
|
heap
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
595000
|
heap
|
page read and write
|
||
1FD02567000
|
heap
|
page read and write
|
||
1A2C5413000
|
heap
|
page read and write
|
||
12C8E240000
|
heap
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
9BA74FE000
|
stack
|
page read and write
|
||
40D55FE000
|
stack
|
page read and write
|
||
1FAD3AB9000
|
heap
|
page read and write
|
||
265FFF000
|
stack
|
page read and write
|
||
1FD02553000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
2A27000
|
stack
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
5AB000
|
heap
|
page read and write
|
||
1FD03F70000
|
trusted library allocation
|
page read and write
|
||
222D13A7000
|
heap
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
14387A69000
|
heap
|
page read and write
|
||
34D4BFC000
|
stack
|
page read and write
|
||
2473000
|
heap
|
page read and write
|
||
1FAD3AC0000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
1FD02540000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
4FF000
|
heap
|
page read and write
|
||
40D50FB000
|
stack
|
page read and write
|
||
18104949000
|
heap
|
page read and write
|
||
1A74EE31000
|
heap
|
page read and write
|
||
40E5C7E000
|
stack
|
page read and write
|
||
189DE665000
|
heap
|
page read and write
|
||
1A74EE41000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
83A017E000
|
stack
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
14387A29000
|
heap
|
page read and write
|
||
181046E0000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
1A2C544A000
|
heap
|
page read and write
|
||
1A2C5200000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
FEB000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
14388302000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
50D000
|
heap
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
189DE5D0000
|
trusted library allocation
|
page read and write
|
||
181048F9000
|
heap
|
page read and write
|
||
59D0000
|
heap
|
page read and write
|
||
265FA5C9000
|
heap
|
page read and write
|
||
5B1000
|
heap
|
page read and write
|
||
1FD02573000
|
heap
|
page read and write
|
||
222D139E000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1FAD3ACA000
|
heap
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
40BC7E000
|
stack
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
222D13D8000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
1A74EE59000
|
heap
|
page read and write
|
||
12C8E213000
|
heap
|
page read and write
|
||
14387A43000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
21CB000
|
stack
|
page read and write
|
||
1A74EE78000
|
heap
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
14388400000
|
heap
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
539000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
31D80FE000
|
stack
|
page read and write
|
||
1FAD4339000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
1A74EE76000
|
heap
|
page read and write
|
||
1FD04065000
|
heap
|
page read and write
|
||
1FAD3A3E000
|
heap
|
page read and write
|
||
1810494C000
|
heap
|
page read and write
|
||
14387A78000
|
heap
|
page read and write
|
||
E47027C000
|
stack
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
189DE613000
|
heap
|
page read and write
|
||
1FAD3B02000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2810000
|
heap
|
page read and write
|
||
610BB7C000
|
stack
|
page read and write
|
||
189DE470000
|
heap
|
page read and write
|
||
14388430000
|
heap
|
page read and write
|
||
1A2C6DA0000
|
trusted library allocation
|
page read and write
|
||
222D2F90000
|
trusted library allocation
|
page read and write
|
||
1FD03F70000
|
trusted library allocation
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
1A2C5447000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
610BE7F000
|
stack
|
page read and write
|
||
1FD02578000
|
heap
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1A74ED10000
|
heap
|
page read and write
|
||
1A0932C0000
|
heap
|
page read and write
|
||
1FD04060000
|
heap
|
page read and write
|
||
222D13AC000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
222D1360000
|
heap
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1FD03F50000
|
heap
|
page read and write
|
||
1A2C53C0000
|
trusted library allocation
|
page read and write
|
||
143883BC000
|
heap
|
page read and write
|
||
1F89000
|
heap
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
14387A54000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
2F5B000
|
stack
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
1FB7E702000
|
heap
|
page read and write
|
||
1FAD3980000
|
heap
|
page read and write
|
||
1A74EE27000
|
heap
|
page read and write
|
||
1A093320000
|
heap
|
page read and write
|
||
513000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
1A74EE61000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
222D1409000
|
heap
|
page read and write
|
||
14388402000
|
heap
|
page read and write
|
||
15E08FA000
|
stack
|
page read and write
|
||
1A74EE2A000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
610C27E000
|
stack
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
FDD000
|
heap
|
page read and write
|
||
E470379000
|
stack
|
page read and write
|
||
40D54FF000
|
stack
|
page read and write
|
||
7FFC28985000
|
unkown
|
page readonly
|
||
9BA77FE000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
222D13D8000
|
heap
|
page read and write
|
||
222D13F7000
|
heap
|
page read and write
|
||
1FB7E420000
|
heap
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page readonly
|
||
1A74EE45000
|
heap
|
page read and write
|
||
40E5BF7000
|
stack
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
790000
|
direct allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
CBB000
|
stack
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
180000
|
remote allocation
|
page read and write
|
||
143879A0000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
240F000
|
stack
|
page read and write
|
||
14388427000
|
heap
|
page read and write
|
||
14387820000
|
heap
|
page read and write
|
||
1A093C02000
|
trusted library allocation
|
page read and write
|
||
610C17E000
|
stack
|
page read and write
|
||
5760000
|
heap
|
page read and write
|
||
2001000
|
heap
|
page read and write
|
||
222D1388000
|
heap
|
page read and write
|
||
1A2C6DE0000
|
remote allocation
|
page read and write
|
||
1FAD4300000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
18104920000
|
heap
|
page read and write
|
||
265FA5DA000
|
heap
|
page read and write
|
||
265FA5F3000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
2050000
|
heap
|
page readonly
|
||
8A5000
|
heap
|
page read and write
|
||
542000
|
heap
|
page read and write
|
||
40D4FFF000
|
stack
|
page read and write
|
||
1FAD3A88000
|
heap
|
page read and write
|
||
1FD1000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
1FB7E63E000
|
heap
|
page read and write
|
||
2001000
|
heap
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
12C8E170000
|
heap
|
page read and write
|
||
34D4EFE000
|
stack
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
1FD02587000
|
heap
|
page read and write
|
||
40E5A7E000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
1810490F000
|
heap
|
page read and write
|
||
31D7DEF000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1A74EE00000
|
heap
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
1A0932B0000
|
heap
|
page read and write
|
||
1810490F000
|
heap
|
page read and write
|
||
222D13A5000
|
heap
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
14387B8E000
|
heap
|
page read and write
|
||
9BA78F9000
|
stack
|
page read and write
|
||
265FA8F5000
|
heap
|
page read and write
|
||
1A74EE7B000
|
heap
|
page read and write
|
||
40D537E000
|
stack
|
page read and write
|
||
14387A70000
|
heap
|
page read and write
|
||
1A74EE2E000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
14387A92000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page execute and read and write
|
||
A97000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
6EB000
|
stack
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1A093440000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
9BA75FE000
|
stack
|
page read and write
|
||
610C47E000
|
stack
|
page read and write
|
||
83A027D000
|
stack
|
page read and write
|
||
31D81FE000
|
stack
|
page read and write
|
||
1A74EE3C000
|
heap
|
page read and write
|
||
40D5179000
|
stack
|
page read and write
|
||
265FB410000
|
trusted library allocation
|
page read and write
|
||
18104BA0000
|
trusted library allocation
|
page read and write
|
||
40D527A000
|
stack
|
page read and write
|
||
1A2C5457000
|
heap
|
page read and write
|
||
15E09FC000
|
stack
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
555000
|
heap
|
page read and write
|
||
14387BB9000
|
heap
|
page read and write
|
||
14388322000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
14387980000
|
trusted library allocation
|
page read and write
|
||
410000
|
remote allocation
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
7FFC28900000
|
unkown
|
page readonly
|
||
189DE675000
|
heap
|
page read and write
|
||
265FB1C0000
|
trusted library allocation
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
D7C000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
1A09345E000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
1A74EE49000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
1FAD3A13000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
265FA530000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
14387A75000
|
heap
|
page read and write
|
||
1A2C6DE0000
|
remote allocation
|
page read and write
|
||
14388354000
|
heap
|
page read and write
|
||
265FB490000
|
trusted library allocation
|
page read and write
|
||
1FD02640000
|
heap
|
page read and write
|
||
A1E907E000
|
stack
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
1A74EE7F000
|
heap
|
page read and write
|
||
1810620C000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
181063D0000
|
trusted library allocation
|
page read and write
|
||
1FD03E3C000
|
heap
|
page read and write
|
||
1A2C5390000
|
trusted library allocation
|
page read and write
|
||
839FFFB000
|
stack
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
7FFC2897E000
|
unkown
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
1FB7E63C000
|
heap
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
7FFC28901000
|
unkown
|
page execute read
|
||
9BA76FF000
|
stack
|
page read and write
|
||
1FAD3910000
|
heap
|
page read and write
|
||
12C8E300000
|
heap
|
page read and write
|
||
83A067E000
|
stack
|
page read and write
|
||
1FAD3A00000
|
heap
|
page read and write
|
||
7FFC28987000
|
unkown
|
page readonly
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
1FAD3AC7000
|
heap
|
page read and write
|
||
181048C0000
|
direct allocation
|
page execute and read and write
|
||
1A2C5455000
|
heap
|
page read and write
|
||
12C8E202000
|
heap
|
page read and write
|
||
200F000
|
heap
|
page read and write
|
||
7FFC28938000
|
unkown
|
page readonly
|
||
FE5000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
12C8E302000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
610B70C000
|
stack
|
page read and write
|
||
83A087F000
|
stack
|
page read and write
|
||
265FA8F0000
|
heap
|
page read and write
|
||
2193000
|
heap
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
189DE677000
|
heap
|
page read and write
|
||
A1E8E7F000
|
stack
|
page read and write
|
||
1A74EE65000
|
heap
|
page read and write
|
||
265FA8F9000
|
heap
|
page read and write
|
||
1FD025A1000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1FD02567000
|
heap
|
page read and write
|
||
20E0000
|
trusted library allocation
|
page read and write
|
||
40E5D7B000
|
stack
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
12C8EA02000
|
trusted library allocation
|
page read and write
|
||
222D1565000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
222D13B6000
|
heap
|
page read and write
|
||
7FFC28982000
|
unkown
|
page readonly
|
||
D70000
|
heap
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
265FB440000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
1A093A80000
|
trusted library allocation
|
page read and write
|
||
52D000
|
heap
|
page read and write
|
||
189DE600000
|
heap
|
page read and write
|
||
222D13D8000
|
heap
|
page read and write
|
||
265FB150000
|
trusted library allocation
|
page read and write
|
||
1A2C542A000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
1A74ED80000
|
heap
|
page read and write
|
||
E4702FE000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
265FB420000
|
heap
|
page readonly
|
||
800000
|
heap
|
page read and write
|
||
1A2C5270000
|
heap
|
page read and write
|
||
1A74F602000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
222D13E8000
|
heap
|
page read and write
|
||
18104840000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
222D2FC0000
|
heap
|
page read and write
|
||
18104BC0000
|
heap
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
18104BC5000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
There are 836 hidden memdumps, click here to show them.