Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
gdazhx1EIP.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\gdazhx1EIP.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\gdazhx1EIP.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\gdazhx1EIP.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AEDSEwQF\PBid.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SwzTtIAmqdPBna\Ntrjg.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GQmyGle\ScmiHVadtyVtThN.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NTIufvJuRVPL\QYaWGzhqdb.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AEDSEwQF\PBid.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\Zyymwn\eKUKMW.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VGdnyYmEzk\YPrp.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XeFlcoVt\wPzeOKW.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MtAvdtxCDyblyei\mPrhkfVupthqSBxp.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\EHrtIMNuOOnxGF\cDTWQXzuCIj.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/mcxnkbajti/
|
unknown
|
||
https://172.105.115.71:8080/s.dll
|
unknown
|
||
https://172.105.115.71:8080/
|
unknown
|
||
https://112.105.115.71:8080/
|
unknown
|
||
https://172.105.115.71:8080/lsug/nhhwenwy/qahixm/
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
PBid.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
IhDzTlHldHNg.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E1DA4C0000
|
direct allocation
|
page execute and read and write
|
||
EF0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
1B000100000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
AD0000
|
direct allocation
|
page execute and read and write
|
||
9C0000
|
direct allocation
|
page execute and read and write
|
||
25817DF0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
B5A000
|
heap
|
page read and write
|
||
140B1867000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
140B184A000
|
heap
|
page read and write
|
||
97B6F9B000
|
stack
|
page read and write
|
||
5E2237F000
|
stack
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
B93000
|
heap
|
page read and write
|
||
1FC4F846000
|
heap
|
page read and write
|
||
23888620000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
5E221FF000
|
stack
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
25817C60000
|
heap
|
page read and write
|
||
2A4DC252000
|
heap
|
page read and write
|
||
1B07DC4E000
|
heap
|
page read and write
|
||
1B07DC83000
|
heap
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
2292C853000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
770000
|
remote allocation
|
page read and write
|
||
CBF000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
B5129FC000
|
stack
|
page read and write
|
||
23888960000
|
trusted library allocation
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
97B74F9000
|
stack
|
page read and write
|
||
2292C7A0000
|
trusted library allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
1FC4F877000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
1EE48500000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
5E21BFB000
|
stack
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
2B09AF32000
|
heap
|
page read and write
|
||
123D07C000
|
stack
|
page read and write
|
||
1E1DA2DF000
|
heap
|
page read and write
|
||
1B000160000
|
trusted library allocation
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
2B09A687000
|
heap
|
page read and write
|
||
2A4DC23C000
|
heap
|
page read and write
|
||
23888700000
|
heap
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
1B6EEE02000
|
trusted library allocation
|
page read and write
|
||
5E220FF000
|
stack
|
page read and write
|
||
899FCFE000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page readonly
|
||
1EE4847F000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
1FC4F851000
|
heap
|
page read and write
|
||
B93000
|
heap
|
page read and write
|
||
8BCE2FE000
|
stack
|
page read and write
|
||
25817C68000
|
heap
|
page read and write
|
||
1E1DA2F5000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2A4DC213000
|
heap
|
page read and write
|
||
1FC4F840000
|
heap
|
page read and write
|
||
20749522000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
2292C630000
|
heap
|
page read and write
|
||
1B000140000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
238889E0000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
140B17F0000
|
trusted library allocation
|
page read and write
|
||
2D88000
|
heap
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
1B6EE65A000
|
heap
|
page read and write
|
||
AEC667B000
|
stack
|
page read and write
|
||
238889F0000
|
trusted library allocation
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
25817C5A000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
1B00002C000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
238889C0000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
1FC4F863000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
1B6EE613000
|
heap
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
1EE48440000
|
heap
|
page read and write
|
||
1FC4F865000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
C90000
|
remote allocation
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
207489E0000
|
heap
|
page read and write
|
||
140B1800000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
B512AFE000
|
stack
|
page read and write
|
||
B51307F000
|
stack
|
page read and write
|
||
238886E8000
|
heap
|
page read and write
|
||
25817C71000
|
heap
|
page read and write
|
||
1FC4F770000
|
trusted library allocation
|
page read and write
|
||
20748C6E000
|
heap
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
140B1859000
|
heap
|
page read and write
|
||
140B1750000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
25817C68000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
8BCE1FF000
|
stack
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
10B0000
|
heap
|
page read and write
|
||
25817C0F000
|
heap
|
page read and write
|
||
2B09AF00000
|
heap
|
page read and write
|
||
7623D7C000
|
stack
|
page read and write
|
||
2BCC000
|
stack
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
1EE48402000
|
heap
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
2A4DC24B000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
5E2207E000
|
stack
|
page read and write
|
||
5E5E000
|
stack
|
page read and write
|
||
B512BFE000
|
stack
|
page read and write
|
||
1299000
|
stack
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
2292C813000
|
heap
|
page read and write
|
||
1B07DC1D000
|
heap
|
page read and write
|
||
25817BA0000
|
heap
|
page read and write
|
||
1423000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
1FC4F802000
|
heap
|
page read and write
|
||
25817E40000
|
heap
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
899F77B000
|
stack
|
page read and write
|
||
762395C000
|
stack
|
page read and write
|
||
2B09A410000
|
heap
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
2292C7D0000
|
remote allocation
|
page read and write
|
||
1E1DBD10000
|
heap
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
1E1DA32B000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
12C0000
|
remote allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
1FC4F84B000
|
heap
|
page read and write
|
||
1FC4F845000
|
heap
|
page read and write
|
||
20748C64000
|
heap
|
page read and write
|
||
1E1DA560000
|
heap
|
page read and write
|
||
1E1DA500000
|
heap
|
page readonly
|
||
E8F000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
1B6EE5E0000
|
trusted library allocation
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
1E1DA540000
|
trusted library allocation
|
page read and write
|
||
1FC4F839000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
1E1DA210000
|
heap
|
page read and write
|
||
25817C49000
|
heap
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1B07DC23000
|
heap
|
page read and write
|
||
20748D13000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2636000
|
heap
|
page read and write
|
||
1B6EE713000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
2DD0000
|
heap
|
page read and write
|
||
25817C49000
|
heap
|
page read and write
|
||
2292C829000
|
heap
|
page read and write
|
||
1EE48C02000
|
trusted library allocation
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
1B00002C000
|
heap
|
page read and write
|
||
140B184B000
|
heap
|
page read and write
|
||
258196F0000
|
trusted library allocation
|
page read and write
|
||
1FC4F842000
|
heap
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
8BCD6FB000
|
stack
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
2FE9FF9000
|
stack
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
1FC4F875000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
141E000
|
heap
|
page read and write
|
||
1FC4F86F000
|
heap
|
page read and write
|
||
FD3AA79000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
BA3000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
2A4DCA02000
|
trusted library allocation
|
page read and write
|
||
1FC4F87E000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
8A4D67F000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
2D61000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
80000
|
heap
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
20748C43000
|
heap
|
page read and write
|
||
298C000
|
heap
|
page read and write
|
||
140B1918000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
C4B000
|
heap
|
page read and write
|
||
20748C2A000
|
heap
|
page read and write
|
||
1B000300000
|
heap
|
page read and write
|
||
69D000
|
stack
|
page read and write
|
||
7623DFE000
|
stack
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
140B185B000
|
heap
|
page read and write
|
||
5E225FD000
|
stack
|
page read and write
|
||
2B40000
|
remote allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1FC4F868000
|
heap
|
page read and write
|
||
140F000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2A4DC202000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page readonly
|
||
238885C0000
|
trusted library allocation
|
page read and write
|
||
1B07DAB0000
|
heap
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
20748C6B000
|
heap
|
page read and write
|
||
899FF7E000
|
stack
|
page read and write
|
||
20748DE5000
|
heap
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
BA3000
|
heap
|
page read and write
|
||
986ECFB000
|
stack
|
page read and write
|
||
1B6EE600000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
8BCDAFB000
|
stack
|
page read and write
|
||
CC7000
|
heap
|
page read and write
|
||
207495BD000
|
heap
|
page read and write
|
||
2636000
|
heap
|
page read and write
|
||
238885B0000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
140B1913000
|
heap
|
page read and write
|
||
25817E20000
|
direct allocation
|
page execute and read and write
|
||
B75000
|
heap
|
page read and write
|
||
2A4DC200000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
238889E5000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
238886A8000
|
heap
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
1B07DC44000
|
heap
|
page read and write
|
||
8BCDFFF000
|
stack
|
page read and write
|
||
1B07DC37000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
EA6000
|
heap
|
page read and write
|
||
B512D7D000
|
stack
|
page read and write
|
||
100C000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
B5F000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
140B3370000
|
remote allocation
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
1E1DA2A0000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
1B6EE602000
|
heap
|
page read and write
|
||
2F69000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
2B3B000
|
stack
|
page read and write
|
||
25817C1D000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
1B07DC71000
|
heap
|
page read and write
|
||
23888640000
|
heap
|
page read and write
|
||
25817C49000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
2B09A629000
|
heap
|
page read and write
|
||
23889500000
|
trusted library allocation
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
8A4D77E000
|
stack
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
BA3000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
899FBFA000
|
stack
|
page read and write
|
||
25817CF0000
|
heap
|
page read and write
|
||
1B6EE629000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
25817A40000
|
heap
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
25817C7A000
|
heap
|
page read and write
|
||
20748B70000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
899F97C000
|
stack
|
page read and write
|
||
1E1DA565000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
140B1841000
|
heap
|
page read and write
|
||
C07000
|
heap
|
page read and write
|
||
1B6EE673000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
B512E7E000
|
stack
|
page read and write
|
||
140B3370000
|
remote allocation
|
page read and write
|
||
20749591000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
EFA000
|
stack
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
AEC6C7E000
|
stack
|
page read and write
|
||
140B1849000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
20749613000
|
heap
|
page read and write
|
||
1E1DA2CE000
|
heap
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
2FE9DFE000
|
stack
|
page read and write
|
||
97B737F000
|
stack
|
page read and write
|
||
1B6EE676000
|
heap
|
page read and write
|
||
5E2247D000
|
stack
|
page read and write
|
||
2292C7D0000
|
remote allocation
|
page read and write
|
||
207495C5000
|
heap
|
page read and write
|
||
1EE48468000
|
heap
|
page read and write
|
||
1E1DA280000
|
heap
|
page read and write
|
||
1E1DBE10000
|
trusted library allocation
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
238886FE000
|
heap
|
page read and write
|
||
1B07DC10000
|
heap
|
page read and write
|
||
2292D002000
|
trusted library allocation
|
page read and write
|
||
FD3A87F000
|
stack
|
page read and write
|
||
264F000
|
heap
|
page read and write
|
||
AEC6A7C000
|
stack
|
page read and write
|
||
1B07DC3C000
|
heap
|
page read and write
|
||
1B6EE66C000
|
heap
|
page read and write
|
||
140B185A000
|
heap
|
page read and write
|
||
7623CF6000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
140B1874000
|
heap
|
page read and write
|
||
1E1DA4F0000
|
direct allocation
|
page execute and read and write
|
||
B75000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
97B73F9000
|
stack
|
page read and write
|
||
2B57000
|
stack
|
page read and write
|
||
2DA9000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
2B09A420000
|
heap
|
page read and write
|
||
2292C6A0000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2B09A6CD000
|
heap
|
page read and write
|
||
298D000
|
stack
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
25817C57000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
20749623000
|
heap
|
page read and write
|
||
899FDFF000
|
stack
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
5FB0000
|
heap
|
page read and write
|
||
1B6EE665000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
FD3A97E000
|
stack
|
page read and write
|
||
23889520000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
20748C00000
|
heap
|
page read and write
|
||
2292C902000
|
heap
|
page read and write
|
||
23888708000
|
heap
|
page read and write
|
||
238886A0000
|
heap
|
page read and write
|
||
20749602000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
1FC4F849000
|
heap
|
page read and write
|
||
264D000
|
heap
|
page read and write
|
||
AEC6979000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
160000
|
remote allocation
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
860000
|
heap
|
page read and write
|
||
8BCDBFD000
|
stack
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
1EE48300000
|
heap
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
B93000
|
heap
|
page read and write
|
||
2B09A600000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
2628000
|
heap
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
142C000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
1B000000000
|
heap
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
2A4DC160000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
25B9000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
B75000
|
heap
|
page read and write
|
||
256D000
|
stack
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
B5127FC000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
2A4DC245000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
1E1DA2DF000
|
heap
|
page read and write
|
||
B5E000
|
heap
|
page read and write
|
||
20749522000
|
heap
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
2A4DC230000
|
heap
|
page read and write
|
||
8BCE0FF000
|
stack
|
page read and write
|
||
2ABC000
|
stack
|
page read and write
|
||
20748B50000
|
trusted library allocation
|
page read and write
|
||
CC7000
|
heap
|
page read and write
|
||
140B3402000
|
trusted library allocation
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
B512C7B000
|
stack
|
page read and write
|
||
20748A50000
|
heap
|
page read and write
|
||
20749600000
|
heap
|
page read and write
|
||
25817C67000
|
heap
|
page read and write
|
||
B51239B000
|
stack
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
238889E9000
|
heap
|
page read and write
|
||
207489F0000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
B53000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
1FC4F860000
|
heap
|
page read and write
|
||
25817E45000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
2B40000
|
remote allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
FD3AAFC000
|
stack
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
2B40000
|
remote allocation
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
2A4DC268000
|
heap
|
page read and write
|
||
2B09A6C5000
|
heap
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
25817BF8000
|
heap
|
page read and write
|
||
25817C49000
|
heap
|
page read and write
|
||
20749502000
|
heap
|
page read and write
|
||
2074956F000
|
heap
|
page read and write
|
||
238886FE000
|
heap
|
page read and write
|
||
1B6EE63D000
|
heap
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
66E0000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
258196F0000
|
trusted library allocation
|
page read and write
|
||
FD3A5FC000
|
stack
|
page read and write
|
||
23888704000
|
heap
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
123D17E000
|
stack
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2A4DC110000
|
heap
|
page read and write
|
||
2292C800000
|
heap
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
1FC4F83D000
|
heap
|
page read and write
|
||
1FC4F883000
|
heap
|
page read and write
|
||
1FC4F832000
|
heap
|
page read and write
|
||
1B000130000
|
direct allocation
|
page execute and read and write
|
||
1E1DA2C0000
|
heap
|
page read and write
|
||
FD3A9FF000
|
stack
|
page read and write
|
||
20749402000
|
heap
|
page read and write
|
||
2B09A6E1000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
97B727E000
|
stack
|
page read and write
|
||
20749554000
|
heap
|
page read and write
|
||
AEC6B7E000
|
stack
|
page read and write
|
||
140B3280000
|
trusted library allocation
|
page read and write
|
||
23889580000
|
trusted library allocation
|
page read and write
|
||
2B09A613000
|
heap
|
page read and write
|
||
1EE48400000
|
heap
|
page read and write
|
||
899FE7F000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
1E1DA2F0000
|
heap
|
page read and write
|
||
8A4D0EB000
|
stack
|
page read and write
|
||
1B000190000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
12C0000
|
remote allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
123D27C000
|
stack
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
1B000160000
|
trusted library allocation
|
page read and write
|
||
25817C17000
|
heap
|
page read and write
|
||
2A4DC243000
|
heap
|
page read and write
|
||
20749627000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
2A4DC100000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
2601000
|
heap
|
page read and write
|
||
123CE7F000
|
stack
|
page read and write
|
||
123CD7F000
|
stack
|
page read and write
|
||
9F0000
|
direct allocation
|
page execute and read and write
|
||
140B1760000
|
heap
|
page read and write
|
||
123CF7E000
|
stack
|
page read and write
|
||
1FC4F902000
|
heap
|
page read and write
|
||
1FC4F813000
|
heap
|
page read and write
|
||
1EE48457000
|
heap
|
page read and write
|
||
141E000
|
heap
|
page read and write
|
||
20748DB9000
|
heap
|
page read and write
|
||
2B09A670000
|
heap
|
page read and write
|
||
8BCDCFE000
|
stack
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
20749543000
|
heap
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
10BC000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
91B000
|
stack
|
page read and write
|
||
1EE482F0000
|
heap
|
page read and write
|
||
2292C83E000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
1FC4F610000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
5E222FD000
|
stack
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
986E6FB000
|
stack
|
page read and write
|
||
238886B0000
|
heap
|
page read and write
|
||
899F87F000
|
stack
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
1EE48428000
|
heap
|
page read and write
|
||
1B07DC56000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
2636000
|
heap
|
page read and write
|
||
986EBFB000
|
stack
|
page read and write
|
||
8A4D87F000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1FC4F86C000
|
heap
|
page read and write
|
||
FD3AB7E000
|
stack
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
1FC4F847000
|
heap
|
page read and write
|
||
5EE0000
|
trusted library allocation
|
page read and write
|
||
2B09A702000
|
heap
|
page read and write
|
||
20748C8B000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
AEC687F000
|
stack
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
238892D0000
|
trusted library allocation
|
page read and write
|
||
25817C49000
|
heap
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
1EE48513000
|
heap
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
76239DF000
|
stack
|
page read and write
|
||
20748C59000
|
heap
|
page read and write
|
||
140B32B0000
|
trusted library allocation
|
page read and write
|
||
8A4D1EE000
|
stack
|
page read and write
|
||
1B07DBF0000
|
heap
|
page read and write
|
||
2E19000
|
heap
|
page read and write
|
||
1FC4F830000
|
heap
|
page read and write
|
||
1B6EE540000
|
heap
|
page read and write
|
||
13A000
|
stack
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
140B1900000
|
heap
|
page read and write
|
||
238886FE000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
25817E30000
|
heap
|
page readonly
|
||
1E1DA315000
|
heap
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
2A09000
|
stack
|
page read and write
|
||
1E1DBE90000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
2292C7D0000
|
remote allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
20748C13000
|
heap
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
97B747F000
|
stack
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
5EDF000
|
stack
|
page read and write
|
||
1B000305000
|
heap
|
page read and write
|
||
2292C802000
|
heap
|
page read and write
|
||
B51277F000
|
stack
|
page read and write
|
||
B512F7D000
|
stack
|
page read and write
|
||
301B000
|
stack
|
page read and write
|
||
B5E000
|
heap
|
page read and write
|
||
7FFC123D0000
|
unkown
|
page readonly
|
||
8A4D57E000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
25817C8C000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
7FFC12452000
|
unkown
|
page readonly
|
||
1B6EE550000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
986EDFF000
|
stack
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
2B09A6BC000
|
heap
|
page read and write
|
||
8BCDEFD000
|
stack
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
20748C54000
|
heap
|
page read and write
|
||
1E1DA2DF000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
8BCE3FE000
|
stack
|
page read and write
|
||
2B09A6E7000
|
heap
|
page read and write
|
||
1FC4F670000
|
heap
|
page read and write
|
||
2FE9EFE000
|
stack
|
page read and write
|
||
140B1813000
|
heap
|
page read and write
|
||
263E000
|
heap
|
page read and write
|
||
2A4DC302000
|
heap
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1B07DC71000
|
heap
|
page read and write
|
||
20748C62000
|
heap
|
page read and write
|
||
899F9F9000
|
stack
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
1FC4F87B000
|
heap
|
page read and write
|
||
123C6DC000
|
stack
|
page read and write
|
||
20748C89000
|
heap
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1E1DA319000
|
heap
|
page read and write
|
||
7FFC12457000
|
unkown
|
page readonly
|
||
1E1DA2C9000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
140B1902000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
2FE991C000
|
stack
|
page read and write
|
||
25817C28000
|
heap
|
page read and write
|
||
7FFC123D1000
|
unkown
|
page execute read
|
||
1EE48422000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1EE48413000
|
heap
|
page read and write
|
||
1EE48463000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
14CC000
|
heap
|
page read and write
|
||
770000
|
remote allocation
|
page read and write
|
||
2B09A642000
|
heap
|
page read and write
|
||
753000
|
heap
|
page read and write
|
||
97B72FE000
|
stack
|
page read and write
|
||
26FB000
|
stack
|
page read and write
|
||
23889530000
|
trusted library allocation
|
page read and write
|
||
20749630000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
1B07DC45000
|
heap
|
page read and write
|
||
1EE48502000
|
heap
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
7FFC1244E000
|
unkown
|
page read and write
|
||
20748D8C000
|
heap
|
page read and write
|
||
23889510000
|
heap
|
page readonly
|
||
2B09A713000
|
heap
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
1FC4F855000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
C7A000
|
stack
|
page read and write
|
||
1B07DC37000
|
heap
|
page read and write
|
||
7623C7F000
|
stack
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
20748C43000
|
heap
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
1B6EE702000
|
heap
|
page read and write
|
||
FD3A8FE000
|
stack
|
page read and write
|
||
207495AF000
|
heap
|
page read and write
|
||
1B07DC3F000
|
heap
|
page read and write
|
||
1E1DBD3C000
|
heap
|
page read and write
|
||
986EEFE000
|
stack
|
page read and write
|
||
140B1802000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page readonly
|
||
970000
|
heap
|
page read and write
|
||
123CC7F000
|
stack
|
page read and write
|
||
7623E7E000
|
stack
|
page read and write
|
||
2B09A480000
|
heap
|
page read and write
|
||
2DD1000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
140B3370000
|
remote allocation
|
page read and write
|
||
1B07DC37000
|
heap
|
page read and write
|
||
7F0000
|
direct allocation
|
page execute and read and write
|
||
25E1000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
2FE9CFF000
|
stack
|
page read and write
|
||
140B17C0000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
C90000
|
remote allocation
|
page read and write
|
||
2B09A580000
|
trusted library allocation
|
page read and write
|
||
1FC4F861000
|
heap
|
page read and write
|
||
2A4DC190000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
2628000
|
heap
|
page read and write
|
||
2636000
|
heap
|
page read and write
|
||
25817BF0000
|
heap
|
page read and write
|
||
25817B80000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2A4DC229000
|
heap
|
page read and write
|
||
1FC4F844000
|
heap
|
page read and write
|
||
160000
|
remote allocation
|
page read and write
|
||
B73000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
238886F9000
|
heap
|
page read and write
|
||
F20000
|
direct allocation
|
page execute and read and write
|
||
20749500000
|
heap
|
page read and write
|
||
25817D1C000
|
heap
|
page read and write
|
||
1FC50002000
|
trusted library allocation
|
page read and write
|
||
1EE48390000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
20748C3C000
|
heap
|
page read and write
|
||
2B09AE02000
|
heap
|
page read and write
|
||
1FC4F86D000
|
heap
|
page read and write
|
||
1FC4F600000
|
heap
|
page read and write
|
||
140B182A000
|
heap
|
page read and write
|
||
25817C16000
|
heap
|
page read and write
|
||
140B32F0000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1FC4F800000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
74B000
|
stack
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
7623EFB000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
123CAFE000
|
stack
|
page read and write
|
||
899FAFE000
|
stack
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
20748C8F000
|
heap
|
page read and write
|
||
20748C93000
|
heap
|
page read and write
|
||
2292C640000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
1B6EE5B0000
|
heap
|
page read and write
|
||
1EE48360000
|
heap
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
1B6EE68A000
|
heap
|
page read and write
|
||
23888950000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
7FFC12455000
|
unkown
|
page readonly
|
||
141E000
|
heap
|
page read and write
|
||
141E000
|
heap
|
page read and write
|
||
1E1DA319000
|
heap
|
page read and write
|
||
8A4D16E000
|
stack
|
page read and write
|
||
25AC000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1FC4F829000
|
heap
|
page read and write
|
||
899F35B000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
2FEA0FE000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
B28000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
7FFC12408000
|
unkown
|
page readonly
|
||
1EE48479000
|
heap
|
page read and write
|
||
25819610000
|
heap
|
page read and write
|
There are 818 hidden memdumps, click here to show them.