Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
pzG0rkIchr.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_5df03237c245e7792ae728ba7af47d1bed8c47f7_4f0e5919_16399239\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_f6b0ff3966a3d6c74191edf638977ebb42334d7_4f0e5919_156d919c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8047.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:45 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80D3.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:46 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER848E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8588.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8589.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8683.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\pzG0rkIchr.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://gigimas.xyz
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://gigimas.xyz/index.html)I6
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://gigimas.xyz/92
|
unknown
|
||
https://gigimas.xyz/index.htmlr
|
unknown
|
||
https://gigimas.xyz/ic
|
unknown
|
||
https://gigimas.xyz/index.htmluH
|
unknown
|
||
https://http://Mozilla/5.0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
https://gigimas.xyz/index.html
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
|
unknown
|
||
https://gigimas.xyzhttps://reaso.xyz
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
https://gigimas.xyz/index.htmll
|
unknown
|
||
https://gigimas.xyz/
|
unknown
|
||
https://reaso.xyz
|
unknown
|
||
https://gigimas.xyz:443/index.html
|
unknown
|
There are 11 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
gigimas.xyz
|
185.250.148.35
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.250.148.35
|
gigimas.xyz
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
There are 15 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21DD9228000
|
heap
|
page read and write
|
||
1DFB52C6000
|
heap
|
page read and write
|
||
21DDADA1000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
22FFDB60000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
1716B9EC000
|
heap
|
page read and write
|
||
19E3D420000
|
heap
|
page read and write
|
||
21DD9244000
|
heap
|
page read and write
|
||
620BFB000
|
stack
|
page read and write
|
||
1DFB5358000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1DFB37DE000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
274B6413000
|
unkown
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
1716D884000
|
heap
|
page read and write
|
||
274B6462000
|
heap
|
page read and write
|
||
1716E2C1000
|
heap
|
page read and write
|
||
1DFB349F000
|
heap
|
page read and write
|
||
21DD92C0000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
27ED3783000
|
heap
|
page read and write
|
||
1716D918000
|
heap
|
page read and write
|
||
1716BAB7000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
21DD9228000
|
heap
|
page read and write
|
||
342D4FE000
|
stack
|
page read and write
|
||
1DFB5D60000
|
remote allocation
|
page read and write
|
||
25B02710000
|
trusted library allocation
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1DFB5324000
|
heap
|
page read and write
|
||
27ED3940000
|
heap
|
page read and write
|
||
1DFB34BA000
|
heap
|
page read and write
|
||
1716D8B1000
|
heap
|
page read and write
|
||
1DFB34AC000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
27ED37A7000
|
heap
|
page read and write
|
||
21DD91FE000
|
heap
|
page read and write
|
||
21DD91ED000
|
heap
|
page read and write
|
||
1716BA96000
|
heap
|
page read and write
|
||
1716BA9B000
|
heap
|
page read and write
|
||
1716BA98000
|
heap
|
page read and write
|
||
740C1FC000
|
stack
|
page read and write
|
||
1716D892000
|
heap
|
page read and write
|
||
1DFB5500000
|
heap
|
page read and write
|
||
1716D89F000
|
heap
|
page read and write
|
||
7C1657F000
|
stack
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
21DD926B000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
21DD9228000
|
heap
|
page read and write
|
||
25B02751000
|
heap
|
page read and write
|
||
3D0000
|
direct allocation
|
page execute and read and write
|
||
1DFB37D0000
|
heap
|
page read and write
|
||
25B028C0000
|
trusted library allocation
|
page read and write
|
||
1716D886000
|
heap
|
page read and write
|
||
1DFB531E000
|
heap
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
6CF000
|
heap
|
page read and write
|
||
1716BA8A000
|
heap
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1716DC88000
|
heap
|
page read and write
|
||
21DD926B000
|
heap
|
page read and write
|
||
1F71CC80000
|
heap
|
page read and write
|
||
21DD921D000
|
heap
|
page read and write
|
||
1716D916000
|
heap
|
page read and write
|
||
21CD000
|
heap
|
page read and write
|
||
22FFC030000
|
heap
|
page read and write
|
||
1DFB52CA000
|
heap
|
page read and write
|
||
7C164FF000
|
stack
|
page read and write
|
||
1F71B193000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
1DFB5777000
|
heap
|
page read and write
|
||
1716BA8F000
|
heap
|
page read and write
|
||
1716DC87000
|
heap
|
page read and write
|
||
1716D89E000
|
heap
|
page read and write
|
||
1716D911000
|
heap
|
page read and write
|
||
342D104000
|
stack
|
page read and write
|
||
27ED371E000
|
direct allocation
|
page execute and read and write
|
||
1DFB5359000
|
heap
|
page read and write
|
||
1716D8B0000
|
heap
|
page read and write
|
||
1F71B0C0000
|
heap
|
page read and write
|
||
274B640D000
|
unkown
|
page read and write
|
||
22FFBFC0000
|
unkown
|
page read and write
|
||
1DFB52D3000
|
heap
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1716D8B0000
|
heap
|
page read and write
|
||
25B029A9000
|
heap
|
page read and write
|
||
1716D8D0000
|
heap
|
page read and write
|
||
1DFB5324000
|
heap
|
page read and write
|
||
1DFB52C4000
|
heap
|
page read and write
|
||
1DFB5354000
|
heap
|
page read and write
|
||
27ED3974000
|
heap
|
page read and write
|
||
1F71B168000
|
heap
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
1DFB56C8000
|
heap
|
page read and write
|
||
21DDAD90000
|
heap
|
page read and write
|
||
22FFDB60000
|
heap
|
page read and write
|
||
1DFB56C7000
|
heap
|
page read and write
|
||
1DFB52FE000
|
heap
|
page read and write
|
||
1716D8BD000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
1F71CC94000
|
heap
|
page read and write
|
||
22FFC030000
|
heap
|
page read and write
|
||
21DD9246000
|
heap
|
page read and write
|
||
274B6462000
|
heap
|
page read and write
|
||
1DFB5D23000
|
heap
|
page read and write
|
||
274B6515000
|
trusted library allocation
|
page read and write
|
||
21DD925E000
|
heap
|
page read and write
|
||
1716B9E7000
|
heap
|
page read and write
|
||
1DFB5E17000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
27ED36F0000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
21DD9248000
|
heap
|
page read and write
|
||
1716D8BD000
|
heap
|
page read and write
|
||
21DD9228000
|
heap
|
page read and write
|
||
4079CEC000
|
stack
|
page read and write
|
||
1DFB52D7000
|
heap
|
page read and write
|
||
25B027A1000
|
heap
|
page read and write
|
||
21DD9220000
|
heap
|
page read and write
|
||
1DFB5D23000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
19E3EE90000
|
heap
|
page read and write
|
||
21DD926B000
|
heap
|
page read and write
|
||
274B6700000
|
heap
|
page read and write
|
||
21DD9252000
|
heap
|
page read and write
|
||
1716BC0A000
|
heap
|
page read and write
|
||
BFC0AFF000
|
stack
|
page read and write
|
||
1716D900000
|
heap
|
page read and write
|
||
1716B9C8000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
62097E000
|
stack
|
page read and write
|
||
1F71B17E000
|
heap
|
page read and write
|
||
21DD91F4000
|
heap
|
page read and write
|
||
1716D8EB000
|
heap
|
page read and write
|
||
1DFB52DE000
|
heap
|
page read and write
|
||
1DFB52F1000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
2102000
|
heap
|
page read and write
|
||
1DFB34A3000
|
heap
|
page read and write
|
||
1DFB5324000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1716B9A0000
|
unkown
|
page read and write
|
||
1DFB566F000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
21DD9218000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
7FF88C0A9000
|
unkown
|
page write copy
|
||
1716D8CA000
|
heap
|
page read and write
|
||
1DFB5357000
|
heap
|
page read and write
|
||
21DD9248000
|
heap
|
page read and write
|
||
21DD9255000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page read and write
|
||
1716E477000
|
heap
|
page read and write
|
||
1716D896000
|
heap
|
page read and write
|
||
1716D880000
|
heap
|
page read and write
|
||
1716D886000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
21DD9227000
|
heap
|
page read and write
|
||
1716BA7D000
|
heap
|
page read and write
|
||
1716BAA4000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
1F71B1C0000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
1DFB34A3000
|
heap
|
page read and write
|
||
1DFB5304000
|
heap
|
page read and write
|
||
21DD9226000
|
heap
|
page read and write
|
||
1716D916000
|
heap
|
page read and write
|
||
1DFB3660000
|
heap
|
page read and write
|
||
1DFB5D60000
|
remote allocation
|
page read and write
|
||
1716D8DD000
|
heap
|
page read and write
|
||
1716D89E000
|
heap
|
page read and write
|
||
1716BABD000
|
heap
|
page read and write
|
||
21DD9365000
|
heap
|
page read and write
|
||
1DFB34A1000
|
heap
|
page read and write
|
||
1716D896000
|
heap
|
page read and write
|
||
22FFC305000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
1DFB5D60000
|
remote allocation
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
1716D897000
|
heap
|
page read and write
|
||
1716D88C000
|
heap
|
page read and write
|
||
1DFB37DB000
|
heap
|
page read and write
|
||
1DFB34AB000
|
heap
|
page read and write
|
||
21DD91C8000
|
heap
|
page read and write
|
||
1DFB530B000
|
heap
|
page read and write
|
||
25B034A0000
|
trusted library allocation
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
1DFB52E5000
|
heap
|
page read and write
|
||
C1308F9000
|
stack
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
1DFB52CC000
|
heap
|
page read and write
|
||
740C2FB000
|
stack
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1DFB56C7000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
274B6438000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
4079CEC000
|
stack
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
1716BB90000
|
heap
|
page read and write
|
||
1716D8EF000
|
heap
|
page read and write
|
||
1DFB349C000
|
heap
|
page read and write
|
||
21DD9220000
|
heap
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1DFB5351000
|
heap
|
page read and write
|
||
1F71B1F0000
|
heap
|
page read and write
|
||
21DDAB20000
|
remote allocation
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page write copy
|
||
1DFB535A000
|
heap
|
page read and write
|
||
1DFB52FE000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
21DD9360000
|
heap
|
page read and write
|
||
1716BA82000
|
heap
|
page read and write
|
||
1F71B510000
|
heap
|
page read and write
|
||
21C4000
|
heap
|
page read and write
|
||
1716B9EC000
|
heap
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
1716D890000
|
heap
|
page read and write
|
||
740C27C000
|
stack
|
page read and write
|
||
25B026A0000
|
heap
|
page read and write
|
||
1DFB5311000
|
heap
|
page read and write
|
||
1DFB52EB000
|
heap
|
page read and write
|
||
1716BBB0000
|
heap
|
page read and write
|
||
1DFB52E1000
|
heap
|
page read and write
|
||
22FFC305000
|
heap
|
page read and write
|
||
1716D8AA000
|
heap
|
page read and write
|
||
1DFB52E5000
|
heap
|
page read and write
|
||
1DFB34A7000
|
heap
|
page read and write
|
||
1DFB34A1000
|
heap
|
page read and write
|
||
1DFB5D00000
|
heap
|
page read and write
|
||
1716E380000
|
remote allocation
|
page read and write
|
||
21DD91EE000
|
heap
|
page read and write
|
||
1716DDC0000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
27ED37F9000
|
heap
|
page read and write
|
||
21DD9228000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1716BAB7000
|
heap
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
21DD9330000
|
direct allocation
|
page execute and read and write
|
||
25B029A0000
|
heap
|
page read and write
|
||
274B6240000
|
heap
|
page read and write
|
||
620AFF000
|
stack
|
page read and write
|
||
19E3D420000
|
heap
|
page read and write
|
||
19E3D488000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
209F000
|
stack
|
page read and write
|
||
25B028D0000
|
heap
|
page readonly
|
||
C1304CD000
|
stack
|
page read and write
|
||
19E3EE10000
|
remote allocation
|
page read and write
|
||
1716BAB7000
|
heap
|
page read and write
|
||
22FFC200000
|
heap
|
page read and write
|
||
620C7E000
|
stack
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
22FFC038000
|
heap
|
page read and write
|
||
1716DAC2000
|
heap
|
page read and write
|
||
1DFB3370000
|
unkown
|
page readonly
|
||
1DFB6100000
|
heap
|
page read and write
|
||
1716D8D0000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
BFC0AFF000
|
stack
|
page read and write
|
||
21DD9220000
|
heap
|
page read and write
|
||
22FFC200000
|
heap
|
page read and write
|
||
1716D8D0000
|
heap
|
page read and write
|
||
25B0278E000
|
heap
|
page read and write
|
||
1716BA82000
|
heap
|
page read and write
|
||
1716DBC0000
|
heap
|
page read and write
|
||
1DFB52F1000
|
heap
|
page read and write
|
||
21DD9252000
|
heap
|
page read and write
|
||
1DFB33E2000
|
heap
|
page read and write
|
||
1716B990000
|
unkown
|
page readonly
|
||
1716D8B7000
|
heap
|
page read and write
|
||
1716BA8E000
|
heap
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
21DD9248000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
21DD91A0000
|
heap
|
page read and write
|
||
19E3D430000
|
heap
|
page read and write
|
||
21DD9228000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1716D8D6000
|
heap
|
page read and write
|
||
1716BA98000
|
heap
|
page read and write
|
||
1DFB5358000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
21DDADAD000
|
heap
|
page read and write
|
||
274B6702000
|
heap
|
page read and write
|
||
27ED397D000
|
heap
|
page read and write
|
||
25B02730000
|
trusted library allocation
|
page read and write
|
||
1716D8CA000
|
heap
|
page read and write
|
||
1DFB34C7000
|
heap
|
page read and write
|
||
25B029A5000
|
heap
|
page read and write
|
||
27ED3942000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
21DD921D000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page read and write
|
||
21DD9246000
|
heap
|
page read and write
|
||
21DD9200000
|
heap
|
page read and write
|
||
1716BC00000
|
heap
|
page read and write
|
||
6209FE000
|
stack
|
page read and write
|
||
19E3D425000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
1DFB5305000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
BEFD97E000
|
stack
|
page read and write
|
||
C4B27FF000
|
stack
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
C4B26FE000
|
stack
|
page read and write
|
||
342D6FE000
|
stack
|
page read and write
|
||
1716B980000
|
unkown
|
page readonly
|
||
1716D8E3000
|
heap
|
page read and write
|
||
1F71B130000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
1DFB530B000
|
heap
|
page read and write
|
||
21DDAB40000
|
heap
|
page read and write
|
||
1DFB52D7000
|
heap
|
page read and write
|
||
1716DD8C000
|
heap
|
page read and write
|
||
1DFB3493000
|
heap
|
page read and write
|
||
1DFB5304000
|
heap
|
page read and write
|
||
1716D8B7000
|
heap
|
page read and write
|
||
1716B980000
|
unkown
|
page readonly
|
||
21DD9250000
|
heap
|
page read and write
|
||
1DFB5317000
|
heap
|
page read and write
|
||
1DFB52D1000
|
heap
|
page read and write
|
||
22FFC2B0000
|
remote allocation
|
page read and write
|
||
21DD91C0000
|
heap
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
274B6473000
|
heap
|
page read and write
|
||
1716D8D0000
|
heap
|
page read and write
|
||
27ED37F9000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
342D18E000
|
unkown
|
page read and write
|
||
1DFB5317000
|
heap
|
page read and write
|
||
620A7C000
|
stack
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
21DD923C000
|
heap
|
page read and write
|
||
BEFD8FA000
|
stack
|
page read and write
|
||
7FF88C0A9000
|
unkown
|
page write copy
|
||
1716D8EB000
|
heap
|
page read and write
|
||
1716BC9B000
|
heap
|
page read and write
|
||
1DFB34A7000
|
heap
|
page read and write
|
||
21DD925F000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1DFB52F1000
|
heap
|
page read and write
|
||
1DFB52DE000
|
heap
|
page read and write
|
||
1DFB34CE000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
22FFC220000
|
heap
|
page read and write
|
||
1716D8BD000
|
heap
|
page read and write
|
||
1DFB5324000
|
heap
|
page read and write
|
||
1F71B1F0000
|
heap
|
page read and write
|
||
BFC0A7C000
|
stack
|
page read and write
|
||
25B0278E000
|
heap
|
page read and write
|
||
1716D914000
|
heap
|
page read and write
|
||
1DFB52F8000
|
heap
|
page read and write
|
||
1DFB5324000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1DFB52D1000
|
heap
|
page read and write
|
||
1716BC50000
|
trusted library allocation
|
page read and write
|
||
21DD9214000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1DFB3610000
|
trusted library allocation
|
page read and write
|
||
22FFDB60000
|
heap
|
page read and write
|
||
1DFB531D000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
274B6502000
|
trusted library allocation
|
page read and write
|
||
1DFB52F8000
|
heap
|
page read and write
|
||
1DFB5725000
|
heap
|
page read and write
|
||
274B6400000
|
unkown
|
page read and write
|
||
1DFB3360000
|
unkown
|
page readonly
|
||
7FF88C0A8000
|
unkown
|
page write copy
|
||
1716D8B7000
|
heap
|
page read and write
|
||
1716D8B9000
|
heap
|
page read and write
|
||
21DD9246000
|
heap
|
page read and write
|
||
22FFC200000
|
heap
|
page read and write
|
||
21DD926B000
|
heap
|
page read and write
|
||
1DFB5324000
|
heap
|
page read and write
|
||
22FFC220000
|
heap
|
page read and write
|
||
BFC0AFF000
|
stack
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
1716BC05000
|
heap
|
page read and write
|
||
1DFB5502000
|
heap
|
page read and write
|
||
342D87E000
|
stack
|
page read and write
|
||
1716DD37000
|
heap
|
page read and write
|
||
1DFB3670000
|
heap
|
page read and write
|
||
1DFB3360000
|
unkown
|
page readonly
|
||
1F71B1F0000
|
heap
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1716D890000
|
heap
|
page read and write
|
||
1DFB52EB000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1716E380000
|
remote allocation
|
page read and write
|
||
274B6402000
|
unkown
|
page read and write
|
||
274B61D0000
|
heap
|
page read and write
|
||
1DFB34AE000
|
heap
|
page read and write
|
||
1DFB3495000
|
heap
|
page read and write
|
||
25B02540000
|
heap
|
page read and write
|
||
25B02940000
|
trusted library allocation
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
21DD9228000
|
heap
|
page read and write
|
||
21DD924B000
|
heap
|
page read and write
|
||
1DFB5601000
|
heap
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
1DFB3320000
|
heap
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
1716DAC4000
|
heap
|
page read and write
|
||
27ED379C000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
21DD9248000
|
heap
|
page read and write
|
||
21DDAC30000
|
heap
|
page read and write
|
||
1F71B330000
|
heap
|
page read and write
|
||
1DFB52FE000
|
heap
|
page read and write
|
||
1716D8DD000
|
heap
|
page read and write
|
||
22FFC038000
|
heap
|
page read and write
|
||
1DFB5317000
|
heap
|
page read and write
|
||
25B029B0000
|
trusted library allocation
|
page read and write
|
||
22FFC220000
|
heap
|
page read and write
|
||
1DFB52D8000
|
heap
|
page read and write
|
||
BEFD49C000
|
stack
|
page read and write
|
||
1716D8C4000
|
heap
|
page read and write
|
||
BFC0B7F000
|
stack
|
page read and write
|
||
1DFB52EB000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
21DD9214000
|
heap
|
page read and write
|
||
1716E360000
|
heap
|
page read and write
|
||
19E3D480000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1F71CC60000
|
heap
|
page read and write
|
||
2111000
|
heap
|
page read and write
|
||
1DFB534D000
|
heap
|
page read and write
|
||
1DFB530B000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
25B02740000
|
heap
|
page read and write
|
||
342D67C000
|
stack
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
4079D6F000
|
stack
|
page read and write
|
||
274B6523000
|
heap
|
page read and write
|
||
1DFB349D000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
1716E470000
|
heap
|
page read and write
|
||
19E3D480000
|
heap
|
page read and write
|
||
1DFB52CA000
|
heap
|
page read and write
|
||
21DDAC44000
|
heap
|
page read and write
|
||
1716DC87000
|
heap
|
page read and write
|
||
27ED3730000
|
heap
|
page read and write
|
||
1716DC2F000
|
heap
|
page read and write
|
||
21DD9246000
|
heap
|
page read and write
|
||
1DFB52D8000
|
heap
|
page read and write
|
||
21DDAD92000
|
heap
|
page read and write
|
||
1716D88A000
|
heap
|
page read and write
|
||
1DFB367A000
|
heap
|
page read and write
|
||
27ED3B60000
|
heap
|
page read and write
|
||
22FFC305000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
21DD926B000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
1DFB5335000
|
heap
|
page read and write
|
||
1716BABD000
|
heap
|
page read and write
|
||
1DFB5324000
|
heap
|
page read and write
|
||
1716DC87000
|
heap
|
page read and write
|
||
1716DCE5000
|
heap
|
page read and write
|
||
1DFB5800000
|
heap
|
page read and write
|
||
1DFB5E10000
|
heap
|
page read and write
|
||
1DFB34AB000
|
heap
|
page read and write
|
||
4079D6F000
|
stack
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
19E3D425000
|
heap
|
page read and write
|
||
19E3D430000
|
heap
|
page read and write
|
||
1716BA89000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
274B6602000
|
heap
|
page read and write
|
||
1716D89E000
|
heap
|
page read and write
|
||
1716D8D6000
|
heap
|
page read and write
|
||
1DFB5311000
|
heap
|
page read and write
|
||
1716D900000
|
heap
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
1716BAB7000
|
heap
|
page read and write
|
||
1716D88A000
|
heap
|
page read and write
|
||
7FF88C0A9000
|
unkown
|
page write copy
|
||
63B000
|
heap
|
page read and write
|
||
19E3D3F0000
|
heap
|
page read and write
|
||
1716D904000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
21DDAB20000
|
remote allocation
|
page read and write
|
||
1716BA91000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page write copy
|
||
1DFB5D11000
|
heap
|
page read and write
|
||
BFC0B7F000
|
stack
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
21DD9250000
|
heap
|
page read and write
|
||
19E3D2B0000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1F71CC62000
|
heap
|
page read and write
|
||
1716BA91000
|
heap
|
page read and write
|
||
21DD9060000
|
heap
|
page read and write
|
||
1716DC89000
|
heap
|
page read and write
|
||
1DFB56C7000
|
heap
|
page read and write
|
||
1716BA8E000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
27ED378E000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
274B6428000
|
heap
|
page read and write
|
||
21DD9255000
|
heap
|
page read and write
|
||
1716D8AA000
|
heap
|
page read and write
|
||
1716BC50000
|
trusted library allocation
|
page read and write
|
||
19E3D3F0000
|
heap
|
page read and write
|
||
3DE000
|
direct allocation
|
page execute and read and write
|
||
1DFB5E14000
|
heap
|
page read and write
|
||
1DFB349F000
|
heap
|
page read and write
|
||
21DD9250000
|
heap
|
page read and write
|
||
1DFB34C7000
|
heap
|
page read and write
|
||
1DFB3380000
|
unkown
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
19E3D488000
|
heap
|
page read and write
|
||
1716BA84000
|
heap
|
page read and write
|
||
4079D6F000
|
stack
|
page read and write
|
||
1DFB52E5000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
1DFB3390000
|
heap
|
page read and write
|
||
1DFB34A9000
|
heap
|
page read and write
|
||
1DFB5E17000
|
heap
|
page read and write
|
||
1716D8D6000
|
heap
|
page read and write
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
1716D8DD000
|
heap
|
page read and write
|
||
1DFB52EB000
|
heap
|
page read and write
|
||
21DDAB20000
|
remote allocation
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
22FFC038000
|
heap
|
page read and write
|
||
1F71B1F0000
|
heap
|
page read and write
|
||
1716D8D0000
|
heap
|
page read and write
|
||
1716D90D000
|
heap
|
page read and write
|
||
BEFD9F9000
|
stack
|
page read and write
|
||
1716D8CA000
|
heap
|
page read and write
|
||
21DD9248000
|
heap
|
page read and write
|
||
21DD9252000
|
heap
|
page read and write
|
||
27ED3770000
|
heap
|
page read and write
|
||
BFC0B7F000
|
stack
|
page read and write
|
||
19E3D2B0000
|
unkown
|
page read and write
|
||
274B6717000
|
heap
|
page read and write
|
||
1DFB5311000
|
heap
|
page read and write
|
||
274B6713000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1DFB52FE000
|
heap
|
page read and write
|
||
1716B9D2000
|
heap
|
page read and write
|
||
1716BC9E000
|
heap
|
page read and write
|
||
19E3D420000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1F71CC9D000
|
heap
|
page read and write
|
||
19E3D3F0000
|
heap
|
page read and write
|
||
21DD91E6000
|
heap
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
7FF88C0A8000
|
unkown
|
page read and write
|
||
1DFB3675000
|
heap
|
page read and write
|
||
1DFB348E000
|
heap
|
page read and write
|
||
1716D8BD000
|
heap
|
page read and write
|
||
22FFC030000
|
heap
|
page read and write
|
||
1DFB530B000
|
heap
|
page read and write
|
||
1DFB3498000
|
heap
|
page read and write
|
||
65D000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
1716DD8C000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
4079DEF000
|
stack
|
page read and write
|
||
1716D8CA000
|
heap
|
page read and write
|
||
342D47F000
|
stack
|
page read and write
|
||
C130BF9000
|
stack
|
page read and write
|
||
1DFB52DF000
|
heap
|
page read and write
|
||
27ED3951000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1716D916000
|
heap
|
page read and write
|
||
1DFB531D000
|
heap
|
page read and write
|
||
1DFB33B0000
|
heap
|
page read and write
|
||
1DFB52DE000
|
heap
|
page read and write
|
||
25B02786000
|
heap
|
page read and write
|
||
21DD9218000
|
heap
|
page read and write
|
||
22FFC300000
|
heap
|
page read and write
|
||
274B6702000
|
heap
|
page read and write
|
||
274B61E0000
|
trusted library allocation
|
page read and write
|
||
1DFB5353000
|
heap
|
page read and write
|
||
274B6500000
|
trusted library allocation
|
page read and write
|
||
1716BA87000
|
heap
|
page read and write
|
||
27ED3960000
|
heap
|
page read and write
|
||
21DD9250000
|
heap
|
page read and write
|
||
1DFB5304000
|
heap
|
page read and write
|
||
7FF88C0A9000
|
unkown
|
page write copy
|
||
1716D8A4000
|
heap
|
page read and write
|
||
1F71CC71000
|
heap
|
page read and write
|
||
1DFB5317000
|
heap
|
page read and write
|
||
1716BC90000
|
heap
|
page read and write
|
||
1DFB5311000
|
heap
|
page read and write
|
||
21DD9246000
|
heap
|
page read and write
|
||
1DFB5777000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
1DFB5E11000
|
heap
|
page read and write
|
||
1716BA8C000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page write copy
|
||
21DD9255000
|
heap
|
page read and write
|
||
21DD926B000
|
heap
|
page read and write
|
||
1716BA9B000
|
heap
|
page read and write
|
||
342D7FC000
|
stack
|
page read and write
|
||
1716B9E4000
|
heap
|
page read and write
|
||
1DFB5304000
|
heap
|
page read and write
|
||
1716B9E7000
|
heap
|
page read and write
|
||
1DFB5357000
|
heap
|
page read and write
|
||
27ED37C9000
|
heap
|
page read and write
|
||
6208FE000
|
stack
|
page read and write
|
||
1716D8C3000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
1716B940000
|
heap
|
page read and write
|
||
1716BA98000
|
heap
|
page read and write
|
||
19E3EE10000
|
remote allocation
|
page read and write
|
||
1DFB530B000
|
heap
|
page read and write
|
||
19E3D430000
|
heap
|
page read and write
|
||
1716D8A4000
|
heap
|
page read and write
|
||
1716D903000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
1716E2D1000
|
heap
|
page read and write
|
||
342D5FB000
|
stack
|
page read and write
|
||
1DFB52DE000
|
heap
|
page read and write
|
||
21DD921D000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
25B028E0000
|
trusted library allocation
|
page read and write
|
||
7C1647C000
|
stack
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
33B000
|
stack
|
page read and write
|
||
21DD9252000
|
heap
|
page read and write
|
||
1DFB5E1A000
|
heap
|
page read and write
|
||
1716DAC0000
|
heap
|
page read and write
|
||
1716D8AA000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
1716BA96000
|
heap
|
page read and write
|
||
21DD9218000
|
heap
|
page read and write
|
||
1F71CC40000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
1DFB3490000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
1716E610000
|
heap
|
page read and write
|
||
21DD925F000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
1716BA94000
|
heap
|
page read and write
|
||
21DD91E7000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
25B02749000
|
heap
|
page read and write
|
||
22FFBFC0000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1716E1C0000
|
heap
|
page read and write
|
||
1716E2C0000
|
heap
|
page read and write
|
||
1716BAA4000
|
heap
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
1716D8D6000
|
heap
|
page read and write
|
||
1DFB3650000
|
heap
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
1716D8B7000
|
heap
|
page read and write
|
||
1DFB3380000
|
unkown
|
page read and write
|
||
274B6600000
|
heap
|
page read and write
|
||
1716D916000
|
heap
|
page read and write
|
||
1DFB5311000
|
heap
|
page read and write
|
||
19E3D2B0000
|
unkown
|
page read and write
|
||
1716E474000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
1DFB52C6000
|
heap
|
page read and write
|
||
1716E380000
|
remote allocation
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
21DD9252000
|
heap
|
page read and write
|
||
1DFB3610000
|
trusted library allocation
|
page read and write
|
||
1716B9A0000
|
unkown
|
page read and write
|
||
21DD9248000
|
heap
|
page read and write
|
||
1DFB52F8000
|
heap
|
page read and write
|
||
27ED3790000
|
heap
|
page read and write
|
||
22FFC300000
|
heap
|
page read and write
|
||
27ED377D000
|
heap
|
page read and write
|
||
1DFB3370000
|
unkown
|
page readonly
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
1F71B160000
|
heap
|
page read and write
|
||
1716E2E3000
|
heap
|
page read and write
|
||
1716E471000
|
heap
|
page read and write
|
||
1DFB34CE000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
21DD9218000
|
heap
|
page read and write
|
||
1DFB5338000
|
heap
|
page read and write
|
||
BFC0A7C000
|
stack
|
page read and write
|
||
1716DD8C000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
21DD91F4000
|
heap
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1716B990000
|
unkown
|
page readonly
|
||
7FF88C070000
|
unkown
|
page readonly
|
||
21DD9239000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1716D90D000
|
heap
|
page read and write
|
||
25B02550000
|
trusted library allocation
|
page read and write
|
||
4079CEC000
|
stack
|
page read and write
|
||
1DFB52C0000
|
heap
|
page read and write
|
||
1716D8C3000
|
heap
|
page read and write
|
||
342D57F000
|
stack
|
page read and write
|
||
1DFB5777000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
BEFD879000
|
stack
|
page read and write
|
||
22FFC2B0000
|
remote allocation
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
1F71B17E000
|
heap
|
page read and write
|
||
1DFB34A9000
|
heap
|
page read and write
|
||
1716BA8C000
|
heap
|
page read and write
|
||
62087E000
|
unkown
|
page read and write
|
||
1716E477000
|
heap
|
page read and write
|
||
1716D8C3000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
19E3EE90000
|
heap
|
page read and write
|
||
21DD921D000
|
heap
|
page read and write
|
||
1716D8C3000
|
heap
|
page read and write
|
||
1716D8B0000
|
heap
|
page read and write
|
||
1716E47A000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page read and write
|
||
1DFB5C00000
|
heap
|
page read and write
|
||
4079DEF000
|
stack
|
page read and write
|
||
21DDAB60000
|
heap
|
page read and write
|
||
1716E430000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page write copy
|
||
1716DBC1000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
27ED37C9000
|
heap
|
page read and write
|
||
21DD91F0000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
7FF88C093000
|
unkown
|
page readonly
|
||
21DD926B000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
21DD926B000
|
heap
|
page read and write
|
||
1716B9C0000
|
heap
|
page read and write
|
||
1DFB34C7000
|
heap
|
page read and write
|
||
1716DD8C000
|
heap
|
page read and write
|
||
19E3EE90000
|
heap
|
page read and write
|
||
1716D8CA000
|
heap
|
page read and write
|
||
1DFB33D0000
|
heap
|
page read and write
|
||
1DFB5504000
|
heap
|
page read and write
|
||
25B02720000
|
trusted library allocation
|
page read and write
|
||
21DD9246000
|
heap
|
page read and write
|
||
1716E2E3000
|
heap
|
page read and write
|
||
1716DD37000
|
heap
|
page read and write
|
||
1716DD37000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
21DD91F3000
|
heap
|
page read and write
|
||
1DFB349A000
|
heap
|
page read and write
|
||
22FFBFC0000
|
unkown
|
page read and write
|
||
1DFB533C000
|
heap
|
page read and write
|
||
7FF88C0B3000
|
unkown
|
page read and write
|
||
1DFB5351000
|
heap
|
page read and write
|
||
21DD9218000
|
heap
|
page read and write
|
||
1F71B515000
|
heap
|
page read and write
|
||
21DD91DE000
|
heap
|
page read and write
|
||
1DFB35F0000
|
heap
|
page read and write
|
||
274B6613000
|
heap
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
19E3D480000
|
heap
|
page read and write
|
||
7FF88C071000
|
unkown
|
page execute read
|
||
21DD9255000
|
heap
|
page read and write
|
||
6205D3000
|
stack
|
page read and write
|
||
1DFB349D000
|
heap
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
1716D90D000
|
heap
|
page read and write
|
||
1716BA80000
|
heap
|
page read and write
|
||
21DD9255000
|
heap
|
page read and write
|
||
1DFB5D01000
|
heap
|
page read and write
|
||
25B027B1000
|
heap
|
page read and write
|
||
1DFB5801000
|
heap
|
page read and write
|
||
1716D914000
|
heap
|
page read and write
|
||
1F71CC00000
|
direct allocation
|
page execute and read and write
|
||
C4B23CD000
|
stack
|
page read and write
|
||
27ED35B0000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
21DD9268000
|
heap
|
page read and write
|
||
1716BA9C000
|
heap
|
page read and write
|
||
7FF88C0A8000
|
unkown
|
page write copy
|
||
1DFB52F1000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
19E3D488000
|
heap
|
page read and write
|
||
1DFB5600000
|
heap
|
page read and write
|
||
21DD9221000
|
heap
|
page read and write
|
||
21DD933E000
|
direct allocation
|
page execute and read and write
|
||
1F71B1C0000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
||
21DD925E000
|
heap
|
page read and write
|
||
1716BC20000
|
trusted library allocation
|
page read and write
|
||
1DFB34C7000
|
heap
|
page read and write
|
||
1716DDC1000
|
heap
|
page read and write
|
||
1716D910000
|
heap
|
page read and write
|
||
1716D8A4000
|
heap
|
page read and write
|
||
22FFC300000
|
heap
|
page read and write
|
||
1DFB35E0000
|
trusted library allocation
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
1716D89E000
|
heap
|
page read and write
|
||
21DD9218000
|
heap
|
page read and write
|
||
740C07C000
|
stack
|
page read and write
|
||
1DFB531D000
|
heap
|
page read and write
|
||
19E3D425000
|
heap
|
page read and write
|
||
1716D8E3000
|
heap
|
page read and write
|
||
1F71B193000
|
heap
|
page read and write
|
||
1716D8AB000
|
heap
|
page read and write
|
||
BFC0A7C000
|
stack
|
page read and write
|
||
25B0278E000
|
heap
|
page read and write
|
||
BEFDA7C000
|
stack
|
page read and write
|
||
7FF88C0B6000
|
unkown
|
page readonly
|
||
1F71CC0E000
|
direct allocation
|
page execute and read and write
|
||
1716BC30000
|
heap
|
page read and write
|
||
4079DEF000
|
stack
|
page read and write
|
||
21DD9255000
|
heap
|
page read and write
|
||
1716DE13000
|
heap
|
page read and write
|
||
1DFB5359000
|
heap
|
page read and write
|
||
1716D897000
|
heap
|
page read and write
|
||
21DDAC4D000
|
heap
|
page read and write
|
||
1DFB5352000
|
heap
|
page read and write
|
||
27ED3710000
|
direct allocation
|
page execute and read and write
|
||
1DFB5853000
|
heap
|
page read and write
|
||
1DFB33D8000
|
heap
|
page read and write
|
||
21DD9250000
|
heap
|
page read and write
|
||
25B02680000
|
heap
|
page read and write
|
||
1716D8DD000
|
heap
|
page read and write
|
||
25B028F0000
|
trusted library allocation
|
page read and write
|
||
1DFB52F8000
|
heap
|
page read and write
|
||
21DD923C000
|
heap
|
page read and write
|
There are 845 hidden memdumps, click here to show them.