Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
8082-svc-x86.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\servicereg.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\servicestart.log
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\8082-svc-x86.exe
|
C:\Users\user\Desktop\8082-svc-x86.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\System32\rundll32.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c sc create CfsHz binpath= "C:\Users\user\Desktop\8082-svc-x86.exe" >> C:\servicereg.log 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
sc create CfsHz binpath= "C:\Users\user\Desktop\8082-svc-x86.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c sc start CfsHz >> C:\servicestart.log 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
sc start CfsHz
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://20.104.209.69:8082/broadcast
|
20.104.209.69
|
||
20.104.209.69
|
|||
http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod
|
20.104.209.69
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://www.amazon.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 30 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
20.104.209.69
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
UsoCrmScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
|
USODiagnostics
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10C6000
|
direct allocation
|
page read and write
|
||
B40000
|
remote allocation
|
page execute read
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3FB8000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
A4B137E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
AFFC0FF000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1C7C01B0000
|
remote allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2D067000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
9F748DC000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
27921626000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A55650000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
2792164D000
|
heap
|
page read and write
|
||
FF6000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2CF80000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2CF70000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2DB39000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0510000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
279214F0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C70402000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
D4F000
|
stack
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A557C0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27922002000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
31BD000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2D000000
|
heap
|
page read and write
|
||
A4B15FE000
|
stack
|
page read and write
|
||
E14D47E000
|
stack
|
page read and write
|
||
AFFC3FE000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1C7C01B0000
|
remote allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
61CD8C000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FC6C000
|
heap
|
page read and write
|
||
1FA2D0CC000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2792163C000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
E14D37E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921656000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3849000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
2792162D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
61DA7E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FA70000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
BE4287F000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F1002000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2792167B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DCB000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BFA75000
|
heap
|
page read and write
|
||
27C6FC43000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921580000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3873000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
110B000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27C6FC43000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2D880000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
10A0000
|
direct allocation
|
page execute read
|
||
27C6FC00000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FAE0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
2792167E000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2792165F000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1C7BF9E0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page write copy
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
FAA000
|
heap
|
page read and write
|
||
27921664000
|
heap
|
page read and write
|
||
1FA2CFE0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
A4B177E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BFB02000
|
heap
|
page read and write
|
||
3DEF000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A55660000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
27C6FA80000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
E14D67F000
|
stack
|
page read and write
|
||
26A55813000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
E14CE8C000
|
stack
|
page read and write
|
||
26A55886000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FC3C000
|
heap
|
page read and write
|
||
673000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921668000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921640000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2D102000
|
heap
|
page read and write
|
||
27921648000
|
heap
|
page read and write
|
||
73C000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
26A55865000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
FC3000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
AFFC4FF000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
2792167A000
|
heap
|
page read and write
|
||
26A556C0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F0520000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921657000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
61D5FC000
|
stack
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
2792163A000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F0580000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0700000
|
heap
|
page read and write
|
||
A4B157D000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
69D000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
9F750FE000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3D1C000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
E14CF8E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0659000
|
heap
|
page read and write
|
||
BE41FDB000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
17E000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0664000
|
heap
|
page read and write
|
||
267F0600000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
10D9000
|
direct allocation
|
page read and write
|
||
403000
|
unkown
|
page write copy
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3DF3000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BFA29000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
BE424FE000
|
stack
|
page read and write
|
||
AFFC1FF000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
61D87E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A55913000
|
heap
|
page read and write
|
||
26A55888000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
2792166A000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
BE425FB000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F0602000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27C6FC52000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0679000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
B09000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
26A55902000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BFA3D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921677000
|
heap
|
page read and write
|
||
448000
|
unkown
|
page write copy
|
||
110B000
|
heap
|
page read and write
|
||
27C6FD00000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3DCF000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3DF9000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2D67000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
ACC000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A55800000
|
heap
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
1FA2DB00000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921631000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
26A55829000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
61D77D000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2D070000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FC02000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BFA02000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2DA02000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1105000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
27921702000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BF880000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921660000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
9F74EFB000
|
stack
|
page read and write
|
||
317D000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
64C000
|
stack
|
page read and write
|
||
267F063C000
|
heap
|
page read and write
|
||
267F0702000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A5583D000
|
heap
|
page read and write
|
||
E14D57E000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2D0C9000
|
heap
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
10DB000
|
direct allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
A4B12FC000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
AFFBCFC000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DEB000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1C7BFA13000
|
heap
|
page read and write
|
||
AFFBB7B000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
A4B107C000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
279214E0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921642000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921679000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
F0000
|
trusted library allocation
|
page read and write
|
||
AFFB77C000
|
stack
|
page read and write
|
||
E14CF0E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
61D37F000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3DD3000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
1FA2D013000
|
heap
|
page read and write
|
||
BE4267E000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
27C6FD02000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
BE42A7F000
|
stack
|
page read and write
|
||
27921665000
|
heap
|
page read and write
|
||
1C7BF8E0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A5586B000
|
heap
|
page read and write
|
||
1FA2D113000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
AFFBFFD000
|
stack
|
page read and write
|
||
2792162E000
|
heap
|
page read and write
|
||
27C6FC13000
|
heap
|
page read and write
|
||
BE4277A000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DF1000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
BE423FB000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1C7BF870000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921659000
|
heap
|
page read and write
|
||
AFFC2FF000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
41C1000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921613000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921663000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
9F74DFB000
|
stack
|
page read and write
|
||
2792165A000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1C7C01B0000
|
remote allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
9F74FFE000
|
stack
|
page read and write
|
||
1FA2D069000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
2792166D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921629000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
61D1FB000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
10D2000
|
direct allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F05B0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921641000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F0613000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921658000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
267F0668000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0628000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
61D4FC000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921667000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A5585B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
61D97D000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921662000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
27921674000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FC5A000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2D029000
|
heap
|
page read and write
|
||
61D47E000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2792165C000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
267F0713000
|
heap
|
page read and write
|
||
1C7C0202000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
2792166B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
A4B16FD000
|
stack
|
page read and write
|
||
2792162C000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2DB13000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1C7BFA57000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1106000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
448000
|
unkown
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
26A56002000
|
trusted library allocation
|
page read and write
|
||
1C7BFA00000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
AFFBDFF000
|
stack
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921684000
|
heap
|
page read and write
|
||
27C6FBE0000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921600000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27921655000
|
heap
|
page read and write
|
||
1FA2D0BB000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3DE3000
|
trusted library allocation
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
61D67B000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
BE42AFE000
|
stack
|
page read and write
|
||
3DE7000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
26A55875000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
65D000
|
stack
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27C703A0000
|
trusted library allocation
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
1FA2D043000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
27C6FC29000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921675000
|
heap
|
page read and write
|
||
27921550000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27C6FD13000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1FA2D0E2000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
27921661000
|
heap
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
There are 953 hidden memdumps, click here to show them.