Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
click.wsf
|
HTML document, ASCII text, with very long lines (792), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\Desktop\click.wsf
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\rad1F9A4.tmp.dll
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\Desktop\rad75349.tmp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BlUwZJEPejvMeG\xhwdmo.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_13929_20386-20230320T0906180748-804.etl
|
old-fs dump file (16-bit, assuming PDP-11 endianness), Previous dump Thu Jan 1 01:07:36 1970, This dump Thu Jan 1 01:09:04
1970,
|
modified
|
||
C:\Users\user\Documents\Outlook Files\Outlook Data File - NoEmail.pst
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\click.wsf"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\System32\regsvr32.exe" "C:\Users\user\Desktop\rad75349.tmp.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BlUwZJEPejvMeG\xhwdmo.dll"
|
||
C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
|
"C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE" /PIM NoEmail
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://wrappixels.co
|
unknown
|
||
http://softwareulike.com/cWIYxWMPkK/
|
unknown
|
||
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
|
31.31.196.172
|
||
http://ozmeydan.com/cekici/9/
|
unknown
|
||
https://www.gomespontes.com.br/logs/pd/
|
186.202.153.5
|
||
https://www.gomespontes.com.br/
|
unknown
|
||
https://164.90.222.65/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
164.90.222.65
|
||
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
|
unknown
|
||
https://penshorn.org/admin/Ses8712iGR8du/
|
203.26.41.131
|
||
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
|
unknown
|
||
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
|
unknown
|
||
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/476
|
unknown
|
||
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/H#K#0
|
unknown
|
||
https://160.16.142.56:8080/M
|
unknown
|
||
https://160.16.142.56:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
https://187.63.160.88:80/wfqhlvcfruxkwghn/ivirkxueekmcz/VnX
|
unknown
|
||
https://66.228.32.31:7080/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
https://91.121.146.47:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/X
|
unknown
|
||
https://104.168.155.143:8080/Y
|
unknown
|
||
https://163.44.196.120:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/bK
|
unknown
|
||
https://91.121.146.47:8080/
|
unknown
|
||
https://163.44.196.120:8080/
|
unknown
|
||
https://163.44.196.120:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/z
|
unknown
|
||
https://www.gomespontes.com.br/logs/pd/vM
|
unknown
|
||
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/cw34006
|
unknown
|
||
https://167.172.199.165:8080/l
|
unknown
|
||
https://167.172.199.165:8080/
|
unknown
|
||
https://91.121.146.47:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/dllgz
|
unknown
|
||
https://187.63.160.88:80/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
https://163.44.196.120:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
https://www.gomespontes.com.br/s
|
unknown
|
||
https://164.90.222.65/)
|
unknown
|
||
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
|
unknown
|
||
https://160.16.142.56:8080/wfqhlvcfruxkwghn/ivirkxueekmcz//
|
unknown
|
||
https://penshorn.org/admin/Ses8712iGR8du/tM
|
unknown
|
||
https://104.168.155.143:8080/4
|
unknown
|
||
https://66.228.32.31:7080/wfqhlvcfruxkwghn/ivirkxueekmcz/.DLL
|
unknown
|
||
http://softwareulike.com/cWIYxWMPkK/yM
|
unknown
|
||
https://167.172.199.165:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
https://104.168.155.143:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/dll
|
unknown
|
||
http://ozmeydan.com/cekici/9/xM
|
unknown
|
||
https://104.168.155.143:8080/P
|
unknown
|
||
https://www.gomespontes.com.br/logs/pd/l
|
unknown
|
||
https://104.168.155.143:8080/
|
unknown
|
||
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
|
unknown
|
||
https://160.16.142.56:8080/
|
unknown
|
||
https://91.121.146.47:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
|
unknown
|
||
https://penshorn.org/admin/Ses8712iGR8du/95DC4.tmp.dll(
|
unknown
|
||
https://www.gomespontes.com.br/logs/pd/0w
|
unknown
|
||
http://softwareulike.com/cWIYxWMPkK/_
|
unknown
|
||
https://160.16.142.56:8080/)
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bbvoyage.com
|
31.31.196.172
|
||
gomespontes.com.br
|
186.202.153.5
|
||
penshorn.org
|
203.26.41.131
|
||
www.gomespontes.com.br
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
110.232.117.186
|
unknown
|
Australia
|
||
103.132.242.26
|
unknown
|
India
|
||
104.168.155.143
|
unknown
|
United States
|
||
79.137.35.198
|
unknown
|
France
|
||
115.68.227.76
|
unknown
|
Korea Republic of
|
||
163.44.196.120
|
unknown
|
Singapore
|
||
206.189.28.199
|
unknown
|
United States
|
||
31.31.196.172
|
bbvoyage.com
|
Russian Federation
|
||
186.202.153.5
|
gomespontes.com.br
|
Brazil
|
||
203.26.41.131
|
penshorn.org
|
Australia
|
||
107.170.39.149
|
unknown
|
United States
|
||
66.228.32.31
|
unknown
|
United States
|
||
197.242.150.244
|
unknown
|
South Africa
|
||
185.4.135.165
|
unknown
|
Greece
|
||
183.111.227.137
|
unknown
|
Korea Republic of
|
||
45.176.232.124
|
unknown
|
Colombia
|
||
169.57.156.166
|
unknown
|
United States
|
||
164.68.99.3
|
unknown
|
Germany
|
||
139.59.126.41
|
unknown
|
Singapore
|
||
167.172.253.162
|
unknown
|
United States
|
||
167.172.199.165
|
unknown
|
United States
|
||
202.129.205.3
|
unknown
|
Thailand
|
||
147.139.166.154
|
unknown
|
United States
|
||
153.92.5.27
|
unknown
|
Germany
|
||
159.65.88.10
|
unknown
|
United States
|
||
172.105.226.75
|
unknown
|
United States
|
||
164.90.222.65
|
unknown
|
United States
|
||
213.239.212.5
|
unknown
|
Germany
|
||
5.135.159.50
|
unknown
|
France
|
||
186.194.240.217
|
unknown
|
Brazil
|
||
119.59.103.152
|
unknown
|
Thailand
|
||
159.89.202.34
|
unknown
|
United States
|
||
91.121.146.47
|
unknown
|
France
|
||
160.16.142.56
|
unknown
|
Japan
|
||
201.94.166.162
|
unknown
|
Brazil
|
||
91.207.28.33
|
unknown
|
Kyrgyzstan
|
||
103.75.201.2
|
unknown
|
Thailand
|
||
103.43.75.120
|
unknown
|
Japan
|
||
188.44.20.25
|
unknown
|
Macedonia
|
||
45.235.8.30
|
unknown
|
Brazil
|
||
153.126.146.25
|
unknown
|
Japan
|
||
72.15.201.15
|
unknown
|
United States
|
||
187.63.160.88
|
unknown
|
Brazil
|
||
82.223.21.224
|
unknown
|
Spain
|
||
173.212.193.249
|
unknown
|
Germany
|
||
95.217.221.146
|
unknown
|
Germany
|
||
149.56.131.28
|
unknown
|
Canada
|
||
182.162.143.56
|
unknown
|
Korea Republic of
|
||
1.234.2.232
|
unknown
|
Korea Republic of
|
||
129.232.188.93
|
unknown
|
South Africa
|
||
94.23.45.86
|
unknown
|
France
|
||
52.109.13.63
|
unknown
|
United States
|
||
192.229.221.95
|
unknown
|
United States
|
||
52.109.76.141
|
unknown
|
United States
|
There are 44 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Settings\Data
|
global_Accessibility_ReminderType
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\NoEmail\9207f3e0a3b11019908b08002b2a56c2
|
11023d05
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
|
255
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
|
4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
|
255
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
|
255
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
|
4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
|
4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
|
ULSTagIds0
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
|
ULSCategoriesSeverities
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
|
255
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
|
4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
|
255
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
|
255
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
|
5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
|
4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
|
4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
|
Categories
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
|
ULSTagIds0
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
|
ULSCategoriesSeverities
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Settings
|
Accounts
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Settings\Data
|
global_AccountsNeedResyncing
|
There are 38 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
731000
|
direct allocation
|
page execute read
|
||
C99000
|
heap
|
page read and write
|
||
460000
|
direct allocation
|
page execute and read and write
|
||
2D8463EE000
|
heap
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2D845CDD000
|
heap
|
page read and write
|
||
2D84626F000
|
heap
|
page read and write
|
||
2D846412000
|
heap
|
page read and write
|
||
2D845E4E000
|
heap
|
page read and write
|
||
1F8B000
|
stack
|
page read and write
|
||
1EF87080000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
2D8462D5000
|
heap
|
page read and write
|
||
2D846610000
|
heap
|
page read and write
|
||
2D846747000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
2D845D02000
|
heap
|
page read and write
|
||
180021000
|
unkown
|
page read and write
|
||
2D846297000
|
heap
|
page read and write
|
||
2FD1000
|
heap
|
page read and write
|
||
2EDD000
|
heap
|
page read and write
|
||
2D843FB1000
|
heap
|
page read and write
|
||
2D845E71000
|
heap
|
page read and write
|
||
2D846545000
|
heap
|
page read and write
|
||
2D843D10000
|
heap
|
page read and write
|
||
3018000
|
heap
|
page read and write
|
||
2D845CD6000
|
heap
|
page read and write
|
||
2EEC000
|
heap
|
page read and write
|
||
2FA9000
|
heap
|
page read and write
|
||
2D8464BA000
|
heap
|
page read and write
|
||
289C000
|
stack
|
page read and write
|
||
2D84619E000
|
heap
|
page read and write
|
||
2D846702000
|
heap
|
page read and write
|
||
2D84631A000
|
heap
|
page read and write
|
||
2D845920000
|
heap
|
page read and write
|
||
2D8462B3000
|
heap
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
2D846674000
|
heap
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
2D84658E000
|
heap
|
page read and write
|
||
2D84613E000
|
heap
|
page read and write
|
||
CCF000
|
heap
|
page read and write
|
||
2D84678E000
|
heap
|
page read and write
|
||
2D843FCB000
|
heap
|
page read and write
|
||
2D8462DD000
|
heap
|
page read and write
|
||
2D84677F000
|
heap
|
page read and write
|
||
2D84653C000
|
heap
|
page read and write
|
||
2D846461000
|
heap
|
page read and write
|
||
2D843F89000
|
heap
|
page read and write
|
||
2D845E4A000
|
heap
|
page read and write
|
||
2D845DFA000
|
heap
|
page read and write
|
||
23CE000
|
stack
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
2D846613000
|
heap
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
2D8460C7000
|
heap
|
page read and write
|
||
2D845D52000
|
heap
|
page read and write
|
||
2D845DF6000
|
heap
|
page read and write
|
||
2ED6000
|
heap
|
page read and write
|
||
2D846828000
|
heap
|
page read and write
|
||
2D845ED2000
|
heap
|
page read and write
|
||
2D843FAC000
|
heap
|
page read and write
|
||
2D8463EE000
|
heap
|
page read and write
|
||
2D8466E9000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
F35BCFE000
|
stack
|
page read and write
|
||
1EF86FA0000
|
trusted library allocation
|
page read and write
|
||
C88DEFE000
|
stack
|
page read and write
|
||
3018000
|
heap
|
page read and write
|
||
2D84402E000
|
heap
|
page read and write
|
||
C88DBEB000
|
stack
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
2D846100000
|
heap
|
page read and write
|
||
2D8466C5000
|
heap
|
page read and write
|
||
2D843F91000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
2D8465A0000
|
heap
|
page read and write
|
||
2D8466F1000
|
heap
|
page read and write
|
||
EAB000
|
direct allocation
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D846564000
|
heap
|
page read and write
|
||
1DA0000
|
trusted library allocation
|
page read and write
|
||
2D846012000
|
heap
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
2D846717000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1EF87064000
|
heap
|
page read and write
|
||
2F33000
|
heap
|
page read and write
|
||
2D84666F000
|
heap
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
3018000
|
heap
|
page read and write
|
||
2D843FAD000
|
heap
|
page read and write
|
||
2D8460A0000
|
heap
|
page read and write
|
||
2D84600D000
|
heap
|
page read and write
|
||
2D845EB1000
|
heap
|
page read and write
|
||
2D845CDC000
|
heap
|
page read and write
|
||
2D846241000
|
heap
|
page read and write
|
||
2D843F86000
|
heap
|
page read and write
|
||
2D845C70000
|
heap
|
page read and write
|
||
180023000
|
unkown
|
page readonly
|
||
2D8467B0000
|
heap
|
page read and write
|
||
180021000
|
unkown
|
page read and write
|
||
2D845F4D000
|
heap
|
page read and write
|
||
2D845F35000
|
heap
|
page read and write
|
||
2D846291000
|
heap
|
page read and write
|
||
2D845EB5000
|
heap
|
page read and write
|
||
2D846065000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
2D845CEF000
|
heap
|
page read and write
|
||
2D8468AE000
|
heap
|
page read and write
|
||
2D845E94000
|
heap
|
page read and write
|
||
2D845CB3000
|
heap
|
page read and write
|
||
ED7000
|
trusted library allocation
|
page read and write
|
||
2D84656F000
|
heap
|
page read and write
|
||
2E86000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D845E6C000
|
heap
|
page read and write
|
||
2D8464BB000
|
heap
|
page read and write
|
||
2D846118000
|
heap
|
page read and write
|
||
2D845FF4000
|
heap
|
page read and write
|
||
2D846395000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
2D8461BE000
|
heap
|
page read and write
|
||
2D8463C0000
|
heap
|
page read and write
|
||
2D846817000
|
heap
|
page read and write
|
||
2D843F0E000
|
heap
|
page read and write
|
||
2D845E4A000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
2D845EFA000
|
heap
|
page read and write
|
||
2D846631000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
2D846703000
|
heap
|
page read and write
|
||
2D846570000
|
heap
|
page read and write
|
||
2D846658000
|
heap
|
page read and write
|
||
2D845D4E000
|
heap
|
page read and write
|
||
244F000
|
stack
|
page read and write
|
||
2D845D4E000
|
heap
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
2D84651F000
|
heap
|
page read and write
|
||
2D843FF2000
|
heap
|
page read and write
|
||
2D845C83000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
2D846395000
|
heap
|
page read and write
|
||
2D846198000
|
heap
|
page read and write
|
||
2D845F13000
|
heap
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
2D8464E3000
|
heap
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
2D845DD4000
|
heap
|
page read and write
|
||
2D844026000
|
heap
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
2D845CF2000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
C88E0FB000
|
stack
|
page read and write
|
||
2D845EF6000
|
heap
|
page read and write
|
||
2D846461000
|
heap
|
page read and write
|
||
2D846379000
|
heap
|
page read and write
|
||
2D846780000
|
heap
|
page read and write
|
||
2D843FB0000
|
heap
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
2D843F0A000
|
heap
|
page read and write
|
||
2D84621A000
|
heap
|
page read and write
|
||
C88E2F7000
|
stack
|
page read and write
|
||
2D8466B2000
|
heap
|
page read and write
|
||
2D84660A000
|
heap
|
page read and write
|
||
2D84680C000
|
heap
|
page read and write
|
||
2D8465AA000
|
heap
|
page read and write
|
||
2D845DD0000
|
heap
|
page read and write
|
||
2E5B000
|
stack
|
page read and write
|
||
2EDF000
|
heap
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
2D8463F5000
|
heap
|
page read and write
|
||
450000
|
direct allocation
|
page execute and read and write
|
||
291A000
|
stack
|
page read and write
|
||
2D845FB2000
|
heap
|
page read and write
|
||
2D8462DC000
|
heap
|
page read and write
|
||
2D846395000
|
heap
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
2D846708000
|
heap
|
page read and write
|
||
2D8463DC000
|
heap
|
page read and write
|
||
2D845E6C000
|
heap
|
page read and write
|
||
2D845DF0000
|
heap
|
page read and write
|
||
2D8466CF000
|
heap
|
page read and write
|
||
2D845EF6000
|
heap
|
page read and write
|
||
2D84617E000
|
heap
|
page read and write
|
||
CFB000
|
heap
|
page read and write
|
||
2D845F18000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
2D845D75000
|
heap
|
page read and write
|
||
2D845DB4000
|
heap
|
page read and write
|
||
C88E4FE000
|
stack
|
page read and write
|
||
2D8460D9000
|
heap
|
page read and write
|
||
2D84649E000
|
heap
|
page read and write
|
||
2D844019000
|
heap
|
page read and write
|
||
2EEB000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
2D845D51000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
2D845F52000
|
heap
|
page read and write
|
||
2D8460F8000
|
heap
|
page read and write
|
||
2D845CEA000
|
heap
|
page read and write
|
||
1EF87058000
|
heap
|
page read and write
|
||
2D84682D000
|
heap
|
page read and write
|
||
C8B000
|
heap
|
page read and write
|
||
2D84670D000
|
heap
|
page read and write
|
||
2D845C98000
|
heap
|
page read and write
|
||
2D845C87000
|
heap
|
page read and write
|
||
2D8466ED000
|
heap
|
page read and write
|
||
2D84656D000
|
heap
|
page read and write
|
||
2D844016000
|
heap
|
page read and write
|
||
730000
|
direct allocation
|
page read and write
|
||
2D845E16000
|
heap
|
page read and write
|
||
2D845D52000
|
heap
|
page read and write
|
||
2D84603E000
|
heap
|
page read and write
|
||
2D8460DE000
|
heap
|
page read and write
|
||
2D846469000
|
heap
|
page read and write
|
||
2D846658000
|
heap
|
page read and write
|
||
2D845CFA000
|
heap
|
page read and write
|
||
2D845E32000
|
heap
|
page read and write
|
||
2D8461DE000
|
heap
|
page read and write
|
||
2D845F58000
|
heap
|
page read and write
|
||
2D84602C000
|
heap
|
page read and write
|
||
2D845F7B000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
2D846241000
|
heap
|
page read and write
|
||
2D846482000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
2D84615E000
|
heap
|
page read and write
|
||
2D8466F7000
|
heap
|
page read and write
|
||
2D845D4E000
|
heap
|
page read and write
|
||
2D845F7B000
|
heap
|
page read and write
|
||
2D8468A4000
|
heap
|
page read and write
|
||
2D8461B8000
|
heap
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
2D8465E8000
|
heap
|
page read and write
|
||
2D845C71000
|
heap
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
2D845FB7000
|
heap
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
DB000
|
stack
|
page read and write
|
||
2D84643D000
|
heap
|
page read and write
|
||
2D846694000
|
heap
|
page read and write
|
||
2D8461D8000
|
heap
|
page read and write
|
||
2D845C89000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2D8462FE000
|
heap
|
page read and write
|
||
2D8468BE000
|
heap
|
page read and write
|
||
2ECF000
|
heap
|
page read and write
|
||
2D845EB1000
|
heap
|
page read and write
|
||
2D845C79000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2007000
|
stack
|
page read and write
|
||
2D8460BF000
|
heap
|
page read and write
|
||
2D8463B8000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
2D845CB3000
|
heap
|
page read and write
|
||
2D84656B000
|
heap
|
page read and write
|
||
2D843F60000
|
heap
|
page read and write
|
||
2D846579000
|
heap
|
page read and write
|
||
2D843FA0000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
2D8460D9000
|
heap
|
page read and write
|
||
1EF87027000
|
heap
|
page read and write
|
||
2D845ECE000
|
heap
|
page read and write
|
||
2D845DB8000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
2D845DB0000
|
heap
|
page read and write
|
||
2D8461D8000
|
heap
|
page read and write
|
||
2D846424000
|
heap
|
page read and write
|
||
2D846367000
|
heap
|
page read and write
|
||
2D84673D000
|
heap
|
page read and write
|
||
2D845DD4000
|
heap
|
page read and write
|
||
2D846811000
|
heap
|
page read and write
|
||
2D843FFC000
|
heap
|
page read and write
|
||
2D845C90000
|
heap
|
page read and write
|
||
2D84615E000
|
heap
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
2D84663B000
|
heap
|
page read and write
|
||
2D8465FA000
|
heap
|
page read and write
|
||
F35C1FB000
|
stack
|
page read and write
|
||
2D845EB5000
|
heap
|
page read and write
|
||
2D84401E000
|
heap
|
page read and write
|
||
2D84677F000
|
heap
|
page read and write
|
||
2D846470000
|
heap
|
page read and write
|
||
2D844029000
|
heap
|
page read and write
|
||
2D845DAB000
|
heap
|
page read and write
|
||
2D845CB3000
|
heap
|
page read and write
|
||
2D843FB7000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2D8467AB000
|
heap
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
2D846547000
|
heap
|
page read and write
|
||
2D846181000
|
heap
|
page read and write
|
||
2D84672D000
|
heap
|
page read and write
|
||
2D8465D6000
|
heap
|
page read and write
|
||
2D8465FF000
|
heap
|
page read and write
|
||
2D846692000
|
heap
|
page read and write
|
||
F35C0FE000
|
stack
|
page read and write
|
||
2D8461FF000
|
heap
|
page read and write
|
||
2D846568000
|
heap
|
page read and write
|
||
2D8468D4000
|
heap
|
page read and write
|
||
2D846696000
|
heap
|
page read and write
|
||
2D845D06000
|
heap
|
page read and write
|
||
2D84648A000
|
heap
|
page read and write
|
||
1EF87802000
|
heap
|
page read and write
|
||
2D846298000
|
heap
|
page read and write
|
||
2D8464CC000
|
heap
|
page read and write
|
||
2D845EDE000
|
heap
|
page read and write
|
||
2D846082000
|
heap
|
page read and write
|
||
2D846503000
|
heap
|
page read and write
|
||
2D846541000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
4AB000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2D845E66000
|
heap
|
page read and write
|
||
2D843E70000
|
heap
|
page read and write
|
||
2D8465FA000
|
heap
|
page read and write
|
||
2D8466FC000
|
heap
|
page read and write
|
||
2D846541000
|
heap
|
page read and write
|
||
2D846711000
|
heap
|
page read and write
|
||
2D845CDA000
|
heap
|
page read and write
|
||
2D84680C000
|
heap
|
page read and write
|
||
2D846357000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
2D84654A000
|
heap
|
page read and write
|
||
2D846545000
|
heap
|
page read and write
|
||
D1F000
|
heap
|
page read and write
|
||
2D84634F000
|
heap
|
page read and write
|
||
2D84613E000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
2D845CB3000
|
heap
|
page read and write
|
||
2D84611E000
|
heap
|
page read and write
|
||
2D845E32000
|
heap
|
page read and write
|
||
2E61000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
75A000
|
direct allocation
|
page readonly
|
||
2D8464DC000
|
heap
|
page read and write
|
||
2D843F08000
|
heap
|
page read and write
|
||
2D845E94000
|
heap
|
page read and write
|
||
2D845E12000
|
heap
|
page read and write
|
||
2D843F05000
|
heap
|
page read and write
|
||
2D846829000
|
heap
|
page read and write
|
||
2D845FF3000
|
heap
|
page read and write
|
||
2D8466FF000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
2D846821000
|
heap
|
page read and write
|
||
2D845E82000
|
heap
|
page read and write
|
||
2D8461D8000
|
heap
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
2D843F0D000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
2D846372000
|
heap
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
2D846515000
|
heap
|
page read and write
|
||
2D843FB8000
|
heap
|
page read and write
|
||
2D84682C000
|
heap
|
page read and write
|
||
75B000
|
direct allocation
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
2D846613000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
2D845CCF000
|
heap
|
page read and write
|
||
2D846547000
|
heap
|
page read and write
|
||
2D84405B000
|
heap
|
page read and write
|
||
2D845ECE000
|
heap
|
page read and write
|
||
2D846242000
|
heap
|
page read and write
|
||
2D84653F000
|
heap
|
page read and write
|
||
2D845ED9000
|
heap
|
page read and write
|
||
2D845F76000
|
heap
|
page read and write
|
||
2D845E4E000
|
heap
|
page read and write
|
||
2D845F35000
|
heap
|
page read and write
|
||
2D846817000
|
heap
|
page read and write
|
||
2D846058000
|
heap
|
page read and write
|
||
2D8460BF000
|
heap
|
page read and write
|
||
2D845FD5000
|
heap
|
page read and write
|
||
2D84605D000
|
heap
|
page read and write
|
||
2D846515000
|
heap
|
page read and write
|
||
2D846436000
|
heap
|
page read and write
|
||
2D845900000
|
remote allocation
|
page read and write
|
||
2D846568000
|
heap
|
page read and write
|
||
2D843F0C000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
2D845FD0000
|
heap
|
page read and write
|
||
1EF87100000
|
heap
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
2D845D4F000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
2D846469000
|
heap
|
page read and write
|
||
2D84600D000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2ED1000
|
heap
|
page read and write
|
||
2D8461F9000
|
heap
|
page read and write
|
||
2D8461DE000
|
heap
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
2D846276000
|
heap
|
page read and write
|
||
1EF87013000
|
heap
|
page read and write
|
||
F35BFFF000
|
stack
|
page read and write
|
||
2D84661F000
|
heap
|
page read and write
|
||
2D84645A000
|
heap
|
page read and write
|
||
2D84672F000
|
heap
|
page read and write
|
||
1EF87040000
|
heap
|
page read and write
|
||
2D845ED2000
|
heap
|
page read and write
|
||
2D8467A7000
|
heap
|
page read and write
|
||
2D846379000
|
heap
|
page read and write
|
||
2D846419000
|
heap
|
page read and write
|
||
C88E5FE000
|
stack
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
2D845D4E000
|
heap
|
page read and write
|
||
2D843F00000
|
heap
|
page read and write
|
||
F35BEFF000
|
stack
|
page read and write
|
||
CCB000
|
heap
|
page read and write
|
||
2D845F94000
|
heap
|
page read and write
|
||
2D845DF0000
|
heap
|
page read and write
|
||
2D845C75000
|
heap
|
page read and write
|
||
F35C2FD000
|
stack
|
page read and write
|
||
2EA5000
|
heap
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
2D844026000
|
heap
|
page read and write
|
||
2D8467A1000
|
heap
|
page read and write
|
||
2EF3000
|
heap
|
page read and write
|
||
2D8462F7000
|
heap
|
page read and write
|
||
2D843FCC000
|
heap
|
page read and write
|
||
2D84609B000
|
heap
|
page read and write
|
||
2D8462BA000
|
heap
|
page read and write
|
||
1EF87800000
|
heap
|
page read and write
|
||
2D843E50000
|
heap
|
page read and write
|
||
490000
|
heap
|
page readonly
|
||
2D846321000
|
heap
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
2D846817000
|
heap
|
page read and write
|
||
2D84639C000
|
heap
|
page read and write
|
||
2D84643D000
|
heap
|
page read and write
|
||
2D846220000
|
heap
|
page read and write
|
||
9CB000
|
stack
|
page read and write
|
||
2D846610000
|
heap
|
page read and write
|
||
2D8467AA000
|
heap
|
page read and write
|
||
2D843FFC000
|
heap
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
2D846158000
|
heap
|
page read and write
|
||
2D8462BA000
|
heap
|
page read and write
|
||
2D845F7C000
|
heap
|
page read and write
|
||
2D843FA2000
|
heap
|
page read and write
|
||
2D845DFA000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
2D845CEE000
|
heap
|
page read and write
|
||
2D845D0F000
|
heap
|
page read and write
|
||
2D845C75000
|
heap
|
page read and write
|
||
2D845E2E000
|
heap
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
2D846158000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
1EF86F70000
|
heap
|
page read and write
|
||
2D8467BD000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
2D845FEE000
|
heap
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
2ECF000
|
heap
|
page read and write
|
||
2D845E2E000
|
heap
|
page read and write
|
||
2D845C89000
|
heap
|
page read and write
|
||
2D845F7B000
|
heap
|
page read and write
|
||
2D8464E6000
|
heap
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
2D845CE6000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2D845CE3000
|
heap
|
page read and write
|
||
2D843F88000
|
heap
|
page read and write
|
||
2D846570000
|
heap
|
page read and write
|
||
2D844042000
|
heap
|
page read and write
|
||
2D8460FE000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
2D84623B000
|
heap
|
page read and write
|
||
2D845900000
|
remote allocation
|
page read and write
|
||
2D846031000
|
heap
|
page read and write
|
||
2D846631000
|
heap
|
page read and write
|
||
2D845F1C000
|
heap
|
page read and write
|
||
2D846789000
|
heap
|
page read and write
|
||
2D845F35000
|
heap
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
2D843F07000
|
heap
|
page read and write
|
||
2D8462FE000
|
heap
|
page read and write
|
||
2D84634F000
|
heap
|
page read and write
|
||
2D84646B000
|
heap
|
page read and write
|
||
2D845CFE000
|
heap
|
page read and write
|
||
2D845D90000
|
heap
|
page read and write
|
||
2D846518000
|
heap
|
page read and write
|
||
2D84405C000
|
heap
|
page read and write
|
||
2D8463BF000
|
heap
|
page read and write
|
||
2D8466DB000
|
heap
|
page read and write
|
||
2D846372000
|
heap
|
page read and write
|
||
2D846058000
|
heap
|
page read and write
|
||
2D845EDE000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
2D845E6C000
|
heap
|
page read and write
|
||
2D845E5F000
|
heap
|
page read and write
|
||
2D84646C000
|
heap
|
page read and write
|
||
2D84401E000
|
heap
|
page read and write
|
||
2D8460F8000
|
heap
|
page read and write
|
||
1F0E000
|
stack
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
2D845D17000
|
heap
|
page read and write
|
||
2D845F5E000
|
heap
|
page read and write
|
||
2D8468BD000
|
heap
|
page read and write
|
||
2D846300000
|
heap
|
page read and write
|
||
2D8468C3000
|
heap
|
page read and write
|
||
F35C3FD000
|
stack
|
page read and write
|
||
2D8462C3000
|
heap
|
page read and write
|
||
1EF87113000
|
heap
|
page read and write
|
||
2D845DB7000
|
heap
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
2D8465A0000
|
heap
|
page read and write
|
||
2D845D0B000
|
heap
|
page read and write
|
||
2D84403E000
|
heap
|
page read and write
|
||
1EF87102000
|
heap
|
page read and write
|
||
2D845C82000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
2D84680F000
|
heap
|
page read and write
|
||
2D845F4D000
|
heap
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
2D8464DE000
|
heap
|
page read and write
|
||
2D846647000
|
heap
|
page read and write
|
||
2D84623B000
|
heap
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
1DA2000
|
trusted library allocation
|
page read and write
|
||
2D845E59000
|
heap
|
page read and write
|
||
2D843F0E000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
2D845E98000
|
heap
|
page read and write
|
||
2D846436000
|
heap
|
page read and write
|
||
2D843FF9000
|
heap
|
page read and write
|
||
2D844042000
|
heap
|
page read and write
|
||
2D84653C000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
2D845D0A000
|
heap
|
page read and write
|
||
2D845E16000
|
heap
|
page read and write
|
||
2D8463BF000
|
heap
|
page read and write
|
||
24CC000
|
stack
|
page read and write
|
||
2D84682C000
|
heap
|
page read and write
|
||
2EE6000
|
heap
|
page read and write
|
||
2D846759000
|
heap
|
page read and write
|
||
C88E3F8000
|
stack
|
page read and write
|
||
2D8460A0000
|
heap
|
page read and write
|
||
2D846791000
|
heap
|
page read and write
|
||
2D845D7A000
|
heap
|
page read and write
|
||
2D84403E000
|
heap
|
page read and write
|
||
2D84603E000
|
heap
|
page read and write
|
||
2D845FB7000
|
heap
|
page read and write
|
||
2D846118000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2D84401E000
|
heap
|
page read and write
|
||
2D845F5E000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D845E4A000
|
heap
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
2D8466EE000
|
heap
|
page read and write
|
||
2D845FEE000
|
heap
|
page read and write
|
||
2D846734000
|
heap
|
page read and write
|
||
2D846725000
|
heap
|
page read and write
|
||
2D8465C8000
|
heap
|
page read and write
|
||
2D846825000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2D84681E000
|
heap
|
page read and write
|
||
2D846321000
|
heap
|
page read and write
|
||
2D84671D000
|
heap
|
page read and write
|
||
2D84402E000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
1EF87099000
|
heap
|
page read and write
|
||
2D8461FF000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D846178000
|
heap
|
page read and write
|
||
2D84633D000
|
heap
|
page read and write
|
||
2D846178000
|
heap
|
page read and write
|
||
2FF8000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
2D84639C000
|
heap
|
page read and write
|
||
2D846220000
|
heap
|
page read and write
|
||
1EF86F10000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
2D8462FE000
|
heap
|
page read and write
|
||
2D84625D000
|
heap
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
2D845F13000
|
heap
|
page read and write
|
||
2D844026000
|
heap
|
page read and write
|
||
2D84685B000
|
heap
|
page read and write
|
||
2D845D70000
|
heap
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
2EDA000
|
heap
|
page read and write
|
||
2D846798000
|
heap
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
1E00000
|
heap
|
page read and write
|
||
2D846613000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2D846291000
|
heap
|
page read and write
|
||
2D845900000
|
remote allocation
|
page read and write
|
||
2D845FBB000
|
heap
|
page read and write
|
||
2D8462DC000
|
heap
|
page read and write
|
||
2D846564000
|
heap
|
page read and write
|
||
2D846825000
|
heap
|
page read and write
|
||
2D845E65000
|
heap
|
page read and write
|
||
2D845DAF000
|
heap
|
page read and write
|
||
2D845F52000
|
heap
|
page read and write
|
||
2D845D13000
|
heap
|
page read and write
|
||
2D84602C000
|
heap
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
2D84658E000
|
heap
|
page read and write
|
||
2D846356000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
2D846784000
|
heap
|
page read and write
|
||
2D846298000
|
heap
|
page read and write
|
||
2D8461DE000
|
heap
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
2D846568000
|
heap
|
page read and write
|
||
2D845F18000
|
heap
|
page read and write
|
||
2D843FAA000
|
heap
|
page read and write
|
||
2D844029000
|
heap
|
page read and write
|
||
2D846138000
|
heap
|
page read and write
|
||
2D84611E000
|
heap
|
page read and write
|
||
2D84651F000
|
heap
|
page read and write
|
||
4B9000
|
heap
|
page read and write
|
||
2D8465AA000
|
heap
|
page read and write
|
||
2D84675B000
|
heap
|
page read and write
|
||
2D845D90000
|
heap
|
page read and write
|
||
2D845F94000
|
heap
|
page read and write
|
||
C88E1F7000
|
stack
|
page read and write
|
||
50A000
|
heap
|
page read and write
|
||
2D8467AE000
|
heap
|
page read and write
|
||
2D846547000
|
heap
|
page read and write
|
||
2D84605D000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
2D846321000
|
heap
|
page read and write
|
||
2D8466C4000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
2D845EFA000
|
heap
|
page read and write
|
||
2D8460BA000
|
heap
|
page read and write
|
||
F35BBFE000
|
stack
|
page read and write
|
||
2D845F98000
|
heap
|
page read and write
|
||
2D846012000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
2D846543000
|
heap
|
page read and write
|
||
2D8460DF000
|
heap
|
page read and write
|
||
2D843FF2000
|
heap
|
page read and write
|
||
2D844057000
|
heap
|
page read and write
|
||
2D845EFA000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
2D8462D5000
|
heap
|
page read and write
|
||
2D8465A0000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
F35BAF7000
|
stack
|
page read and write
|
||
2D8460FD000
|
heap
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
2D84619E000
|
heap
|
page read and write
|
||
2D846721000
|
heap
|
page read and write
|
||
2D845C8B000
|
heap
|
page read and write
|
||
2D846400000
|
heap
|
page read and write
|
||
2EE6000
|
heap
|
page read and write
|
||
2D845E4E000
|
heap
|
page read and write
|
||
2D846201000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
2D8460DE000
|
heap
|
page read and write
|
||
2D843F8D000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page readonly
|
||
2D84626F000
|
heap
|
page read and write
|
||
2D846419000
|
heap
|
page read and write
|
||
2D8460F8000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D84645A000
|
heap
|
page read and write
|
||
2D845C83000
|
heap
|
page read and write
|
||
2D845D4E000
|
heap
|
page read and write
|
||
2D843F07000
|
heap
|
page read and write
|
||
2D8461B8000
|
heap
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
2D84653C000
|
heap
|
page read and write
|
||
2D8465FF000
|
heap
|
page read and write
|
||
2D845E5F000
|
heap
|
page read and write
|
||
EC5000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
2D843FAD000
|
heap
|
page read and write
|
||
2D845DB4000
|
heap
|
page read and write
|
||
2D846541000
|
heap
|
page read and write
|
||
2D84653C000
|
heap
|
page read and write
|
||
CDC000
|
heap
|
page read and write
|
||
2D845D0E000
|
heap
|
page read and write
|
||
2D845FF3000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
1EF86F00000
|
heap
|
page read and write
|
||
2D846761000
|
heap
|
page read and write
|
||
2EE6000
|
heap
|
page read and write
|
||
ED5000
|
trusted library allocation
|
page read and write
|
||
2D846568000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D8461F9000
|
heap
|
page read and write
|
||
2D84633D000
|
heap
|
page read and write
|
||
2D845F30000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2D845F13000
|
heap
|
page read and write
|
||
2D84600D000
|
heap
|
page read and write
|
||
2D84645A000
|
heap
|
page read and write
|
||
2D844007000
|
heap
|
page read and write
|
||
C88DF7E000
|
stack
|
page read and write
|
||
2D846829000
|
heap
|
page read and write
|
||
2D845D52000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
2D846788000
|
heap
|
page read and write
|
||
2D845C7B000
|
heap
|
page read and write
|
||
2D846071000
|
heap
|
page read and write
|
||
2D846360000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
2D8462B3000
|
heap
|
page read and write
|
||
C88E6FF000
|
stack
|
page read and write
|
||
2D846547000
|
heap
|
page read and write
|
||
1EF87039000
|
heap
|
page read and write
|
||
2D8460BA000
|
heap
|
page read and write
|
||
2D845CD2000
|
heap
|
page read and write
|
||
2D845CD7000
|
heap
|
page read and write
|
||
2D84680C000
|
heap
|
page read and write
|
||
2D846178000
|
heap
|
page read and write
|
||
2D8467A7000
|
heap
|
page read and write
|
||
2D846692000
|
heap
|
page read and write
|
||
2D8468D0000
|
heap
|
page read and write
|
||
2D8465A7000
|
heap
|
page read and write
|
||
2D8465C8000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
2D846138000
|
heap
|
page read and write
|
||
2D846515000
|
heap
|
page read and write
|
||
2D84621A000
|
heap
|
page read and write
|
||
2D846012000
|
heap
|
page read and write
|
||
2D843FAA000
|
heap
|
page read and write
|
||
2D845D79000
|
heap
|
page read and write
|
||
2D8467BC000
|
heap
|
page read and write
|
||
2D846046000
|
heap
|
page read and write
|
||
2D845D71000
|
heap
|
page read and write
|
||
D7A000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
2D8465FA000
|
heap
|
page read and write
|
||
2D8461BE000
|
heap
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
2D846291000
|
heap
|
page read and write
|
||
2D846482000
|
heap
|
page read and write
|
||
2D845C76000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
2D845D92000
|
heap
|
page read and write
|
||
2CDB000
|
stack
|
page read and write
|
||
2D845DEC000
|
heap
|
page read and write
|
||
1EF87815000
|
heap
|
page read and write
|
||
2D846515000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
2D8463B8000
|
heap
|
page read and write
|
||
2D8467BC000
|
heap
|
page read and write
|
||
2D845E12000
|
heap
|
page read and write
|
||
2D846356000
|
heap
|
page read and write
|
||
2D843FAB000
|
heap
|
page read and write
|
||
2D8465C9000
|
heap
|
page read and write
|
||
2D845C90000
|
heap
|
page read and write
|
||
2D846430000
|
heap
|
page read and write
|
||
2D8463B8000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2D846158000
|
heap
|
page read and write
|
||
2EE4000
|
heap
|
page read and write
|
||
2D846198000
|
heap
|
page read and write
|
||
2D84681E000
|
heap
|
page read and write
|
||
1EF8704B000
|
heap
|
page read and write
|
||
2D845FB2000
|
heap
|
page read and write
|
||
2D84403E000
|
heap
|
page read and write
|
||
1EF87000000
|
heap
|
page read and write
|
||
2D846065000
|
heap
|
page read and write
|
||
2D84627D000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
2D845F76000
|
heap
|
page read and write
|
||
F35C5FB000
|
stack
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
2D84615E000
|
heap
|
page read and write
|
||
2D84405D000
|
heap
|
page read and write
|
||
1E8E000
|
stack
|
page read and write
|
||
2D84623B000
|
heap
|
page read and write
|
||
2D8466A0000
|
heap
|
page read and write
|
||
2D8466FE000
|
heap
|
page read and write
|
||
2D845C98000
|
heap
|
page read and write
|
||
2D8466CF000
|
heap
|
page read and write
|
||
2D845E59000
|
heap
|
page read and write
|
||
2D845ED9000
|
heap
|
page read and write
|
||
2D8465FF000
|
heap
|
page read and write
|
||
2D846658000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2D8460FE000
|
heap
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
2D84646E000
|
heap
|
page read and write
|
||
2D84631A000
|
heap
|
page read and write
|
||
2F3F000
|
heap
|
page read and write
|
||
2D843F8C000
|
heap
|
page read and write
|
||
2D845F30000
|
heap
|
page read and write
|
||
2D845CCE000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2D845D1B000
|
heap
|
page read and write
|
||
2D846273000
|
heap
|
page read and write
|
||
2D84400A000
|
heap
|
page read and write
|
||
2D846520000
|
heap
|
page read and write
|
||
2D845DD0000
|
heap
|
page read and write
|
||
2D843F0E000
|
heap
|
page read and write
|
||
2D84400A000
|
heap
|
page read and write
|
||
2D84660A000
|
heap
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
2D845F99000
|
heap
|
page read and write
|
||
2D845CCF000
|
heap
|
page read and write
|
||
2D846412000
|
heap
|
page read and write
|
||
2D84672B000
|
heap
|
page read and write
|
||
2D846039000
|
heap
|
page read and write
|
||
2D845D94000
|
heap
|
page read and write
|
||
2D845E6C000
|
heap
|
page read and write
|
||
2D846545000
|
heap
|
page read and write
|
||
2D8461DF000
|
heap
|
page read and write
|
||
2D846471000
|
heap
|
page read and write
|
||
180016000
|
unkown
|
page readonly
|
||
2D845DD4000
|
heap
|
page read and write
|
||
2D84609B000
|
heap
|
page read and write
|
||
2D84646E000
|
heap
|
page read and write
|
||
2D845D4E000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
2D84639C000
|
heap
|
page read and write
|
||
2D8462F7000
|
heap
|
page read and write
|
||
2D84670F000
|
heap
|
page read and write
|
||
2D843F0E000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
2D84606B000
|
heap
|
page read and write
|
||
2D84679D000
|
heap
|
page read and write
|
||
2D84605E000
|
heap
|
page read and write
|
||
2D845C7D000
|
heap
|
page read and write
|
||
2D843FA7000
|
heap
|
page read and write
|
||
2D8464DF000
|
heap
|
page read and write
|
||
2D845CFB000
|
heap
|
page read and write
|
||
2D845CB3000
|
heap
|
page read and write
|
||
2D845CF6000
|
heap
|
page read and write
|
||
2D84656B000
|
heap
|
page read and write
|
||
2D84617E000
|
heap
|
page read and write
|
||
2D8466D6000
|
heap
|
page read and write
|
||
2D84651E000
|
heap
|
page read and write
|
||
2D845F76000
|
heap
|
page read and write
|
||
2D8466F7000
|
heap
|
page read and write
|
||
2D8468C1000
|
heap
|
page read and write
|
||
2D8466B3000
|
heap
|
page read and write
|
||
2D845E54000
|
heap
|
page read and write
|
||
2D846070000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
2D845E16000
|
heap
|
page read and write
|
||
2D845DEC000
|
heap
|
page read and write
|
||
2D8463F5000
|
heap
|
page read and write
|
||
2D8462F7000
|
heap
|
page read and write
|
||
2D84641A000
|
heap
|
page read and write
|
||
2D845FD0000
|
heap
|
page read and write
|
||
2D8466E7000
|
heap
|
page read and write
|
||
2D845CE2000
|
heap
|
page read and write
|
||
C88DE7E000
|
stack
|
page read and write
|
||
2D845E70000
|
heap
|
page read and write
|
||
2D845CDE000
|
heap
|
page read and write
|
||
2D84631A000
|
heap
|
page read and write
|
||
2D845DB8000
|
heap
|
page read and write
|
||
2EFD000
|
heap
|
page read and write
|
||
2D845DA7000
|
heap
|
page read and write
|
||
2D846379000
|
heap
|
page read and write
|
||
2D846372000
|
heap
|
page read and write
|
||
2D84617E000
|
heap
|
page read and write
|
||
2D84666E000
|
heap
|
page read and write
|
||
2D845CB3000
|
heap
|
page read and write
|
||
2D846570000
|
heap
|
page read and write
|
||
2D84606B000
|
heap
|
page read and write
|
||
2D8464E7000
|
heap
|
page read and write
|
||
2D845D99000
|
heap
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
2D846691000
|
heap
|
page read and write
|
||
2D846503000
|
heap
|
page read and write
|
||
2D8465A7000
|
heap
|
page read and write
|
||
2D84675E000
|
heap
|
page read and write
|
||
2D84403E000
|
heap
|
page read and write
|
||
2D845FD5000
|
heap
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
2D8463BF000
|
heap
|
page read and write
|
||
2D843F96000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
2D843F87000
|
heap
|
page read and write
|
||
2D845C92000
|
heap
|
page read and write
|
||
2D845EDE000
|
heap
|
page read and write
|
||
2D846031000
|
heap
|
page read and write
|
There are 885 hidden memdumps, click here to show them.