Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO2737478834ORDER.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Berni72\PO2737478834ORDER.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Habitters.Hej
|
ASCII text, with very long lines (54181), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jsllekrm.5tn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4d5lkwh.skb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozglue.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsxE304.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Berni72\PO2737478834ORDER.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Berni72\tipple.tak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Hurtfully.Skr
|
hp200 (68010) BSD
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Pronominalize.nic
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Sialostenosis230.iso
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\amtstue.sub
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\bevidsthedsdannende.syn
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\brnderen.gun
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\spalteformens\conducing.red
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\elvinus.bkk
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\fodlanges.txt
|
ASCII text, with very long lines (319), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\fodsaalerne.ima
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\nomophylax.lop
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\overfrankere.akt
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\poetizer.pon
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\snidest.epe
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\KxpssdC.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\cifBtkd.tmp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\ef.CnFA.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\rDrheBe.tmp
|
JSON data
|
dropped
|
There are 23 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PO2737478834ORDER.exe
|
"C:\Users\user\Desktop\PO2737478834ORDER.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Akteret=Get-Content 'C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Habitters.Hej';$Engraphy=$Akteret.SubString(54172,3);.$Engraphy($Akteret)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.mozilla.com/en-US/blocklist/
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://72.11.156.201/VyNLorvhdmohGewWLK21.bin
|
72.11.156.201
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/syohex/java-simple-mine-sweeperC:
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mad.pzg-peru.com
|
31.192.107.180
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
31.192.107.180
|
mad.pzg-peru.com
|
Russian Federation
|
||
72.11.156.201
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
|
MaxConnectionsPer1_0Server
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
|
MaxConnectionsPerServer
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
219B2000
|
heap
|
page read and write
|
||
A28F000
|
direct allocation
|
page execute and read and write
|
||
21C0C000
|
heap
|
page read and write
|
||
4F39000
|
heap
|
page read and write
|
||
21827000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
6431000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
51C7000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
218DC000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2176A000
|
heap
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
32D5000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6FE92000
|
unkown
|
page readonly
|
||
6A4000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
215C0000
|
direct allocation
|
page read and write
|
||
2117C000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6ED92000
|
unkown
|
page read and write
|
||
216F0000
|
direct allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
210A7000
|
heap
|
page read and write
|
||
352E000
|
unkown
|
page read and write
|
||
7AA2000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7F0F0000
|
trusted library allocation
|
page execute and read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
700D1000
|
unkown
|
page execute read
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
215C0000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21D19000
|
direct allocation
|
page read and write
|
||
21D14000
|
direct allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
75C0000
|
direct allocation
|
page read and write
|
||
4F44000
|
heap
|
page read and write
|
||
21EC4000
|
direct allocation
|
page read and write
|
||
4F78000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21E97000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
2057B000
|
stack
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page readonly
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
8F10000
|
trusted library allocation
|
page execute and read and write
|
||
21051000
|
heap
|
page read and write
|
||
8AA5000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21858000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
211A7000
|
heap
|
page read and write
|
||
215F0000
|
heap
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
8D17000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
2118B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
65DC000
|
trusted library allocation
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
21760000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
4F6B000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21D53000
|
direct allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
6D6CB000
|
unkown
|
page readonly
|
||
21A0E000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
216F0000
|
direct allocation
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
heap
|
page execute and read and write
|
||
3481000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
21986000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
215C0000
|
direct allocation
|
page read and write
|
||
21EC1000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
20720000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F78000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
2176F000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21905000
|
heap
|
page read and write
|
||
21EAA000
|
direct allocation
|
page read and write
|
||
210A7000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21959000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
210A7000
|
heap
|
page read and write
|
||
75D0000
|
direct allocation
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
21740000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
8C9E000
|
stack
|
page read and write
|
||
21D77000
|
direct allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F96000
|
heap
|
page read and write
|
||
21F99000
|
direct allocation
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
6FF70000
|
unkown
|
page readonly
|
||
3570000
|
direct allocation
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
8A0E000
|
stack
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21891000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
7C6E000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
6FE90000
|
unkown
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
445000
|
unkown
|
page readonly
|
||
4F4D000
|
heap
|
page read and write
|
||
20450000
|
heap
|
page read and write
|
||
5429000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21099000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
2105E000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
89C0000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
8CE0000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7620000
|
direct allocation
|
page read and write
|
||
7587000
|
trusted library allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
7820000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F14000
|
heap
|
page read and write
|
||
202ED000
|
stack
|
page read and write
|
||
752F000
|
stack
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
8D24000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6D594000
|
unkown
|
page readonly
|
||
20B80000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
218F2000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
35B0000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
22EF000
|
stack
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
219A9000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
6D57F000
|
unkown
|
page readonly
|
||
4F5C000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
3680000
|
trusted library allocation
|
page read and write
|
||
65C9000
|
trusted library allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4E000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
6FF81000
|
unkown
|
page readonly
|
||
4F5C000
|
heap
|
page read and write
|
||
8F30000
|
direct allocation
|
page execute and read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F73000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
8F00000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
215C0000
|
direct allocation
|
page read and write
|
||
8D40000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
8F40000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
216F0000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21A5E000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
218A0000
|
trusted library allocation
|
page read and write
|
||
8F20000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21D7C000
|
direct allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
218A0000
|
direct allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
21D33000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
6FF80000
|
unkown
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
2105F000
|
heap
|
page read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
202AF000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
433000
|
unkown
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
6ED8D000
|
unkown
|
page readonly
|
||
690000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
211A8000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F78000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
7B90000
|
heap
|
page read and write
|
||
4F4E000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21764000
|
heap
|
page read and write
|
||
52FC000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
8D4E000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
898E000
|
stack
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
36A2000
|
trusted library allocation
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6FFF2000
|
unkown
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
8D3C000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
6D5A0000
|
unkown
|
page readonly
|
||
4F4D000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2314000
|
heap
|
page read and write
|
||
7F20000
|
trusted library allocation
|
page execute and read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
7C53000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
4F44000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
2176E000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
217F4000
|
heap
|
page read and write
|
||
8D00000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F79000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page readonly
|
||
6ED71000
|
unkown
|
page execute read
|
||
21151000
|
heap
|
page read and write
|
||
700D0000
|
unkown
|
page readonly
|
||
7DFE000
|
stack
|
page read and write
|
||
4F53000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6D58F000
|
unkown
|
page read and write
|
||
2176B000
|
heap
|
page read and write
|
||
21AF9000
|
heap
|
page read and write
|
||
2FFE000
|
unkown
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
21F91000
|
direct allocation
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
85F000
|
stack
|
page read and write
|
||
218AF000
|
heap
|
page read and write
|
||
3673000
|
trusted library allocation
|
page execute and read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21769000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
21051000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F49000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4ED8000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
3960000
|
remote allocation
|
page execute and read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
96B0000
|
direct allocation
|
page execute and read and write
|
||
8CDC000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
75A0000
|
direct allocation
|
page read and write
|
||
21764000
|
heap
|
page read and write
|
||
8CEA000
|
heap
|
page read and write
|
||
4F5D000
|
heap
|
page read and write
|
||
21590000
|
direct allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21050000
|
heap
|
page read and write
|
||
21590000
|
direct allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
215E0000
|
direct allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
7BB9000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
6D541000
|
unkown
|
page execute read
|
||
6FE89000
|
unkown
|
page readonly
|
||
690000
|
heap
|
page read and write
|
||
2036E000
|
stack
|
page read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
heap
|
page execute and read and write
|
||
6459000
|
trusted library allocation
|
page read and write
|
||
700D4000
|
unkown
|
page readonly
|
||
21150000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
215C0000
|
direct allocation
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
6D540000
|
unkown
|
page readonly
|
||
4CF5000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
7F6B000
|
stack
|
page read and write
|
||
4FB4000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
204AD000
|
stack
|
page read and write
|
||
4F53000
|
heap
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21509000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
203AE000
|
stack
|
page read and write
|
||
4F78000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F59000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
6FF90000
|
unkown
|
page readonly
|
||
345E000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page execute and read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
7BC9000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
7595000
|
heap
|
page execute and read and write
|
||
36A5000
|
trusted library allocation
|
page execute and read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
215C0000
|
direct allocation
|
page read and write
|
||
21D00000
|
direct allocation
|
page read and write
|
||
36A0000
|
trusted library allocation
|
page read and write
|
||
8EE0000
|
trusted library allocation
|
page execute and read and write
|
||
2176A000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page execute and read and write
|
||
2032D000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
8A20000
|
trusted library allocation
|
page read and write
|
||
649D000
|
trusted library allocation
|
page read and write
|
||
21EA1000
|
direct allocation
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4F4D000
|
heap
|
page read and write
|
||
369A000
|
trusted library allocation
|
page execute and read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
8900000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21D22000
|
direct allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
6D6C6000
|
unkown
|
page read and write
|
||
21700000
|
direct allocation
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
35E0000
|
direct allocation
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
21730000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page readonly
|
||
4F6B000
|
heap
|
page read and write
|
||
4F77000
|
heap
|
page read and write
|
||
21E00000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
7C2E000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
347E000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
218B0000
|
direct allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2766000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
21882000
|
heap
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
3478000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
7A8F000
|
stack
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21D79000
|
direct allocation
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
21AB8000
|
heap
|
page read and write
|
||
3640000
|
trusted library section
|
page read and write
|
||
8920000
|
trusted library allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
5C84000
|
trusted library allocation
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
2040E000
|
stack
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page readonly
|
||
325C000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6D5A1000
|
unkown
|
page execute read
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
21BBF000
|
heap
|
page read and write
|
||
4F57000
|
heap
|
page read and write
|
||
218A0000
|
trusted library allocation
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
2116E000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
21740000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
8990000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
88F7000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
3298000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6FE70000
|
unkown
|
page readonly
|
||
7C62000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7C39000
|
heap
|
page read and write
|
||
6FFF8000
|
unkown
|
page readonly
|
||
2073C000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6439000
|
trusted library allocation
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
2026E000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2135E000
|
heap
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page execute and read and write
|
||
57E000
|
stack
|
page read and write
|
||
7C3B000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
20BC3000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21475000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
3B3F000
|
remote allocation
|
page execute and read and write
|
||
3427000
|
heap
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
7E3D000
|
stack
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21FA1000
|
direct allocation
|
page read and write
|
||
4EFF000
|
heap
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7630000
|
direct allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
6ED70000
|
unkown
|
page readonly
|
||
21051000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
213E7000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
21B56000
|
heap
|
page read and write
|
||
2195D000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
21F00000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
453F000
|
remote allocation
|
page execute and read and write
|
||
69C000
|
heap
|
page read and write
|
||
7F10000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
2105E000
|
heap
|
page read and write
|
||
3650000
|
trusted library section
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
2176D000
|
heap
|
page read and write
|
||
4A0F000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
8D43000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
6ED93000
|
unkown
|
page readonly
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
21750000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
6FFF5000
|
unkown
|
page readonly
|
||
450000
|
heap
|
page read and write
|
||
21D7F000
|
direct allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
6FE71000
|
unkown
|
page execute read
|
||
21051000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F4E000
|
heap
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21C00000
|
direct allocation
|
page read and write
|
||
700D3000
|
unkown
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
2044F000
|
stack
|
page read and write
|
||
33F8000
|
heap
|
page read and write
|
||
8C0C000
|
stack
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4FA5000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
700D2000
|
unkown
|
page readonly
|
||
4F53000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F49000
|
heap
|
page read and write
|
||
21EBF000
|
direct allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
21470000
|
direct allocation
|
page execute and read and write
|
||
4F78000
|
heap
|
page read and write
|
||
6D690000
|
unkown
|
page readonly
|
||
3300000
|
heap
|
page read and write
|
||
21151000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
21761000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21765000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page readonly
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
205AC000
|
stack
|
page read and write
|
||
21763000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
218A0000
|
trusted library allocation
|
page read and write
|
||
6FF71000
|
unkown
|
page execute read
|
||
69C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
8D5C000
|
heap
|
page read and write
|
||
2105E000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
21D12000
|
direct allocation
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
218A0000
|
direct allocation
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
2119A000
|
heap
|
page read and write
|
||
36F8000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page execute and read and write
|
||
3674000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
211A8000
|
heap
|
page read and write
|
||
75B0000
|
direct allocation
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
210A7000
|
heap
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
8D0C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
988F000
|
direct allocation
|
page execute and read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
4F5C000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
4F87000
|
heap
|
page read and write
|
||
21806000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
21D1F000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
2109A000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
21D0C000
|
direct allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
36C0000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
361C000
|
stack
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F6A000
|
heap
|
page read and write
|
||
21D63000
|
direct allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
356E000
|
unkown
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
367D000
|
trusted library allocation
|
page execute and read and write
|
||
204EB000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
4F5C000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
21051000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
21921000
|
heap
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
6FF91000
|
unkown
|
page execute read
|
||
4F6B000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
8C4C000
|
stack
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
There are 998 hidden memdumps, click here to show them.