Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DouWan-Video-Setup-En-4.3.0.3-x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Program Files\douwan\DouWan.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\AdbWinApi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\AdbWinUsbApi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\AirPlayInput.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\EndUserLicenseAgreement.rtf
|
Rich Text Format data, version 1, ANSI, code page 936, default middle east language ID 1025
|
dropped
|
||
C:\Program Files\douwan\Qt5Core.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\Qt5Gui.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\Qt5Network.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\Qt5Svg.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\Qt5Widgets.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\SDL2.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Program Files\douwan\SoftwareLicence.txt
|
ISO-8859 text, with very long lines (489), with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\VCam\default.png
|
PNG image data, 1920 x 1080, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\VCam\default_p.png
|
PNG image data, 1080 x 1920, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\VCam\douwan-virtualaud32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\VCam\douwan-virtualaud64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\VCam\douwan-virtualcam32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\VCam\douwan-virtualcam64.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\adb.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-multibyte-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-private-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\avcodec-58.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\avformat-58.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\avutil-56.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\bearer\qgenericbearer.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\concrt140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\d3dcompiler_47.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\d3dx9_43.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\dashboard\dashboard.css
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\dashboard.html
|
HTML document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\icon\details.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files\douwan\dashboard\icon\edit.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files\douwan\dashboard\icon\group.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\DlgDeviceGroupEditor.min.js
|
C++ source, Unicode text, UTF-8 text, with very long lines (643), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\DlgDevicePreview.min.js
|
C++ source, Unicode text, UTF-8 text, with very long lines (1189), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\DlgGroupEditor.min.js
|
C++ source, ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\api.min.js
|
ASCII text, with very long lines (2438), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\app.min.js
|
Unicode text, UTF-8 text, with very long lines (6597), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\deviceGrid.min.js
|
ASCII text, with very long lines (5548), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\deviceGridItem.min.js
|
Unicode text, UTF-8 text, with very long lines (4801), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\deviceGroupServ.min.js
|
C++ source, Unicode text, UTF-8 text, with very long lines (2365), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\deviceServ.min.js
|
C++ source, ASCII text, with very long lines (416), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\js\ws.min.js
|
Unicode text, UTF-8 text, with very long lines (2446), with no line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\CORS
|
very short file (no magic)
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\css\icon.css
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\eleTree.js
|
Unicode text, UTF-8 text, with very long lines (48612), with CRLF, NEL line terminators
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.eot
|
Embedded OpenType (EOT), icomoon family
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.ttf
|
TrueType Font data, 11 tables, 1st "OS/2", 14 names, Macintosh, type 1 string, icomoon
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.woff
|
Web Open Font Format, TrueType, length 7120, version 0.0
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\checkFull.png
|
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\checkHalf.png
|
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\checkNone.png
|
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\dropdownOff.png
|
PNG image data, 29 x 29, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\dropdownOn.png
|
PNG image data, 29 x 29, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\fold.jpg
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x16, components 3
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\fold.png
|
PNG image data, 13 x 16, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\leaf.jpg
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x16, components 3
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\leaf.png
|
PNG image data, 13 x 16, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\radioCheck.png
|
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\dashboard\vendors\eleTree\images\radioCheckNone.png
|
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files\douwan\douwan.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\douwanaudio.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\iconengines\qsvgicon.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qgif.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qicns.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qico.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qjpeg.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qpdf.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qsvg.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qtga.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qtiff.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qwbmp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\imageformats\qwebp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\libEGL.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\libGLESv2.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\libairplay.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\libcrypto-1_1-x64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\libssl-1_1-x64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\libyuv.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\mDNSResponder.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcp120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcp140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcp140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcp140_2.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcp140_atomic_wait.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcp140_codecvt_ids.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcr120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\msvcrt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\opengl32sw.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\platforms\qwindows.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\plugins\64bit\win-wasapi.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\plugins\64bit\xindawn-audio.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\plugins\64bit\xindawn-output.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\restful\api.html
|
HTML document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\restful\api.js
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\restful\help.html
|
HTML document, Unicode text, UTF-8 text, with very long lines (549), with CRLF line terminators
|
dropped
|
||
C:\Program Files\douwan\styles\qwindowsvistastyle.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\swresample-3.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\swscale-5.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\translations\qt_ar.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_bg.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_ca.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_cs.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_da.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_de.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_en.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_es.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_fi.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_fr.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_gd.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_he.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_hu.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_it.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_ja.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_ko.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_lv.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_pl.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_ru.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_sk.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_tr.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_uk.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\translations\qt_zh_TW.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files\douwan\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\uninst.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Program Files\douwan\updater.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\vcam.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\vccorlib140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\vcruntime140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\vcruntime140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\w32-pthreads.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\douwan\zlib.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DouWan.exe_67477162ff25c5ce03785a08b739eb36875429_b90f673a_e36fff6b-09c9-41d3-9ef3-8044ffc3c43d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC3A.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Jul 3 16:01:25 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE3F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE7E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\DouWan\groups.conf (copy)
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\DouWan\groups.conf.RafUQu
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\DouWan\groups.conf.lock
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\DouWan\userdefaults.conf (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\DouWan\userdefaults.conf.QUKaGC
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\DouWan\userdefaults.conf.lock
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libusb0.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libusbK.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\FindProcDLL.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\InstallOptions.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\ioSpecial.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\modern-wizard.bmp
|
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\winusbcoinstaller2.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xindawn_list.log
|
ASCII text, with very long lines (376), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DouWan\DouWan.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Sun Apr 28 02:59:08 2024, mtime=Wed Jul 3 15:00:48 2024, atime=Sun Apr 28 02:59:08 2024, length=19631720, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DouWan\Uninstall DouWan.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\Desktop\DouWan.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Sun Apr 28 02:59:08 2024, mtime=Wed Jul 3 15:01:05 2024, atime=Sun Apr 28 02:59:08 2024, length=19631720, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 185 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DouWan-Video-Setup-En-4.3.0.3-x64.exe
|
"C:\Users\user\Desktop\DouWan-Video-Setup-En-4.3.0.3-x64.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh advfirewall firewall add rule name="DouWan" dir=in action=allow program="C:\Program Files\douwan\DouWan.exe"
|
||
C:\Program Files\douwan\DouWan.exe
|
"C:\Program Files\douwan\DouWan.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualcam32.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualaud32.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualcam64.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
/i /s "C:\Program Files\douwan\VCam\douwan-virtualcam64.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualaud64.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
/i /s "C:\Program Files\douwan\VCam\douwan-virtualaud64.dll"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic csproduct get uuid
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 488 -p 6016 -ip 6016
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6016 -s 3156
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://secure.globalsign.net/cacert/ObjectSign.crt09
|
unknown
|
||
https://www.douwan.video/https://www.douwan.video
|
unknown
|
||
http://www.phreedom.org/md5)08:27
|
unknown
|
||
http://repository.certum.pl/cscasha2.cer0
|
unknown
|
||
https://cdn.staticfile.org/axios/1.4.0/axios.min.js
|
unknown
|
||
http://developer.android.com/tools/device.htmlinsufficient
|
unknown
|
||
https://douwan.videoPublisher
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://www.plutinosoft.com/blog/projects/platinumDMR-1.50urn:schemas-upnp-org:metadata-1-0/AVT/urn:u
|
unknown
|
||
http://libwdi.akeo.ie1.3.6.1.5.5.7.2.1http://libwdi-cps.akeo.ieCryptEncodeObjectCreateSelfSignedCert
|
unknown
|
||
https://douwan.video/compatibility
|
unknown
|
||
http://bugreports.qt.io/
|
unknown
|
||
http://www.globalsign.net/repository/0
|
unknown
|
||
http://www.plutinosoft.com/blog/projects/platinum
|
unknown
|
||
https://github.com/hsiangleev/eleTree.git
|
unknown
|
||
https://www.douwan.video
|
unknown
|
||
https://xindawn.douwan.video/0000000012345678TEST
|
unknown
|
||
http://libusb-win32.sourceforge.net
|
unknown
|
||
https://cdn.staticfile.org/layui/2.8.3/layui.js
|
unknown
|
||
https://douwan.video/compatibility.html
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/encodingStyle(res
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://cdn.staticfile.org/layui/2.8.11/css/layui.min.css
|
unknown
|
||
https://streams.videolan.org/upload/
|
unknown
|
||
https://api.douwan.video/v1/app/getMessage?uuid=w61f0b7401cce31b61af8ef16887023fb&softversion=4.3.0.3&limituse=1&language=en-us&lang=en
|
101.200.59.29
|
||
http://qt-project.org/
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
https://cdn.staticfile.org/layui/2.8.3/css/layui.min.css
|
unknown
|
||
http://www.globalsign.net/repository09
|
unknown
|
||
http://sensics.com/osvr
|
unknown
|
||
http://developer.android.com/tools/device.html
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
https://community.freescale.com/message/493287#493287
|
unknown
|
||
https://www.douwan.video/
|
unknown
|
||
http://www.gnu.org/licenses/
|
unknown
|
||
https://xindawn.douwan.video/
|
unknown
|
||
http://www.phreedom.org/md5)
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
https://www.openssl.org/docs/faq.html
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.aiim.org/pdfa/ns/id/
|
unknown
|
||
http://www.gnu.org/philosophy/why-not-lgpl.html
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
https://bugs.freedesktop.org/enter_bug.cgi?product=Mesa
|
unknown
|
||
http://qt.io/licensing/
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
http://www.plutinosoft.com
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.certum.pl/CPS0
|
unknown
|
||
http://www.color.org)
|
unknown
|
||
http://crl.certum.pl/cscasha2.crl0q
|
unknown
|
||
http://libusb.info
|
unknown
|
||
http://cscasha2.ocsp-certum.com04
|
unknown
|
||
http://llvm.org/):
|
unknown
|
||
http://secure.globalsign.net/cacert/PrimObject.crt0
|
unknown
|
||
http://libusb-win32.sourceforge.netd
|
unknown
|
||
http://www.dns-sd.org/ServiceTypes.html
|
unknown
|
||
https://api.douwan.video/v1/app/checkVersion?uuid=w61f0b7401cce31b61af8ef16887023fb&softversion=4.3.0.3&limituse=1&language=en-us&lang=en
|
101.200.59.29
|
||
http://www.zlib.net/D
|
unknown
|
||
http://www.plutinosoft.comDevice
|
unknown
|
||
http://libusb-win32.sourceforge.netb
|
unknown
|
||
https://www.openssl.org/H
|
unknown
|
||
http://libwdi-cps.akeo.ie
|
unknown
|
||
http://qt.io/
|
unknown
|
||
http://fsf.org/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/(res
|
unknown
|
||
http://bugreports.qt.io/_q_receiveReplyensureClientPrefaceSentMicrosoft-IIS/4.Microsoft-IIS/5.Netsca
|
unknown
|
||
http://libusb-win32.sourceforge.netN
|
unknown
|
||
http://www.globalsign.net/repository/03
|
unknown
|
||
https://cdn.staticfile.org/layui/2.8.11/layui.js
|
unknown
|
There are 60 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
usbserver.douwan.video
|
47.104.158.224
|
||
api.douwan.video
|
101.200.59.29
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
47.104.158.224
|
usbserver.douwan.video
|
China
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
101.200.59.29
|
api.douwan.video
|
China
|
||
192.168.2.4
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
DelFwRulePort
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FilterData
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FriendlyName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
CLSID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
|
FilterData
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
ProgramId
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
FileId
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
LowerCaseLongPath
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
LongPathHash
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
Name
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
OriginalFileName
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
Publisher
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
Version
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
BinFileVersion
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
BinaryType
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
ProductName
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
ProductVersion
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
LinkDate
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
BinProductVersion
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
AppxPackageFullName
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
Size
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
Language
|
||
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
|
Usn
|
There are 130 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
612000
|
heap
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
26FEC0B4000
|
heap
|
page read and write
|
||
2172AA79000
|
heap
|
page read and write
|
||
26FEA5C2000
|
heap
|
page read and write
|
||
2172AAF1000
|
heap
|
page read and write
|
||
7FFDF8C60000
|
unkown
|
page readonly
|
||
21728C95000
|
heap
|
page read and write
|
||
2172A25D000
|
heap
|
page read and write
|
||
217224D4000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728DA9000
|
heap
|
page read and write
|
||
26FEA028000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
217294AB000
|
heap
|
page read and write
|
||
26FEA5C7000
|
heap
|
page read and write
|
||
2172B38F000
|
heap
|
page read and write
|
||
2172A7BE000
|
heap
|
page read and write
|
||
21729182000
|
heap
|
page read and write
|
||
21724686000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
7FFE1321D000
|
unkown
|
page readonly
|
||
217290E3000
|
heap
|
page read and write
|
||
2172A149000
|
heap
|
page read and write
|
||
7FFE115C5000
|
unkown
|
page readonly
|
||
26FEA738000
|
heap
|
page read and write
|
||
2172A381000
|
heap
|
page read and write
|
||
2172A81C000
|
heap
|
page read and write
|
||
217245FB000
|
heap
|
page read and write
|
||
2172B3FA000
|
heap
|
page read and write
|
||
2172AB35000
|
heap
|
page read and write
|
||
7FFDF91C8000
|
unkown
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A821000
|
heap
|
page read and write
|
||
2172A73D000
|
heap
|
page read and write
|
||
2172859C000
|
heap
|
page read and write
|
||
21724634000
|
heap
|
page read and write
|
||
2172A4DE000
|
heap
|
page read and write
|
||
5EC000
|
heap
|
page read and write
|
||
26FEA020000
|
heap
|
page read and write
|
||
7FFDFB738000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A130000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172AB37000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728B64000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFE115C3000
|
unkown
|
page readonly
|
||
21728DB1000
|
heap
|
page read and write
|
||
2172B443000
|
heap
|
page read and write
|
||
2172AC84000
|
heap
|
page read and write
|
||
21728AF4000
|
heap
|
page read and write
|
||
21724677000
|
heap
|
page read and write
|
||
21728526000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page read and write
|
||
7FFDFAF68000
|
unkown
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A723000
|
heap
|
page read and write
|
||
2172AC6A000
|
heap
|
page read and write
|
||
7FFE13381000
|
unkown
|
page execute read
|
||
21729327000
|
heap
|
page read and write
|
||
217224F1000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
217294BD000
|
heap
|
page read and write
|
||
7FFE115B7000
|
unkown
|
page readonly
|
||
217294BB000
|
heap
|
page read and write
|
||
7FFDF9164000
|
unkown
|
page readonly
|
||
2769000
|
heap
|
page read and write
|
||
2172A2A6000
|
heap
|
page read and write
|
||
2172AC0C000
|
heap
|
page read and write
|
||
2172B38A000
|
heap
|
page read and write
|
||
26FE9FF6000
|
heap
|
page read and write
|
||
2172A71E000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
6EB1DFB000
|
stack
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
21728B82000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A9EA000
|
heap
|
page read and write
|
||
7FFDFF140000
|
unkown
|
page readonly
|
||
21722450000
|
heap
|
page read and write
|
||
26FEC0A3000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2172AA98000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728E6F000
|
heap
|
page read and write
|
||
2172A92A000
|
heap
|
page read and write
|
||
2172A167000
|
heap
|
page read and write
|
||
21728D2C000
|
heap
|
page read and write
|
||
2172B3EB000
|
heap
|
page read and write
|
||
21728F23000
|
heap
|
page read and write
|
||
2172A927000
|
heap
|
page read and write
|
||
217244E0000
|
trusted library allocation
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
2172A6FC000
|
heap
|
page read and write
|
||
2172A265000
|
heap
|
page read and write
|
||
7FFDF9F04000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
21728E6A000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21728B5B000
|
heap
|
page read and write
|
||
26FE9FD7000
|
heap
|
page read and write
|
||
2172B394000
|
heap
|
page read and write
|
||
2172A7D8000
|
heap
|
page read and write
|
||
2172A0F3000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26FEC0B4000
|
heap
|
page read and write
|
||
217244C3000
|
heap
|
page read and write
|
||
2172250B000
|
heap
|
page read and write
|
||
2172A367000
|
heap
|
page read and write
|
||
6EB38FE000
|
stack
|
page read and write
|
||
21729266000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A716000
|
heap
|
page read and write
|
||
2172A92C000
|
heap
|
page read and write
|
||
2172AAB7000
|
heap
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
2172AA81000
|
heap
|
page read and write
|
||
21724987000
|
heap
|
page read and write
|
||
21728E21000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
217248BC000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
2172B3A7000
|
heap
|
page read and write
|
||
217290F8000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
21728EDA000
|
heap
|
page read and write
|
||
7FFE0E131000
|
unkown
|
page execute read
|
||
2172AADF000
|
heap
|
page read and write
|
||
2172A14E000
|
heap
|
page read and write
|
||
2172A8F4000
|
heap
|
page read and write
|
||
217292AF000
|
heap
|
page read and write
|
||
2172A96E000
|
heap
|
page read and write
|
||
6EB1743000
|
stack
|
page read and write
|
||
7FFE115D5000
|
unkown
|
page read and write
|
||
217292A2000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A2C0000
|
heap
|
page read and write
|
||
2172A814000
|
heap
|
page read and write
|
||
21728CDE000
|
heap
|
page read and write
|
||
217245E8000
|
heap
|
page read and write
|
||
21728BA9000
|
heap
|
page read and write
|
||
2172A959000
|
heap
|
page read and write
|
||
2172B465000
|
heap
|
page read and write
|
||
2172A8DA000
|
heap
|
page read and write
|
||
2172460E000
|
heap
|
page read and write
|
||
40A000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
217290C9000
|
heap
|
page read and write
|
||
7FFDF9DD0000
|
unkown
|
page readonly
|
||
217243D4000
|
heap
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
7FF625514000
|
unkown
|
page readonly
|
||
2172A843000
|
heap
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
7FF6268E4000
|
unkown
|
page readonly
|
||
4B0000
|
heap
|
page read and write
|
||
21724616000
|
heap
|
page read and write
|
||
217248A7000
|
heap
|
page read and write
|
||
9BD000
|
unkown
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
2172949E000
|
heap
|
page read and write
|
||
21729362000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
217292F8000
|
heap
|
page read and write
|
||
21729168000
|
heap
|
page read and write
|
||
21724987000
|
heap
|
page read and write
|
||
26FEA024000
|
heap
|
page read and write
|
||
217292FD000
|
heap
|
page read and write
|
||
2172442B000
|
heap
|
page read and write
|
||
2172A1F5000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
26FEC0A4000
|
heap
|
page read and write
|
||
7FFE0EB31000
|
unkown
|
page execute read
|
||
612000
|
heap
|
page read and write
|
||
6EB3BFE000
|
stack
|
page read and write
|
||
2172A2AE000
|
heap
|
page read and write
|
||
7FFDF91E0000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
21729112000
|
heap
|
page read and write
|
||
7FFE115D3000
|
unkown
|
page readonly
|
||
7FFE014CE000
|
unkown
|
page readonly
|
||
21724987000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
21728F0E000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A250000
|
heap
|
page read and write
|
||
2172A872000
|
heap
|
page read and write
|
||
21724457000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
21729339000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A447000
|
heap
|
page read and write
|
||
6EB32FE000
|
stack
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172AACC000
|
heap
|
page read and write
|
||
2172713A000
|
heap
|
page read and write
|
||
7FFE148B5000
|
unkown
|
page read and write
|
||
7FFDFAF69000
|
unkown
|
page write copy
|
||
5BC000
|
heap
|
page read and write
|
||
7FFE11500000
|
unkown
|
page readonly
|
||
FB0000
|
heap
|
page read and write
|
||
2172A3B5000
|
heap
|
page read and write
|
||
21728FAD000
|
heap
|
page read and write
|
||
21728C88000
|
heap
|
page read and write
|
||
2172B36D000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A944000
|
heap
|
page read and write
|
||
7FFE115B1000
|
unkown
|
page read and write
|
||
7FFDFA599000
|
unkown
|
page readonly
|
||
2172A50D000
|
heap
|
page read and write
|
||
21728E62000
|
heap
|
page read and write
|
||
21724657000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21724BA2000
|
heap
|
page read and write
|
||
21728BAD000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
7FFDFB011000
|
unkown
|
page execute read
|
||
2767000
|
heap
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172929A000
|
heap
|
page read and write
|
||
7FFE014B9000
|
unkown
|
page readonly
|
||
2172AAF9000
|
heap
|
page read and write
|
||
7FFDF9D4E000
|
unkown
|
page read and write
|
||
2172A145000
|
heap
|
page read and write
|
||
21728D39000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
2172A3C2000
|
heap
|
page read and write
|
||
6EB30FE000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728D75000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFE101D9000
|
unkown
|
page readonly
|
||
217290AF000
|
heap
|
page read and write
|
||
217292C5000
|
heap
|
page read and write
|
||
2172A891000
|
heap
|
page read and write
|
||
26FEA02F000
|
heap
|
page read and write
|
||
21728B9C000
|
heap
|
page read and write
|
||
21728D5B000
|
heap
|
page read and write
|
||
21729355000
|
heap
|
page read and write
|
||
7FFE11BD0000
|
unkown
|
page readonly
|
||
2172A7E5000
|
heap
|
page read and write
|
||
21728D68000
|
heap
|
page read and write
|
||
26FE9F20000
|
trusted library allocation
|
page read and write
|
||
2172A8C8000
|
heap
|
page read and write
|
||
21728E14000
|
heap
|
page read and write
|
||
7FFDF9800000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
21724AE0000
|
trusted library section
|
page readonly
|
||
2172A5D3000
|
heap
|
page read and write
|
||
7FFE0EA70000
|
unkown
|
page readonly
|
||
1430000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172B3E5000
|
heap
|
page read and write
|
||
217224F9000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
26FEA022000
|
heap
|
page read and write
|
||
7FFDF9D48000
|
unkown
|
page write copy
|
||
5C8000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
21722515000
|
heap
|
page read and write
|
||
2172AC55000
|
heap
|
page read and write
|
||
2172AB08000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A87F000
|
heap
|
page read and write
|
||
7FF625F14000
|
unkown
|
page readonly
|
||
7FFE0E130000
|
unkown
|
page readonly
|
||
276D000
|
heap
|
page read and write
|
||
7FFE101D8000
|
unkown
|
page read and write
|
||
7FFDF8C54000
|
unkown
|
page write copy
|
||
2172461A000
|
heap
|
page read and write
|
||
21728B57000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172AA7E000
|
heap
|
page read and write
|
||
2172B39A000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21729259000
|
heap
|
page read and write
|
||
2172B3E0000
|
heap
|
page read and write
|
||
7FFDFFCDF000
|
unkown
|
page readonly
|
||
2172A7AC000
|
heap
|
page read and write
|
||
2172B368000
|
heap
|
page read and write
|
||
21723D7F000
|
direct allocation
|
page execute and read and write
|
||
7FFE130C5000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
21727241000
|
heap
|
page read and write
|
||
2172A8FC000
|
heap
|
page read and write
|
||
2172A67F000
|
heap
|
page read and write
|
||
7FFDFAAD8000
|
unkown
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A7FA000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172AB78000
|
heap
|
page read and write
|
||
2172AB3A000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728576000
|
heap
|
page read and write
|
||
21728CC9000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172A0E2000
|
heap
|
page read and write
|
||
7FFDF9C76000
|
unkown
|
page readonly
|
||
5CD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A9DD000
|
heap
|
page read and write
|
||
2172499E000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21728FC7000
|
heap
|
page read and write
|
||
21724C10000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21724BF7000
|
heap
|
page read and write
|
||
2172713E000
|
heap
|
page read and write
|
||
21724CA7000
|
heap
|
page read and write
|
||
21724D41000
|
heap
|
page read and write
|
||
26FEA724000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172939B000
|
heap
|
page read and write
|
||
2172B429000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
6EB24FC000
|
stack
|
page read and write
|
||
217291DC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21727427000
|
heap
|
page read and write
|
||
26FEA723000
|
heap
|
page read and write
|
||
31AF000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172450C000
|
heap
|
page read and write
|
||
21726990000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
2172926B000
|
heap
|
page read and write
|
||
26FE9FC0000
|
heap
|
page read and write
|
||
2172B3DB000
|
heap
|
page read and write
|
||
217291BE000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
217291C7000
|
heap
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
21729288000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFDFF250000
|
unkown
|
page read and write
|
||
7FFE115B3000
|
unkown
|
page read and write
|
||
2172A91D000
|
heap
|
page read and write
|
||
2172B375000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728B30000
|
heap
|
page read and write
|
||
21728CF8000
|
heap
|
page read and write
|
||
2172464C000
|
heap
|
page read and write
|
||
21722514000
|
heap
|
page read and write
|
||
21724D41000
|
heap
|
page read and write
|
||
2A8B000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
26FEA012000
|
heap
|
page read and write
|
||
2172A7DC000
|
heap
|
page read and write
|
||
26FEA5C0000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
217292AB000
|
heap
|
page read and write
|
||
2172459C000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
2172AADC000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2172A10D000
|
heap
|
page read and write
|
||
85F000
|
stack
|
page read and write
|
||
21728B4A000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFDF8C58000
|
unkown
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172B460000
|
heap
|
page read and write
|
||
21728B1A000
|
heap
|
page read and write
|
||
2172A895000
|
heap
|
page read and write
|
||
21728EC0000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
26FEC0A1000
|
heap
|
page read and write
|
||
2172AA86000
|
heap
|
page read and write
|
||
A8DC727000
|
stack
|
page read and write
|
||
7FFE11BE7000
|
unkown
|
page readonly
|
||
7FFE01471000
|
unkown
|
page execute read
|
||
2172A96B000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21728B6C000
|
heap
|
page read and write
|
||
2172A15A000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3551000
|
heap
|
page read and write
|
||
2172A163000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
21724667000
|
heap
|
page read and write
|
||
2172B3B6000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A947000
|
heap
|
page read and write
|
||
2172450E000
|
heap
|
page read and write
|
||
2172A483000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
2172A738000
|
heap
|
page read and write
|
||
21727258000
|
heap
|
page read and write
|
||
2172A8EF000
|
heap
|
page read and write
|
||
217244F2000
|
heap
|
page read and write
|
||
26FEC0AD000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172AB06000
|
heap
|
page read and write
|
||
2172B35B000
|
heap
|
page read and write
|
||
21725130000
|
heap
|
page read and write
|
||
21728E3B000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
2172AB2A000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728E55000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172AA8E000
|
heap
|
page read and write
|
||
2172A0FC000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172904C000
|
heap
|
page read and write
|
||
6EB29FB000
|
stack
|
page read and write
|
||
2172B46D000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172A0B7000
|
heap
|
page read and write
|
||
21729280000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FF626654000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FF626617000
|
unkown
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
21728655000
|
heap
|
page read and write
|
||
21729203000
|
heap
|
page read and write
|
||
21729208000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2172A925000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
2172B3C6000
|
heap
|
page read and write
|
||
2172A94E000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217248BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728F71000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21729175000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217244FD000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
21729305000
|
heap
|
page read and write
|
||
26FEA02E000
|
heap
|
page read and write
|
||
7FF6268E3000
|
unkown
|
page read and write
|
||
26FE9FF6000
|
heap
|
page read and write
|
||
2172A2D5000
|
heap
|
page read and write
|
||
66705000
|
unkown
|
page readonly
|
||
2172A884000
|
heap
|
page read and write
|
||
21724689000
|
heap
|
page read and write
|
||
2172B37A000
|
heap
|
page read and write
|
||
2172AAB2000
|
heap
|
page read and write
|
||
2172A899000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728E2E000
|
heap
|
page read and write
|
||
611000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172AAAF000
|
heap
|
page read and write
|
||
2172B402000
|
heap
|
page read and write
|
||
7FFDFFCEE000
|
unkown
|
page readonly
|
||
217290A7000
|
heap
|
page read and write
|
||
2172A7CF000
|
heap
|
page read and write
|
||
21728D9C000
|
heap
|
page read and write
|
||
217224A9000
|
heap
|
page read and write
|
||
2172B327000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDF83DC000
|
unkown
|
page read and write
|
||
6EB37FE000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2172A93A000
|
heap
|
page read and write
|
||
2172A95B000
|
heap
|
page read and write
|
||
21728F1B000
|
heap
|
page read and write
|
||
21728601000
|
heap
|
page read and write
|
||
7FFE0EB20000
|
unkown
|
page readonly
|
||
276B000
|
heap
|
page read and write
|
||
2172B3BE000
|
heap
|
page read and write
|
||
2172A490000
|
heap
|
page read and write
|
||
21728B01000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFDF9051000
|
unkown
|
page read and write
|
||
26FEA5CA000
|
heap
|
page read and write
|
||
7FFE0EB58000
|
unkown
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21722502000
|
heap
|
page read and write
|
||
21728AE3000
|
heap
|
page read and write
|
||
2172A116000
|
heap
|
page read and write
|
||
2172A825000
|
heap
|
page read and write
|
||
7FFE115B5000
|
unkown
|
page read and write
|
||
7FFDFF25C000
|
unkown
|
page readonly
|
||
DBA000
|
stack
|
page read and write
|
||
2172B439000
|
heap
|
page read and write
|
||
2172A8A6000
|
heap
|
page read and write
|
||
6EB3CFE000
|
stack
|
page read and write
|
||
7FFDFA582000
|
unkown
|
page read and write
|
||
6EB28FD000
|
stack
|
page read and write
|
||
2172AB15000
|
heap
|
page read and write
|
||
7FFDFAF7C000
|
unkown
|
page write copy
|
||
2172A4F3000
|
heap
|
page read and write
|
||
2172A877000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
21722508000
|
heap
|
page read and write
|
||
21728FE9000
|
heap
|
page read and write
|
||
21724614000
|
heap
|
page read and write
|
||
217294B0000
|
heap
|
page read and write
|
||
26FEC0AE000
|
heap
|
page read and write
|
||
26FEA5C3000
|
heap
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FFE00129000
|
unkown
|
page readonly
|
||
2767000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFE12E11000
|
unkown
|
page execute read
|
||
2172A7D3000
|
heap
|
page read and write
|
||
2172A9C8000
|
heap
|
page read and write
|
||
217292C1000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172AC02000
|
heap
|
page read and write
|
||
2172B3AC000
|
heap
|
page read and write
|
||
21728AE7000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
21728C3F000
|
heap
|
page read and write
|
||
217244F8000
|
heap
|
page read and write
|
||
217290A2000
|
heap
|
page read and write
|
||
2172250B000
|
heap
|
page read and write
|
||
2E22000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A123000
|
heap
|
page read and write
|
||
2172933E000
|
heap
|
page read and write
|
||
227F000
|
stack
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21724689000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
2172B44E000
|
heap
|
page read and write
|
||
2172AC50000
|
heap
|
page read and write
|
||
2172A91A000
|
heap
|
page read and write
|
||
217267F4000
|
heap
|
page read and write
|
||
2172A3FE000
|
heap
|
page read and write
|
||
21724CA9000
|
heap
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
26FEA71C000
|
heap
|
page read and write
|
||
2172B34E000
|
heap
|
page read and write
|
||
21724CAA000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B317000
|
heap
|
page read and write
|
||
7FFE101D0000
|
unkown
|
page readonly
|
||
632000
|
heap
|
page read and write
|
||
2172B3C3000
|
heap
|
page read and write
|
||
2172A8B3000
|
heap
|
page read and write
|
||
21729384000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172AAA7000
|
heap
|
page read and write
|
||
2172A963000
|
heap
|
page read and write
|
||
2172A973000
|
heap
|
page read and write
|
||
21724611000
|
heap
|
page read and write
|
||
2ACB000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A86A000
|
heap
|
page read and write
|
||
7FFE0EB6A000
|
unkown
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21724BF5000
|
heap
|
page read and write
|
||
7FFE14630000
|
unkown
|
page readonly
|
||
2763000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172499E000
|
heap
|
page read and write
|
||
7FFE0EB27000
|
unkown
|
page readonly
|
||
2172B449000
|
heap
|
page read and write
|
||
26FEA19A000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AC72000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
21728EB8000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A2B3000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21724D41000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFE12E15000
|
unkown
|
page read and write
|
||
217248CF000
|
heap
|
page read and write
|
||
7FFDFF252000
|
unkown
|
page readonly
|
||
2172B468000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFE0EB21000
|
unkown
|
page execute read
|
||
217244F0000
|
heap
|
page read and write
|
||
7FFE0EB40000
|
unkown
|
page readonly
|
||
26FEA720000
|
heap
|
page read and write
|
||
7FFDF8C59000
|
unkown
|
page readonly
|
||
2172938E000
|
heap
|
page read and write
|
||
2172A61C000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
7FFDF9071000
|
unkown
|
page execute read
|
||
21728B79000
|
heap
|
page read and write
|
||
217290FD000
|
heap
|
page read and write
|
||
21724677000
|
heap
|
page read and write
|
||
6AD23000
|
unkown
|
page write copy
|
||
2172A4E6000
|
heap
|
page read and write
|
||
26FE9FF9000
|
heap
|
page read and write
|
||
6EB26FC000
|
stack
|
page read and write
|
||
2172A2C8000
|
heap
|
page read and write
|
||
2172AB2F000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FFE0EA71000
|
unkown
|
page execute read
|
||
21728E0C000
|
heap
|
page read and write
|
||
21729037000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
21724637000
|
heap
|
page read and write
|
||
7FFE130C8000
|
unkown
|
page read and write
|
||
687000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728490000
|
heap
|
page read and write
|
||
2172A72B000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AAF4000
|
heap
|
page read and write
|
||
217292CE000
|
heap
|
page read and write
|
||
2172A32B000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
217224FD000
|
heap
|
page read and write
|
||
2172923F000
|
heap
|
page read and write
|
||
217223E0000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
21728B34000
|
heap
|
page read and write
|
||
21723D96000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217248CD000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21724443000
|
heap
|
page read and write
|
||
2172A7ED000
|
heap
|
page read and write
|
||
2172AAD1000
|
heap
|
page read and write
|
||
7FFDF9D45000
|
unkown
|
page read and write
|
||
21729003000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
7FF626617000
|
unkown
|
page write copy
|
||
606000
|
heap
|
page read and write
|
||
2172A95E000
|
heap
|
page read and write
|
||
217291D4000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
7FFDFA588000
|
unkown
|
page write copy
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDF9EAD000
|
unkown
|
page readonly
|
||
7FFDF93C1000
|
unkown
|
page execute read
|
||
7FFE0E17C000
|
unkown
|
page read and write
|
||
2172AAF6000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFE1A479000
|
unkown
|
page read and write
|
||
21728FE1000
|
heap
|
page read and write
|
||
21724433000
|
heap
|
page read and write
|
||
217292B8000
|
heap
|
page read and write
|
||
6670A000
|
unkown
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172B3F8000
|
heap
|
page read and write
|
||
6EB2FFE000
|
stack
|
page read and write
|
||
26FEA73B000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
7FFE0EB61000
|
unkown
|
page execute read
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDFAAE3000
|
unkown
|
page readonly
|
||
2172AB32000
|
heap
|
page read and write
|
||
21722519000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172449B000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2172AC5D000
|
heap
|
page read and write
|
||
217243C0000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A786000
|
heap
|
page read and write
|
||
2172B2C1000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728C8D000
|
heap
|
page read and write
|
||
217244FB000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A46E000
|
heap
|
page read and write
|
||
6670F000
|
unkown
|
page write copy
|
||
7FFDFA5E1000
|
unkown
|
page execute read
|
||
2172499E000
|
heap
|
page read and write
|
||
7FFE11BD1000
|
unkown
|
page execute read
|
||
21728E9E000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFE0EB50000
|
unkown
|
page readonly
|
||
2767000
|
heap
|
page read and write
|
||
2172A0C4000
|
heap
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
217292C9000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
2172A730000
|
heap
|
page read and write
|
||
21728BF6000
|
heap
|
page read and write
|
||
217244E0000
|
trusted library allocation
|
page read and write
|
||
21729153000
|
heap
|
page read and write
|
||
2172B431000
|
heap
|
page read and write
|
||
6EB39FD000
|
stack
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
2172B434000
|
heap
|
page read and write
|
||
2172A94C000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
26FEA5CB000
|
heap
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
2172B453000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
7FFDF8F80000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
7FFE014D6000
|
unkown
|
page readonly
|
||
CFB000
|
stack
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172A3CA000
|
heap
|
page read and write
|
||
2172B414000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2768000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21728CD6000
|
heap
|
page read and write
|
||
217292EB000
|
heap
|
page read and write
|
||
2172B3BB000
|
heap
|
page read and write
|
||
21728B97000
|
heap
|
page read and write
|
||
7FFE13200000
|
unkown
|
page readonly
|
||
612000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFE148B3000
|
unkown
|
page readonly
|
||
609000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDF9F09000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21728FA0000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21724CA9000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
2172903F000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FFE11BF1000
|
unkown
|
page read and write
|
||
21724689000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFDFAFCA000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AACE000
|
heap
|
page read and write
|
||
6EB31FE000
|
stack
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
7FFDF88A0000
|
unkown
|
page readonly
|
||
2172AA89000
|
heap
|
page read and write
|
||
6EB34FE000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
A8DCA7F000
|
stack
|
page read and write
|
||
7FFE13391000
|
unkown
|
page readonly
|
||
26FE9E00000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
2172AAE6000
|
heap
|
page read and write
|
||
21729073000
|
heap
|
page read and write
|
||
2172B3E8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A978000
|
heap
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
6EB2EFF000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2172A0DA000
|
heap
|
page read and write
|
||
26FEA023000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FF625411000
|
unkown
|
page execute read
|
||
2172B312000
|
heap
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
2172250C000
|
heap
|
page read and write
|
||
2172B339000
|
heap
|
page read and write
|
||
217294AE000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172918F000
|
heap
|
page read and write
|
||
2172864D000
|
heap
|
page read and write
|
||
2172463C000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A58A000
|
heap
|
page read and write
|
||
2172B346000
|
heap
|
page read and write
|
||
2172A13C000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AB20000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
21728F93000
|
heap
|
page read and write
|
||
26FEA727000
|
heap
|
page read and write
|
||
26FEA73D000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728DCB000
|
heap
|
page read and write
|
||
7FFE115C7000
|
unkown
|
page readonly
|
||
580000
|
heap
|
page read and write
|
||
26FEA5CE000
|
heap
|
page read and write
|
||
2172B341000
|
heap
|
page read and write
|
||
2172AAFE000
|
heap
|
page read and write
|
||
2CCB000
|
stack
|
page read and write
|
||
2172648A000
|
heap
|
page read and write
|
||
2172A3CF000
|
heap
|
page read and write
|
||
27B4000
|
heap
|
page read and write
|
||
7FFDFB280000
|
unkown
|
page readonly
|
||
666BA000
|
unkown
|
page write copy
|
||
5BC000
|
heap
|
page read and write
|
||
21729160000
|
heap
|
page read and write
|
||
21728AEB000
|
heap
|
page read and write
|
||
666B7000
|
unkown
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A3E9000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172252D000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21724647000
|
heap
|
page read and write
|
||
217244C6000
|
heap
|
page read and write
|
||
217248CD000
|
heap
|
page read and write
|
||
7FFE0EB6B000
|
unkown
|
page readonly
|
||
2172A85D000
|
heap
|
page read and write
|
||
2172AC48000
|
heap
|
page read and write
|
||
2172A311000
|
heap
|
page read and write
|
||
21728DA4000
|
heap
|
page read and write
|
||
2E1E000
|
heap
|
page read and write
|
||
2172924C000
|
heap
|
page read and write
|
||
26FE9FF7000
|
heap
|
page read and write
|
||
2172A8C0000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
21728BCF000
|
heap
|
page read and write
|
||
7FFDFAF7B000
|
unkown
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
7FFDFAF55000
|
unkown
|
page read and write
|
||
7FFE130C9000
|
unkown
|
page readonly
|
||
217293AB000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
26FE9FD2000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172467C000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AB2D000
|
heap
|
page read and write
|
||
2172A66A000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
2172A0DE000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
2ADE000
|
heap
|
page read and write
|
||
6AD00000
|
unkown
|
page readonly
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21729080000
|
heap
|
page read and write
|
||
21724667000
|
heap
|
page read and write
|
||
7FFE0EA7A000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172936C000
|
heap
|
page read and write
|
||
2172AA9A000
|
heap
|
page read and write
|
||
21728F86000
|
heap
|
page read and write
|
||
7FFDFF1C7000
|
unkown
|
page readonly
|
||
217291A9000
|
heap
|
page read and write
|
||
2172A7CB000
|
heap
|
page read and write
|
||
2172A0D1000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
B2A000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
6EB33FE000
|
stack
|
page read and write
|
||
21729386000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFDFFC81000
|
unkown
|
page execute read
|
||
21724D53000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A272000
|
heap
|
page read and write
|
||
217291E9000
|
heap
|
page read and write
|
||
2172B41A000
|
heap
|
page read and write
|
||
2172B3FD000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A8CD000
|
heap
|
page read and write
|
||
3CC000
|
stack
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
26FEA738000
|
heap
|
page read and write
|
||
2172A1FA000
|
heap
|
page read and write
|
||
21728BBE000
|
heap
|
page read and write
|
||
7FFDFF1C3000
|
unkown
|
page read and write
|
||
21729044000
|
heap
|
page read and write
|
||
21729348000
|
heap
|
page read and write
|
||
2172B370000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDFB281000
|
unkown
|
page execute read
|
||
7FFDF9020000
|
unkown
|
page readonly
|
||
57D000
|
heap
|
page read and write
|
||
2172A8B7000
|
heap
|
page read and write
|
||
217291CF000
|
heap
|
page read and write
|
||
2172A3A8000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
2172B424000
|
heap
|
page read and write
|
||
2172463A000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
217284DE000
|
heap
|
page read and write
|
||
21729352000
|
heap
|
page read and write
|
||
2172921D000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
217224BB000
|
heap
|
page read and write
|
||
2172A5FA000
|
heap
|
page read and write
|
||
7FFDF8356000
|
unkown
|
page readonly
|
||
7FFE0EB44000
|
unkown
|
page readonly
|
||
276B000
|
heap
|
page read and write
|
||
2172AC9E000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FFE115A9000
|
unkown
|
page read and write
|
||
21722456000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2172A174000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
21728ECD000
|
heap
|
page read and write
|
||
2776000
|
heap
|
page read and write
|
||
217293A8000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
2172448F000
|
heap
|
page read and write
|
||
7FFE11BF2000
|
unkown
|
page readonly
|
||
2172A684000
|
heap
|
page read and write
|
||
2172B38C000
|
heap
|
page read and write
|
||
2172AAEE000
|
heap
|
page read and write
|
||
217224F4000
|
heap
|
page read and write
|
||
21727363000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
26FEA72F000
|
heap
|
page read and write
|
||
2172A5BE000
|
heap
|
page read and write
|
||
2172A258000
|
heap
|
page read and write
|
||
7FF625410000
|
unkown
|
page readonly
|
||
2172A386000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728D12000
|
heap
|
page read and write
|
||
2172B2E3000
|
heap
|
page read and write
|
||
2172B2C4000
|
heap
|
page read and write
|
||
21728B41000
|
heap
|
page read and write
|
||
7FFE11EAD000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172B41C000
|
heap
|
page read and write
|
||
6EB1EF9000
|
stack
|
page read and write
|
||
21729295000
|
heap
|
page read and write
|
||
2172A699000
|
heap
|
page read and write
|
||
2D0C000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5CD000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
2172A488000
|
heap
|
page read and write
|
||
2172A7F1000
|
heap
|
page read and write
|
||
35B000
|
stack
|
page read and write
|
||
21722300000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
217224F9000
|
heap
|
page read and write
|
||
2172A49D000
|
heap
|
page read and write
|
||
7FF625411000
|
unkown
|
page execute read
|
||
5CD000
|
heap
|
page read and write
|
||
66701000
|
unkown
|
page read and write
|
||
21728B53000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
7FFDFAF95000
|
unkown
|
page write copy
|
||
2172A850000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
217290BC000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21725120000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
2172A338000
|
heap
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
217292E8000
|
heap
|
page read and write
|
||
2172A7B1000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
2172AAD9000
|
heap
|
page read and write
|
||
21728C73000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B3B4000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172AA90000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B387000
|
heap
|
page read and write
|
||
2172A9D0000
|
heap
|
page read and write
|
||
21728B7D000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
2172AB10000
|
heap
|
page read and write
|
||
26FEA738000
|
heap
|
page read and write
|
||
2172A243000
|
heap
|
page read and write
|
||
6EB3DFE000
|
stack
|
page read and write
|
||
2172B382000
|
heap
|
page read and write
|
||
2172A970000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172B3F0000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFE0EB47000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
21724901000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
6EB2AFD000
|
stack
|
page read and write
|
||
21728BC2000
|
heap
|
page read and write
|
||
2172A181000
|
heap
|
page read and write
|
||
7FFE11586000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728E07000
|
heap
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
217244D0000
|
direct allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A6C0000
|
heap
|
page read and write
|
||
7FFE0EB30000
|
unkown
|
page readonly
|
||
7FFE115C1000
|
unkown
|
page execute read
|
||
21724667000
|
heap
|
page read and write
|
||
2172A42D000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
2172934D000
|
heap
|
page read and write
|
||
2172A5AC000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2172A7A4000
|
heap
|
page read and write
|
||
7FF626626000
|
unkown
|
page write copy
|
||
2172AAEC000
|
heap
|
page read and write
|
||
21724594000
|
heap
|
page read and write
|
||
2172A932000
|
heap
|
page read and write
|
||
2172B2EB000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
90B000
|
stack
|
page read and write
|
||
217272C1000
|
heap
|
page read and write
|
||
217224F9000
|
heap
|
page read and write
|
||
21729312000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172930A000
|
heap
|
page read and write
|
||
2172A614000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
7FFE0015E000
|
unkown
|
page read and write
|
||
7FF626625000
|
unkown
|
page write copy
|
||
26FEA028000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
7FF625514000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
2172AAAA000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
2767000
|
heap
|
page read and write
|
||
2172A6E2000
|
heap
|
page read and write
|
||
665A1000
|
unkown
|
page execute read
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
217245AA000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFDFAF9B000
|
unkown
|
page read and write
|
||
2172A0EF000
|
heap
|
page read and write
|
||
6EB1AFE000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
21727452000
|
heap
|
page read and write
|
||
2172250B000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
217271FF000
|
heap
|
page read and write
|
||
2172B41F000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFE148B0000
|
unkown
|
page readonly
|
||
2172B405000
|
heap
|
page read and write
|
||
2172499E000
|
heap
|
page read and write
|
||
2172A0AF000
|
heap
|
page read and write
|
||
2172714A000
|
heap
|
page read and write
|
||
2172A152000
|
heap
|
page read and write
|
||
2172A5C6000
|
heap
|
page read and write
|
||
26FEA01F000
|
heap
|
page read and write
|
||
21728DE5000
|
heap
|
page read and write
|
||
21729499000
|
heap
|
page read and write
|
||
21728FD4000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
7FFE1321B000
|
unkown
|
page read and write
|
||
21728B8F000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A156000
|
heap
|
page read and write
|
||
21728D82000
|
heap
|
page read and write
|
||
47A000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FFDFAADB000
|
unkown
|
page write copy
|
||
21724612000
|
heap
|
page read and write
|
||
21728B60000
|
heap
|
page read and write
|
||
7FFDFA91A000
|
unkown
|
page readonly
|
||
2172A752000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
6EB36FE000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B46A000
|
heap
|
page read and write
|
||
2172A643000
|
heap
|
page read and write
|
||
2172B331000
|
heap
|
page read and write
|
||
26FEA743000
|
heap
|
page read and write
|
||
2172462C000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172245C000
|
heap
|
page read and write
|
||
A8DC7AE000
|
stack
|
page read and write
|
||
217260A4000
|
heap
|
page read and write
|
||
2172A19B000
|
heap
|
page read and write
|
||
217292A7000
|
heap
|
page read and write
|
||
2172AA6C000
|
heap
|
page read and write
|
||
21729317000
|
heap
|
page read and write
|
||
2172A6C8000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
21729324000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
21724532000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
7FFE0E160000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
2172908D000
|
heap
|
page read and write
|
||
2172A629000
|
heap
|
page read and write
|
||
2172A9B6000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A4B7000
|
heap
|
page read and write
|
||
7FFE1155C000
|
unkown
|
page readonly
|
||
5C8000
|
heap
|
page read and write
|
||
2172A4AA000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B324000
|
heap
|
page read and write
|
||
2172A38E000
|
heap
|
page read and write
|
||
7FF625F14000
|
unkown
|
page readonly
|
||
2172A1E0000
|
heap
|
page read and write
|
||
7FFE115D0000
|
unkown
|
page readonly
|
||
276D000
|
heap
|
page read and write
|
||
2172A78E000
|
heap
|
page read and write
|
||
6EB23FE000
|
stack
|
page read and write
|
||
2172A6A6000
|
heap
|
page read and write
|
||
26FEA033000
|
heap
|
page read and write
|
||
2172A934000
|
heap
|
page read and write
|
||
7FFE148B6000
|
unkown
|
page readonly
|
||
2172901D000
|
heap
|
page read and write
|
||
7FFDFAF4C000
|
unkown
|
page write copy
|
||
2172B353000
|
heap
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172B3F2000
|
heap
|
page read and write
|
||
7FFDF9AF1000
|
unkown
|
page readonly
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21723F40000
|
heap
|
page read and write
|
||
7FFE12220000
|
unkown
|
page readonly
|
||
6EB2CFF000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
217245C4000
|
heap
|
page read and write
|
||
26FEC0AE000
|
heap
|
page read and write
|
||
21728AF0000
|
heap
|
page read and write
|
||
7FFE101D5000
|
unkown
|
page readonly
|
||
7FFE148B8000
|
unkown
|
page readonly
|
||
2766000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
6EB23F7000
|
stack
|
page read and write
|
||
2172AA96000
|
heap
|
page read and write
|
||
2172A8AF000
|
heap
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
2172A6D5000
|
heap
|
page read and write
|
||
666BC000
|
unkown
|
page readonly
|
||
5CD000
|
heap
|
page read and write
|
||
2172A0C0000
|
heap
|
page read and write
|
||
2172AB1B000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FEA19E000
|
heap
|
page read and write
|
||
7FFDF8F55000
|
unkown
|
page read and write
|
||
2172B39F000
|
heap
|
page read and write
|
||
2172937C000
|
heap
|
page read and write
|
||
26FEA710000
|
heap
|
page read and write
|
||
2172A374000
|
heap
|
page read and write
|
||
7FFE000C1000
|
unkown
|
page execute read
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
217294A3000
|
heap
|
page read and write
|
||
7FFE11EAE000
|
unkown
|
page readonly
|
||
276B000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFE014D5000
|
unkown
|
page read and write
|
||
217224FC000
|
heap
|
page read and write
|
||
2172A15F000
|
heap
|
page read and write
|
||
21728C03000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
6EB25FE000
|
stack
|
page read and write
|
||
7FFDFB67A000
|
unkown
|
page readonly
|
||
2172B463000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
7FFDF88A1000
|
unkown
|
page execute read
|
||
7FFE0EB51000
|
unkown
|
page execute read
|
||
5CD000
|
heap
|
page read and write
|
||
2172A941000
|
heap
|
page read and write
|
||
2172AA6F000
|
heap
|
page read and write
|
||
21728E5D000
|
heap
|
page read and write
|
||
2172A100000
|
heap
|
page read and write
|
||
21729273000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
21724686000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
26FEA012000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFDFB067000
|
unkown
|
page read and write
|
||
2172A951000
|
heap
|
page read and write
|
||
2172AAA2000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A8AA000
|
heap
|
page read and write
|
||
26FEA024000
|
heap
|
page read and write
|
||
21724496000
|
heap
|
page read and write
|
||
2172AB44000
|
heap
|
page read and write
|
||
26FEA717000
|
heap
|
page read and write
|
||
2DC1000
|
heap
|
page read and write
|
||
2172AA83000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172AAE9000
|
heap
|
page read and write
|
||
2172AA8B000
|
heap
|
page read and write
|
||
7FFDF8E8F000
|
unkown
|
page readonly
|
||
26FEA71C000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
217292DA000
|
heap
|
page read and write
|
||
26FE9F20000
|
trusted library allocation
|
page read and write
|
||
2172B45D000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
7FFDFB71E000
|
unkown
|
page readonly
|
||
2172A0BB000
|
heap
|
page read and write
|
||
2172AA93000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172B3ED000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
7FFDF9F07000
|
unkown
|
page read and write
|
||
21725352000
|
trusted library allocation
|
page read and write
|
||
21724C99000
|
heap
|
page read and write
|
||
7FFE115C0000
|
unkown
|
page readonly
|
||
21728504000
|
heap
|
page read and write
|
||
21724465000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
7FFE1464B000
|
unkown
|
page readonly
|
||
21724993000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AAB4000
|
heap
|
page read and write
|
||
2172A6EF000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
21728E91000
|
heap
|
page read and write
|
||
6EB1CF9000
|
stack
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
26FEA5CA000
|
heap
|
page read and write
|
||
21728C32000
|
heap
|
page read and write
|
||
26FEA741000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A956000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172725C000
|
heap
|
page read and write
|
||
2172499E000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
7FF626618000
|
unkown
|
page write copy
|
||
26FEA738000
|
heap
|
page read and write
|
||
21728554000
|
heap
|
page read and write
|
||
21724CA7000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
217291BA000
|
heap
|
page read and write
|
||
26FEA738000
|
heap
|
page read and write
|
||
2172A379000
|
heap
|
page read and write
|
||
2172A82E000
|
heap
|
page read and write
|
||
217245B4000
|
heap
|
page read and write
|
||
2172A89E000
|
heap
|
page read and write
|
||
26FE9F00000
|
heap
|
page read and write
|
||
A8DCB7F000
|
stack
|
page read and write
|
||
2172448F000
|
heap
|
page read and write
|
||
359A000
|
heap
|
page read and write
|
||
2172A781000
|
heap
|
page read and write
|
||
7FFE0EB66000
|
unkown
|
page readonly
|
||
2172A75F000
|
heap
|
page read and write
|
||
2172B2F0000
|
heap
|
page read and write
|
||
2172B427000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A779000
|
heap
|
page read and write
|
||
21729066000
|
heap
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
2172A797000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A6BB000
|
heap
|
page read and write
|
||
2172AA9D000
|
heap
|
page read and write
|
||
217244E0000
|
trusted library allocation
|
page read and write
|
||
2172909A000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21724C9B000
|
heap
|
page read and write
|
||
7FFDF91C4000
|
unkown
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2172ABED000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172714E000
|
heap
|
page read and write
|
||
2172925E000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
26FEA72F000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FE9F50000
|
heap
|
page read and write
|
||
2172A8E2000
|
heap
|
page read and write
|
||
21723D50000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172B2F8000
|
heap
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
2E18000
|
heap
|
page read and write
|
||
7FFE01470000
|
unkown
|
page readonly
|
||
2172A0F8000
|
heap
|
page read and write
|
||
7FF6268E4000
|
unkown
|
page readonly
|
||
26FEA03A000
|
heap
|
page read and write
|
||
2172A5E0000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
2172910A000
|
heap
|
page read and write
|
||
26FEA190000
|
heap
|
page read and write
|
||
2172B40A000
|
heap
|
page read and write
|
||
2172AA67000
|
heap
|
page read and write
|
||
2172A20F000
|
heap
|
page read and write
|
||
2172911F000
|
heap
|
page read and write
|
||
2172B378000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FEA741000
|
heap
|
page read and write
|
||
2172A7E9000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FEC090000
|
heap
|
page read and write
|
||
2172B3CB000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
2172A57D000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFE11EAA000
|
unkown
|
page readonly
|
||
2172A829000
|
heap
|
page read and write
|
||
2172B3DD000
|
heap
|
page read and write
|
||
7FFDF9801000
|
unkown
|
page execute read
|
||
2172931F000
|
heap
|
page read and write
|
||
2172B3CE000
|
heap
|
page read and write
|
||
2172A55B000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
217294C0000
|
heap
|
page read and write
|
||
21724449000
|
heap
|
page read and write
|
||
2172B305000
|
heap
|
page read and write
|
||
217292E3000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21722512000
|
heap
|
page read and write
|
||
6EB175B000
|
stack
|
page read and write
|
||
26FE9EE0000
|
heap
|
page read and write
|
||
21728C1D000
|
heap
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
2172A858000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
FCA000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172A854000
|
heap
|
page read and write
|
||
26FE9FF6000
|
heap
|
page read and write
|
||
2172A8A2000
|
heap
|
page read and write
|
||
2172B385000
|
heap
|
page read and write
|
||
21728CE3000
|
heap
|
page read and write
|
||
2172A11E000
|
heap
|
page read and write
|
||
21729389000
|
heap
|
page read and write
|
||
7FFE13210000
|
unkown
|
page readonly
|
||
2172AC36000
|
heap
|
page read and write
|
||
21727170000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
21728B68000
|
heap
|
page read and write
|
||
6EB1FFF000
|
stack
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21728BB1000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
7FFE0EB34000
|
unkown
|
page readonly
|
||
21724CA3000
|
heap
|
page read and write
|
||
2172915B000
|
heap
|
page read and write
|
||
2172A2EF000
|
heap
|
page read and write
|
||
2172AAC4000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FEA72F000
|
heap
|
page read and write
|
||
2172A51A000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
7FFDF91E1000
|
unkown
|
page execute read
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
217292F0000
|
heap
|
page read and write
|
||
7FFE12226000
|
unkown
|
page readonly
|
||
21728B12000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDF9280000
|
unkown
|
page readonly
|
||
21724613000
|
heap
|
page read and write
|
||
2172936F000
|
heap
|
page read and write
|
||
21724987000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFDFAF94000
|
unkown
|
page read and write
|
||
2172B446000
|
heap
|
page read and write
|
||
2172AAA5000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFDFFC80000
|
unkown
|
page readonly
|
||
276A000
|
heap
|
page read and write
|
||
2172AAE4000
|
heap
|
page read and write
|
||
7FFE014A8000
|
unkown
|
page readonly
|
||
217273D4000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
21729334000
|
heap
|
page read and write
|
||
6EB35FE000
|
stack
|
page read and write
|
||
217224AE000
|
heap
|
page read and write
|
||
2172A88C000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B37D000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172AB92000
|
heap
|
page read and write
|
||
2172A1A4000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172B2D1000
|
heap
|
page read and write
|
||
2172912C000
|
heap
|
page read and write
|
||
7FFDF9272000
|
unkown
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
7FFDF9614000
|
unkown
|
page readonly
|
||
2172442E000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
2172A43A000
|
heap
|
page read and write
|
||
2172B3D3000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
7FFDFA598000
|
unkown
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172499E000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
7FFE12E10000
|
unkown
|
page readonly
|
||
7FFE12E13000
|
unkown
|
page readonly
|
||
2172932C000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
26FEA02C000
|
heap
|
page read and write
|
||
2172A505000
|
heap
|
page read and write
|
||
21724449000
|
heap
|
page read and write
|
||
7FFE1157E000
|
unkown
|
page read and write
|
||
2172A9BB000
|
heap
|
page read and write
|
||
2172A170000
|
heap
|
page read and write
|
||
2172B3AE000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
21728B71000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
26FEA749000
|
heap
|
page read and write
|
||
2172A17D000
|
heap
|
page read and write
|
||
2172A677000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFDF91C7000
|
unkown
|
page write copy
|
||
FA2000
|
heap
|
page read and write
|
||
21729010000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21728BC7000
|
heap
|
page read and write
|
||
2172A4D1000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728F3D000
|
heap
|
page read and write
|
||
2172492F000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
217224D8000
|
heap
|
page read and write
|
||
21729237000
|
heap
|
page read and write
|
||
21728D4E000
|
heap
|
page read and write
|
||
2172A0B3000
|
heap
|
page read and write
|
||
2172467C000
|
heap
|
page read and write
|
||
21724511000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
7FFE148B1000
|
unkown
|
page execute read
|
||
21728B27000
|
heap
|
page read and write
|
||
26FEA03B000
|
heap
|
page read and write
|
||
7FFDFF1D0000
|
unkown
|
page readonly
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172B417000
|
heap
|
page read and write
|
||
21727146000
|
heap
|
page read and write
|
||
217224C4000
|
heap
|
page read and write
|
||
217243D0000
|
heap
|
page read and write
|
||
665A0000
|
unkown
|
page readonly
|
||
2172B37F000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
2172A11A000
|
heap
|
page read and write
|
||
2172935A000
|
heap
|
page read and write
|
||
7FFDF836B000
|
unkown
|
page readonly
|
||
3073000
|
heap
|
page read and write
|
||
7FFE0EA79000
|
unkown
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
2172A127000
|
heap
|
page read and write
|
||
666BB000
|
unkown
|
page read and write
|
||
2172B3B1000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A665000
|
heap
|
page read and write
|
||
7FFE1222C000
|
unkown
|
page readonly
|
||
21728C66000
|
heap
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
21729374000
|
heap
|
page read and write
|
||
26FEA5C4000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A141000
|
heap
|
page read and write
|
||
2172AC29000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728AFD000
|
heap
|
page read and write
|
||
21729367000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
26FEA040000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FE9F20000
|
trusted library allocation
|
page read and write
|
||
217272AD000
|
heap
|
page read and write
|
||
26FE9FF6000
|
heap
|
page read and write
|
||
217294C8000
|
heap
|
page read and write
|
||
21729105000
|
heap
|
page read and write
|
||
2172A92F000
|
heap
|
page read and write
|
||
2172A35F000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
2172B42E000
|
heap
|
page read and write
|
||
2172499E000
|
heap
|
page read and write
|
||
2172AA7C000
|
heap
|
page read and write
|
||
7FFDFAB30000
|
unkown
|
page readonly
|
||
7FFE1A471000
|
unkown
|
page execute read
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21724500000
|
heap
|
page read and write
|
||
7FFE1A47C000
|
unkown
|
page readonly
|
||
7FFDFAE2F000
|
unkown
|
page readonly
|
||
2172ABFF000
|
heap
|
page read and write
|
||
7FFDF9601000
|
unkown
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
6AD24000
|
unkown
|
page readonly
|
||
2172B3D0000
|
heap
|
page read and write
|
||
7FFDF95FB000
|
unkown
|
page read and write
|
||
2172A0C8000
|
heap
|
page read and write
|
||
21728B24000
|
heap
|
page read and write
|
||
2172AAC1000
|
heap
|
page read and write
|
||
7FFDF91CA000
|
unkown
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFE0EB23000
|
unkown
|
page readonly
|
||
2837000
|
heap
|
page read and write
|
||
217291E1000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A345000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A3DC000
|
heap
|
page read and write
|
||
2172A918000
|
heap
|
page read and write
|
||
217292BC000
|
heap
|
page read and write
|
||
21728AF8000
|
heap
|
page read and write
|
||
2172A6CD000
|
heap
|
page read and write
|
||
21728B46000
|
heap
|
page read and write
|
||
2DEE000
|
heap
|
page read and write
|
||
7FF625410000
|
unkown
|
page readonly
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728F8B000
|
heap
|
page read and write
|
||
2172A922000
|
heap
|
page read and write
|
||
2172A93F000
|
heap
|
page read and write
|
||
2172A36C000
|
heap
|
page read and write
|
||
7FFDFBABA000
|
unkown
|
page readonly
|
||
7FFE115D8000
|
unkown
|
page readonly
|
||
21729379000
|
heap
|
page read and write
|
||
2172B2C9000
|
heap
|
page read and write
|
||
2172A59F000
|
heap
|
page read and write
|
||
6670C000
|
unkown
|
page write copy
|
||
5CD000
|
heap
|
page read and write
|
||
2172A83B000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
26FE9F20000
|
trusted library allocation
|
page read and write
|
||
7FFDF8381000
|
unkown
|
page execute read
|
||
217224F1000
|
heap
|
page read and write
|
||
2172B2DE000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21724677000
|
heap
|
page read and write
|
||
7FFE0E17E000
|
unkown
|
page readonly
|
||
2172AC3B000
|
heap
|
page read and write
|
||
2172A4EB000
|
heap
|
page read and write
|
||
21724653000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A0CD000
|
heap
|
page read and write
|
||
42B0000
|
heap
|
page read and write
|
||
21724686000
|
heap
|
page read and write
|
||
2172AA69000
|
heap
|
page read and write
|
||
2172A0E6000
|
heap
|
page read and write
|
||
2172B32C000
|
heap
|
page read and write
|
||
2172B39C000
|
heap
|
page read and write
|
||
217291EE000
|
heap
|
page read and write
|
||
21729059000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728B39000
|
heap
|
page read and write
|
||
2172B40F000
|
heap
|
page read and write
|
||
21724610000
|
heap
|
page read and write
|
||
21724667000
|
heap
|
page read and write
|
||
2172A3F1000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
217224D5000
|
heap
|
page read and write
|
||
217244B8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
6EB2DFE000
|
stack
|
page read and write
|
||
2172B456000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AB1D000
|
heap
|
page read and write
|
||
2172445B000
|
heap
|
page read and write
|
||
2172A352000
|
heap
|
page read and write
|
||
7FFDFAFC3000
|
unkown
|
page read and write
|
||
21728C4C000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A1E8000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
7FFDFF259000
|
unkown
|
page readonly
|
||
26FEA72F000
|
heap
|
page read and write
|
||
2172A18E000
|
heap
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
7FFE0EB37000
|
unkown
|
page read and write
|
||
2172B3F5000
|
heap
|
page read and write
|
||
26FEA726000
|
heap
|
page read and write
|
||
7FFE1A47A000
|
unkown
|
page readonly
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A8E7000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21729381000
|
heap
|
page read and write
|
||
2172A818000
|
heap
|
page read and write
|
||
7FFDF95EE000
|
unkown
|
page read and write
|
||
2172B3D5000
|
heap
|
page read and write
|
||
2172A0D5000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21723F43000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
7FFDF82F0000
|
unkown
|
page readonly
|
||
2172A495000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
217292B4000
|
heap
|
page read and write
|
||
217244E0000
|
trusted library allocation
|
page read and write
|
||
2172A807000
|
heap
|
page read and write
|
||
2172A90D000
|
heap
|
page read and write
|
||
26FEA741000
|
heap
|
page read and write
|
||
7FFE0EB59000
|
unkown
|
page readonly
|
||
2172445A000
|
heap
|
page read and write
|
||
217290F0000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21727070000
|
heap
|
page read and write
|
||
6EB1BFD000
|
stack
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
7FFDF91CB000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
7FFDFAFD0000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
21729139000
|
heap
|
page read and write
|
||
2172A65D000
|
heap
|
page read and write
|
||
2172B421000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
6EB3FFF000
|
stack
|
page read and write
|
||
2172A97B000
|
heap
|
page read and write
|
||
7FFDF9F21000
|
unkown
|
page execute read
|
||
5C8000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
26FEA5C5000
|
heap
|
page read and write
|
||
2172B407000
|
heap
|
page read and write
|
||
217292D6000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172B412000
|
heap
|
page read and write
|
||
2172A888000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
7FFDF9F06000
|
unkown
|
page write copy
|
||
21728ADF000
|
heap
|
page read and write
|
||
2172A563000
|
heap
|
page read and write
|
||
2172ACA6000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
2172A418000
|
heap
|
page read and write
|
||
21724CA9000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
217294B8000
|
heap
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
2172A5B9000
|
heap
|
page read and write
|
||
26FEA012000
|
heap
|
page read and write
|
||
21728FDC000
|
heap
|
page read and write
|
||
2172B3A1000
|
heap
|
page read and write
|
||
2172A915000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728CEB000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
2172AB3C000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
21724C06000
|
heap
|
page read and write
|
||
2172A420000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172939E000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
2172A949000
|
heap
|
page read and write
|
||
2172A323000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217245FD000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
2172A1AC000
|
heap
|
page read and write
|
||
21728F28000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
21723F00000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172AC77000
|
heap
|
page read and write
|
||
7FFE1222B000
|
unkown
|
page read and write
|
||
21728F57000
|
heap
|
page read and write
|
||
217285A8000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A901000
|
heap
|
page read and write
|
||
2172A4F8000
|
heap
|
page read and write
|
||
26FEC0AE000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217248B4000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
2172A527000
|
heap
|
page read and write
|
||
217244CA000
|
heap
|
page read and write
|
||
2172B334000
|
heap
|
page read and write
|
||
7FFDFF1D1000
|
unkown
|
page execute read
|
||
7FFE0015F000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
26FEA749000
|
heap
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
7FFDFF241000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
26FEA744000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
7FFDF8C53000
|
unkown
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A7C6000
|
heap
|
page read and write
|
||
2172A425000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
21724B76000
|
heap
|
page read and write
|
||
7FFDF8C47000
|
unkown
|
page readonly
|
||
21728C59000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172463F000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AC43000
|
heap
|
page read and write
|
||
2172251C000
|
heap
|
page read and write
|
||
2172461D000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
7FFE1A476000
|
unkown
|
page readonly
|
||
CEE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
217244E0000
|
trusted library allocation
|
page read and write
|
||
21724689000
|
heap
|
page read and write
|
||
217294C5000
|
heap
|
page read and write
|
||
21729331000
|
heap
|
page read and write
|
||
2294000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
217224FD000
|
heap
|
page read and write
|
||
2172B44B000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDFB002000
|
unkown
|
page readonly
|
||
276A000
|
heap
|
page read and write
|
||
2172ABFA000
|
heap
|
page read and write
|
||
7FFDF93C0000
|
unkown
|
page readonly
|
||
7FFE0EB38000
|
unkown
|
page readonly
|
||
7FFDF9D4A000
|
unkown
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
2172A4A2000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
A8DCBFE000
|
stack
|
page read and write
|
||
2172A8D5000
|
heap
|
page read and write
|
||
2172ABEB000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
21724686000
|
heap
|
page read and write
|
||
21724645000
|
heap
|
page read and write
|
||
2172A1B9000
|
heap
|
page read and write
|
||
21724D70000
|
heap
|
page read and write
|
||
21728E77000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
217224AC000
|
heap
|
page read and write
|
||
2172AABF000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
2172A16C000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
21724677000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
21729210000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A968000
|
heap
|
page read and write
|
||
21724642000
|
heap
|
page read and write
|
||
2172B372000
|
heap
|
page read and write
|
||
7FFE0EB55000
|
unkown
|
page readonly
|
||
2172AB03000
|
heap
|
page read and write
|
||
21728EC5000
|
heap
|
page read and write
|
||
2172B441000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
217244F5000
|
heap
|
page read and write
|
||
5DF000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FFE13396000
|
unkown
|
page read and write
|
||
21728B93000
|
heap
|
page read and write
|
||
2172ABF2000
|
heap
|
page read and write
|
||
2172A40B000
|
heap
|
page read and write
|
||
217273C7000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
7FFDF9070000
|
unkown
|
page readonly
|
||
276C000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
2172A27F000
|
heap
|
page read and write
|
||
7FFDFB72A000
|
unkown
|
page write copy
|
||
290F000
|
stack
|
page read and write
|
||
2172AAD7000
|
heap
|
page read and write
|
||
2172919C000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2172A179000
|
heap
|
page read and write
|
||
2172A80F000
|
heap
|
page read and write
|
||
2172A0EB000
|
heap
|
page read and write
|
||
7FFDF8F81000
|
unkown
|
page execute read
|
||
7FFDF924F000
|
unkown
|
page readonly
|
||
2172A207000
|
heap
|
page read and write
|
||
2172A7FE000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A7E0000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDF8F4F000
|
unkown
|
page read and write
|
||
2172A109000
|
heap
|
page read and write
|
||
2172A636000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
2172B360000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
217271E9000
|
heap
|
page read and write
|
||
7FFE115D1000
|
unkown
|
page execute read
|
||
2172499E000
|
heap
|
page read and write
|
||
2172A9F7000
|
heap
|
page read and write
|
||
2172AB01000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
217291F6000
|
heap
|
page read and write
|
||
6EB22FE000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDFB270000
|
unkown
|
page readonly
|
||
2172B43E000
|
heap
|
page read and write
|
||
6AD01000
|
unkown
|
page execute read
|
||
7FFE101D1000
|
unkown
|
page execute read
|
||
2172A12B000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
217224F9000
|
heap
|
page read and write
|
||
21727152000
|
heap
|
page read and write
|
||
2172AB3F000
|
heap
|
page read and write
|
||
2172922A000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A2E2000
|
heap
|
page read and write
|
||
21728BD4000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
2172A541000
|
heap
|
page read and write
|
||
2172A78A000
|
heap
|
page read and write
|
||
7FFE0015B000
|
unkown
|
page write copy
|
||
276C000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
6AD17000
|
unkown
|
page readonly
|
||
2172A43F000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
2172A650000
|
heap
|
page read and write
|
||
2172935F000
|
heap
|
page read and write
|
||
2172B42C000
|
heap
|
page read and write
|
||
21728F64000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
21724689000
|
heap
|
page read and write
|
||
7FFE12E16000
|
unkown
|
page readonly
|
||
2172A31E000
|
heap
|
page read and write
|
||
2172466A000
|
heap
|
page read and write
|
||
FB1000
|
heap
|
page read and write
|
||
7FFDF8F58000
|
unkown
|
page readonly
|
||
A8DCAFE000
|
stack
|
page read and write
|
||
2E1A000
|
heap
|
page read and write
|
||
7FFE14631000
|
unkown
|
page execute read
|
||
21728C80000
|
heap
|
page read and write
|
||
21728652000
|
heap
|
page read and write
|
||
21728D05000
|
heap
|
page read and write
|
||
2172ABF5000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
2172AB85000
|
heap
|
page read and write
|
||
217248B5000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFE11501000
|
unkown
|
page execute read
|
||
6AD20000
|
unkown
|
page read and write
|
||
21728D46000
|
heap
|
page read and write
|
||
217291B6000
|
heap
|
page read and write
|
||
7FFDF9057000
|
unkown
|
page readonly
|
||
7FFE0EB41000
|
unkown
|
page execute read
|
||
26FEA19D000
|
heap
|
page read and write
|
||
21724677000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
2172AB0B000
|
heap
|
page read and write
|
||
7FFDF9275000
|
unkown
|
page readonly
|
||
217248BC000
|
heap
|
page read and write
|
||
7FFE1A470000
|
unkown
|
page readonly
|
||
26FEA012000
|
heap
|
page read and write
|
||
26FEA739000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
217224FD000
|
heap
|
page read and write
|
||
2172A621000
|
heap
|
page read and write
|
||
26FEC0A2000
|
heap
|
page read and write
|
||
2172AC8C000
|
heap
|
page read and write
|
||
7FFE0EB48000
|
unkown
|
page readonly
|
||
21724C94000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
60D000
|
heap
|
page read and write
|
||
217245FD000
|
heap
|
page read and write
|
||
217293A3000
|
heap
|
page read and write
|
||
2172A461000
|
heap
|
page read and write
|
||
2172A93C000
|
heap
|
page read and write
|
||
2172B458000
|
heap
|
page read and write
|
||
2172467C000
|
heap
|
page read and write
|
||
7FFE11EB0000
|
unkown
|
page readonly
|
||
303F000
|
stack
|
page read and write
|
||
21728C10000
|
heap
|
page read and write
|
||
7FFDF9DD1000
|
unkown
|
page execute read
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A570000
|
heap
|
page read and write
|
||
21729496000
|
heap
|
page read and write
|
||
2172448F000
|
heap
|
page read and write
|
||
7FFDFAF57000
|
unkown
|
page write copy
|
||
2768000
|
heap
|
page read and write
|
||
6EB1EFE000
|
stack
|
page read and write
|
||
21728BB6000
|
heap
|
page read and write
|
||
2172A8BB000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
26FEA718000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
7FF408030000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A9FF000
|
heap
|
page read and write
|
||
217294A6000
|
heap
|
page read and write
|
||
2172A47B000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728CF0000
|
heap
|
page read and write
|
||
21728E84000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
2172B397000
|
heap
|
page read and write
|
||
217245E8000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
7FFDFAAE1000
|
unkown
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172AC21000
|
heap
|
page read and write
|
||
F7E000
|
unkown
|
page read and write
|
||
2172B392000
|
heap
|
page read and write
|
||
2172AB22000
|
heap
|
page read and write
|
||
7FFE13397000
|
unkown
|
page readonly
|
||
21722515000
|
heap
|
page read and write
|
||
2172448F000
|
heap
|
page read and write
|
||
21728CBC000
|
heap
|
page read and write
|
||
7FFE0EB60000
|
unkown
|
page readonly
|
||
7FFDFB048000
|
unkown
|
page readonly
|
||
39B000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2172AA74000
|
heap
|
page read and write
|
||
21728F79000
|
heap
|
page read and write
|
||
217244B8000
|
heap
|
page read and write
|
||
21728BA0000
|
heap
|
page read and write
|
||
35B5000
|
heap
|
page read and write
|
||
21728DD8000
|
heap
|
page read and write
|
||
2172A602000
|
heap
|
page read and write
|
||
7FFE115AD000
|
unkown
|
page read and write
|
||
2172A39B000
|
heap
|
page read and write
|
||
21728B0E000
|
heap
|
page read and write
|
||
2172A909000
|
heap
|
page read and write
|
||
7FFE0EB26000
|
unkown
|
page read and write
|
||
2172A802000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
21728CAF000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
2172A80B000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A2FC000
|
heap
|
page read and write
|
||
26FEC0B4000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
6AD3A000
|
unkown
|
page readonly
|
||
7FFDF9D50000
|
unkown
|
page readonly
|
||
2172B3D8000
|
heap
|
page read and write
|
||
21728EAB000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728B8A000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172A79B000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
26FEA195000
|
heap
|
page read and write
|
||
7FFDFF141000
|
unkown
|
page execute read
|
||
2172B3A9000
|
heap
|
page read and write
|
||
7FFDF9B57000
|
unkown
|
page readonly
|
||
21728F01000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2172712E000
|
heap
|
page read and write
|
||
6EB27FE000
|
stack
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
7FFDFA31A000
|
unkown
|
page readonly
|
||
820000
|
heap
|
page read and write
|
||
2172A937000
|
heap
|
page read and write
|
||
7FFE000C0000
|
unkown
|
page readonly
|
||
2172A966000
|
heap
|
page read and write
|
||
2172B2D6000
|
heap
|
page read and write
|
||
2172A454000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A68C000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A9C0000
|
heap
|
page read and write
|
||
21728F7E000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
21728DF2000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
66710000
|
unkown
|
page readonly
|
||
612000
|
heap
|
page read and write
|
||
2172A111000
|
heap
|
page read and write
|
||
2172A961000
|
heap
|
page read and write
|
||
26FE9FD7000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21724506000
|
heap
|
page read and write
|
||
2172B450000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
21724D40000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A202000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172B3C1000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
217294B3000
|
heap
|
page read and write
|
||
2172A954000
|
heap
|
page read and write
|
||
7FFDFAF98000
|
unkown
|
page read and write
|
||
2172AC99000
|
heap
|
page read and write
|
||
297F000
|
heap
|
page read and write
|
||
2172A597000
|
heap
|
page read and write
|
||
7FFE14644000
|
unkown
|
page readonly
|
||
7FFE11EA1000
|
unkown
|
page execute read
|
||
2172AC2E000
|
heap
|
page read and write
|
||
2172A2BB000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
2172A1ED000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A104000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2172A28C000
|
heap
|
page read and write
|
||
217291FB000
|
heap
|
page read and write
|
||
21728D1F000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
433000
|
heap
|
page read and write
|
||
21728B1F000
|
heap
|
page read and write
|
||
2172A745000
|
heap
|
page read and write
|
||
21729251000
|
heap
|
page read and write
|
||
38B000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A91F000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21724D53000
|
heap
|
page read and write
|
||
2172A60F000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2172AB18000
|
heap
|
page read and write
|
||
21729244000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFE130C1000
|
unkown
|
page execute read
|
||
6EB3AFF000
|
stack
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
21724983000
|
heap
|
page read and write
|
||
21728F30000
|
heap
|
page read and write
|
||
26FEC0A6000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21728593000
|
heap
|
page read and write
|
||
7FFE11EA0000
|
unkown
|
page readonly
|
||
217246CD000
|
heap
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
2172A87B000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
2172B436000
|
heap
|
page read and write
|
||
2172AC0F000
|
heap
|
page read and write
|
||
2172AC62000
|
heap
|
page read and write
|
||
6EB21FE000
|
stack
|
page read and write
|
||
2172A138000
|
heap
|
page read and write
|
||
2172251A000
|
heap
|
page read and write
|
||
2172A534000
|
heap
|
page read and write
|
||
7FF626625000
|
unkown
|
page read and write
|
||
2172928D000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
21724513000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
6EB3EFF000
|
stack
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
21729396000
|
heap
|
page read and write
|
||
21728DBE000
|
heap
|
page read and write
|
||
2172B3E3000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728EE7000
|
heap
|
page read and write
|
||
276E000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
276C000
|
heap
|
page read and write
|
||
2172B43B000
|
heap
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
21724686000
|
heap
|
page read and write
|
||
7FF62661B000
|
unkown
|
page read and write
|
||
217243FF000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728E48000
|
heap
|
page read and write
|
||
2172AC91000
|
heap
|
page read and write
|
||
2172A1C6000
|
heap
|
page read and write
|
||
2172A229000
|
heap
|
page read and write
|
||
2172A500000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172A236000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
2172A316000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
26FEA5CE000
|
heap
|
page read and write
|
||
2172A26A000
|
heap
|
page read and write
|
||
21724490000
|
heap
|
page read and write
|
||
217248A0000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172467C000
|
heap
|
page read and write
|
||
21724B40000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
2172A192000
|
heap
|
page read and write
|
||
2172A6DA000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21724689000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
21724452000
|
heap
|
page read and write
|
||
2172B400000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
2172A5A4000
|
heap
|
page read and write
|
||
217224BB000
|
heap
|
page read and write
|
||
21724D41000
|
heap
|
page read and write
|
||
21728CA2000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21723D90000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
21728BE9000
|
heap
|
page read and write
|
||
2172A76C000
|
heap
|
page read and write
|
||
21727383000
|
heap
|
page read and write
|
||
2172AC6F000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172B40D000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
2BFD000
|
heap
|
page read and write
|
||
2172A3D7000
|
heap
|
page read and write
|
||
21728B3D000
|
heap
|
page read and write
|
||
2172AC14000
|
heap
|
page read and write
|
||
7FFDF9F20000
|
unkown
|
page readonly
|
||
612000
|
heap
|
page read and write
|
||
21729146000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
21729215000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7FFE13380000
|
unkown
|
page readonly
|
||
2172A18A000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172AB28000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217243F3000
|
heap
|
page read and write
|
||
2172A19F000
|
heap
|
page read and write
|
||
2172AC19000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
6EB20FE000
|
stack
|
page read and write
|
||
21728BBA000
|
heap
|
page read and write
|
||
2172A5B1000
|
heap
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
217290D6000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172A54E000
|
heap
|
page read and write
|
||
6EB2BFE000
|
stack
|
page read and write
|
||
2172A309000
|
heap
|
page read and write
|
||
21727136000
|
heap
|
page read and write
|
||
7FFE115D6000
|
unkown
|
page readonly
|
||
5CD000
|
heap
|
page read and write
|
||
21724BF9000
|
heap
|
page read and write
|
||
2172467C000
|
heap
|
page read and write
|
||
21729345000
|
heap
|
page read and write
|
||
26FEA01B000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2172B45B000
|
heap
|
page read and write
|
||
26FEA71E000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21728FBA000
|
heap
|
page read and write
|
||
21728B05000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FF626655000
|
unkown
|
page write copy
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDF83B4000
|
unkown
|
page readonly
|
||
2172AAC9000
|
heap
|
page read and write
|
||
21729232000
|
heap
|
page read and write
|
||
217244E0000
|
trusted library allocation
|
page read and write
|
||
217244C6000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFDFA58D000
|
unkown
|
page read and write
|
||
21728BDC000
|
heap
|
page read and write
|
||
26FEA040000
|
heap
|
page read and write
|
||
2172A21C000
|
heap
|
page read and write
|
||
2172902A000
|
heap
|
page read and write
|
||
21724677000
|
heap
|
page read and write
|
||
21724496000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
2172A709000
|
heap
|
page read and write
|
||
21724503000
|
heap
|
page read and write
|
||
2172A134000
|
heap
|
page read and write
|
||
2172467C000
|
heap
|
page read and write
|
||
21728B75000
|
heap
|
page read and write
|
||
7FFE12221000
|
unkown
|
page execute read
|
||
5E0000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
6AD1F000
|
unkown
|
page readonly
|
||
2762000
|
heap
|
page read and write
|
||
413D000
|
stack
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2172AC1C000
|
heap
|
page read and write
|
||
217244D6000
|
heap
|
page read and write
|
||
2172B31F000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728BCB000
|
heap
|
page read and write
|
||
7FFDFAFCD000
|
unkown
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
26FEA72F000
|
heap
|
page read and write
|
||
2172AC07000
|
heap
|
page read and write
|
||
21728C25000
|
heap
|
page read and write
|
||
2172A432000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
7FFE0EA75000
|
unkown
|
page readonly
|
||
21728BA4000
|
heap
|
page read and write
|
||
7FFE130C0000
|
unkown
|
page readonly
|
||
5BC000
|
heap
|
page read and write
|
||
21728B4E000
|
heap
|
page read and write
|
||
7FFDFB010000
|
unkown
|
page readonly
|
||
5C8000
|
heap
|
page read and write
|
||
2172A186000
|
heap
|
page read and write
|
||
2172A556000
|
heap
|
page read and write
|
||
21724564000
|
heap
|
page read and write
|
||
7FFDF83DD000
|
unkown
|
page readonly
|
||
2172A1D3000
|
heap
|
page read and write
|
||
21724C04000
|
heap
|
page read and write
|
||
7FFDF95EF000
|
unkown
|
page write copy
|
||
217244C3000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21728B0A000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172AABC000
|
heap
|
page read and write
|
||
26FEA5C7000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2172AAFB000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7FFDF8380000
|
unkown
|
page readonly
|
||
21728FF6000
|
heap
|
page read and write
|
||
21728F4A000
|
heap
|
page read and write
|
||
7FFDF82F1000
|
unkown
|
page execute read
|
||
7FF626657000
|
unkown
|
page read and write
|
||
7FFDF8C61000
|
unkown
|
page execute read
|
||
5E9000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172250E000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
217243FB000
|
heap
|
page read and write
|
||
2172A24B000
|
heap
|
page read and write
|
||
7FFE13201000
|
unkown
|
page execute read
|
||
2172A299000
|
heap
|
page read and write
|
||
26FEA5CA000
|
heap
|
page read and write
|
||
21728DFF000
|
heap
|
page read and write
|
||
26FE9FF6000
|
heap
|
page read and write
|
||
2172B30A000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
21728EF4000
|
heap
|
page read and write
|
||
2172A197000
|
heap
|
page read and write
|
||
2172B3B9000
|
heap
|
page read and write
|
||
2172AB25000
|
heap
|
page read and write
|
||
21724993000
|
heap
|
page read and write
|
||
6EB3AFD000
|
stack
|
page read and write
|
||
2172AC7F000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
2A15000
|
heap
|
page read and write
|
||
2172A5ED000
|
heap
|
page read and write
|
||
2172B3C8000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
217272EF000
|
heap
|
page read and write
|
||
2172A304000
|
heap
|
page read and write
|
||
21728B17000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
2172A836000
|
heap
|
page read and write
|
||
7FFDFAB31000
|
unkown
|
page execute read
|
||
2172AB0E000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
21727207000
|
heap
|
page read and write
|
||
26FEC0A0000
|
heap
|
page read and write
|
||
2172AA76000
|
heap
|
page read and write
|
||
276D000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
2172B2CE000
|
heap
|
page read and write
|
||
2172A865000
|
heap
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
2172A607000
|
heap
|
page read and write
|
||
2172AB13000
|
heap
|
page read and write
|
||
2172A549000
|
heap
|
page read and write
|
||
21728D41000
|
heap
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
26FEA720000
|
heap
|
page read and write
|
||
217245BC000
|
heap
|
page read and write
|
||
26FEA033000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2172462E000
|
heap
|
page read and write
|
||
21722532000
|
heap
|
page read and write
|
||
10CD000
|
stack
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
2172A4C4000
|
heap
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
26FEA028000
|
heap
|
page read and write
|
||
21724BE8000
|
heap
|
page read and write
|
||
21729391000
|
heap
|
page read and write
|
||
2172A9C3000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A7B9000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
2172A3E4000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
21728B86000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
21728B2C000
|
heap
|
page read and write
|
||
21728C2A000
|
heap
|
page read and write
|
||
21728D8F000
|
heap
|
page read and write
|
||
26FEA02B000
|
heap
|
page read and write
|
||
7FFDF8368000
|
unkown
|
page read and write
|
||
217292F5000
|
heap
|
page read and write
|
||
2172AA71000
|
heap
|
page read and write
|
||
2172A79F000
|
heap
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
26FEC0B6000
|
heap
|
page read and write
|
||
2172A672000
|
heap
|
page read and write
|
||
21724631000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
21724686000
|
heap
|
page read and write
|
||
2172ABE8000
|
heap
|
page read and write
|
||
2172B3A4000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
21722500000
|
heap
|
page read and write
|
||
2172B2FD000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
7FFDFA5E0000
|
unkown
|
page readonly
|
||
21724CAA000
|
heap
|
page read and write
|
||
7FFDFF195000
|
unkown
|
page readonly
|
||
5C8000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
2172AAE1000
|
heap
|
page read and write
|
||
2172A6B3000
|
heap
|
page read and write
|
||
2172446E000
|
heap
|
page read and write
|
||
21728597000
|
heap
|
page read and write
|
There are 2506 hidden memdumps, click here to show them.