Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QUOTATION_JULQTRA071244#U00b7PDF.scr.exe
|
"C:\Users\user\Desktop\QUOTATION_JULQTRA071244#U00b7PDF.scr.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c timeout 10
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 10
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c timeout 10
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 10
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
132.226.8.169
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20a
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://investms.vadavo.cloud
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://s22.filetransfer.io/storage/download/iiz1WoiTc5zb
|
188.114.97.3
|
||
https://filetransfer.io/data-package/v4mecse6/download
|
188.114.96.3
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://s22.filetransfer.io
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://filetransfer.io
|
unknown
|
||
http://filetransfer.io
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://filetransfer.io/data-package/v4mecse6/download
|
188.114.96.3
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://chrome.google.com/webstore?hl=en8
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20and%20Time:%2028/07/2024%20/%2001:17:10%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20367706%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.office.com/8
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
investms.vadavo.cloud
|
185.123.204.162
|
||
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.com
|
132.226.8.169
|
||
checkip.dyndns.org
|
unknown
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
filetransfer.io
|
188.114.96.3
|
||
s22.filetransfer.io
|
188.114.97.3
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
132.226.8.169
|
checkip.dyndns.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
185.123.204.162
|
investms.vadavo.cloud
|
Spain
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
188.114.96.3
|
filetransfer.io
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
FileDirectory
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
140002000
|
remote allocation
|
page execute and read and write
|
||
1375067E000
|
heap
|
page read and write
|
||
250E20E1000
|
trusted library allocation
|
page read and write
|
||
13750CE0000
|
trusted library section
|
page read and write
|
||
13747D81000
|
trusted library allocation
|
page read and write
|
||
13737C7F000
|
trusted library allocation
|
page read and write
|
||
13747B81000
|
trusted library allocation
|
page read and write
|
||
B9E66FE000
|
stack
|
page read and write
|
||
13737EF1000
|
trusted library allocation
|
page read and write
|
||
13737F8B000
|
trusted library allocation
|
page read and write
|
||
250F21C8000
|
trusted library allocation
|
page read and write
|
||
1373826B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
13736110000
|
trusted library allocation
|
page read and write
|
||
250E2670000
|
trusted library allocation
|
page read and write
|
||
1373801B000
|
trusted library allocation
|
page read and write
|
||
137380A3000
|
trusted library allocation
|
page read and write
|
||
13737EB7000
|
trusted library allocation
|
page read and write
|
||
13738269000
|
trusted library allocation
|
page read and write
|
||
250E0507000
|
heap
|
page read and write
|
||
13737F7F000
|
trusted library allocation
|
page read and write
|
||
137383DB000
|
trusted library allocation
|
page read and write
|
||
250E0640000
|
heap
|
page read and write
|
||
13737F6B000
|
trusted library allocation
|
page read and write
|
||
1373837D000
|
trusted library allocation
|
page read and write
|
||
137382CF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
1373804D000
|
trusted library allocation
|
page read and write
|
||
137380C4000
|
trusted library allocation
|
page read and write
|
||
250FA110000
|
trusted library allocation
|
page read and write
|
||
250F2450000
|
trusted library allocation
|
page read and write
|
||
250F2212000
|
trusted library allocation
|
page read and write
|
||
13737B71000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
13738324000
|
trusted library allocation
|
page read and write
|
||
13737F22000
|
trusted library allocation
|
page read and write
|
||
13738357000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB7000
|
trusted library allocation
|
page read and write
|
||
250FA0E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
250E254F000
|
trusted library allocation
|
page read and write
|
||
250E232C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA38000
|
trusted library allocation
|
page read and write
|
||
250F2378000
|
trusted library allocation
|
page read and write
|
||
250E0785000
|
heap
|
page read and write
|
||
137380C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
137360B0000
|
heap
|
page read and write
|
||
13737ECA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3F000
|
trusted library allocation
|
page read and write
|
||
13737F19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA17000
|
trusted library allocation
|
page read and write
|
||
CC93FFE000
|
stack
|
page read and write
|
||
137380B6000
|
trusted library allocation
|
page read and write
|
||
13737FD2000
|
trusted library allocation
|
page read and write
|
||
137383C1000
|
trusted library allocation
|
page read and write
|
||
250E243A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page execute and read and write
|
||
137382B1000
|
trusted library allocation
|
page read and write
|
||
250F2218000
|
trusted library allocation
|
page read and write
|
||
13737F67000
|
trusted library allocation
|
page read and write
|
||
137383FE000
|
trusted library allocation
|
page read and write
|
||
13737F1F000
|
trusted library allocation
|
page read and write
|
||
250F228F000
|
trusted library allocation
|
page read and write
|
||
CC92FFE000
|
stack
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
137381DB000
|
trusted library allocation
|
page read and write
|
||
250F22EC000
|
trusted library allocation
|
page read and write
|
||
13737F65000
|
trusted library allocation
|
page read and write
|
||
13737F56000
|
trusted library allocation
|
page read and write
|
||
13738072000
|
trusted library allocation
|
page read and write
|
||
250E0435000
|
heap
|
page read and write
|
||
137382CD000
|
trusted library allocation
|
page read and write
|
||
137383A1000
|
trusted library allocation
|
page read and write
|
||
13735F35000
|
heap
|
page read and write
|
||
137383E7000
|
trusted library allocation
|
page read and write
|
||
250F2481000
|
trusted library allocation
|
page read and write
|
||
13750B00000
|
unkown
|
page readonly
|
||
250E2440000
|
trusted library allocation
|
page read and write
|
||
9E697FE000
|
stack
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page read and write
|
||
250E0410000
|
heap
|
page read and write
|
||
13747D33000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
20D17FE000
|
stack
|
page read and write
|
||
250F2216000
|
trusted library allocation
|
page read and write
|
||
CC933FF000
|
stack
|
page read and write
|
||
250F247A000
|
trusted library allocation
|
page read and write
|
||
250E21A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
13750520000
|
heap
|
page execute and read and write
|
||
13750870000
|
direct allocation
|
page execute read
|
||
13737F5A000
|
trusted library allocation
|
page read and write
|
||
1373830B000
|
trusted library allocation
|
page read and write
|
||
13735EEC000
|
heap
|
page read and write
|
||
13735DFD000
|
unkown
|
page readonly
|
||
CC92BF2000
|
stack
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
13738245000
|
trusted library allocation
|
page read and write
|
||
250E2520000
|
trusted library allocation
|
page read and write
|
||
250F22C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page execute and read and write
|
||
137382D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
13737FC4000
|
trusted library allocation
|
page read and write
|
||
7FF424350000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
13735E80000
|
heap
|
page read and write
|
||
250F2396000
|
trusted library allocation
|
page read and write
|
||
2711EA70000
|
heap
|
page read and write
|
||
7FFD9BA2F000
|
trusted library allocation
|
page read and write
|
||
13737E97000
|
trusted library allocation
|
page read and write
|
||
250E22F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1373805C000
|
trusted library allocation
|
page read and write
|
||
13737FF3000
|
trusted library allocation
|
page read and write
|
||
250F21CE000
|
trusted library allocation
|
page read and write
|
||
250F21D4000
|
trusted library allocation
|
page read and write
|
||
250F219D000
|
trusted library allocation
|
page read and write
|
||
250E21BE000
|
trusted library allocation
|
page read and write
|
||
13737BCE000
|
trusted library allocation
|
page read and write
|
||
137383A3000
|
trusted library allocation
|
page read and write
|
||
13737ED9000
|
trusted library allocation
|
page read and write
|
||
13738203000
|
trusted library allocation
|
page read and write
|
||
20D09EE000
|
stack
|
page read and write
|
||
7FFD9B939000
|
trusted library allocation
|
page read and write
|
||
13737FE2000
|
trusted library allocation
|
page read and write
|
||
250E044B000
|
heap
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
13738289000
|
trusted library allocation
|
page read and write
|
||
13737FAD000
|
trusted library allocation
|
page read and write
|
||
1373833F000
|
trusted library allocation
|
page read and write
|
||
13737A70000
|
heap
|
page read and write
|
||
20D11FA000
|
stack
|
page read and write
|
||
13750340000
|
heap
|
page read and write
|
||
1373831B000
|
trusted library allocation
|
page read and write
|
||
250FA978000
|
heap
|
page read and write
|
||
250E216C000
|
trusted library allocation
|
page read and write
|
||
137383F4000
|
trusted library allocation
|
page read and write
|
||
250E06C3000
|
trusted library allocation
|
page read and write
|
||
27120430000
|
heap
|
page read and write
|
||
13738029000
|
trusted library allocation
|
page read and write
|
||
9E6977C000
|
stack
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
250F2298000
|
trusted library allocation
|
page read and write
|
||
250F229A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
250F214C000
|
trusted library allocation
|
page read and write
|
||
13737F9A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBDF000
|
trusted library allocation
|
page read and write
|
||
137361E0000
|
heap
|
page read and write
|
||
7FFD9B8F7000
|
trusted library allocation
|
page read and write
|
||
250E0745000
|
heap
|
page read and write
|
||
7FFD9BA02000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page execute and read and write
|
||
13738355000
|
trusted library allocation
|
page read and write
|
||
13750950000
|
direct allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
137381F0000
|
trusted library allocation
|
page read and write
|
||
250F2372000
|
trusted library allocation
|
page read and write
|
||
250F245D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
250FA462000
|
heap
|
page read and write
|
||
23FEDC50000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
13738084000
|
trusted library allocation
|
page read and write
|
||
250F220F000
|
trusted library allocation
|
page read and write
|
||
137507BC000
|
heap
|
page read and write
|
||
1373803E000
|
trusted library allocation
|
page read and write
|
||
2711EAB0000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
250F23CE000
|
trusted library allocation
|
page read and write
|
||
13750A20000
|
direct allocation
|
page read and write
|
||
13737F78000
|
trusted library allocation
|
page read and write
|
||
13738302000
|
trusted library allocation
|
page read and write
|
||
23FEDE40000
|
heap
|
page read and write
|
||
250F2104000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
13737EDE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
13737EE8000
|
trusted library allocation
|
page read and write
|
||
250F22D4000
|
trusted library allocation
|
page read and write
|
||
13737E99000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
250E215F000
|
trusted library allocation
|
page read and write
|
||
250E249D000
|
trusted library allocation
|
page read and write
|
||
13738442000
|
trusted library allocation
|
page read and write
|
||
13738429000
|
trusted library allocation
|
page read and write
|
||
1373835D000
|
trusted library allocation
|
page read and write
|
||
137381D9000
|
trusted library allocation
|
page read and write
|
||
1373808F000
|
trusted library allocation
|
page read and write
|
||
13735EE1000
|
heap
|
page read and write
|
||
1373828E000
|
trusted library allocation
|
page read and write
|
||
13738337000
|
trusted library allocation
|
page read and write
|
||
250F21A3000
|
trusted library allocation
|
page read and write
|
||
250F23A4000
|
trusted library allocation
|
page read and write
|
||
13737F35000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA48000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
250FB0B0000
|
heap
|
page read and write
|
||
13737F32000
|
trusted library allocation
|
page read and write
|
||
13738249000
|
trusted library allocation
|
page read and write
|
||
7FF4A98F0000
|
trusted library allocation
|
page execute and read and write
|
||
13750786000
|
heap
|
page read and write
|
||
137381C6000
|
trusted library allocation
|
page read and write
|
||
250E22F7000
|
trusted library allocation
|
page read and write
|
||
137380C2000
|
trusted library allocation
|
page read and write
|
||
250F20E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
250E21BA000
|
trusted library allocation
|
page read and write
|
||
13738270000
|
trusted library allocation
|
page read and write
|
||
1374FBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
250F2200000
|
trusted library allocation
|
page read and write
|
||
23FEC2C8000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
250E22FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
137503E0000
|
heap
|
page read and write
|
||
250F2376000
|
trusted library allocation
|
page read and write
|
||
23FEC2C0000
|
heap
|
page read and write
|
||
250E06B0000
|
trusted library allocation
|
page read and write
|
||
13737EB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
1373807C000
|
trusted library allocation
|
page read and write
|
||
137383C7000
|
trusted library allocation
|
page read and write
|
||
250F23D7000
|
trusted library allocation
|
page read and write
|
||
27120505000
|
heap
|
page read and write
|
||
250E221F000
|
trusted library allocation
|
page read and write
|
||
CC93BFD000
|
stack
|
page read and write
|
||
1373842F000
|
trusted library allocation
|
page read and write
|
||
250F2489000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA7000
|
trusted library allocation
|
page read and write
|
||
2711EA80000
|
heap
|
page read and write
|
||
137503F9000
|
heap
|
page read and write
|
||
CC937FF000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
250E2150000
|
trusted library allocation
|
page read and write
|
||
27120500000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
250F235E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
137382D1000
|
trusted library allocation
|
page read and write
|
||
250E0478000
|
heap
|
page read and write
|
||
13737C60000
|
trusted library allocation
|
page read and write
|
||
13750670000
|
heap
|
page read and write
|
||
13737EB5000
|
trusted library allocation
|
page read and write
|
||
CC9248E000
|
stack
|
page read and write
|
||
13738315000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
13738282000
|
trusted library allocation
|
page read and write
|
||
250E2322000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
137380AD000
|
trusted library allocation
|
page read and write
|
||
13737F98000
|
trusted library allocation
|
page read and write
|
||
13736123000
|
trusted library allocation
|
page read and write
|
||
250E26A1000
|
trusted library allocation
|
page read and write
|
||
13735F9D000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1373809E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3D000
|
trusted library allocation
|
page read and write
|
||
250E21C2000
|
trusted library allocation
|
page read and write
|
||
13735DCB000
|
unkown
|
page readonly
|
||
250E20D0000
|
heap
|
page read and write
|
||
137361E5000
|
heap
|
page read and write
|
||
7FFD9BB3C000
|
trusted library allocation
|
page read and write
|
||
CC94FFD000
|
stack
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
20D14FD000
|
stack
|
page read and write
|
||
137507A8000
|
heap
|
page read and write
|
||
13737EAA000
|
trusted library allocation
|
page read and write
|
||
13738025000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
250F236A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
250E22C8000
|
trusted library allocation
|
page read and write
|
||
13750B90000
|
trusted library section
|
page read and write
|
||
250E21B6000
|
trusted library allocation
|
page read and write
|
||
137380A0000
|
trusted library allocation
|
page read and write
|
||
137383A5000
|
trusted library allocation
|
page read and write
|
||
250E2488000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
13737F2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
9E69A7E000
|
stack
|
page read and write
|
||
13738247000
|
trusted library allocation
|
page read and write
|
||
13737F06000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
CC953FE000
|
stack
|
page read and write
|
||
137382AF000
|
trusted library allocation
|
page read and write
|
||
1373827A000
|
trusted library allocation
|
page read and write
|
||
250E0760000
|
heap
|
page read and write
|
||
137383B4000
|
trusted library allocation
|
page read and write
|
||
13737F4A000
|
trusted library allocation
|
page read and write
|
||
137382AB000
|
trusted library allocation
|
page read and write
|
||
13737B20000
|
trusted library allocation
|
page read and write
|
||
13738451000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
13738368000
|
trusted library allocation
|
page read and write
|
||
13737F1D000
|
trusted library allocation
|
page read and write
|
||
23FEC290000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
1373837B000
|
trusted library allocation
|
page read and write
|
||
250E2176000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA69000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
13737F08000
|
trusted library allocation
|
page read and write
|
||
137383EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
B9E677E000
|
stack
|
page read and write
|
||
13735D70000
|
unkown
|
page readonly
|
||
250F2407000
|
trusted library allocation
|
page read and write
|
||
137382F5000
|
trusted library allocation
|
page read and write
|
||
250F23B3000
|
trusted library allocation
|
page read and write
|
||
13737EC4000
|
trusted library allocation
|
page read and write
|
||
13737F9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page execute and read and write
|
||
250F2436000
|
trusted library allocation
|
page read and write
|
||
13738425000
|
trusted library allocation
|
page read and write
|
||
13736120000
|
trusted library allocation
|
page read and write
|
||
13738201000
|
trusted library allocation
|
page read and write
|
||
250E0780000
|
heap
|
page read and write
|
||
13737A20000
|
trusted library allocation
|
page read and write
|
||
20D207E000
|
unkown
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
13738339000
|
trusted library allocation
|
page read and write
|
||
13737F69000
|
trusted library allocation
|
page read and write
|
||
137380B1000
|
trusted library allocation
|
page read and write
|
||
250F2444000
|
trusted library allocation
|
page read and write
|
||
250E2380000
|
trusted library allocation
|
page read and write
|
||
137383CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
13737F0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
250E23B2000
|
trusted library allocation
|
page read and write
|
||
1373809C000
|
trusted library allocation
|
page read and write
|
||
250E25DF000
|
trusted library allocation
|
page read and write
|
||
250FA8F4000
|
heap
|
page read and write
|
||
250E2446000
|
trusted library allocation
|
page read and write
|
||
13737F6E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B946000
|
trusted library allocation
|
page execute and read and write
|
||
13738014000
|
trusted library allocation
|
page read and write
|
||
250F21B3000
|
trusted library allocation
|
page read and write
|
||
13747B71000
|
trusted library allocation
|
page read and write
|
||
13737EEC000
|
trusted library allocation
|
page read and write
|
||
13738438000
|
trusted library allocation
|
page read and write
|
||
137503CA000
|
heap
|
page read and write
|
||
13737F01000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
250F2109000
|
trusted library allocation
|
page read and write
|
||
13750D40000
|
trusted library section
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
250E2000000
|
heap
|
page execute and read and write
|
||
250F23B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
13735F39000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
20D1EFA000
|
stack
|
page read and write
|
||
1373840B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
13737EDB000
|
trusted library allocation
|
page read and write
|
||
13737EA4000
|
trusted library allocation
|
page read and write
|
||
1373806D000
|
trusted library allocation
|
page read and write
|
||
13738267000
|
trusted library allocation
|
page read and write
|
||
250F21BA000
|
trusted library allocation
|
page read and write
|
||
250F237A000
|
trusted library allocation
|
page read and write
|
||
13735D72000
|
unkown
|
page readonly
|
||
13738313000
|
trusted library allocation
|
page read and write
|
||
250E21AA000
|
trusted library allocation
|
page read and write
|
||
250E26D3000
|
trusted library allocation
|
page read and write
|
||
13737FC2000
|
trusted library allocation
|
page read and write
|
||
137360F0000
|
trusted library allocation
|
page read and write
|
||
250F246A000
|
trusted library allocation
|
page read and write
|
||
250F2439000
|
trusted library allocation
|
page read and write
|
||
13737E87000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
13738383000
|
trusted library allocation
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
13737EB9000
|
trusted library allocation
|
page read and write
|
||
137381C2000
|
trusted library allocation
|
page read and write
|
||
13735F04000
|
heap
|
page read and write
|
||
250F21C6000
|
trusted library allocation
|
page read and write
|
||
250F2413000
|
trusted library allocation
|
page read and write
|
||
137504E0000
|
heap
|
page read and write
|
||
13737E84000
|
trusted library allocation
|
page read and write
|
||
250E2493000
|
trusted library allocation
|
page read and write
|
||
13738319000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDBD000
|
trusted library allocation
|
page read and write
|
||
13738038000
|
trusted library allocation
|
page read and write
|
||
13738036000
|
trusted library allocation
|
page read and write
|
||
1373804B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
13737EBB000
|
trusted library allocation
|
page read and write
|
||
CC957FE000
|
stack
|
page read and write
|
||
7FFD9BD35000
|
trusted library allocation
|
page read and write
|
||
13736090000
|
heap
|
page read and write
|
||
13736140000
|
heap
|
page read and write
|
||
13737FDC000
|
trusted library allocation
|
page read and write
|
||
13737F54000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA1D000
|
trusted library allocation
|
page read and write
|
||
13738004000
|
trusted library allocation
|
page read and write
|
||
7FFD9BABE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
20D16FE000
|
stack
|
page read and write
|
||
7FFD9BBCC000
|
trusted library allocation
|
page read and write
|
||
1373828B000
|
trusted library allocation
|
page read and write
|
||
250E2324000
|
trusted library allocation
|
page read and write
|
||
7FFD9B905000
|
trusted library allocation
|
page read and write
|
||
140000000
|
remote allocation
|
page execute read
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
23FEC2A0000
|
heap
|
page read and write
|
||
20D10FE000
|
stack
|
page read and write
|
||
250FA9E0000
|
heap
|
page read and write
|
||
250E0418000
|
heap
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
250E06C0000
|
trusted library allocation
|
page read and write
|
||
13735E90000
|
heap
|
page read and write
|
||
250F21F2000
|
trusted library allocation
|
page read and write
|
||
7FF424360000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA4A000
|
trusted library allocation
|
page read and write
|
||
1373806F000
|
trusted library allocation
|
page read and write
|
||
137382A1000
|
trusted library allocation
|
page read and write
|
||
13736145000
|
heap
|
page read and write
|
||
250E044E000
|
heap
|
page read and write
|
||
13738236000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
137381B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
13738254000
|
trusted library allocation
|
page read and write
|
||
13737FE5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC5000
|
trusted library allocation
|
page read and write
|
||
1373804F000
|
trusted library allocation
|
page read and write
|
||
137380B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD3A000
|
trusted library allocation
|
page read and write
|
||
13737F8F000
|
trusted library allocation
|
page read and write
|
||
1373824B000
|
trusted library allocation
|
page read and write
|
||
13738359000
|
trusted library allocation
|
page read and write
|
||
13738409000
|
trusted library allocation
|
page read and write
|
||
137507E2000
|
heap
|
page read and write
|
||
1373842D000
|
trusted library allocation
|
page read and write
|
||
137383A7000
|
trusted library allocation
|
page read and write
|
||
1374FEFA000
|
heap
|
page read and write
|
||
250F21C2000
|
trusted library allocation
|
page read and write
|
||
13738205000
|
trusted library allocation
|
page read and write
|
||
13738381000
|
trusted library allocation
|
page read and write
|
||
13738058000
|
trusted library allocation
|
page read and write
|
||
13750490000
|
trusted library section
|
page read and write
|
||
250F23D9000
|
trusted library allocation
|
page read and write
|
||
1373822A000
|
trusted library allocation
|
page read and write
|
||
250E231E000
|
trusted library allocation
|
page read and write
|
||
7FF424340000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
250F243C000
|
trusted library allocation
|
page read and write
|
||
13737FB1000
|
trusted library allocation
|
page read and write
|
||
250FA8F6000
|
heap
|
page read and write
|
||
7FFD9BCB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA32000
|
trusted library allocation
|
page read and write
|
||
250F242B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
250E22D9000
|
trusted library allocation
|
page read and write
|
||
250E2326000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93D000
|
trusted library allocation
|
page execute and read and write
|
||
9E69AFF000
|
stack
|
page read and write
|
||
13738221000
|
trusted library allocation
|
page read and write
|
||
CC94BFE000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
250F2347000
|
trusted library allocation
|
page read and write
|
||
13735EC0000
|
heap
|
page read and write
|
||
13737E7E000
|
trusted library allocation
|
page read and write
|
||
250F21A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2711EAB8000
|
heap
|
page read and write
|
||
13738455000
|
trusted library allocation
|
page read and write
|
||
250F222F000
|
trusted library allocation
|
page read and write
|
||
250E248C000
|
trusted library allocation
|
page read and write
|
||
250E2640000
|
trusted library allocation
|
page read and write
|
||
250F21D6000
|
trusted library allocation
|
page read and write
|
||
13747D7E000
|
trusted library allocation
|
page read and write
|
||
20D0DFD000
|
stack
|
page read and write
|
||
137382E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
250E21AE000
|
trusted library allocation
|
page read and write
|
||
13736160000
|
trusted library section
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
13737BFE000
|
trusted library allocation
|
page read and write
|
||
137380AF000
|
trusted library allocation
|
page read and write
|
||
250F2345000
|
trusted library allocation
|
page read and write
|
||
CC95BFE000
|
stack
|
page read and write
|
||
13737BF2000
|
trusted library allocation
|
page read and write
|
||
250E21C6000
|
trusted library allocation
|
page read and write
|
||
13737E80000
|
trusted library allocation
|
page read and write
|
||
20D18FE000
|
stack
|
page read and write
|
||
250FA9E3000
|
heap
|
page read and write
|
||
1373832E000
|
trusted library allocation
|
page read and write
|
||
13737BFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
250F2357000
|
trusted library allocation
|
page read and write
|
||
20D1FFF000
|
stack
|
page read and write
|
||
20D1AFE000
|
stack
|
page read and write
|
||
137382B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
13738049000
|
trusted library allocation
|
page read and write
|
||
13735F2F000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
250E2331000
|
trusted library allocation
|
page read and write
|
||
13738407000
|
trusted library allocation
|
page read and write
|
||
13737F2E000
|
trusted library allocation
|
page read and write
|
||
250F2464000
|
trusted library allocation
|
page read and write
|
||
1373807E000
|
trusted library allocation
|
page read and write
|
||
1373833D000
|
trusted library allocation
|
page read and write
|
||
13738218000
|
trusted library allocation
|
page read and write
|
||
250F2237000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA39000
|
trusted library allocation
|
page read and write
|
||
250E0438000
|
heap
|
page read and write
|
||
1373842B000
|
trusted library allocation
|
page read and write
|
||
13737F8D000
|
trusted library allocation
|
page read and write
|
||
13737FAF000
|
trusted library allocation
|
page read and write
|
||
CC924CF000
|
stack
|
page read and write
|
||
13737FC6000
|
trusted library allocation
|
page read and write
|
||
137381E8000
|
trusted library allocation
|
page read and write
|
||
250E06F0000
|
heap
|
page execute and read and write
|
||
250E0520000
|
heap
|
page read and write
|
||
20D12FE000
|
stack
|
page read and write
|
||
250E244C000
|
trusted library allocation
|
page read and write
|
||
13735F02000
|
heap
|
page read and write
|
||
13738016000
|
trusted library allocation
|
page read and write
|
||
250E0740000
|
heap
|
page read and write
|
||
7FFD9BCF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA2B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
13737EC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
250E217A000
|
trusted library allocation
|
page read and write
|
||
1375074D000
|
heap
|
page read and write
|
||
CC943FE000
|
stack
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
250E2484000
|
trusted library allocation
|
page read and write
|
||
13737EA2000
|
trusted library allocation
|
page read and write
|
||
1373802D000
|
trusted library allocation
|
page read and write
|
||
250FA8B0000
|
heap
|
page read and write
|
||
13735ECC000
|
heap
|
page read and write
|
||
1373826D000
|
trusted library allocation
|
page read and write
|
||
137381D5000
|
trusted library allocation
|
page read and write
|
||
250E24F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
250E25AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B96B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B93D000
|
trusted library allocation
|
page read and write
|
||
13737C02000
|
trusted library allocation
|
page read and write
|
||
13737E95000
|
trusted library allocation
|
page read and write
|
||
1373827C000
|
trusted library allocation
|
page read and write
|
||
250E2610000
|
trusted library allocation
|
page read and write
|
||
250F2468000
|
trusted library allocation
|
page read and write
|
||
1373844B000
|
trusted library allocation
|
page read and write
|
||
250F2366000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
20D0CEB000
|
stack
|
page read and write
|
||
7FFD9BBBF000
|
trusted library allocation
|
page read and write
|
||
250F2341000
|
trusted library allocation
|
page read and write
|
||
13737BE8000
|
trusted library allocation
|
page read and write
|
||
13737FDE000
|
trusted library allocation
|
page read and write
|
||
137383B9000
|
trusted library allocation
|
page read and write
|
||
250E248E000
|
trusted library allocation
|
page read and write
|
||
250E2427000
|
trusted library allocation
|
page read and write
|
||
250E21F5000
|
trusted library allocation
|
page read and write
|
||
13738002000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page read and write
|
||
13737F5C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA24000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB93000
|
trusted library allocation
|
page read and write
|
||
13737FF8000
|
trusted library allocation
|
page read and write
|
||
137381D7000
|
trusted library allocation
|
page read and write
|
||
13738223000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
13738047000
|
trusted library allocation
|
page read and write
|
||
250F236C000
|
trusted library allocation
|
page read and write
|
||
20D15FE000
|
stack
|
page read and write
|
||
137382FA000
|
trusted library allocation
|
page read and write
|
||
250E0600000
|
heap
|
page read and write
|
||
1373817B000
|
trusted library allocation
|
page read and write
|
||
250F2277000
|
trusted library allocation
|
page read and write
|
||
13735F2D000
|
heap
|
page read and write
|
||
1375067C000
|
heap
|
page read and write
|
||
CC947FE000
|
stack
|
page read and write
|
||
23FEDE45000
|
heap
|
page read and write
|
||
137381EA000
|
trusted library allocation
|
page read and write
|
||
20D13FA000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
13737B60000
|
heap
|
page execute and read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
13737FB4000
|
trusted library allocation
|
page read and write
|
||
137383E5000
|
trusted library allocation
|
page read and write
|
||
250E0690000
|
trusted library allocation
|
page read and write
|
||
250E217E000
|
trusted library allocation
|
page read and write
|
||
20D09AF000
|
stack
|
page read and write
|
||
250F2228000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
250E21B2000
|
trusted library allocation
|
page read and write
|
||
250E257F000
|
trusted library allocation
|
page read and write
|
||
20D1BFD000
|
stack
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
250E0620000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
13737BEF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
B9E667C000
|
stack
|
page read and write
|
||
250F21D2000
|
trusted library allocation
|
page read and write
|
There are 617 hidden memdumps, click here to show them.