Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
HLZwUhcJ28.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\Qt5GuiVBox.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\Qt5SqlVBox.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\Security-Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\VBoxClient-x86.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\VBoxProxyStub-x86.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\cygwin1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\libiconv-2.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\libidn2-0.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\libintl-8.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\qsqlite.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\liblibimhex.dll.a
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\liblibpl.dll.a
|
current ar archive
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\HLZwUhcJ28.exe
|
"C:\Users\user\Desktop\HLZwUhcJ28.exe"
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay.exe
|
"C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wrigglesight.sbs
|
|||
heroicmint.sbs
|
|||
ferrycheatyk.sbs
|
|||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
deepymouthi.sbs
|
|||
sidercotay.sbs
|
|||
https://villagedguy.cyou/api
|
104.21.32.196
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://villagedguy.cyou/apibu0
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
|
unknown
|
||
https://github.com/golang/protobuf/issues/1609):
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
|
unknown
|
||
https://github.com/zitadel/zitadel/blob/new-eventstore/cmd/zitadel/startup.yaml.
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://villagedguy.cyou/apibu
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://villagedguy.cyou:443/api
|
unknown
|
||
https://villagedguy.cyou/
|
unknown
|
||
https://www.gnu.org/gethelp/
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=I6RUPT-G-voT&
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://www.gnu.org/software/libidn/#libidn2
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
http://www.color.org)
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://villagedguy.cyou/api~Vl
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://gnu.org/licenses/gpl.html
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
|
unknown
|
||
https://www.gnu.org/software/libidn/#libidn2Libidn2General
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
https://store.steampowered.com/;
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
|
unknown
|
||
https://villagedguy.cyou/api0
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://www.gnu.org/gethelp/exebatcmdcom
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
|
unknown
|
||
https://medal.tv
|
unknown
|
||
https://api.zitadel.ch/assets/v1/avatar-32432jkh4kj32
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&
|
unknown
|
||
https://villagedguy.cyou/apiO
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=xYs7
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://villagedguy.cyou/apiob
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://www.virtualbox.org/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
villagedguy.cyou
|
104.21.32.196
|
||
wrigglesight.sbs
|
unknown
|
||
ferrycheatyk.sbs
|
unknown
|
||
deepymouthi.sbs
|
unknown
|
||
monstourtu.sbs
|
unknown
|
||
captaitwik.sbs
|
unknown
|
||
snailyeductyi.sbs
|
unknown
|
||
heroicmint.sbs
|
unknown
|
||
sidercotay.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.102.49.254
|
steamcommunity.com
|
United States
|
||
104.21.32.196
|
villagedguy.cyou
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A8E0000
|
direct allocation
|
page read and write
|
||
1EE86CD0000
|
heap
|
page read and write
|
||
504B000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1968000
|
unkown
|
page write copy
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
A33F000
|
stack
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
1EE82D13000
|
heap
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
2D16000
|
heap
|
page read and write
|
||
1EE83000000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
A886000
|
direct allocation
|
page read and write
|
||
2C58000
|
heap
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
7FF70ECD1000
|
unkown
|
page execute read
|
||
2C50000
|
heap
|
page read and write
|
||
2C7E000
|
heap
|
page read and write
|
||
50D4000
|
trusted library allocation
|
page read and write
|
||
2D49000
|
heap
|
page read and write
|
||
5034000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
1EE82DB7000
|
heap
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
503E000
|
trusted library allocation
|
page read and write
|
||
5144000
|
trusted library allocation
|
page read and write
|
||
505F000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
508F000
|
trusted library allocation
|
page read and write
|
||
503A000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
1BF0000
|
heap
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
A68C000
|
direct allocation
|
page read and write
|
||
1EE82CE0000
|
heap
|
page read and write
|
||
A340000
|
direct allocation
|
page read and write
|
||
507B000
|
trusted library allocation
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
A690000
|
direct allocation
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
5089000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
1166000
|
unkown
|
page readonly
|
||
2D19000
|
heap
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
507B000
|
trusted library allocation
|
page read and write
|
||
19D1000
|
unkown
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
1EE82F51000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
A6AC000
|
direct allocation
|
page read and write
|
||
5084000
|
trusted library allocation
|
page read and write
|
||
196A000
|
unkown
|
page read and write
|
||
2D3D000
|
heap
|
page read and write
|
||
5083000
|
trusted library allocation
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
1EE82D4B000
|
heap
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
5054000
|
trusted library allocation
|
page read and write
|
||
7FF70ED3C000
|
unkown
|
page readonly
|
||
13F3000
|
unkown
|
page readonly
|
||
19F1000
|
unkown
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
A44D000
|
direct allocation
|
page read and write
|
||
2D49000
|
heap
|
page read and write
|
||
1BE0000
|
direct allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
1C20000
|
direct allocation
|
page read and write
|
||
A53A000
|
direct allocation
|
page read and write
|
||
50A4000
|
trusted library allocation
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
2CF9000
|
heap
|
page read and write
|
||
7FF70ED3C000
|
unkown
|
page readonly
|
||
1EE82D2A000
|
heap
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
1968000
|
unkown
|
page write copy
|
||
2D31000
|
heap
|
page read and write
|
||
2CBC000
|
heap
|
page read and write
|
||
2D1E000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
4800000
|
remote allocation
|
page read and write
|
||
504B000
|
trusted library allocation
|
page read and write
|
||
507B000
|
trusted library allocation
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
1A7C000
|
direct allocation
|
page read and write
|
||
84D83FE000
|
stack
|
page read and write
|
||
506D000
|
trusted library allocation
|
page read and write
|
||
2D2B000
|
heap
|
page read and write
|
||
A484000
|
direct allocation
|
page read and write
|
||
2CAD000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
2D49000
|
heap
|
page read and write
|
||
A5FA000
|
direct allocation
|
page read and write
|
||
2D1C000
|
heap
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
19C6000
|
unkown
|
page write copy
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2D45000
|
heap
|
page read and write
|
||
2D45000
|
heap
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
A42C000
|
direct allocation
|
page read and write
|
||
2CF3000
|
heap
|
page read and write
|
||
A5F2000
|
direct allocation
|
page read and write
|
||
84D7EFE000
|
stack
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
1EE82D4B000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
84D7BCB000
|
stack
|
page read and write
|
||
506C000
|
trusted library allocation
|
page read and write
|
||
1EE82ED0000
|
heap
|
page read and write
|
||
5092000
|
trusted library allocation
|
page read and write
|
||
1EE82D4B000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
5069000
|
trusted library allocation
|
page read and write
|
||
1EE82CC0000
|
heap
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
2A6FF000
|
stack
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
7FF70ED0B000
|
unkown
|
page readonly
|
||
1EE82DB8000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
1A70000
|
direct allocation
|
page read and write
|
||
50A3000
|
trusted library allocation
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
505C000
|
trusted library allocation
|
page read and write
|
||
A57E000
|
direct allocation
|
page read and write
|
||
A67E000
|
direct allocation
|
page read and write
|
||
520D000
|
trusted library allocation
|
page read and write
|
||
1EE82D5C000
|
heap
|
page read and write
|
||
45C000
|
remote allocation
|
page execute and read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
1EE82D58000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
508A000
|
trusted library allocation
|
page read and write
|
||
506C000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
521D000
|
trusted library allocation
|
page read and write
|
||
507D000
|
trusted library allocation
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
A52C000
|
direct allocation
|
page read and write
|
||
196E000
|
unkown
|
page write copy
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
A570000
|
direct allocation
|
page read and write
|
||
1B5000
|
heap
|
page read and write
|
||
2D2B000
|
heap
|
page read and write
|
||
A66E000
|
direct allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
A68E000
|
direct allocation
|
page read and write
|
||
A5BE000
|
direct allocation
|
page read and write
|
||
507B000
|
trusted library allocation
|
page read and write
|
||
2D1D000
|
heap
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
1C0E000
|
direct allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
503A000
|
trusted library allocation
|
page read and write
|
||
A347000
|
direct allocation
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
19FB000
|
unkown
|
page write copy
|
||
5079000
|
trusted library allocation
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
19F8000
|
unkown
|
page read and write
|
||
7FF70ECD0000
|
unkown
|
page readonly
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
19C2000
|
unkown
|
page write copy
|
||
2D3C000
|
heap
|
page read and write
|
||
5078000
|
trusted library allocation
|
page read and write
|
||
1EE82D4B000
|
heap
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
A5CC000
|
direct allocation
|
page read and write
|
||
A632000
|
direct allocation
|
page read and write
|
||
4800000
|
remote allocation
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
508E000
|
trusted library allocation
|
page read and write
|
||
A6AA000
|
direct allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
A482000
|
direct allocation
|
page read and write
|
||
A50E000
|
direct allocation
|
page read and write
|
||
5073000
|
trusted library allocation
|
page read and write
|
||
84D84FB000
|
stack
|
page read and write
|
||
A684000
|
direct allocation
|
page read and write
|
||
19FC000
|
unkown
|
page readonly
|
||
2D3C000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
7FF70ED1D000
|
unkown
|
page write copy
|
||
7FF70ECD1000
|
unkown
|
page execute read
|
||
A51E000
|
direct allocation
|
page read and write
|
||
2D16000
|
heap
|
page read and write
|
||
2D45000
|
heap
|
page read and write
|
||
1EE82D4E000
|
heap
|
page read and write
|
||
1A65000
|
unkown
|
page readonly
|
||
2A50000
|
heap
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
A604000
|
direct allocation
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
495C000
|
stack
|
page read and write
|
||
5072000
|
trusted library allocation
|
page read and write
|
||
A45E000
|
direct allocation
|
page read and write
|
||
5036000
|
trusted library allocation
|
page read and write
|
||
2D1E000
|
heap
|
page read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
1A65000
|
unkown
|
page readonly
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
50A4000
|
trusted library allocation
|
page read and write
|
||
A524000
|
direct allocation
|
page read and write
|
||
A8E0000
|
direct allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
2A7FF000
|
stack
|
page read and write
|
||
A35D000
|
direct allocation
|
page read and write
|
||
A664000
|
direct allocation
|
page read and write
|
||
2D0D000
|
heap
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
7FF70ED40000
|
unkown
|
page readonly
|
||
503C000
|
trusted library allocation
|
page read and write
|
||
5079000
|
trusted library allocation
|
page read and write
|
||
2D2B000
|
heap
|
page read and write
|
||
2D1C000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
A400000
|
direct allocation
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
A544000
|
direct allocation
|
page read and write
|
||
5077000
|
trusted library allocation
|
page read and write
|
||
2D33000
|
heap
|
page read and write
|
||
505D000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
1C42000
|
direct allocation
|
page read and write
|
||
A5C8000
|
direct allocation
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
52AD000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
1EE82D2E000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
1EE82D1D000
|
heap
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
507A000
|
trusted library allocation
|
page read and write
|
||
1EE82CF8000
|
heap
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
A668000
|
direct allocation
|
page read and write
|
||
1EE82CF8000
|
heap
|
page read and write
|
||
A7D8000
|
direct allocation
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
A472000
|
direct allocation
|
page read and write
|
||
5097000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
A6B0000
|
direct allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
1EE82D46000
|
heap
|
page read and write
|
||
1970000
|
unkown
|
page write copy
|
||
1C08000
|
direct allocation
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
A504000
|
direct allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
A977000
|
direct allocation
|
page read and write
|
||
507A000
|
trusted library allocation
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
1973000
|
unkown
|
page read and write
|
||
A4E4000
|
direct allocation
|
page read and write
|
||
A682000
|
direct allocation
|
page read and write
|
||
7FF70ECD0000
|
unkown
|
page readonly
|
||
505C000
|
trusted library allocation
|
page read and write
|
||
50A1000
|
trusted library allocation
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
504B000
|
trusted library allocation
|
page read and write
|
||
1EE82D16000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
A65E000
|
direct allocation
|
page read and write
|
||
1EE83005000
|
heap
|
page read and write
|
||
507B000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
2D45000
|
heap
|
page read and write
|
||
1EE864D0000
|
trusted library allocation
|
page read and write
|
||
196F000
|
unkown
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
A576000
|
direct allocation
|
page read and write
|
||
1EE82D2E000
|
heap
|
page read and write
|
||
5095000
|
trusted library allocation
|
page read and write
|
||
A6C4000
|
direct allocation
|
page read and write
|
||
5036000
|
trusted library allocation
|
page read and write
|
||
19FB000
|
unkown
|
page write copy
|
||
A4E2000
|
direct allocation
|
page read and write
|
||
A646000
|
direct allocation
|
page read and write
|
||
5066000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
unkown
|
page write copy
|
||
2D45000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
515D000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
1EE84C20000
|
heap
|
page read and write
|
||
19C1000
|
unkown
|
page read and write
|
||
5071000
|
trusted library allocation
|
page read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
5039000
|
trusted library allocation
|
page read and write
|
||
981000
|
unkown
|
page execute read
|
||
50CE000
|
trusted library allocation
|
page read and write
|
||
A4E0000
|
direct allocation
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
5175000
|
trusted library allocation
|
page read and write
|
||
A52E000
|
direct allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
A566000
|
direct allocation
|
page read and write
|
||
A626000
|
direct allocation
|
page read and write
|
||
1EE82DB3000
|
heap
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
47ED000
|
stack
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
A568000
|
direct allocation
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
507D000
|
trusted library allocation
|
page read and write
|
||
1166000
|
unkown
|
page readonly
|
||
A644000
|
direct allocation
|
page read and write
|
||
505B000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
A8F0000
|
direct allocation
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
A624000
|
direct allocation
|
page read and write
|
||
A438000
|
direct allocation
|
page read and write
|
||
A488000
|
direct allocation
|
page read and write
|
||
A442000
|
direct allocation
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
1EE84D60000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
84D7BD6000
|
stack
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
509D000
|
trusted library allocation
|
page read and write
|
||
970000
|
direct allocation
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
A67C000
|
direct allocation
|
page read and write
|
||
A514000
|
direct allocation
|
page read and write
|
||
A454000
|
direct allocation
|
page read and write
|
||
A5CA000
|
direct allocation
|
page read and write
|
||
1EE82EB0000
|
heap
|
page read and write
|
||
51E5000
|
trusted library allocation
|
page read and write
|
||
1EE82D31000
|
heap
|
page read and write
|
||
2D26000
|
heap
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
A550000
|
direct allocation
|
page read and write
|
||
A69C000
|
direct allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2C9A000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
19FC000
|
unkown
|
page readonly
|
||
5047000
|
trusted library allocation
|
page read and write
|
||
A345000
|
direct allocation
|
page read and write
|
||
50CC000
|
trusted library allocation
|
page read and write
|
||
503A000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
1EE82D2E000
|
heap
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
84D82FE000
|
stack
|
page read and write
|
||
A592000
|
direct allocation
|
page read and write
|
||
1A78000
|
direct allocation
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
A878000
|
direct allocation
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
A5EF000
|
direct allocation
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
2C93000
|
heap
|
page read and write
|
||
1EE82DB4000
|
heap
|
page read and write
|
||
1EE82CE8000
|
heap
|
page read and write
|
||
5047000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
7FF70ED0B000
|
unkown
|
page readonly
|
||
536F000
|
stack
|
page read and write
|
||
A506000
|
direct allocation
|
page read and write
|
||
485D000
|
stack
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1EE82DB8000
|
heap
|
page read and write
|
||
1EE82DB1000
|
heap
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
A73A000
|
direct allocation
|
page read and write
|
||
2A5FF000
|
stack
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
13F3000
|
unkown
|
page readonly
|
||
4E4E000
|
stack
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
5131000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2A4FF000
|
stack
|
page read and write
|
||
A888000
|
direct allocation
|
page read and write
|
||
A5D0000
|
direct allocation
|
page read and write
|
||
4800000
|
remote allocation
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
1EE82FB0000
|
heap
|
page read and write
|
||
5095000
|
trusted library allocation
|
page read and write
|
||
5073000
|
trusted library allocation
|
page read and write
|
||
5066000
|
trusted library allocation
|
page read and write
|
||
1EE86CD2000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
2D19000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
2AE6000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
1EE82F6A000
|
trusted library allocation
|
page read and write
|
||
981000
|
unkown
|
page execute read
|
||
A6C6000
|
direct allocation
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
1AFD000
|
stack
|
page read and write
|
||
1EE82D16000
|
heap
|
page read and write
|
||
5082000
|
trusted library allocation
|
page read and write
|
||
1EE82CD0000
|
heap
|
page readonly
|
||
2D02000
|
heap
|
page read and write
|
||
27AB000
|
stack
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
A692000
|
direct allocation
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
504F000
|
trusted library allocation
|
page read and write
|
||
7FF70ED3F000
|
unkown
|
page write copy
|
||
503A000
|
trusted library allocation
|
page read and write
|
||
506D000
|
trusted library allocation
|
page read and write
|
||
1AB0000
|
direct allocation
|
page read and write
|
||
2D12000
|
heap
|
page read and write
|
||
5047000
|
trusted library allocation
|
page read and write
|
||
2D49000
|
heap
|
page read and write
|
||
1EE82D2E000
|
heap
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
A638000
|
direct allocation
|
page read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
5092000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
1EE82D2A000
|
heap
|
page read and write
|
||
A508000
|
direct allocation
|
page read and write
|
||
2D13000
|
heap
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
508F000
|
trusted library allocation
|
page read and write
|
||
A51A000
|
direct allocation
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
2D3C000
|
heap
|
page read and write
|
||
A888000
|
direct allocation
|
page read and write
|
||
A680000
|
direct allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
A56A000
|
direct allocation
|
page read and write
|
||
A42E000
|
direct allocation
|
page read and write
|
||
A694000
|
direct allocation
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
513E000
|
trusted library allocation
|
page read and write
|
||
1EE84C24000
|
heap
|
page read and write
|
||
A66C000
|
direct allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
2D12000
|
heap
|
page read and write
|
||
505B000
|
trusted library allocation
|
page read and write
|
||
A5B6000
|
direct allocation
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
505E000
|
trusted library allocation
|
page read and write
|
||
27EB000
|
stack
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
50AE000
|
trusted library allocation
|
page read and write
|
||
5089000
|
trusted library allocation
|
page read and write
|
||
A51C000
|
direct allocation
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
5215000
|
trusted library allocation
|
page read and write
|
||
A700000
|
direct allocation
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
505B000
|
trusted library allocation
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
A554000
|
direct allocation
|
page read and write
|
||
1EE84D70000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
heap
|
page read and write
|
||
A522000
|
direct allocation
|
page read and write
|
||
507A000
|
trusted library allocation
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
19B4000
|
unkown
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
5066000
|
trusted library allocation
|
page read and write
|
||
84D7FFE000
|
stack
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
2D1D000
|
heap
|
page read and write
|
||
A420000
|
direct allocation
|
page read and write
|
||
84D81FD000
|
stack
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
506C000
|
trusted library allocation
|
page read and write
|
||
A500000
|
direct allocation
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
A47E000
|
direct allocation
|
page read and write
|
||
5032000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
heap
|
page read and write
|
||
1B3D000
|
stack
|
page read and write
|
||
5038000
|
trusted library allocation
|
page read and write
|
||
2D45000
|
heap
|
page read and write
|
||
A602000
|
direct allocation
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
5069000
|
trusted library allocation
|
page read and write
|
||
A3BD000
|
stack
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
1B7D000
|
stack
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
7FF70ED1D000
|
unkown
|
page read and write
|
||
A5AE000
|
direct allocation
|
page read and write
|
||
2D19000
|
heap
|
page read and write
|
||
2D2B000
|
heap
|
page read and write
|
||
50B4000
|
trusted library allocation
|
page read and write
|
||
5048000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
5065000
|
trusted library allocation
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
508A000
|
trusted library allocation
|
page read and write
|
||
1EE82D56000
|
heap
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
1EE82DAF000
|
heap
|
page read and write
|
||
1EE82D1C000
|
heap
|
page read and write
|
||
19C8000
|
unkown
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
A520000
|
direct allocation
|
page read and write
|
||
A5C4000
|
direct allocation
|
page read and write
|
||
5039000
|
trusted library allocation
|
page read and write
|
||
2D0D000
|
heap
|
page read and write
|
||
A5D2000
|
direct allocation
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
5096000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
19C3000
|
unkown
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
1C00000
|
direct allocation
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
A650000
|
direct allocation
|
page read and write
|
||
A69A000
|
direct allocation
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
5038000
|
trusted library allocation
|
page read and write
|
||
5073000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
heap
|
page read and write
|
||
1EE82DB8000
|
heap
|
page read and write
|
||
1EE82D4E000
|
heap
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
5048000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
5063000
|
trusted library allocation
|
page read and write
|
||
A977000
|
direct allocation
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
507E000
|
trusted library allocation
|
page read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
A5B4000
|
direct allocation
|
page read and write
|
||
5069000
|
trusted library allocation
|
page read and write
|
||
7FF70ED26000
|
unkown
|
page read and write
|
||
A658000
|
direct allocation
|
page read and write
|
||
1BBD000
|
stack
|
page read and write
|
||
1EE82D26000
|
heap
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
1974000
|
unkown
|
page write copy
|
||
1BC0000
|
heap
|
page read and write
|
||
A69E000
|
direct allocation
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
2D15000
|
heap
|
page read and write
|
There are 659 hidden memdumps, click here to show them.