Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\Desktop\Main.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OrionAscension.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OrionAscension_Updated.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Data\Music\Furia_Screen.mp3
|
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 64 kbps, 48 kHz, Stereo
|
dropped
|
||
C:\Users\user\Desktop\Data\Music\LI_Event_IllusionOfMemory.mp3
|
Audio file with ID3 version 2.3.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo
|
dropped
|
||
C:\Users\user\Desktop\Data\ResSet\Custom_Room1.orion
|
data
|
dropped
|
||
C:\Users\user\Desktop\MailMIME.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MailSMTP.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\update.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C update.bat
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 2
|
||
C:\Users\user\Desktop\OrionAscension.exe
|
OrionAscension.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
TIMEOUT /T 2
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://foo/images/buttons/config/config_hover.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://cdn.orionascension.com.br
|
unknown
|
||
http://defaultcontainer/images/buttons/fps/fps_hover.png
|
unknown
|
||
http://nexon.co.jp
|
unknown
|
||
http://foo/bar/images/buttons/config/config_hover.png
|
unknown
|
||
https://ssl.grandchase.com.tw/member/authentication.htmhttp://member.changyou.com/register/regPhoneS
|
unknown
|
||
http://defaultcontainer/images/buttons/lang/lang_hover.png
|
unknown
|
||
https://cdn.orionascension.com.br/files.xml
|
unknown
|
||
http://defaultcontainer/images/buttons/config/config_default.png
|
unknown
|
||
https://bugtrap.chaseorigin.com.br/RequestHandler.aspxDISPLAYEdgeTexture.dds./Data/Stage/PlayerTempl
|
unknown
|
||
http://cdn.orionascension.com.br
|
unknown
|
||
https://cdn.orionascension.com.brShttps://cdn.orionascension.com.br/Update/
|
unknown
|
||
https://noticias.eternalsage.com.br
|
unknown
|
||
https://cdn.orionascension.com.br/Update/Data
|
unknown
|
||
https://cdn.orionascension.com.br/version.bin
|
unknown
|
||
http://chase.netmarble.net/Event/2012/20120503_ICandoit/_Html/
|
unknown
|
||
http://chase.playnetwork.co.kr/Event/2012/20120503_ICandoit/_Html
|
unknown
|
||
https://cdn.orionascension.com.br/Update/
|
unknown
|
||
https://noticias.eternalsage.com.brPb
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://nexon.co.jpnummedia%dwindowReplay
|
unknown
|
||
https://cdn.orionascension.com.br/launcher.txt
|
unknown
|
||
http://defaultcontainer/images/buttons/config/config_hover.png
|
unknown
|
||
http://relaxng.org/ns/structure/1.0
|
unknown
|
||
https://cdn.orionascension.com.br/OrionAscension.exe
|
unknown
|
||
https://cdn.orionascension.com.br/launcher.txtonPa
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://chase.netmarble.net/news/notice/BbsContentView.asp?seq=8119021&searchstring=&searchstringopti
|
unknown
|
||
http://chase.playnetwork.co.kr/Event/2012/20120503_ICandoit/_Htmlstatic_mydpointstatic_itemdpointsta
|
unknown
|
||
http://www.ijg.org
|
unknown
|
||
http://chase.tooniland.com/Event/2012/20120503_ICandoit/_Html
|
unknown
|
||
https://github.com/XamlAnimatedGif/XamlAnimatedGif
|
unknown
|
||
http://chase.nate.netmarble.net/Event/2012/20120503_ICandoit/_Html/
|
unknown
|
There are 24 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
||
138.255.160.46
|
unknown
|
Brazil
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
|
Left
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
|
Top
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
|
FileDirectory
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C800001000
|
trusted library allocation
|
page read and write
|
||
1C87CB22000
|
unkown
|
page readonly
|
||
22980001000
|
trusted library allocation
|
page read and write
|
||
229FCCA2000
|
unkown
|
page readonly
|
||
229FF365000
|
heap
|
page read and write
|
||
2299B57A000
|
heap
|
page read and write
|
||
1C81DB1C000
|
heap
|
page read and write
|
||
2299B4EB000
|
heap
|
page read and write
|
||
1C81B426000
|
heap
|
page read and write
|
||
1C87F504000
|
heap
|
page read and write
|
||
7FF4AFA5C000
|
trusted library allocation
|
page readonly
|
||
2299B405000
|
heap
|
page read and write
|
||
7FF4AFA72000
|
trusted library allocation
|
page readonly
|
||
7FFD345FC000
|
trusted library allocation
|
page execute and read and write
|
||
13A7D9AA000
|
heap
|
page read and write
|
||
1C87F0D0000
|
trusted library allocation
|
page read and write
|
||
7FF4AFA52000
|
trusted library allocation
|
page readonly
|
||
BF89563000
|
stack
|
page read and write
|
||
229FD0E0000
|
trusted library allocation
|
page read and write
|
||
1C81B298000
|
heap
|
page read and write
|
||
229FD070000
|
heap
|
page read and write
|
||
1C800071000
|
trusted library allocation
|
page read and write
|
||
1C81DA07000
|
heap
|
page read and write
|
||
1C8001EE000
|
trusted library allocation
|
page read and write
|
||
1C87D040000
|
heap
|
page execute and read and write
|
||
1C87F6C0000
|
trusted library allocation
|
page read and write
|
||
22980584000
|
trusted library allocation
|
page read and write
|
||
1C87CC6C000
|
heap
|
page read and write
|
||
BF8A1FF000
|
stack
|
page read and write
|
||
1C81E259000
|
heap
|
page read and write
|
||
1C87F46F000
|
heap
|
page read and write
|
||
1C87FAFB000
|
heap
|
page read and write
|
||
229FFF60000
|
trusted library section
|
page readonly
|
||
353137000
|
stack
|
page read and write
|
||
1C87CBCD000
|
unkown
|
page readonly
|
||
1C81D0E0000
|
trusted library allocation
|
page read and write
|
||
229FF37C000
|
heap
|
page read and write
|
||
229FEA8A000
|
heap
|
page read and write
|
||
1C81D0B0000
|
trusted library allocation
|
page read and write
|
||
1C810021000
|
trusted library allocation
|
page read and write
|
||
1C81B61D000
|
heap
|
page read and write
|
||
352A3B000
|
stack
|
page read and write
|
||
1C87FAC6000
|
heap
|
page read and write
|
||
229FF351000
|
heap
|
page read and write
|
||
2299B420000
|
heap
|
page read and write
|
||
1C80007B000
|
trusted library allocation
|
page read and write
|
||
2299B528000
|
heap
|
page read and write
|
||
2299B43D000
|
heap
|
page read and write
|
||
2299B434000
|
heap
|
page read and write
|
||
1C81D090000
|
trusted library allocation
|
page read and write
|
||
229FF344000
|
heap
|
page read and write
|
||
7FF4AFA79000
|
trusted library allocation
|
page execute read
|
||
1C81DB08000
|
heap
|
page read and write
|
||
2299B3C9000
|
heap
|
page read and write
|
||
1C8002D7000
|
trusted library allocation
|
page read and write
|
||
1C87CCCD000
|
heap
|
page read and write
|
||
1F0A2B90000
|
heap
|
page read and write
|
||
1C81B27E000
|
heap
|
page read and write
|
||
2299B3C5000
|
heap
|
page read and write
|
||
2298006D000
|
trusted library allocation
|
page read and write
|
||
2299B3BC000
|
heap
|
page read and write
|
||
7FF4AFA43000
|
trusted library allocation
|
page execute read
|
||
BF898FE000
|
stack
|
page read and write
|
||
1C87F1D4000
|
heap
|
page read and write
|
||
3526FA000
|
stack
|
page read and write
|
||
1C87CED0000
|
trusted library allocation
|
page read and write
|
||
BF89EFB000
|
stack
|
page read and write
|
||
2299B44E000
|
heap
|
page read and write
|
||
351EFB000
|
stack
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
1C81D010000
|
trusted library allocation
|
page read and write
|
||
7FF4AFA92000
|
trusted library allocation
|
page readonly
|
||
1C81D2C1000
|
heap
|
page read and write
|
||
1C87E865000
|
heap
|
page read and write
|
||
1C87D0B0000
|
heap
|
page read and write
|
||
1C81B4D2000
|
heap
|
page read and write
|
||
1C87F120000
|
heap
|
page read and write
|
||
229FFC48000
|
heap
|
page read and write
|
||
BF8A5FE000
|
stack
|
page read and write
|
||
1C87CE80000
|
heap
|
page read and write
|
||
1C81CFC0000
|
trusted library allocation
|
page read and write
|
||
1C81DB19000
|
heap
|
page read and write
|
||
7FFD3456B000
|
trusted library allocation
|
page execute and read and write
|
||
2299B4E4000
|
heap
|
page read and write
|
||
35293E000
|
stack
|
page read and write
|
||
31FD3FF000
|
unkown
|
page read and write
|
||
2299B3EF000
|
heap
|
page read and write
|
||
1C81B3C5000
|
heap
|
page read and write
|
||
1C81B260000
|
heap
|
page read and write
|
||
7FFD34552000
|
trusted library allocation
|
page read and write
|
||
1C80007F000
|
trusted library allocation
|
page read and write
|
||
1C87CC60000
|
heap
|
page read and write
|
||
1C81B2E6000
|
heap
|
page read and write
|
||
1C81CE60000
|
trusted library allocation
|
page read and write
|
||
2299D6B0000
|
heap
|
page read and write
|
||
7FF4AFA7E000
|
trusted library allocation
|
page readonly
|
||
7FFD34542000
|
trusted library allocation
|
page read and write
|
||
7FFD34552000
|
trusted library allocation
|
page read and write
|
||
1C87D070000
|
trusted library allocation
|
page read and write
|
||
1C87F640000
|
trusted library allocation
|
page read and write
|
||
1C81D070000
|
trusted library allocation
|
page read and write
|
||
2299B3EB000
|
heap
|
page read and write
|
||
1C81B4F5000
|
heap
|
page read and write
|
||
1C81B26A000
|
heap
|
page read and write
|
||
7FF4AFA41000
|
trusted library allocation
|
page execute read
|
||
7FFD3459C000
|
trusted library allocation
|
page execute and read and write
|
||
1C81B618000
|
heap
|
page read and write
|
||
1C81DE72000
|
trusted library allocation
|
page read and write
|
||
1C87F650000
|
trusted library allocation
|
page read and write
|
||
1C87F600000
|
trusted library allocation
|
page read and write
|
||
1C81B3D1000
|
heap
|
page read and write
|
||
1C81CED0000
|
trusted library allocation
|
page read and write
|
||
1C87CF55000
|
heap
|
page read and write
|
||
2299B37A000
|
heap
|
page read and write
|
||
1C87F750000
|
trusted library allocation
|
page read and write
|
||
7FF4AFA97000
|
trusted library allocation
|
page execute read
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4AFA78000
|
trusted library allocation
|
page readonly
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
1C81CF50000
|
trusted library allocation
|
page read and write
|
||
229FCEA6000
|
heap
|
page read and write
|
||
BF89AFE000
|
stack
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
2299B473000
|
heap
|
page read and write
|
||
7FFD346F7000
|
trusted library allocation
|
page read and write
|
||
1C87CAA0000
|
unkown
|
page readonly
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
229FCEA0000
|
heap
|
page read and write
|
||
229FD360000
|
heap
|
page read and write
|
||
2299B3B9000
|
heap
|
page read and write
|
||
1C87F0F0000
|
trusted library section
|
page readonly
|
||
1C81D060000
|
trusted library allocation
|
page read and write
|
||
1C87F6E0000
|
trusted library allocation
|
page read and write
|
||
1C81D2CF000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
BF89FFB000
|
stack
|
page read and write
|
||
1C81CFD0000
|
trusted library allocation
|
page read and write
|
||
1C81B49D000
|
heap
|
page read and write
|
||
229FF3A0000
|
heap
|
page read and write
|
||
1C800523000
|
trusted library allocation
|
page read and write
|
||
1C87FADA000
|
heap
|
page read and write
|
||
7FF4AFA8B000
|
trusted library allocation
|
page execute read
|
||
1C81B28E000
|
heap
|
page read and write
|
||
229FCCA0000
|
unkown
|
page readonly
|
||
BF8A8FE000
|
stack
|
page read and write
|
||
1C87FA6A000
|
heap
|
page read and write
|
||
1F0A11D0000
|
heap
|
page read and write
|
||
229FFD4B000
|
heap
|
page read and write
|
||
229FCF0F000
|
heap
|
page read and write
|
||
2299B3E5000
|
heap
|
page read and write
|
||
7FF4AFA49000
|
trusted library allocation
|
page execute read
|
||
1C87F20B000
|
heap
|
page read and write
|
||
1C87FBDD000
|
heap
|
page read and write
|
||
BF89BFE000
|
stack
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page execute and read and write
|
||
229FD100000
|
trusted library allocation
|
page read and write
|
||
2299B3E3000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
1C87F19A000
|
heap
|
page read and write
|
||
1C87CAA0000
|
unkown
|
page readonly
|
||
1C87CF50000
|
heap
|
page read and write
|
||
1C81B4E7000
|
heap
|
page read and write
|
||
1C87F1E0000
|
heap
|
page read and write
|
||
1C87CED5000
|
trusted library allocation
|
page read and write
|
||
229FF67B000
|
heap
|
page read and write
|
||
229FF443000
|
heap
|
page read and write
|
||
1C87F113000
|
heap
|
page execute and read and write
|
||
229FCECD000
|
heap
|
page read and write
|
||
1C87F660000
|
trusted library allocation
|
page read and write
|
||
1C810080000
|
trusted library allocation
|
page read and write
|
||
229FEBF0000
|
trusted library allocation
|
page read and write
|
||
1C81B3B6000
|
heap
|
page read and write
|
||
229FF360000
|
heap
|
page read and write
|
||
1C81D0C0000
|
trusted library allocation
|
page read and write
|
||
1C87F201000
|
heap
|
page read and write
|
||
7FF4DD470000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4AFA40000
|
trusted library allocation
|
page readonly
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
1C87F19E000
|
heap
|
page read and write
|
||
7FF4AFA96000
|
trusted library allocation
|
page readonly
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
2299D042000
|
trusted library allocation
|
page read and write
|
||
229FFC43000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
229FF672000
|
heap
|
page read and write
|
||
22980200000
|
trusted library allocation
|
page read and write
|
||
1C87CC66000
|
heap
|
page read and write
|
||
229FF2F9000
|
heap
|
page read and write
|
||
1C81D2AF000
|
heap
|
page read and write
|
||
1C81CF80000
|
trusted library allocation
|
page read and write
|
||
229FFD19000
|
heap
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page execute and read and write
|
||
1C81D100000
|
trusted library allocation
|
page read and write
|
||
2299B52D000
|
heap
|
page read and write
|
||
1C81D930000
|
heap
|
page read and write
|
||
1C8002F3000
|
trusted library allocation
|
page read and write
|
||
BF8A6FB000
|
stack
|
page read and write
|
||
1C87FA76000
|
heap
|
page read and write
|
||
2299B36D000
|
heap
|
page read and write
|
||
BF8A93E000
|
stack
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
1C87F680000
|
trusted library allocation
|
page read and write
|
||
1C81B555000
|
heap
|
page read and write
|
||
229FF34A000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4AFA77000
|
trusted library allocation
|
page execute read
|
||
2299B35E000
|
heap
|
page read and write
|
||
2299B3E7000
|
heap
|
page read and write
|
||
2299B39F000
|
heap
|
page read and write
|
||
1C81B4BA000
|
heap
|
page read and write
|
||
7FF4AFA91000
|
trusted library allocation
|
page execute read
|
||
1C87F6F0000
|
trusted library allocation
|
page read and write
|
||
1C81B47D000
|
heap
|
page read and write
|
||
1C87F460000
|
heap
|
page read and write
|
||
1C81B435000
|
heap
|
page read and write
|
||
1C87D0B5000
|
heap
|
page read and write
|
||
7FFD34707000
|
trusted library allocation
|
page read and write
|
||
1C81DE00000
|
trusted library allocation
|
page read and write
|
||
BF8AA3F000
|
stack
|
page read and write
|
||
1C87FC35000
|
heap
|
page read and write
|
||
229FFD6C000
|
heap
|
page read and write
|
||
1C81B331000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
1C81B626000
|
heap
|
page read and write
|
||
1C81CF70000
|
trusted library allocation
|
page read and write
|
||
7FFD345AC000
|
trusted library allocation
|
page execute and read and write
|
||
1C81CFF0000
|
trusted library allocation
|
page read and write
|
||
1C87F740000
|
trusted library allocation
|
page read and write
|
||
352C3B000
|
stack
|
page read and write
|
||
1C87CBCB000
|
unkown
|
page readonly
|
||
1C81DE20000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
2299B4A0000
|
heap
|
page read and write
|
||
1C87FC11000
|
heap
|
page read and write
|
||
2299B358000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
229FCE70000
|
heap
|
page read and write
|
||
13A7D9C4000
|
heap
|
page read and write
|
||
2299B3DD000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
BF895EE000
|
stack
|
page read and write
|
||
1C87D060000
|
heap
|
page read and write
|
||
7FF4AFA82000
|
trusted library allocation
|
page readonly
|
||
1C87F1C3000
|
heap
|
page read and write
|
||
7FFD3473E000
|
trusted library allocation
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page execute and read and write
|
||
1C810001000
|
trusted library allocation
|
page read and write
|
||
1C87CCA0000
|
heap
|
page read and write
|
||
1C81CF60000
|
trusted library allocation
|
page read and write
|
||
2299B53A000
|
heap
|
page read and write
|
||
776277F000
|
stack
|
page read and write
|
||
13A7D9A0000
|
heap
|
page read and write
|
||
1C87F12D000
|
heap
|
page read and write
|
||
1C81D000000
|
trusted library allocation
|
page read and write
|
||
1C81DAAC000
|
heap
|
page read and write
|
||
1C87CD31000
|
heap
|
page read and write
|
||
1C81DB12000
|
heap
|
page read and write
|
||
1C8001AF000
|
trusted library allocation
|
page read and write
|
||
2299B348000
|
heap
|
page read and write
|
||
3525F4000
|
stack
|
page read and write
|
||
1C87F1EF000
|
heap
|
page read and write
|
||
31FD2FB000
|
stack
|
page read and write
|
||
7FF4AFA42000
|
trusted library allocation
|
page readonly
|
||
2299B557000
|
heap
|
page read and write
|
||
1C81B29E000
|
heap
|
page read and write
|
||
1C8002BA000
|
trusted library allocation
|
page read and write
|
||
1C81D1C8000
|
heap
|
page read and write
|
||
1C87CF90000
|
heap
|
page read and write
|
||
229FF37A000
|
heap
|
page read and write
|
||
7FF4AFA44000
|
trusted library allocation
|
page readonly
|
||
BF89CFC000
|
stack
|
page read and write
|
||
2299B3FB000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
7FFD34748000
|
trusted library allocation
|
page read and write
|
||
13A7D8C0000
|
heap
|
page read and write
|
||
351EFD000
|
stack
|
page read and write
|
||
229FFD78000
|
heap
|
page read and write
|
||
13A7D9DB000
|
heap
|
page read and write
|
||
1C87FBA8000
|
heap
|
page read and write
|
||
1C87F13A000
|
heap
|
page read and write
|
||
22980566000
|
trusted library allocation
|
page read and write
|
||
1C87F521000
|
heap
|
page read and write
|
||
BF8A0FE000
|
stack
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1C87CF00000
|
trusted library allocation
|
page read and write
|
||
229FF3F0000
|
heap
|
page execute and read and write
|
||
13A7DBB0000
|
heap
|
page read and write
|
||
13A7D9DC000
|
heap
|
page read and write
|
||
1C81B3D6000
|
heap
|
page read and write
|
||
1C81CF40000
|
trusted library allocation
|
page read and write
|
||
1C81B358000
|
heap
|
page read and write
|
||
229FD365000
|
heap
|
page read and write
|
||
BF8A7FC000
|
stack
|
page read and write
|
||
2299B409000
|
heap
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
1C81CEC0000
|
trusted library allocation
|
page read and write
|
||
7FF4AFA56000
|
trusted library allocation
|
page readonly
|
||
1C87CBC9000
|
unkown
|
page readonly
|
||
7FFD34606000
|
trusted library allocation
|
page read and write
|
||
1C81B428000
|
heap
|
page read and write
|
||
1C81D040000
|
trusted library allocation
|
page read and write
|
||
229FF336000
|
heap
|
page read and write
|
||
BF8AD3C000
|
stack
|
page read and write
|
||
229FCF19000
|
heap
|
page read and write
|
||
1C81CEE0000
|
trusted library allocation
|
page read and write
|
||
13A7D9DB000
|
heap
|
page read and write
|
||
13A7D7E0000
|
heap
|
page read and write
|
||
1C81B42E000
|
heap
|
page read and write
|
||
1C81D204000
|
heap
|
page read and write
|
||
2299B366000
|
heap
|
page read and write
|
||
7FF4AFA68000
|
trusted library allocation
|
page readonly
|
||
1C87FC2B000
|
heap
|
page read and write
|
||
13A7D9DD000
|
heap
|
page read and write
|
||
1C81B52A000
|
heap
|
page read and write
|
||
3524FE000
|
stack
|
page read and write
|
||
1C87F54E000
|
heap
|
page read and write
|
||
1C87F730000
|
trusted library allocation
|
page read and write
|
||
7FFD34636000
|
trusted library allocation
|
page execute and read and write
|
||
1F0A2CC5000
|
heap
|
page read and write
|
||
1C81DA40000
|
heap
|
page read and write
|
||
1C81B606000
|
heap
|
page read and write
|
||
1C81B412000
|
heap
|
page read and write
|
||
229FFCD1000
|
heap
|
page read and write
|
||
2299B3B3000
|
heap
|
page read and write
|
||
352A3D000
|
stack
|
page read and write
|
||
1C81CEB0000
|
trusted library allocation
|
page read and write
|
||
1C81DE10000
|
trusted library allocation
|
page read and write
|
||
229FFD81000
|
heap
|
page read and write
|
||
1C81B27C000
|
heap
|
page read and write
|
||
1C87FC37000
|
heap
|
page read and write
|
||
229802FE000
|
trusted library allocation
|
page read and write
|
||
1C87CBB4000
|
unkown
|
page readonly
|
||
229FF440000
|
heap
|
page read and write
|
||
1C87F6D0000
|
trusted library allocation
|
page read and write
|
||
1C81D1C0000
|
heap
|
page read and write
|
||
13A7D8E0000
|
heap
|
page read and write
|
||
229FFBC2000
|
heap
|
page read and write
|
||
7FF4AFA8A000
|
trusted library allocation
|
page readonly
|
||
1C81B601000
|
heap
|
page read and write
|
||
1C81CF90000
|
trusted library allocation
|
page read and write
|
||
1C800083000
|
trusted library allocation
|
page read and write
|
||
1C87E9B0000
|
trusted library allocation
|
page read and write
|
||
1C81CE70000
|
trusted library allocation
|
page read and write
|
||
1F0A11E0000
|
heap
|
page read and write
|
||
351DFE000
|
stack
|
page read and write
|
||
1C87F6A0000
|
trusted library allocation
|
page read and write
|
||
1C87F0E0000
|
trusted library allocation
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4AFA93000
|
trusted library allocation
|
page execute read
|
||
1C81CF30000
|
trusted library allocation
|
page read and write
|
||
7FFD34728000
|
trusted library allocation
|
page read and write
|
||
1C800305000
|
trusted library allocation
|
page read and write
|
||
13A7D9CA000
|
heap
|
page read and write
|
||
1C81DB0C000
|
heap
|
page read and write
|
||
229FCE80000
|
heap
|
page read and write
|
||
1C87FBCF000
|
heap
|
page read and write
|
||
1C81B26C000
|
heap
|
page read and write
|
||
229FCEE2000
|
heap
|
page read and write
|
||
2299007E000
|
trusted library allocation
|
page read and write
|
||
22980086000
|
trusted library allocation
|
page read and write
|
||
229FCEE5000
|
heap
|
page read and write
|
||
229FEA70000
|
heap
|
page read and write
|
||
BF8AE3B000
|
stack
|
page read and write
|
||
13A7D9DB000
|
heap
|
page read and write
|
||
13A7D9DC000
|
heap
|
page read and write
|
||
1C8003F8000
|
trusted library allocation
|
page read and write
|
||
1C87FA64000
|
heap
|
page read and write
|
||
1C81CE80000
|
trusted library allocation
|
page read and write
|
||
1C87CEDF000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
2298008A000
|
trusted library allocation
|
page read and write
|
||
2299B54E000
|
heap
|
page read and write
|
||
7FF4AFA57000
|
trusted library allocation
|
page execute read
|
||
351BFE000
|
stack
|
page read and write
|
||
229FCF15000
|
heap
|
page read and write
|
||
2299B387000
|
heap
|
page read and write
|
||
1C87FA86000
|
heap
|
page read and write
|
||
1C81B2B2000
|
heap
|
page read and write
|
||
2299B431000
|
heap
|
page read and write
|
||
22980340000
|
trusted library allocation
|
page read and write
|
||
22980082000
|
trusted library allocation
|
page read and write
|
||
1C81D030000
|
trusted library allocation
|
page read and write
|
||
352D32000
|
stack
|
page read and write
|
||
1C87F670000
|
trusted library allocation
|
page read and write
|
||
35273E000
|
stack
|
page read and write
|
||
22980237000
|
trusted library allocation
|
page read and write
|
||
1C81B485000
|
heap
|
page read and write
|
||
1C87F207000
|
heap
|
page read and write
|
||
229FF280000
|
heap
|
page read and write
|
||
1C87CCCF000
|
heap
|
page read and write
|
||
1C81B418000
|
heap
|
page read and write
|
||
229FF33E000
|
heap
|
page read and write
|
||
2299B4DB000
|
heap
|
page read and write
|
||
1C87F51E000
|
heap
|
page read and write
|
||
229FF3F3000
|
heap
|
page execute and read and write
|
||
1F0A2CC0000
|
heap
|
page read and write
|
||
1C81B2EC000
|
heap
|
page read and write
|
||
7FF4AFA47000
|
trusted library allocation
|
page execute read
|
||
1F0A13B0000
|
heap
|
page read and write
|
||
351CFC000
|
stack
|
page read and write
|
||
1C87CEF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2299B63C000
|
heap
|
page read and write
|
||
1C81DAFB000
|
heap
|
page read and write
|
||
77626FE000
|
stack
|
page read and write
|
||
7FFD34553000
|
trusted library allocation
|
page execute and read and write
|
||
3518F3000
|
stack
|
page read and write
|
||
229FF5A0000
|
heap
|
page read and write
|
||
229FFD72000
|
heap
|
page read and write
|
||
229FF65F000
|
heap
|
page read and write
|
||
1C81B32D000
|
heap
|
page read and write
|
||
229FF35A000
|
heap
|
page read and write
|
||
1C87FBB4000
|
heap
|
page read and write
|
||
1C87F136000
|
heap
|
page read and write
|
||
2298033C000
|
trusted library allocation
|
page read and write
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
1C81DE25000
|
trusted library allocation
|
page read and write
|
||
1C81D1C5000
|
heap
|
page read and write
|
||
1C87F0F9000
|
trusted library section
|
page readonly
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
229FFC4A000
|
heap
|
page read and write
|
||
2299B3E1000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
1C87F110000
|
heap
|
page execute and read and write
|
||
13A7D9DC000
|
heap
|
page read and write
|
||
229FF333000
|
heap
|
page read and write
|
||
7FF4AFA7A000
|
trusted library allocation
|
page readonly
|
||
22980224000
|
trusted library allocation
|
page read and write
|
||
1C800077000
|
trusted library allocation
|
page read and write
|
||
1C81D080000
|
trusted library allocation
|
page read and write
|
||
1C87F610000
|
trusted library allocation
|
page read and write
|
||
1C87FA89000
|
heap
|
page read and write
|
||
229FFD74000
|
heap
|
page read and write
|
||
1C81B53A000
|
heap
|
page read and write
|
||
7FF4AFA94000
|
trusted library allocation
|
page readonly
|
||
2299B47D000
|
heap
|
page read and write
|
||
13A7D9DB000
|
heap
|
page read and write
|
||
13A7DAA0000
|
heap
|
page read and write
|
||
229FF590000
|
heap
|
page read and write
|
||
1C8002F1000
|
trusted library allocation
|
page read and write
|
||
1C87F620000
|
trusted library allocation
|
page read and write
|
||
1C81B2A2000
|
heap
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
1C81B2FB000
|
heap
|
page read and write
|
||
1C87CE40000
|
heap
|
page read and write
|
||
7FFD345F6000
|
trusted library allocation
|
page read and write
|
||
1C87F6B0000
|
trusted library allocation
|
page read and write
|
||
1C81B2F9000
|
heap
|
page read and write
|
||
1C81D0F0000
|
trusted library allocation
|
page read and write
|
||
1C87E970000
|
heap
|
page execute and read and write
|
||
BF8A3FE000
|
stack
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
1C81CFA0000
|
trusted library allocation
|
page read and write
|
||
BF895AE000
|
stack
|
page read and write
|
||
7FF4AFA58000
|
trusted library allocation
|
page readonly
|
||
2299B3F5000
|
heap
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
2299B525000
|
heap
|
page read and write
|
||
22990001000
|
trusted library allocation
|
page read and write
|
||
1C81D183000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
1C81B278000
|
heap
|
page read and write
|
||
1C81B5BE000
|
heap
|
page read and write
|
||
7FF4AFA69000
|
trusted library allocation
|
page execute read
|
||
1C8003AB000
|
trusted library allocation
|
page read and write
|
||
1C800165000
|
trusted library allocation
|
page read and write
|
||
776267C000
|
stack
|
page read and write
|
||
229FD1B5000
|
heap
|
page read and write
|
||
1C81CF20000
|
trusted library allocation
|
page read and write
|
||
229FFD5B000
|
heap
|
page read and write
|
||
1C81D110000
|
trusted library allocation
|
page read and write
|
||
7FF4AFA5D000
|
trusted library allocation
|
page execute read
|
||
1C87FAA3000
|
heap
|
page read and write
|
||
22980352000
|
trusted library allocation
|
page read and write
|
||
2299B329000
|
heap
|
page read and write
|
||
229FFD52000
|
heap
|
page read and write
|
||
1C87FA7C000
|
heap
|
page read and write
|
||
1C81CEF0000
|
trusted library allocation
|
page read and write
|
||
2299B46F000
|
heap
|
page read and write
|
||
1C87FAC0000
|
heap
|
page read and write
|
||
2299B4DF000
|
heap
|
page read and write
|
||
BF8AB3B000
|
stack
|
page read and write
|
||
1C87FBAC000
|
heap
|
page read and write
|
||
2299B486000
|
heap
|
page read and write
|
||
1C81DB22000
|
heap
|
page read and write
|
||
229FD36E000
|
heap
|
page read and write
|
||
229FCDC0000
|
unkown
|
page readonly
|
||
2298007A000
|
trusted library allocation
|
page read and write
|
||
1C81B5C4000
|
heap
|
page read and write
|
||
1C81DB16000
|
heap
|
page read and write
|
||
1C87CE60000
|
heap
|
page read and write
|
||
229FF66F000
|
heap
|
page read and write
|
||
1C87FB4D000
|
heap
|
page read and write
|
||
BF89DFF000
|
stack
|
page read and write
|
||
1C87FB7F000
|
heap
|
page read and write
|
||
1C87FC18000
|
heap
|
page read and write
|
||
1C81D130000
|
heap
|
page read and write
|
||
2299B3C1000
|
heap
|
page read and write
|
||
1C87CAA5000
|
unkown
|
page readonly
|
||
2299B377000
|
heap
|
page read and write
|
||
229FFC36000
|
heap
|
page read and write
|
||
7FF4AFA46000
|
trusted library allocation
|
page readonly
|
||
1C81B5CE000
|
heap
|
page read and write
|
||
229FEBB0000
|
heap
|
page execute and read and write
|
||
1C87F450000
|
heap
|
page read and write
|
||
1C81D020000
|
trusted library allocation
|
page read and write
|
||
229FD090000
|
heap
|
page read and write
|
||
1C81B3DB000
|
heap
|
page read and write
|
||
31FD4FF000
|
stack
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
1C81CFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
7FF4AFA83000
|
trusted library allocation
|
page execute read
|
||
2299B447000
|
heap
|
page read and write
|
||
1C87FA90000
|
heap
|
page read and write
|
||
1C87CBC5000
|
unkown
|
page readonly
|
||
7FFD346F2000
|
trusted library allocation
|
page read and write
|
||
229FF36D000
|
heap
|
page read and write
|
||
1C81D050000
|
trusted library allocation
|
page read and write
|
||
1C81B372000
|
heap
|
page read and write
|
||
1C81CE90000
|
trusted library allocation
|
page read and write
|
||
1C81D99A000
|
heap
|
page read and write
|
||
229FFD30000
|
heap
|
page read and write
|
||
229FFC55000
|
heap
|
page read and write
|
||
1C81CF10000
|
trusted library allocation
|
page read and write
|
||
1C81D0A0000
|
trusted library allocation
|
page read and write
|
||
BF8A2FE000
|
stack
|
page read and write
|
||
1C87F710000
|
trusted library allocation
|
page read and write
|
||
229FF400000
|
trusted library allocation
|
page read and write
|
||
1C87FA50000
|
heap
|
page read and write
|
||
7FF4AFA73000
|
trusted library allocation
|
page execute read
|
||
7FFD34736000
|
trusted library allocation
|
page read and write
|
||
1C81CEA0000
|
trusted library allocation
|
page read and write
|
||
1C81DA78000
|
heap
|
page read and write
|
||
7FF4AFA95000
|
trusted library allocation
|
page execute read
|
||
1C87FA6D000
|
heap
|
page read and write
|
||
3515DF000
|
stack
|
page read and write
|
||
2299B260000
|
heap
|
page read and write
|
||
229FF31C000
|
heap
|
page read and write
|
||
229FFBDB000
|
heap
|
page read and write
|
||
7FFD34738000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
1C87FAE4000
|
heap
|
page read and write
|
||
13A7D9DB000
|
heap
|
page read and write
|
||
1C87CAA2000
|
unkown
|
page readonly
|
||
1C81B264000
|
heap
|
page read and write
|
||
7FF4AFA59000
|
trusted library allocation
|
page execute read
|
||
7FFD34544000
|
trusted library allocation
|
page read and write
|
||
7FFD34738000
|
trusted library allocation
|
page read and write
|
||
1C81B623000
|
heap
|
page read and write
|
||
1C8001EA000
|
trusted library allocation
|
page read and write
|
||
1C81B4AB000
|
heap
|
page read and write
|
||
1C81DB10000
|
heap
|
page read and write
|
||
7FF4AFA51000
|
trusted library allocation
|
page execute read
|
||
1C81B4C8000
|
heap
|
page read and write
|
||
1C87CF03000
|
trusted library allocation
|
page read and write
|
||
1C87CFC0000
|
heap
|
page read and write
|
||
1C87CD60000
|
heap
|
page read and write
|
||
1C81D1CF000
|
heap
|
page read and write
|
||
229FFBA2000
|
heap
|
page read and write
|
||
1C81B43A000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
229FCF13000
|
heap
|
page read and write
|
||
229FFCD8000
|
heap
|
page read and write
|
||
7FF4AFA53000
|
trusted library allocation
|
page execute read
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
1C81B62A000
|
heap
|
page read and write
|
||
1C81D965000
|
heap
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page execute and read and write
|
||
1C87FACA000
|
heap
|
page read and write
|
||
1C81B609000
|
heap
|
page read and write
|
||
7FF4AFA50000
|
trusted library allocation
|
page readonly
|
||
1C87CCD6000
|
heap
|
page read and write
|
||
7FF4AFA45000
|
trusted library allocation
|
page execute read
|
||
1C87FB00000
|
heap
|
page read and write
|
||
1C87FAE9000
|
heap
|
page read and write
|
||
1C87FC29000
|
heap
|
page read and write
|
||
7FF4AFA7F000
|
trusted library allocation
|
page execute read
|
||
1C87CC8B000
|
heap
|
page read and write
|
||
7FFD34758000
|
trusted library allocation
|
page read and write
|
||
1C87F690000
|
trusted library allocation
|
page read and write
|
||
2299B491000
|
heap
|
page read and write
|
||
229FFCF8000
|
heap
|
page read and write
|
||
1C81B280000
|
heap
|
page read and write
|
||
1C81B463000
|
heap
|
page read and write
|
||
22990021000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
1C87FA6F000
|
heap
|
page read and write
|
||
229FCCA0000
|
unkown
|
page readonly
|
||
229FF3C0000
|
heap
|
page execute and read and write
|
||
1C81B2F7000
|
heap
|
page read and write
|
||
2299B4AD000
|
heap
|
page read and write
|
||
1C87F4C9000
|
heap
|
page read and write
|
||
229FFD44000
|
heap
|
page read and write
|
||
1C87F51C000
|
heap
|
page read and write
|
||
7FF4AFA76000
|
trusted library allocation
|
page readonly
|
||
1F0A11E8000
|
heap
|
page read and write
|
||
BF8A4FE000
|
stack
|
page read and write
|
||
1C81D120000
|
trusted library allocation
|
page read and write
|
||
229FFBD4000
|
heap
|
page read and write
|
||
1C81B321000
|
heap
|
page read and write
|
||
229FF2F6000
|
heap
|
page read and write
|
||
2299B42C000
|
heap
|
page read and write
|
||
22980077000
|
trusted library allocation
|
page read and write
|
||
1C81B3AC000
|
heap
|
page read and write
|
||
1C81B60E000
|
heap
|
page read and write
|
||
7FF4AFA48000
|
trusted library allocation
|
page readonly
|
||
BF8AC3D000
|
stack
|
page read and write
|
||
229FFC2C000
|
heap
|
page read and write
|
||
1C81B603000
|
heap
|
page read and write
|
||
229FD1B0000
|
heap
|
page read and write
|
||
1C81B589000
|
heap
|
page read and write
|
||
1C81DB06000
|
heap
|
page read and write
|
||
229FCF11000
|
heap
|
page read and write
|
||
7FF4AFA7B000
|
trusted library allocation
|
page execute read
|
||
2299B55A000
|
heap
|
page read and write
|
||
1C81CFE0000
|
trusted library allocation
|
page read and write
|
||
1C87F463000
|
heap
|
page read and write
|
||
1C87FC24000
|
heap
|
page read and write
|
||
1C81D0D0000
|
trusted library allocation
|
page read and write
|
||
1C81B292000
|
heap
|
page read and write
|
||
1C81B268000
|
heap
|
page read and write
|
||
BF899FE000
|
stack
|
page read and write
|
||
1C81B30F000
|
heap
|
page read and write
|
||
1C87F213000
|
heap
|
page read and write
|
||
351FFB000
|
stack
|
page read and write
|
||
229FFB90000
|
heap
|
page read and write
|
||
1C8001F2000
|
trusted library allocation
|
page read and write
|
||
2298037E000
|
trusted library allocation
|
page read and write
|
||
1C81B29A000
|
heap
|
page read and write
|
||
1C87F1D8000
|
heap
|
page read and write
|
||
1C81DB1E000
|
heap
|
page read and write
|
||
13A7D9DC000
|
heap
|
page read and write
|
||
1C87CFC3000
|
heap
|
page read and write
|
||
1C81B31D000
|
heap
|
page read and write
|
There are 629 hidden memdumps, click here to show them.