Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jyRdJ06Naz.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Programs\My Program\Octo_Browser_latest_win.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\is-6IG1B.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\is-8QRAK.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\is-E8O0B.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-PUDAC.tmp\jyRdJ06Naz.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ttgtggt.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\unins000.dat
|
InnoSetup Log My Program {873AD2E0-A2B0-482E-8E07-2D2EF1B74924}, version 0x418, 2208 bytes, 580913\37\user\376, C:\Users\user\AppData\Local\Programs\My
P
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-OJBCC.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\My Program.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Tue Nov 12 12:56:07 2024, mtime=Tue Nov 12 12:56:07 2024, atime=Sun Nov 10 04:07:02 2024, length=346112, window=hide
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jyRdJ06Naz.exe
|
"C:\Users\user\Desktop\jyRdJ06Naz.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-PUDAC.tmp\jyRdJ06Naz.tmp
|
"C:\Users\user\AppData\Local\Temp\is-PUDAC.tmp\jyRdJ06Naz.tmp" /SL5="$2042A,48507756,797184,C:\Users\user\Desktop\jyRdJ06Naz.exe"
|
||
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe
|
"C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
|
unknown
|
||
http://tempuri.org/example/Field1Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/sc
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://www.github.com/
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://www.github.com/.https://www.github.com/.https://www.github.com/
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
||
http://tempuri.org/example/Field1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
|
unknown
|
||
http://tempuri.org/example/Field2
|
unknown
|
||
http://tempuri.org/example/Field3
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/06/addressingex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/example/Field3Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://www.github.com/Q9
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
4.251.123.83
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\.exe\OpenWithProgids
|
Win64.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER_Classes\Win64.exe
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Win64.exe\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Win64.exe\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Applications\ttgtggt.exe\SupportedTypes
|
.myp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: Setup Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: App Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: Icon Group
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: User
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Inno Setup: Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
URLInfoAbout
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
HelpLink
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
URLUpdateInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
InstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
MajorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
MinorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
VersionMajor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
VersionMinor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{873AD2E0-A2B0-482E-8E07-2D2EF1B74924}_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
There are 25 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3F2000
|
unkown
|
page readonly
|
||
2794000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page read and write
|
||
298C000
|
trusted library allocation
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
1D94A000
|
heap
|
page read and write
|
||
12ACD000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
2B9C000
|
trusted library allocation
|
page read and write
|
||
2DDF000
|
trusted library allocation
|
page read and write
|
||
2B43000
|
trusted library allocation
|
page read and write
|
||
12971000
|
trusted library allocation
|
page read and write
|
||
1282B000
|
trusted library allocation
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
128DE000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
2DC6000
|
trusted library allocation
|
page read and write
|
||
2953000
|
trusted library allocation
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
7FFD9BBAA000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
12726000
|
trusted library allocation
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBAD000
|
trusted library allocation
|
page read and write
|
||
2D4F000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
279D000
|
direct allocation
|
page read and write
|
||
2982000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA5000
|
trusted library allocation
|
page read and write
|
||
29AA000
|
trusted library allocation
|
page read and write
|
||
1BC20000
|
heap
|
page read and write
|
||
1BD08000
|
heap
|
page read and write
|
||
1BD44000
|
heap
|
page read and write
|
||
2DE4000
|
trusted library allocation
|
page read and write
|
||
1AA81000
|
heap
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
2966000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B999000
|
trusted library allocation
|
page read and write
|
||
2832000
|
direct allocation
|
page read and write
|
||
1BCA6000
|
heap
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
2B56000
|
trusted library allocation
|
page read and write
|
||
1288A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
27E4000
|
direct allocation
|
page read and write
|
||
1291E000
|
trusted library allocation
|
page read and write
|
||
12721000
|
trusted library allocation
|
page read and write
|
||
2D53000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
12ADF000
|
trusted library allocation
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
277D000
|
direct allocation
|
page read and write
|
||
3C6C000
|
heap
|
page read and write
|
||
12A54000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
C41000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
12C79000
|
trusted library allocation
|
page read and write
|
||
2968000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC18000
|
trusted library allocation
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
2BDE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
2822000
|
direct allocation
|
page read and write
|
||
2DB9000
|
trusted library allocation
|
page read and write
|
||
2826000
|
direct allocation
|
page read and write
|
||
D1000
|
unkown
|
page execute read
|
||
27A0000
|
direct allocation
|
page read and write
|
||
1BC76000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
2DB7000
|
trusted library allocation
|
page read and write
|
||
12AB7000
|
trusted library allocation
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
27C4000
|
direct allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB87000
|
trusted library allocation
|
page read and write
|
||
1BD37000
|
heap
|
page read and write
|
||
3D30000
|
heap
|
page read and write
|
||
280E000
|
direct allocation
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
27C6000
|
direct allocation
|
page read and write
|
||
2818000
|
direct allocation
|
page read and write
|
||
12A3B000
|
trusted library allocation
|
page read and write
|
||
12AD9000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
2D93000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
179000
|
unkown
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
7FFD9BB8D000
|
trusted library allocation
|
page read and write
|
||
12A67000
|
trusted library allocation
|
page read and write
|
||
2EFD000
|
trusted library allocation
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
2D3C000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
1D940000
|
heap
|
page read and write
|
||
55E000
|
unkown
|
page write copy
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
1B3C0000
|
heap
|
page read and write
|
||
285D000
|
direct allocation
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
2B7C000
|
trusted library allocation
|
page read and write
|
||
12B38000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
7FF4EDC00000
|
trusted library allocation
|
page execute and read and write
|
||
C56000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1BA14000
|
heap
|
page read and write
|
||
2DB5000
|
trusted library allocation
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
1B38E000
|
stack
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
276F000
|
direct allocation
|
page read and write
|
||
2AE7000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
2F45000
|
trusted library allocation
|
page read and write
|
||
27BB000
|
direct allocation
|
page read and write
|
||
278B000
|
direct allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
27DA000
|
direct allocation
|
page read and write
|
||
7FFD9BA5B000
|
trusted library allocation
|
page read and write
|
||
12831000
|
trusted library allocation
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
2760000
|
direct allocation
|
page read and write
|
||
1292A000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
2AC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
1B60F000
|
stack
|
page read and write
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
C49000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
2F43000
|
trusted library allocation
|
page read and write
|
||
281F000
|
direct allocation
|
page read and write
|
||
2EB5000
|
trusted library allocation
|
page read and write
|
||
12885000
|
trusted library allocation
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
17B000
|
unkown
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
3863000
|
direct allocation
|
page read and write
|
||
12824000
|
trusted library allocation
|
page read and write
|
||
2E32000
|
trusted library allocation
|
page read and write
|
||
3B8D000
|
direct allocation
|
page read and write
|
||
2AE5000
|
trusted library allocation
|
page read and write
|
||
2851000
|
direct allocation
|
page read and write
|
||
3840000
|
direct allocation
|
page read and write
|
||
1BD47000
|
heap
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
12A64000
|
trusted library allocation
|
page read and write
|
||
284F000
|
direct allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
2B3F000
|
trusted library allocation
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
2E34000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2BCF000
|
trusted library allocation
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
2806000
|
direct allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
27A2000
|
direct allocation
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
12B26000
|
trusted library allocation
|
page read and write
|
||
3D31000
|
heap
|
page read and write
|
||
128EB000
|
trusted library allocation
|
page read and write
|
||
12962000
|
trusted library allocation
|
page read and write
|
||
272A000
|
direct allocation
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
12701000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
27E8000
|
direct allocation
|
page read and write
|
||
295C000
|
trusted library allocation
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
743000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
127D8000
|
trusted library allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
182000
|
unkown
|
page read and write
|
||
1B1C3000
|
heap
|
page read and write
|
||
273C000
|
direct allocation
|
page read and write
|
||
12A80000
|
trusted library allocation
|
page read and write
|
||
27D3000
|
direct allocation
|
page read and write
|
||
2A95000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
heap
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
12731000
|
trusted library allocation
|
page read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
7F75B000
|
direct allocation
|
page read and write
|
||
7FFD9BA2F000
|
trusted library allocation
|
page read and write
|
||
27BE000
|
direct allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
2B34000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
trusted library allocation
|
page read and write
|
||
1BC4C000
|
heap
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
2EF9000
|
trusted library allocation
|
page read and write
|
||
1293F000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
1C4D0000
|
heap
|
page read and write
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
1BC2A000
|
heap
|
page read and write
|
||
2B1F000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
1290E000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
2EDD000
|
trusted library allocation
|
page read and write
|
||
12A83000
|
trusted library allocation
|
page read and write
|
||
12930000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
1BA75000
|
heap
|
page read and write
|
||
2BBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
12968000
|
trusted library allocation
|
page read and write
|
||
2BA7000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
1C00E000
|
stack
|
page read and write
|
||
2834000
|
direct allocation
|
page read and write
|
||
2ECC000
|
trusted library allocation
|
page read and write
|
||
1294C000
|
trusted library allocation
|
page read and write
|
||
1BA1F000
|
heap
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
12A74000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3C6E000
|
heap
|
page read and write
|
||
27BD000
|
direct allocation
|
page read and write
|
||
189000
|
unkown
|
page readonly
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
56D000
|
unkown
|
page read and write
|
||
128F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2E47000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
1BA5E000
|
heap
|
page read and write
|
||
2F39000
|
trusted library allocation
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
577000
|
unkown
|
page readonly
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
1BC2F000
|
heap
|
page read and write
|
||
3C6B000
|
heap
|
page read and write
|
||
2A77000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2888000
|
direct allocation
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
trusted library allocation
|
page read and write
|
||
1BC58000
|
heap
|
page read and write
|
||
2B3D000
|
trusted library allocation
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A5000
|
trusted library allocation
|
page read and write
|
||
2D85000
|
trusted library allocation
|
page read and write
|
||
2E63000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
1BD33000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
179000
|
unkown
|
page write copy
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
2955000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page execute and read and write
|
||
2D62000
|
trusted library allocation
|
page read and write
|
||
55E000
|
unkown
|
page read and write
|
||
C38000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
2F1B000
|
trusted library allocation
|
page read and write
|
||
2B5A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
2D66000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
1293A000
|
trusted library allocation
|
page read and write
|
||
618F000
|
stack
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
2E18000
|
trusted library allocation
|
page read and write
|
||
12A79000
|
trusted library allocation
|
page read and write
|
||
2856000
|
direct allocation
|
page read and write
|
||
2986000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
2A33000
|
trusted library allocation
|
page read and write
|
||
29B7000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1BA7D000
|
heap
|
page read and write
|
||
2BDA000
|
trusted library allocation
|
page read and write
|
||
C52000
|
heap
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1BF0D000
|
stack
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
1BC95000
|
heap
|
page read and write
|
||
128D1000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
1BD12000
|
heap
|
page read and write
|
||
1D920000
|
heap
|
page read and write
|
||
27F8000
|
direct allocation
|
page read and write
|
||
27B6000
|
direct allocation
|
page read and write
|
||
1BD9B000
|
heap
|
page read and write
|
||
3D31000
|
heap
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page read and write
|
||
27F4000
|
direct allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1BA49000
|
heap
|
page read and write
|
||
2799000
|
direct allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
12914000
|
trusted library allocation
|
page read and write
|
||
2B25000
|
trusted library allocation
|
page read and write
|
||
2768000
|
direct allocation
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
12A51000
|
trusted library allocation
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
2EC8000
|
trusted library allocation
|
page read and write
|
||
1B85B000
|
stack
|
page read and write
|
||
1BA34000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
12B2B000
|
trusted library allocation
|
page read and write
|
||
2F41000
|
trusted library allocation
|
page read and write
|
||
2DDD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2F0C000
|
trusted library allocation
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
1BADD000
|
heap
|
page read and write
|
||
1BC0B000
|
stack
|
page read and write
|
||
2E80000
|
direct allocation
|
page execute and read and write
|
||
3C30000
|
heap
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
3B68000
|
direct allocation
|
page read and write
|
||
29C4000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
1BCBA000
|
heap
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
1BA38000
|
heap
|
page read and write
|
||
2EAC000
|
trusted library allocation
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
29A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
2B78000
|
trusted library allocation
|
page read and write
|
||
12A5D000
|
trusted library allocation
|
page read and write
|
||
12A89000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page read and write
|
||
1BA3C000
|
heap
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
2A67000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1287D000
|
trusted library allocation
|
page read and write
|
||
29BB000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
2BBA000
|
trusted library allocation
|
page read and write
|
||
1BC9E000
|
heap
|
page read and write
|
||
7FFD9BC06000
|
trusted library allocation
|
page read and write
|
||
127D2000
|
trusted library allocation
|
page read and write
|
||
1296F000
|
trusted library allocation
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
7F46B000
|
direct allocation
|
page read and write
|
||
8D3000
|
heap
|
page read and write
|
||
5C8000
|
unkown
|
page readonly
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
185000
|
unkown
|
page write copy
|
||
2BCB000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
trusted library allocation
|
page read and write
|
||
27FB000
|
direct allocation
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
12A9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
C4F000
|
heap
|
page read and write
|
||
12907000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
direct allocation
|
page read and write
|
||
2773000
|
direct allocation
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
1BC53000
|
heap
|
page read and write
|
||
1B5CB000
|
stack
|
page read and write
|
||
2E1F000
|
direct allocation
|
page read and write
|
||
7FFD9BBD6000
|
trusted library allocation
|
page read and write
|
||
2AFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBAF000
|
trusted library allocation
|
page read and write
|
||
2A49000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
C5F000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
2848000
|
direct allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
29A6000
|
trusted library allocation
|
page read and write
|
||
1BDA8000
|
heap
|
page read and write
|
||
12AD2000
|
trusted library allocation
|
page read and write
|
||
2B89000
|
trusted library allocation
|
page read and write
|
||
282B000
|
direct allocation
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
1AC8B000
|
stack
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
2984000
|
trusted library allocation
|
page read and write
|
||
128E3000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
trusted library allocation
|
page read and write
|
||
2731000
|
direct allocation
|
page read and write
|
||
7FFD9BBFF000
|
trusted library allocation
|
page read and write
|
||
1BCC4000
|
heap
|
page read and write
|
||
1BC15000
|
heap
|
page read and write
|
||
1271B000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
12A4B000
|
trusted library allocation
|
page read and write
|
||
1BA93000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
1BD1D000
|
heap
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2DF6000
|
trusted library allocation
|
page read and write
|
||
2875000
|
trusted library allocation
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
2CA3000
|
heap
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
7FFD9BBEA000
|
trusted library allocation
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
12A38000
|
trusted library allocation
|
page read and write
|
||
C62000
|
heap
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
570000
|
unkown
|
page write copy
|
||
C3C000
|
heap
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
274B000
|
direct allocation
|
page read and write
|
||
1273E000
|
trusted library allocation
|
page read and write
|
||
1D950000
|
heap
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
12B32000
|
trusted library allocation
|
page read and write
|
||
127CB000
|
trusted library allocation
|
page read and write
|
||
12923000
|
trusted library allocation
|
page read and write
|
||
3B39000
|
direct allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
2D28000
|
trusted library allocation
|
page read and write
|
||
2BCD000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1BCF8000
|
heap
|
page read and write
|
||
2843000
|
direct allocation
|
page read and write
|
||
2E07000
|
trusted library allocation
|
page read and write
|
||
128F2000
|
trusted library allocation
|
page read and write
|
||
1C5E0000
|
heap
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
2B1000
|
unkown
|
page execute read
|
||
1B2CE000
|
stack
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
2A88000
|
trusted library allocation
|
page read and write
|
||
AEC000
|
stack
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
C38000
|
heap
|
page read and write
|
||
27EF000
|
direct allocation
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
2815000
|
direct allocation
|
page read and write
|
||
C5D000
|
heap
|
page read and write
|
||
3840000
|
direct allocation
|
page read and write
|
||
7FFD9BBB3000
|
trusted library allocation
|
page read and write
|
||
2B58000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
1BA10000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
12956000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
12AA6000
|
trusted library allocation
|
page read and write
|
||
2D53000
|
heap
|
page read and write
|
||
7FFD9BC08000
|
trusted library allocation
|
page read and write
|
||
12A41000
|
trusted library allocation
|
page read and write
|
||
12902000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
386D000
|
direct allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2AAC000
|
trusted library allocation
|
page read and write
|
||
2EF7000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
2759000
|
direct allocation
|
page read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
12A58000
|
trusted library allocation
|
page read and write
|
||
298A000
|
trusted library allocation
|
page read and write
|
||
12A70000
|
trusted library allocation
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
385B000
|
direct allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
1BCAA000
|
heap
|
page read and write
|
||
1D968000
|
heap
|
page read and write
|
||
3880000
|
direct allocation
|
page read and write
|
||
12953000
|
trusted library allocation
|
page read and write
|
||
1BCEA000
|
heap
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
2A11000
|
trusted library allocation
|
page read and write
|
||
1BD18000
|
heap
|
page read and write
|
||
12A8C000
|
trusted library allocation
|
page read and write
|
||
27CC000
|
direct allocation
|
page read and write
|
||
1D92C000
|
heap
|
page read and write
|
||
2ECA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
C61000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
27CD000
|
direct allocation
|
page read and write
|
||
2B67000
|
trusted library allocation
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
27A8000
|
direct allocation
|
page read and write
|
||
2D25000
|
trusted library allocation
|
page read and write
|
||
1B75E000
|
stack
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
2999000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
7FFD9BBD4000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
12A6D000
|
trusted library allocation
|
page read and write
|
||
2988000
|
trusted library allocation
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
12A95000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
3B95000
|
direct allocation
|
page read and write
|
||
2B8D000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
1C5DD000
|
stack
|
page read and write
|
||
12946000
|
trusted library allocation
|
page read and write
|
||
1C5F1000
|
heap
|
page read and write
|
||
1B390000
|
heap
|
page execute and read and write
|
||
3880000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1BD6B000
|
heap
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
7FFD9BBE1000
|
trusted library allocation
|
page read and write
|
||
5890000
|
direct allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
2802000
|
direct allocation
|
page read and write
|
||
287A000
|
direct allocation
|
page read and write
|
||
1B1C0000
|
heap
|
page read and write
|
||
2720000
|
direct allocation
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
1D9B9000
|
heap
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
1BC10000
|
heap
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
1272C000
|
trusted library allocation
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
1BAD3000
|
heap
|
page read and write
|
||
2E67000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
1BD77000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2858000
|
direct allocation
|
page read and write
|
||
12A48000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAAA000
|
trusted library allocation
|
page read and write
|
||
12A35000
|
trusted library allocation
|
page read and write
|
||
2744000
|
direct allocation
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
2A44000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
B94000
|
heap
|
page execute and read and write
|
||
40AE000
|
stack
|
page read and write
|
||
7F450000
|
direct allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
2809000
|
direct allocation
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
3B48000
|
direct allocation
|
page read and write
|
||
575000
|
unkown
|
page readonly
|
||
C35000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
3A30000
|
direct allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
2E43000
|
trusted library allocation
|
page read and write
|
||
1281F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD1000
|
trusted library allocation
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
12981000
|
trusted library allocation
|
page read and write
|
||
2BAB000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
direct allocation
|
page read and write
|
||
1BD5C000
|
heap
|
page read and write
|
||
2839000
|
direct allocation
|
page read and write
|
||
2A37000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
286C000
|
direct allocation
|
page read and write
|
||
283C000
|
direct allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
1C4DC000
|
heap
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
128D7000
|
trusted library allocation
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
7FFD9BBF7000
|
trusted library allocation
|
page read and write
|
||
2BDC000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
12A90000
|
trusted library allocation
|
page read and write
|
||
1B4CE000
|
stack
|
page read and write
|
||
128FF000
|
trusted library allocation
|
page read and write
|
||
2A84000
|
trusted library allocation
|
page read and write
|
||
2776000
|
direct allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
2ED9000
|
trusted library allocation
|
page read and write
|
||
27A9000
|
direct allocation
|
page read and write
|
||
1C5FD000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
12780000
|
trusted library allocation
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
1291B000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
27FF000
|
direct allocation
|
page read and write
|
||
27D4000
|
direct allocation
|
page read and write
|
||
1BCDE000
|
heap
|
page read and write
|
||
2873000
|
direct allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
1A730000
|
trusted library allocation
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
C4B000
|
heap
|
page read and write
|
||
12878000
|
trusted library allocation
|
page read and write
|
||
282D000
|
direct allocation
|
page read and write
|
||
2752000
|
direct allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1BA16000
|
heap
|
page read and write
|
||
2792000
|
direct allocation
|
page read and write
|
||
12738000
|
trusted library allocation
|
page read and write
|
||
1BD3F000
|
heap
|
page read and write
|
||
C5F000
|
heap
|
page read and write
|
||
127C6000
|
trusted library allocation
|
page read and write
|
||
2864000
|
direct allocation
|
page read and write
|
||
1BA63000
|
heap
|
page read and write
|
||
2810000
|
direct allocation
|
page read and write
|
||
1BA41000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2A22000
|
trusted library allocation
|
page read and write
|
||
2881000
|
direct allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
26F0000
|
heap
|
page execute and read and write
|
||
187000
|
unkown
|
page readonly
|
||
2791000
|
direct allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2A97000
|
trusted library allocation
|
page read and write
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
296A000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
565000
|
unkown
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
12937000
|
trusted library allocation
|
page read and write
|
||
2957000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
trusted library allocation
|
page read and write
|
||
584000
|
stack
|
page read and write
|
||
27EB000
|
direct allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1295B000
|
trusted library allocation
|
page read and write
|
||
1BD2D000
|
heap
|
page read and write
|
||
2B7F000
|
trusted library allocation
|
page read and write
|
||
1BD15000
|
heap
|
page read and write
|
||
3B81000
|
direct allocation
|
page read and write
|
||
284A000
|
direct allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
There are 775 hidden memdumps, click here to show them.