Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
KBvv1g0Ihn.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\build.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\is-3HDQ6.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\is-8C5DR.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\is-K1FQL.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\python-3.13.0-amd64.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-PLHR2.tmp\KBvv1g0Ihn.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\build.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\Eazfuscator.NET 2024.2 Setup.msi (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Eazfuscator.NET, Author: Gapotchenko, Keywords: Installer, Comments: This installer database contains the
logic and data required to install Eazfuscator.NET version 2024.2.614.14499., Template: Intel;1033, Revision Number: {5F546163-2F0B-4AB1-81C9-D20301E91375},
Create Time/Date: Sat Oct 19 06:12:08 2024, Last Saved Time/Date: Sat Oct 19 06:12:08 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\is-NH14E.tmp
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Eazfuscator.NET, Author: Gapotchenko, Keywords: Installer, Comments: This installer database contains the
logic and data required to install Eazfuscator.NET version 2024.2.614.14499., Template: Intel;1033, Revision Number: {5F546163-2F0B-4AB1-81C9-D20301E91375},
Create Time/Date: Sat Oct 19 06:12:08 2024, Last Saved Time/Date: Sat Oct 19 06:12:08 2024, Number of Pages: 200, Number of
Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\unins000.dat
|
InnoSetup Log Xavier1 {E7AB5A61-4710-401C-A801-32A06671F356}, version 0x418, 2450 bytes, 878411\37\user, C:\Users\user\AppData\Local\Programs\
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-VNJ7M.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Xavier1.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Tue Nov 12 14:42:35 2024, mtime=Tue Nov 12 14:42:35 2024, atime=Sun Nov 10 00:40:14 2024, length=346112, window=hide
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\KBvv1g0Ihn.exe
|
"C:\Users\user\Desktop\KBvv1g0Ihn.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-PLHR2.tmp\KBvv1g0Ihn.tmp
|
"C:\Users\user~1\AppData\Local\Temp\is-PLHR2.tmp\KBvv1g0Ihn.tmp" /SL5="$10432,41796246,816128,C:\Users\user\Desktop\KBvv1g0Ihn.exe"
|
||
C:\Users\user\AppData\Local\Programs\Xavier1\build.exe
|
"C:\Users\user\AppData\Local\Programs\Xavier1\build.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://www.gapotchenko.com/eazfuscator.net
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://appsyndication.org/2006/appsynapplicationc:
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
|
unknown
|
||
http://tempuri.org/example/Field1Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/sc
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
||
http://tempuri.org/example/Field1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
|
unknown
|
||
http://tempuri.org/example/Field2
|
unknown
|
||
http://tempuri.org/example/Field3
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/06/addressingex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/example/Field3Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
4.251.123.83
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\.exe\OpenWithProgids
|
Xavier1File.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER_Classes\Xavier1File.exe
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Xavier1File.exe\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Xavier1File.exe\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Applications\build.exe\SupportedTypes
|
.myp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: Setup Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: App Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: Icon Group
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: User
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Inno Setup: Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
URLInfoAbout
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
HelpLink
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
URLUpdateInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
InstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
MajorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
MinorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
VersionMajor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
VersionMinor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E7AB5A61-4710-401C-A801-32A06671F356}_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
There are 25 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
152000
|
unkown
|
page readonly
|
||
2614000
|
trusted library allocation
|
page read and write
|
||
3FB0000
|
direct allocation
|
page read and write
|
||
7FFB22710000
|
unkown
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1BA9E000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
1B657000
|
heap
|
page read and write
|
||
1C1EF000
|
heap
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
10B000
|
unkown
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page execute and read and write
|
||
1C1A1000
|
heap
|
page read and write
|
||
2898000
|
trusted library allocation
|
page read and write
|
||
2859000
|
trusted library allocation
|
page read and write
|
||
28C2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5DF000
|
trusted library allocation
|
page read and write
|
||
123D000
|
direct allocation
|
page read and write
|
||
7FFAAC3F6000
|
trusted library allocation
|
page read and write
|
||
29D4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC549000
|
trusted library allocation
|
page read and write
|
||
1B653000
|
heap
|
page read and write
|
||
1B1D0000
|
heap
|
page read and write
|
||
B9D000
|
unkown
|
page read and write
|
||
BA5000
|
unkown
|
page readonly
|
||
2A22000
|
trusted library allocation
|
page read and write
|
||
29D6000
|
trusted library allocation
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
29E8000
|
trusted library allocation
|
page read and write
|
||
2AF7000
|
trusted library allocation
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
stack
|
page read and write
|
||
1BA46000
|
heap
|
page read and write
|
||
7FFAAC79A000
|
trusted library allocation
|
page read and write
|
||
2E3B000
|
trusted library allocation
|
page read and write
|
||
2D8B000
|
trusted library allocation
|
page read and write
|
||
1276C000
|
trusted library allocation
|
page read and write
|
||
59B000
|
heap
|
page read and write
|
||
2E43000
|
trusted library allocation
|
page read and write
|
||
593000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
11CB000
|
direct allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
126C0000
|
trusted library allocation
|
page read and write
|
||
2C8A000
|
direct allocation
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
1CA5C000
|
heap
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
115B000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
12721000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC626000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
1BA32000
|
heap
|
page read and write
|
||
12757000
|
trusted library allocation
|
page read and write
|
||
1B65F000
|
heap
|
page read and write
|
||
1BA00000
|
heap
|
page read and write
|
||
12712000
|
trusted library allocation
|
page read and write
|
||
1BA2D000
|
heap
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
direct allocation
|
page read and write
|
||
1B5E8000
|
heap
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C6000
|
trusted library allocation
|
page read and write
|
||
7FA90000
|
direct allocation
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
unkown
|
page write copy
|
||
12581000
|
trusted library allocation
|
page read and write
|
||
1219000
|
direct allocation
|
page read and write
|
||
2CA7000
|
trusted library allocation
|
page read and write
|
||
2D9C000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
1204000
|
direct allocation
|
page read and write
|
||
1CF70000
|
heap
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
29A5000
|
trusted library allocation
|
page read and write
|
||
29C5000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
1BBF1000
|
heap
|
page read and write
|
||
1B6CF000
|
heap
|
page read and write
|
||
1BA29000
|
heap
|
page read and write
|
||
112000
|
unkown
|
page read and write
|
||
1BAEA000
|
heap
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page execute and read and write
|
||
1BA4B000
|
heap
|
page read and write
|
||
11DD000
|
direct allocation
|
page read and write
|
||
2C5F000
|
direct allocation
|
page read and write
|
||
23B0000
|
heap
|
page execute and read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
1BAA2000
|
heap
|
page read and write
|
||
7FFAAC795000
|
trusted library allocation
|
page read and write
|
||
122F000
|
direct allocation
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
1BBFE000
|
heap
|
page read and write
|
||
1259B000
|
trusted library allocation
|
page read and write
|
||
1081000
|
heap
|
page read and write
|
||
1081000
|
heap
|
page read and write
|
||
11A1000
|
direct allocation
|
page read and write
|
||
7FFAAC35D000
|
trusted library allocation
|
page execute and read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page read and write
|
||
28FE000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
direct allocation
|
page read and write
|
||
2CA5000
|
trusted library allocation
|
page read and write
|
||
2C83000
|
direct allocation
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
119000
|
unkown
|
page readonly
|
||
1BAC2000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
28CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC767000
|
trusted library allocation
|
page read and write
|
||
126CA000
|
trusted library allocation
|
page read and write
|
||
12630000
|
trusted library allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
38C4000
|
direct allocation
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
28D8000
|
trusted library allocation
|
page read and write
|
||
2ACD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC79D000
|
trusted library allocation
|
page read and write
|
||
1271E000
|
trusted library allocation
|
page read and write
|
||
1051000
|
heap
|
page read and write
|
||
1B3DE000
|
stack
|
page read and write
|
||
1BB24000
|
heap
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1BAB4000
|
heap
|
page read and write
|
||
1169000
|
direct allocation
|
page read and write
|
||
1275D000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page read and write
|
||
1AFE0000
|
heap
|
page read and write
|
||
2BCD000
|
direct allocation
|
page read and write
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
1261000
|
direct allocation
|
page read and write
|
||
2A52000
|
trusted library allocation
|
page read and write
|
||
28A9000
|
trusted library allocation
|
page read and write
|
||
12991000
|
trusted library allocation
|
page read and write
|
||
1154000
|
direct allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
262D000
|
trusted library allocation
|
page read and write
|
||
1276F000
|
trusted library allocation
|
page read and write
|
||
126DE000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
direct allocation
|
page read and write
|
||
2A6D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC36B000
|
trusted library allocation
|
page execute and read and write
|
||
2AE8000
|
trusted library allocation
|
page read and write
|
||
7FFB226F1000
|
unkown
|
page execute read
|
||
BF8000
|
unkown
|
page readonly
|
||
2B9B000
|
direct allocation
|
page read and write
|
||
2B3D000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
126BA000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
direct allocation
|
page read and write
|
||
3BF5000
|
direct allocation
|
page read and write
|
||
7FAAB000
|
direct allocation
|
page read and write
|
||
2A2B000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
11B2000
|
direct allocation
|
page read and write
|
||
2D92000
|
trusted library allocation
|
page read and write
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
38CD000
|
direct allocation
|
page read and write
|
||
7FFAAC3FC000
|
trusted library allocation
|
page execute and read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
7FFAAC353000
|
trusted library allocation
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1020000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC7A3000
|
trusted library allocation
|
page read and write
|
||
2A1A000
|
trusted library allocation
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
1B4DC000
|
stack
|
page read and write
|
||
1BBD4000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
12775000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
2C49000
|
direct allocation
|
page read and write
|
||
11E4000
|
direct allocation
|
page read and write
|
||
2DEE000
|
trusted library allocation
|
page read and write
|
||
2CA3000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
12633000
|
trusted library allocation
|
page read and write
|
||
7FFAAC789000
|
trusted library allocation
|
page read and write
|
||
2AEA000
|
trusted library allocation
|
page read and write
|
||
2BD4000
|
direct allocation
|
page read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
1C19F000
|
heap
|
page read and write
|
||
2C1E000
|
direct allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
289E000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
direct allocation
|
page read and write
|
||
61000
|
unkown
|
page execute read
|
||
3120000
|
direct allocation
|
page read and write
|
||
129A3000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
12761000
|
trusted library allocation
|
page read and write
|
||
2A4F000
|
trusted library allocation
|
page read and write
|
||
1BB8B000
|
heap
|
page read and write
|
||
288E000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
stack
|
page read and write
|
||
1AB0B000
|
stack
|
page read and write
|
||
2856000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
129B5000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
trusted library allocation
|
page read and write
|
||
29CE000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
1220000
|
direct allocation
|
page read and write
|
||
2A3C000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
1AF60000
|
heap
|
page execute and read and write
|
||
129F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
1268000
|
direct allocation
|
page read and write
|
||
126D0000
|
trusted library allocation
|
page read and write
|
||
2C16000
|
direct allocation
|
page read and write
|
||
2C98000
|
direct allocation
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
129E0000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
28DC000
|
trusted library allocation
|
page read and write
|
||
1BA85000
|
heap
|
page read and write
|
||
2B06000
|
trusted library allocation
|
page read and write
|
||
12688000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
2B1B000
|
trusted library allocation
|
page read and write
|
||
29A7000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
7FFAAC344000
|
trusted library allocation
|
page read and write
|
||
129D9000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
125B9000
|
trusted library allocation
|
page read and write
|
||
1A90B000
|
heap
|
page read and write
|
||
12641000
|
trusted library allocation
|
page read and write
|
||
12766000
|
trusted library allocation
|
page read and write
|
||
2D3B000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
2CB8000
|
trusted library allocation
|
page read and write
|
||
2C42000
|
direct allocation
|
page read and write
|
||
7FFAAC7E7000
|
trusted library allocation
|
page read and write
|
||
2BEA000
|
direct allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
7FFAAC360000
|
trusted library allocation
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
413D000
|
stack
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
1A5B0000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
11B9000
|
direct allocation
|
page read and write
|
||
117000
|
unkown
|
page readonly
|
||
7FFAAC774000
|
trusted library allocation
|
page read and write
|
||
1228000
|
direct allocation
|
page read and write
|
||
125A7000
|
trusted library allocation
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
115000
|
unkown
|
page write copy
|
||
1264C000
|
trusted library allocation
|
page read and write
|
||
1263F000
|
trusted library allocation
|
page read and write
|
||
1272E000
|
trusted library allocation
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
125B2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC426000
|
trusted library allocation
|
page execute and read and write
|
||
127AC000
|
trusted library allocation
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
12647000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
2A84000
|
trusted library allocation
|
page read and write
|
||
7FFAAC364000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
2C94000
|
trusted library allocation
|
page read and write
|
||
126D5000
|
trusted library allocation
|
page read and write
|
||
2C87000
|
trusted library allocation
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page execute and read and write
|
||
1BB16000
|
heap
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
12715000
|
trusted library allocation
|
page read and write
|
||
296A000
|
trusted library allocation
|
page read and write
|
||
2D4B000
|
trusted library allocation
|
page read and write
|
||
2973000
|
trusted library allocation
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
2BB0000
|
direct allocation
|
page read and write
|
||
7FFAAC555000
|
trusted library allocation
|
page read and write
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
10C8000
|
heap
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
1AFE3000
|
heap
|
page read and write
|
||
1086000
|
heap
|
page read and write
|
||
28CD000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
direct allocation
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2AC8000
|
trusted library allocation
|
page read and write
|
||
126E3000
|
trusted library allocation
|
page read and write
|
||
1B625000
|
heap
|
page read and write
|
||
126D3000
|
trusted library allocation
|
page read and write
|
||
2DFB000
|
trusted library allocation
|
page read and write
|
||
7FD9B000
|
direct allocation
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
7FFB22712000
|
unkown
|
page readonly
|
||
10AF000
|
heap
|
page read and write
|
||
1B615000
|
heap
|
page read and write
|
||
28BA000
|
trusted library allocation
|
page read and write
|
||
2C66000
|
direct allocation
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
12A02000
|
trusted library allocation
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
1B63F000
|
heap
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
29E5000
|
trusted library allocation
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
29C3000
|
trusted library allocation
|
page read and write
|
||
289C000
|
trusted library allocation
|
page read and write
|
||
1267F000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
trusted library allocation
|
page read and write
|
||
1298D000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
heap
|
page read and write
|
||
11C0000
|
direct allocation
|
page read and write
|
||
10C1000
|
heap
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
12705000
|
trusted library allocation
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
1162000
|
direct allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page execute and read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC76D000
|
trusted library allocation
|
page read and write
|
||
2A09000
|
trusted library allocation
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
2A2D000
|
trusted library allocation
|
page read and write
|
||
1BA7E000
|
heap
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
127E0000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
trusted library allocation
|
page read and write
|
||
129E6000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
1AF63000
|
heap
|
page execute and read and write
|
||
7FFAAC542000
|
trusted library allocation
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
7FFAAC79F000
|
trusted library allocation
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
3BC8000
|
direct allocation
|
page read and write
|
||
2A44000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
direct allocation
|
page read and write
|
||
1141000
|
direct allocation
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page execute and read and write
|
||
12692000
|
trusted library allocation
|
page read and write
|
||
2983000
|
trusted library allocation
|
page read and write
|
||
11F4000
|
direct allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAAC34D000
|
trusted library allocation
|
page execute and read and write
|
||
1178000
|
direct allocation
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
2885000
|
trusted library allocation
|
page read and write
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C4000
|
trusted library allocation
|
page read and write
|
||
28B1000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
heap
|
page read and write
|
||
1193000
|
direct allocation
|
page read and write
|
||
1B60A000
|
heap
|
page read and write
|
||
129F5000
|
trusted library allocation
|
page read and write
|
||
298E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page read and write
|
||
12724000
|
trusted library allocation
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
2A9C000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
7FFAAC55B000
|
trusted library allocation
|
page read and write
|
||
12750000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
3EA0000
|
heap
|
page read and write
|
||
3BA8000
|
direct allocation
|
page read and write
|
||
1C97D000
|
stack
|
page read and write
|
||
1263C000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
direct allocation
|
page read and write
|
||
2BF1000
|
direct allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
2C01000
|
direct allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
10C1000
|
heap
|
page read and write
|
||
1B61F000
|
heap
|
page read and write
|
||
129A9000
|
trusted library allocation
|
page read and write
|
||
1BD7C000
|
stack
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
2AC6000
|
trusted library allocation
|
page read and write
|
||
2872000
|
trusted library allocation
|
page read and write
|
||
1236000
|
direct allocation
|
page read and write
|
||
3DDD000
|
heap
|
page read and write
|
||
2C8A000
|
trusted library allocation
|
page read and write
|
||
3DDF000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
2B0C000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
2BA2000
|
direct allocation
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
2B0A000
|
trusted library allocation
|
page read and write
|
||
2D6B000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
direct allocation
|
page read and write
|
||
2C0F000
|
direct allocation
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
1C180000
|
heap
|
page read and write
|
||
28DA000
|
trusted library allocation
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
E76000
|
heap
|
page read and write
|
||
1CA50000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
2C85000
|
trusted library allocation
|
page read and write
|
||
114C000
|
direct allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1BA12000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2E4C000
|
trusted library allocation
|
page read and write
|
||
2C3B000
|
direct allocation
|
page read and write
|
||
129FE000
|
trusted library allocation
|
page read and write
|
||
2380000
|
heap
|
page execute and read and write
|
||
127A2000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC665000
|
trusted library allocation
|
page read and write
|
||
127C0000
|
trusted library allocation
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
38BB000
|
direct allocation
|
page read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
296E000
|
trusted library allocation
|
page read and write
|
||
7FFB22706000
|
unkown
|
page readonly
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
127BA000
|
trusted library allocation
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
1CF81000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1B6A0000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
1268A000
|
trusted library allocation
|
page read and write
|
||
1CF8B000
|
heap
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
1267B000
|
trusted library allocation
|
page read and write
|
||
1BBCF000
|
heap
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
127B5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
2887000
|
trusted library allocation
|
page read and write
|
||
2D62000
|
trusted library allocation
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
12623000
|
trusted library allocation
|
page read and write
|
||
7FF42BFB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
2996000
|
trusted library allocation
|
page read and write
|
||
299F000
|
trusted library allocation
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
125BF000
|
trusted library allocation
|
page read and write
|
||
2865000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
2BA9000
|
direct allocation
|
page read and write
|
||
2CCC000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
2B37000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F0000
|
trusted library allocation
|
page read and write
|
||
2BF8000
|
direct allocation
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
2A5C000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
trusted library allocation
|
page read and write
|
||
2DC6000
|
trusted library allocation
|
page read and write
|
||
2C6D000
|
direct allocation
|
page read and write
|
||
1279C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DA000
|
trusted library allocation
|
page read and write
|
||
29BD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC39C000
|
trusted library allocation
|
page execute and read and write
|
||
129EF000
|
trusted library allocation
|
page read and write
|
||
3BE1000
|
direct allocation
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page read and write
|
||
117F000
|
direct allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
125AD000
|
trusted library allocation
|
page read and write
|
||
1170000
|
direct allocation
|
page read and write
|
||
2E73000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page read and write
|
||
85F000
|
stack
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
11FB000
|
direct allocation
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
trusted library allocation
|
page read and write
|
||
1266E000
|
trusted library allocation
|
page read and write
|
||
11CE000
|
direct allocation
|
page read and write
|
||
113A000
|
direct allocation
|
page read and write
|
||
12697000
|
trusted library allocation
|
page read and write
|
||
127A9000
|
trusted library allocation
|
page read and write
|
||
1270B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
7FFAAC7D1000
|
trusted library allocation
|
page read and write
|
||
322F000
|
direct allocation
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
1BB2B000
|
heap
|
page read and write
|
||
1BAAC000
|
heap
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
2BDC000
|
direct allocation
|
page read and write
|
||
2C96000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
7FFAAC343000
|
trusted library allocation
|
page execute and read and write
|
||
1BADA000
|
heap
|
page read and write
|
||
109000
|
unkown
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
2A1C000
|
trusted library allocation
|
page read and write
|
||
3BED000
|
direct allocation
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
126D8000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
trusted library allocation
|
page read and write
|
||
1268D000
|
trusted library allocation
|
page read and write
|
||
129B0000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
1B696000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
1CF72000
|
heap
|
page read and write
|
||
1C192000
|
heap
|
page read and write
|
||
1B600000
|
heap
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
12600000
|
trusted library allocation
|
page read and write
|
||
10A1000
|
heap
|
page read and write
|
||
2C91000
|
direct allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
2C7C000
|
direct allocation
|
page read and write
|
||
2C2B000
|
direct allocation
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC78B000
|
trusted library allocation
|
page read and write
|
||
B95000
|
unkown
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
2889000
|
trusted library allocation
|
page read and write
|
||
127B8000
|
trusted library allocation
|
page read and write
|
||
573000
|
heap
|
page read and write
|
||
2A6F000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
29E3000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
10A8000
|
heap
|
page read and write
|
||
2C08000
|
direct allocation
|
page read and write
|
||
28C7000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
unkown
|
page execute read
|
||
1B619000
|
heap
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
7FFAAC7F6000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
D0C000
|
stack
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
2DCF000
|
trusted library allocation
|
page read and write
|
||
1B639000
|
heap
|
page read and write
|
||
2985000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
2C74000
|
direct allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
1212000
|
direct allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
1B7DA000
|
stack
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
7FFB22715000
|
unkown
|
page readonly
|
||
1B12E000
|
stack
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
12675000
|
trusted library allocation
|
page read and write
|
||
12629000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
127CD000
|
trusted library allocation
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
124C000
|
direct allocation
|
page read and write
|
||
1B9FB000
|
stack
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
3DDD000
|
heap
|
page read and write
|
||
109000
|
unkown
|
page write copy
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
12639000
|
trusted library allocation
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
B8E000
|
unkown
|
page read and write
|
||
4F4000
|
stack
|
page read and write
|
||
2D4F000
|
trusted library allocation
|
page read and write
|
||
2AB3000
|
trusted library allocation
|
page read and write
|
||
2D5A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
2863000
|
trusted library allocation
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
1BA04000
|
heap
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
2A34000
|
trusted library allocation
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
1B5DE000
|
stack
|
page read and write
|
||
12729000
|
trusted library allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
1186000
|
direct allocation
|
page read and write
|
||
28E9000
|
trusted library allocation
|
page read and write
|
||
1B2DE000
|
stack
|
page read and write
|
||
1B16E000
|
stack
|
page read and write
|
||
127B2000
|
trusted library allocation
|
page read and write
|
||
290F000
|
trusted library allocation
|
page read and write
|
||
1B0EF000
|
stack
|
page read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
direct allocation
|
page read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
126C7000
|
trusted library allocation
|
page read and write
|
||
3E20000
|
heap
|
page read and write
|
||
2BC6000
|
direct allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
105E000
|
heap
|
page read and write
|
||
12684000
|
trusted library allocation
|
page read and write
|
||
BA7000
|
unkown
|
page readonly
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
129F8000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
1BACA000
|
heap
|
page read and write
|
||
290B000
|
trusted library allocation
|
page read and write
|
||
2A8F000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
1BBBF000
|
heap
|
page read and write
|
||
125A000
|
direct allocation
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
2DBE000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
1BA71000
|
heap
|
page read and write
|
||
129EA000
|
trusted library allocation
|
page read and write
|
||
1271B000
|
trusted library allocation
|
page read and write
|
||
1244000
|
direct allocation
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page execute and read and write
|
||
BCC000
|
stack
|
page read and write
|
||
BA0000
|
unkown
|
page write copy
|
||
28BC000
|
trusted library allocation
|
page read and write
|
||
1276A000
|
trusted library allocation
|
page read and write
|
||
12779000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
2BB8000
|
direct allocation
|
page read and write
|
||
3B99000
|
direct allocation
|
page read and write
|
||
2DE8000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
2A11000
|
trusted library allocation
|
page read and write
|
||
7FFB226F0000
|
unkown
|
page readonly
|
||
1253000
|
direct allocation
|
page read and write
|
||
120B000
|
direct allocation
|
page read and write
|
||
7FFAAC7EF000
|
trusted library allocation
|
page read and write
|
There are 727 hidden memdumps, click here to show them.