Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
wfJfUGeGT3.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\BowExpert[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\channel2[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\3546345[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Channel1[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\meta[1].exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000194001\meta.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000223001\36f677264b.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000255001\channel2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000256001\BowExpert.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000260001\Channel1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\591950\E
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Competent
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Corporate
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Entrepreneurs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Greatest
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Provides
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Reveal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Screw
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Still
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Whom
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Wireless
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\TrackGuard Technologies\z
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url
|
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >), ASCII
text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\WIDeqOfZq9.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Windows.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\3HvoFOAmEaJswFCHOzyfyz5b.exe
|
ASCII text
|
modified
|
||
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
|
ASCII text
|
dropped
|
||
C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe
|
ASCII text
|
dropped
|
||
C:\Users\Public\Desktop\Google Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:54 2023,
atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GOLD.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crypteda.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\installutil.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\246122658369
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024,
components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Honda
|
ASCII text, with very long lines (574), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Honda.bat (copy)
|
ASCII text, with very long lines (574), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Itsa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Scottish
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp1486.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp14D5.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\Tasks\Hkbsse.job
|
data
|
dropped
|
There are 57 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\wfJfUGeGT3.exe
|
"C:\Users\user\Desktop\wfJfUGeGT3.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 591950
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest +
..\Corporate + ..\Wireless E
|
||
C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
|
Shipment.pif E
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'"
/sc minute /mo 5 /F
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'"
/sc minute /mo 5 /F
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url"
& echo URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\GuardTrack.url" & exit
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
|
||
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
|
"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
|
||
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
|
"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
|
||
C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe
|
"C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
|
"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
|
||
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
|
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
|
"C:\Users\user\AppData\Local\Temp\1000142101\build2.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe
|
"C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe"
|
||
C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
|
"C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
|
||
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
|
"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe
|
"C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000194001\meta.exe
|
"C:\Users\user\AppData\Local\Temp\1000194001\meta.exe"
|
||
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
|
"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
|
||
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
|
"C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe
|
"C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe
|
"C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "wrsa opssvc"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /V "BachelorRayPotentialBeats" Itsa
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /d y /t 5
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 38 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://thizx13vt.top/v
|
unknown
|
||
http://thizx13vt.top/v1/upload.phpIq
|
unknown
|
||
http://thizx13vt.top/g
|
unknown
|
||
thizx13vt.top
|
|||
95.179.163.21:29257
|
|||
http://thizx13vt.top/v1/upload.phpM?
|
unknown
|
||
http://thizx13vt.top/v1/upload.php%qN
|
unknown
|
||
http://thizx13vt.top/v1/upload.phpsrJG
|
unknown
|
||
analforeverlovyu.top
|
|||
+#thizx13vt.top
|
|||
t.top
|
|||
exonic-hacks.com
|
|||
http://crl.microsoft
|
unknown
|
||
http://tempuri.org/Entity/Id12Response
|
unknown
|
||
http://tempuri.org/Entity/Id15Responsex
|
unknown
|
||
http://thizx13vt.top/j
|
unknown
|
||
https://www.dropbox.com/he
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Entity/Id2Response
|
unknown
|
||
http://tempuri.org/Entity/Id21Response
|
unknown
|
||
https://www.dropbox.com/
|
unknown
|
||
http://thizx13vt.top/x
|
unknown
|
||
http://tempuri.org/Entity/Id10Responsex
|
unknown
|
||
https://fusionflow-meta.net:443/socket/.)
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
http://tempuri.org/Entity/Id13LRjq
|
unknown
|
||
http://tempuri.org/Entity/Id6Responsex
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
http://185.216.214.225/freedom.exe
|
unknown
|
||
http://tempuri.org/Entity/Id15Response
|
unknown
|
||
http://tempuri.org/Entity/Id1Responsex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://tempuri.org/Entity/Id3LRjq
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
http://tempuri.org/Entity/Id23Responsex
|
unknown
|
||
https://fusionflow-meta.net:443/socket/3422
|
unknown
|
||
http://www.entrust.net/rpa03
|
unknown
|
||
http://tempuri.org/Entity/Id6LRjq(
|
unknown
|
||
https://aka.ms/nativeaot-compatibilityy
|
unknown
|
||
http://tempuri.org/Entity/Id20Responsex
|
unknown
|
||
http://thizx13vt.top:80/v1/upload.phpraz
|
unknown
|
||
https://direct-link.net/1218649/browse-and-buy-cs2-skins
|
unknown
|
||
http://tempuri.org/Entity/Id24Response
|
unknown
|
||
https://pastebin.com/raw/fiLr6dSt
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://tempuri.org/Entity/Id8Responsex
|
unknown
|
||
https://fusionflow-meta.net/1G
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://tempuri.org/Entity/Id17LRjq
|
unknown
|
||
http://tempuri.org/Entity/Id3Responsex
|
unknown
|
||
https://aka.ms/nativeaot-compatibilityY
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
http://tempuri.org/Entity/Id12Responsex
|
unknown
|
||
http://tempuri.org/Entity/Id17Responsex
|
unknown
|
||
http://tempuri.org/Entity/Id5Response
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
https://aka.ms/nativeaot-compatibilityh
|
unknown
|
||
http://tempuri.org/Entity/Id10Response
|
unknown
|
||
http://tempuri.org/Entity/Id8Response
|
unknown
|
||
https://www.dropbox.com/scl/fi/rqsnrl6msilfirz1qp1pn/weetwegsdg.exe?rlkey=rmj9i20g87wwdvd6wsdaypie2&
|
unknown
|
||
http://tempuri.org/Entity/Id24LRjq
|
unknown
|
||
http://185.216.214.225/freedom.exe-
|
unknown
|
||
https://api.ip.s
|
unknown
|
||
https://www.dropbox.com/S
|
unknown
|
||
https://www.dropbox.com/K
|
unknown
|
||
http://tempuri.org/Entity/Id22Responsex
|
unknown
|
||
http://tempuri.org/Entity/Id19Responsex
|
unknown
|
||
http://tempuri.org/Entity/Id2LRjq
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
|
unknown
|
||
http://thizx13vt.top/:F
|
unknown
|
||
http://tempuri.org/Entity/Id20LRjq
|
unknown
|
||
http://tempuri.org/Entity/Id14LRjq
|
unknown
|
||
http://tempuri.org/Entity/Id13Response
|
unknown
|
||
https://www.dropbox.com/r
|
unknown
|
||
http://crl.entrust.net/ts1ca.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
https://direct-link.net/1218649/windows-latest-updates
|
unknown
|
||
http://thizx13vt.top/2
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
http://thizx13vt.top/)
|
unknown
|
||
http://aia.entrust.net/ts1-chain256.cer01
|
unknown
|
||
https://www.dropbox.com/(e
|
unknown
|
||
http://tempuri.org/Entity/Id22Response
|
unknown
|
||
http://thizx13vt.top/E
|
unknown
|
||
http://185.216.214.225/freedom.exej
|
unknown
|
||
http://thizx13vt.top/F
|
unknown
|
||
http://185.216.214.225/freedom.exeryWt.exe
|
unknown
|
||
http://tempuri.org/Entity/Id13Responsex
|
unknown
|
||
http://tempuri.org/Entity/Id16Responsex
|
unknown
|
||
http://tempuri.org/Entity/Id23LRjqp
|
unknown
|
||
http://thizx13vt.top/S
|
unknown
|
||
http://tempuri.org/Entity/Id18Response
|
unknown
|
||
http://185.216.214.225/
|
unknown
|
||
http://thizx13vt.top/N
|
unknown
|
||
http://tempuri.org/Entity/Id3Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
95.179.163.21
|
unknown
|
Netherlands
|
||
193.176.158.185
|
unknown
|
unknown
|
||
162.125.66.18
|
unknown
|
United States
|
||
185.215.113.26
|
unknown
|
Portugal
|
||
185.215.113.19
|
unknown
|
Portugal
|
||
103.130.147.211
|
unknown
|
Turkey
|
||
45.200.149.147
|
unknown
|
Seychelles
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
208.95.112.1
|
unknown
|
United States
|
||
82.147.85.52
|
unknown
|
Russian Federation
|
||
104.20.4.235
|
unknown
|
United States
|
||
185.216.214.225
|
unknown
|
Germany
|
||
188.114.96.3
|
unknown
|
European Union
|
There are 3 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
Cerker.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
|
Startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Microsoft Subsystem Framework
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
|
FileDirectory
|
There are 25 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B60000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
12DF1000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
direct allocation
|
page execute and read and write
|
||
BF2000
|
unkown
|
page readonly
|
||
479000
|
remote allocation
|
page execute and read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
3405000
|
trusted library allocation
|
page read and write
|
||
220BC200000
|
direct allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
1BD22000
|
heap
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
33A6000
|
trusted library allocation
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
22AE000
|
trusted library allocation
|
page read and write
|
||
357C000
|
heap
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
2614F60C000
|
heap
|
page read and write
|
||
320C000
|
heap
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
1BBC0000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
5C11000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
335D000
|
stack
|
page read and write
|
||
286F000
|
stack
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
3552000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
4AEB000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
D41000
|
heap
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
3448000
|
trusted library allocation
|
page read and write
|
||
6390000
|
heap
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
320B000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
1063000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
22B7000
|
trusted library allocation
|
page read and write
|
||
10B2000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
12DE8000
|
trusted library allocation
|
page read and write
|
||
1C1D000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
D01000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
1BD0E000
|
stack
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1521000
|
heap
|
page read and write
|
||
343A000
|
trusted library allocation
|
page read and write
|
||
1D839880000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
2614F521000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
10BC000
|
heap
|
page read and write
|
||
B2B000
|
trusted library allocation
|
page execute and read and write
|
||
1BC4D000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
2589202F000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
1533000
|
trusted library allocation
|
page execute and read and write
|
||
7B4000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
A06000
|
unkown
|
page readonly
|
||
CEF000
|
heap
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
45DE000
|
stack
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
7FF848C34000
|
trusted library allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
2614F5A6000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
17BC000
|
heap
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
CCC000
|
stack
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
1023000
|
heap
|
page read and write
|
||
61D2000
|
heap
|
page read and write
|
||
30CA000
|
trusted library allocation
|
page read and write
|
||
BF6000
|
unkown
|
page read and write
|
||
873000
|
unkown
|
page readonly
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
heap
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
3CF000
|
stack
|
page read and write
|
||
10EB000
|
heap
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
1082000
|
trusted library allocation
|
page read and write
|
||
21C4000
|
trusted library allocation
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
DA0000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
21C7000
|
trusted library allocation
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
FCA000
|
heap
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
1136000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
5654000
|
heap
|
page read and write
|
||
220B76A2000
|
heap
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
1534000
|
trusted library allocation
|
page read and write
|
||
2262000
|
trusted library allocation
|
page read and write
|
||
1D839894000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
22BD000
|
trusted library allocation
|
page read and write
|
||
1F76000
|
trusted library allocation
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B55000
|
heap
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
220B76B4000
|
heap
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
2AD2000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page execute and read and write
|
||
3D0000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
7FF848C43000
|
trusted library allocation
|
page execute and read and write
|
||
21CF000
|
trusted library allocation
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
7500000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page execute and read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
5DFE000
|
stack
|
page read and write
|
||
30D6000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
3479000
|
trusted library allocation
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
378D000
|
stack
|
page read and write
|
||
21C3000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
DD4F000
|
stack
|
page read and write
|
||
368D000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
21C7000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
37CD000
|
stack
|
page read and write
|
||
E44000
|
stack
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
DAA000
|
stack
|
page read and write
|
||
3A70000
|
remote allocation
|
page read and write
|
||
1BBF0000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
25891F80000
|
heap
|
page read and write
|
||
6610000
|
heap
|
page read and write
|
||
2266000
|
trusted library allocation
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
21C5000
|
trusted library allocation
|
page read and write
|
||
220B76B5000
|
heap
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
39FD000
|
stack
|
page read and write
|
||
C91000
|
unkown
|
page execute read
|
||
1D839860000
|
heap
|
page read and write
|
||
1EBA000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
3468000
|
trusted library allocation
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
46A4000
|
trusted library allocation
|
page read and write
|
||
7A2000
|
unkown
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
21C9000
|
trusted library allocation
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
1CDA000
|
trusted library allocation
|
page read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
7FF617F88000
|
unkown
|
page read and write
|
||
1C4A000
|
trusted library allocation
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
31FF000
|
heap
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
CDE000
|
unkown
|
page write copy
|
||
1356000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
2A0F000
|
heap
|
page execute and read and write
|
||
2270000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
979000
|
unkown
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
21CC000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
951000
|
unkown
|
page execute read
|
||
6930000
|
trusted library allocation
|
page read and write
|
||
153D000
|
trusted library allocation
|
page execute and read and write
|
||
16F8000
|
heap
|
page read and write
|
||
22EF000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
21C8000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
220B76B8000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
2614F613000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
2614F5C9000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
6606000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27A2000
|
trusted library allocation
|
page execute and read and write
|
||
11FD000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
1319000
|
heap
|
page read and write
|
||
6819000
|
stack
|
page read and write
|
||
226B000
|
trusted library allocation
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
1B90D000
|
stack
|
page read and write
|
||
2614F5BF000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
25891FE8000
|
heap
|
page read and write
|
||
135E000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
65AF000
|
stack
|
page read and write
|
||
34AA000
|
trusted library allocation
|
page read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
10A2000
|
heap
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page execute and read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
23F7000
|
heap
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
25892016000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
7FF848C5D000
|
trusted library allocation
|
page execute and read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
960000
|
trusted library allocation
|
page read and write
|
||
34C3000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
226D000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
34A4000
|
trusted library allocation
|
page read and write
|
||
22A5000
|
trusted library allocation
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
235A000
|
trusted library allocation
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
12A0000
|
heap
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
5BD9000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
1261000
|
heap
|
page read and write
|
||
114F000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
DCE000
|
stack
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
7FF848C5D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D16000
|
trusted library allocation
|
page execute and read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
22AA000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
2274000
|
trusted library allocation
|
page read and write
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
679000
|
unkown
|
page readonly
|
||
D2A000
|
heap
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
6920000
|
trusted library allocation
|
page execute and read and write
|
||
1179000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
22A3000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
1D8398C6000
|
heap
|
page read and write
|
||
1B8C000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
353D000
|
stack
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
135A000
|
heap
|
page read and write
|
||
41F000
|
unkown
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
21C4000
|
trusted library allocation
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
674000
|
unkown
|
page write copy
|
||
2660000
|
unclassified section
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page readonly
|
||
2CDF000
|
stack
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
2614F5D2000
|
heap
|
page read and write
|
||
314C000
|
stack
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
228D000
|
trusted library allocation
|
page read and write
|
||
453C000
|
stack
|
page read and write
|
||
236F000
|
heap
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
D22000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page read and write
|
||
7F6000
|
unkown
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
31F8000
|
heap
|
page read and write
|
||
CAC000
|
stack
|
page read and write
|
||
289D000
|
stack
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
976000
|
unkown
|
page read and write
|
||
21FCEFA000
|
stack
|
page read and write
|
||
1152000
|
heap
|
page read and write
|
||
6B28000
|
trusted library allocation
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
21C2000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
31CF000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page write copy
|
||
2F7E000
|
stack
|
page read and write
|
||
9AD000
|
heap
|
page read and write
|
||
6EC000
|
stack
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
2589202F000
|
heap
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
7FF617D10000
|
unkown
|
page readonly
|
||
17E4000
|
heap
|
page read and write
|
||
32AF000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
25CB000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
heap
|
page read and write
|
||
1054000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
3364000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
FFF000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
21FD0FF000
|
stack
|
page read and write
|
||
6606000
|
heap
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
33D0000
|
heap
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
7FF617EB7000
|
unkown
|
page readonly
|
||
2B60000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
10B3000
|
heap
|
page read and write
|
||
11BD000
|
heap
|
page read and write
|
||
3476000
|
trusted library allocation
|
page read and write
|
||
2614F60C000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2377000
|
heap
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
2589201A000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
25891FC8000
|
heap
|
page read and write
|
||
21C3000
|
trusted library allocation
|
page read and write
|
||
6AF6000
|
trusted library allocation
|
page read and write
|
||
38FC000
|
stack
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
16DE000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
320E000
|
heap
|
page read and write
|
||
30EF000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
181E000
|
stack
|
page read and write
|
||
63B4000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1B4A0000
|
heap
|
page execute and read and write
|
||
31E8000
|
heap
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
21CB000
|
trusted library allocation
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
1BCC8000
|
heap
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
5B4C000
|
stack
|
page read and write
|
||
201F000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
228E000
|
trusted library allocation
|
page read and write
|
||
FEC6FFF000
|
stack
|
page read and write
|
||
964000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
heap
|
page read and write
|
||
FFF000
|
heap
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page execute and read and write
|
||
337B000
|
trusted library allocation
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
220B768F000
|
heap
|
page read and write
|
||
1D8398AD000
|
heap
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
1B670000
|
heap
|
page read and write
|
||
1D8398BC000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
6D50000
|
heap
|
page execute and read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
10A5000
|
heap
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
1D83989F000
|
heap
|
page read and write
|
||
21C2000
|
trusted library allocation
|
page read and write
|
||
7FF848CFC000
|
trusted library allocation
|
page execute and read and write
|
||
1BE0B000
|
stack
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
123F000
|
heap
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
229D000
|
trusted library allocation
|
page read and write
|
||
1F9A000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
1156000
|
heap
|
page read and write
|
||
7FF848CF6000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
5BCD000
|
stack
|
page read and write
|
||
52C2000
|
trusted library allocation
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
6767000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
5C03000
|
heap
|
page read and write
|
||
53B000
|
stack
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
BFC000
|
unkown
|
page write copy
|
||
2F8F000
|
unkown
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
10F6000
|
heap
|
page read and write
|
||
38CD000
|
stack
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
2614F5C2000
|
heap
|
page read and write
|
||
3088000
|
heap
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
32A3000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
65F1000
|
heap
|
page read and write
|
||
220BB400000
|
direct allocation
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
7AF000
|
unkown
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
5AC000
|
stack
|
page read and write
|
||
3483000
|
trusted library allocation
|
page read and write
|
||
781000
|
unkown
|
page readonly
|
||
12B2000
|
heap
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
7FF848C6B000
|
trusted library allocation
|
page execute and read and write
|
||
D15000
|
heap
|
page read and write
|
||
3489000
|
trusted library allocation
|
page read and write
|
||
30E7000
|
trusted library allocation
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
13A1000
|
heap
|
page read and write
|
||
1001000
|
heap
|
page read and write
|
||
1BFBF000
|
stack
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
4564000
|
heap
|
page read and write
|
||
33CE000
|
unkown
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
33D7000
|
heap
|
page read and write
|
||
220B9000000
|
direct allocation
|
page read and write
|
||
2349000
|
trusted library allocation
|
page read and write
|
||
A19000
|
unkown
|
page readonly
|
||
11DD000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
985000
|
unkown
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
5813000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
2259000
|
trusted library allocation
|
page read and write
|
||
34A6000
|
trusted library allocation
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page read and write
|
||
10BC000
|
heap
|
page read and write
|
||
56AF000
|
heap
|
page read and write
|
||
2C6C000
|
stack
|
page read and write
|
||
A14000
|
unkown
|
page write copy
|
||
A0D000
|
heap
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
107A000
|
trusted library allocation
|
page execute and read and write
|
||
D2C000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
6380000
|
heap
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
1BC79000
|
heap
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
546C000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
B6F000
|
stack
|
page read and write
|
||
CDE000
|
unkown
|
page read and write
|
||
2614F60F000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
2589202F000
|
heap
|
page read and write
|
||
2403000
|
trusted library allocation
|
page read and write
|
||
7FF617D11000
|
unkown
|
page execute read
|
||
D22000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2614F5A0000
|
heap
|
page read and write
|
||
341B000
|
trusted library allocation
|
page read and write
|
||
689000
|
stack
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
25891FDC000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
4141000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
50B000
|
remote allocation
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
1213000
|
heap
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
2AED000
|
stack
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
2E19000
|
heap
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
2276000
|
trusted library allocation
|
page read and write
|
||
1098000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2266000
|
trusted library allocation
|
page read and write
|
||
CCF000
|
stack
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
E48000
|
stack
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
1786000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
3A70000
|
remote allocation
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
646E000
|
stack
|
page read and write
|
||
225F000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page execute and read and write
|
||
76D000
|
unkown
|
page readonly
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
unkown
|
page readonly
|
||
2AE1000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
159F000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
3CFF000
|
stack
|
page read and write
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
5F3000
|
unkown
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
stack
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
1D839880000
|
heap
|
page read and write
|
||
2589201B000
|
heap
|
page read and write
|
||
25891FF5000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
1B7AA000
|
stack
|
page read and write
|
||
25891FE1000
|
heap
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
21C4000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
7FF617F88000
|
unkown
|
page write copy
|
||
9B0000
|
heap
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
3881000
|
heap
|
page read and write
|
||
94BE000
|
stack
|
page read and write
|
||
F7D000
|
stack
|
page read and write
|
||
1C2BE000
|
stack
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
46B2000
|
trusted library allocation
|
page read and write
|
||
1672000
|
trusted library allocation
|
page read and write
|
||
220B7810000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
873000
|
unkown
|
page readonly
|
||
953000
|
trusted library allocation
|
page execute and read and write
|
||
CFC000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
4F9000
|
remote allocation
|
page execute and read and write
|
||
7FF848C44000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
220B7689000
|
heap
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
679000
|
unkown
|
page readonly
|
||
599B000
|
stack
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
220B76B4000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
FEC6AFF000
|
stack
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
361E000
|
stack
|
page read and write
|
||
22A8000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
50A000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
25892190000
|
heap
|
page read and write
|
||
666000
|
unkown
|
page readonly
|
||
500000
|
heap
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
1B9B0000
|
heap
|
page execute and read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
25891FED000
|
heap
|
page read and write
|
||
21C7000
|
trusted library allocation
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
44FE000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
37A5000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
114C000
|
heap
|
page read and write
|
||
34BF000
|
trusted library allocation
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
1D8397F0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
2295000
|
trusted library allocation
|
page read and write
|
||
442C000
|
trusted library allocation
|
page read and write
|
||
21C7000
|
trusted library allocation
|
page read and write
|
||
95BE000
|
stack
|
page read and write
|
||
23EA000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
2589202F000
|
heap
|
page read and write
|
||
1BAB0000
|
heap
|
page execute and read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
1220000
|
heap
|
page read and write
|
||
1372000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
31BA000
|
trusted library allocation
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
305A2F9000
|
stack
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
46A000
|
remote allocation
|
page execute and read and write
|
||
1077000
|
heap
|
page read and write
|
||
21FCFFF000
|
stack
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
21C8000
|
trusted library allocation
|
page read and write
|
||
2614F5A2000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page read and write
|
||
305A4FF000
|
stack
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
670000
|
unkown
|
page write copy
|
||
2090000
|
trusted library allocation
|
page read and write
|
||
167B000
|
trusted library allocation
|
page execute and read and write
|
||
260CD00F000
|
direct allocation
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
7FF848DD8000
|
trusted library allocation
|
page read and write
|
||
1C40E000
|
stack
|
page read and write
|
||
58A000
|
heap
|
page read and write
|
||
1C2FE000
|
stack
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
1274000
|
heap
|
page read and write
|
||
2D9C000
|
heap
|
page read and write
|
||
1C1FD000
|
stack
|
page read and write
|
||
30E3000
|
trusted library allocation
|
page read and write
|
||
1337000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
529E000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
666000
|
unkown
|
page readonly
|
||
D04000
|
heap
|
page read and write
|
||
3455000
|
trusted library allocation
|
page read and write
|
||
1746000
|
heap
|
page read and write
|
||
21FD6FE000
|
stack
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
1796000
|
heap
|
page read and write
|
||
25891FF5000
|
heap
|
page read and write
|
||
348B000
|
trusted library allocation
|
page read and write
|
||
22B0000
|
heap
|
page execute and read and write
|
||
9B0000
|
heap
|
page read and write
|
||
12B68000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2299000
|
trusted library allocation
|
page read and write
|
||
7FD40000
|
trusted library allocation
|
page execute and read and write
|
||
16EA000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page execute and read and write
|
||
220B7691000
|
heap
|
page read and write
|
||
220BF00A000
|
direct allocation
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2614F525000
|
heap
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
6B0E000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
104B000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
6769000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
2614F5A0000
|
heap
|
page read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
13038000
|
trusted library allocation
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
7FF617D10000
|
unkown
|
page readonly
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
3093000
|
trusted library allocation
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
7FF848D1C000
|
trusted library allocation
|
page execute and read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
25891FE7000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
29FE000
|
heap
|
page read and write
|
||
7FF848C3D000
|
trusted library allocation
|
page execute and read and write
|
||
11DF000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
781000
|
unkown
|
page readonly
|
||
220BE600000
|
direct allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
65F1000
|
heap
|
page read and write
|
||
15A4000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
2614F5C2000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1840000
|
trusted library allocation
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
324F000
|
trusted library allocation
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
111C000
|
heap
|
page read and write
|
||
21CD000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
CFD000
|
heap
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
2254000
|
trusted library allocation
|
page read and write
|
||
3286000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
92C000
|
unkown
|
page readonly
|
||
2DFD000
|
heap
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
22AB000
|
trusted library allocation
|
page read and write
|
||
21FD5FF000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
trusted library allocation
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
21C4000
|
trusted library allocation
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
2274000
|
trusted library allocation
|
page read and write
|
||
2614F5A2000
|
heap
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
1D839868000
|
heap
|
page read and write
|
||
1B660000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
2DFF000
|
heap
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
3600000
|
remote allocation
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
35DC000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
5F3D000
|
stack
|
page read and write
|
||
5AB000
|
unkown
|
page write copy
|
||
4E5000
|
heap
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
25892015000
|
heap
|
page read and write
|
||
102C000
|
heap
|
page read and write
|
||
912000
|
unkown
|
page readonly
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
321B000
|
heap
|
page read and write
|
||
220B7490000
|
heap
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
59F5000
|
heap
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
1082000
|
heap
|
page read and write
|
||
308A000
|
trusted library allocation
|
page read and write
|
||
C93000
|
heap
|
page read and write
|
||
1B930000
|
heap
|
page read and write
|
||
237C000
|
heap
|
page read and write
|
||
21C6000
|
trusted library allocation
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page write copy
|
||
5AF000
|
heap
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
126E000
|
heap
|
page read and write
|
||
220B767E000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
2614F5BF000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
21FD3FF000
|
stack
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
10FB000
|
heap
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
2D1E000
|
unkown
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page execute and read and write
|
||
13C8000
|
heap
|
page read and write
|
||
228A000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
E63000
|
stack
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page execute and read and write
|
||
4B60000
|
heap
|
page read and write
|
||
344F000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
CD4000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
781000
|
unkown
|
page readonly
|
||
1093000
|
heap
|
page read and write
|
||
21CD000
|
trusted library allocation
|
page read and write
|
||
23C5000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
29C000
|
stack
|
page read and write
|
||
2DB3000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
CFE000
|
heap
|
page read and write
|
||
16C8000
|
heap
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
1D8398C1000
|
heap
|
page read and write
|
||
1B060000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
1339000
|
heap
|
page read and write
|
||
77F000
|
stack
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
226F000
|
trusted library allocation
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
D33000
|
heap
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
1D839C05000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
9B4000
|
heap
|
page read and write
|
||
25891FFD000
|
heap
|
page read and write
|
||
2614F5EA000
|
heap
|
page read and write
|
||
1D839C00000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1058000
|
heap
|
page read and write
|
||
1203000
|
heap
|
page read and write
|
||
5443000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1053000
|
trusted library allocation
|
page execute and read and write
|
||
D22000
|
heap
|
page read and write
|
||
1053000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
34AC000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
3C55000
|
heap
|
page read and write
|
||
2064000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
220B7830000
|
heap
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
E253000
|
heap
|
page read and write
|
||
232A000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page execute and read and write
|
||
1520000
|
heap
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
4E9000
|
remote allocation
|
page execute and read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
341F000
|
trusted library allocation
|
page read and write
|
||
333D000
|
stack
|
page read and write
|
||
10DC000
|
heap
|
page read and write
|
||
3193000
|
trusted library allocation
|
page read and write
|
||
229D000
|
trusted library allocation
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
284E000
|
unkown
|
page readonly
|
||
13B5000
|
heap
|
page read and write
|
||
7BFE000
|
stack
|
page read and write
|
||
10BB000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
1485000
|
heap
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1001000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
22A1000
|
trusted library allocation
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page execute and read and write
|
||
575000
|
heap
|
page read and write
|
||
2614F5C9000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
276D000
|
stack
|
page read and write
|
||
1074000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
7B0000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
220B76F8000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
21C9000
|
trusted library allocation
|
page read and write
|
||
220BF000000
|
direct allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
1777000
|
heap
|
page read and write
|
||
2589200E000
|
heap
|
page read and write
|
||
220BCC00000
|
direct allocation
|
page read and write
|
||
25891FC0000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
1C1BE000
|
stack
|
page read and write
|
||
503F000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
2BF4000
|
trusted library allocation
|
page read and write
|
||
2441000
|
heap
|
page read and write
|
||
609C000
|
stack
|
page read and write
|
||
3E0F000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
1BEBD000
|
stack
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
stack
|
page read and write
|
||
3457000
|
trusted library allocation
|
page read and write
|
||
1C3BE000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
1109000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
23EF000
|
heap
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
21C5000
|
trusted library allocation
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
126E000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
34BB000
|
trusted library allocation
|
page read and write
|
||
21CB000
|
trusted library allocation
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
1211000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
34C5000
|
trusted library allocation
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
3BFD000
|
stack
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
2E23000
|
heap
|
page read and write
|
||
23E2000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
232F000
|
trusted library allocation
|
page read and write
|
||
2E25000
|
heap
|
page read and write
|
||
3453000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
228E000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
45EF000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
21CA000
|
trusted library allocation
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
25891FEE000
|
heap
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
81DC000
|
stack
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
32F1000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
12A2000
|
heap
|
page read and write
|
||
3472000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
220B76BD000
|
heap
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
1B71000
|
heap
|
page read and write
|
||
21FD2FE000
|
stack
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
3487000
|
trusted library allocation
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
31FA000
|
trusted library allocation
|
page read and write
|
||
12DE1000
|
trusted library allocation
|
page read and write
|
||
C9D000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
316C000
|
stack
|
page read and write
|
||
1BB0E000
|
stack
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
5851000
|
heap
|
page read and write
|
||
21C9000
|
trusted library allocation
|
page read and write
|
||
220B76B4000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
32CD000
|
trusted library allocation
|
page read and write
|
||
226F000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
2285000
|
trusted library allocation
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
14ED000
|
stack
|
page read and write
|
||
7FF848DDD000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
1D83989E000
|
heap
|
page read and write
|
||
105D000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
21C5000
|
trusted library allocation
|
page read and write
|
||
34A2000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
CF3000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
D660000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
25892350000
|
heap
|
page read and write
|
||
1C0BE000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
7AFD000
|
stack
|
page read and write
|
||
104B000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
34AE000
|
trusted library allocation
|
page read and write
|
||
1D83988F000
|
heap
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
2402000
|
trusted library allocation
|
page execute and read and write
|
||
1BE4000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
23CD000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page readonly
|
||
F10000
|
remote allocation
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
1276000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
2614F5C2000
|
heap
|
page read and write
|
||
6BFE000
|
trusted library allocation
|
page read and write
|
||
46D000
|
unkown
|
page execute and read and write
|
||
D680000
|
heap
|
page read and write
|
||
284E000
|
unkown
|
page readonly
|
||
1180000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
5630000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
1988000
|
heap
|
page read and write
|
||
2589202F000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2614F5D2000
|
heap
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
220B76B8000
|
heap
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1D8398B9000
|
heap
|
page read and write
|
||
2614F60C000
|
heap
|
page read and write
|
||
325F000
|
trusted library allocation
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
trusted library allocation
|
page read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
2DE8000
|
heap
|
page read and write
|
||
7FF421760000
|
trusted library allocation
|
page execute and read and write
|
||
1677000
|
trusted library allocation
|
page execute and read and write
|
||
77E000
|
unkown
|
page read and write
|
||
25891FFE000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
2E19000
|
heap
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
331B000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
3346000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
5EC000
|
stack
|
page read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
1D8398B8000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
25891FE1000
|
heap
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
38E000
|
stack
|
page read and write
|
||
2ADE000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
1B933000
|
heap
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
1BD49000
|
heap
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
2614F5A0000
|
heap
|
page read and write
|
||
112C000
|
heap
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
FFF000
|
heap
|
page read and write
|
||
7FF848D26000
|
trusted library allocation
|
page execute and read and write
|
||
118B000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
108B000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
heap
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
220B76F8000
|
heap
|
page read and write
|
||
1D8398B3000
|
heap
|
page read and write
|
||
13F3000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
992000
|
unkown
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
CCD000
|
unkown
|
page readonly
|
||
11B1000
|
heap
|
page read and write
|
||
1F53000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
stack
|
page read and write
|
||
CE4000
|
trusted library allocation
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
23FF000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
1D8398B3000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
7FF848C4D000
|
trusted library allocation
|
page execute and read and write
|
||
142000
|
unkown
|
page readonly
|
||
3570000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
1D83988F000
|
heap
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page read and write
|
||
FEC68FE000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
34DC000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
21CC000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
564C000
|
heap
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
FEC6BFF000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
F63000
|
trusted library allocation
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
2294000
|
trusted library allocation
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6B02000
|
trusted library allocation
|
page read and write
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
11F1000
|
heap
|
page read and write
|
||
2E2F000
|
trusted library allocation
|
page read and write
|
||
21CD000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
3336000
|
trusted library allocation
|
page read and write
|
||
77E000
|
unkown
|
page write copy
|
||
220B76F8000
|
heap
|
page read and write
|
||
4F14000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
E4C000
|
stack
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page execute and read and write
|
||
5AB000
|
unkown
|
page read and write
|
||
6B11000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
heap
|
page execute and read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
220B76A0000
|
heap
|
page read and write
|
||
FCC000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
FAA000
|
heap
|
page read and write
|
||
25892027000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
1666000
|
trusted library allocation
|
page execute and read and write
|
||
1162000
|
heap
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
2E25000
|
heap
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
2614F5C2000
|
heap
|
page read and write
|
||
227A000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
D68A000
|
heap
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
1D8397D0000
|
heap
|
page read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
heap
|
page read and write
|
||
2252000
|
trusted library allocation
|
page read and write
|
||
22B1000
|
trusted library allocation
|
page read and write
|
||
309B000
|
trusted library allocation
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B4A000
|
stack
|
page read and write
|
||
4D75000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
3600000
|
remote allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
C78000
|
heap
|
page read and write
|
||
2614F60C000
|
heap
|
page read and write
|
||
2614F5D2000
|
heap
|
page read and write
|
||
21C3000
|
trusted library allocation
|
page read and write
|
||
781000
|
unkown
|
page readonly
|
||
D15000
|
heap
|
page read and write
|
||
94B000
|
stack
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
220B7691000
|
heap
|
page read and write
|
||
45B3000
|
trusted library allocation
|
page read and write
|
||
330D000
|
stack
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
2A55000
|
heap
|
page read and write
|
||
21C4000
|
trusted library allocation
|
page read and write
|
||
1D839895000
|
heap
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page execute and read and write
|
||
19A000
|
stack
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
3600000
|
remote allocation
|
page read and write
|
||
236C000
|
trusted library allocation
|
page read and write
|
||
2614F522000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page execute and read and write
|
||
10D5000
|
heap
|
page read and write
|
||
10FB000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
750E000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1D8397C0000
|
heap
|
page read and write
|
||
2B40000
|
trusted library section
|
page read and write
|
||
1E85000
|
trusted library allocation
|
page read and write
|
||
345B000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
stack
|
page read and write
|
||
530E000
|
trusted library allocation
|
page read and write
|
||
1D8398C0000
|
heap
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
998000
|
unkown
|
page read and write
|
||
1105000
|
heap
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
21C6000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
4141000
|
heap
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2614F60F000
|
heap
|
page read and write
|
||
1076000
|
trusted library allocation
|
page execute and read and write
|
||
6A0000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
1D8398C9000
|
heap
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
1867000
|
heap
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
31BC000
|
trusted library allocation
|
page read and write
|
||
21CF000
|
trusted library allocation
|
page read and write
|
||
2284000
|
trusted library allocation
|
page read and write
|
||
1BCC0000
|
heap
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
65B8000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
50E000
|
unkown
|
page readonly
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
1171000
|
heap
|
page read and write
|
||
30D2000
|
trusted library allocation
|
page read and write
|
||
7FF848C4D000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
10DD000
|
heap
|
page read and write
|
||
1072000
|
trusted library allocation
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
30DB000
|
trusted library allocation
|
page read and write
|
||
1392000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
13031000
|
trusted library allocation
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
C91000
|
unkown
|
page execute read
|
||
CF3000
|
heap
|
page read and write
|
||
5694000
|
heap
|
page read and write
|
||
21CB000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
2614F5C2000
|
heap
|
page read and write
|
||
1BA3E000
|
stack
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page execute and read and write
|
||
11B6000
|
heap
|
page read and write
|
||
5AD000
|
unkown
|
page readonly
|
||
305A3FF000
|
stack
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
220BCC5F000
|
direct allocation
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
2589201D000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
32DE000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
2B96000
|
heap
|
page read and write
|
||
2614F520000
|
heap
|
page read and write
|
||
FEC66FA000
|
stack
|
page read and write
|
||
22AE000
|
stack
|
page read and write
|
||
1AE10000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
5BB0000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page execute and read and write
|
||
32F1000
|
heap
|
page read and write
|
||
11B6000
|
heap
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
7FF617E51000
|
unkown
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
64AD000
|
stack
|
page read and write
|
||
1A1F000
|
stack
|
page read and write
|
||
32F1000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2589201D000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
104B000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
1B36D000
|
stack
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
7FF848C8C000
|
trusted library allocation
|
page execute and read and write
|
||
21C6000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1000000
|
heap
|
page read and write
|
||
1792000
|
heap
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
25891FF5000
|
heap
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
CF7000
|
heap
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1D839888000
|
heap
|
page read and write
|
||
21C9000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
1BC1000
|
trusted library allocation
|
page read and write
|
||
2396000
|
heap
|
page read and write
|
||
7A8000
|
unkown
|
page read and write
|
||
DE9000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
1D83B6E0000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
22B6000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
22BC000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
220B7620000
|
heap
|
page read and write
|
||
1735000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
2614F5A6000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
220B76B4000
|
heap
|
page read and write
|
||
6BFB000
|
trusted library allocation
|
page read and write
|
||
2AD7000
|
heap
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
172B000
|
heap
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
691C000
|
stack
|
page read and write
|
||
220B7835000
|
heap
|
page read and write
|
||
21C6000
|
trusted library allocation
|
page read and write
|
||
220B7688000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
1D8398B3000
|
heap
|
page read and write
|
||
25891F90000
|
heap
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
9BA000
|
heap
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
6C90000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page execute and read and write
|
||
220B76B4000
|
heap
|
page read and write
|
||
30DF000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
5BCD000
|
heap
|
page read and write
|
||
220BB800000
|
direct allocation
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
154D000
|
trusted library allocation
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
21C7000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1154000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
A10000
|
unkown
|
page write copy
|
||
6AF1000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
12B61000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
6B25000
|
trusted library allocation
|
page read and write
|
||
5682000
|
heap
|
page read and write
|
||
1C0FE000
|
stack
|
page read and write
|
||
2276000
|
trusted library allocation
|
page read and write
|
||
25893AB0000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2E31000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
7FF617F97000
|
unkown
|
page readonly
|
||
11EE000
|
heap
|
page read and write
|
||
71A000
|
stack
|
page read and write
|
||
106D000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
7FF617F8F000
|
unkown
|
page read and write
|
||
3434000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
10FA000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
25892026000
|
heap
|
page read and write
|
||
33CE000
|
trusted library allocation
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
32B3000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
4D7E000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
CE1000
|
unkown
|
page readonly
|
||
9E9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1022000
|
heap
|
page read and write
|
||
10B2000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
666000
|
unkown
|
page readonly
|
||
4141000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
5658000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
232F000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
220B76B0000
|
heap
|
page read and write
|
||
3097000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
BFC000
|
unkown
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
2AD7000
|
heap
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
1256000
|
heap
|
page read and write
|
||
5AD000
|
unkown
|
page readonly
|
||
666000
|
unkown
|
page readonly
|
||
4141000
|
heap
|
page read and write
|
||
82DC000
|
stack
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
2589201A000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
1D83988F000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
2298000
|
trusted library allocation
|
page read and write
|
||
2614F5A0000
|
heap
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
FEC6DFE000
|
stack
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
FEC6EFE000
|
stack
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
25892027000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
1B4AD000
|
stack
|
page read and write
|
||
44DD000
|
stack
|
page read and write
|
||
7FF617EB7000
|
unkown
|
page readonly
|
||
1BC17000
|
heap
|
page read and write
|
||
2DC000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
8C9000
|
stack
|
page read and write
|
||
25893E40000
|
heap
|
page read and write
|
||
9F6000
|
unkown
|
page read and write
|
||
166A000
|
trusted library allocation
|
page execute and read and write
|
||
314F000
|
stack
|
page read and write
|
||
2614F5B1000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2614F60C000
|
heap
|
page read and write
|
||
10DE000
|
heap
|
page read and write
|
||
25891FF5000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
29FA000
|
heap
|
page read and write
|
||
97D000
|
unkown
|
page read and write
|
||
5BD1000
|
heap
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
220B76B1000
|
heap
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
220B7590000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page write copy
|
||
5296000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
3DD2000
|
trusted library allocation
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
88F000
|
stack
|
page read and write
|
||
2276000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
1BDE000
|
stack
|
page read and write
|
||
BFF000
|
unkown
|
page readonly
|
||
3020000
|
heap
|
page execute and read and write
|
||
1072000
|
heap
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
F53000
|
trusted library allocation
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
22AF000
|
trusted library allocation
|
page read and write
|
||
E5B000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
25892022000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
C61000
|
heap
|
page read and write
|
||
1662000
|
trusted library allocation
|
page read and write
|
||
77E000
|
unkown
|
page write copy
|
||
6AEB000
|
trusted library allocation
|
page read and write
|
||
1243000
|
trusted library allocation
|
page read and write
|
||
7FF848C53000
|
trusted library allocation
|
page read and write
|
||
5B7D000
|
stack
|
page read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
2614F535000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
FCD000
|
stack
|
page read and write
|
||
25891FEE000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
25892016000
|
heap
|
page read and write
|
||
1B0EC000
|
stack
|
page read and write
|
||
21C6000
|
trusted library allocation
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
6BF5000
|
trusted library allocation
|
page read and write
|
||
1372000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page write copy
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
2589200C000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
679000
|
unkown
|
page readonly
|
||
730000
|
heap
|
page read and write
|
||
43F1000
|
trusted library allocation
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
987000
|
unkown
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
D23000
|
heap
|
page read and write
|
||
7DF000
|
unkown
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
7FF617D11000
|
unkown
|
page execute read
|
||
10BF000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
1C4BE000
|
stack
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
1B8DE000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
FEC67FF000
|
stack
|
page read and write
|
||
108D000
|
heap
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
21C7000
|
trusted library allocation
|
page read and write
|
||
679000
|
unkown
|
page readonly
|
||
CD3000
|
trusted library allocation
|
page execute and read and write
|
||
28AE000
|
stack
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
1521000
|
heap
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
10D4000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
2293000
|
trusted library allocation
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
3279000
|
trusted library allocation
|
page read and write
|
||
1D839895000
|
heap
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
933E000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2285000
|
trusted library allocation
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
1D8398BC000
|
heap
|
page read and write
|
||
1E1F000
|
stack
|
page read and write
|
||
305A5FE000
|
stack
|
page read and write
|
||
220BDC00000
|
direct allocation
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
228B000
|
trusted library allocation
|
page read and write
|
||
1085000
|
trusted library allocation
|
page execute and read and write
|
||
220B7570000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
937E000
|
stack
|
page read and write
|
||
2589235C000
|
heap
|
page read and write
|
||
34C1000
|
trusted library allocation
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
3423000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
D53C000
|
heap
|
page read and write
|
||
3438000
|
trusted library allocation
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
C0A000
|
unkown
|
page readonly
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
7FF848C9C000
|
trusted library allocation
|
page execute and read and write
|
||
D15000
|
heap
|
page read and write
|
||
58B0000
|
heap
|
page read and write
|
||
299D000
|
stack
|
page read and write
|
||
11AF000
|
heap
|
page read and write
|
||
23D5000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
7FF848C54000
|
trusted library allocation
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
437000
|
remote allocation
|
page execute and read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
376F000
|
unkown
|
page read and write
|
||
7FF617F97000
|
unkown
|
page readonly
|
||
10FD000
|
heap
|
page read and write
|
||
1EA7000
|
trusted library allocation
|
page read and write
|
||
220B75D0000
|
direct allocation
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
345C000
|
stack
|
page read and write
|
||
1CD000
|
stack
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
2287000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
226F000
|
trusted library allocation
|
page read and write
|
||
3493000
|
trusted library allocation
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
1BC19000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
225A000
|
trusted library allocation
|
page read and write
|
||
34CC000
|
heap
|
page read and write
|
||
343B000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page execute and read and write
|
||
1239000
|
stack
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page execute read
|
||
34B0000
|
trusted library allocation
|
page read and write
|
||
619C000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
42E000
|
remote allocation
|
page execute and read and write
|
||
22A4000
|
trusted library allocation
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
1123000
|
heap
|
page read and write
|
||
3A70000
|
remote allocation
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
10B2000
|
heap
|
page read and write
|
||
52B6000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
1087000
|
trusted library allocation
|
page execute and read and write
|
||
4D7B000
|
trusted library allocation
|
page read and write
|
||
433000
|
unkown
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
2E27000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
183E000
|
stack
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
trusted library allocation
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
674000
|
unkown
|
page write copy
|
||
1674000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
135A000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
220B77E9000
|
heap
|
page read and write
|
||
C89000
|
heap
|
page read and write
|
||
D74D000
|
heap
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
21CC000
|
trusted library allocation
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
37A1000
|
trusted library allocation
|
page read and write
|
||
D41000
|
stack
|
page read and write
|
||
5F3000
|
unkown
|
page read and write
|
||
1172000
|
heap
|
page read and write
|
||
22AD000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6C40000
|
trusted library allocation
|
page execute and read and write
|
||
954000
|
trusted library allocation
|
page read and write
|
||
76D000
|
unkown
|
page readonly
|
||
A10000
|
heap
|
page read and write
|
||
1BA80000
|
heap
|
page read and write
|
||
34C7000
|
trusted library allocation
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
2283000
|
trusted library allocation
|
page read and write
|
||
3224000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
10CF000
|
heap
|
page read and write
|
||
CCD000
|
unkown
|
page readonly
|
||
1B7D0000
|
heap
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
7C02000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
305A6FE000
|
stack
|
page read and write
|
||
1DC1000
|
trusted library allocation
|
page read and write
|
||
30F3000
|
trusted library allocation
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1356000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
1324000
|
heap
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
197E000
|
stack
|
page read and write
|
||
220B780D000
|
heap
|
page read and write
|
||
220B7720000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D8398AB000
|
heap
|
page read and write
|
||
2299000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
21C3000
|
trusted library allocation
|
page read and write
|
||
2614F539000
|
heap
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
21CD000
|
trusted library allocation
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
F10000
|
remote allocation
|
page read and write
|
||
1093000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
3436000
|
trusted library allocation
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
63B0000
|
heap
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
7FF848C33000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
25892355000
|
heap
|
page read and write
|
||
5503000
|
heap
|
page execute and read and write
|
||
255E000
|
stack
|
page read and write
|
||
40B000
|
unkown
|
page write copy
|
||
1110000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
F10000
|
remote allocation
|
page read and write
|
||
2614F5C6000
|
heap
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
21FD4FF000
|
stack
|
page read and write
|
||
781000
|
unkown
|
page readonly
|
||
2FDE000
|
stack
|
page read and write
|
||
6765000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
2614F5A6000
|
heap
|
page read and write
|
||
2273000
|
trusted library allocation
|
page read and write
|
||
2282000
|
trusted library allocation
|
page read and write
|
||
333A000
|
trusted library allocation
|
page read and write
|
||
FEC6CFE000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
328D000
|
trusted library allocation
|
page read and write
|
||
6B2B000
|
trusted library allocation
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
306C000
|
stack
|
page read and write
|
||
1BABF000
|
stack
|
page read and write
|
||
2589201A000
|
heap
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
44F2000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
3289000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
1C62000
|
trusted library allocation
|
page read and write
|
||
2272000
|
trusted library allocation
|
page read and write
|
||
1D8398AB000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page readonly
|
||
1D839C0C000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
386F000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
34BD000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2E19000
|
heap
|
page read and write
|
||
21CC000
|
trusted library allocation
|
page read and write
|
||
52BD000
|
trusted library allocation
|
page read and write
|
||
3426000
|
trusted library allocation
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
1D83987B000
|
heap
|
page read and write
|
||
7FF848CE6000
|
trusted library allocation
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
231D000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
1B168000
|
heap
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
3DBF000
|
trusted library allocation
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
22A1000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
220B762C000
|
heap
|
page read and write
|
||
4141000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page readonly
|
||
105B000
|
heap
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page execute and read and write
|
||
5B8000
|
heap
|
page read and write
|
||
23DA000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
25892024000
|
heap
|
page read and write
|
||
220B7626000
|
heap
|
page read and write
|
||
2E19000
|
heap
|
page read and write
|
||
5BDD000
|
heap
|
page read and write
|
||
27A3000
|
trusted library allocation
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
1739000
|
heap
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
6B1A000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
3DB1000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
1E97000
|
trusted library allocation
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
116F000
|
stack
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
1D839889000
|
heap
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
220B76B4000
|
heap
|
page read and write
|
||
F14000
|
heap
|
page read and write
|
||
5890000
|
trusted library section
|
page readonly
|
||
29AE000
|
stack
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
21CB000
|
trusted library allocation
|
page read and write
|
||
1D83B390000
|
heap
|
page read and write
|
||
947F000
|
stack
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
220B75C0000
|
direct allocation
|
page read and write
|
||
2780000
|
trusted library allocation
|
page execute and read and write
|
||
14AE000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
There are 2273 hidden memdumps, click here to show them.