Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\Public\Details.au3
|
Unicode text, UTF-8 (with BOM) text, with very long lines (1266)
|
dropped
|
||
C:\Users\Public\InformationCheck.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\ProfileDetails.ps1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url
|
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >), ASCII
text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bv201eo.3bw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eamjnkh2.zwk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\WordGenius Technologies\G
|
ASCII text, with very long lines (1266)
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
|
||
C:\Users\Public\InformationCheck.exe
|
"C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url"
& echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\SwiftWrite.url" & exit
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js"
|
||
C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif
|
"C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://go.microsoft.co-
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://my.cloH
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://my.cloudme.com
|
unknown
|
||
https://my.cloudme.com/v1/ws2/:updatemake/:reality/reality.txt
|
83.140.241.4
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://my.cloudme.com
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 11 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
my.cloudme.com
|
83.140.241.4
|
||
nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
83.140.241.4
|
my.cloudme.com
|
Sweden
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
51E6000
|
heap
|
page read and write
|
||
4516000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2FE2000
|
heap
|
page read and write
|
||
529000
|
unkown
|
page readonly
|
||
2B50FBB0000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
4A7C000
|
heap
|
page read and write
|
||
2B511F60000
|
heap
|
page read and write
|
||
2B511ECE000
|
heap
|
page read and write
|
||
5E10000
|
heap
|
page read and write
|
||
2B50FE58000
|
heap
|
page read and write
|
||
FE9000
|
unkown
|
page readonly
|
||
2B511FB1000
|
heap
|
page read and write
|
||
603F000
|
stack
|
page read and write
|
||
7FF797908000
|
unkown
|
page readonly
|
||
448DBCD000
|
stack
|
page read and write
|
||
36C2000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
630F000
|
stack
|
page read and write
|
||
3F06000
|
heap
|
page read and write
|
||
2B50FE69000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B50FE67000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1C71C644000
|
trusted library allocation
|
page read and write
|
||
1C71A8DC000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
3E56000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
399E000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
1C71DEDB000
|
trusted library allocation
|
page read and write
|
||
1C72D840000
|
trusted library allocation
|
page read and write
|
||
3A55000
|
heap
|
page read and write
|
||
48E2000
|
heap
|
page read and write
|
||
4C92000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
2B51211F000
|
heap
|
page read and write
|
||
1C71A8AD000
|
heap
|
page read and write
|
||
2B511CF2000
|
heap
|
page read and write
|
||
1C71DC7E000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
4ED2000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
3546000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B50FDAE000
|
heap
|
page read and write
|
||
2B511F14000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
1C71C150000
|
trusted library allocation
|
page read and write
|
||
1C71A88F000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1C71DED7000
|
trusted library allocation
|
page read and write
|
||
2B50FCD6000
|
heap
|
page read and write
|
||
448CD78000
|
stack
|
page read and write
|
||
2B50FD37000
|
heap
|
page read and write
|
||
1A58000
|
heap
|
page read and write
|
||
F94000
|
heap
|
page read and write
|
||
122C7E80000
|
heap
|
page read and write
|
||
2B5120FA000
|
heap
|
page read and write
|
||
467E000
|
heap
|
page read and write
|
||
2B50FD25000
|
heap
|
page read and write
|
||
7FF797924000
|
unkown
|
page readonly
|
||
2B50FCF5000
|
heap
|
page read and write
|
||
4280000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
2B512066000
|
heap
|
page read and write
|
||
2B51226B000
|
heap
|
page read and write
|
||
1713000
|
heap
|
page read and write
|
||
1C71A840000
|
trusted library allocation
|
page read and write
|
||
2B50FBC0000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
368A000
|
heap
|
page read and write
|
||
2B5120FA000
|
heap
|
page read and write
|
||
122C7D97000
|
heap
|
page read and write
|
||
448D07E000
|
stack
|
page read and write
|
||
1C71C316000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
unkown
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
1C71C291000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
3588000
|
heap
|
page read and write
|
||
21F1EFF000
|
stack
|
page read and write
|
||
F21000
|
unkown
|
page execute read
|
||
5E11000
|
heap
|
page read and write
|
||
1C7349C0000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
2B50FF60000
|
heap
|
page read and write
|
||
4382000
|
heap
|
page read and write
|
||
177D000
|
heap
|
page read and write
|
||
2B5118D0000
|
heap
|
page read and write
|
||
3446000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
1C734747000
|
heap
|
page execute and read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B511EF0000
|
heap
|
page read and write
|
||
1C71A820000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
2B50FD8B000
|
heap
|
page read and write
|
||
4FA2000
|
heap
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
438C000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
122C7C70000
|
heap
|
page read and write
|
||
122C96F0000
|
heap
|
page read and write
|
||
4A72000
|
heap
|
page read and write
|
||
275D000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
50EE000
|
heap
|
page read and write
|
||
1C734A92000
|
heap
|
page read and write
|
||
3746000
|
heap
|
page read and write
|
||
2B50FE6D000
|
heap
|
page read and write
|
||
4CD4000
|
heap
|
page read and write
|
||
2B50FB78000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
2B50FDB5000
|
heap
|
page read and write
|
||
2B511CB0000
|
heap
|
page read and write
|
||
2B511DB1000
|
heap
|
page read and write
|
||
2B50FCFF000
|
heap
|
page read and write
|
||
4942000
|
heap
|
page read and write
|
||
1C72C58D000
|
trusted library allocation
|
page read and write
|
||
1C71A920000
|
heap
|
page read and write
|
||
4624000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
529000
|
unkown
|
page readonly
|
||
2B511DA2000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
37CA000
|
heap
|
page read and write
|
||
2B51210C000
|
heap
|
page read and write
|
||
2B5120E8000
|
heap
|
page read and write
|
||
487C000
|
heap
|
page read and write
|
||
2B50FF60000
|
heap
|
page read and write
|
||
1C71C646000
|
trusted library allocation
|
page read and write
|
||
2B50FB9E000
|
heap
|
page read and write
|
||
5082000
|
heap
|
page read and write
|
||
2B50FC75000
|
heap
|
page read and write
|
||
2B50FCD0000
|
heap
|
page read and write
|
||
2B51205D000
|
heap
|
page read and write
|
||
4077000
|
heap
|
page read and write
|
||
461000
|
unkown
|
page execute read
|
||
448CB7C000
|
stack
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B511E26000
|
heap
|
page read and write
|
||
4A79000
|
heap
|
page read and write
|
||
4262000
|
heap
|
page read and write
|
||
2B50FDB5000
|
heap
|
page read and write
|
||
122C7E11000
|
heap
|
page read and write
|
||
4BE6000
|
heap
|
page read and write
|
||
43D8000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
34C2000
|
heap
|
page read and write
|
||
2B511ECE000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B511D46000
|
heap
|
page read and write
|
||
2B511F95000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
40A5000
|
heap
|
page read and write
|
||
1C734740000
|
heap
|
page execute and read and write
|
||
2B50FF0E000
|
heap
|
page read and write
|
||
2B511E7A000
|
heap
|
page read and write
|
||
380C000
|
heap
|
page read and write
|
||
430C000
|
heap
|
page read and write
|
||
1C71D8B2000
|
trusted library allocation
|
page read and write
|
||
2B50FDB5000
|
heap
|
page read and write
|
||
2B50FE9D000
|
heap
|
page read and write
|
||
1C734A55000
|
heap
|
page read and write
|
||
2B511DA0000
|
heap
|
page read and write
|
||
FE4000
|
unkown
|
page write copy
|
||
1ADC000
|
heap
|
page read and write
|
||
448DC8E000
|
stack
|
page read and write
|
||
5802000
|
heap
|
page read and write
|
||
2B5129D3000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
51F4000
|
heap
|
page read and write
|
||
5C2D000
|
heap
|
page read and write
|
||
7FF797831000
|
unkown
|
page execute read
|
||
5E11000
|
heap
|
page read and write
|
||
2B511FF2000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
634E000
|
stack
|
page read and write
|
||
4916000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
21F22FF000
|
stack
|
page read and write
|
||
375A000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
2B50FE67000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1C71D8AE000
|
trusted library allocation
|
page read and write
|
||
1C71A92C000
|
heap
|
page read and write
|
||
4B36000
|
heap
|
page read and write
|
||
47C2000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B51205F000
|
heap
|
page read and write
|
||
2B511D35000
|
heap
|
page read and write
|
||
2B512094000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
471C000
|
heap
|
page read and write
|
||
4782000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
5979000
|
heap
|
page read and write
|
||
5809000
|
heap
|
page read and write
|
||
3A4B000
|
heap
|
page read and write
|
||
448CE79000
|
stack
|
page read and write
|
||
41B2000
|
heap
|
page read and write
|
||
42EA000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1C73480D000
|
heap
|
page read and write
|
||
1C72C2A0000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B51205F000
|
heap
|
page read and write
|
||
5129000
|
heap
|
page read and write
|
||
2B50FCD5000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
1C72C95E000
|
trusted library allocation
|
page read and write
|
||
2B50FD37000
|
heap
|
page read and write
|
||
40B5000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
448C73E000
|
stack
|
page read and write
|
||
5143000
|
heap
|
page read and write
|
||
4A05000
|
heap
|
page read and write
|
||
58EA000
|
heap
|
page read and write
|
||
4135000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
DDD000
|
stack
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B511F03000
|
heap
|
page read and write
|
||
4954000
|
heap
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
4934000
|
heap
|
page read and write
|
||
2B511FAE000
|
heap
|
page read and write
|
||
2B50FC75000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
6325000
|
heap
|
page read and write
|
||
2B51218C000
|
heap
|
page read and write
|
||
2B511F82000
|
heap
|
page read and write
|
||
4B92000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
19CA000
|
heap
|
page read and write
|
||
452A000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
2B511FAE000
|
heap
|
page read and write
|
||
2B50FD48000
|
heap
|
page read and write
|
||
49DC000
|
heap
|
page read and write
|
||
516000
|
unkown
|
page readonly
|
||
448DD8F000
|
stack
|
page read and write
|
||
2C9A000
|
heap
|
page read and write
|
||
2B50FDE4000
|
heap
|
page read and write
|
||
4274000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
C1E2DFE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
2B50FF0E000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
457E000
|
heap
|
page read and write
|
||
1C71A790000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B511E15000
|
heap
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
43D6000
|
heap
|
page read and write
|
||
C1E2DEF000
|
stack
|
page read and write
|
||
2B511FAE000
|
heap
|
page read and write
|
||
448C6B3000
|
stack
|
page read and write
|
||
3C56000
|
heap
|
page read and write
|
||
499A000
|
heap
|
page read and write
|
||
2B512160000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
2B511E7B000
|
heap
|
page read and write
|
||
446A000
|
heap
|
page read and write
|
||
1C71C63E000
|
trusted library allocation
|
page read and write
|
||
2B511DA0000
|
heap
|
page read and write
|
||
2B511DF2000
|
heap
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
5E11000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4A47000
|
heap
|
page read and write
|
||
7FF7978E5000
|
unkown
|
page readonly
|
||
2B5120FA000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B50FBA9000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
2B50FDF3000
|
heap
|
page read and write
|
||
37CD000
|
heap
|
page read and write
|
||
1C73479C000
|
heap
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
C1E2DCF000
|
stack
|
page read and write
|
||
41FA000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B511E8C000
|
heap
|
page read and write
|
||
7FF797908000
|
unkown
|
page readonly
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1C71DB34000
|
trusted library allocation
|
page read and write
|
||
2B50FD24000
|
heap
|
page read and write
|
||
1C71A88D000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
4ABB000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B512063000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2B511E8D000
|
heap
|
page read and write
|
||
2B50FE67000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
heap
|
page read and write
|
||
2B512160000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
2B51211E000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
448DC0E000
|
stack
|
page read and write
|
||
35CA000
|
heap
|
page read and write
|
||
2B50FE36000
|
heap
|
page read and write
|
||
2B50FBAF000
|
heap
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
2B50FCF4000
|
heap
|
page read and write
|
||
2B50FDF3000
|
heap
|
page read and write
|
||
4528000
|
heap
|
page read and write
|
||
58B6000
|
heap
|
page read and write
|
||
15FC000
|
stack
|
page read and write
|
||
4D98000
|
heap
|
page read and write
|
||
1C734A2C000
|
heap
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
2B5120FA000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B50FF64000
|
heap
|
page read and write
|
||
467A000
|
heap
|
page read and write
|
||
C1E35FE000
|
stack
|
page read and write
|
||
3A8A000
|
heap
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
428A000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
2B50FDA1000
|
heap
|
page read and write
|
||
2B512095000
|
heap
|
page read and write
|
||
44D4000
|
heap
|
page read and write
|
||
48C8000
|
heap
|
page read and write
|
||
1C71A893000
|
heap
|
page read and write
|
||
2B50FEAF000
|
heap
|
page read and write
|
||
2B50FD24000
|
heap
|
page read and write
|
||
C1E2DD8000
|
stack
|
page read and write
|
||
3BA4000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
43AE000
|
heap
|
page read and write
|
||
2B50FCF4000
|
heap
|
page read and write
|
||
1C72F640000
|
trusted library allocation
|
page read and write
|
||
2B511D96000
|
heap
|
page read and write
|
||
4D2E000
|
heap
|
page read and write
|
||
FD6000
|
unkown
|
page readonly
|
||
2B511E68000
|
heap
|
page read and write
|
||
1C71C631000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B512078000
|
heap
|
page read and write
|
||
2B50FDB5000
|
heap
|
page read and write
|
||
2B512078000
|
heap
|
page read and write
|
||
2B50FD75000
|
heap
|
page read and write
|
||
3C78000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
2B512061000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
7FF797830000
|
unkown
|
page readonly
|
||
429E000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
487A000
|
heap
|
page read and write
|
||
2B511F02000
|
heap
|
page read and write
|
||
15DD000
|
stack
|
page read and write
|
||
3E98000
|
heap
|
page read and write
|
||
448DB4E000
|
stack
|
page read and write
|
||
1C72C291000
|
trusted library allocation
|
page read and write
|
||
1C72E240000
|
trusted library allocation
|
page read and write
|
||
6287000
|
heap
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
4156000
|
heap
|
page read and write
|
||
4E86000
|
heap
|
page read and write
|
||
1C734A07000
|
heap
|
page read and write
|
||
1C71A850000
|
heap
|
page read and write
|
||
2B50FEB6000
|
heap
|
page read and write
|
||
7FF79791A000
|
unkown
|
page write copy
|
||
2B511FAE000
|
heap
|
page read and write
|
||
5899000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
524000
|
unkown
|
page write copy
|
||
520000
|
unkown
|
page write copy
|
||
4418000
|
heap
|
page read and write
|
||
1C72C304000
|
trusted library allocation
|
page read and write
|
||
3FFC000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
1C72FBA6000
|
trusted library allocation
|
page read and write
|
||
2B51216A000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
59AD000
|
heap
|
page read and write
|
||
2B511E7A000
|
heap
|
page read and write
|
||
7FF79791A000
|
unkown
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
370E000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
FD6000
|
unkown
|
page readonly
|
||
F04000
|
heap
|
page read and write
|
||
38FF000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B50FCF4000
|
heap
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
448CF7E000
|
stack
|
page read and write
|
||
448CEFA000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4ADA000
|
heap
|
page read and write
|
||
1C71D8D8000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
21F25F7000
|
stack
|
page read and write
|
||
4A0F000
|
heap
|
page read and write
|
||
4DDA000
|
heap
|
page read and write
|
||
43C4000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
2B511D84000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
21F26FB000
|
stack
|
page read and write
|
||
3EB4000
|
heap
|
page read and write
|
||
44E8000
|
heap
|
page read and write
|
||
2B50FE37000
|
heap
|
page read and write
|
||
21F24FE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B50FF4F000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
3966000
|
heap
|
page read and write
|
||
1C71DB09000
|
trusted library allocation
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
2B50FD3C000
|
heap
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
461A000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
2B50FD75000
|
heap
|
page read and write
|
||
16E8000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
1C73479E000
|
heap
|
page read and write
|
||
2B511E26000
|
heap
|
page read and write
|
||
2B512004000
|
heap
|
page read and write
|
||
2B5118E9000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
2B50FF20000
|
heap
|
page read and write
|
||
1C71C190000
|
trusted library allocation
|
page read and write
|
||
40BA000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1C71D8F2000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
448DD0D000
|
stack
|
page read and write
|
||
3CDA000
|
heap
|
page read and write
|
||
4058000
|
heap
|
page read and write
|
||
1C71C100000
|
trusted library allocation
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
3D1C000
|
heap
|
page read and write
|
||
1C734750000
|
heap
|
page read and write
|
||
2B5120FA000
|
heap
|
page read and write
|
||
4A19000
|
heap
|
page read and write
|
||
2B511E7A000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
7FF797924000
|
unkown
|
page readonly
|
||
49EE000
|
heap
|
page read and write
|
||
4928000
|
heap
|
page read and write
|
||
4816000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
448CCFD000
|
stack
|
page read and write
|
||
3BD2000
|
heap
|
page read and write
|
||
2B50FD77000
|
heap
|
page read and write
|
||
38BD000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
7DF49B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
4BD4000
|
heap
|
page read and write
|
||
2B50FD11000
|
heap
|
page read and write
|
||
2B50FBA1000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
580A000
|
heap
|
page read and write
|
||
42C2000
|
heap
|
page read and write
|
||
1C71C285000
|
heap
|
page read and write
|
||
674F000
|
stack
|
page read and write
|
||
1C71C250000
|
heap
|
page read and write
|
||
2B512067000
|
heap
|
page read and write
|
||
1C71A825000
|
heap
|
page read and write
|
||
36CC000
|
heap
|
page read and write
|
||
2B50FBA0000
|
heap
|
page read and write
|
||
21F21FF000
|
stack
|
page read and write
|
||
2B512004000
|
heap
|
page read and write
|
||
7FF7978E5000
|
unkown
|
page readonly
|
||
F04000
|
heap
|
page read and write
|
||
3EAA000
|
heap
|
page read and write
|
||
2B511CF2000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
33C2000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
F04000
|
heap
|
page read and write
|
||
7FF797830000
|
unkown
|
page readonly
|
||
2B512083000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
1D60000
|
heap
|
page read and write
|
||
1C734D60000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
4A98000
|
heap
|
page read and write
|
||
427E000
|
heap
|
page read and write
|
||
1C71C110000
|
heap
|
page readonly
|
||
21F23FB000
|
stack
|
page read and write
|
||
2B50FD24000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
2B50FCD9000
|
heap
|
page read and write
|
||
7FF79791E000
|
unkown
|
page write copy
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
3C14000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
3E14000
|
heap
|
page read and write
|
||
2B511F57000
|
heap
|
page read and write
|
||
3C98000
|
heap
|
page read and write
|
||
1C71D887000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
21F1DFF000
|
stack
|
page read and write
|
||
4FEC000
|
heap
|
page read and write
|
||
599F000
|
heap
|
page read and write
|
||
3C26000
|
heap
|
page read and write
|
||
3788000
|
heap
|
page read and write
|
||
448D0FB000
|
stack
|
page read and write
|
||
2B50FE7E000
|
heap
|
page read and write
|
||
435E000
|
heap
|
page read and write
|
||
1C71D8B6000
|
trusted library allocation
|
page read and write
|
||
1C7349D4000
|
heap
|
page read and write
|
||
448DE0B000
|
stack
|
page read and write
|
||
4111000
|
heap
|
page read and write
|
||
5AB4000
|
heap
|
page read and write
|
||
360C000
|
heap
|
page read and write
|
||
448CFFE000
|
stack
|
page read and write
|
||
41C8000
|
heap
|
page read and write
|
||
2B50FF29000
|
heap
|
page read and write
|
||
448C7FE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
3D92000
|
heap
|
page read and write
|
||
1C71A897000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B512061000
|
heap
|
page read and write
|
||
4AF4000
|
heap
|
page read and write
|
||
122C8075000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B50FF4E000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
49DB000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B512082000
|
heap
|
page read and write
|
||
2B511D72000
|
heap
|
page read and write
|
||
122C7E60000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
2B511D34000
|
heap
|
page read and write
|
||
1C7348E0000
|
heap
|
page read and write
|
||
1C71C120000
|
trusted library allocation
|
page read and write
|
||
3E9B000
|
heap
|
page read and write
|
||
48D4000
|
heap
|
page read and write
|
||
122C8070000
|
heap
|
page read and write
|
||
2B510120000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
448DE8C000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
7FF797831000
|
unkown
|
page execute read
|
||
2B511D96000
|
heap
|
page read and write
|
||
4872000
|
heap
|
page read and write
|
||
2B511EDF000
|
heap
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
5E11000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
1C71A7B0000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
4170000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
1C71A8D8000
|
heap
|
page read and write
|
||
502E000
|
heap
|
page read and write
|
||
1C71CD74000
|
trusted library allocation
|
page read and write
|
||
2B50FD5B000
|
heap
|
page read and write
|
||
45C4000
|
heap
|
page read and write
|
||
3F60000
|
heap
|
page read and write
|
||
46CC000
|
heap
|
page read and write
|
||
4E34000
|
heap
|
page read and write
|
||
12FE000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
44AA000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
516000
|
unkown
|
page readonly
|
||
448CBFE000
|
stack
|
page read and write
|
||
2B511F94000
|
heap
|
page read and write
|
||
2B512A0C000
|
heap
|
page read and write
|
||
2B5119D4000
|
heap
|
page read and write
|
||
21F1CFA000
|
stack
|
page read and write
|
||
2B50FE25000
|
heap
|
page read and write
|
||
1C71D8A0000
|
trusted library allocation
|
page read and write
|
||
2B512025000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
2B50FB40000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
21F20FF000
|
stack
|
page read and write
|
||
497E000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B5119D8000
|
heap
|
page read and write
|
||
2B50FEB6000
|
heap
|
page read and write
|
||
456A000
|
heap
|
page read and write
|
||
2B511E69000
|
heap
|
page read and write
|
||
3D90000
|
heap
|
page read and write
|
||
1C73429B000
|
heap
|
page read and write
|
||
1C734A02000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
F21000
|
unkown
|
page execute read
|
||
461000
|
unkown
|
page execute read
|
||
2B512254000
|
heap
|
page read and write
|
||
2B50FDAA000
|
heap
|
page read and write
|
||
4104000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
1C71A6B0000
|
heap
|
page read and write
|
||
2B511E04000
|
heap
|
page read and write
|
||
448CA7F000
|
stack
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B50FF64000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
3704000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
1C72EC40000
|
trusted library allocation
|
page read and write
|
||
2B5118D4000
|
heap
|
page read and write
|
||
7FFD9B90A000
|
trusted library allocation
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
4FEF000
|
heap
|
page read and write
|
||
448CC7D000
|
stack
|
page read and write
|
||
3FBA000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
5701000
|
heap
|
page read and write
|
||
1C734835000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B51232E000
|
heap
|
page read and write
|
||
C1E31FE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
481E000
|
heap
|
page read and write
|
||
1C73481A000
|
heap
|
page read and write
|
||
D0A000
|
stack
|
page read and write
|
||
44B4000
|
heap
|
page read and write
|
||
2B50FBAF000
|
heap
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
448C7BE000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4190000
|
heap
|
page read and write
|
||
122C9B30000
|
heap
|
page read and write
|
||
122C7DD0000
|
heap
|
page read and write
|
||
2B50FD1B000
|
heap
|
page read and write
|
||
448D17B000
|
stack
|
page read and write
|
||
2B511F60000
|
heap
|
page read and write
|
||
2B511FB0000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B511F71000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B512191000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
2B50FC75000
|
heap
|
page read and write
|
||
1C71D11F000
|
trusted library allocation
|
page read and write
|
||
4828000
|
heap
|
page read and write
|
||
2B511E26000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B50FB99000
|
heap
|
page read and write
|
||
2B50FD55000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
3DFE000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
3EDA000
|
heap
|
page read and write
|
||
2B511F14000
|
heap
|
page read and write
|
||
2B511F56000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
4F2C000
|
heap
|
page read and write
|
||
2B511870000
|
heap
|
page read and write
|
||
2B512063000
|
heap
|
page read and write
|
||
3E58000
|
heap
|
page read and write
|
||
1C71DB8F000
|
trusted library allocation
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
51CB000
|
heap
|
page read and write
|
||
2E8F000
|
unkown
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
41BE000
|
heap
|
page read and write
|
||
45DE000
|
heap
|
page read and write
|
||
2B50FD90000
|
heap
|
page read and write
|
||
1C71D88F000
|
trusted library allocation
|
page read and write
|
||
47D4000
|
heap
|
page read and write
|
||
1C72CE40000
|
trusted library allocation
|
page read and write
|
||
1C71C1F0000
|
heap
|
page execute and read and write
|
||
1A4E000
|
heap
|
page read and write
|
||
2B50FD24000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
2B51205D000
|
heap
|
page read and write
|
||
2B50FDF4000
|
heap
|
page read and write
|
||
1C7349DC000
|
heap
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
5C9E000
|
heap
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page write copy
|
||
2B511CB1000
|
heap
|
page read and write
|
||
4574000
|
heap
|
page read and write
|
||
3B90000
|
heap
|
page read and write
|
||
506C000
|
heap
|
page read and write
|
||
FE9000
|
unkown
|
page readonly
|
||
2B511D73000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
1C71C4B7000
|
trusted library allocation
|
page read and write
|
||
2B50FBB0000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B511D58000
|
heap
|
page read and write
|
||
2B50FD17000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B511DA0000
|
heap
|
page read and write
|
||
1C7346E0000
|
heap
|
page execute and read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
2B50FF64000
|
heap
|
page read and write
|
||
1C71C623000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
heap
|
page read and write
|
||
2B510125000
|
heap
|
page read and write
|
||
47D4000
|
heap
|
page read and write
|
||
2B50FEF8000
|
heap
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
2B511FAE000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
58C4000
|
heap
|
page read and write
|
||
2B50FCD4000
|
heap
|
page read and write
|
||
2B50FDD6000
|
heap
|
page read and write
|
||
1C71C280000
|
heap
|
page read and write
|
||
1C71A7F0000
|
heap
|
page read and write
|
||
2B511DB0000
|
heap
|
page read and write
|
||
1C71C153000
|
trusted library allocation
|
page read and write
|
||
2B512320000
|
heap
|
page read and write
|
||
2B512191000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
1C71DE12000
|
trusted library allocation
|
page read and write
|
||
2B511F14000
|
heap
|
page read and write
|
||
4886000
|
heap
|
page read and write
|
||
2B50FA40000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
2B50FB20000
|
heap
|
page read and write
|
||
50AC000
|
heap
|
page read and write
|
||
122C807C000
|
heap
|
page read and write
|
||
4216000
|
heap
|
page read and write
|
||
C1E2DBF000
|
stack
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
2B50FEFD000
|
heap
|
page read and write
|
||
122C7D60000
|
heap
|
page read and write
|
||
4ACC000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
2B50FD32000
|
heap
|
page read and write
|
||
2B512246000
|
heap
|
page read and write
|
||
4716000
|
heap
|
page read and write
|
||
1C7349D0000
|
heap
|
page read and write
|
||
122C7E37000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1A0C000
|
heap
|
page read and write
|
||
2B5120D6000
|
heap
|
page read and write
|
||
2B511F02000
|
heap
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
51F1000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
364E000
|
heap
|
page read and write
|
||
1C71A870000
|
heap
|
page read and write
|
||
2B511EF0000
|
heap
|
page read and write
|
||
5E11000
|
heap
|
page read and write
|
||
2B50FBAF000
|
heap
|
page read and write
|
||
2B50FDB5000
|
heap
|
page read and write
|
||
4016000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
448CAFE000
|
stack
|
page read and write
|
||
1C734A4D000
|
heap
|
page read and write
|
||
5169000
|
heap
|
page read and write
|
||
2B50FB70000
|
heap
|
page read and write
|
||
2B5126FF000
|
heap
|
page read and write
|
||
2B5126F9000
|
heap
|
page read and write
|
||
2B511F14000
|
heap
|
page read and write
|
||
46CA000
|
heap
|
page read and write
|
||
2B50FD02000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
3DD2000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
3D5E000
|
heap
|
page read and write
|
||
2B50FEF9000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2B50FD7A000
|
heap
|
page read and write
|
||
448CDF6000
|
stack
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
6DA000
|
stack
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
There are 834 hidden memdumps, click here to show them.