Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rHACNp6WFk.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Programs\My Program\is-2T33C.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\is-FGFQ0.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\is-GUSOD.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\python-3.13.0-amd64.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-U0C1K.tmp\rHACNp6WFk.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ttgtggt.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\My Program\unins000.dat
|
InnoSetup Log My Program {B61D3B6E-7045-4057-9E07-2D934A8C359C}, version 0x418, 2214 bytes, 965969\37\user\37, C:\Users\user\AppData\Local\Programs\My
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-3O9NM.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\My Program.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Tue Nov 12 12:56:46 2024, mtime=Tue Nov 12 12:56:46 2024, atime=Sun Nov 10 04:07:02 2024, length=346112, window=hide
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rHACNp6WFk.exe
|
"C:\Users\user\Desktop\rHACNp6WFk.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-U0C1K.tmp\rHACNp6WFk.tmp
|
"C:\Users\user\AppData\Local\Temp\is-U0C1K.tmp\rHACNp6WFk.tmp" /SL5="$10436,29074250,797184,C:\Users\user\Desktop\rHACNp6WFk.exe"
|
||
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe
|
"C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://appsyndication.org/2006/appsynapplicationc:
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
|
unknown
|
||
http://tempuri.org/example/Field1Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/sc
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://www.github.com/
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
https://www.github.com/.https://www.github.com/.https://www.github.com/
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
||
http://tempuri.org/example/Field1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
|
unknown
|
||
http://tempuri.org/example/Field2
|
unknown
|
||
http://tempuri.org/example/Field3
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/06/addressingex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.github.com/a
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/example/Field3Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
4.251.123.83:6677
|
|||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
4.251.123.83
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\.exe\OpenWithProgids
|
File.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER_Classes\File.exe
|
NULL
|
||
HKEY_CURRENT_USER_Classes\File.exe\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\File.exe\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Applications\ttgtggt.exe\SupportedTypes
|
.myp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: Setup Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: App Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: Icon Group
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: User
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Inno Setup: Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
URLInfoAbout
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
HelpLink
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
URLUpdateInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
InstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
MajorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
MinorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
VersionMajor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
VersionMinor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
There are 25 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
102000
|
unkown
|
page readonly
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
2BA6000
|
trusted library allocation
|
page read and write
|
||
F7D000
|
direct allocation
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
12713000
|
trusted library allocation
|
page read and write
|
||
7FFB4A100000
|
trusted library allocation
|
page read and write
|
||
1B9BF000
|
heap
|
page read and write
|
||
12DD5000
|
trusted library allocation
|
page read and write
|
||
128F1000
|
trusted library allocation
|
page read and write
|
||
B62000
|
unkown
|
page read and write
|
||
2A6A000
|
trusted library allocation
|
page read and write
|
||
12CD5000
|
trusted library allocation
|
page read and write
|
||
282F000
|
trusted library allocation
|
page read and write
|
||
1BA9A000
|
heap
|
page read and write
|
||
7FFB4A1F0000
|
trusted library allocation
|
page read and write
|
||
7FFB49EFB000
|
trusted library allocation
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFB4A300000
|
trusted library allocation
|
page read and write
|
||
1B9FD000
|
heap
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
1293C000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1AE23000
|
heap
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
12CD0000
|
trusted library allocation
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
1275D000
|
trusted library allocation
|
page read and write
|
||
1B5FA000
|
heap
|
page read and write
|
||
2A55000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
C2F000
|
heap
|
page read and write
|
||
FEC000
|
direct allocation
|
page read and write
|
||
2CEF000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
1B59C000
|
heap
|
page read and write
|
||
3920000
|
direct allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1297D000
|
trusted library allocation
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
1273A000
|
trusted library allocation
|
page read and write
|
||
7FFB4A367000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
1278A000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
2D1F000
|
trusted library allocation
|
page read and write
|
||
7FFB4A31F000
|
trusted library allocation
|
page read and write
|
||
1BA55000
|
heap
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
1290A000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
direct allocation
|
page read and write
|
||
580000
|
trusted library allocation
|
page read and write
|
||
7FFB4A1A0000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
direct allocation
|
page read and write
|
||
FF3000
|
direct allocation
|
page read and write
|
||
7FFB4A304000
|
trusted library allocation
|
page read and write
|
||
2A4A000
|
trusted library allocation
|
page read and write
|
||
7FFB4A310000
|
trusted library allocation
|
page read and write
|
||
29BA000
|
trusted library allocation
|
page read and write
|
||
29C7000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
C1C000
|
heap
|
page read and write
|
||
12CBD000
|
trusted library allocation
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page write copy
|
||
3B8E000
|
stack
|
page read and write
|
||
126D2000
|
trusted library allocation
|
page read and write
|
||
278A000
|
direct allocation
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
1B9E8000
|
heap
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
7FFB4A341000
|
trusted library allocation
|
page read and write
|
||
3C61000
|
heap
|
page read and write
|
||
1274A000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1BA8A000
|
heap
|
page read and write
|
||
1B999000
|
heap
|
page read and write
|
||
C4F000
|
heap
|
page read and write
|
||
1B1EE000
|
stack
|
page read and write
|
||
7FFB4A0A0000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
7FFB4A290000
|
trusted library allocation
|
page read and write
|
||
1BB28000
|
heap
|
page read and write
|
||
7FFB49FF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A2B0000
|
trusted library allocation
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
trusted library allocation
|
page read and write
|
||
2A57000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
trusted library allocation
|
page read and write
|
||
7FFB4A376000
|
trusted library allocation
|
page read and write
|
||
378D000
|
direct allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
12CC2000
|
trusted library allocation
|
page read and write
|
||
7FFB4A3F0000
|
trusted library allocation
|
page read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
1C2A0000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
27C5000
|
direct allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2B09000
|
trusted library allocation
|
page read and write
|
||
2A8A000
|
trusted library allocation
|
page read and write
|
||
55E000
|
unkown
|
page write copy
|
||
1BA1F000
|
heap
|
page read and write
|
||
3A5F000
|
direct allocation
|
page read and write
|
||
12793000
|
trusted library allocation
|
page read and write
|
||
2799000
|
direct allocation
|
page read and write
|
||
12CAC000
|
trusted library allocation
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
12800000
|
trusted library allocation
|
page read and write
|
||
264D000
|
trusted library allocation
|
page read and write
|
||
7FFB4A351000
|
trusted library allocation
|
page read and write
|
||
2862000
|
trusted library allocation
|
page read and write
|
||
7FF4EC420000
|
trusted library allocation
|
page execute and read and write
|
||
1AFDE000
|
stack
|
page read and write
|
||
126C5000
|
trusted library allocation
|
page read and write
|
||
12940000
|
trusted library allocation
|
page read and write
|
||
2BD6000
|
trusted library allocation
|
page read and write
|
||
2C04000
|
trusted library allocation
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
12942000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page execute and read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
7FFB4A200000
|
trusted library allocation
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
7FFB4A2D0000
|
trusted library allocation
|
page read and write
|
||
27B5000
|
direct allocation
|
page read and write
|
||
1B9C4000
|
heap
|
page read and write
|
||
125C1000
|
trusted library allocation
|
page read and write
|
||
29A7000
|
trusted library allocation
|
page read and write
|
||
1A5D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4A1F5000
|
trusted library allocation
|
page read and write
|
||
2C15000
|
trusted library allocation
|
page read and write
|
||
128FA000
|
trusted library allocation
|
page read and write
|
||
283A000
|
direct allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
277C000
|
direct allocation
|
page read and write
|
||
2CB3000
|
heap
|
page read and write
|
||
12704000
|
trusted library allocation
|
page read and write
|
||
3A6D000
|
direct allocation
|
page read and write
|
||
3C5C000
|
heap
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write
|
||
128FF000
|
trusted library allocation
|
page read and write
|
||
2738000
|
direct allocation
|
page read and write
|
||
2D57000
|
trusted library allocation
|
page read and write
|
||
128CA000
|
trusted library allocation
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
2BF7000
|
trusted library allocation
|
page read and write
|
||
7FFB49F8C000
|
trusted library allocation
|
page execute and read and write
|
||
FA4000
|
direct allocation
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
7FFB4A1B6000
|
trusted library allocation
|
page read and write
|
||
F9B000
|
direct allocation
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
27A7000
|
direct allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
2848000
|
direct allocation
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
FCF000
|
direct allocation
|
page read and write
|
||
2DB2000
|
trusted library allocation
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
EFA000
|
direct allocation
|
page read and write
|
||
128CF000
|
trusted library allocation
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
2D1D000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
direct allocation
|
page read and write
|
||
282D000
|
trusted library allocation
|
page read and write
|
||
1274D000
|
trusted library allocation
|
page read and write
|
||
2D6C000
|
trusted library allocation
|
page read and write
|
||
1294B000
|
trusted library allocation
|
page read and write
|
||
1B94B000
|
stack
|
page read and write
|
||
7FFB49ED3000
|
trusted library allocation
|
page execute and read and write
|
||
FC8000
|
direct allocation
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
126FF000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
trusted library allocation
|
page read and write
|
||
55E000
|
unkown
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7FFB4A1E0000
|
trusted library allocation
|
page read and write
|
||
29CB000
|
trusted library allocation
|
page read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
1BA78000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
126C2000
|
trusted library allocation
|
page read and write
|
||
2822000
|
trusted library allocation
|
page read and write
|
||
F59000
|
direct allocation
|
page read and write
|
||
7FFB4A323000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
1BA64000
|
heap
|
page read and write
|
||
128F7000
|
trusted library allocation
|
page read and write
|
||
1AFE0000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2CF2000
|
trusted library allocation
|
page read and write
|
||
3AA7000
|
direct allocation
|
page read and write
|
||
7FFB4A3C0000
|
trusted library allocation
|
page read and write
|
||
2808000
|
direct allocation
|
page read and write
|
||
1BA3C000
|
heap
|
page read and write
|
||
F94000
|
direct allocation
|
page read and write
|
||
125CD000
|
trusted library allocation
|
page read and write
|
||
3D20000
|
heap
|
page read and write
|
||
1BABE000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
3D21000
|
heap
|
page read and write
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
128C1000
|
trusted library allocation
|
page read and write
|
||
29BE000
|
trusted library allocation
|
page read and write
|
||
2B8D000
|
trusted library allocation
|
page read and write
|
||
128C7000
|
trusted library allocation
|
page read and write
|
||
29BC000
|
trusted library allocation
|
page read and write
|
||
1BA30000
|
heap
|
page read and write
|
||
7FFB4A1D0000
|
trusted library allocation
|
page read and write
|
||
2D5B000
|
trusted library allocation
|
page read and write
|
||
2B5C000
|
trusted library allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
2DC9000
|
trusted library allocation
|
page read and write
|
||
C93000
|
heap
|
page read and write
|
||
7FFB49EF4000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
C36000
|
heap
|
page read and write
|
||
4F4000
|
stack
|
page read and write
|
||
2C0F000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
trusted library allocation
|
page read and write
|
||
1BA67000
|
heap
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
2CED000
|
trusted library allocation
|
page read and write
|
||
12937000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2BA2000
|
trusted library allocation
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
1B536000
|
heap
|
page read and write
|
||
128DA000
|
trusted library allocation
|
page read and write
|
||
7FFB4A0D2000
|
trusted library allocation
|
page read and write
|
||
2835000
|
trusted library allocation
|
page read and write
|
||
1BA34000
|
heap
|
page read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
trusted library allocation
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
12798000
|
trusted library allocation
|
page read and write
|
||
1C7DB000
|
heap
|
page read and write
|
||
1B967000
|
heap
|
page read and write
|
||
126B9000
|
trusted library allocation
|
page read and write
|
||
1B597000
|
heap
|
page read and write
|
||
7FFB4A120000
|
trusted library allocation
|
page read and write
|
||
12787000
|
trusted library allocation
|
page read and write
|
||
C31000
|
heap
|
page read and write
|
||
27A0000
|
direct allocation
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
BF1000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
F2C000
|
direct allocation
|
page read and write
|
||
2D6A000
|
trusted library allocation
|
page read and write
|
||
1B561000
|
heap
|
page read and write
|
||
1BA5F000
|
heap
|
page read and write
|
||
1CC60000
|
heap
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
1CCA2000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
27D4000
|
direct allocation
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
12734000
|
trusted library allocation
|
page read and write
|
||
7FFB4A3E0000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
direct allocation
|
page read and write
|
||
3C8C000
|
heap
|
page read and write
|
||
2CBE000
|
trusted library allocation
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write
|
||
1C7D1000
|
heap
|
page read and write
|
||
2AC2000
|
trusted library allocation
|
page read and write
|
||
3AB7000
|
direct allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
1C2AC000
|
heap
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
12986000
|
trusted library allocation
|
page read and write
|
||
1279E000
|
trusted library allocation
|
page read and write
|
||
3C6C000
|
heap
|
page read and write
|
||
1B950000
|
heap
|
page read and write
|
||
12CB3000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
C36000
|
heap
|
page read and write
|
||
2A9F000
|
trusted library allocation
|
page read and write
|
||
1B61C000
|
heap
|
page read and write
|
||
7FFB4A3B0000
|
trusted library allocation
|
page read and write
|
||
3C6C000
|
heap
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
12CC8000
|
trusted library allocation
|
page read and write
|
||
FE4000
|
direct allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
1BA41000
|
heap
|
page read and write
|
||
2841000
|
direct allocation
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
2833000
|
direct allocation
|
page read and write
|
||
2844000
|
trusted library allocation
|
page read and write
|
||
7FFB4A2E0000
|
trusted library allocation
|
page read and write
|
||
125DA000
|
trusted library allocation
|
page read and write
|
||
12790000
|
trusted library allocation
|
page read and write
|
||
2B23000
|
trusted library allocation
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
2A8C000
|
trusted library allocation
|
page read and write
|
||
F4D000
|
direct allocation
|
page read and write
|
||
1B9BB000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
7FFB4A080000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
7FFB4A3D0000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
126FB000
|
trusted library allocation
|
page read and write
|
||
1BAC9000
|
heap
|
page read and write
|
||
2BB3000
|
heap
|
page read and write
|
||
7FFB4A2C0000
|
trusted library allocation
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
BED000
|
heap
|
page read and write
|
||
2A39000
|
trusted library allocation
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
126A9000
|
trusted library allocation
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
2DC7000
|
trusted library allocation
|
page read and write
|
||
2DC3000
|
trusted library allocation
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
12CB9000
|
trusted library allocation
|
page read and write
|
||
7F870000
|
direct allocation
|
page read and write
|
||
280F000
|
direct allocation
|
page read and write
|
||
3C61000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2AE7000
|
trusted library allocation
|
page read and write
|
||
7FFB4A0E5000
|
trusted library allocation
|
page read and write
|
||
2C6D000
|
trusted library allocation
|
page read and write
|
||
12905000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
F6B000
|
direct allocation
|
page read and write
|
||
3C79000
|
heap
|
page read and write
|
||
2A48000
|
trusted library allocation
|
page read and write
|
||
126EE000
|
trusted library allocation
|
page read and write
|
||
2B25000
|
trusted library allocation
|
page read and write
|
||
1B500000
|
heap
|
page execute and read and write
|
||
1C1CD000
|
stack
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
2D08000
|
trusted library allocation
|
page read and write
|
||
7FFB4A170000
|
trusted library allocation
|
page read and write
|
||
7FFB4A130000
|
trusted library allocation
|
page read and write
|
||
1B53A000
|
heap
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
BC0000
|
direct allocation
|
page execute and read and write
|
||
540000
|
heap
|
page read and write
|
||
1B3EB000
|
stack
|
page read and write
|
||
2D39000
|
trusted library allocation
|
page read and write
|
||
12995000
|
trusted library allocation
|
page read and write
|
||
7FFB4A180000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
12796000
|
trusted library allocation
|
page read and write
|
||
B5B000
|
unkown
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
C37000
|
heap
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
2C9C000
|
trusted library allocation
|
page read and write
|
||
7FFB4A150000
|
trusted library allocation
|
page read and write
|
||
2C7A000
|
trusted library allocation
|
page read and write
|
||
2D0D000
|
trusted library allocation
|
page read and write
|
||
B65000
|
unkown
|
page write copy
|
||
2BB0000
|
heap
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
3C80000
|
heap
|
page read and write
|
||
7FFB49F80000
|
trusted library allocation
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
1B99B000
|
heap
|
page read and write
|
||
F76000
|
direct allocation
|
page read and write
|
||
128EE000
|
trusted library allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
7FFB4A370000
|
trusted library allocation
|
page read and write
|
||
128B1000
|
trusted library allocation
|
page read and write
|
||
7FFB4A390000
|
trusted library allocation
|
page read and write
|
||
276D000
|
direct allocation
|
page read and write
|
||
27DB000
|
direct allocation
|
page read and write
|
||
12982000
|
trusted library allocation
|
page read and write
|
||
F84000
|
direct allocation
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
2BE6000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
129B2000
|
trusted library allocation
|
page read and write
|
||
1008000
|
direct allocation
|
page read and write
|
||
F17000
|
direct allocation
|
page read and write
|
||
7FFB4A388000
|
trusted library allocation
|
page read and write
|
||
B59000
|
unkown
|
page read and write
|
||
7FFB4A3A0000
|
trusted library allocation
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
7FFB49EE3000
|
trusted library allocation
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
7FFB4A378000
|
trusted library allocation
|
page read and write
|
||
126BF000
|
trusted library allocation
|
page read and write
|
||
126F5000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
direct allocation
|
page read and write
|
||
284D000
|
trusted library allocation
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
127A3000
|
trusted library allocation
|
page read and write
|
||
7FFB4A344000
|
trusted library allocation
|
page read and write
|
||
7FFB49EED000
|
trusted library allocation
|
page execute and read and write
|
||
A3E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
5C8000
|
unkown
|
page readonly
|
||
C29000
|
heap
|
page read and write
|
||
2A4C000
|
trusted library allocation
|
page read and write
|
||
7FFB49EDD000
|
trusted library allocation
|
page execute and read and write
|
||
2783000
|
direct allocation
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
7FFB4A16F000
|
trusted library allocation
|
page read and write
|
||
23DF000
|
stack
|
page read and write
|
||
1B55A000
|
heap
|
page read and write
|
||
2423000
|
heap
|
page read and write
|
||
7FFB4A110000
|
trusted library allocation
|
page read and write
|
||
12620000
|
trusted library allocation
|
page read and write
|
||
2AE9000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
B67000
|
unkown
|
page readonly
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
7F88B000
|
direct allocation
|
page read and write
|
||
27E2000
|
direct allocation
|
page read and write
|
||
2842000
|
trusted library allocation
|
page read and write
|
||
2DD2000
|
trusted library allocation
|
page read and write
|
||
1AA1C000
|
stack
|
page read and write
|
||
12758000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
7FFB4A380000
|
trusted library allocation
|
page read and write
|
||
2B1000
|
unkown
|
page execute read
|
||
2824000
|
direct allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
1296C000
|
trusted library allocation
|
page read and write
|
||
12744000
|
trusted library allocation
|
page read and write
|
||
BF9000
|
heap
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
FB9000
|
direct allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
12780000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
F3B000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
7FFB4A140000
|
trusted library allocation
|
page execute and read and write
|
||
1B530000
|
heap
|
page read and write
|
||
7FFB4A346000
|
trusted library allocation
|
page read and write
|
||
56D000
|
unkown
|
page read and write
|
||
2D3B000
|
trusted library allocation
|
page read and write
|
||
2AF6000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
2758000
|
direct allocation
|
page read and write
|
||
7FFB4A2FD000
|
trusted library allocation
|
page read and write
|
||
1B58B000
|
heap
|
page read and write
|
||
3C21000
|
heap
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
1294F000
|
trusted library allocation
|
page read and write
|
||
EDB000
|
direct allocation
|
page read and write
|
||
3C61000
|
heap
|
page read and write
|
||
1BCCC000
|
stack
|
page read and write
|
||
29A9000
|
trusted library allocation
|
page read and write
|
||
F60000
|
direct allocation
|
page read and write
|
||
126AF000
|
trusted library allocation
|
page read and write
|
||
1277A000
|
trusted library allocation
|
page read and write
|
||
12990000
|
trusted library allocation
|
page read and write
|
||
2A44000
|
trusted library allocation
|
page read and write
|
||
12933000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
128E1000
|
trusted library allocation
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
2D2A000
|
trusted library allocation
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
125C8000
|
trusted library allocation
|
page read and write
|
||
1BA39000
|
heap
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
2791000
|
direct allocation
|
page read and write
|
||
128B7000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
7FFB4A1C0000
|
trusted library allocation
|
page execute and read and write
|
||
27AE000
|
direct allocation
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute read
|
||
1B548000
|
heap
|
page read and write
|
||
3C61000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
2A97000
|
trusted library allocation
|
page read and write
|
||
1C7C0000
|
heap
|
page read and write
|
||
2D2C000
|
trusted library allocation
|
page read and write
|
||
12753000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
1BAB2000
|
heap
|
page read and write
|
||
C1C000
|
heap
|
page read and write
|
||
57B0000
|
direct allocation
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
7FFB49F86000
|
trusted library allocation
|
page read and write
|
||
27EB000
|
direct allocation
|
page read and write
|
||
8A0000
|
heap
|
page execute and read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
27BE000
|
direct allocation
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
B59000
|
unkown
|
page write copy
|
||
1B9D6000
|
heap
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
377B000
|
direct allocation
|
page read and write
|
||
7FB7B000
|
direct allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
1B2EE000
|
stack
|
page read and write
|
||
1B9ED000
|
heap
|
page read and write
|
||
126C7000
|
trusted library allocation
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
575000
|
unkown
|
page readonly
|
||
128D5000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2DE5000
|
trusted library allocation
|
page read and write
|
||
7FFB4A090000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
12708000
|
trusted library allocation
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
12926000
|
trusted library allocation
|
page read and write
|
||
7FFB4A36F000
|
trusted library allocation
|
page read and write
|
||
27F9000
|
direct allocation
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
2864000
|
trusted library allocation
|
page read and write
|
||
F01000
|
direct allocation
|
page read and write
|
||
8A4000
|
heap
|
page execute and read and write
|
||
FD6000
|
direct allocation
|
page read and write
|
||
1BAE2000
|
heap
|
page read and write
|
||
27CC000
|
direct allocation
|
page read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
12972000
|
trusted library allocation
|
page read and write
|
||
1AE20000
|
heap
|
page read and write
|
||
12741000
|
trusted library allocation
|
page read and write
|
||
FB2000
|
direct allocation
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
EF3000
|
direct allocation
|
page read and write
|
||
2816000
|
direct allocation
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
275F000
|
direct allocation
|
page read and write
|
||
1AF9E000
|
stack
|
page read and write
|
||
C0F000
|
heap
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
12945000
|
trusted library allocation
|
page read and write
|
||
126B6000
|
trusted library allocation
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
7FFB4A190000
|
trusted library allocation
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
3A8D000
|
direct allocation
|
page read and write
|
||
12CCB000
|
trusted library allocation
|
page read and write
|
||
282C000
|
direct allocation
|
page read and write
|
||
281D000
|
direct allocation
|
page read and write
|
||
1BA19000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
128BE000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
129C7000
|
trusted library allocation
|
page read and write
|
||
565000
|
unkown
|
page read and write
|
||
2D8C000
|
trusted library allocation
|
page read and write
|
||
2B36000
|
trusted library allocation
|
page read and write
|
||
C6C000
|
heap
|
page read and write
|
||
7FFB4A2F0000
|
trusted library allocation
|
page read and write
|
||
1BA7C000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
1292D000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
F08000
|
direct allocation
|
page read and write
|
||
2A5B000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
7FFB4A35A000
|
trusted library allocation
|
page read and write
|
||
F25000
|
direct allocation
|
page read and write
|
||
127F6000
|
trusted library allocation
|
page read and write
|
||
2BD3000
|
trusted library allocation
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
2B3A000
|
trusted library allocation
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
1270D000
|
trusted library allocation
|
page read and write
|
||
7FFB49EF0000
|
trusted library allocation
|
page read and write
|
||
1BAA8000
|
heap
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
7FFB4A2F7000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2CA4000
|
trusted library allocation
|
page read and write
|
||
7FFB49ED0000
|
trusted library allocation
|
page read and write
|
||
577000
|
unkown
|
page readonly
|
||
7FFB4A160000
|
trusted library allocation
|
page read and write
|
||
29B6000
|
trusted library allocation
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
1B9A4000
|
heap
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
BF1000
|
heap
|
page read and write
|
||
60D000
|
heap
|
page read and write
|
||
2D61000
|
trusted library allocation
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
1B9DC000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
125D4000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
F33000
|
direct allocation
|
page read and write
|
||
12750000
|
trusted library allocation
|
page read and write
|
||
7FFB4A400000
|
trusted library allocation
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
3C5C000
|
heap
|
page read and write
|
||
7FFB4A31D000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
863000
|
stack
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
7FFB4A11C000
|
trusted library allocation
|
page read and write
|
||
1B62D000
|
heap
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
128CD000
|
trusted library allocation
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
2D19000
|
trusted library allocation
|
page read and write
|
||
7FFB4A0F0000
|
trusted library allocation
|
page read and write
|
||
C07000
|
heap
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
2766000
|
direct allocation
|
page read and write
|
||
2DDA000
|
trusted library allocation
|
page read and write
|
||
1001000
|
direct allocation
|
page read and write
|
||
12717000
|
trusted library allocation
|
page read and write
|
||
3C87000
|
heap
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
7FFB4A0D9000
|
trusted library allocation
|
page read and write
|
||
FAB000
|
direct allocation
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
286F000
|
trusted library allocation
|
page read and write
|
||
3783000
|
direct allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
2751000
|
direct allocation
|
page read and write
|
||
127DE000
|
trusted library allocation
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
12979000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
1298B000
|
trusted library allocation
|
page read and write
|
||
1B544000
|
heap
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
5DF000
|
heap
|
page read and write
|
||
FFA000
|
direct allocation
|
page read and write
|
||
7FFB4A1B0000
|
trusted library allocation
|
page read and write
|
||
2B93000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
7FFB4A31A000
|
trusted library allocation
|
page read and write
|
||
B69000
|
unkown
|
page readonly
|
||
128FD000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
1B56E000
|
heap
|
page read and write
|
||
2D7F000
|
trusted library allocation
|
page read and write
|
||
1B72A000
|
stack
|
page read and write
|
||
2D28000
|
trusted library allocation
|
page read and write
|
||
126CD000
|
trusted library allocation
|
page read and write
|
||
7FFB49F2C000
|
trusted library allocation
|
page execute and read and write
|
||
2775000
|
direct allocation
|
page read and write
|
||
7FFB49FB6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4A315000
|
trusted library allocation
|
page read and write
|
||
1B0EF000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1BB1E000
|
heap
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page read and write
|
||
7FFB4A0EB000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
3C75000
|
heap
|
page read and write
|
||
7FFB4A0C0000
|
trusted library allocation
|
page execute and read and write
|
||
1270A000
|
trusted library allocation
|
page read and write
|
||
7FFB4A070000
|
trusted library allocation
|
page read and write
|
||
2856000
|
trusted library allocation
|
page read and write
|
||
7FFB49ED4000
|
trusted library allocation
|
page read and write
|
||
2B58000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
12988000
|
trusted library allocation
|
page read and write
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
2D99000
|
trusted library allocation
|
page read and write
|
||
7FFB4A2A0000
|
trusted library allocation
|
page read and write
|
||
29C3000
|
trusted library allocation
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
2C67000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
379F000
|
direct allocation
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
128E7000
|
trusted library allocation
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
2833000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
direct allocation
|
page read and write
|
||
12CC6000
|
trusted library allocation
|
page read and write
|
||
F10000
|
direct allocation
|
page read and write
|
||
1BDCE000
|
stack
|
page read and write
|
||
282B000
|
trusted library allocation
|
page read and write
|
||
F52000
|
direct allocation
|
page read and write
|
||
2D7B000
|
trusted library allocation
|
page read and write
|
||
1BA0D000
|
heap
|
page read and write
|
||
7FFB49F90000
|
trusted library allocation
|
page execute and read and write
|
||
2DDF000
|
direct allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
7FFB4A210000
|
trusted library allocation
|
page execute and read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
There are 744 hidden memdumps, click here to show them.