Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
799Ox3XqxO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\INST.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\libcrypto-3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\python313.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INST.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\799Ox3XqxO.exe
|
"C:\Users\user\Desktop\799Ox3XqxO.exe"
|
||
C:\Users\user\Desktop\799Ox3XqxO.exe
|
"C:\Users\user\Desktop\799Ox3XqxO.exe"
|
||
C:\Users\user\AppData\Local\Temp\INST.exe
|
C:\Users\user\AppData\Local\Temp\INST.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c echo %temp%
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\INST.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://tempuri.org/Entity/Id23ResponseD
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
|
unknown
|
||
http://tempuri.org/Entity/Id12Response
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Entity/Id2Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://tempuri.org/Entity/Id21Response
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://tempuri.org/Entity/Id9
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://tempuri.org/Entity/Id8
|
unknown
|
||
http://tempuri.org/Entity/Id5
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
|
unknown
|
||
http://tempuri.org/Entity/Id4
|
unknown
|
||
http://tempuri.org/Entity/Id7
|
unknown
|
||
http://tempuri.org/Entity/Id6
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
|
unknown
|
||
http://tempuri.org/Entity/Id19Response
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://cacerts.digi
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
|
unknown
|
||
http://tempuri.org/Entity/Id15Response
|
unknown
|
||
https://peps.python.org/pep-0205/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://tempuri.org/Entity/Id6Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
https://mozilla.org0/
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/sc
|
unknown
|
||
http://tempuri.org/Entity/Id1ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
http://tempuri.org/Entity/Id9Response
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://tempuri.org/Entity/Id20
|
unknown
|
||
http://tempuri.org/Entity/Id21
|
unknown
|
||
http://tempuri.org/Entity/Id22
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id23
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id24
|
unknown
|
||
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
|
unknown
|
||
http://tempuri.org/Entity/Id24Response
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://tempuri.org/Entity/Id1Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust
|
unknown
|
||
http://tempuri.org/Entity/Id10
|
unknown
|
||
http://tempuri.org/Entity/Id11
|
unknown
|
||
http://tempuri.org/Entity/Id12
|
unknown
|
||
http://tempuri.org/Entity/Id16Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
|
unknown
|
||
http://tempuri.org/Entity/Id13
|
unknown
|
||
https://www.python.org/psf/license/)
|
unknown
|
||
http://tempuri.org/Entity/Id14
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
http://tempuri.org/Entity/Id15
|
unknown
|
||
http://tempuri.org/Entity/Id16
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
|
unknown
|
||
http://tempuri.org/Entity/Id17
|
unknown
|
||
http://tempuri.org/Entity/Id18
|
unknown
|
||
http://tempuri.org/Entity/Id5Response
|
unknown
|
||
http://tempuri.org/Entity/Id19
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://tempuri.org/Entity/Id10Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://tempuri.org/Entity/Id8Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
31.177.109.130
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26F6000
|
trusted library allocation
|
page read and write
|
||
172000
|
unkown
|
page readonly
|
||
1A7D52DF000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
595E000
|
heap
|
page read and write
|
||
3736000
|
trusted library allocation
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
7FF7FD72D000
|
unkown
|
page readonly
|
||
282F000
|
trusted library allocation
|
page read and write
|
||
1A7D5062000
|
heap
|
page read and write
|
||
1A7D338F000
|
heap
|
page read and write
|
||
2BD3000
|
trusted library allocation
|
page read and write
|
||
83BDCFE000
|
unkown
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D5067000
|
heap
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
2E7AAFF000
|
unkown
|
page read and write
|
||
1A7D502B000
|
heap
|
page read and write
|
||
1A7D51DC000
|
heap
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
1A7D502B000
|
heap
|
page read and write
|
||
58E7000
|
heap
|
page read and write
|
||
39E8000
|
trusted library allocation
|
page read and write
|
||
1A7D4D50000
|
direct allocation
|
page read and write
|
||
1A7D4FD6000
|
heap
|
page read and write
|
||
1A7D4FDE000
|
heap
|
page read and write
|
||
1A7D5208000
|
heap
|
page read and write
|
||
2400E462000
|
heap
|
page read and write
|
||
6FD000
|
trusted library allocation
|
page execute and read and write
|
||
5CD0DE6000
|
stack
|
page read and write
|
||
1A7D5011000
|
heap
|
page read and write
|
||
3978000
|
trusted library allocation
|
page read and write
|
||
2650000
|
heap
|
page execute and read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
1A7D5067000
|
heap
|
page read and write
|
||
1A7D5201000
|
heap
|
page read and write
|
||
1A7D5018000
|
heap
|
page read and write
|
||
7FF7FD701000
|
unkown
|
page execute read
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
49C6000
|
trusted library allocation
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
1A7D33DC000
|
heap
|
page read and write
|
||
3997000
|
trusted library allocation
|
page read and write
|
||
1A7D5064000
|
heap
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
64C5000
|
trusted library allocation
|
page read and write
|
||
1A7D52C3000
|
heap
|
page read and write
|
||
1A7D5321000
|
heap
|
page read and write
|
||
1A7D501A000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
1A7D4FDD000
|
heap
|
page read and write
|
||
1A7D5420000
|
direct allocation
|
page read and write
|
||
1A7D4FE1000
|
heap
|
page read and write
|
||
7FF7FD701000
|
unkown
|
page execute read
|
||
372F000
|
trusted library allocation
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
767C000
|
heap
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D3380000
|
heap
|
page read and write
|
||
7626000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
1A7D5120000
|
direct allocation
|
page read and write
|
||
1A7D4F9E000
|
heap
|
page read and write
|
||
632C000
|
stack
|
page read and write
|
||
1A7D5018000
|
heap
|
page read and write
|
||
1A7D5068000
|
heap
|
page read and write
|
||
2400E46A000
|
heap
|
page read and write
|
||
1A7D5025000
|
heap
|
page read and write
|
||
4AAA000
|
trusted library allocation
|
page read and write
|
||
1A7D502C000
|
heap
|
page read and write
|
||
594C000
|
heap
|
page read and write
|
||
637B000
|
trusted library allocation
|
page read and write
|
||
27B2000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
1A7D51DC000
|
heap
|
page read and write
|
||
1A7D4FEB000
|
heap
|
page read and write
|
||
1A7D4FC3000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
39A3000
|
trusted library allocation
|
page read and write
|
||
1A7D5082000
|
heap
|
page read and write
|
||
1A7D5067000
|
heap
|
page read and write
|
||
5984000
|
heap
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
280C000
|
trusted library allocation
|
page read and write
|
||
1A7D5063000
|
heap
|
page read and write
|
||
1A7D4FE0000
|
heap
|
page read and write
|
||
39DA000
|
trusted library allocation
|
page read and write
|
||
28C7000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
3691000
|
trusted library allocation
|
page read and write
|
||
1A7D5025000
|
heap
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
1A7D51D4000
|
heap
|
page read and write
|
||
64A5000
|
trusted library allocation
|
page read and write
|
||
1A7D5202000
|
heap
|
page read and write
|
||
1A7D50CC000
|
direct allocation
|
page read and write
|
||
1A7D507B000
|
heap
|
page read and write
|
||
2400E461000
|
heap
|
page read and write
|
||
277C000
|
trusted library allocation
|
page read and write
|
||
1A7D5018000
|
heap
|
page read and write
|
||
1A7D5218000
|
heap
|
page read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7FD746000
|
unkown
|
page readonly
|
||
6A6E000
|
stack
|
page read and write
|
||
1A7D4FA0000
|
heap
|
page read and write
|
||
3A9A000
|
trusted library allocation
|
page read and write
|
||
1A7D4CD4000
|
direct allocation
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
1A7D3220000
|
heap
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
1A7D5201000
|
heap
|
page read and write
|
||
1A7D4FCB000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
1A7D3374000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D507D000
|
heap
|
page read and write
|
||
1A7D508E000
|
heap
|
page read and write
|
||
2C0D000
|
trusted library allocation
|
page read and write
|
||
1A7D4FCA000
|
heap
|
page read and write
|
||
1A7D504B000
|
heap
|
page read and write
|
||
1A7D5057000
|
heap
|
page read and write
|
||
2400E448000
|
heap
|
page read and write
|
||
1A7D501A000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D52AF000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
6F3000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D5057000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D5041000
|
heap
|
page read and write
|
||
299B000
|
trusted library allocation
|
page read and write
|
||
2400E463000
|
heap
|
page read and write
|
||
1A7D4FB3000
|
heap
|
page read and write
|
||
1A7D543C000
|
direct allocation
|
page read and write
|
||
5760000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D4FFC000
|
heap
|
page read and write
|
||
1A7D5430000
|
direct allocation
|
page read and write
|
||
58E9000
|
heap
|
page read and write
|
||
7FF7FD743000
|
unkown
|
page read and write
|
||
753000
|
heap
|
page read and write
|
||
1A7D5008000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
3AAA000
|
trusted library allocation
|
page read and write
|
||
1A7D5002000
|
heap
|
page read and write
|
||
1A7D5207000
|
heap
|
page read and write
|
||
1A7D5004000
|
heap
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
1A7D5190000
|
heap
|
page read and write
|
||
1A7D522D000
|
heap
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
3A59000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D501A000
|
heap
|
page read and write
|
||
1A7D52C3000
|
heap
|
page read and write
|
||
29E6000
|
trusted library allocation
|
page read and write
|
||
1A7D501C000
|
heap
|
page read and write
|
||
36FA000
|
trusted library allocation
|
page read and write
|
||
1A7D33D7000
|
heap
|
page read and write
|
||
1A7D503B000
|
heap
|
page read and write
|
||
1A7D4C50000
|
direct allocation
|
page read and write
|
||
4F71000
|
trusted library allocation
|
page read and write
|
||
2A83000
|
trusted library allocation
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
761A000
|
heap
|
page read and write
|
||
1A7D337E000
|
heap
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
1A7D33C5000
|
heap
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
7FF7FD740000
|
unkown
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
1A7D51C2000
|
heap
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
1A7D3380000
|
heap
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
trusted library allocation
|
page read and write
|
||
1A7D5044000
|
heap
|
page read and write
|
||
1C17CB8A000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D33C8000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
39D4000
|
trusted library allocation
|
page read and write
|
||
58CA000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
1A7D5011000
|
heap
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D4FC6000
|
heap
|
page read and write
|
||
2400E620000
|
heap
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
3A2A000
|
trusted library allocation
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
2645000
|
trusted library allocation
|
page read and write
|
||
3A3C000
|
trusted library allocation
|
page read and write
|
||
1A7D507C000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
27966880000
|
heap
|
page read and write
|
||
1A7D5004000
|
heap
|
page read and write
|
||
3A1D000
|
trusted library allocation
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
1A7D5018000
|
heap
|
page read and write
|
||
49BE000
|
trusted library allocation
|
page read and write
|
||
7490000
|
heap
|
page read and write
|
||
83BDDFE000
|
stack
|
page read and write
|
||
1C17CD50000
|
heap
|
page read and write
|
||
1A7D32EF000
|
heap
|
page read and write
|
||
1A7D5057000
|
heap
|
page read and write
|
||
3A4D000
|
trusted library allocation
|
page read and write
|
||
1C17CD55000
|
heap
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
1A7D33D8000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
39BD000
|
trusted library allocation
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
1A7D4F96000
|
heap
|
page read and write
|
||
1A7D33D8000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
1A7D3392000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
39C4000
|
trusted library allocation
|
page read and write
|
||
1A7D4FCD000
|
heap
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page read and write
|
||
7FF7FD72D000
|
unkown
|
page readonly
|
||
710000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
49CD000
|
trusted library allocation
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D4FA5000
|
heap
|
page read and write
|
||
396B000
|
trusted library allocation
|
page read and write
|
||
64D4000
|
trusted library allocation
|
page read and write
|
||
1A7D33DA000
|
heap
|
page read and write
|
||
374E000
|
trusted library allocation
|
page read and write
|
||
1A7D51ED000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
591D000
|
heap
|
page read and write
|
||
7FF7FD740000
|
unkown
|
page write copy
|
||
83BD9AD000
|
stack
|
page read and write
|
||
39CA000
|
trusted library allocation
|
page read and write
|
||
1A7D4F9E000
|
heap
|
page read and write
|
||
1A7D5008000
|
heap
|
page read and write
|
||
75AE000
|
heap
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D5007000
|
heap
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
39E0000
|
trusted library allocation
|
page read and write
|
||
5996000
|
heap
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
49A4000
|
trusted library allocation
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
1A7D502C000
|
heap
|
page read and write
|
||
1A7D52DE000
|
heap
|
page read and write
|
||
7FF7FD744000
|
unkown
|
page read and write
|
||
1A7D33A9000
|
heap
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page execute and read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
39ED000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
1A7D4FC0000
|
heap
|
page read and write
|
||
28D7000
|
trusted library allocation
|
page read and write
|
||
2964000
|
trusted library allocation
|
page read and write
|
||
1A7D3305000
|
heap
|
page read and write
|
||
1A7D4FF1000
|
heap
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
1A7D4FF1000
|
heap
|
page read and write
|
||
1A7D5056000
|
heap
|
page read and write
|
||
F5D79CF000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
1A7D4FF2000
|
heap
|
page read and write
|
||
1A7D526A000
|
heap
|
page read and write
|
||
70D000
|
trusted library allocation
|
page execute and read and write
|
||
2400E451000
|
heap
|
page read and write
|
||
1A7D33AC000
|
heap
|
page read and write
|
||
1A7D33B9000
|
heap
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
1A7D33D9000
|
heap
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
655D000
|
stack
|
page read and write
|
||
1A7D3376000
|
heap
|
page read and write
|
||
1A7D53EC000
|
direct allocation
|
page read and write
|
||
4A82000
|
trusted library allocation
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D337F000
|
heap
|
page read and write
|
||
2B5C000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
heap
|
page read and write
|
||
228A000
|
trusted library allocation
|
page execute and read and write
|
||
39E2000
|
trusted library allocation
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
2400E540000
|
heap
|
page read and write
|
||
2869000
|
trusted library allocation
|
page read and write
|
||
29ED000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
2400E463000
|
heap
|
page read and write
|
||
1A7D33D2000
|
heap
|
page read and write
|
||
1A7D52AF000
|
heap
|
page read and write
|
||
1A7D33B4000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D5428000
|
direct allocation
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
1A7D5037000
|
heap
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
283D000
|
trusted library allocation
|
page read and write
|
||
1A7D5028000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
3763000
|
trusted library allocation
|
page read and write
|
||
2B34000
|
trusted library allocation
|
page read and write
|
||
1A7D4FC3000
|
heap
|
page read and write
|
||
1A7D5004000
|
heap
|
page read and write
|
||
25FC000
|
stack
|
page read and write
|
||
1A7D4FDF000
|
heap
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
1A7D5028000
|
heap
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
281B000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
243C000
|
stack
|
page read and write
|
||
3947000
|
trusted library allocation
|
page read and write
|
||
2282000
|
trusted library allocation
|
page read and write
|
||
1A7D4FA4000
|
heap
|
page read and write
|
||
2400E471000
|
heap
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
1A7D5018000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
7608000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1A7D5212000
|
heap
|
page read and write
|
||
1A7D5002000
|
heap
|
page read and write
|
||
1B6000
|
unkown
|
page readonly
|
||
1A7D5213000
|
heap
|
page read and write
|
||
1A7D33D1000
|
heap
|
page read and write
|
||
2292000
|
trusted library allocation
|
page read and write
|
||
1C17CDA0000
|
heap
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
6380000
|
heap
|
page read and write
|
||
1C17CB86000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
36E3000
|
trusted library allocation
|
page read and write
|
||
1A7D5188000
|
direct allocation
|
page read and write
|
||
36BD000
|
trusted library allocation
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
7FF7FD701000
|
unkown
|
page execute read
|
||
1A7D5018000
|
heap
|
page read and write
|
||
73A5000
|
heap
|
page read and write
|
||
1A7D507C000
|
heap
|
page read and write
|
||
1A7D52D9000
|
heap
|
page read and write
|
||
36D9000
|
trusted library allocation
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
1A7D503B000
|
heap
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
1A7D52C3000
|
heap
|
page read and write
|
||
1A7D53A8000
|
direct allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D3387000
|
heap
|
page read and write
|
||
1A7D505F000
|
heap
|
page read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
1A7D501A000
|
heap
|
page read and write
|
||
59FC000
|
stack
|
page read and write
|
||
64B8000
|
trusted library allocation
|
page read and write
|
||
5C6C000
|
stack
|
page read and write
|
||
7FF7FD746000
|
unkown
|
page readonly
|
||
1A7D3387000
|
heap
|
page read and write
|
||
65AF000
|
stack
|
page read and write
|
||
1A7D4FD2000
|
heap
|
page read and write
|
||
1A7D5008000
|
heap
|
page read and write
|
||
64BA000
|
trusted library allocation
|
page read and write
|
||
759B000
|
heap
|
page read and write
|
||
2A72000
|
trusted library allocation
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
3708000
|
trusted library allocation
|
page read and write
|
||
1A7D4FE0000
|
heap
|
page read and write
|
||
1C17CB60000
|
heap
|
page read and write
|
||
1A7D3383000
|
heap
|
page read and write
|
||
75E1000
|
heap
|
page read and write
|
||
1C17CD80000
|
heap
|
page read and write
|
||
1A7D33A3000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
75EF000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
39DD000
|
trusted library allocation
|
page read and write
|
||
2400E463000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
1A7D4FF2000
|
heap
|
page read and write
|
||
1A7D3386000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
4F3E000
|
trusted library allocation
|
page read and write
|
||
557000
|
stack
|
page read and write
|
||
1A7D5063000
|
heap
|
page read and write
|
||
1C17CB6C000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D4FC3000
|
heap
|
page read and write
|
||
2400E45C000
|
heap
|
page read and write
|
||
1A7D5034000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
2400E463000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
1A7D33D9000
|
heap
|
page read and write
|
||
3C2A000
|
trusted library allocation
|
page read and write
|
||
1A7D338C000
|
heap
|
page read and write
|
||
36CE000
|
trusted library allocation
|
page read and write
|
||
1A7D33A0000
|
heap
|
page read and write
|
||
1A7D5114000
|
direct allocation
|
page read and write
|
||
2440000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7FD700000
|
unkown
|
page readonly
|
||
1A7D33BF000
|
heap
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
1A7D33DE000
|
heap
|
page read and write
|
||
5CD11CE000
|
stack
|
page read and write
|
||
1A7D5008000
|
heap
|
page read and write
|
||
1A7D4F90000
|
heap
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
2400FEB0000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
263E000
|
trusted library allocation
|
page read and write
|
||
1A7D4FD6000
|
heap
|
page read and write
|
||
1A7D526A000
|
heap
|
page read and write
|
||
1A7D4FF2000
|
heap
|
page read and write
|
||
1A7D4FE4000
|
heap
|
page read and write
|
||
1A7D4FD5000
|
heap
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
1A7D5065000
|
heap
|
page read and write
|
||
1A7D4FF8000
|
heap
|
page read and write
|
||
1A7D5191000
|
heap
|
page read and write
|
||
36C4000
|
trusted library allocation
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D32C0000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1C17CD60000
|
heap
|
page read and write
|
||
1A7D339A000
|
heap
|
page read and write
|
||
64A2000
|
trusted library allocation
|
page read and write
|
||
1A7D3230000
|
heap
|
page read and write
|
||
3706000
|
trusted library allocation
|
page read and write
|
||
64CF000
|
trusted library allocation
|
page read and write
|
||
1A7D4FE0000
|
heap
|
page read and write
|
||
1A7D4FC1000
|
heap
|
page read and write
|
||
1A7D339F000
|
heap
|
page read and write
|
||
1A7D5090000
|
direct allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
36AB000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
1A7D5440000
|
direct allocation
|
page read and write
|
||
1C17CD54000
|
heap
|
page read and write
|
||
1A7D501C000
|
heap
|
page read and write
|
||
27966910000
|
heap
|
page read and write
|
||
1A7D3260000
|
heap
|
page read and write
|
||
1A7D4FF2000
|
heap
|
page read and write
|
||
1A7D504E000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
6378000
|
trusted library allocation
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
5933000
|
heap
|
page read and write
|
||
1A7D4FE9000
|
heap
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page read and write
|
||
1A7D5009000
|
heap
|
page read and write
|
||
2783000
|
trusted library allocation
|
page read and write
|
||
2400E440000
|
heap
|
page read and write
|
||
1A7D3399000
|
heap
|
page read and write
|
||
5947000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
1A7D53E8000
|
direct allocation
|
page read and write
|
||
F5D75E6000
|
stack
|
page read and write
|
||
370E000
|
trusted library allocation
|
page read and write
|
||
F5D77DE000
|
stack
|
page read and write
|
||
64CA000
|
trusted library allocation
|
page read and write
|
||
1A7D500B000
|
heap
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
1A7D52AF000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D5212000
|
heap
|
page read and write
|
||
1A7D507B000
|
heap
|
page read and write
|
||
3703000
|
trusted library allocation
|
page read and write
|
||
64BF000
|
trusted library allocation
|
page read and write
|
||
36F0000
|
trusted library allocation
|
page read and write
|
||
1A7D51DC000
|
heap
|
page read and write
|
||
1A7D507C000
|
heap
|
page read and write
|
||
1A7D4FAA000
|
heap
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
1A7D4FF3000
|
heap
|
page read and write
|
||
1A7D51EF000
|
heap
|
page read and write
|
||
1A7D51C3000
|
heap
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
4F1B000
|
trusted library allocation
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
1A7D3290000
|
direct allocation
|
page read and write
|
||
7FF7FD746000
|
unkown
|
page readonly
|
||
1A7D337D000
|
heap
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
1A7D5006000
|
heap
|
page read and write
|
||
1A7D502A000
|
heap
|
page read and write
|
||
2875000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page execute and read and write
|
||
9DF000
|
stack
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
1A7D52CF000
|
heap
|
page read and write
|
||
1A7D4F9E000
|
heap
|
page read and write
|
||
3A04000
|
trusted library allocation
|
page read and write
|
||
1A7D4FA2000
|
heap
|
page read and write
|
||
1A7D500C000
|
heap
|
page read and write
|
||
2400E463000
|
heap
|
page read and write
|
||
7F480000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D4FEF000
|
heap
|
page read and write
|
||
2857000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
1A7D3382000
|
heap
|
page read and write
|
||
1A7D4FFD000
|
heap
|
page read and write
|
||
27F7000
|
trusted library allocation
|
page read and write
|
||
1A7D4FE3000
|
heap
|
page read and write
|
||
1A7D3380000
|
heap
|
page read and write
|
||
1A7D52D9000
|
heap
|
page read and write
|
||
7FF7FD700000
|
unkown
|
page readonly
|
||
1A7D5024000
|
heap
|
page read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
3942000
|
trusted library allocation
|
page read and write
|
||
1A7D3391000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
2AE9000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
398C000
|
trusted library allocation
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
45A000
|
stack
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
1A7D5057000
|
heap
|
page read and write
|
||
1A7D5220000
|
heap
|
page read and write
|
||
1A7D33DE000
|
heap
|
page read and write
|
||
36C9000
|
trusted library allocation
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
1A7D501C000
|
heap
|
page read and write
|
||
1A7D5008000
|
heap
|
page read and write
|
||
1A7D33B5000
|
heap
|
page read and write
|
||
59B4000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
1A7D4FBC000
|
heap
|
page read and write
|
||
1A7D508A000
|
heap
|
page read and write
|
||
1A7D5028000
|
heap
|
page read and write
|
||
2935000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
1A7D5024000
|
heap
|
page read and write
|
||
1A7D50F8000
|
direct allocation
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
7FF7FD740000
|
unkown
|
page read and write
|
||
2400FF00000
|
heap
|
page read and write
|
||
229B000
|
trusted library allocation
|
page execute and read and write
|
||
2762000
|
trusted library allocation
|
page read and write
|
||
5990000
|
heap
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D52D8000
|
heap
|
page read and write
|
||
1A7D52C3000
|
heap
|
page read and write
|
||
1A7D5063000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
7FF7FD700000
|
unkown
|
page readonly
|
||
75E8000
|
heap
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
71B000
|
heap
|
page read and write
|
||
285E000
|
trusted library allocation
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
39A8000
|
trusted library allocation
|
page read and write
|
||
1C17CC60000
|
heap
|
page read and write
|
||
65CB000
|
trusted library allocation
|
page read and write
|
||
1A7D525E000
|
heap
|
page read and write
|
||
37F8000
|
trusted library allocation
|
page read and write
|
||
1A7D5170000
|
direct allocation
|
page read and write
|
||
2C34000
|
trusted library allocation
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
1A7D33C1000
|
heap
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
7632000
|
heap
|
page read and write
|
||
1A7D5226000
|
heap
|
page read and write
|
||
1A7D508E000
|
heap
|
page read and write
|
||
7610000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
2E7ABFF000
|
stack
|
page read and write
|
||
39B3000
|
trusted library allocation
|
page read and write
|
||
1A7D4FC3000
|
heap
|
page read and write
|
||
6F0000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
stack
|
page read and write
|
||
1A7D32E0000
|
heap
|
page read and write
|
||
1A7D5033000
|
heap
|
page read and write
|
||
3753000
|
trusted library allocation
|
page read and write
|
||
5972000
|
heap
|
page read and write
|
||
27966917000
|
heap
|
page read and write
|
||
1A7D3306000
|
heap
|
page read and write
|
||
1A7D3390000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
1A7D5068000
|
heap
|
page read and write
|
||
3749000
|
trusted library allocation
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
27966AE0000
|
heap
|
page read and write
|
||
2D6A000
|
trusted library allocation
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
399E000
|
trusted library allocation
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
1A7D3389000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
1A7D52AF000
|
heap
|
page read and write
|
||
1A7D4FF0000
|
heap
|
page read and write
|
||
2400E462000
|
heap
|
page read and write
|
||
6560000
|
trusted library allocation
|
page execute and read and write
|
||
3A48000
|
trusted library allocation
|
page read and write
|
||
7FF7FD72D000
|
unkown
|
page readonly
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
1A7D4FFA000
|
heap
|
page read and write
|
||
1A7D51DC000
|
heap
|
page read and write
|
||
7FF7FD700000
|
unkown
|
page readonly
|
||
1A7D3381000
|
heap
|
page read and write
|
||
366F000
|
trusted library allocation
|
page read and write
|
||
1A7D4FC3000
|
heap
|
page read and write
|
||
36F7000
|
trusted library allocation
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
2400E462000
|
heap
|
page read and write
|
||
1A7D4FA5000
|
heap
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
1A7D338B000
|
heap
|
page read and write
|
||
58C2000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
1A7D5052000
|
heap
|
page read and write
|
||
7FF7FD740000
|
unkown
|
page write copy
|
||
1A7D5020000
|
heap
|
page read and write
|
||
1A7D4FE5000
|
heap
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
1A7D33B9000
|
heap
|
page read and write
|
||
1A7D53F8000
|
direct allocation
|
page read and write
|
||
1A7D52DB000
|
heap
|
page read and write
|
||
1A7D337E000
|
heap
|
page read and write
|
||
396D000
|
trusted library allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
4F4A000
|
trusted library allocation
|
page read and write
|
||
1A7D337A000
|
heap
|
page read and write
|
||
58FB000
|
heap
|
page read and write
|
||
64E5000
|
trusted library allocation
|
page read and write
|
||
2795000
|
trusted library allocation
|
page read and write
|
||
1A7D5434000
|
direct allocation
|
page read and write
|
||
75C6000
|
heap
|
page read and write
|
||
2796691A000
|
heap
|
page read and write
|
||
7FF7FD746000
|
unkown
|
page readonly
|
||
1A7D4FBE000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
1A7D4FCC000
|
heap
|
page read and write
|
||
1A7D5034000
|
heap
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
1A7D5004000
|
heap
|
page read and write
|
||
1A7D53A4000
|
direct allocation
|
page read and write
|
||
1A7D5200000
|
heap
|
page read and write
|
||
6360000
|
trusted library allocation
|
page execute and read and write
|
||
374B000
|
trusted library allocation
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
1A7D5118000
|
direct allocation
|
page read and write
|
||
1A7D503B000
|
heap
|
page read and write
|
||
1A7D5066000
|
heap
|
page read and write
|
||
1A7D5008000
|
heap
|
page read and write
|
||
64A9000
|
trusted library allocation
|
page read and write
|
||
2BFA000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D53FC000
|
direct allocation
|
page read and write
|
||
59A5000
|
heap
|
page read and write
|
||
5958000
|
heap
|
page read and write
|
||
597B000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
2E7A73C000
|
stack
|
page read and write
|
||
64E2000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
2286000
|
trusted library allocation
|
page execute and read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
49C1000
|
trusted library allocation
|
page read and write
|
||
29D3000
|
trusted library allocation
|
page read and write
|
||
1A7D516C000
|
direct allocation
|
page read and write
|
||
6340000
|
heap
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
1A7D5014000
|
heap
|
page read and write
|
||
1A7D5079000
|
heap
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
3685000
|
trusted library allocation
|
page read and write
|
||
369E000
|
trusted library allocation
|
page read and write
|
||
1A7D501C000
|
heap
|
page read and write
|
||
5CD0FDF000
|
stack
|
page read and write
|
||
1A7D5224000
|
heap
|
page read and write
|
||
1A7D3384000
|
heap
|
page read and write
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
58D9000
|
heap
|
page read and write
|
||
1A7D5390000
|
direct allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
1A7D5207000
|
heap
|
page read and write
|
||
1A7D4FF8000
|
heap
|
page read and write
|
||
2BCB000
|
trusted library allocation
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
1A7D4FD2000
|
heap
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D4FD6000
|
heap
|
page read and write
|
||
1C17CB88000
|
heap
|
page read and write
|
||
1A7D502C000
|
heap
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
1A7D32C4000
|
heap
|
page read and write
|
||
3693000
|
trusted library allocation
|
page read and write
|
||
59BD000
|
heap
|
page read and write
|
||
1A7D526A000
|
heap
|
page read and write
|
||
2400E463000
|
heap
|
page read and write
|
||
1A7D508E000
|
heap
|
page read and write
|
||
2A88000
|
trusted library allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
1A7D339A000
|
heap
|
page read and write
|
||
2824000
|
trusted library allocation
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
2885000
|
trusted library allocation
|
page read and write
|
||
2295000
|
trusted library allocation
|
page execute and read and write
|
||
71E000
|
heap
|
page read and write
|
||
1A7D5065000
|
heap
|
page read and write
|
||
1A7D33BD000
|
heap
|
page read and write
|
||
1A7D5078000
|
heap
|
page read and write
|
||
1A7D4FC6000
|
heap
|
page read and write
|
||
1A7D5212000
|
heap
|
page read and write
|
||
2754000
|
trusted library allocation
|
page read and write
|
||
58C7000
|
heap
|
page read and write
|
||
1A7D5033000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
36B2000
|
trusted library allocation
|
page read and write
|
||
1A7D4FEF000
|
heap
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
1A7D33C9000
|
heap
|
page read and write
|
||
1A7D33AA000
|
heap
|
page read and write
|
||
1A7D3374000
|
heap
|
page read and write
|
||
1A7D33A6000
|
heap
|
page read and write
|
||
1A7D4F9E000
|
heap
|
page read and write
|
||
75A3000
|
heap
|
page read and write
|
||
3A31000
|
trusted library allocation
|
page read and write
|
||
1A7D33D1000
|
heap
|
page read and write
|
||
1A7D5005000
|
heap
|
page read and write
|
||
1A7D502A000
|
heap
|
page read and write
|
||
7FF7FD72D000
|
unkown
|
page readonly
|
||
3A72000
|
trusted library allocation
|
page read and write
|
||
2400E462000
|
heap
|
page read and write
|
||
1A7D51C4000
|
heap
|
page read and write
|
||
2C19000
|
trusted library allocation
|
page read and write
|
||
1A7D337E000
|
heap
|
page read and write
|
||
1A7D3395000
|
heap
|
page read and write
|
||
2400FDF0000
|
heap
|
page read and write
|
||
1A7D5068000
|
heap
|
page read and write
|
||
59AD000
|
heap
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
27966C60000
|
heap
|
page read and write
|
||
1A7D5018000
|
heap
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page read and write
|
||
373C000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1A7D505C000
|
heap
|
page read and write
|
||
5940000
|
heap
|
page read and write
|
||
27966C64000
|
heap
|
page read and write
|
||
2297000
|
trusted library allocation
|
page execute and read and write
|
||
36EA000
|
trusted library allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
279668A0000
|
heap
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
1A7D4FF6000
|
heap
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
1A7D502A000
|
heap
|
page read and write
|
||
22B0000
|
trusted library allocation
|
page read and write
|
||
1A7D52D3000
|
heap
|
page read and write
|
||
1A7D4FA8000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
1A7D52D2000
|
heap
|
page read and write
|
||
1A7D53B8000
|
direct allocation
|
page read and write
|
||
5951000
|
heap
|
page read and write
|
||
3985000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
1A7D33D1000
|
heap
|
page read and write
|
||
1A7D4FA9000
|
heap
|
page read and write
|
||
2400E462000
|
heap
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
1A7D33D1000
|
heap
|
page read and write
|
||
27966870000
|
heap
|
page read and write
|
||
1A7D5228000
|
heap
|
page read and write
|
||
1A7D53F4000
|
direct allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
4AA5000
|
trusted library allocation
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
2640000
|
trusted library allocation
|
page read and write
|
||
1A7000
|
unkown
|
page readonly
|
||
1A7D4FC5000
|
heap
|
page read and write
|
||
1A7D502A000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D4FF2000
|
heap
|
page read and write
|
||
1A7D5211000
|
heap
|
page read and write
|
||
1A7D33CF000
|
heap
|
page read and write
|
||
7390000
|
heap
|
page read and write
|
||
284A000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
7FF7FD701000
|
unkown
|
page execute read
|
||
1A7D5024000
|
heap
|
page read and write
|
||
276F000
|
trusted library allocation
|
page read and write
|
||
7590000
|
heap
|
page read and write
|
||
2661000
|
trusted library allocation
|
page read and write
|
||
2468000
|
trusted library allocation
|
page read and write
|
||
1A7D5020000
|
heap
|
page read and write
|
||
49D2000
|
trusted library allocation
|
page read and write
|
||
1A7D33C4000
|
heap
|
page read and write
|
||
1A7D5028000
|
heap
|
page read and write
|
||
1A7D4FF9000
|
heap
|
page read and write
|
||
1A7D506A000
|
heap
|
page read and write
|
||
1A7D5004000
|
heap
|
page read and write
|
||
3A43000
|
trusted library allocation
|
page read and write
|
||
1A7D505B000
|
heap
|
page read and write
|
||
3700000
|
trusted library allocation
|
page read and write
|
||
3681000
|
trusted library allocation
|
page read and write
|
||
1A7D33CA000
|
heap
|
page read and write
|
||
1A7D5010000
|
heap
|
page read and write
|
There are 868 hidden memdumps, click here to show them.