Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\computerlead.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fontdrvhost.exe_d32c824e8915b30da4efd4eabd13e74e4ef8c1_ad0be647_0617501e-f2e0-4753-97d1-6002f83486ad\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER837D.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Nov 25 20:35:36 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83BC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83EC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\computerlead.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\computerlead.exe
|
C:\Users\user\AppData\Local\Temp\IXP000.TMP\computerlead.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
|
||
C:\Windows\SysWOW64\fontdrvhost.exe
|
"C:\Windows\System32\fontdrvhost.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 420
|
||
C:\Windows\System32\fontdrvhost.exe
|
"C:\Windows\System32\fontdrvhost.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 8124 -s 136
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://104.37.175.218:7982/da03ab84e7f8187e6/o304l70l.g00ox
|
|||
https://cloudflare-dns.com/dns-query
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
|
unknown
|
||
https://104.37.175.218:7982/da03ab84e7f8187e6/o304l70l.g00oxkernelbasentdllkernel32GetProcessMitigat
|
unknown
|
||
https://104.37.175.218:7982/da03ab84e7f8187e6/o304l70l.g00oxx
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.37.175.218
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup0
|
||
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn3
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
ProgramId
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
FileId
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
LongPathHash
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
Name
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
OriginalFileName
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
Publisher
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
Version
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
BinFileVersion
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
BinaryType
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
ProductName
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
ProductVersion
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
LinkDate
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
BinProductVersion
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
AppxPackageFullName
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
Size
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
Language
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
IsOsComponent
|
||
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
44F8000
|
trusted library allocation
|
page read and write
|
||
1610000
|
direct allocation
|
page execute and read and write
|
||
56B0000
|
trusted library section
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
A30000
|
direct allocation
|
page execute and read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7890000
|
heap
|
page read and write
|
||
C9C000
|
unkown
|
page execute read
|
||
4D35000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
26ECBDF000
|
stack
|
page read and write
|
||
3CF0000
|
trusted library allocation
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC54AB000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3CC0000
|
trusted library allocation
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
17DB000
|
stack
|
page read and write
|
||
37A1000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
790E000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC727B000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page execute and read and write
|
||
3788000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4C00000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
C85000
|
unkown
|
page execute read
|
||
372B000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3CF2000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
1EFC711D000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3C29000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DBB000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4E1E000
|
unkown
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1BE06AFE000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
CF2000
|
unkown
|
page execute read
|
||
59F0000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
1F38D0B8000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4E36000
|
unkown
|
page read and write
|
||
1BE06839000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
FD8000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7A80000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1EFC7106000
|
heap
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
D2B000
|
unkown
|
page execute read
|
||
3D2F000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
67D5000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1F38D090000
|
heap
|
page read and write
|
||
4EC7000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
974000
|
heap
|
page read and write
|
||
5C70000
|
heap
|
page read and write
|
||
67DA000
|
heap
|
page read and write
|
||
3C2F000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
3775000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1B0F000
|
stack
|
page read and write
|
||
D35D000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3C1A000
|
trusted library allocation
|
page read and write
|
||
1EFC7167000
|
heap
|
page read and write
|
||
1EFC5390000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3752000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
CD5000
|
unkown
|
page execute read
|
||
4AE1000
|
heap
|
page read and write
|
||
3CF8000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
4AE0000
|
unkown
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1EFC7100000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3D0D000
|
trusted library allocation
|
page read and write
|
||
3C8B000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
87CD000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4A4B000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
379D000
|
trusted library allocation
|
page read and write
|
||
7C96000
|
heap
|
page read and write
|
||
3C18000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC7112000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
CF7000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
3164000
|
trusted library allocation
|
page read and write
|
||
7CA7000
|
heap
|
page read and write
|
||
CC4000
|
unkown
|
page execute read
|
||
930000
|
heap
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
58ED000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4A4E000
|
heap
|
page read and write
|
||
37B8000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3C5D000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page execute and read and write
|
||
5B2D000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page execute and read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1818000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3784000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1EFC54BC000
|
heap
|
page read and write
|
||
37AB000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5740000
|
heap
|
page execute and read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE0000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
372F000
|
trusted library allocation
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
61A0000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1735000
|
trusted library allocation
|
page execute and read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
67C4000
|
heap
|
page read and write
|
||
1EFC7156000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
5FE0000
|
trusted library section
|
page readonly
|
||
3CBE000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
CB8000
|
unkown
|
page execute read
|
||
1EFC54BC000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
32BC000
|
stack
|
page read and write
|
||
4B90000
|
unkown
|
page read and write
|
||
CCA000
|
unkown
|
page execute read
|
||
7C4000
|
heap
|
page read and write
|
||
1BE06837000
|
heap
|
page read and write
|
||
3D26000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
172A000
|
trusted library allocation
|
page execute and read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4A8E000
|
heap
|
page read and write
|
||
7AA7000
|
heap
|
page read and write
|
||
56A3000
|
heap
|
page read and write
|
||
4C50000
|
unkown
|
page read and write
|
||
3CB8000
|
trusted library allocation
|
page read and write
|
||
6790000
|
heap
|
page read and write
|
||
CA7000
|
unkown
|
page execute read
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page execute and read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
350000
|
remote allocation
|
page execute and read and write
|
||
1EFC5490000
|
heap
|
page read and write
|
||
1EFC5450000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
565D000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC712E000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
32CC000
|
trusted library allocation
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4E42000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3CF4000
|
trusted library allocation
|
page read and write
|
||
3CB6000
|
trusted library allocation
|
page read and write
|
||
4B72000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1703000
|
trusted library allocation
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
4A4B000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1EFC716D000
|
heap
|
page read and write
|
||
3C44000
|
trusted library allocation
|
page read and write
|
||
3C48000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1BE0683E000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
37C3000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4F81000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7FF7E5E09000
|
unkown
|
page readonly
|
||
4A55000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4A4B000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1EFC717E000
|
heap
|
page read and write
|
||
4DAD000
|
unkown
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3D24000
|
trusted library allocation
|
page read and write
|
||
3119000
|
heap
|
page read and write
|
||
3CD5000
|
trusted library allocation
|
page read and write
|
||
3C5F000
|
trusted library allocation
|
page read and write
|
||
4A73000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC7160000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1EFC7117000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
171D000
|
trusted library allocation
|
page execute and read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3791000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
880F000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3756000
|
trusted library allocation
|
page read and write
|
||
1F38D080000
|
heap
|
page read and write
|
||
FF908C000
|
stack
|
page read and write
|
||
3C7A000
|
trusted library allocation
|
page read and write
|
||
4A4B000
|
heap
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1524000
|
heap
|
page read and write
|
||
379F000
|
trusted library allocation
|
page read and write
|
||
44B6000
|
trusted library allocation
|
page read and write
|
||
3D07000
|
trusted library allocation
|
page read and write
|
||
3754000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
7FF7E5E00000
|
unkown
|
page readonly
|
||
7C4000
|
heap
|
page read and write
|
||
38C000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3CDD000
|
trusted library allocation
|
page read and write
|
||
3C5B000
|
trusted library allocation
|
page read and write
|
||
2FADAFE000
|
stack
|
page read and write
|
||
8B70000
|
trusted library allocation
|
page execute and read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
3786000
|
trusted library allocation
|
page read and write
|
||
EEC000
|
stack
|
page read and write
|
||
4C60000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3C33000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC54C0000
|
heap
|
page read and write
|
||
1EFC70FB000
|
heap
|
page read and write
|
||
3C8D000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1BE06810000
|
heap
|
page readonly
|
||
4DB7000
|
heap
|
page read and write
|
||
67B4000
|
heap
|
page read and write
|
||
862E000
|
stack
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7E5E0E000
|
unkown
|
page readonly
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
CAD000
|
unkown
|
page execute read
|
||
7C4000
|
heap
|
page read and write
|
||
3D09000
|
trusted library allocation
|
page read and write
|
||
1F38D3C0000
|
heap
|
page read and write
|
||
3C36000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7FF7E5E01000
|
unkown
|
page execute read
|
||
8B20000
|
trusted library section
|
page read and write
|
||
7989000
|
heap
|
page read and write
|
||
26ECB5C000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
795D000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4EE1000
|
unkown
|
page read and write
|
||
770000
|
direct allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3773000
|
trusted library allocation
|
page read and write
|
||
789E000
|
heap
|
page read and write
|
||
3C12000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7FF7E5E09000
|
unkown
|
page readonly
|
||
1704000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
157F000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
376D000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC53B0000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
CCF000
|
unkown
|
page execute read
|
||
4AE1000
|
heap
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC7134000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1BE067E0000
|
heap
|
page read and write
|
||
3C4C000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
1EFC5455000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7FF7E5E00000
|
unkown
|
page readonly
|
||
99A000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1EFC714B000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
37BC000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
37BA000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
1EFC7145000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE0000
|
unkown
|
page read and write
|
||
3777000
|
trusted library allocation
|
page read and write
|
||
1EFC70E4000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
C8B000
|
unkown
|
page execute read
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
1EFC7179000
|
heap
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC70DE000
|
heap
|
page read and write
|
||
4C58000
|
unkown
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7FF7E5E0E000
|
unkown
|
page readonly
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
1EFC7173000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
170D000
|
trusted library allocation
|
page execute and read and write
|
||
375B000
|
trusted library allocation
|
page read and write
|
||
67A0000
|
heap
|
page read and write
|
||
EDA000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
521D000
|
heap
|
page read and write
|
||
1EFC54C0000
|
heap
|
page read and write
|
||
1EFC7184000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1737000
|
trusted library allocation
|
page execute and read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7976000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
8B10000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
D42000
|
unkown
|
page readonly
|
||
4AE0000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3C14000
|
trusted library allocation
|
page read and write
|
||
45CF000
|
trusted library allocation
|
page read and write
|
||
872E000
|
stack
|
page read and write
|
||
3D20000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
unkown
|
page execute read
|
||
4D00000
|
heap
|
page read and write
|
||
4C30000
|
unkown
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC707B000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4C03000
|
unkown
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3CBA000
|
trusted library allocation
|
page read and write
|
||
7904000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
67A8000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
378A000
|
trusted library allocation
|
page read and write
|
||
2FAD6CC000
|
stack
|
page read and write
|
||
1EFC54AB000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3C16000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
8B40000
|
trusted library section
|
page read and write
|
||
3C76000
|
trusted library allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
85EE000
|
stack
|
page read and write
|
||
1EFC70F5000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1BE06700000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
5CAB000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
37A3000
|
trusted library allocation
|
page read and write
|
||
1726000
|
trusted library allocation
|
page execute and read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7FF7E5E0C000
|
unkown
|
page write copy
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
1F38D0B0000
|
heap
|
page read and write
|
||
4D34000
|
heap
|
page read and write
|
||
1800000
|
trusted library allocation
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
79A0000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
376F000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3D28000
|
trusted library allocation
|
page read and write
|
||
C22000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC70EF000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
37A9000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
83AE000
|
stack
|
page read and write
|
||
2FADB7E000
|
unkown
|
page readonly
|
||
4C80000
|
unkown
|
page read and write
|
||
7CFC000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
D1A000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4D44000
|
heap
|
page read and write
|
||
CB3000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page execute and read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3C59000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
378C000
|
trusted library allocation
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1BE066E0000
|
unkown
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
61C5000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC713F000
|
heap
|
page read and write
|
||
375F000
|
trusted library allocation
|
page read and write
|
||
7CB7000
|
heap
|
page read and write
|
||
3C78000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1EFC7123000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1F38EC80000
|
heap
|
page read and write
|
||
4E56000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
CE6000
|
unkown
|
page execute read
|
||
1380000
|
heap
|
page read and write
|
||
37DF000
|
trusted library allocation
|
page read and write
|
||
3D0B000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
unkown
|
page execute and read and write
|
||
3CBC000
|
trusted library allocation
|
page read and write
|
||
D25000
|
unkown
|
page execute read
|
||
4AE1000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3D0F000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3C2D000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
1EFC54BE000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7FF7E5E01000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
AED4000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1EFC713A000
|
heap
|
page read and write
|
||
67AF000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
37BE000
|
trusted library allocation
|
page read and write
|
||
D06000
|
unkown
|
page execute read
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
3769000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7982000
|
heap
|
page read and write
|
||
372D000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
unkown
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
D14000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
37A5000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
1BE06830000
|
heap
|
page read and write
|
||
374E000
|
trusted library allocation
|
page read and write
|
||
6095000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7FF7E5E0C000
|
unkown
|
page read and write
|
||
1373000
|
heap
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
4A52000
|
heap
|
page read and write
|
||
1732000
|
trusted library allocation
|
page read and write
|
||
173B000
|
trusted library allocation
|
page execute and read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
5C2D000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
D09000
|
unkown
|
page execute read
|
||
7C4000
|
heap
|
page read and write
|
||
893000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3CD3000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1F38D280000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
5062000
|
heap
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
5FDB000
|
stack
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
67F3000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
376B000
|
trusted library allocation
|
page read and write
|
||
3CD7000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
heap
|
page read and write
|
||
84EE000
|
stack
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
CDB000
|
unkown
|
page execute read
|
||
CBE000
|
unkown
|
page execute read
|
||
3CF6000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
399000
|
remote allocation
|
page execute and read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
4AE0000
|
unkown
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
1EFC710C000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7942000
|
heap
|
page read and write
|
||
34B000
|
stack
|
page read and write
|
||
D45D000
|
stack
|
page read and write
|
||
4C9C000
|
stack
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
4DA9000
|
unkown
|
page read and write
|
||
1EFC52B0000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
C96000
|
unkown
|
page execute read
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
84AF000
|
stack
|
page read and write
|
||
1EFC5497000
|
heap
|
page read and write
|
||
3CC5000
|
trusted library allocation
|
page read and write
|
||
7F92000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
heap
|
page read and write
|
||
4DB9000
|
heap
|
page read and write
|
||
C22000
|
unkown
|
page execute read
|
||
4CD0000
|
unkown
|
page read and write
|
||
7C8E000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
2FAD7CF000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1592000
|
heap
|
page read and write
|
||
1BE06800000
|
unkown
|
page execute and read and write
|
||
CEC000
|
unkown
|
page execute read
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4D00000
|
unkown
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3C7C000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1F38D3C5000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
1EFC7162000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
3CDB000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
26ECE7E000
|
stack
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page execute read
|
There are 836 hidden memdumps, click here to show them.