Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
y1X5s1Oz0Q.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local:26-03-2024
|
HTML document, ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ujqqnhnbwgz.vbs
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Ujqqnhnbwgz.exe_c4d75fa89ebf83f3de8957e7062eda2926d9984_de14591a_465e2937-b166-4332-bf7f-80c602615e79\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4F6.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Mar 26 14:24:38 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB545.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB594.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ujqqnhnbwgz.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\y1X5s1Oz0Q.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\y1X5s1Oz0Q.exe
|
"C:\Users\user\Desktop\y1X5s1Oz0Q.exe"
|
||
C:\Users\user\Desktop\y1X5s1Oz0Q.exe
|
"C:\Users\user\Desktop\y1X5s1Oz0Q.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ujqqnhnbwgz.vbs"
|
||
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe
|
"C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe"
|
||
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe
|
"C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe"
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 200
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://cdn.discordapp.com/attachments/1217028370865455188/1222062384437526538/Fdliipctaw.mp3?ex=661
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://cdn.discordapp.com
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
https://cdn.discordapp.com/attachments/1217028370865455188/1222062384437526538/Fdliipctaw.mp3?ex=6614d949&is=66026449&hm=76c14076f197408a74d02bd5e16b3cfd0651a02372cd195e0f28026e0e131609&
|
162.159.133.233
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cdn.discordapp.com
|
162.159.133.233
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.153.182.247
|
unknown
|
unknown
|
||
162.159.133.233
|
cdn.discordapp.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Install name
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
|
FileDirectory
|
There are 39 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2CFA000
|
trusted library allocation
|
page read and write
|
||
4422000
|
trusted library allocation
|
page read and write
|
||
2E42000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
2E87000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
trusted library allocation
|
page read and write
|
||
3CC1000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library section
|
page read and write
|
||
8471000
|
trusted library allocation
|
page read and write
|
||
601000
|
remote allocation
|
page execute read
|
||
7323000
|
trusted library allocation
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
4719000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
trusted library section
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
3584000
|
trusted library allocation
|
page read and write
|
||
1FE7146C000
|
heap
|
page read and write
|
||
518D000
|
stack
|
page read and write
|
||
2294FBD6000
|
heap
|
page read and write
|
||
2294FCC5000
|
heap
|
page read and write
|
||
8E5DC87000
|
stack
|
page read and write
|
||
55CE000
|
stack
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
1FE6CCB7000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
2294FBBB000
|
heap
|
page read and write
|
||
1FE6ED8E000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6EC68000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
22952380000
|
heap
|
page read and write
|
||
2294FBA9000
|
heap
|
page read and write
|
||
1FE6ED21000
|
heap
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
2294F5B0000
|
heap
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
6291000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
4093000
|
heap
|
page read and write
|
||
5E6E000
|
stack
|
page read and write
|
||
2294FBD2000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
32A5000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
1FE6ED9B000
|
heap
|
page read and write
|
||
6787000
|
trusted library allocation
|
page read and write
|
||
2133CD45000
|
heap
|
page read and write
|
||
1FE6ED0E000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
1FE7146C000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
1494000
|
trusted library allocation
|
page read and write
|
||
229523A1000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1FE6ED9B000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6CD60000
|
heap
|
page read and write
|
||
1FE6ECEE000
|
heap
|
page read and write
|
||
36D8DFE000
|
stack
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
2294FBFE000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294DC11000
|
heap
|
page read and write
|
||
1FE6ED3D000
|
heap
|
page read and write
|
||
1FE6ED85000
|
heap
|
page read and write
|
||
2294DC3C000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
2294DBE4000
|
heap
|
page read and write
|
||
2294FBDE000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
1FE6EC87000
|
heap
|
page read and write
|
||
2294FC9B000
|
heap
|
page read and write
|
||
1FE6ED2C000
|
heap
|
page read and write
|
||
2294DBB5000
|
heap
|
page read and write
|
||
409D000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6EDAE000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6CC50000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
229523A1000
|
heap
|
page read and write
|
||
2294DC3E000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6ED89000
|
heap
|
page read and write
|
||
15B5000
|
heap
|
page read and write
|
||
1FE6ED8E000
|
heap
|
page read and write
|
||
1FE6ED20000
|
heap
|
page read and write
|
||
2294FBCA000
|
heap
|
page read and write
|
||
1FE6ED29000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
1FE6EC83000
|
heap
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
2294FBD2000
|
heap
|
page read and write
|
||
229526D0000
|
heap
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
14C2000
|
trusted library allocation
|
page read and write
|
||
1FE71458000
|
heap
|
page read and write
|
||
2294FCD2000
|
heap
|
page read and write
|
||
1FE6ED9B000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
5CD0000
|
heap
|
page read and write
|
||
2294FCCD000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
8E5E07E000
|
stack
|
page read and write
|
||
1FE6EC7F000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
1FE6EC5F000
|
heap
|
page read and write
|
||
2294DBFE000
|
heap
|
page read and write
|
||
36D94FE000
|
stack
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
1FE6CCEF000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
5BAF000
|
stack
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
1FE6ED8E000
|
heap
|
page read and write
|
||
2294DC3C000
|
heap
|
page read and write
|
||
8058157000
|
stack
|
page read and write
|
||
176C000
|
stack
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
401000
|
remote allocation
|
page execute and read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
1FE6ECE1000
|
heap
|
page read and write
|
||
1FE6EC8C000
|
heap
|
page read and write
|
||
1FE6ED7F000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
10B6000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
22952388000
|
heap
|
page read and write
|
||
2294FBD1000
|
heap
|
page read and write
|
||
1FE6EDC5000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
229523A1000
|
heap
|
page read and write
|
||
2294FCAF000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
1FE6EDC5000
|
heap
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
328E000
|
trusted library allocation
|
page read and write
|
||
1FE6ED83000
|
heap
|
page read and write
|
||
2294DBF7000
|
heap
|
page read and write
|
||
2294FBC3000
|
heap
|
page read and write
|
||
2133CCE8000
|
heap
|
page read and write
|
||
229523A5000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
2294FBAB000
|
heap
|
page read and write
|
||
1FE6EDC5000
|
heap
|
page read and write
|
||
5D35000
|
heap
|
page read and write
|
||
6EA000
|
remote allocation
|
page execute and read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6CD1F000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
4084000
|
heap
|
page read and write
|
||
1FE6EC8B000
|
heap
|
page read and write
|
||
3521000
|
trusted library allocation
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
1FE6CD4E000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
61B2000
|
trusted library allocation
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
22952381000
|
heap
|
page read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
36D90FF000
|
stack
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
1FE6CD5A000
|
heap
|
page read and write
|
||
63FD000
|
trusted library allocation
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
53B000
|
remote allocation
|
page execute and read and write
|
||
2294FBB4000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
2294FBFE000
|
heap
|
page read and write
|
||
2294FBBF000
|
heap
|
page read and write
|
||
1FE71478000
|
heap
|
page read and write
|
||
6789000
|
trusted library allocation
|
page read and write
|
||
1FE6ED2C000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
1FE6EDA8000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294DC2E000
|
heap
|
page read and write
|
||
2294FBA7000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294FBEE000
|
heap
|
page read and write
|
||
2294FBC3000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
F6B000
|
trusted library allocation
|
page execute and read and write
|
||
682A000
|
trusted library allocation
|
page read and write
|
||
805867E000
|
stack
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
6942000
|
trusted library allocation
|
page read and write
|
||
229523A5000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
16EF000
|
stack
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
4ED000
|
remote allocation
|
page execute and read and write
|
||
1FE73450000
|
heap
|
page read and write
|
||
229523A5000
|
heap
|
page read and write
|
||
49C000
|
remote allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
22952398000
|
heap
|
page read and write
|
||
2294FBEE000
|
heap
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
8E5E57B000
|
stack
|
page read and write
|
||
1FE6ED2E000
|
heap
|
page read and write
|
||
2294DBED000
|
heap
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
80584FF000
|
stack
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
22952397000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
61FF000
|
stack
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
2294FBE8000
|
heap
|
page read and write
|
||
1FE6ECF9000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
2294FBF4000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
1FE6EC50000
|
heap
|
page read and write
|
||
1FE6ED83000
|
heap
|
page read and write
|
||
8E5DD8F000
|
stack
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
1FE7145F000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
8E5E4FD000
|
stack
|
page read and write
|
||
728000
|
remote allocation
|
page execute and read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
2294FCD2000
|
heap
|
page read and write
|
||
2294FBC9000
|
heap
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
1FE6ECE4000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
978000
|
unkown
|
page readonly
|
||
22952390000
|
heap
|
page read and write
|
||
2294DBD9000
|
heap
|
page read and write
|
||
6930000
|
trusted library allocation
|
page execute and read and write
|
||
61C2000
|
trusted library allocation
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
1FE6CD35000
|
heap
|
page read and write
|
||
2294FBC9000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
2294DBFA000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
48A5000
|
trusted library allocation
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
2294F635000
|
heap
|
page read and write
|
||
8E5E17D000
|
stack
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
2294FCC5000
|
heap
|
page read and write
|
||
36D8FFF000
|
stack
|
page read and write
|
||
60AF000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
1FE6ED97000
|
heap
|
page read and write
|
||
1FE6ED2E000
|
heap
|
page read and write
|
||
2295239C000
|
heap
|
page read and write
|
||
2133CCA0000
|
heap
|
page read and write
|
||
69F2000
|
trusted library allocation
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
1FE6EC9E000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
1FE6ECE4000
|
heap
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
2294FBB7000
|
heap
|
page read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
2294FBC5000
|
heap
|
page read and write
|
||
2294FCA8000
|
heap
|
page read and write
|
||
F4D000
|
trusted library allocation
|
page execute and read and write
|
||
FF5000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
1FE73920000
|
trusted library allocation
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
2294FCC5000
|
heap
|
page read and write
|
||
507000
|
remote allocation
|
page execute and read and write
|
||
346B000
|
stack
|
page read and write
|
||
805897B000
|
stack
|
page read and write
|
||
1FE6ED79000
|
heap
|
page read and write
|
||
6784000
|
trusted library allocation
|
page read and write
|
||
1FE6E6A3000
|
heap
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
1FE6ED77000
|
heap
|
page read and write
|
||
1FE6ED7A000
|
heap
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
2133CCB0000
|
heap
|
page read and write
|
||
80588FD000
|
stack
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
1FE6ED29000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
158D000
|
heap
|
page read and write
|
||
2294DC07000
|
heap
|
page read and write
|
||
36D8CFE000
|
stack
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
5AAD000
|
stack
|
page read and write
|
||
46C1000
|
trusted library allocation
|
page read and write
|
||
1FE6ED7F000
|
heap
|
page read and write
|
||
2294FBC3000
|
heap
|
page read and write
|
||
1FE6ED65000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
2294FBF3000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
2294DC07000
|
heap
|
page read and write
|
||
542000
|
remote allocation
|
page execute and read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
2294FBDE000
|
heap
|
page read and write
|
||
734000
|
remote allocation
|
page execute and read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
2294FCE3000
|
heap
|
page read and write
|
||
1FE71460000
|
heap
|
page read and write
|
||
1FE6ED61000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
2294FCD2000
|
heap
|
page read and write
|
||
2294FD7B000
|
heap
|
page read and write
|
||
1FE6ECBE000
|
heap
|
page read and write
|
||
618000
|
remote allocation
|
page execute and read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
2294FBE2000
|
heap
|
page read and write
|
||
1FE71463000
|
heap
|
page read and write
|
||
2294FBFE000
|
heap
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6ED2E000
|
heap
|
page read and write
|
||
1FE6ECF9000
|
heap
|
page read and write
|
||
6831000
|
trusted library allocation
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
1FE6EDC2000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
6C41000
|
trusted library allocation
|
page read and write
|
||
1FE6ED88000
|
heap
|
page read and write
|
||
1FE6CD76000
|
heap
|
page read and write
|
||
2294FBD1000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
2294FD7B000
|
heap
|
page read and write
|
||
1FE6ECDA000
|
heap
|
page read and write
|
||
678E000
|
trusted library allocation
|
page read and write
|
||
149D000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6ECB4000
|
heap
|
page read and write
|
||
2294DC3D000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
1FE6E7B5000
|
heap
|
page read and write
|
||
2294DC2A000
|
heap
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
trusted library allocation
|
page execute and read and write
|
||
13CE000
|
stack
|
page read and write
|
||
600000
|
remote allocation
|
page execute and read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
36D89CA000
|
stack
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6EC93000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
749000
|
remote allocation
|
page execute and read and write
|
||
1FE6EC8B000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
2294DC3C000
|
heap
|
page read and write
|
||
1FE6EC87000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
1FE6ED2E000
|
heap
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
1FE6ED89000
|
heap
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
8E5E47E000
|
stack
|
page read and write
|
||
1FE6EC71000
|
heap
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
6810000
|
trusted library allocation
|
page execute and read and write
|
||
31C5000
|
trusted library allocation
|
page read and write
|
||
2294DBD8000
|
heap
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
1FE6CD44000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
133B000
|
stack
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page execute and read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
1FE71465000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294DBD8000
|
heap
|
page read and write
|
||
498000
|
remote allocation
|
page execute and read and write
|
||
2294FBB2000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
149A000
|
heap
|
page read and write
|
||
40AF000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
F34000
|
trusted library allocation
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6ED80000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294FCCD000
|
heap
|
page read and write
|
||
2294FC07000
|
heap
|
page read and write
|
||
1FE6CD4E000
|
heap
|
page read and write
|
||
2294FBC6000
|
heap
|
page read and write
|
||
2294FBD2000
|
heap
|
page read and write
|
||
3E3D000
|
stack
|
page read and write
|
||
2294DBEB000
|
heap
|
page read and write
|
||
2294FBB1000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page read and write
|
||
629D000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page execute and read and write
|
||
1FE71450000
|
heap
|
page read and write
|
||
1FE6EC71000
|
heap
|
page read and write
|
||
2294FBD6000
|
heap
|
page read and write
|
||
2294FBFF000
|
heap
|
page read and write
|
||
2294FBCE000
|
heap
|
page read and write
|
||
36D95FB000
|
stack
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
1FE7146C000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
2294FBA1000
|
heap
|
page read and write
|
||
2294DC27000
|
heap
|
page read and write
|
||
6713000
|
trusted library allocation
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
stack
|
page read and write
|
||
670A000
|
trusted library allocation
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
2294DBE3000
|
heap
|
page read and write
|
||
590F000
|
stack
|
page read and write
|
||
2294DC07000
|
heap
|
page read and write
|
||
57E0000
|
heap
|
page execute and read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
14CB000
|
trusted library allocation
|
page execute and read and write
|
||
1FE7145B000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
1FE6ED6B000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
2294FD62000
|
heap
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
40A3000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1FE6ECB0000
|
heap
|
page read and write
|
||
1FE6CD47000
|
heap
|
page read and write
|
||
2294FCC5000
|
heap
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
2294FD59000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
1FE6EC9E000
|
heap
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
1FE71440000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
22951DE0000
|
trusted library allocation
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
1FE6ED89000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
2294FBC9000
|
heap
|
page read and write
|
||
2294FCC5000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
1FE6ED83000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
31AC000
|
stack
|
page read and write
|
||
1FE7146C000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294FBD5000
|
heap
|
page read and write
|
||
1FE6ED0E000
|
heap
|
page read and write
|
||
2F67000
|
heap
|
page read and write
|
||
2294FBD2000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page execute and read and write
|
||
2294DC00000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6CD45000
|
heap
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
1FE6ED89000
|
heap
|
page read and write
|
||
2294FCCD000
|
heap
|
page read and write
|
||
2294DC40000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294FBCD000
|
heap
|
page read and write
|
||
9A6000
|
remote allocation
|
page readonly
|
||
2294FD42000
|
heap
|
page read and write
|
||
F5A000
|
trusted library allocation
|
page execute and read and write
|
||
2294FBCD000
|
heap
|
page read and write
|
||
8E5DD0D000
|
stack
|
page read and write
|
||
6480000
|
trusted library allocation
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6ED9A000
|
heap
|
page read and write
|
||
4CEC000
|
stack
|
page read and write
|
||
1FE6ED60000
|
heap
|
page read and write
|
||
1FE6EC81000
|
heap
|
page read and write
|
||
2294FB90000
|
heap
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
1FE6EDC5000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
1FE6ED2C000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
F3D000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6CD1F000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6EC89000
|
heap
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
32AD000
|
stack
|
page read and write
|
||
2294FBD6000
|
heap
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
1FE71680000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
1FE6EC5D000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294FBBF000
|
heap
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
604000
|
remote allocation
|
page execute and read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
2294FC90000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6EC77000
|
heap
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
2294FBCD000
|
heap
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
1FE6ECE4000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
78C000
|
remote allocation
|
page execute and read and write
|
||
2294FBBF000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
2294FBE7000
|
heap
|
page read and write
|
||
1FE6ED7F000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
1FE6CD12000
|
heap
|
page read and write
|
||
1FE6CD41000
|
heap
|
page read and write
|
||
2294DBE5000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
2294FCD2000
|
heap
|
page read and write
|
||
18EF000
|
stack
|
page read and write
|
||
2294FBBF000
|
heap
|
page read and write
|
||
2294FD7B000
|
heap
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
1FE71458000
|
heap
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
36D93FE000
|
stack
|
page read and write
|
||
2294FBD1000
|
heap
|
page read and write
|
||
32A9000
|
trusted library allocation
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
36D92FD000
|
stack
|
page read and write
|
||
1FE6EDC5000
|
heap
|
page read and write
|
||
2294FD6C000
|
heap
|
page read and write
|
||
1FE6CD15000
|
heap
|
page read and write
|
||
229523A5000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6EC71000
|
heap
|
page read and write
|
||
1FE6EC93000
|
heap
|
page read and write
|
||
2294FBBA000
|
heap
|
page read and write
|
||
72A000
|
remote allocation
|
page execute and read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
2294DBE1000
|
heap
|
page read and write
|
||
1FE6ECEE000
|
heap
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
6F3000
|
remote allocation
|
page execute and read and write
|
||
2294FD61000
|
heap
|
page read and write
|
||
1FE6ED7F000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1493000
|
trusted library allocation
|
page execute and read and write
|
||
2294FC0D000
|
heap
|
page read and write
|
||
55D000
|
remote allocation
|
page execute and read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
40B9000
|
heap
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
80585FD000
|
stack
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
2294F500000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
3F3D000
|
stack
|
page read and write
|
||
2294FBD2000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
626D000
|
heap
|
page read and write
|
||
2294FCAF000
|
heap
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
1FE6CD30000
|
heap
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
1FE6CC10000
|
heap
|
page read and write
|
||
1FE6EC83000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
22954492000
|
trusted library allocation
|
page read and write
|
||
2294FBF7000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
2294FBB9000
|
heap
|
page read and write
|
||
2294FCB2000
|
heap
|
page read and write
|
||
8E5E0FE000
|
stack
|
page read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
2294DBE6000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
2294FBD2000
|
heap
|
page read and write
|
||
1FE6EC93000
|
heap
|
page read and write
|
||
6920000
|
trusted library allocation
|
page execute and read and write
|
||
2294DBD8000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
62D0000
|
trusted library allocation
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
F62000
|
trusted library allocation
|
page read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
4261000
|
trusted library allocation
|
page read and write
|
||
1FE6ED9B000
|
heap
|
page read and write
|
||
2294FBCD000
|
heap
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
2294FCB4000
|
heap
|
page read and write
|
||
2294FD09000
|
heap
|
page read and write
|
||
2294DBE3000
|
heap
|
page read and write
|
||
1FE6CD5B000
|
heap
|
page read and write
|
||
1FE6ED3D000
|
heap
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
672B000
|
trusted library allocation
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
1FE6EC7F000
|
heap
|
page read and write
|
||
5FAE000
|
stack
|
page read and write
|
||
1FE6ED50000
|
heap
|
page read and write
|
||
61BF000
|
trusted library allocation
|
page read and write
|
||
1FE6CD12000
|
heap
|
page read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
2CD000
|
stack
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
2133D070000
|
heap
|
page read and write
|
||
1FE6EC85000
|
heap
|
page read and write
|
||
1FE6ED3D000
|
heap
|
page read and write
|
||
2133E6A0000
|
heap
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
1FE71479000
|
heap
|
page read and write
|
||
51CD000
|
stack
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
2294DC3C000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
2294FC92000
|
heap
|
page read and write
|
||
22952390000
|
heap
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
2294FCA3000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
2133CD10000
|
heap
|
page read and write
|
||
80581DE000
|
stack
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
301D000
|
trusted library allocation
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
1FE6EC9E000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
6940000
|
trusted library allocation
|
page read and write
|
||
F67000
|
trusted library allocation
|
page execute and read and write
|
||
F33000
|
trusted library allocation
|
page execute and read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
5A6F000
|
stack
|
page read and write
|
||
694D000
|
trusted library allocation
|
page read and write
|
||
2CF6000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page read and write
|
||
2294FCCD000
|
heap
|
page read and write
|
||
2294DC22000
|
heap
|
page read and write
|
||
1FE7145F000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
14AD000
|
trusted library allocation
|
page execute and read and write
|
||
1FE7145F000
|
heap
|
page read and write
|
||
2294DBE3000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1FE6EDAE000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
229523A7000
|
heap
|
page read and write
|
||
2294FCAF000
|
heap
|
page read and write
|
||
3CB1000
|
trusted library allocation
|
page read and write
|
||
1FE6ECEE000
|
heap
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
229523A5000
|
heap
|
page read and write
|
||
2294DC02000
|
heap
|
page read and write
|
||
2294DBE5000
|
heap
|
page read and write
|
||
658F000
|
stack
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
2294FCD9000
|
heap
|
page read and write
|
||
1FE6CD66000
|
heap
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
301F000
|
trusted library allocation
|
page read and write
|
||
1FE6CC00000
|
heap
|
page read and write
|
||
2294DC3C000
|
heap
|
page read and write
|
||
7E60000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
1FE6EDBD000
|
heap
|
page read and write
|
||
229523A5000
|
heap
|
page read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
1FE6EC81000
|
heap
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page execute and read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6ED74000
|
heap
|
page read and write
|
||
1FE6EDBE000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
1FE6ED2C000
|
heap
|
page read and write
|
||
2294FBD1000
|
heap
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
2294FBC0000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
1FE6CD4B000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1FE6ECE1000
|
heap
|
page read and write
|
||
1FE6EC74000
|
heap
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
2294FBCD000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
2CE8000
|
trusted library allocation
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
229523A1000
|
heap
|
page read and write
|
||
6702000
|
trusted library allocation
|
page read and write
|
||
1335000
|
trusted library allocation
|
page read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
56B000
|
remote allocation
|
page execute and read and write
|
||
2294FBBF000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6ED85000
|
heap
|
page read and write
|
||
2294DBCE000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
6220000
|
trusted library allocation
|
page execute and read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
1FE6EC71000
|
heap
|
page read and write
|
||
2294FBB5000
|
heap
|
page read and write
|
||
2133D075000
|
heap
|
page read and write
|
||
1FE6ED89000
|
heap
|
page read and write
|
||
2294FCE4000
|
heap
|
page read and write
|
||
8E0000
|
remote allocation
|
page readonly
|
||
98C000
|
remote allocation
|
page execute and read and write
|
||
5F4000
|
remote allocation
|
page execute and read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
1FE6CD0D000
|
heap
|
page read and write
|
||
229523A1000
|
heap
|
page read and write
|
||
4FA1000
|
trusted library allocation
|
page read and write
|
||
2294FBE1000
|
heap
|
page read and write
|
||
2294DB40000
|
heap
|
page read and write
|
||
1FE6CD4A000
|
heap
|
page read and write
|
||
2294FBC4000
|
heap
|
page read and write
|
||
2294DBF6000
|
heap
|
page read and write
|
||
1FE6CD4C000
|
heap
|
page read and write
|
||
805857E000
|
stack
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
1FE6ED7F000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294DD20000
|
heap
|
page read and write
|
||
1FE6CD62000
|
heap
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
6460000
|
trusted library allocation
|
page execute and read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294FBCE000
|
heap
|
page read and write
|
||
1FE6ED92000
|
heap
|
page read and write
|
||
80586FB000
|
stack
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
2294FBBB000
|
heap
|
page read and write
|
||
2294DBD8000
|
heap
|
page read and write
|
||
62E1000
|
trusted library allocation
|
page read and write
|
||
1FE7145F000
|
heap
|
page read and write
|
||
1FE6CD1D000
|
heap
|
page read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
2294FBC3000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
2294DBEA000
|
heap
|
page read and write
|
||
2295239A000
|
heap
|
page read and write
|
||
2294FBFE000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
1FE6CD19000
|
heap
|
page read and write
|
||
739000
|
remote allocation
|
page execute and read and write
|
||
1FE6CD31000
|
heap
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
1FE6CD7A000
|
heap
|
page read and write
|
||
152E000
|
heap
|
page read and write
|
||
1FE738F0000
|
heap
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
1FE70EA0000
|
trusted library allocation
|
page read and write
|
||
2294FD6B000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1FE73930000
|
heap
|
page readonly
|
||
9A9000
|
remote allocation
|
page readonly
|
||
1780000
|
trusted library allocation
|
page execute and read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
1FE6CD53000
|
heap
|
page read and write
|
||
8E5E1FE000
|
stack
|
page read and write
|
||
1FE6EDA1000
|
heap
|
page read and write
|
||
2294FBF1000
|
heap
|
page read and write
|
||
1FE6EDA3000
|
heap
|
page read and write
|
||
1340000
|
trusted library section
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
F52000
|
trusted library allocation
|
page read and write
|
||
972000
|
unkown
|
page readonly
|
||
2294FBD2000
|
heap
|
page read and write
|
||
1FE6ED9B000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
705000
|
remote allocation
|
page execute and read and write
|
||
13A0000
|
heap
|
page read and write
|
||
2294FCC5000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6CC80000
|
heap
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
8E5E27C000
|
stack
|
page read and write
|
||
2294FD37000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1FE6EC93000
|
heap
|
page read and write
|
||
2294FBD1000
|
heap
|
page read and write
|
||
1FE6E7B0000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
1FE6CD2F000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6E6A0000
|
heap
|
page read and write
|
||
6946000
|
trusted library allocation
|
page read and write
|
||
2294DC04000
|
heap
|
page read and write
|
||
2294FBFF000
|
heap
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page execute and read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1FE6EC85000
|
heap
|
page read and write
|
||
2133CCE0000
|
heap
|
page read and write
|
||
1FE6ED29000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
22952397000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
1FE6ED49000
|
heap
|
page read and write
|
||
531000
|
remote allocation
|
page execute and read and write
|
||
1FE6ED29000
|
heap
|
page read and write
|
||
2295239C000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
1FE6ED48000
|
heap
|
page read and write
|
||
70B000
|
remote allocation
|
page execute and read and write
|
||
2294FD42000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1FE6CD57000
|
heap
|
page read and write
|
||
1FE6ECC5000
|
heap
|
page read and write
|
||
14B6000
|
trusted library allocation
|
page execute and read and write
|
||
3297000
|
trusted library allocation
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
602000
|
remote allocation
|
page execute and read and write
|
||
1FE6ECE1000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page execute and read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
2294F630000
|
heap
|
page read and write
|
||
1FE7147B000
|
heap
|
page read and write
|
||
2294FBA0000
|
heap
|
page read and write
|
||
341C000
|
trusted library allocation
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
1FE6ED75000
|
heap
|
page read and write
|
||
2294FBD6000
|
heap
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
2294FD1F000
|
heap
|
page read and write
|
||
1FE6EDA6000
|
heap
|
page read and write
|
||
2294FBD6000
|
heap
|
page read and write
|
||
2294FCDA000
|
heap
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
4A3000
|
remote allocation
|
page execute and read and write
|
||
FCE000
|
heap
|
page read and write
|
||
340C000
|
stack
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
1FE6CD34000
|
heap
|
page read and write
|
||
2294DC06000
|
heap
|
page read and write
|
||
2294FD07000
|
heap
|
page read and write
|
||
1FE6ECF9000
|
heap
|
page read and write
|
||
2294FCD2000
|
heap
|
page read and write
|
||
2294FD57000
|
heap
|
page read and write
|
||
2294FD5C000
|
heap
|
page read and write
|
||
1FE71451000
|
heap
|
page read and write
|
||
3299000
|
trusted library allocation
|
page read and write
|
||
1FE6EDC1000
|
heap
|
page read and write
|
||
F56000
|
trusted library allocation
|
page execute and read and write
|
||
1FE6EC9E000
|
heap
|
page read and write
|
||
1FE6EDB1000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
1FE6ED3D000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
1524000
|
heap
|
page read and write
|
||
2294FBF7000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
330C000
|
stack
|
page read and write
|
||
7935000
|
trusted library allocation
|
page read and write
|
||
2294FCCD000
|
heap
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
5FC000
|
remote allocation
|
page execute and read and write
|
||
316A000
|
stack
|
page read and write
|
||
2294FBE6000
|
heap
|
page read and write
|
||
22952397000
|
heap
|
page read and write
|
||
1533000
|
heap
|
page read and write
|
||
1FE7146C000
|
heap
|
page read and write
|
||
2294DC3C000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
1FE6EDB5000
|
heap
|
page read and write
|
||
1FE6EDCE000
|
heap
|
page read and write
|
||
6300000
|
trusted library section
|
page read and write
|
||
2294FBCE000
|
heap
|
page read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
60A000
|
remote allocation
|
page execute and read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
514000
|
remote allocation
|
page execute and read and write
|
||
2133CEB0000
|
heap
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
2294DBF0000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294FBEC000
|
heap
|
page read and write
|
||
14C7000
|
trusted library allocation
|
page execute and read and write
|
||
6C20000
|
trusted library allocation
|
page execute and read and write
|
||
2294FBDB000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
1FE6ED8B000
|
heap
|
page read and write
|
||
1FE6ED0E000
|
heap
|
page read and write
|
||
2294FC02000
|
heap
|
page read and write
|
||
2294FCD2000
|
heap
|
page read and write
|
||
2294DBF9000
|
heap
|
page read and write
|
||
62C3000
|
heap
|
page read and write
|
||
2294DBE5000
|
heap
|
page read and write
|
||
4CF000
|
remote allocation
|
page execute and read and write
|
||
1FE6CD4D000
|
heap
|
page read and write
|
||
2294FBD1000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
7DF47F7A1000
|
trusted library allocation
|
page execute read
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
1FE6CD19000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
1FE6EDAC000
|
heap
|
page read and write
|
||
2294FBFA000
|
heap
|
page read and write
|
||
2294FBF6000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2294FBE5000
|
heap
|
page read and write
|
||
805847E000
|
stack
|
page read and write
|
||
1FE6EC89000
|
heap
|
page read and write
|
||
229523A1000
|
heap
|
page read and write
|
||
1FE6CD1F000
|
heap
|
page read and write
|
||
494000
|
remote allocation
|
page execute and read and write
|
||
1FE6EDBA000
|
heap
|
page read and write
|
||
1FE6CCFA000
|
heap
|
page read and write
|
||
1FE6EDB9000
|
heap
|
page read and write
|
||
1FE6EDC6000
|
heap
|
page read and write
|
||
1FE6CD35000
|
heap
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
1FE6EDC7000
|
heap
|
page read and write
|
||
61B8000
|
trusted library allocation
|
page read and write
|
||
71E000
|
remote allocation
|
page execute and read and write
|
||
1FE6ED96000
|
heap
|
page read and write
|
||
1FE6ECDB000
|
heap
|
page read and write
|
||
5D19000
|
heap
|
page read and write
|
||
2294FC06000
|
heap
|
page read and write
|
||
1FE6ED9B000
|
heap
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page execute and read and write
|
There are 1072 hidden memdumps, click here to show them.